The topic of physical layer key agreement in Gaussian block fading channels in the presence of active adversaries is investigated in the present contribution. Frequency hopping versus frequency spreading are studied as potential defence strategies against denial of service (DoS) attacks in the form of jamming. We begin by investigating the optimal power allocation policy for the jammer -in the case of frequency spreading -when side information is available. Through numerical evaluations it is shown that effect of the availability of side information on the jammer's impact is minimal. Next, the competitive interaction between the legitimate nodes and the jammer is formulated as a one-shot zero-sum game; it is found that under short term power constraints, the legitimate nodes should optimally employ frequency hopping while the jammer should employ frequency spreading. Comparing the achievable secret key generation rates in systems with and without frequency hopping demonstrates that increasing the available bandwidth can diminish the limitations of secret key generation in the presence of active adversaries.Index Terms-Physical layer security, secret key generation, frequency hopping, denial of service attacks, active attack