Research Article

Adaptive Secure MIMO Transmission Mechanism against Smart Attacker

Figure 6

Illustration of the NE in the spoofing mode by employing the power control strategy only in the spoofing system. (a) Secrecy capacity. (b) Attack probability by Eve. (c) Transmit power P.
(a)
(b)
(c)