Investigating the eavesdropper attack in physical layer security wireless key generation: a simulation case study | IEEE Conference Publication | IEEE Xplore