Physical layer security in delay constrained applications