I. Introduction
THE area of physical layer security has received a great deal of attention over the past few years due to its simplicity over existing cryptographic methods. It is a promising technique to establish a secured transmission link between two legitimate communication terminals, while guaranteeing that any eavesdropper has no access to that information. In general, the communication scheme is modeled using the well-known wiretap channel model introduced by Wyner in 1975 [1]. In this model, the communication system consists of three terminals: the transmitter (Alice), the legitimate receiver (Bob) and the eavesdropper (Eve ). In his seminal work, Wyner showed that Alice and Bob are actually able to establish secure communication provided that the channel between Alice and Eve, known as the wiretap channel, is a degraded version of that between Alice and Bob, known as the main channel.