Research Article

Wireless Key Generation Scheme Based on Random Permutation and Perturbation in Quasistatic Environments

Figure 6

CSI after different preprocessing schemes.
(a) Original CSI
(b) CSI after PCA processing
(c) CSI after PCA and permutation