I. Introduction
Security and reliability are the major considerations for fifth-generation (5G) wireless communications due to the critical demand of protecting against harmful attacks, such as eavesdropping, malicious jamming and spoofing [1]. Unlike eavesdropping or malicious jamming attacks which are launched to overhear or disrupt the legitimate transmissions [2], spoofing attacks which aim to replicate the identity number of a legitimate transmitter to send harmful messages result in a significant attack on the integrity of the communication infrastructure [3]. For example, when legitimate actors report traffic jam positioning information to the server in an intelligent transport system, a malicious spoofer is able to intercept this important information and modify it to falsely generate other locations [4].