Research Article

Efficient Physical-Layer Secret Key Generation and Authentication Schemes Based on Wireless Channel-Phase

Figure 4

The secret key capacity of different schemes.