From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems
In recent years, there has been a noticeable increase in interest in the possibilities of embedding additional data in the constellation of an already existing information signal in radio technology. This solution more precisely is based on adding a low power signal (or signals) to a stronger signal...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-04-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/21/8/2752 |
_version_ | 1797537814639804416 |
---|---|
author | Krystian Grzesiak Zbigniew Piotrowski |
author_facet | Krystian Grzesiak Zbigniew Piotrowski |
author_sort | Krystian Grzesiak |
collection | DOAJ |
description | In recent years, there has been a noticeable increase in interest in the possibilities of embedding additional data in the constellation of an already existing information signal in radio technology. This solution more precisely is based on adding a low power signal (or signals) to a stronger signal (cover). As will be described in the article, this technique is used in numerous radio communication areas, such as watermarking, covert channel creation, and multiple access techniques. Typically, those areas are considered as independent research topics. Our comparison suggests that these areas are closely related. In this article, a comprehensive survey of the implementation of signal superposition is conducted with an emphasis on the similarities and differences between individual solutions. Since the nature of the signal model entails certain problems in the security area, we provide the reader with a review of the state-of-the-art research on this topic, including the PLS (physical layer security) and LPD (low probability of detection) issues. |
first_indexed | 2024-03-10T12:21:36Z |
format | Article |
id | doaj.art-cfbccf822b0f4e71b2aabd307a7f7e41 |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-03-10T12:21:36Z |
publishDate | 2021-04-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-cfbccf822b0f4e71b2aabd307a7f7e412023-11-21T15:28:04ZengMDPI AGSensors1424-82202021-04-01218275210.3390/s21082752From Constellation Dithering to NOMA Multiple Access: Security in Wireless SystemsKrystian Grzesiak0Zbigniew Piotrowski1Institute of Communications Systems, Faculty of Electronics, Military University of Technology, 00-908 Warsaw, PolandInstitute of Communications Systems, Faculty of Electronics, Military University of Technology, 00-908 Warsaw, PolandIn recent years, there has been a noticeable increase in interest in the possibilities of embedding additional data in the constellation of an already existing information signal in radio technology. This solution more precisely is based on adding a low power signal (or signals) to a stronger signal (cover). As will be described in the article, this technique is used in numerous radio communication areas, such as watermarking, covert channel creation, and multiple access techniques. Typically, those areas are considered as independent research topics. Our comparison suggests that these areas are closely related. In this article, a comprehensive survey of the implementation of signal superposition is conducted with an emphasis on the similarities and differences between individual solutions. Since the nature of the signal model entails certain problems in the security area, we provide the reader with a review of the state-of-the-art research on this topic, including the PLS (physical layer security) and LPD (low probability of detection) issues.https://www.mdpi.com/1424-8220/21/8/2752steganographycovert channelphysical layer securitylow probability of detection |
spellingShingle | Krystian Grzesiak Zbigniew Piotrowski From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems Sensors steganography covert channel physical layer security low probability of detection |
title | From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems |
title_full | From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems |
title_fullStr | From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems |
title_full_unstemmed | From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems |
title_short | From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems |
title_sort | from constellation dithering to noma multiple access security in wireless systems |
topic | steganography covert channel physical layer security low probability of detection |
url | https://www.mdpi.com/1424-8220/21/8/2752 |
work_keys_str_mv | AT krystiangrzesiak fromconstellationditheringtonomamultipleaccesssecurityinwirelesssystems AT zbigniewpiotrowski fromconstellationditheringtonomamultipleaccesssecurityinwirelesssystems |