Abstract: In this paper, we analyze the performance of the physical layer security for the classic Wyner's three-node model (including an eavesdropper) over ...