Figure 6From: Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer versus the prices of both users. Back to article page