Research Article
A Lightweight Key Generation Scheme for Secure Device-to-Device (D2D) Communication
Figure 5
(a) The theoretical achievable key rate versus the upper bound of under different value of . (b) The theoretical achievable key rate versus the upper bound of under different value of .
(a) |
(b) |