IoT Signal Detection - Rui Han
IoT Signal Detection - Rui Han
Cover
Table of Contents
Title Page
Copyright
Dedication
List of Figures
List of Algorithms
About the Authors
Foreword
Preface
Acknowledgements
Acronyms
1 Introduction
1.1 IoT in 5G
1.2 IoT Networks
1.3 Characteristics of IoT Signals
1.4 Outline
2 Background of IoT Signal Detection
2.1 Random Access
2.2 Signal Detection Methods
2.3 Conclusion and Remarks
3 Sparse Signal Detection for Multiple Access
3.1 System Model
3.2 Sparse Signal Detection
3.3 Performance Analysis
3.4 Simulation Results
3.5 Conclusion and Remarks
4 Collided Signal Detection for Multiple Access
4.1 System Model
4.2 Automatic Modulation Classification-based Detection
4.3 Performance Analysis
4.4 Simulation Results
4.5 Conclusion and Remarks
5 Multiple Delay Estimation for Collided Signals
5.1 System Model
5.2 Multiple Delay Estimation
5.3 Signal Number Estimation and Channel Estimation
5.4 Simulation Results
5.5 Conclusion and Remarks
Notes
6 Detection and Division for Backscatter Signals
6.1 System Model
6.2 Central Limit Theorem-based Signal Detection
6.3 Simulation Results
6.4 Conclusion and Remarks
7 Analysis and Optimization for NOMA Signals
7.1 System Model
7.2 Throughput and Power Consumption Analysis
7.3 Energy Efficiency Performance Optimization
7.4 Simulation Results
7.5 Conclusion and Remarks
Note
8 Signal Design for Multicluster Coordination
8.1 Multi-cluster Coordination in IoT
8.2 Multi-cluster Coordination with NOMA
8.3 CI-aided Multi-cluster Coordination with Interference
Management
8.4 Future Works
8.5 Conclusion and Remarks
9 Conclusion of the Book
References
Index
End User License Agreement
List of Tables
Chapter 4
Table 4.1 Parameters Setting.
Chapter 7
Table 7.1 Simulation Setup.
List of Illustrations
Chapter 1
Figure 1.1 Architecture of IoT.
Chapter 2
Figure 2.1 The contention-based RA.
Figure 2.2 The contention-free RA.
Figure 2.3 The grant-free RA.
Figure 2.4 The compressed sensing.
Figure 2.5 A MIMO system.
Figure 2.6 The constellation of - system with ML.
Figure 2.7 BER of ML detector in - MIMO
system.
Figure 2.8 The constellation of - system with ZF.
Figure 2.9 BER of ZF detector in - MIMO
system.
Figure 2.10 The process of MMSE detection.
Figure 2.11 The constellation of - system with MMSE.
Figure 2.12 BER of MMSE detector in - system.
Figure 2.13 Comparison between ZF detector and MCMC
detector when .
Figure 2.14 BER of MCMC detector in - MIMO
system.
Figure 2.15 BER of VI detection in MIMO system.
Figure 2.16 The process of compressive sensing.
Figure 2.17 The reconstruction residual with different observation
vector si...
Chapter 3
Figure 3.1 Structure of NGMA systems.
Figure 3.2 The tree search for the presence of (sparse) signals in a
block....
Figure 3.3 Complexity ratio: (a) as a function of with
; (b) as a functio...
Figure 3.4 -divergence and its approximation in Eq. (3.59)
when , , and
OceanofPDF.com
IEEE Press
445 Hoes Lane
Piscataway, NJ 08854
IEEE Press Editorial Board
Sarah Spurgeon, Editor-in-Chief
OceanofPDF.com
IoT Signal Detection
Rui Han
Beihang University
Jingjing Wang
Beihang University
Lin Bai
Beihang University
Jianwei Liu
Beihang University
OceanofPDF.com
Copyright © 2024 by The Institute of Electrical and Electronics Engineers, Inc. All rights reserved.
Published by John Wiley & Sons, Inc., Hoboken, New Jersey.
Published simultaneously in Canada.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any
form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise,
except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either
the prior written permission of the Publisher, or authorization through payment of the appropriate
per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923,
(978) 750-8400, fax (978) 750-4470, or on the web at www.copyright.com. Requests to the Publisher
for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111
River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at
http://www.wiley.com/go/permission.
Trademarks: Wiley and the Wiley logo are trademarks or registered trademarks of John Wiley &
Sons, Inc. and/or its affiliates in the United States and other countries and may not be used without
written permission. All other trademarks are the property of their respective owners. John Wiley &
Sons, Inc. is not associated with any product or vendor mentioned in this book.
Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts
in preparing this book, they make no representations or warranties with respect to the accuracy or
completeness of the contents of this book and specifically disclaim any implied warranties of
merchantability or fitness for a particular purpose. No warranty may be created or extended by sales
representatives or written sales materials. The advice and strategies contained herein may not be
suitable for your situation. You should consult with a professional where appropriate. Further, readers
should be aware that websites listed in this work may have changed or disappeared between when
this work was written and when it is read. Neither the publisher nor authors shall be liable for any
loss of profit or any other commercial damages, including but not limited to special, incidental,
consequential, or other damages.
For general information on our other products and services or for technical support, please contact
our Customer Care Department within the United States at (800) 762-2974, outside the United States
at (317) 572-3993 or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print
may not be available in electronic formats. For more information about Wiley products, visit our web
site at www.wiley.com.
Library of Congress Cataloging-in-Publication Data applied for:
Hardback ISBN: 9781394183081
Cover Design: Wiley
Cover Image: © Yuichiro Chino/Getty Images
OceanofPDF.com
To our families and friends
OceanofPDF.com
List of Figures
Figure 1.1 Architecture of IoT
Figure 2.1 The contention-based RA
Figure 2.2 The contention-free RA
Figure 2.3 The grant-free RA
Figure 2.4 The compressed sensing
Figure 2.5 A MIMO system
Figure 2.6 The constellation of - system with ML
Figure 2.7 BER of ML detector in - MIMO system
Figure 2.8 The constellation of - system with ZF
Figure 2.9 BER of ZF detector in - MIMO system
Figure 2.10 The process of MMSE detection
Figure 2.11 The constellation of - system with MMSE
Figure 2.12 BER of MMSE detector in - system
Figure 2.13 Comparison between ZF detector and MCMC detector
when
Figure 2.14 BER of MCMC detector in - MIMO
system
Figure 2.15 BER of VI detection in MIMO system
Figure 2.16 The process of compressive sensing
Figure 2.17 The reconstruction residual with different observation
vector sizes
Figure 3.1 Structure of NGMA systems
Figure 3.2 The tree search for the presence of (sparse) signals in a
block
Figure 3.3 Complexity ratio: (a) as a function of with ;
(b) as a function of with
Figure 3.4 -divergence and its approximation in Eq. (3.59) when
, , and : (a) as a function
of with ; (b) as a function of with
Figure 3.5 Performance of Stage 1 for various SNRs with ,
, , , and
: (a) the probabilities of FA and
MD of the CAVI algorithm as functions of ; (b) -
divergence as a function of
Figure 3.6 Performance of Stage 1 for various values of with
, , ,
, and : (a) the
probabilities of FA and MD of the CAVI algorithm as
functions of ; (b) -divergence as a function of
Figure 3.7 Performance of Stage 1 for various values of with
, , , , and
: (a) the probabilities of FA and
MD of the CAVI algorithm as functions of ; (b) -
divergence as a function of
Figure 3.8 Performance of Stage 1 for various values of with
, , ,
, and : (a) the
probabilities of FA and MD of the CAVI algorithm as
functions of ; (b) -divergence as a function of
Figure 3.9 Performance of TS approach and SS approach for various
values of with , ,
, , and
Figure 3.10 Performance of TS approach and SS approach for various
values of with , ,
, , and
Figure 3.11 Performance of TS and SS approach for various values of
with , ,
, , and
Figure 4.1 A typical uplink massive MIMO System
Figure 4.2 Flowchart for classifying Cases 1–3
Figure 4.3 Feature versus with and
Figure 4.4 Probability of correct estimation of versus
with and
Figure 4.5 Probability of resolving a two-UE collision
versus with CB, various , ,
, and
Figure 4.6 Success probability versus the total number of
UEs in the cell with CB, , ,
and
Figure 4.7 Probability of resolving a two-UE collision
versus with CB, , , and
OceanofPDF.com
List of Algorithms
Algorithm 2.1 ML Detection
Algorithm 2.2 ZF Detection
Algorithm 2.3 MMSE Detection
Algorithm 2.4 Gibbs Sampler
Algorithm 2.5 VI Detection
Algorithm 2.6 CS Detection
Algorithm 3.1 VI Detection for Sparse Signal
Algorithm 5.1 The GA-MCMC Gibbs Sampler
Algorithm 7.1 EE Oriented FD Cooperative NOMA Algorithm
OceanofPDF.com
About the Authors
Rui Han received the PhD degree in cyber security from Beihang
University, Beijing, China, in 2022. From 2022 to 2024, Dr. Han was a
research fellow at National Research Center, Tsinghua University, Beijing,
China. Her current research interests include the Internet of things (IoT),
unmanned aerial vehicle (UAV) communications, and satellite
communications.
Jingjing Wang received his BSc degree in electronic information
engineering from the Dalian University of Technology, Liaoning, China, in
2014 and the PhD degree in information and communication engineering
from the Tsinghua University, Beijing, China, in 2019, both with the highest
honors. From 2017 to 2018, he visited the next-generation wireless group
chaired by Prof. Lajos Hanzo in the University of Southampton, UK. Dr.
Wang is currently a professor at the School of Cyber Science and
Technology, Beihang University, Beijing, China. His research interests
include AI-enhanced next-generation wireless networks, UAV networking,
and swarm intelligence. He has published over 100 IEEE
Journal/Conference papers. Dr. Wang was a recipient of the Best Journal
Paper Award of IEEE ComSoc Technical Committee on Green
Communications & Computing in 2018, and the Best Paper Award of IEEE
ICC and IWCMC in 2019. He is currently serving as an editor for the IEEE
Wireless Communications Letter and the IEEE Open Journal of the
Communications Society. He has served as a guest editor for IEEE Internet
of Things Journal.
Lin Bai received the BSc degree in electronic and information engineering
from the Huazhong University of Science and Technology, Wuhan, China,
in 2004, the MSc degree (Hons.) in communication systems from the
University of Wales, Swansea, UK, in 2007, and the PhD degree in
advanced telecommunications from the School of Engineering, Swansea
University, UK, in 2010. Since 2011, he has been with Beihang University
(Beijing University of Aeronautics and Astronautics, BUAA), Beijing,
China, where he is currently a professor at the School of Cyber Science and
Technology. His research interests include the security of space-air-ground
integrated network (SAGIN), broadband wireless ad hoc network,
unmanned aerial vehicle (UAV) communications, and Internet of Things
(IoT). He has authored two books published by Springer in 2012 and 2014.
He was the Symposium Co-Chair of IEEE GLOBECOM 2019, IEEE VTC
2021, and IEEE/CIC ICCC 2024, the Tutorial Co-Chair of IEEE/CIC ICCC
2019. He is the founding chair of IEEE ComSoc Wireless Communications
Technical Committee Special Interest Group (SIG) on Space Air Ground
Integrated (SAGI) Communications. He has served as an editor for IEEE
Transactions on Signal Processing and IEEE Wireless Communications
Letters, a lead guest editor for IEEE Wireless Communications, and a guest
editor for IEEE Internet of Things Journal. He is currently serving as an
editor for IEEE Transactions on Wireless Communications and IEEE
Transactions on Mobile Computing, and the managing editor for Journal of
Communications and Information Networks. He is a distinguished lecturer
of the IEEE Communications Society and the IEEE Vehicular Technology
Society.
Jianwei Liu received the BSc and MSc degrees in electronic and
information from Shandong University, Shandong, China, in 1985 and
1988. He received the PhD degree in communication and electronic system
from Xidian University, Shaanxi, China, in 1998. Currently, he is a
professor with the School of Cyber Science and Technology, Beihang
University, Beijing, China. His research interests include wireless
communication network, cryptography, and network security.
OceanofPDF.com
Foreword
Over the past decades, Internet of Things (IoT) has been well developed to
become one of the most important technologies in the 21st century, which
aims to provide heterogeneous services for massively connected devices.
Evidently, massive connectivity in IoT causes severe access congestion, and
signal collision and signal superposition occur frequently. Therefore, signal
detection becomes crucial in IoT communication systems. This book
provides a range of key techniques to support massive IoT devices, and
various signal detection techniques are explained in the context in terms of
sparse signal detection, collided signal detection, round-trip delay
estimation, backscatter signal division, etc. It makes an easy-to-follow
presentation from the elementary to the profound level with a carefully
balanced blend of theoretical elements and applications.
My colleagues, Dr. Han, Prof. Wang, Prof. Bai, and Prof. Liu, have worked
on this topic for many years. They have made good achievements and
published a number of papers within this topic. This book provides
fundamentals of signal detection and estimation together with new results
that have been developed for IoT applications, which is ideal for both
graduate students and practicing engineers in wireless communications.
Academician Quan Yu
Chinese Academy of Engineering
Beijing
OceanofPDF.com
Preface
Machine-type communication (MTC) is expected to play a crucial role in
supporting a number of devices for Internet of Things (IoT). Due to the fact
that most IoT devices have sparse activity and low signaling overhead,
random access (RA) can be employed for MTC to provide an efficient way
to support massive IoT devices with minimized network overload.
However, there exist many problems in IoT RA, e.g., signal collision, signal
superposition. In order to face these challenges, we focus on the signal
detection for IoT in terms of sparse signal detection, collided signal
detection, round-trip delay estimation, and backscatter signal division.
Our book mainly focuses on the signal detection for RA in IoT, which
covers the fundamentals of signal detection with two chapters dedicated to
important background materials. Besides, various signal detection and
estimation techniques are explained, e.g., variational inference algorithm,
compressive sensing reconstruction algorithm, and we include a number of
recent research outcomes that are useful for those experts in this area. In
addition, the techniques are then analyzed using performance analysis tools,
and simulation results are also given to help readers to understand the
theorem and algorithm.
So far, there are many existing books related to signal detection. To be
different from those books, our book focuses on signal detection for RA in
IoT systems. Although our book is very specific, we have adopted an easy-
to-follow presentation from the elementary to the profound level. We
include a number of recent research outcomes that are useful for those
experts in this area, where the methods of signal detection have low
complexity and are suitable for IoT massive access scenarios. Meanwhile,
signal processing approaches to detect the event of collision or to estimate
the arrival time of multiple signals are also considered in this book.
Besides, our book includes more illustrations of the signal detection results
to help readers to understand the theorem and algorithm.
Our group has worked on the design of signal detection for many years and
has produced various new research outcomes on IoT signal detection. In
this book, the fundamentals of signal detection are covered, which is ideal
for both graduate students and practicing engineers in wireless
communications. In addition, this book includes not only our research
outcomes but also other recent research outcomes that could be very useful
to practitioners and postgraduate students who want to learn new outcomes
of IoT signal detection in the field of signal processing.
Beijing Rui Han
October 2024 Jingjing Wang
Lin Bai
Jianwei Liu
OceanofPDF.com
Acknowledgements
We would like to thank many people for supporting this work, in particular:
Q. Yu (Chinese Academy of Engineering), J. Choi (Deakin University), W.
Zhang (University of New South Wales). They helped us by providing
valuable comments and useful discussions.
Special thanks go to those people who inspire and encourage us all the time:
J. Lu (Tsinghua University) for guidance and encouragement, C. Jiang
(Tsinghua University) for generous support, J. Wang for long-term
friendship, and many others including our students, J. Ma, Q. Zeng, Y.
Shan, Y. Yu, M. Liu, C. Liu, Y. Li, Y. Wang, for careful proofreading.
Then, we want to express our appreciation to our parents, families, and
friends. Without their support, we can barely make the achievement.
Finally, we deeply thank Editor B. Kurzman and S. Indirakumari, who were
always there with us, for their wonderful help during the completion of the
book.
OceanofPDF.com
Acronyms
ACB access class barring
AMC automatic modulation classification
AMP approximate message passing
AWGN additive white Gaussian noise
BER bit error rate
BP basis pursuit
BPSK binary phase shift keying
CAVI coordinate ascent variational inference
CB conjugate beamforming
CDMA code division multiple access
CLT Central Limit Theorem
CS compressive sensing
CSCG circular symmetric complex Gaussian
CSI channel state information
DA device association
EAB extended access barring
FBMC filter bank multicarrier
FD full-duplex
FJT fully-coordinated joint transmission
F-OFDM filter-based orthogonal frequency division multiplexing
FPC fractional power control
GA Genetic Algorithm
GLRT generalized likelihood ratio test
HD half-duplex
HOC high-order cumulant
IA interference alignment
ISI inter-symbol interference
LASSO least absolute shrinkage and selection operator
LDPC low-density parity check
MAP maximum a posteriori
MCMC Markov chain Monte Carlo
MIMO multiple-input multiple-output
ML maximum likelihood
MMSE minimum mean square error
NFV network function virtualization
NOMA non-orthogonal multiple access
OFDM orthogonal frequency division multiplexing
OMP orthogonal matching pursuit
OOK on–off keying
PA power amplifier
PBF partially-coordinated beamforming
pdf probability density function
PEP pairwise error probability
QAM quadrature amplitude modulation
QPSK quadrature phase shift keying
SER symbol error rate
SIC successive interference cancellation
SINR signal-to-interference-plus-noise ratio
SNR signal-to-noise ratio
SM spatial modulation
SORTE second-order statistic of the eigenvalues
VI variational inference
ZF zero forcing
ZFB zero-forcing beamforming
4G fourth generation
5G fifth generation
OceanofPDF.com
1
Introduction
In the present era, as Internet applications continue to evolve, studies
on Internet of Things (IoT) have represented a growing field. This is
particularly driven by the advancements in the latest generation of
information technology, which leads to various innovative paradigms
such as smart agriculture, smart health, and smart logistics. As a result,
the concept of intelligent interconnectivity between all objects has
become a reality. This has led to a profound transformation in the way
people live, work, and travel, ushering in a new era of possibilities.
1.1 IoT in 5G
1.1.1 What Is IoT
IoT refers to the technique of using various devices, such as radio frequency
identification (RFID), sensors to collect necessary information of things or
progresses, then transmitting the collected data through the network, to
achieve the ubiquitous connection between objects and people, objects and
objects [1].
The concept of IoT was initially proposed by the Massachusetts Institute of
Technology in 1999 [2]. At its early stages, IoT referred to the network
created by the RFID technology and equipment. By incorporating the
Internet and adhering to agreed-upon communication protocols, this
network facilitated intelligent identification and management of product
information, enabling seamless interconnectivity [3].
However, with ongoing technological advancements and application
development, the scope of IoT has been broadened. In its modern aspect,
IoT encompasses the integration of perception, identification, and control of
interconnected objects. This integration, combined with networking and
intelligent processing capabilities, enables the formation of highly
intelligent decision-making systems [4].
As outlined in the White Paper on IoT published by the China Academy of
Information and Communications Technology (CAICT) [5], IoT represents
an expansive application and network extension of existing communication
networks and the Internet. Through the utilization of perceptual technology
and intelligent devices, IoT enables the perception and identification of the
physical world. By leveraging network transmission and interconnectivity,
IoT facilitates computation, processing, and knowledge mining. As a result,
it enables seamless interaction and connectivity between individuals and
objects, as well as between objects themselves. This, therefore, enables real-
time control, precise management, and informed decision-making
processes.
Regarding the fifth generation (5G) of wireless technology, advancements
of IoT primarily stem from innovations in wireless and network
technologies [6]. Within the field of wireless technology, the industry has
placed particular emphasis on large-scale antenna arrays, ultra-dense
networking, innovative multiple access techniques, and full spectrum
access. Network technology has also witnessed significant progress, with
the widespread recognition of a new network architecture based on
software-defined networking (SDN) and network function virtualization
(NFV) [7].
Furthermore, several key technologies have been exploited as important and
promising contributors to 5G, including filter-based orthogonal frequency
division multiplexing (F-OFDM), filter bank multicarrier (FBMC), full
duplex and flexible duplex, multivariate low-density parity check (LDPC)
codes, network coding, and polarization codes.
From a network architecture perspective, 5G inherits the overall
characteristics of the fourth generation (4G), encompassing access
networks, core networks, and upper-layer applications. However, to
accommodate the diverse requirements of IoT, 5G has introduced new key
technologies in both the core network and access network domains,
bringing on technological innovations and network advancements.
1.4 Outline
The remaining themed chapters of this book are introduced as follows:
Chapter 2 considers the background of IoT detection, including RA and
some signal detection methods. Among them, RA is divided into two types
of introductions, namely grant-based and grant-free, which are
distinguished by whether to obtain the reserved channel information. Some
traditional signal detection methods, such as maximum likelihood (ML),
zero forcing (ZF), etc., are also mentioned. Other signal detection
algorithms in use, such as variational inference (VI) detection, Markov
Chain Monte Carlo (MCMC) detection, etc., are described in detail.
Chapter 3 is concerned with the sparse signal detection for multiple access,
with specific technologies like VI detection and compressive sensing (CS)
detection. In this chapter, the algorithm of VI detection is firstly introduced
with corresponding analysis of its performance. Then, the theory of CS
detection is discussed, including Bayesian CS algorithm and structured
subspace pursuit algorithm with the simulation results of them.
In Chapter 4, collided signal detection for multiple access is introduced.
With the displayed system model, we analyze the theory of automatic
modulation classification-based detection through the simulation results.
Accordingly, the simulation results of collided signal detection for multiple
access are offered.
Chapter 5 analyses the round-trip delay estimation for collided signals with
ML detection, VI detection, and MCMC detection. Firstly, the system
model of the round-trip delay estimation for collided signals is preformed.
Then, the ML detection is described and we compare it with the VI
detection and MCMC detection. Finally, the simulation results of all these
detection algorithms are brought together to show their detection
performance.
Chapter 6 presents the signal detection for backscatter signal. After giving
the explanation of the system model of backscatter signal, we describe the
algorithm of the central limit theorem-based detection and analyze its
performance by comparing its simulation results with the ML detection.
Chapter 7 firstly explains the concept of non-orthogonal multiple access
(NOMA) and adopts the technique of NOMA in IoT systems. Then, this
chapter focuses on throughput and power consumption of NOMA systems.
Finally, the puzzle of energy efficiency maximization of a full-duplex
cooperative NOMA system is investigated.
The purpose of Chapter 8 is to present the signal design for multi-cluster
coordination, including multi-cluster coordination with NOMA,
constructive interference-aided multi-cluster coordination, and performance
analysis. Then, discussions about successive interference cancellation
design, device grouping, and power control to achieve multi-cluster
coordination with NOMA are included.
In the end, Chapter 9 gives a brief conclusion for this book.
OceanofPDF.com
2
Background of IoT Signal Detection
The aim of this chapter is to introduce random access (RA) in Internet
of Things (IoT) systems. Then, we present several well-known
detection approaches, including the maximum likelihood (ML), linear,
variational inference (VI), Markov chain Monte Carlo (MCMC), and
compressive sensing (CS) detectors.
To solve the above problems, there have been a number of studies involving
the methods of collision resolution in RA protocol, e.g., backoff
mechanism, access class barring, time slot access mechanism, priority
access mechanism, and other mechanisms, etc [17]. The access class
barring mechanism and the backoff mechanism are two common congestion
control strategies, which are introduced as follows:
(2.1)
where denotes the noise in the transmission process of the
observation signal. If the measurement matrix satisfies the criteria
of restricted isometry property (RIP), the receiver can accurately
reconstruct the sparse signal based on the signal , which is
shown in Fig. 2.4.
In general, the complexity of the massive grant-free RA is
proportional to the total number of devices. Therefore, although the
above-mentioned grant-free RA based on compressed sensing can
reduce the signaling overhead in IoT, the high computational
complexity of these algorithms is still an urgent problem to be solved.
2. Grant-free random access algorithm based on statistics: In general,
the number of allowed activated devices is proportional to the
quadratic of the preamble length, which severely limits the number of
activated devices that can be held in the system. If the BS is equipped
with large-scale antennas, it is of great research value to design grant-
free RA based on the covariance matrix of received signals. However,
large antenna arrays lead to high array dimension and hardware cost,
and centralized processing of massive array signals may become
impractical. Thus, distributed multiple-input multiple-output (MIMO)
maybe a feasible method to support large-scale RA in the future [19].
In this book, we mainly focus on the signal detection for IoT systems,
where some traditional signal detection methods will be introduced first.
2.2 Signal Detection Methods
In this section, we first introduce the system model of IoT communications.
Then, we talk about the fundamental signal detection methods, which are
ML detection, zero forcing (ZF) detection, minimum mean square error
(MMSE) detection, and the modern signal detection methods, such as
MCMC detection, VI detection, and CS detection. These methods focus on
the detection of a group of signals, i.e., the signal vector, instead of a single
signal.
(2.2)
where is a vector of dimensions, which represents the received signal;
is a vector of dimensions, which represents the signal to be detected;
is a channel matrix, and denotes the noise
vector with dimensions.
(2.3)
(2.4)
(2.6)
(2.7)
(2.8)
where denotes the Frobenius norm. Then, the PEP can be expressed
by the -function [21] as
(2.10)
(2.11)
where , and
(2.12)
According to the Chernoff boundary, the average PEP’s upper bound can be
given by
(2.13)
Let
(2.15)
2.2.3 ZF Detection
ZF detection is one of the linear detection methods. The signal received by
a linear detector is filtered by a well-designed matrix which enables the
transmitted multiple signals to be detected separately without involving
interference. The main idea of ZF detection can be summarized as using
linear transformation to reduce the mutual interference between diverse
antennas, to obtain useful signals, where the estimator matrix can be
expressed as
(2.16)
Thus, the covariance matrix of the estimated error of the transmit signal is
(2.18)
(2.19)
(2.20)
(2.21)
hard judgment. Therefore, this shows that ZF detection can correctly detect
signal.
Besides, the covariance matrix of the estimated error of the transmit signal
is
(2.22)
from which we can see that the estimated error of the transmit signal is
small.
To give a more generalized scenario, Fig. 2.8 reveals the constellation
diagram of the estimated signal obtained by ZF detection in a 64-QAM
communication system with the same response matrix. It is apparent from
this figure that ZF detection can correctly detect signal.
Figure 2.8 The constellation of - system with ZF.
Figure 2.9 BER of ZF detector in - MIMO system.
In order to numerically analyze the performance of ZF detector, we will
simulate this detection method. Figure 2.9 shows the BER of ZF detector in
4-QAM 2 2 MIMO system. There is a clear trend in Fig. 2.9 that the
BER of ZF detector drops from 0.3671 to , when SNR
increasing from 0 to 20 dB.
(2.23)
(2.24)
The covariance matrix of the estimated error of the transmit signal can be
given by
(2.25)
(2.26)
(2.28)
by hard judgment.
For a more generalized scenario, Fig. 2.11 presents the constellation
diagram of the estimated signal obtained by MMSE detection in a 64-QAM
communication system with the same response matrix. Therefore, it can be
proved that MMSE detection can correctly detect signal.
Figure 2.11 The constellation of - system with MMSE.
Figure 2.12 BER of MMSE detector in - system.
To conduct a numerical analysis of the MMSE detector’s performance, the
simulation of this detection method is provided. In Fig. 2.12, we show the
BER of MMSE detector in 4-QAM 2 2 MIMO system with SNR from 0
to 20 dB. This figure illustrates that as SNR increases, the BER of MMSE
detector decreases. When SNR reaches around 18 dB, the BER is
approximately constant with the increased SNR. This result highlights that
the performance of MMSE detector can be enhanced by increasing SNR.
However, the performance is approximately stable when SNR reaches a
specific value.
(2.29)
where , denote the channel matrix
and the transmitted signal vector, respectively, and
represents the noise vector.
The detection algorithm based on MCMC obtains the list of transmitted
sequences by statistical sampling method, and estimates the posterior
probability of each encoded bit based on statistical principle [22]. Since the
performance of MCMC detection is determined by the number of samples
and independent of the dimension of the random variable to be estimated, it
can effectively solve the problem that the algorithm complexity increases
exponentially with the number of transmit antennas and modulation orders.
The MCMC algorithm was first applied to physics by Metropolis in 1950
[23]. Its main idea is to obtain a sample of the desired distribution by
means of the Markov chain. By choosing the appropriate transfer kernel, the
sampling value of the Markov chain with any initial distribution can
approach to the expected distribution after enough sampling times.
In MIMO systems, each transmitted symbol sequence is defined as a
state of the Markov chain. Since the number of states of the Markov chain
increases exponentially with the dimension of in MIMO systems, Gibbs
Sampler is applied to reduce the sampling complexity, which is one of the
most practical MCMC sampling methods [24]. Let denote the prior
probability of , represents the variable at the th iteration. The
transfer kernel is obtained as
(2.30)
(2.32)
(2.33)
(2.34)
where . According to
the posterior probability of each symbol, the posterior probability of each
coded bit can be computed as
(2.35)
(2.36)
(2.37)
(2.38)
(2.40)
(2.41)
(2.42)
With the maximum ELBO and the minimum KL divergence, the variational
distribution of s can fix the original distribution with less error.
The specific steps of VI detection are shown in Algorithm 2.5.
Example 2.5 Consider a MIMO system and the channel is an
additive white Gaussian noise (AWGN) channel. Let be the transmit
signal vector with , where and represent the transmitted
binary bit, i.e., 0 or 1, of the first and the second transmit antenna,
respectively. The channel matrix is generated using random complex
Gaussian distribution and the noise vector is assumed to be
. The probability that is
. The symbol energy is set to 2.
(2.44)
Here, the observation matrix is a flat matrix of dimension and
is a column observation vector of length . The matrix of
dimension is called the sensing matrix, where the sensing matrix
computes a sparse vector of length to an observation vector of
length . Since , it maps the signal from high-dimensional space
to low-dimensional space. To losslessly reconstruct or from , must
contain all useful information.
It is also pointed out that the sensing matrix should satisfy the RIP to
ensure that the CS algorithm can accurately reconstruct the original sparse
signal. The RIP criterion states that, for any sparse signal , if there
exists a constant such that the sensing matrix can satisfy
(2.45)
then the sensing matrix is said to satisfy the RIP property, and is
called the constrained isometry constant. The RIP criterion ensures that the
mapping has uniqueness. That is, the sensing matrix will not map
various sparse signals into the same observation vector. Most uniformly
distributed random matrices can satisfy the RIP property well. Common
sensing matrices include Bernoulli random matrices, partial Fourier
matrices, independent and equally distributed Gaussian random matrices,
Rademacher matrices, and partial Hadamard matrices. Generally, a
necessary condition for CS to guarantee the uniqueness of the
reconstruction is that any columns of the sensing matrix are linearly
independent.
The last step is the signal reconstruction. If the sensing matrix satisfies
certain conditions, then the compressed low-dimensional vector can
reconstruct the original high-dimensional signal. The process of solving the
original high-dimensional signal is called the signal reconstruction. When
the signal is sparsely expressed, since the orthogonal basis matrix is
known, the reconstruction of the original signal and the sparse vector
are equivalent. Equation (2.44) is a linear equation and solving the
unknown vector from the linear equation is originally a linear regression
problem. However, because , Eq. (2.44) is an underdetermined
equation. Since CS restricts the sparsity of the vector , the multi-solution
problem is further limited and the CS algorithm can use the sparsest
solution to estimate the original signal, so that Eq. (2.44) is eventually
evolved into solving the optimization problem with sparse constraints as
(2.46)
OceanofPDF.com
3
Sparse Signal Detection for Multiple Access
As the number of Internet of Things (IoT) devices grows explosively
in wireless networks, the next generation multiple access (NGMA)
schemes are considered to support massive access for a large number
of devices. Since multiple-input multiple-output (MIMO) has become
one of the essential techniques for providing a sufficient degree of
spatial freedom and improving the spectral efficiency, there have been
various transmission schemes over MIMO channels to achieve the
tradeoff between diversity and multiplexing gains, in which spatial
modulation (SM) [28] is a newly proposed technique to select among
multiple transmit antennas to obtain high data rates by introducing
spatial domain. Considering that the signal vector of SM systems
contains a number of zero elements, the information vector being
transmitted becomes sparse. Thus, compressive sensing (CS)
reconstruction algorithms [29] can be applied to SM systems to detect
sparse signals, which enable the reconstruction of compressible or
sparse signals. In this chapter, we introduce some sparse signal
detection approaches for multiple access of IoT devices [30].
(3.1)
where is an matrix, is the signal to be detected,
and is the background noise vector. Let
, where is a discrete random variable. Here,
is the signal constellation. Denote by the a priori probability of
and assume that the ’s are independent with each other. Denote by
the likelihood function of . To estimate , we consider either
the maximum likelihood (ML) or maximum a posteriori probability (MAP)
problem as
(3.2)
Then, we consider a special case with TSs with details. We assume that
columns are divided into groups and the aggregated signal for group
becomes
(3.3)
where is the index set of the columns for group . For convenience, let
for all , where is a positive integer. It is assumed
that and , . In order to
detect the activity of group , we define the activity variable of group
as
(3.4)
(3.5)
(3.6)
(3.7)
(3.9)
(3.10)
(3.11)
In the first stage, with Eq. (3.11), we decide active and inactive groups
with the activity variables, .
In the second stage, the signals associated with inactive groups are
removed, and the sparse signal detection is carried out with the signals
belonging to active groups.
Thus, the computational complexity of the second stage can be lower if
there are more inactive groups.
(3.12)
where . In addition, we have two hypotheses:
for and for . For each hypothesis, under the Gaussian
approximation in Eq. (3.11) or (3.12), it can be shown that
(3.13)
(3.14)
where
(3.15)
(3.16)
(3.18)
(3.19)
(3.20)
Let . The CAVI algorithm [25, 43] is to update
one variational distribution at a time with the other variational distribution
fixed in each iteration, which can be shown as
(3.21)
Since the last two terms are independent of , it can be shown that
(3.23)
and
(3.24)
(3.25)
and then,
(3.26)
(3.28)
Then, using the matrix inversion lemma [44], we can show that
(3.29)
where , , and
(3.31)
(3.32)
(3.33)
where denotes the complexity of CS algorithm (referred as Stage 2) per
group and signal.
Because the average number of inactive groups (associated with )
is given by
(3.34)
(3.35)
(3.36)
(3.37)
Under , define
(3.38)
Then, after some manipulations, the test statistic in Eq. (3.14) is re-written
as
(3.39)
where
(3.40)
As a result, the test statistic can also be expressed (in terms of the
distribution) as
(3.42)
(3.43)
We can find the probabilities of missed detection (MD) and false alarm
(FA) in Stage 1 for a given threshold using the distributions from the
characteristic functions in Eq. (3.41).
For an alternative performance measure that is independent of , the -
divergence [42] can be used, which is a measure of the distance between the
distributions associated with and . From Eq. (3.41), the -
divergence is given by
(3.44)
that
(3.45)
(3.46)
(3.48)
(3.49)
(3.50)
(3.52)
and
(3.53)
(3.54)
(3.55)
(3.56)
where
(3.57)
(3.58)
(3.59)
where .
(3.60)
Then, substituting Eq. (3.56) into Eq. (3.60), Eq. (3.59) can be obtained,
which completes the proof.
After some manipulations, we can see that is convex in (and
decreases with ). Thus, thanks to Jensen’s inequality, we can also have
(3.61)
where
(3.62)
(3.63)
and
(3.64)
(3.65)
OceanofPDF.com
4
Collided Signal Detection for Multiple Access
To communicate with a base stations (BS), an Internet of Things (IoT)
device must initiate an random access (RA) procedure via sending a
preamble that is randomly selected from a predefined set through a
shared physical random access channel (PRACH) [47, 48]. For
massive access, the case that multiple IoT devices choose the same
preamble namely preamble collision can occur frequently, while the
data packet from the device experiencing collision may not be
successfully decoded at the BS. Therefore, overcoming congestion and
overload of PRACH is highly desirable, especially for massive
connectivity to support machine-type communication (MTC)
communications. In this chapter, we introduce collided signal detection
approaches for massive access-based grant-free RA. Based on the
channel hardening and favorable propagation characteristics of
massive multiple-input multiple-output (MIMO), collided signals
processed at the BS can be viewed as a variation of superposition
modulation, and are to be recovered by successive interference
cancellation (SIC) techniques [49].
(4.1)
(4.3)
(4.4)
(4.5)
(4.6)
(4.7)
where denotes the index set of the active UEs that choose the th
preamble.
Obviously, if is used for channel estimation, we have three different
cases as follows:
Case 1: . In this case, is a noise vector given by
and the BS detects no active UEs that choose .
(4.8)
Specifically, the beamforming vector of conjugate beamforming (CB) is
and the beamforming vector of zero-forcing beamforming (ZFB)
is the th row of the matrix , where is the channel
estimation matrix defined as [56,
57]. Here, denotes the number of preambles totally picked by the
co-channel UEs.
(4.10)
When the required probability of false alarm is predetermined, the
threshold can be set as
(4.11)
(4.12)
(4.13)
where is the index set of the UEs that select the th preamble. Due to
the orthogonality property of the MMSE estimate, decomposition of the
channel vector can be generated as , where
represents the uncorrelated estimation error following the distribution [52]
(4.14)
(4.15)
(4.17)
(4.19)
(4.20)
where is the index set of active UEs that experience preamble collisions.
In general, the number of the active UEs that experience preamble
collisions, i.e., , could be small if .
Using the eigendecomposition of , can be estimated. Then the
existence of three-UE collisions can be generally discovered if
holds, where can be determined in the collision
recognition phase. In addition, using an appropriate SIC approach that is
applied to , it is able to recover the signals transmitted from the active
UEs that experience preamble collisions.
Here, we adopt the eigenvalue gap measure-based second-order statistic of
the eigenvalues (SORTE) approach to determine the number of colliding
UEs [62]. Computed from , the matrix of eigenvalues is given by
(4.22)
(4.23)
where , and
(4.24)
where denotes the number of other co-channel UEs that select the same
preamble with the first UE and represents the probability that the
data transmission for the first UE is successful. Note that in the special case
of two-UE collision, the probability reduces to
(4.26)
(4.27)
(4.29)
(4.31)
(4.32)
, and
(4.34)
where
. Conditioning on , , and ,
can be rewritten as
(4.36)
(4.37)
(4.38)
respectively.
Similar to that in Eq. (4.36), the probability
can be modified as
, where
. Then,
is equivalent to
. Conditioning on ,
(4.40)
(4.41)
(4.42)
(4.43)
(4.44)
(4.46)
(4.47)
(4.48)
(4.49)
where ,
, and
(4.50)
(4.52)
(4.53)
(4.54)
respectively, where
OceanofPDF.com
5
Multiple Delay Estimation for Collided
Signals
In machine-type communication (MTC), active devices randomly
choose resource blocks (RB) and access to an access point (AP) [65,
66]. The arrival times of multiple signals can be different as devices
are randomly located in a cell. Although multiple devices may choose
the same RB, their signals can be detected by taking into account the
difference between the arrival times of multiple signals, which is
called non-orthogonal random access (NORA) [67]. NORA utilizes the
different arrival times to identify multiple devices with the identical
preamble, while the successive interference cancellation (SIC) can be
employed to decode multiple signals when they coexist in the same RB
[68–70]. Thus, the detection of the event of collision via the estimation
of round-trip delay (RTD) in NORA becomes important. In this
chapter, we introduce different approaches to estimate of RTD of
multiple signals and determine the number of multiple signals [71, 72].
where . For example, if the cell radius is 1 km, the maximum RTD
becomes 6.67 s. If the maximum delay spread is 5 s (which is a value
according to the extended typical urban (ETU) model in [73]) and
s (for a bandwidth of 1 MHz), becomes 12.
Next, we consider the detection of collision based on RTD estimation, we
mainly focus on one RB for RA, saying RB 1. In addition, considering the
transmission efficiency, we assume that . Suppose that there are
active devices that choose RB 1. For , within the RB, the
interference is inevitable and we have NORA among active devices.
Denote by the RTD of active device (or the arrival time of the
transmitted signal by active device ) in the discrete time, i.e., after
sampling, where . Here, is quantized in time1
and is the maximum RTD in the discrete time. In addition,
denotes the maximum tap number of active device ’s CIR due to delay
spread in the discrete time, and assume that
In Fig. 5.1, we consider a scenario of an AP and multiple devices in an RA
system. For example, MTC devices for the industrial manufacturing
monitoring can be considered. Suppose that there are two active devices.
The effective CIRs with different RTDs are illustrated.
Let denote the pilot sequence of length transmitted
by a device to allow the AP to estimate its CSI. Suppose that the AP has
receive antennas. Then, the received signal at the AP (through RB 1)
through the th antenna in the frequency-domain after removing CP
becomes
(5.1)
(5.2)
(5.3)
(5.4)
(5.5)
(5.7)
where is the normalization constant. From Eq. (5.5), we can see that
is determined by . In addition, according to A1 and A2, we
have
(5.9)
(5.10)
where
(5.12)
(5.13)
In addition, define
(5.14)
(5.15)
(5.17)
(5.18)
(5.19)
(5.21)
where the expectation is carried out over . Let
. Then, for given , it can be
shown that
(5.22)
(5.23)
(5.24)
Thus, for the CAVI algorithm, we need to find a closed-form expression for
. To this end, we can find an expression of
as follows.
Lemma 5.2 Suppose that the ’s are constant-modulus signals, i.e.,
is same for all . Let , . In
addition, we define
(5.25)
(5.26)
where
(5.27)
(5.28)
where the constant term is the term that does not depend on .
Using the matrix inversion lemma, it can be shown that
(5.30)
where
(5.31)
Substituting Eq. (5.32) into Eq. (5.30), and then into Eq. (5.28), we have
(5.33)
(5.35)
Thus, an approximation of the term on the RHS in Eq. (5.22) can be found
and the CAVI algorithm can be carried out with the updating rule as
(5.37)
(5.38)
where
(5.39)
Here,
(5.40)
(5.41)
Based on the ML estimation, we use the Markov chain Monte Carlo
(MCMC) algorithm to find an approximate solution by obtaining samples
of from the target distribution [76, 77].
We use the Gibbs sampler [78] and the sampling operation can be carried
out recursively as [71]
(5.42)
(5.44)
(5.47)
(5.48)
(5.49)
Thus, from Eq. (5.48), this SNR is normalized for the device of the
maximum RTD, i.e., . We consider a random initialization for the
CAVI algorithm where is randomly chosen from .
Prior to presenting the main simulation results, we compare the
performance of the CAVI algorithm with that of the conventional method in
[74]. We consider the case of with , , , and
SNR dB. Furthermore, we assume that the RTDs are fixed as
and so that there is no CIR overlapping. For the CAVI
algorithm, we have . For the correlator-based detector
[74], we choose the largest elements of to estimate RTDs.
In particular, we obtain the estimates of RTDs of the correlator-based
detector as
(5.50)
Figure 5.5 Performance of the CAVI algorithm and the ML approach for
different values of when , , , ,
, and .
is shown for the case of no CIR overlapping when , ,
, and . The normalized MSEs of the channel
estimate as functions of the number of multipaths, , SNR, and the
number of antennas, . In general, we can see that the channel estimation
can be reliably performed as the normalized MSE is close to with
moderate SNRs (e.g., greater than or equal to 10 dB). As expected, the
normalized MSE of channel estimate decreases with SNR, , and .
As mentioned earlier, we have considered the RTD estimation to determine
the number of active devices or signals, . Based on the MDL criterion in
Eq. (5.47), simulations are carried out to find the conditional probability of
correct estimation of for given , i.e., , for
different values of SNR when , , , and .
The CAVI algorithm is used with to obtain the
estimates of RTDs with 4 possible values of , i.e., .
From the simulation results presented in Fig. 5.9, we can see that can be
reliably estimated when , i.e., there is no active device, as a
reference, for a wide range of SNR. However, as increases, the
conditional probability of correct estimation of decreases, because the
event of CIR overlapping becomes more frequent as increases. In
addition, we observe that for a larger , a higher SNR is required to
successfully estimate with a high probability. It is noteworthy that in
practice, since the number of active devices per RB might be small with a
high probability,3 it is desirable to have a high (conditional) probability of
correct estimation of when is small [67]. From this perspective, we
can see that the results in Fig. 5.9 can be reasonable because the average
probability of an accurate estimate of can be high.
Figure 5.6 Performance of the CAVI algorithm and the ML approach for
different numbers of multipaths, , when , , ,
, , and .
Figure 5.10 (a) shows the conditional probabilities of correct estimation of
for given as functions of the number of multipaths,
, when , , dB, , and
. While the conditional probability of correct
estimation of decreases with as mentioned earlier, we can observe
that the conditional probability of correct estimation of decreases with
. Since the probability of the event of CIR overlapping increases with
for a fixed , it is more difficult to correctly decide RTDs, which leads
to the increase in the conditional probability of correct estimation of
with . To overcome this problem, we can increase the length of CP,
which can effectively decrease the probability of the event of CIR
overlapping for a fixed , at the cost of more bandwidth, i.e., with more
subcarriers. We can confirm the performance improvement by increasing
in Fig. 5.10 (b).
Figure 5.7 Performance of the CAVI algorithm and the ML approach for
different numbers of antennas, , when , , ,
, , and .
(5.53)
where ,
, and , represent the th element of , ,
respectively. For the second case, let denote the set of with
and denote the number of elements in the intersection (
), then we have
Figure 5.10 Conditional probabilities of correct estimation of for given
when , , , and
: (a) as functions of the number of multipaths, ,
when ; (b) as functions of the length of CP, , when .
(5.54)
(5.55)
Figure 5.11 shows of the three methods with iterations. It is shown that
of GA-MCMC for the case of large inter-arrival time difference first
increases dramatically and then becomes saturated as the number of
samples increases. It also indicates that GA-MCMC has a higher than
MCMC, which provides the near ML performance.
The impact of the number of mutations on is shown in Fig. 5.12. It
can be observed that of GA-MCMC for the case of large inter-arrival
time difference approaches that of ML as increases. It shows that by
carrying out the mutation operations, GA-MCMC is able to find a global
optimal solution with high probability.
Figure 5.13 shows the comparison of obtained from analytical results
and numerical results. It is shown that the analytical results match well with
the numerical ones. It can be shown that increases with SNR in general.
In particular, approaches 1 in GA-MCMC and ML for large inter-arrival
time difference. Therefore, the GA-MCMC method can improve the
performance, especially under the condition of large inter-arrival time
difference, i.e., no CIR overlapping.
Figure 5.11 with numbers of samples under , ,
, , and .
Figure 5.12 with numbers of mutations under , ,
, , and .
Figure 5.13 with under , , , ,
and .
Notes
1 For example, is given by , where is the actual RTD of
device .
OceanofPDF.com
6
Detection and Division for Backscatter
Signals
In machine-type communication (MTC), there might be power-limited
or battery-free devices (namely parasite devices) such as radio
frequency identification (RFID) tags, which can use backscatter
communications to transmit their data through harvesting and
reflecting the energy of radio frequency sources (namely host devices).
Two types of backscatter communication techniques are most widely
applied in MTC systems, which are the bistatic backscatter
communication system (BBCS) and the ambient backscatter
communication system (ABCS). Since radio frequency sources of
BBCS are dedicated carrier emitters, e.g., power beacons, the cost can
be relatively high. While ABCS uses the already-available radio
frequency (RF) sources for backscatter communications, it can reduce
costs and improve spectrum efficiency as no dedicated energy supply
is deployed in the system. However, the unpredictability and dynamics
of the ambient signal make it a direct interference to the receiver,
enabling the detection of signals to play a pivotal role in the ABCS. In
this chapter, we introduce an approach to detect the presence of
parasite devices and separate parasite signals from host signals [83].
(6.1)
Here, denotes the th preamble, which is an orthonormal
sequence of length . Thus, we assume that . After sending a
preamble, the host device sends its data packet in the phase of data
transmission. For convenience, we assume that devices are
synchronized and data packets of host devices have the same length.
In the phase of preamble transmission, the signal received at the BS
can be given by
(6.2)
(6.3)
where denotes the data packet from the th host device and
denotes the background noise at the th
antenna in the th data symbol duration. Throughout the paper, we
consider the following assumptions.
A1) As in [96], is decided to be inversely proportional to the
distance between the BS and the th active host device via
power control so that
(6.4)
(6.5)
where is the distance between the host device and the BS,
is the reference channel gain, and is the path-loss
exponent.
A2) A symmetric signal constellation is used for modulation. As a
result, we have and , i.e., the symbol
energy is normalized.
Then, the BS can use the correlator to estimate the channel vector,
which is shown as
(6.6)
(6.7)
where .
In order to decode the data packet from the th active host device,
conjugate beamforming can be applied and the output of the
beamformer can be given by
(6.8)
(6.9)
(6.10)
where is the distance between the parasite device and the BS.
Note that the BS does not know whether or not the th host device’s
signal is used as an ambient signal for its parasite device. Thus, is
unknown to the BS.
The channel estimate for the device that uses the th preamble is
given by
(6.11)
It is assumed that when a host device helps its parasite devices, it transmits
a void signal, which is fixed and known to the BS. In particular, let the void
signal be an unmodulated signal, which is . With parasite
devices, the received signal during the data transmission phase is re-written
as
(6.12)
where
(6.13)
Here, represents the data block transmitted from the parasite device
corresponding to the th host device. For backscatter communications, on–
off keying (OOK) is used by parasite devices and we have
in this case. It is also assumed that is independent and
(6.14)
A parasite device can send its data to the associated host device so that
the host device can forward the data as a relay node to the BS.
However, in terms of data privacy, this approach may not be desirable,
since the information of the parasite device is known to its host device.
Furthermore, in backscatter communications, it is not necessary to use
a relay protocol between parasite devices and host devices, as the
parasite node sends its data directly to the BS.
(6.15)
where
(6.16)
(6.17)
(6.18a)
(6.18b)
(6.19)
where and
(6.20)
(6.21)
where and
(6.22)
Then, the generalized likelihood ratio test (GLRT) can be carried out
using the test statistic as
(6.23)
(6.24)
(6.25)
(6.26)
where .
Under , the statistical expectation and variance of can be
given by
(6.27)
and
(6.28)
(6.29)
where
(6.30)
by
(6.32)
Since not all the variables are independent and identically distributed
to , we consider the distribution of each variable. Then, can
be written as
(6.33)
(6.34)
and
(6.35)
where
(6.37)
and
(6.38)
(6.39)
where
(6.40a)
(6.40b)
6.2.2 Signal Detection Algorithm
In this section, we discuss the signal detection of parasite devices when
. Let
(6.41)
and
(6.42)
Then, the test statistic for the detection of parasite devices’ signal is
(6.43)
which can be approximated by a Gaussian random variable.
If , we have
(6.44)
and
(6.45)
(6.46)
and
(6.47)
(6.48)
Note that the channel estimation error affects the variance of decision
statistic as less channel estimation error results in a smaller variance, which
is easier to differentiate host signals and parasite signals.
(6.50)
(6.52)
OceanofPDF.com
7
Analysis and Optimization for NOMA Signals
The key concept of non-orthogonal multiple access (NOMA) is that of
allowing multiple Internet of Things (IoT) devices to occupy the same
frequency-, time-, or code-resource [101, 102]. The device having
better channel conditions performs successive interference cancellation
(SIC) [103]. As a remedy, full-duplex (FD) can be invoked by
cooperative NOMA to avoid halving the rate by conventional half-
duplex (HD), where the strong user (SU) with good channel conditions
can act as an FD relay node for the weak user (WU) with poor channel
conditions [104–106]. However, the energy efficiency (EE) of
cooperative NOMA may be degraded due to additional power
consumption incurred at the SUs [107–109]. In this chapter, we
investigate the EE maximization problem of an FD cooperative
NOMA system. More importantly, we introduce the signal-to-
interference-plus-noise ratio (SINR) gap reversal problem of
cooperative NOMA systems, which imposes SIC performance
degradation at the SUs.
(7.1)
where and are the th data symbols intended for the SU and
the WU, respectively, is the additive white Gaussian noise (AWGN),
the symbol delay is caused by the processing delay at the SU, is the
channel response from the BS to the WU, and is the channel response
from the SU to the WU. All propagation channels capture the effects of
large-scale and small-scale fading. Since the phase of and is
different, the desired signal replicas arriving from the BS and the SU are
mis-aligned in phase. Hence, the phase of the transmitted signal at the SU
has to be shifted to align the pair of received signals. The channel spanning
from the BS to the WU can be represented as , where
and are the magnitude and phase of the channel , respectively.
Similarly, the channel spanning from the SU to the WU is represented as
, where and are the magnitude and phase of
the channel , respectively. Therefore, the phase difference between the
two channels is calculated as . To align the two signals, the
signal transmitted from the SU is pre-processed as . As a
result, the signal received at the WU becomes
(7.3)
As we can see, the pair of desired signals arriving from the BS and the SU
are now well aligned at the WU,1 and the SINR of the WU at its own end is
given by
(7.4)
(7.6)
(7.7)
(7.8)
7.2.2 Power Consumption Analysis
The total power consumption mainly consists of the power amplifier (PA)
power, circuit power of the transmit/receive chains, and the power
consumed by SI cancellation [113].
a. The PA power is closely related to the radiated transmit power and the
drain efficiency of the PA, which is given by [113],
where is the drain efficiency of the PA. Without loss of generality,
we assume that all PAs of the BS and of the users have the same drain
efficiency performance.
b. The circuit power consumption of the transmit/receive chains is
proportional to the number of active transmit and receive chains,
including the power consumed by the digital-to-analog converter, by
the filter and the synthesizer, etc. The dynamic power consumption can
be calculated as , where and denote the circuit
power consumed by the receive and transmit chains of the BS, of the
SU, and of the WU. The multiplier 2 indicates that we have two
transmit chains and two receive chains in the system.
c. For the SU acting as an FD relay, additional power is required for
SI cancellation, which can be modeled by a constant. Generally
speaking, complex SI cancellation schemes dissipate higher power by
their digital-to-analog converter, transmit radio unit, and adders [113].
d. The fixed power consumption represents power consumed by the
power supply, by the active cooling system, etc. This part is
independent of the state of the transmit/receive chains [113]. Finally,
the total power consumption is given by
(7.9)
7.3 Energy Efficiency Performance
Optimization
For simplicity, we collect the transmission power into a vector
and define as the feasible domain confined by the
constraints. Therefore, the EE maximization problem is re-formulated as:
(7.10)
and .
Therefore, the Frank–Wolfe method of [114] can be adopted, which
approximates by its first-order Taylor series, and iteratively updates
the first-order Taylor approximation along the specific direction that
approaches the original function. The first-order Taylor approximation of
at the th iteration is given by
Since the matrix is not a semi-positive definite matrix, its elements are
not confined to a convex set. Therefore, we introduce the Schur
complement [101] of to relax (C4) into
and constraint . On
(7.11)
Remark 7.2 As suggested by Eqs. (7.4), (7.6), and (7.7), the BS-SU, BS-
WU, and SU-WU distances also affect the SIC failure region. Given a
shorter BS-SU distance, the value of is increased due to the reduced
path loss (PL), and thus a higher cooperative power may be assigned to the
SU hence guaranteeing . A similar trend can be observed for a
shorter BS-WU distance. By contrast, a longer SU-WU distance makes
more likely. However, this also makes the cooperation between
the SU-WU less energy efficient, since additional power is consumed at the
SU without a reasonable throughput improvement. As expected, when the
SU-WU distance tends to infinity, the cooperative power assigned to the SU
tends to 0, as in non-cooperative NOMA systems.
Note
1 The signal received at the WU has a low time delay, which can be
mitigated by an equalizer or sequence detector. Hereby, we assume that
the signal from the BS and the SU can be readily combined by the WU
[106].
OceanofPDF.com
8
Signal Design for Multicluster Coordination
The imminent Internet of Things (IoT) aims to provide massive device
connectivity and support ever-increasing data demands, making
today’s environment on the edge of a new era of innovations and
changes. In multi-cluster IoT, the devices may suffer severe inter-
cluster interference due to the intensive frequency reuse among
adjacent access points (APs), thus deteriorating their quality-of-service
(QoS). To address this issue, conventional multi-cluster coordination in
IoT provides orthogonal code-, frequency-, time-, or spatial-domain
multiple access for interference management, which yet results in a
waste of resources, especially in the context of explosively increased
number of devices. In this chapter, we review the recent advances in
energy-efficient solutions for multi-cluster coordination relying on
non-orthogonal multiple access (NOMA) and constructive interference
(CI) exploitation techniques. Moreover, their applications for handling
interference management are elaborated at different levels of multi-
cluster coordination. Departing from traditional orthogonal multiple
access (OMA), this line of research provides a new dimension for
inter- and intra-cluster multi-device interference management in IoT.
Figure 8.1 Low energy consumption, high energy efficiency, and low
complexity techniques are preferable to enable an energy-efficient multi-
cluster coordinated IIoT system.
According to the coordination level among APs, the multi-cluster
coordination techniques in IoT can be mainly categorized into two modes:
partially-coordinated beamforming (PBF) and fully-coordinated joint
transmission (FJT) [117]. For the PBF mode, channel state information
(CSI) is shared by a number of APs to design cooperative beamforming for
suppressing inter-cluster interference [121, 122]. For the FJT mode, in
addition to CSI, the intended transmission data are shared [123]. Since both
CSI and the corresponding transmission data are available at all the
coordinated APs, the FJT mode allows the coordinated APs to transmit the
same data to the corresponding devices. Therefore, the FJT mode provides
an improved degree-of-freedom (DoF) in terms of spatial diversity gain and
achieves superior system performance than the PBF mode.
Generally, since only CSI is shared among APs, the beamforming design of
the PBF system makes a trade-off between inter-cluster interference
suppression and maximizing the devices’ signal-to-interference-plus-noise
ratio (SINR) within the cluster of interest, with a moderate level of
coordination overhead. On the other hand, the FJT scheme can be regarded
as a virtual multiple-input multiple-output (MIMO) system where, all AP-
device links are utilized to convey data, at the expense of higher
coordination overhead due to the CSI and data sharing mechanism among
the APs [118].
These multi-cluster coordination techniques have distinct advantages and
disadvantages, whereas their implementation in IoT is still restrictive. It is
because:
Since NOMA is able to multiplex a large number of devices onto the same
frequency resource, it is particularly suitable for the MMTC application due
to its enhanced multi-device access capability. Its applications in IoT have
been researched in terms of the NOMA-based parallel spaceborne antenna
array calibrations and impulsive noise mitigation. Nevertheless, they merely
applied NOMA for non-coordination IoT, where the system performance
may be significantly impaired by the intra-cluster interference.
Furthermore, note that the intrinsic intra-cluster multi-device interference,
also deemed as an underlying resource, has not been fully exploited when
designing non-orthogonal transmission techniques. Considering the high
device density in IoT, if the rich multi-device interference can be utilized
rather than being mitigated, the system performance can be significantly
enhanced. This inspires the interest in treating the ubiquitous interference in
IoT as a green source with the aid of the spatially non-orthogonal design,
namely constructive interference (CI).
For the FJT mode, each AP shares CSI and the transmitted data to other
coordinated APs. With devices in each AP’s coverage and
coordinated APs, the total overhead of sharing CSI and data is given
, where denotes the required bits for
describing one device’s CSI while denotes the required bits for
exchanging each device’s data symbols. Generally, only a few bits are
enough to describe a multiple-input single-output (MISO) channel for each
user [130]. For the overhead on sharing data symbols, it is decided by the
downlink frame structure of the communication protocol. Hence, the
overhead on sharing data symbols is reasonable, considering the fact that
the APs have been connected to a centralized cloud-manager through high-
speed optical fibers.
Figure 8.5 The symbol error rate and execution time of different precoders
in the FJT scenario. (a) Symbol error rate of different precoders and (b)
execution time of different precoders.
OceanofPDF.com
9
Conclusion of the Book
Internet of Things (IoT) provides enormous connections for massive
devices and sensors, which has been considered as an enabling technology
to build smart homes, smart transportations, smart cities, and smart planets.
It is expected that by 2030 over 500 billion IoT devices will be in use with
functions of sensing, computing, and communications, in which a surging
amount of data and information exchanges are carried out among various
IoT devices. Since IoT devices have sparse activity and low signaling
overhead, random access (RA) is an efficient means to relieve the burden of
machine-type communication (MTC). Considering that efficient signal
detection methods are crucial to IoT RA systems, in this book, we focus on
the signal detection for IoT, which is shown as follows.
In Chapter 3, in order to decide the activity variables of aggregated IoT
signals, some low-complexity approaches, e.g., variational inference (VI)
algorithm, are introduced. Since that the signal vector contains a number of
zero elements, the information vector being transmitted becomes sparse. In
this case, the compressive sensing (CS) reconstruction algorithms, e.g.,
block compressed sensing (BCS) and structured subspace pursuit (SSP)
algorithm, can be applied to detect sparse signals.
However, when massive IoT devices access the network, the preamble
collision occurs frequently and data packets from the device experiencing
collision may not be successfully decoded at the receiver. Thus, in Chapter
4, some approaches are described to detect the collided signals, e.g.,
automatic modulation classification (AMC) approach.
Meanwhile, the technique of non-orthogonal random access (NORA)
utilizes the different time of arrival to identify multiple devices with the
identical preamble to improve the throughput, the detection of the round-
trip delay (RTD) in NORA becomes significant. In Chapter 5, some
estimation methods of RTD of multiple signals in NORA are presented,
e.g., maximum likelihood (ML) algorithm, VI algorithm, and Markov Chain
Monte Carlo (MCMC) algorithm, respectively.
Besides, since backscatter communications are beneficial for power-limited
or battery-free IoT devices to transmit their data, where the signal detection
at the receiver becomes crucial. In Chapter 6, signal detection approaches
for backscatter devices are proposed to detect the presence of parasite
devices and separate parasite signals from host signals, e.g., Central Limit
Theorem (CLT) criterion.
Finally, wireless communications in IoT cause severe access congestion due
to insufficient frequency, time, power, antennas, and other resources,
evidently. In Chapter 7, we analyze the throughput and power consumption
of non-orthogonal multiple access (NOMA) systems and investigate the
energy efficiency maximization problem of a full-duplex cooperative
NOMA system. Furthermore, one of the efficient techniques is to cluster
massive devices into a number of small groups, with some resources being
shared and reused in different clusters, referred to as a multicluster IoT.
Therefore, in Chapter 8, signal design approaches for multicluster
coordination are proposed, e.g., successive interference cancellation (SIC)
design and constructive interference signal design.
OceanofPDF.com
References
1 H. Zeng, J. Wang, Z. Wei, et al. Multicluster-coordination Industrial
Internet of Things: The era of nonorthogonal transmission. IEEE
Vehicular Technology Magazine, 17(3):84–93, 2022.
2 K. Ashton. That ‘Internet of Things’. RFID Journal, 22:97–114, 2009.
3 L. Atzori, A. Iera, and G. Morabito. Understanding the Internet of Things:
Definition, potentials, and societal role of a fast evolving paradigm. Ad
Hoc Networks, 56:122–140, 2017.
4 G. Singh, J. Singh, D. Mitra, et al. A roadmap toward prospects for IoT
enabled 5G networks. In 2023 7th International Conference on
Computing Methodologies and Communication (ICCMC), pages 1405–
1410, 2023.
5 China Academy of Information and Communications Technology.The
white paper on the IoT (2011). Public Security in China (Comprehensive
Edition), 7(3):148–152, 2012.
6 K. Katsalis, N. Nikaein, E. Schiller, et al. Network slices toward 5G
communications: Slicing the LTE network. IEEE Communications
Magazine, 55(8):146–154, 2017.
7 J. Ordonez-Lucena, P. Ameigeiras, D. Lopez, et al. Network slicing for
5G with SDN/NFV: Concepts, architectures and challenges. IEEE
Communications Magazine, 55(5):80–87, 2017.
8 L. Chettri and R. Bera. A comprehensive survey on Internet of Things
(IoT) toward 5G wireless systems. IEEE Internet of Things Journal,
7(1):16–32, 2020.
9 M. Yang, S. Lim, S.-M. Oh, et al. An uplink transmission scheme for TSN
service in 5G industrial IoT. In 2020 International Conference on
Information and Communication Technology Convergence (ICTC),
pages 902–904, 2020.
10 P. A. Hafeez, G. Singh, J. Singh, et al. IoT in agriculture and healthcare:
Applications and challenges. In 2022 3rd International Conference on
Smart Electronics and Communication (ICOSEC), pages 446–450, 2022.
11 S. Kar, P. Mishra, and K.-C. Wang. 5G-IoT architecture for next
generation smart systems. In 2021 IEEE 4th 5G World Forum (5GWF),
pages 241–246, 2021.
12 Y. P. E. Wang, X. Lin, A. Adhikary, et al. A primer on 3GPP narrowband
Internet of Things (NB-IoT). IEEE Communications Magazine,
55(3):117–123, 2016.
13 R. Han, M. Liu, J. Wang, et al. Anti-jamming strategy for satellite
Internet of Things: Beam switching and optimization. IEEE Internet of
Things Journal, 10(23):20254–20263, 2023.
14 Y. Meng, W. Zhang, H. Zhu, et al. Securing consumer IoT in the smart
home: Architecture, challenges, and countermeasures. IEEE Wireless
Communications, 25(6):53–59, 2019.
15 D.-D. Tran, V. N. Ha, and S. Chatzinotas. Novel reinforcement learning
based power control and subchannel selection mechanism for grant-free
NOMA URLLC-enabled systems. In 2022 IEEE 95th Vehicular
Technology Conference: (VTC2022-Spring), pages 1–5, 2022.
16 H. Xiao, B. Ai, and W. Chen. Grant-free massive machine-type
communications with backward activity detection. In 2019 IEEE Global
Communications Conference (GLOBECOM), pages 1–6, 2019.
17 L. Liu, E. G. Larsson, W. Yu, et al. Sparse signal processing for grant-
free massive connectivity: A future paradigm for random access
protocols in the Internet of Things. IEEE Signal Processing Magazine,
35(5):88–99, 2018.
18 Y. D. Beyene, R. Jäntti, and K. Ruttik. Random access scheme for
sporadic users in 5G. IEEE Transactions on Wireless Communications,
16(3):1823–1833, 2017.
19 C. Bockelmann, N. K. Pratas, G. Wunder, et al. Towards massive
connectivity support for scalable mMTC communications in 5G
networks. IEEE Access, 6:28969–28992, 2018.
20 R. Ghods, C. Jeon, A. Maleki, et al. Optimal large-MIMO data detection
with transmit impairments. In 2015 53rd Annual Allerton Conference on
Communication, Control, and Computing (Allerton), pages 1211–1218,
2015.
21 E. Biglieri, G. Taricco, and A. Tulino. Performance of space-time codes
for a large number of antennas. IEEE Transactions on Information
Theory, 48(7):1794–1803, 2002.
22 J. Zheng and Y. Sun. Generalized space-time shift keying: Randomized
bitwise Markov chain Monte Carlo detection and code design. In 2013
IEEE International Conference on Signal Processing, Communication
and Computing (ICSPCC 2013), pages 1–4, 2013.
23 H. Zhu, B. Farhang-Boroujeny, and R.-R. Chen. On performance of
sphere decoding and Markov chain Monte Carlo detection methods.
IEEE Signal Processing Letters, 12(10):669–672, 2005.
24 W. Kim and K. M. Lee. Continuous Markov random field optimization
using fusion move driven Markov chain Monte Carlo technique. In 2010
20th International Conference on Pattern Recognition (ICPR 2010),
pages 1364–1367, 2010.
25 D. M. Blei, A. Kucukelbir, and J. D. McAuliffe. Variational inference: A
review for statisticians. Journal of the American Statistical Association,
112(518):859–877, 2017.
26 C. M. Bishop and N. M. Nasrabadi. Pattern Recognition and Machine
Learning, volume 4. Springer, 2006.
27 D. L. Donoho. Compressed sensing. IEEE Transactions on Information
Theory, 52(4):1289–1306, 2006.
28 N. Serafimovski, A. Younis, R. Mesleh, et al. Practical implementation
of spatial modulation. IEEE Transactions on Vehicular Technology,
62(9):4511–4523, 2013.
29 A. Garcia-Rodriguez and C. Masouros. Low-complexity compressive
sensing detection for spatial modulation in large-scale multiple access
channels. IEEE Transactions on Communications, 63(7):2565–2579,
2015.
30 R. Han, L. Bai, W. Zhang, et al. Variational inference based sparse signal
detection for next generation multiple access. IEEE Journal on Selected
Areas in Communications, 40(4):1114–1127, 2022.
31 D. Tse and P. Viswanath. Fundamentals of Wireless Communication.
Cambridge University Press, 2005.
32 J. Choi. Optimal Combining and Detection. Cambridge University Press,
2010.
33 R. Y. Mesleh, H. Haas, S. Sinanovic, et al. Spatial modulation. IEEE
Transactions on Vehicular Technology, 57(4):2228–2241, 2008.
34 A. Younis, N. Serafimovski, R. Mesleh, et al. Generalised spatial
modulation. In 2010 Conference Record of the Forty Fourth Asilomar
Conference on Signals, Systems and Computers, pages 1498–1502,
2010.
35 L. Applebaum, W. U. Bajwa, M. F. Duarte, et al. Asynchronous code-
division random access using convex optimization. Physical
Communication, 5(2):129–147, 2012.
36 G. Wunder, P. Jung, and W. Chen. Compressive random access for post-
LTE systems. In 2014 IEEE International Conference on
Communications Workshops (ICC), pages 539–544, 2014.
37 J. Choi. Stability and throughput of random access with CS-based MUD
for MTC. IEEE Transactions on Vehicular Technology, 67(3):2607–
2616, 2018.
38 L. Xiao, P. Yang, Y. Xiao, et al. Efficient compressive sensing detectors
for generalized spatial modulation systems. IEEE Transactions on
Vehicular Technology, 66(2):1284–1298, 2017.
39 H. Zhu and G. B. Giannakis. Exploiting sparse user activity in multiuser
detection. IEEE Transactions on Communications, 59(2):454–465, 2011.
40 Y. C. Eldar and G. Kutyniok. Compressed Sensing: Theory and
Applications. Cambridge University Press, 2012.
41 M. Opper and C. Archambeau. The variational Gaussian approximation
revisited. Neural Computation, 21(3):786–792, 2009.
42 L. L. Scharf. Statistical Signal Processing: Detection, Estimation, and
Time Series Analysis. Addison-Wesley Publishing Company, 1991.
43 C. M. Biship. Pattern Recognition and Machine Learning (Information
Science and Statistics). Springer, New York, 2007.
44 D. A. Harville. Matrix Algebra from a Statistician’s Perspective. Taylor
& Francis, 1998.
45 B. L. Sturm and M. Christensen. Comparison of orthogonal matching
pursuit implementations. In 2012 Proceedings of the 20th European
Signal Processing Conference (EUSIPCO), pages 220–224, 2012.
46 J. Choi, K. Lee, and N. Y. Yu. Compressive random access using
multiple resource blocks for MTC. In 2016 IEEE Globecom Workshops
(GC Wkshps), pages 1–5, 2016.
47 N. Jiang, Y. Deng, A. Nallanathan, et al. Analyzing random access
collisions in massive IoT networks. IEEE Transactions on Wireless
Communications, 17(10):6853–6870, 2018.
48 H. Shariatmadari, R. Ratasuk, S. Iraji, et al. Machine-type
communications: Current status and future perspectives toward 5G
systems. IEEE Communications Magazine, 53(9):10–17, 2015.
49 P. Patel and J. Holtzman. Analysis of a simple successive interference
cancellation scheme in a DS/CDMA system. IEEE Journal on Selected
Areas in Communications, 12(5):796–807, 1994.
50 L. Liu and W. Yu. Massive connectivity with massive MIMO—Part I:
Device activity detection and channel estimation. IEEE Transactions on
Signal Processing, 66(11):2933–2946, 2018.
51 J. G. Andrews, F. Baccelli, and R. K. Ganti. A tractable approach to
coverage and rate in cellular networks. IEEE Transactions on
Communications, 59(11):3122–3134, 2011.
52 T. Bai and R. W. Heath. Analyzing uplink SINR and rate in massive
MIMO systems using stochastic geometry. IEEE Transactions on
Communications, 64(11):4592–4606, 2016.
53 W. Xiao, R. Ratasuk, A. Ghosh, et al. Uplink power control, interference
coordination and resource allocation for 3GPP E-UTRA. In IEEE
Vehicular Technology Conference, pages 1–5, 2006.
54 M. Kiessling and J. Speidel. Analytical performance of MIMO zero-
forcing receivers in correlated Rayleigh fading environments. In 2003
4th IEEE Workshop on Signal Processing Advances in Wireless
Communications-SPAWC 2003, pages 383–387, 2003.
55 J. Ding, D. Qu, H. Jiang, et al. Success probability of grant-free random
access with massive MIMO. IEEE Internet of Things Journal, 6(1):506–
516, 2018.
56 L. Bai and J. Choi. Low Complexity MIMO Detection. Springer, 2012.
57 L. Bai, J. Choi, and Q. Yu. Low Complexity MIMO Receivers. Springer,
2014.
58 E. Bjornson, E. De Carvalho, E. G. Larsson, et al. Random access
protocol for massive MIMO: Strongest-user collision resolution
(SUCR). In 2016 IEEE International Conference on Communications
(ICC), pages 1–6, 2016.
59 J. Hoydis, S. Ten Brink, and M. Debbah. Massive MIMO in the UL/DL
of cellular networks: How many antennas do we need? IEEE Journal on
Selected Areas in Communications, 31(2):160–171, 2013.
60 Y. Han, G. Wei, C. Song, et al. Hierarchical digital modulation
recognition based on higher-order cumulants. In 2012 2nd International
Conference on Instrumentation, Measurement, Computer,
Communication and Control, pages 1645–1648, 2012.
61 Z. Zhang, X. Wang, Y. Zhang, et al. Grant-free rateless multiple access:
A novel massive access scheme for Internet of Things. IEEE
Communications Letters, 20(10):2019–2022, 2016.
62 F. Cong, A. K. Nandi, Z. He, et al. Fast and effective model order
selection method to determine the number of sources in a linear
transformation model. In 2012 Proceedings of the 20th European Signal
Processing Conference (EUSIPCO), pages 1870–1874, 2012.
63 L. Lu, G. Y. Li, A. L. Swindlehurst, et al. An overview of massive
MIMO: Benefits and challenges. IEEE Journal of Selected Topics in
Signal Processing, 8(5):742–758, 2014.
64 R. Abbas, M. Shirvanimoghaddam, Y. Li, et al. A novel analytical
framework for massive grant-free NOMA. IEEE Transactions on
Communications, 67(3):2436–2449, 2018.
65 J. Liu, N. Kato, H. Ujikawa, et al. Device-to-device communication for
mobile multimedia in emerging 5G networks. ACM Transactions on
Multimedia Computing, Communications, and Applications (TOMM),
12(5s):1–20, 2016.
66 J. Dai, J. Liu, Y. Shi, et al. Analytical modeling of resource allocation in
D2D overlaying multihop multichannel uplink cellular networks. IEEE
Transactions on Vehicular Technology, 66(8):6633–6644, 2017.
67 Y. Liang, X. Li, J. Zhang, et al. Non-orthogonal random access for 5G
networks. IEEE Transactions on Wireless Communications, 16(7):4817–
4831, 2017.
68 C. Stefanovic, M. Momoda, and P. Popovski. Exploiting capture effect in
frameless ALOHA for massive wireless random access. In 2014 IEEE
Wireless Communications and Networking Conference (WCNC), pages
1762–1767, 2014.
69 G. Bartoli, N. C. Beaulieu, R. Fantacci, et al. An effective multiuser
detection scheme for MPR random access networks. IEEE Transactions
on Communications, 65(3):1119–1130, 2016.
70 J. Choi. NOMA-based random access with multichannel ALOHA. IEEE
Journal on Selected Areas in Communications, 35(12):2736–2743, 2017.
71 R. Han, L. Bai, J. Yi, et al. Multiple delay estimation using genetic
algorithm-based MCMC in non-orthogonal random access. IEEE
Wireless Communications Letters, 9(3):398–401, 2020.
72 L. Bai, R. Han, J. Liu, et al. Multiple delay estimation for collision
resolution in non-orthogonal random access. IEEE Transactions on
Vehicular Technology, 69(1):497–508, 2020.
73 3GPP. Evolved universal terrestrial radio access (E-UTRA); base station
(BS) radio transmission and reception. Technical Specification 36.104,
3rd Generation Partnership Project (3GPP), October, 2014.
74 T. Morohashi, C.-H. Liao, A. Koizuka, et al. A high-performance RACH
detection scheme for random access overload in LTE-advanced. In 2015
IEEE Conference on Standards for Communications and Networking
(CSCN), pages 1–6, 2015.
75 M. I. Jordan, Z. Ghahramani, T. S. Jaakkola, et al. An introduction to
variational methods for graphical models. Machine Learning, 37:183–
233, 1999.
76 J. Choi. MCMC-based detection for random access with preambles in
MTC. IEEE Transactions on Communications, 67(1):835–846, 2018.
77 L. Bai, T. Li, J. Liu, et al. Large-scale MIMO detection using MCMC
approach with blockwise sampling. IEEE Transactions on
Communications, 64(9):3697–3707, 2016.
78 G. Casella and E. I. George. Explaining the Gibbs sampler. The
American Statistician, 46(3):167–174, 1992.
79 K.-S. Tang, K.-F. Man, S. Kwong, et al. Genetic algorithms and their
applications. IEEE Signal Processing Magazine, 13(6):22–37, 1996.
80 Y. Sakamoto, M. Ishiguro, and G. Kitagawa. Akaike information
criterion statistics. Dordrecht, The Netherlands: D. Reidel,
81(10.5555):26853, 1986.
81 A. A. Neath and J. E. Cavanaugh. The Bayesian information criterion:
Background, derivation, and applications. Wiley Interdisciplinary
Reviews: Computational Statistics, 4(2):199–203, 2012.
82 S. M. Kay. Fundamentals of Statistical Processing: Detection Theory,
volume 2. Pearson Education India, 2009.
83 R. Han, L. Bai, Y. Wen, et al. UAV-aided backscatter communications:
Performance analysis and trajectory optimization. IEEE Journal on
Selected Areas in Communications, 39(10):3129–3143, 2021.
84 W. Zhang, Y. Qin, W. Zhao, et al. A green paradigm for Internet of
Things: Ambient backscatter communications. China Communications,
16(7):109–119, 2019.
85 D. Dobkin. The RF in RFID: UHF RFID in Practice. Newnes, 2012.
86 R. Han, Y. Wen, L. Bai, et al. Rate splitting on mobile edge computing
for UAV-aided IoT systems. IEEE Transactions on Cognitive
Communications and Networking, 6(4):1193–1203, 2020.
87 L. Bai, R. Han, J. Liu, et al. Air-to-ground wireless links for high-speed
UAVs. IEEE Journal on Selected Areas in Communications,
38(12):2918–2930, 2020.
88 Q. Zhang, H. Guo, Y.-C. Liang, et al. Constellation learning-based signal
detection for ambient backscatter communication systems. IEEE Journal
on Selected Areas in Communications, 37(2):452–463, 2018.
89 F. Rezaei, C. Tellambura, and S. Herath. Large-scale wireless-powered
networks with backscatter communications—a comprehensive survey.
IEEE Open Journal of the Communications Society, 1:1100–1130, 2020.
90 J. D. Griffin and G. D. Durgin. Gains for RF tags using multiple
antennas. IEEE Transactions on Antennas and Propagation, 56(2):563–
570, 2008.
91 A. Varshney, O. Harms, C. Pérez-Penichet, et al. LoRea: A backscatter
architecture that achieves a long communication range. In Proceedings
of the 15th ACM Conference on Embedded Network Sensor Systems,
pages 1–14, 2017.
92 J. Wang, J. Zhang, R. Saha, et al. Pushing the range limits of commercial
passive RFIDs. In 16th USENIX Symposium on Networked Systems
Design and Implementation, pages 301–316, 2019.
93 M. Y. Abdelsadek, Y. Gadallah, and M. H. Ahmed. Matching-based
resource allocation for critical MTC in massive MIMO LTE networks.
IEEE Access, 7:127141–127153, 2019.
94 K. Senel and E. G. Larsson. Grant-free massive MTC-enabled massive
MIMO: A compressive sensing approach. IEEE Transactions on
Communications, 66(12):6164–6175, 2018.
95 P. Popovski, C. Stefanovic, J. J. Nielsen, et al. Wireless access in ultra-
reliable low-latency communication (URLLC). IEEE Transactions on
Communications, 67(8):5783–5801, 2019.
96 E. Björnson, E. G. Larsson, and M. Debbah. Massive MIMO for
maximal spectral efficiency: How many users and pilots should be
allocated? IEEE Transactions on Wireless Communications, 15(2):1293–
1308, 2015.
97 G. Yang, Y.-C. Liang, and Q. Zhang. Cooperative receiver for ambient
backscatter communications with multiple antennas. In 2017 IEEE
International Conference on Communications (ICC), pages 1–6, 2017.
98 W. Zhao, G. Wang, S. Atapattu, et al. Channel estimation for ambient
backscatter communication systems with massive-antenna reader. IEEE
Transactions on Vehicular Technology, 68(8):8254–8258, 2019.
99 H. Jiang, D. Qu, J. Ding, et al. Multiple preambles for high success rate
of grant-free random access with massive MIMO. IEEE Transactions on
Wireless Communications, 18(10):4779–4789, 2019.
100 H. Ding, D. B. Da Costa, and J. Ge. Outage analysis for cooperative
ambient backscatter systems. IEEE Wireless Communications Letters,
9(5):601–605, 2019.
101 J.-B. Kim and I.-H. Lee. Capacity analysis of cooperative relaying
systems using non-orthogonal multiple access. IEEE Communications
Letters, 19(11):1949–1952, 2015.
102 Y. Liu, Z. Qin, M. Elkashlan, et al. Non-orthogonal multiple access for
5G and beyond. Proceedings of the IEEE, 105(12):2347–2381, 2017.
103 Z. Ding, M. Peng, and H. V. Poor. Cooperative non-orthogonal multiple
access in 5G systems. IEEE Communications Letters, 19(8):1462–1465,
2015.
104 G. Liu, X. Chen, Z. Ding, et al. Hybrid half-duplex/full-duplex
cooperative non-orthogonal multiple access with transmit power
adaptation. IEEE Transactions on Wireless Communications, 17(1):506–
519, 2017.
105 L. Zhang, J. Liu, M. Xiao, et al. Performance analysis and optimization
in downlink NOMA systems with cooperative full-duplex relaying.
IEEE Journal on Selected Areas in Communications, 35(10):2398–2412,
2017.
106 Z. Zhang, Z. Ma, M. Xiao, et al. Full-duplex device-to-device-aided
cooperative nonorthogonal multiple access. IEEE Transactions on
Vehicular Technology, 66(5):4467–4471, 2016.
107 J. Choi. Minimum power multicast beamforming with superposition
coding for multiresolution broadcast and application to NOMA systems.
IEEE Transactions on Communications, 63(3):791–800, 2015.
108 F. Fang, H. Zhang, J. Cheng, et al. Energy-efficient resource allocation
for downlink non-orthogonal multiple access network. IEEE
Transactions on Communications, 64(9):3722–3732, 2016.
109 Q. Sun, S. Han, I. Chin-Lin, et al. Energy efficiency optimization for
fading MIMO non-orthogonal multiple access systems. In 2015 IEEE
International Conference on Communications (ICC), pages 2668–2673,
2015.
110 Z. Zhang, K. Long, A. V. Vasilakos, et al. Full-duplex wireless
communications: Challenges, solutions, and future research directions.
Proceedings of the IEEE, 104(7):1369–1409, 2016.
111 B. Klaiqi, X. Chu, and J. Zhang. Energy-efficient and low signaling
overhead cooperative relaying with proactive relay subset selection.
IEEE Transactions on Communications, 64(3):1001–1015, 2016.
112 Y. Xiao and L. J. Cimini. Impact of overhead on spectral efficiency of
cooperative relaying. IEEE Transactions on Wireless Communications,
12(5):2228–2239, 2013.
113 Z. Wei, X. Zhu, S. Sun, et al. Energy-efficiency of millimeter-wave
full-duplex relaying systems: Challenges and solutions. IEEE Access,
4:4848–4860, 2016.
114 D. Nguyen, L.-N. Tran, P. Pirinen, et al. Precoding for full duplex
multiuser MIMO systems: Spectral and energy efficiency maximization.
IEEE Transactions on Signal Processing, 61(16):4038–4050, 2013.
115 B. Li, X. Qi, K. Huang, et al. Security-reliability tradeoff analysis for
cooperative NOMA in cognitive radio networks. IEEE Transactions on
Communications, 67(1):83–96, 2018.
116 Y. Tao, L. Liu, S. Liu, et al. A survey: Several technologies of non-
orthogonal transmission for 5G. China Communications, 12(10):1–15,
2015.
117 T. Qiu, J. Chi, X. Zhou, et al. Edge computing in Industrial Internet of
Things: Architecture, advances and challenges. IEEE Communications
Surveys and Tutorials, 22(4):2462–2488, 2020.
118 K. Wang, Y. Wang, Y. Sun, et al. Green Industrial Internet of Things
architecture: An energy-efficient perspective. IEEE Communications
Magazine, 54(12):48–54, 2016.
119 J. An, K. Wang, S. Wang, et al. Antenna array calibration for IIoT
oriented satellites: From orthogonal CDMA to NOMA. IEEE Wireless
Communications, 27(6):28–36, 2020.
120 B. Selim, M. S. Alam, J. V. Evangelista, et al. NOMA-based IoT
networks: Impulsive noise effects and mitigation. IEEE Communications
Magazine, 58(11):69–75, 2020.
121 Q. Chen, K. Yang, H. Jiang, et al. Joint beamforming coordination and
user selection for CoMP-enabled NR-U networks. IEEE Internet of
Things Journal, 9(16):14530–14541, 2021.
122 P. Jia, X. Wang, and K. Zheng. Distributed clock synchronization based
on intelligent clustering in local area industrial IoT systems. IEEE
Transactions on Industrial Informatics, 16(6):3697–3707, 2019.
123 B. Cheng, M. Wang, S. Zhao, et al. Situation-aware dynamic service
coordination in an IoT environment. IEEE/ACM Transactions on
Networking, 25(4):2082–2095, 2017.
124 Y. Yuan, Z. Yuan, G. Yu, et al. Non-orthogonal transmission technology
in LTE evolution. IEEE Communications Magazine, 54(7):68–74, 2016.
125 A. I. Perez-Neira, M. Caus, and M. A. Vazquez. Non-orthogonal
transmission techniques for multibeam satellite systems. IEEE
Communications Magazine, 57(12):58–63, 2019.
126 X. Liu and X. Zhang. NOMA-based resource allocation for cluster-
based cognitive Industrial Internet of Things. IEEE Transactions on
Industrial Informatics, 16(8):5379–5388, 2019.
127 Y. Cao, N. Zhao, Y. Chen, et al. Secure transmission via beamforming
optimization for NOMA networks. IEEE Wireless Communications,
27(1):193–199, 2019.
128 M. S. Ali, E. Hossain, and D. I. Kim. Coordinated multipoint
transmission in downlink multi-cell NOMA systems: Models and
spectral efficiency performance. IEEE Wireless Communications,
25(2):24–31, 2018.
129 S. Khairy, P. Balaprakash, L. X. Cai, et al. Constrained deep
reinforcement learning for energy sustainable multi-UAV based random
access IoT networks with NOMA. IEEE Journal on Selected Areas in
Communications, 39(4):1101–1115, 2020.
130 Z. Wei, C. Masouros, K.-K. Wong, et al. Multi-cell interference
exploitation: Enhancing the power efficiency in cell coordination. IEEE
Transactions on Wireless Communications, 19(1):547–562, 2019.
131 H. Zeng, X. Zhu, Y. Jiang, et al. A green coordinated multi-cell NOMA
system with fuzzy logic based multi-criterion user mode selection and
resource allocation. IEEE Journal of Selected Topics in Signal
Processing, 13(3):480–495, 2019.
132 Z. Wei, C. Masouros, F. Liu, et al. Energy-and cost-efficient physical
layer security in the era of IoT: The role of interference. IEEE
Communications Magazine, 58(4):81–87, 2020.
133 T. Xu, C. Masouros, and I. Darwazeh. Waveform and space precoding
for next generation downlink narrowband IoT. IEEE Internet of Things
Journal, 6(3):5097–5107, 2019.
OceanofPDF.com
Index
Symbols
2-norm 18
a
a posteriori probability (APP) 18, 40, 45
a priori probability (APRP) 18, 39, 55
acronyms, xxvii
additive white Gaussian noise (AWGN) 34, 128, 139
asynchronous 16
b
bandwidth 90, 109, 138, 145, 155
base station (BS) 8, 11, 40, 63, 118, 137
beamforming 66, 86, 120, 148, 150, 151, 152, 158
binary phase shift keying (BPSK) 102, 156
bit error rate (BER) 21, 58, 127
c
candidate vectors 18, 21
channel estimation 25
channel gain 65, 83, 118, 120, 153, 154, 155
channel matrix 17
channel state information (CSI) 89, 130, 137, 151
Chernoff bound 20
Chi-square 50, 77
circular symmetric complex Gaussian (CSCG) 55
column vector 35, 36
compression measurement 35, 36
compressive sensing (CS) 8
computational complexity 14, 15, 16, 18, 40, 43, 45, 95
constellation points 68, 157, 158
correlation 66, 124, 129, 130, 13, 134, 156, 161
cross entropy 33
d
data rate 39
degrees of freedom 50
downlink 11, 137, 146, 153, 158
e
eigenvalue 50, 70
entry 72
error probability 18
Euclidean distance 18
evidence lower bound (ELBO) 33
exhaustive search 21, 40, 94, 113
expectation 19, 45, 72, 73, 76, 77, 95, 97, 98, 99, 125
f
false alarm (FA) 50
filter bank multicarrier (FBMC) 2
filter-based orthogonal frequency division multiplexing (F-OFDM) 2
Fourier transform basis 36
fractional power control 65 118
Frobenius norm 19
full-duplex 9, 137, 164
g
generalized likelihood ratio test (GLRT) 124
Genetic Algorithm 100
Gibbs Sampler 29
grant-based random access 11
grant-free random access 14
h
half-duplex 137
high-order cumulant 68
i
identity matrix 26, 37
information entropy 33
interfering signal 156, 157
inter-symbol interference (ISI) 89
j
J-divergence 50
Jensen’s inequality 54
k
Kullback–Leibler (KL) divergence 32
l
least absolute shrinkage and selection operator (LASSO) 42
likelihood function 18, 39, 93, 100, 102, 111, 123, 124
linear detector 22
linear transformation 22
log-likelihood ratio (LLR) 29
low-density parity check (LDPC) 2
lower bound 33, 45, 95
m
MAP detection 40
MATLAB 143
matrix inversion 46, 47, 51, 96
maximum a posteriori probability (MAP) 18, 40
maximum likelihood (ML) 92, 126, 163
mean square error (MSE) 26
minimum mean square error (MMSE) 16, 40, 68, 161
missed detection (MD) 50
modulation 9, 18, 20, 23, 26, 29, 30, 39, 63, 66, 68, 79, 120, 122, 158,
163
Monte Carlo 8, 11, 99
Markov chain 29
multiple-input multiple-output (MIMO) 15, 39, 63, 118, 151
n
noise 15, 17, 19, 20, 21, 23, 25, 26, 28
non-deterministic polynomial (NP) hard 37
non-orthogonal multiple access (NOMA) 9
o
observation matrix 36
orthogonal 52, 65, 68, 79, 89, 120, 129
orthogonal basis 37
orthogonal frequency division multiplexing (OFDM) 89
orthogonal matching pursuit (OMP) 42
orthonormal 36, 119
p
pairwise error probability (PEP) 18
physical downlink shared channel (PDSCH) 11
physical random access channel (PRACH) 11
preamble 16, 17
probability density function (pdf) 31, 65, 72, 93
pseudo-inverse 92, 93
q
Q-function 19
quadrature amplitude modulation (QAM) 20, 68, 158
r
random variable 18, 29, 31, 39, 50, 52, 53, 64, 95, 123, 125, 126
Rayleigh fading 64, 92, 119, 120, 121, 146
real-part operation 19
received signal 15
receiver 15
restricted isometry property (RIP) 15
s
sampling rate 35
sensing matrix 36
signal candidates 18
signal constellation 18
signal estimation 25
signal reconstruction 35
signal-to-interference-plus-noise ratio (SINR) 53, 71, 137
signal-to-noise ratio (SNR) 21, 55, 69, 79, 102, 128
sparse signal 15
spatial diversity gain 18, 151, 153, 159
spatial modulation (SM) 39
spectral efficiency 17, 39
spectrum 2
statistical sampling 28
statistics 15
submatrix 42
suboptimal 124
subspace 9
subvector 46
successive interference cancellation (SIC) 9
symbol energy 26, 34, 43, 55, 120
symbol error rate (SER) 159
t
throughput 138, 139, 142, 144
transmission rate 7, 154
transmitted symbol 29
transmitter 18
tree search 41, 42, 48, 61
u
underdetermined 37
uplink 12, 63, 64, 65, 79, 162
upper bound 19, 20, 77, 82, 85, 138, 143
v
variance 19, 20, 23, 24, 26, 43, 52, 55, 64, 69, 72, 92
variational distribution 31
variational inference (VI) 8
vector 141, 142, 143, 151
z
zero-forcing (ZF) 66
zero-forcing beamforming 66
OceanofPDF.com
WILEY END USER LICENSE AGREEMENT
Go to www.wiley.com/go/eula to access Wiley’s ebook EULA.
OceanofPDF.com