I. Introduction
In wireless communications, a significant amount of effort has been devoted to guarantee security by preventing an eavesdropper from overhearing [1]. Originally, security was regarded as a high-layer problem to be tackled using cryptographic methods. However, in general, such security solutions in the high layer are complex and need an infrastructure to generate and manage public or private keys [2]. For this reason, physical layer security (PLS) based on information theory has been gaining increasing attention in recent years because security key distribution and management are not required [3]. Specifically, the fundamental principle behind PLS is to exploit the inherent randomness of noise and communication channels, which are known to the trusted transmitter and the legitimate receiver but not to an eavesdropper [4]. This helps to protect the signal from being detected, demodulated, or decoded properly, making the unintended receiver unable to even understand the information-carrying signal [1].