“…Information-theoretic security, i.e., physical layer security (PLS), has attracted plenty of attentions [1], since the seminal work was established by Shannon and Wyner. On the basis of the classic Wyner's wiretap channel model, many work related to the secrecy performance analysis over various fading channels, including the Gaussian fading channels [2], Rayleigh [3], Rician [4], [5], Nakagami-m [6], Weibull [7], genralized-K [8], α − µ [9]- [13], κ − µ [14], α-η-κ-µ [15], Fisher-Snedor F [16], and Fox's H-function fading channel [17], etc., were done. Apart from the aforementioned fading model, other models, including the composite fading model and cascaded fading model, are also widely used to characterize some wireless communication scenarios.…”