I. Introduction
With the rapid evolution of wireless communication technologies, an unprecedented increasing amount of data is transmitted over wireless networks and systems, and meanwhile, people are paying more and more attention to wireless communication security [1]. Due to the open propagation characteristics of wireless media, malicious eavesdroppers and adversary wardens are able to access the transmitted signals relatively easily, which may create huge security vulnerabilities. However, among the well-known security technologies, neither the traditional information encryption technology [2] nor the new physical layer security (PLS) technology [3] can completely solve the privacy problem, because eavesdroppers/wardens can obtain key encrypted information by analyzing the intercepted traffic data.