I. Introduction
Wireless communication networks are vulnerable to spoofing attacks due to the open broadcast nature [1]. To ensure the security of communications, the receiver should build authentication mechanisms to validate the identities of transmitters. Traditional cryptography-based authentication methods rely on digital credentials and are challenging to resist spoofing attacks [2]. Moreover, the cryptography-based authentication will also increase the transmission overheads, communication latency, and power consumption [3].