Figure 1From: Distributed source-relay selection scheme for vehicular relaying networks under eavesdropping attacksSystem model. K sources communicate with the destination via the help of M relays.Back to article page