Research Article

Code-Hopping Based Transmission Scheme for Wireless Physical-Layer Security

Figure 10

The BER of eavesdropper versus the number of transmitted source messages when .