From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems

In recent years, there has been a noticeable increase in interest in the possibilities of embedding additional data in the constellation of an already existing information signal in radio technology. This solution more precisely is based on adding a low power signal (or signals) to a stronger signal...

Full description

Bibliographic Details
Main Authors: Krystian Grzesiak, Zbigniew Piotrowski
Format: Article
Language:English
Published: MDPI AG 2021-04-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/21/8/2752
_version_ 1797537814639804416
author Krystian Grzesiak
Zbigniew Piotrowski
author_facet Krystian Grzesiak
Zbigniew Piotrowski
author_sort Krystian Grzesiak
collection DOAJ
description In recent years, there has been a noticeable increase in interest in the possibilities of embedding additional data in the constellation of an already existing information signal in radio technology. This solution more precisely is based on adding a low power signal (or signals) to a stronger signal (cover). As will be described in the article, this technique is used in numerous radio communication areas, such as watermarking, covert channel creation, and multiple access techniques. Typically, those areas are considered as independent research topics. Our comparison suggests that these areas are closely related. In this article, a comprehensive survey of the implementation of signal superposition is conducted with an emphasis on the similarities and differences between individual solutions. Since the nature of the signal model entails certain problems in the security area, we provide the reader with a review of the state-of-the-art research on this topic, including the PLS (physical layer security) and LPD (low probability of detection) issues.
first_indexed 2024-03-10T12:21:36Z
format Article
id doaj.art-cfbccf822b0f4e71b2aabd307a7f7e41
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-03-10T12:21:36Z
publishDate 2021-04-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-cfbccf822b0f4e71b2aabd307a7f7e412023-11-21T15:28:04ZengMDPI AGSensors1424-82202021-04-01218275210.3390/s21082752From Constellation Dithering to NOMA Multiple Access: Security in Wireless SystemsKrystian Grzesiak0Zbigniew Piotrowski1Institute of Communications Systems, Faculty of Electronics, Military University of Technology, 00-908 Warsaw, PolandInstitute of Communications Systems, Faculty of Electronics, Military University of Technology, 00-908 Warsaw, PolandIn recent years, there has been a noticeable increase in interest in the possibilities of embedding additional data in the constellation of an already existing information signal in radio technology. This solution more precisely is based on adding a low power signal (or signals) to a stronger signal (cover). As will be described in the article, this technique is used in numerous radio communication areas, such as watermarking, covert channel creation, and multiple access techniques. Typically, those areas are considered as independent research topics. Our comparison suggests that these areas are closely related. In this article, a comprehensive survey of the implementation of signal superposition is conducted with an emphasis on the similarities and differences between individual solutions. Since the nature of the signal model entails certain problems in the security area, we provide the reader with a review of the state-of-the-art research on this topic, including the PLS (physical layer security) and LPD (low probability of detection) issues.https://www.mdpi.com/1424-8220/21/8/2752steganographycovert channelphysical layer securitylow probability of detection
spellingShingle Krystian Grzesiak
Zbigniew Piotrowski
From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems
Sensors
steganography
covert channel
physical layer security
low probability of detection
title From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems
title_full From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems
title_fullStr From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems
title_full_unstemmed From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems
title_short From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems
title_sort from constellation dithering to noma multiple access security in wireless systems
topic steganography
covert channel
physical layer security
low probability of detection
url https://www.mdpi.com/1424-8220/21/8/2752
work_keys_str_mv AT krystiangrzesiak fromconstellationditheringtonomamultipleaccesssecurityinwirelesssystems
AT zbigniewpiotrowski fromconstellationditheringtonomamultipleaccesssecurityinwirelesssystems