Return to Article Details Implementation of Two Physical Layer Security Techniques in an OTA System Download Download PDF