Research Article

Adaptive Secure MIMO Transmission Mechanism against Smart Attacker

Figure 7

Illustration of the NE in the no-attack mode by employing both the power control strategy and the probabilistic transmission scheme in the spoofing system. (a) Secrecy capacity. (b) Attack probability by Eve. (c) Transmit power P and PT.
(a)
(b)
(c)