Research Article

Efficient Physical-Layer Secret Key Generation and Authentication Schemes Based on Wireless Channel-Phase

Figure 2

The process of the secret key generation.