“…First we present a general summary of security protocols in all layers and later focus on the taxonomies and prior research applying specifically to Physical Layer Security. [7], [8], [9], [10] [11], [12], [13], [14] Network Layer [15], [16], [17] [18], [19] [20], [21], [22] Transport Layer [23], [24], [25], [26] [27], [28], [29], [30] App. Layer [31], [32], [33] [34], [35], [36] Protocol stack security occurs at multiple layers of the OSI models as illustrated in Table I.…”