Research Article

Analysis of Secret Key Randomness Exploiting the Radio Channel Variability

Figure 1

Wireless link between legitimate terminals in the presence of an eavesdropper.