Research Article

Efficient Physical-Layer Secret Key Generation and Authentication Schemes Based on Wireless Channel-Phase

Figure 7

The process of the PHY-layer authentication.