Figure 3From: Distributed source-relay selection scheme for vehicular relaying networks under eavesdropping attacksThe ergodic secrecy capacity of the system. (a) The secrecy capacity comparison between the proposed and the conventional scheme. (b) The capacity loss relative to the system without eavesdroppers. K = 3, M = 2.Back to article page