We will review a line of work that creates unconditional secrecy by leveraging the wireless network variability and the limited presence of an adversary.
We will present exact secure capacity characterizations for a number of small networks, a connection to Linear Programming, as well as first steps towards implementation of these ideas.