Cargando…
From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems
In recent years, there has been a noticeable increase in interest in the possibilities of embedding additional data in the constellation of an already existing information signal in radio technology. This solution more precisely is based on adding a low power signal (or signals) to a stronger signal...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8069926/ https://www.ncbi.nlm.nih.gov/pubmed/33924708 http://dx.doi.org/10.3390/s21082752 |
_version_ | 1783683351584964608 |
---|---|
author | Grzesiak, Krystian Piotrowski, Zbigniew |
author_facet | Grzesiak, Krystian Piotrowski, Zbigniew |
author_sort | Grzesiak, Krystian |
collection | PubMed |
description | In recent years, there has been a noticeable increase in interest in the possibilities of embedding additional data in the constellation of an already existing information signal in radio technology. This solution more precisely is based on adding a low power signal (or signals) to a stronger signal (cover). As will be described in the article, this technique is used in numerous radio communication areas, such as watermarking, covert channel creation, and multiple access techniques. Typically, those areas are considered as independent research topics. Our comparison suggests that these areas are closely related. In this article, a comprehensive survey of the implementation of signal superposition is conducted with an emphasis on the similarities and differences between individual solutions. Since the nature of the signal model entails certain problems in the security area, we provide the reader with a review of the state-of-the-art research on this topic, including the PLS (physical layer security) and LPD (low probability of detection) issues. |
format | Online Article Text |
id | pubmed-8069926 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-80699262021-04-26 From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems Grzesiak, Krystian Piotrowski, Zbigniew Sensors (Basel) Article In recent years, there has been a noticeable increase in interest in the possibilities of embedding additional data in the constellation of an already existing information signal in radio technology. This solution more precisely is based on adding a low power signal (or signals) to a stronger signal (cover). As will be described in the article, this technique is used in numerous radio communication areas, such as watermarking, covert channel creation, and multiple access techniques. Typically, those areas are considered as independent research topics. Our comparison suggests that these areas are closely related. In this article, a comprehensive survey of the implementation of signal superposition is conducted with an emphasis on the similarities and differences between individual solutions. Since the nature of the signal model entails certain problems in the security area, we provide the reader with a review of the state-of-the-art research on this topic, including the PLS (physical layer security) and LPD (low probability of detection) issues. MDPI 2021-04-13 /pmc/articles/PMC8069926/ /pubmed/33924708 http://dx.doi.org/10.3390/s21082752 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Grzesiak, Krystian Piotrowski, Zbigniew From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems |
title | From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems |
title_full | From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems |
title_fullStr | From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems |
title_full_unstemmed | From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems |
title_short | From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems |
title_sort | from constellation dithering to noma multiple access: security in wireless systems |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8069926/ https://www.ncbi.nlm.nih.gov/pubmed/33924708 http://dx.doi.org/10.3390/s21082752 |
work_keys_str_mv | AT grzesiakkrystian fromconstellationditheringtonomamultipleaccesssecurityinwirelesssystems AT piotrowskizbigniew fromconstellationditheringtonomamultipleaccesssecurityinwirelesssystems |