Research Article

Using Physical Context-Based Authentication against External Attacks: Models and Protocols

Table 4

Case study NC and BG protocols simulation results.

Band FND dataset STB1 dataset STB2 dataset
Acc% Thr% Acc% Thr% Acc% Thr%

062.510015.610016.6100
168.796.416.394.818.094.9
280.389.231.983.632.683.5
391.083.343.970.442.669.6
495.568.451.050.148.049.4
597.361.946.040.250.038.2