Research Article

Scramble-Based Secret Key Generation Algorithm in Physical Layer Security

Figure 6

KMR versus SNR performance under non-ideal channels and imperfect channel estimation for RISKG, CKG, IKG, JKG algorithms.