From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems

被引:2
|
作者
Grzesiak, Krystian [1 ]
Piotrowski, Zbigniew [1 ]
机构
[1] Mil Univ Technol, Fac Elect, Inst Commun Syst, PL-00908 Warsaw, Poland
关键词
steganography; covert channel; physical layer security; low probability of detection; PHYSICAL LAYER AUTHENTICATION; COVERT COMMUNICATION; INFORMATION; LIMITS;
D O I
10.3390/s21082752
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In recent years, there has been a noticeable increase in interest in the possibilities of embedding additional data in the constellation of an already existing information signal in radio technology. This solution more precisely is based on adding a low power signal (or signals) to a stronger signal (cover). As will be described in the article, this technique is used in numerous radio communication areas, such as watermarking, covert channel creation, and multiple access techniques. Typically, those areas are considered as independent research topics. Our comparison suggests that these areas are closely related. In this article, a comprehensive survey of the implementation of signal superposition is conducted with an emphasis on the similarities and differences between individual solutions. Since the nature of the signal model entails certain problems in the security area, we provide the reader with a review of the state-of-the-art research on this topic, including the PLS (physical layer security) and LPD (low probability of detection) issues.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Adaptive Constellation Multiple Access for Beyond 5G Wireless Systems
    Shakya, Indu L.
    Ali, Falah H.
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2024, 13 (05) : 1280 - 1284
  • [2] Downlink Non-Orthogonal Multiple Access (NOMA) Constellation Rotation
    Zhang, Jian
    Wang, Xin
    Hasegawa, Tsuyoshi
    Kubo, Tokuro
    [J]. 2016 IEEE 84TH VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL), 2016,
  • [3] Enhancing security of SIC algorithm on non-orthogonal multiple access (NOMA) based systems
    Satrya, G. B.
    Shin, S. Y.
    [J]. PHYSICAL COMMUNICATION, 2019, 33 : 16 - 25
  • [4] Downlink RIS-NOMA with Constellation Adjustment for 6G Wireless Communication Systems
    Baek, Ju Yeong
    Lee, Young-Seok
    Jung, Bang Chul
    [J]. 2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2024, : 1076 - 1077
  • [5] NOMA security scheme based on constellation camouflage and selective mapping
    Ma, Yiming
    Ren, Jianxin
    Liu, Bo
    Ma, Yilan
    Ullah, Rahat
    Wu, Xiangyu
    Mao, Yaya
    Chen, Shuaidong
    Wan, Yibin
    Zhong, Qing
    Xia, Wenchao
    Wu, Yongfeng
    Zhao, Lilong
    [J]. OPTICS LETTERS, 2023, 48 (15) : 4101 - 4104
  • [6] Constellation-constrained capacity for trellis code multiple access systems
    Brännström, FN
    Aulin, TM
    Rasmussen, LK
    [J]. GLOBECOM '01: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2001, : 791 - 795
  • [7] On Physical Layer Security of Multiple-Relay Assisted NOMA Systems
    Lei, Hongjiang
    Yang, Zixuan
    Park, Ki-Hong
    Ansari, Imran Shafique
    Pan, Gaofeng
    Alouini, Mohamed-Slim
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2019,
  • [8] Multiple antenna systems: Frontier of wireless access
    Del Re, E
    Pierucci, L
    [J]. EMERGING LOCATION AWARE BROADBAND WIRELESS AD HOC NETWORKS, 2005, : 57 - 70
  • [9] Multiple antenna systems: Frontier of wireless access
    Del Re, E
    Pierucci, L
    [J]. 2004 IEEE 15TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 930 - 934
  • [10] Multiuser Transmit Security Beamforming in Wireless Multiple Access Channels
    Wu, Jinsong
    Chen, Jinhui
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,