Research Article

Wireless Key Generation Scheme Based on Random Permutation and Perturbation in Quasistatic Environments

Figure 12

Correlation between secret keys after PCA processing.