Research Article
Using Physical Context-Based Authentication against External Attacks: Models and Protocols
Table 1
Theoretical NC and BG protocols simulation results.
| Band | Accuracy (%) | Throughput | | | |
| 0 (NC) | 5.5 | 0.5 | 0.0 | 100 | 1 | 12.5 | 1.8 | 0.0 | 75.3 | 2 | 82.7 | 57.0 | 5.4 | 34.3 | 3 | 100 | 89.9 | 47.2 | 10.8 | 4 | 100 | 100 | 63.2 | 2.19 |
|
|