I. Introduction
Given the broadcast nature of the wireless medium, there exists a potential for illegal tapping of any wireless channel, thereby posing a significant risk to the confidentiality of transmitted information, such as personal details or business secrets. Consequently, ensuring privacy and security in wireless communication systems has consistently emerged as a paramount challenge. Among security threats in wireless communications, the eavesdropping attack is one of the most common types of wireless attacks. To perform the attack, the eavesdropper usually stays close to the victim system to “wiretap” the legitimate wireless channel and acquire exchanged information. Since the eavesdropper operates passively without introducing noise or altering transmit signals, detecting and preventing eavesdropping attacks are usually challenging.