Research Article
Using Physical Context-Based Authentication against External Attacks: Models and Protocols
Table 2
Theoretical BS protocol simulation results.
| Band | Accuracy (%) | Throughput | | | |
| 0 | 21.7 | 5.7 | 0.3 | 97.6 | 1 | 94.8 | 81.3 | 35.3 | 93.8 | 2 | 99.87 | 99.1 | 91.8 | 91.9 | 3 | 100 | 99.49 | 94.9 | 24.1 | 4 | 100 | 100 | 100 | 1,34 |
|
|