Fig. 1From: Efficient physical layer key generation technique in wireless communicationsAdversary modelBack to article page