Figure 2From: Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer Secrecy capacity versus the power of the single jammer. Back to article page