Research Article

Using Physical Context-Based Authentication against External Attacks: Models and Protocols

Figure 7

FRR and FAR for scenario RS attack with different values.