2 signal compensation purposes. These readily available estimates can be cost-effectively used to produce an unforgeable PHY identity (PHY-ID) for transmitter authentication [13]- [17], which has the potential to help relieve the excessive computational burden of the signature encryption.Exploitation of MEC: MEC devices (MECDs) located at the network edge can quickly observe/collect the PHY information of the served IoT devices, including the RF fingerprints, and usually possess more powerful CPUs than the EDs for performing encryption. The NDN naming and in-network caching schemes with built-in interest/data primitives are wellsuited for MEC-enabled networks [18], [19].Consequently, it is practically feasible to replace the NDN packet signing at the resource-constrained ED with two steps: 1) MECD authenticates ED using PHY-ID, and 2) MECD works with the authenticated EDs in a coordinated manner to offload the signing task from EDs [20]- [22].