Cargando…

From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems

In recent years, there has been a noticeable increase in interest in the possibilities of embedding additional data in the constellation of an already existing information signal in radio technology. This solution more precisely is based on adding a low power signal (or signals) to a stronger signal...

Descripción completa

Detalles Bibliográficos
Autores principales: Grzesiak, Krystian, Piotrowski, Zbigniew
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8069926/
https://www.ncbi.nlm.nih.gov/pubmed/33924708
http://dx.doi.org/10.3390/s21082752
_version_ 1783683351584964608
author Grzesiak, Krystian
Piotrowski, Zbigniew
author_facet Grzesiak, Krystian
Piotrowski, Zbigniew
author_sort Grzesiak, Krystian
collection PubMed
description In recent years, there has been a noticeable increase in interest in the possibilities of embedding additional data in the constellation of an already existing information signal in radio technology. This solution more precisely is based on adding a low power signal (or signals) to a stronger signal (cover). As will be described in the article, this technique is used in numerous radio communication areas, such as watermarking, covert channel creation, and multiple access techniques. Typically, those areas are considered as independent research topics. Our comparison suggests that these areas are closely related. In this article, a comprehensive survey of the implementation of signal superposition is conducted with an emphasis on the similarities and differences between individual solutions. Since the nature of the signal model entails certain problems in the security area, we provide the reader with a review of the state-of-the-art research on this topic, including the PLS (physical layer security) and LPD (low probability of detection) issues.
format Online
Article
Text
id pubmed-8069926
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-80699262021-04-26 From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems Grzesiak, Krystian Piotrowski, Zbigniew Sensors (Basel) Article In recent years, there has been a noticeable increase in interest in the possibilities of embedding additional data in the constellation of an already existing information signal in radio technology. This solution more precisely is based on adding a low power signal (or signals) to a stronger signal (cover). As will be described in the article, this technique is used in numerous radio communication areas, such as watermarking, covert channel creation, and multiple access techniques. Typically, those areas are considered as independent research topics. Our comparison suggests that these areas are closely related. In this article, a comprehensive survey of the implementation of signal superposition is conducted with an emphasis on the similarities and differences between individual solutions. Since the nature of the signal model entails certain problems in the security area, we provide the reader with a review of the state-of-the-art research on this topic, including the PLS (physical layer security) and LPD (low probability of detection) issues. MDPI 2021-04-13 /pmc/articles/PMC8069926/ /pubmed/33924708 http://dx.doi.org/10.3390/s21082752 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Grzesiak, Krystian
Piotrowski, Zbigniew
From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems
title From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems
title_full From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems
title_fullStr From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems
title_full_unstemmed From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems
title_short From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems
title_sort from constellation dithering to noma multiple access: security in wireless systems
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8069926/
https://www.ncbi.nlm.nih.gov/pubmed/33924708
http://dx.doi.org/10.3390/s21082752
work_keys_str_mv AT grzesiakkrystian fromconstellationditheringtonomamultipleaccesssecurityinwirelesssystems
AT piotrowskizbigniew fromconstellationditheringtonomamultipleaccesssecurityinwirelesssystems