Research Article
Using Physical Context-Based Authentication against External Attacks: Models and Protocols
Table 4
Case study NC and BG protocols simulation results.
| Band | FND dataset | STB1 dataset | STB2 dataset | Acc% | Thr% | Acc% | Thr% | Acc% | Thr% |
| 0 | 62.5 | 100 | 15.6 | 100 | 16.6 | 100 | 1 | 68.7 | 96.4 | 16.3 | 94.8 | 18.0 | 94.9 | 2 | 80.3 | 89.2 | 31.9 | 83.6 | 32.6 | 83.5 | 3 | 91.0 | 83.3 | 43.9 | 70.4 | 42.6 | 69.6 | 4 | 95.5 | 68.4 | 51.0 | 50.1 | 48.0 | 49.4 | 5 | 97.3 | 61.9 | 46.0 | 40.2 | 50.0 | 38.2 |
|
|