Research Article
Using Physical Context-Based Authentication against External Attacks: Models and Protocols
Table 5
Case study BS protocol simulation results.
| Band | FND dataset | STB1 dataset | STB2 dataset | Acc% | Thr% | Acc% | Thr% | Acc% | Thr% |
| 1 | 69.6 | 99.6 | 20.5 | 99.4 | 20.6 | 99.5 | 2 | 84.8 | 99.0 | 31.9 | 98.4 | 39.3 | 98.5 | 3 | 92.8 | 98.3 | 52.4 | 97.2 | 52.6 | 97.4 | 4 | 95.5 | 80.0 | 51.7 | 75.9 | 56.6 | 79.4 | 5 | 96.4 | 67.8 | 43.9 | 48.3 | 50.6 | 48.1 |
|
|