Figure 3From: Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer How much power the source buys as a function of the price. Back to article page