Research Article
Wireless Key Generation Scheme Based on Random Permutation and Perturbation in Quasistatic Environments
Figure 6
CSI after different preprocessing schemes.
(a) Original CSI |
(b) CSI after PCA processing |
(c) CSI after PCA and permutation |