Fig. 3From: Authenticated secret key generation in delay-constrained wireless systemsPipelined SKG and encrypted data transfer between Alice and BobBack to article page