Research Article

Wireless Key Generation Scheme Based on Random Permutation and Perturbation in Quasistatic Environments

Figure 11

Correlation between initial secret keys.