Research Article

Using Physical Context-Based Authentication against External Attacks: Models and Protocols

Table 1

Theoretical NC and BG protocols simulation results.

Band Accuracy (%) Throughput

0 (NC) 5.5 0.5 0.0 100
1 12.5 1.8 0.0 75.3
2 82.7 57.0 5.4 34.3
3 100 89.9 47.2 10.8
4 100 100 63.2 2.19