I. Introduction
The rapid development in wireless communications has brought unprecedented attention to information security. Traditionally, security issues are addressed at the upper layers of communication protocols by using encryption. However, the large-scale and dynamic topologies in emerging wireless networks pose a great challenge in implementing secret key management and distribution, particularly in a decentralized wireless ad hoc network without infrastructure support [1]. Fortunately, physical layer security, an information-theoretic approach that attains secure transmissions by exploiting the randomness of wireless channels without necessarily relying on secret keys, is becoming increasingly recognized as a promising alternative to complement the cryptography-based security mechanisms [2]–[7].