I. Introduction
Transmitting information over a wireless link poses a threat to information security due to inherent interception-type vulnerability of the wireless channel [1]. Thus, intercepting signals from wireless media is the reality that makes wireless communication accessible to intruders. Consequently, it is harder to maintain the confidentiality, integrity, and authenticity (CIA) of the information traversing through wireless media. Currently, every facet of services such as vast commercial communications, national security and battle field communications, electric power delivery, and industrial and scientific research has been increasingly using wireless communications. Given the insecure nature of wireless links, CIA based on encryption is relied upon to satisfy users demand for end-to-end trustworthy communications.