Research Article

A Lightweight Key Generation Scheme for Secure Device-to-Device (D2D) Communication

Figure 5

(a) The theoretical achievable key rate versus the upper bound of under different value of . (b) The theoretical achievable key rate versus the upper bound of under different value of .
(a)
(b)