Research Article

Using Physical Context-Based Authentication against External Attacks: Models and Protocols

Figure 6

How is generated from packets tracing information.
(a) Packets of the same source address
(b) Packets frequency distribution histogram
(c) Histogram binary representation (partial ID)