Professional Documents
Culture Documents
net/publication/331809749
Joint Active User Detection and Channel Estimation in Massive Access Systems
Exploiting Reed-Muller Sequences
CITATIONS READS
0 56
3 authors, including:
L. Hanzo
University of Southampton
2,351 PUBLICATIONS 30,920 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by L. Hanzo on 02 April 2019.
system latency. In this case, the AP has to detect the IDs of functions used during the sequence generation have to be
the active users and estimate the channel coefficients based communicated both to all the users and to the AP, which
on the received signal. To reduce congestion and achieve low imposes extra signalling overhead.
latency, the above procedures have to be accomplished with In [17], second-order RM sequences are invoked for massive
high accuracy and at low complexity. access in 5G. Compared to ZC sequences, RM sequences have
Moreover, it is worth pointing out that the difficulty of the following distinct advantages:
detecting active users from sets of potential users with different • The size of RM sequence space is several orders of mag-
set sizes is very different. In general, detecting active users nitudes larger than that of the same-length ZC sequences,
from a set of tens or hundreds of potential users can be readily which meets the requirement of massive connectivity.
achieved by elaborate sequence design and exhaustive search. • The RM sequences can be uniquely and unambiguously
However, it is rather challenging to do this in the massive mapped to user IDs. Hence, the AP can immediately
access scenario where the number of unknown potential users infer the user ID right after the RM sequences have
can be as huge as hundreds of thousands or even millions, been correctly detected. Thus, the four-message hand-
which makes the detection reminiscent of looking for the shake depicted in Fig. 1(a) is simplified to the twin-
needle in a haystack. step interaction shown in Fig. 1(b), which results both
in reduced signalling overhead and in reduced system
latency.
B. Related Work
• The structural properties of RM sequences can be ex-
Numerous researchers have improved the RA procedures ploited to design efficient detection algorithms having a
by designing beneficial preamble sequences. Some of them low computational complexity.
focus on increasing the number of available ZC sequences. In [16], RM sequences are used to construct the determin-
For example, the authors of [6] proposed a preamble reuse istic measurement matrix of CS, where an efficient recon-
scheme by partitioning the cell coverage and reducing the struction algorithm is also conceived, whose complexity is
cyclic shift size. Apart from the classic ZC sequences, [7] they determined by the length of RM sequences and by the sparsity
inserted extra auxiliary sequences in the positions randomly factor instead of the sequence space cardinality. However,
chosen from the first data sub-frame. However, the use of this algorithm suffers from a serious performance degradation
auxiliary sequences decreases the data transmission efficiency when the sparsity factor increases. Based on the algorithm in
and increases the detection complexity. By contrast, the RA [16], a beneficial shuffle operation is advocated in [17] for
procedure of [8] treats several RA slots as a virtual frame improving the performance of RM detection, albeit at a high
and the active users randomly choose a ZC sequence for their computational complexity. However, the compelling structural
transmission in each slot. This is equivalent to expanding the properties of RM sequences have not been fully exploited.
sequence space at the cost of an increased overhead ratio and In addition, to cope with the multi-sequence-induced interfer-
detection complexity. ence, traditional successive interference cancellation (SIC) is
Other authors investigate different sequence generation adopted both in [16] and in [17], where the strongest signal
methods in support of massive connectivity and active user is detected first and then subtracted from the received signal
detection. On one hand, considering the huge number of before detecting the next signal, regardless of whether the
potential users in the system, it is impossible to assign detected sequence is correct or not. Hence, once the sequence
orthogonal sequences to each user. On the other hand, non- is incorrectly detected, it will affect the performance of all
orthogonal sequences would inevitably impose multi-user in- subsequent detection stages.
terference during the detection. Hence, the key challenge is to
obtain a relatively large sequence space, whilst simultaneously
attaining reliable detection. Based on the sparsity of user- C. Main Contributions
activity caused by the sporadic traffic in mMTC, the active user Considering the above attractive merits of RM sequences,
detection is often formulated as a compressive sensing (CS) we exploit them to facilitate active user detection and channel
problem. The active users transmit a unique sequence to access estimation in massive access systems in this paper. At the
the system. To satisfy the so-called Restricted Isometry Prop- transmitter, each active user maps its ID to a unique RM
erty (RIP) of CS [9], the entries of these sequences are usually sequence and then sends it to the AP. Here, a novel mapping
generated either by Gaussian or Bernoulli processes [10]. rule is proposed. On one hand, it helps to improve the sequence
Hence, considerable storage resources are required for storing detection performance. On the other hand, it enables us to
these sequences at the AP. At the receiver, CS algorithms, accomplish sequence detection and channel estimation at the
such as Basis Pursuit (BP) [11], Orthogonal Matching Pursuit same time, without invoking an extra channel estimation step
(OMP) [12] and approximate message passing (AMP) [13] as the algorithms in [16] and [17].
[14], are utilized for detecting the active users. However, all At the receiver, we firstly design a single-sequence detection
these algorithms impose a high complexity that is related either algorithm based on the nested structure of RM sequences,
to the size of sequence space or to the number of potential which reveals the relationships between its sub-sequences.
users in the system. Based on the code-expanded scheme of Exploiting this structural property in the sequence detection
[8], the sequences constructed by Bloom filtering are utilized algorithm, we intend to improve the detection performance
in [15]. Despite the lower latency compared to LTE, the hash at a reduced complexity. Moreover, to cope with the potential
3
error propagation problem of the above algorithm, an enhanced users and the maximum value of C depends on the sequence
algorithm based on multiple lists is also conceived. As for space size. All the users are assumed to be synchronized and
the case where multiple active users coexist in the system, each one of them has a unique user ID. In a specific RA slot,
an iterative RM detection and channel estimation algorithm there are K active users in the system and the active user set is
is adopted. At each stage of an iteration, we focus on a denoted as κ , {1, 2, . . . , K}. Due to the fact that the traffic
particular user. Considering other signals as noise, the single- pattern in mMTC scenario is typically sporadic, it is satisfied
sequence detection algorithm is invoked for updating this that K ≪ C.
user’s sequence detection result. After all the sequences are
updated, the results are fed into the channel estimator to
improve the accuracy of channel estimates. Then the enhanced
channel estimates are utilized in the next iteration to reinforce
the sequence detection.
Against the above background, our main contributions are:
• A novel mapping rule between user IDs and RM se-
quences is proposed, which helps to improve the sequence
Active Users
detection capability and simplify our high-accuracy chan- Silent Users
nel estimation.
• We derive an explicit relationship between the RM
Fig. 2. The system model of the uplink massive connectivity scenario, where
sequence and its sub-sequences, which is referred to only a subset of users are active because of the sporadic traffic in mMTC.
as nested structure. We exploit this structural property
for conceiving a low-complexity algorithm for single
sequence detection, which exhibits superior detection Transmitter for user 1
performance and channel estimation accuracy. In order h1
user ID D1 {P 1
m
, b1m } RM sequence c1
to mitigate the error propagation, a moderate-complexity
enhanced algorithm is also conceived.
Transmitter for user K
• Iterative active-user detection and channel estimation hK
scheme is then also proposed for the multi-sequence user ID DK {P m
K , b mK } RM sequence cK
scenario. On one hand, the iterative detection may reduce e
the impact of incorrectly detected sequences. On the other
RM sequence detection (SD)
hand, owing to the bi-directional information exchange {Pˆ m
}
, bˆ 1m , hˆ1
1 SD SD
between the active-user detector and channel estimator, for user K for user 1
the detection capability and channel estimation accuracy
can mutually reinforce each other. {Pˆm
K }
, bˆ mK , hˆK
Channel Estimator (CE)
To generate its RM sequence, the active user k, k∈κ, first III. T HE NESTED STRUCTURE OF RM SEQUENCES
maps the user ID Dk ∈ {0, 1, . . . , C − 1} to the matrix-vector
In this section, we introduce an important structural property
pair {Pmk , bk }. We propose a novel mapping rule as follows:
m
of RM sequences, which is referred to as nested structure and
1) Convert the user [ ID Dk to the length-[m(m ] − 1)/2]
is the fundamental of the following proposed RM detection
binary vector dk,1 , . . . , dk,m(m−1)/2 .
algorithms. For ease of exposition, several relevant definitions
2) Put these bits successively into the symmetric matrix
are given as follows.
Pmk having zero diagonal elements, i.e.,
Definition 1: Given the matrix-vector pair {Pm , bm } and the
0 pk,(m,1) ··· pk,(m,m−1) RM sequence cm generated by them, the lower right (s × s)-
p · · · pk,(m−1,m−2) element sub-matrix of Pm is defined as its s-th order sub-
k,(m,1) 0
m
Pk = T
matrix Ps and the vector αs , [ps,1 , . . . , ps,s−1 ] denotes
.. .. .. ..
. . . . the s-th layer of Pm . Furthermore, the s-th order sub-vector
∆ T
pk,(m,m−1) pk,(m−1,m−2) · · · 0 of bm is defined as bs = [bs , bs−1 , . . . , b1 ] . Then, the matrix-
vector pair can be expressed in the following recursive form
0 dk,1 · · · dk,m−1
[ ]
dk,1 0 · · · dk,2m−3 0 (α s T
) [ ]
Ps = , bs = bs b
s−1
. (5)
· · · dk,3m−6 α s
P s−1
= dk,2 dk,m .
.. .. .. .. The resultant length-2s RM sequence determined by {Ps , bs }
. . . .
dk,m−1 dk,2m−3 · · · 0 according to (3) is then termed as the s-th order sub-sequence
cs .
T
3) The vector bm k = [bk,m , bk,m−1 , · · · , bk,1 ] is con- The nested structure of RM sequences is summarized in the
structed according to following theorem.
{ Theorem 1: As depicted in Fig. 4, given the RM sequence
pk,(s,1) ⊕ pk,(s,2) ⊕ . . . ⊕ pk,(s,s−1) , 2 6 s 6 m
bk,s = . cm , its sub-sequences of order s and (s − 1) satisfy the nested
bk,m ⊕ bk,m−1 ⊕ · · · ⊕ bk,2 , s = 1 structure that
(2)
Finally, the active user k generates the RM sequence cm cs = (cs−1 , cs−1 ⊙ vs−1 ), 2 ≤ s ≤ m. (6)
k
with the mapped matrix-vector pair {Pm k , bk }. According
m
The vector vs−1 is a length-2s−1 Walsh sequence determined
to the above mapping rule, both the Hamming weight of by the s-th layer of the matrix Pm , and its j-th entry is given
the vector bm m m
k and the term (Pk aj−1
T m
√) aj−1 must be even. by
With the normalization coefficient 1/ 2m being omitted, the s T s−1 s T s−1
generation function shown in (1) can be simplified to vjs−1 = (−1)bs · (−1)(α ) aj−1
= (−1)(α ) aj−1
, (7)
m T
am 1 m T m m
cm
k,j = (−1)
(bk ) j−1 + 2 (aj−1 ) Pk aj−1 . (3) j−1 , aj−1 ⊕ 1
where as−1 s−1 s−1
.
The size of the sequence space created by the proposed
mapping rule is up to 2m(m−1)/2 and the same-sized user c sj -1 c sj
space can be supported. In this sense, RM sequences are more
suitable for massive access in mMTC scenario. Furthermore,
the above mapping method also brings benefits for channel vsj-1 c sj+2s-1
estimation and sequence detection, which will be specified in
Section V. Fig. 4. The nested structure of RM sequences.
All the active users in this RA slot simultaneously send
their RM sequences to the AP and the received signal can be Proof: We prove that RM sequences obey the above
expressed as nested structure relying on the generation function given in
∑
K (3). When we have 1 ≤ j ≤ 2s−1 , the vector asj−1 can be
yjm = hk · cm m m
k,j + ej , j = 1, . . . , 2 , (4) decomposed as
k=1 [ ]
s−1 T
asj−1 = 0 aj−1 .
where hk represents the channel coefficient between the active
user k and the AP, which is modeled as a complex Gaussian Then the exponent of csj is expanded as
random process with unit variance, and ej is the complex
additive white Gaussian noise (AWGN) having mean zero and 1
(bs )T asj−1 + (asj−1 )T Ps asj−1
variance N0 . After receiving the signal, the AP has to detect 2 [ ]
[ ] 0
all K active users and estimate the corresponding channel s−1 T
= bs (b )
coefficients. Thanks to the one-to-one mapping between the as−1
j−1
matrix-vector pair and the user ID, active user detection can be [ ][ ]
1 [ ] 0 (αs )T 0
accomplished by recovering the matrix-vector pairs {Pm k , bk }
m
+
s−1 T
0 (aj−1 )
from the received signal. 2 αs Ps−1 as−1
j−1
5
which completes the proof. down. We denote the result of the transformation by the vector
Vm−1 = WHT {ỹm } = Tm−1 · ỹm , whose i-th entry is
IV. B LIND ACTIVE U SER D ETECTION AND C HANNEL
Vim−1 =tm−1
i · ỹm
E STIMATION A LGORITHM
2∑
m−1
1( m )
where em−1
j , ej + v̂jm−1 · em
j+2 m−1 . in v̂s−1 ̸= vs−1 . Then the result of (12) turns out to be
2 ( )′ 1 (( s )′ ( )′′ )
In the sequel, the sequence {ym−1 is split} into ym−1 yjs−1 = yj + v̂js−1 · yjs
( )′′ 2
and ym−1 and the estimates α̂m−1 , b̂m−1 are calculated 1 s−1 ( )
by repeating the {above steps. = hcj 1 + vjs−1 v̂js−1 + es−1
} This process continues until 2
{
j (16)
all the estimates α̂s , b̂s , s ∈ {2, . . . , m} and the length- s−1
hcj + ej ,s−1 s−1
if vj = v̂j s−1
[ ]T = .
2 sequence y1= y11 , y21 are obtained. s−1
ej , if vjs−1 ̸= v̂js−1
Then, the channel estimation can be done based on y1 . Since v̂s−1 and vs−1 are two {different Walsh}sequences,
Assuming that all the previous estimates are correct, we have the cardinality of the set J = j|vjs−1 ̸= v̂js−1 definitely
{
y11 = hc11 + e11 = h + e11 equals to 2s−2 . As a result, the sequence ys−1 loses half the
, (14) information of cs−1 , which will impose consistent errors in
y21 = hc12 + e12 = h · (−1)b1 + e12
the following steps.
where
( ) In the sequel, we propose a list detection algorithm for
1
e11 = 1 ± e3 ± · · · ± e2m −1
em m m
overcoming this error propagation problem. The algorithm can
2m−1 ,
1 be partitioned into the extension and validation stages.
e1 = (e m
± e m
± · · · ± e m
m )
2
2m−1 2 4 2
Firstly, let us consider the extension stage. For ease of
and the signs depend on the estimates v̂s , 2 ≤ s ≤ m − 1. clarification, we introduce two parameters (L, F ), where
Since emj , j = 1, . . . , 2
m
are i.i.d. random variables following L = [ Lm , Lm−1 , . . . , Lm−F +1 ] determines the width of
the distribution CN (0, N0 ), the channel coefficient can thus extension and F = |L|, i.e., the number of elements in
be estimated by the vector L, determines the depth of extension. On this
1( 1 ) basis, during the recovery of {αs , bs } (line 4 of Algorithm
ĥ = y1 + (−1)b̂1 · y21 , (15) 1), if s ≥ m − F + 1, instead of choosing the location
2
having the largest real component, we retain the Ls most
where b̂1 = b̂m ⊕ · · · ⊕ b̂2 according to (2). likely locations to obtain a series of candidates. Then, the
Capitalizing on all the estimations above, the matrix-vector detection is continued in these parallel threads, each called a
pair {Pm , bm } is recovered according to (5) and then reverts detection path. For the list detection algorithm with parameters
to the active user ID. To summarize, the layer-by-layer RM (L, F ), the∏total number of the detection paths at the end
m−F +1
detection algorithm conceived for single sequence detection is equals to s=m Ls , and the path having the notation
presented in Algorithm 1. l = (lm , . . . , lm−f +1 , . . . , lm−F +1 ) means that we choose the
lm−f +1 -th list in the f -th layer [ along this path. Intuitively,
]
if F = m − 1 and L = 2m−1 , 2m−2 , . . . , 2 , the list
Algorithm 1 Layer-by-Layer RM Detection Algorithm detection algorithm is equivalent to the classic maximum
Input: the received signal ym ; likelihood sequence estimation (MLSE), which achieves the
Output: the matrix-vector pair {P̂m , b̂m }, the channel coef- optimal performance with a complexity that is super-linear to
ficient ĥ. the size of the sequence space. Faced with the huge sequence
1: for s = m : −1 : 2 do space of RM sequences, the complexity of MLSE is excessive.
′ ′′
2: Split ys into two partial sequences (ys ) and (ys ) . In the proposed list detection algorithm, we keep track of
3: Perform the element-wise conjugate multiplication on several most likely paths to reach a compromise between
′ ′′
the (ys ) and (ys ) with (9). complexity and performance. An example of ([2, 2], 2) list
4: Perform the WHT and obtain the estimates {α̂s , b̂s } detection algorithm is illustrated in Fig. 6.
according to (11).
5: Obtain v̂s−1 by applying {α̂s , b̂s } to (7). At the validation stage, the optimal path is chosen by
6: Calculate the sequence ys−1 with (12). measuring the residual sequence energy. To be specific, the
7: end for residual sequence energy on the path l is expressed as
8: With the element b̂1 = b̂m ⊕ · · · ⊕ b̂2 , the channel
2
coefficient is estimated according to (15). Rl =
ym − ĥl · ĉm
l
. (17)
9: The matrix-vector{pair {P̂m} , b̂m } is recovered based on Then the path having the minimum residual energy is decided
all the estimates α̂s , b̂s , b̂1 , s ∈ {2, . . . , m} and then to be the final detection result. The reasons to use the residual
reverts to the user ID. energy as the path metric are two fold. On one hand, it
10: return {P̂m , b̂m }, ĥ. is intuitive that if the detected sequence actually exists, the
residual energy should be reduced after it is canceled from
the received signal. On the other hand, if errors occur during
However, we found that Algorithm 1 suffers from an error the detection process, the channel coefficient estimated by
propagation problem. To elaborate, let us assume that an (15) can be proved to be a very small value. Specifically, if
error occurs during the recovery of {αs , bs }, which results the algorithm is executed to the last step based on the result
7
ym where
{
n′ = n, if 1 ≤ k ′ ≤ k − 1
αˆ m
αˆ m .
(1) (2)
n′ = n − 1, if k + 1 ≤ k ′ ≤ kmax
m-1 m-1
y(1) y (2) (n)
Then, the result of (yj − ζk,j ) is input to Algorithm 1 to
(n) (n)
m-1
obtain ck and hk .
m-1 m-1
m-1
αˆ (1,1) αˆ (1,2) αˆ (2,1) αˆ (2,2) Next, after all the detected users’ RM sequences are updated
m- 2 m- 2 m- 2 m- 2
y (1,1) y (1,2) y (2,1) y (2,2) in this iteration, the results are fed to the linear least square
channel estimator for further improving their accuracy, which
is specified as
[ ]T
(n) (n)
h(n) = h1 , . . . , hkmax
y1(1,1) y1(1,2) y1(2,1) y1(2,2)
2m
2
∑ ∑
kmax
(19)
(n′ )
= arg min
yj − hk′ · ck′ ,j
.
[h1 ,...,hk ]T ∈Ckmax
′
j=1 k =1
hˆ(1,1) , cˆ (1,1) hˆ(1,2) , cˆ (1,2) hˆ(2,1) , cˆ (2,1)
max
hˆ(2,2) , cˆ (2,2)
m m m m
probability of single sequence detection algorithm, we con- cannot be less than 0, we have that
sider the layer-by-layer recovery and the following theorem
2∑
m−1
concludes the correct recovery probability of each layer. P (m) ≥ max 0, 1 − Pr(Ai )
i=2
Theorem 2: Under the circumstance
{ s+1 } that we have recov- 0 − 2m−1
|h|
2
ered
{ {α m
} m, b } , . . . , α , b s+1 correctly, the estimates = max 0, 1 − (2m−1 − 1)Φ √ ,
2
s
α̂ , b̂s are correct with the probability of 2m−1 (σ̃εm )
(24)
which is in accordance with (20).
0 − 2 |h|
s−1 2
P (s|m,...,s+1) ≥ max 0, 1 − (2s−1 − 1)Φ √ , Next, assuming {that P (s+1|m,...,s+2)
} { also agrees } with (20)
2s−1 (σ̃εs )2
and the estimated α̂m , b̂m , . . . , α̂s+1 , b̂s+1 are correct,
( ) (20)
2 2 N0 N0
2 yjs is calculated as
where (σ̃εs ) = 2|h| + ,2≤s≤m
2m−s 2m−s yjs = hcsj + esj , j = 1, . . . , 2s , (25)
1 ( s+1 )
and Φ(·) is the distribution function of the standard normal where esj = ej + v̂js · es+1
j+2s . With the knowledge that
2 ( )
distribution. N0
es+1
j follows the distribution CN 0, , we have that
( ) 2m−s−1
N0
Proof: In the sequel, we prove Theorem 2 by induction. yjs ∼ CN h, m−s . The following derivation is similar
2
Firstly, let us consider the case of s = m. Recall that to the case of s = m and will not be repeated here due to
emj , j = 1, . . . , 2
m
are i.i.d. random variables following space limitations. Finally, we can{draw the} conclusion that the
CN (0, N0 ) . Given the channel coefficient h, the received correct detection probability of α̂s , b̂s is identical to (20).
signal obeys yjm ∼ CN (h, N0 ). Then, upon approximating
ε̃m
j in (9) by a complex Gaussian variable with mean 0 and
2 2 The RM sequence cm is detected successfully only if each
variance (σ̃εm ) , 2 m
( 2|h| N0 +)N0 , we see that ỹj follows the layer is correctly recovered, hence, its successful detection
2 2
distribution CN |h| , (σ̃εm ) . probability is formulated as
P = P (m) · P (m−1|m) · · · P (2|m,m−1,...,3) .
Next, the Walsh-Hadamard transformation is performed on
ỹm and the result is shown in (10). When i = 1, we have As for the list detection algorithm, it is clear that its
performance is expected to be better than that of Algorithm
m−1
2∑ ( ) 1, but inferior to that of MLSE.
V1m−1 =2 m−1
· |h| +
2
j ∼ CN 2
ε̃m m−1
|h|2 , 2m−1 (σ̃εm )2 ,
j=1
Remark. Taking a second look at the noise term in (25) , we
(21) have:
( )
while at other locations, i.e., i = 2, . . . , 2m−1 , we arrive at: 1 ( s+1 ) N0
esj = ej + v̂js · es+1
j+2s ∼ CN 0, ,
2∑
m−1
( ) 2 2m−s
m−1 T
) am−1 m−1 m 2
Vim−1 = (−1)(ai−1 j−1 ·ε̃m
j ∼ CN 0, 2 (σ̃ε ) . where we find that the noise level decreases at an exponential
j=1 rate layer by layer. Thus, if the first few layers are recovered
(22)
correctly, the subsequent recovery will be correct with a high
Since {αm , bm } is recovered by searching for the specific
probability. This finding reveals the necessity to ensure the
element with the largest real component, once there exists
correctness of the first few layers. Inspired by this, to obtain
some i )∈ {2,
{( ( . .m−1 ) } }
. , 2m−1 that results in the event Ai =
a better detection performance in the list detection algorithm,
V1m−1
− V i < 0 , the detection will head in the
I I we can increase the number of lists for the first few layers,
wrong direction. On the basis of (21) and (22), the probability
while fixing the total number of paths.
of the event Ai is
2) Computational Complexity: In the Layer-by-Layer RM
2 detection algorithm, the Walsh-Hadamard transformation
0 − 2m−1
|h|
Pr(Ai ) = Φ √ , (WHT) plays the main role in the computational tasks. Thus,
m−1 m 2
2 (σ̃ε ) we firstly consider the multiplication operations of the WHT.
{ } Thanks to the recursive structure of the Walsh function, a fast
and the estimates α̂m , b̂m are correct with the probability WHT can be utilized to reduce the complexity, which takes
m−1 O(s · 2s ) multiplications when performed on a length-2s se-
2 ∪ quence. Hence, when only the WHT operations are considered,
P (m) = 1 − P̄ (m) = 1 − Pr Ai . (23)
the total complexity of Algorithm 1 is O((m − 2)2m ). By
i=2
contrast, the algorithm
( given
) in [16] exhibits a complexity
Using the classic union bound as the upper bound of the order up to O m2 · 2m . This is due to the fact that the
second term in (23) and considering that the probability P (m) algorithm in [16] needs a length-2m fast WHT to recover
9
each column of the matrix Pm , while in Algorithm 1, the of the element at the location ⟨αm 1 ⟩ turns out to be
fast WHT is performed on ỹs , s = m, m − 1, . . . , 2, whose ( )
m−1
length is decreasing exponentially layer by layer. Hence, our V⟨α m⟩
2∑
m−1 (1)
( m−1 m−1 ) sequence c1 is correct, the impact of the channel estimation
= c1,j c2,j + cm−1 m−1 m−1 m−1
1,j v1,j c2,j ti,j error (CEE) is relatively small. On one hand, in the case that
j=1
αs1 , s = m, . . . , 2 are all correctly recovered, the SINR of the
2∑
m−1 m−1
|h1 |2
( ) last layer is up to 2|h |2 +N according to (32), which ensures
− cm−1 m−1
1,j c2,j
2 0
that the CEE will not be too high. On the other hand, the LS
j=1
channel estimator at the end of the first iteration is capable of
2∑
m−1
( ) (1)
further improving the accuracy of h1 , and the second user’s
+ cm−1 m−1 m−1 m−1 m−1 m−1
1,j c2,j + c1,j ti,j c2,j v2,j RM sequence can be updated in the second iteration.
j=1 (1)
2∑
m−1 Whereas if the sequence c1 is incorrect, (33) is equivalent
( ) to adding an extra sequence to the original received signal,
− cm−1 m−1
1,j c2,j
which further lower the SINR. In [16] and [17], a traditional
j=1
SIC-based method is used for multi-sequence detection . Ex-
= m
χ1,(2,i) − χm−1
1,2 + χ(1,i),2 − χ1,2 ,
m m−1
plicitly, before detecting the next sequence, all the sequences
where χm m obtained so far are subtracted from the received signal. In
1,(2,i) denotes the inner product of c1 and the RM
sequence generated by the matrix-vector expressed as this scheme, the impact of any incorrectly detected sequences
[ ( m−1 )T ] always persists. By contrast, the iterative method adopted in
m
0 ai−1 our proposed algorithm deals with this problem in a better
P(2,i) = m−1 , (1)
ai−1 Pm−1
2
way. For example, if the detected sequence c1 is wrong but
[ m−1 ] (1)
c2 happens to be right, then at Stage (2, 1), after subtracting
(2,i) = ai−1,1 ⊕ · · · ⊕ ai−1,m−1 , b2
m−1 m−1
bm ,
the MAI term, the signal input to Algorithm 1 is equal to
and χm ( )
(1,i),2 is obtained in the similar way. (1) (1)
1,j + h2 c2,j − h2 c2,j + ej , j = 1, . . . , 2 ,
h1 cm m m m
It is obvious that the inner products of the RM sequences
play an important role in determining the performance of (1)
multi-sequence detection. The authors of [16] reveal that which is free from the impact of the incorrect result c1
(1)
the distribution of the inner products of second-order RM and h1 . Moreover, the algorithms in [16] and [17] need to
sequences is symmetric. Moreover, if two distinct matrices perform LS channel estimation after each sequence detection,
Pm m while our proposed algorithm executes LS channel estimation
1 and P2 satisfy that
only once in an iteration, which further reduces the complexity.
1 − P2 ) = 2r, r = 1, . . . , [m/2],
rank(Pm m
Finally, the properties of our proposed algorithms are sum-
then the magnitude of the inner product of their respective marized as follows:
generated RM sequences is either 2m−r or 0. This inspires • As a benefit of the proposed mapping method, the chan-
us to restrict the matrices, for example, to be taken from nel coefficients can be estimated directly according to
the DG(m, 2r) set [18], for further improving the attainable (15), which leads to a reduced computational complexity
performance of RM detection. without any performance loss.
Then, on the premise that {αm 1 , bm,1 } is correctly recov- • In the case where multiple active users possess the
ered, the sequence ym−1 is given as same αsk , our proposed mapping rule ensures that the
1 ( ) corresponding result of the WHT is reinforced like in
yjm−1 = h1 · cm−1 m−1
1,j + h2 c2,j
m−1
1 + v1,j · v2,j
m−1
+ ejm−1 ,
2 (V-B). As such, the successful recovery probability of
1( m ) αsk is expected to be enhanced.
where em−1j = m−1
ej + v1,j · em
j+2 m−1 . Combined with • By exploiting the nested structure of RM sequences, the
2
(26), it is found that for the first active user, the signal-to- matrix-vector pair is recovered layer by layer. During this
interference-and-noise-ratio (SINR) is enhanced. Furthermore, process, the interference and noise level is found to keep
as the algorithm proceeds, the SINR of ys , which is denoted on decreasing on the premise that {αs , bs } are recovered
as γ s , doubles layer by layer, specifically, correctly. On one hand, this ensures the accuracy of
2 channel estimation based on (15). On the other hand, this
2m−s |h1 |
γs = 2 , s = m, . . . , 1. (32) reminds us of the importance of improving the recovery
|h2 | + N0 reliability of the first few layers. Inspired by this, we can
This finding further underlines the necessity of ensuring the adjust the parameters of the list detection algorithm for
correctness of the first few layers. enhancing the performance.
(1) (1)
At the end of Stage (1, 1), the estimates c1 and h1 are • The inner products of RM sequences have a significant
obtained. Then we enter Stage (1, 2). At the beginning of Stage influence on the performance of multi-sequence detection.
(1, 2), the residual signal is calculated by Motivated by this, we can further restrict the choice of the
( ) matrices Pm to enhance detection capability. Intuitively,
(1,2) (1) (1)
= h2 cm2,j + h1 c1,j − h1 c1,j + ej , j = 1, . . . , 2 ,
m m m
yj this is achieved at the cost of shrinking the user space
(33) size.
which is then input to Algorithm 1. The accuracy of both • In contrast to the common SIC-based detection, the iter-
(1) (1)
c1 and h1 affects the performance at this stage. If the ative detection algorithm utilized in this paper is capable
11
0.6
In this section, we evaluate the performance of the proposed
algorithms in terms of their sequence detection accuracy, 0.5
TABLE III
S IMULATION PARAMETERS OF M ULTI -S EQUENCE D ETECTION .
10-1
LS,m=8
Sequence Length 28 , 210
Eq.(15),m=8
LS,m=9 SNR 20dB
Eq.(15),m=9
# of iterations in
5
“RM LLD, iterative”
Channel Estimation Error
-2
10
10-1
RM_SMD, SIC-based
RM_SMD, 4 shuffles, SIC-based
(a) m = 8 RM_LLD, SIC-based
list RM_LLD, ([2,2],2), SIC-based
list RM_LLD, ([4],1), SIC-based
10-2 RM_LLD, iterative
list RM_LLD, ([2,2],2), iterative
Channel Estimate Error
-3
10
10-4
10-5
5 6 7 8 9 10 11 12 13 14 15
Number of Active Users
Fig. 10. The channel coefficient estimation error versus the number of active
users in the system in the case of m = 8.
(b) m = 10
Fig. 9. The successful detection probability versus the number of active error of different algorithms in the multi-sequence scenario
users in the system. when m = 8. An insightful observation is that although
the successful detection probability of “list RM LLD, SIC-
based” and “list RM LLD, iterative” seems similar in Fig.
13
9 (a), the channel estimates of “list RM LLD, iterative” are [2] Huawei, 5G Network Architecture-A High-Level Perspective, 2016, white
obviously more accurate than those of “list RM LLD, SIC- paper at Huawei.com.
[3] 3GPP technical specifications 36.321. Evolved Universal Terrestrial Ra-
based”. Furthermore, the advantage of the iterative method dio Access (E-UTRA); Medium Access Control (MAC). Available at:
becomes more prominent for “list RM LLD, ([2, 2], 2)” and www.3gpp.org.
“list RM LLD, ([4], 1)”. Based on these results, we may [4] 3GPP technical specifications 36.211. Evolved Universal Terrestrial Radio
Access (E-UTRA); Physical channels and modulation. Available at:
conclude that the proposed iterative RM detection and channel www.3gpp.org.
estimation algorithm beneficially improves the user detection [5] G. Durisi, T. Koch, and P. Popovski, “Towards Massive, Ultra-Reliable,
and channel estimation performance. and Low-Latency Wireless Communication with Short Packets,” Proc.
IEEE, vol. 104, no. 9, pp. 1711-1726, 2016.
Fig. 11 depicts the convergence of the iterative RM detec- [6] H. S. Jang, S. M. Kim, K. S. Ko, J. Cha, and D. K. Sung, “Spatial group
tion and channel estimation algorithm for m = 8. It can be based random access for M2M communications,” IEEE Commun. Lett.,
seen that the convergence rate is related to the number of active vol. 18, no. 6, pp. 961-964, 2014.
[7] S. Kim, H. Kim, H. Noh, Y. Kim, and D. Hongy, “Novel Transceiver Ar-
users in the system. In the case of K ≤ 10, the algorithm can chitecture for an Asynchronous Grant-free NOMA System,” unpublished.
converge within 5 iterations. Although it needs more iterations [8] N. K. Pratas, H. Thomsen, C. Stefanovic, and P. Popovski, “Code-
to converge when the number of active users increases, the Expanded Random Access for Machine-Type Communications,” in IEEE
Globecom Workshops (GC Wkshps), Anaheim, 2012, pp. 1681-1686.
successful detection probability keeps rising before achieving [9] E. J. Candes and T. Tao, “Decoding by linear programming,” IEEE Trans.
the convergence. Hence, the value of nmax can be set according Inf. Theory, vol. 51, no. 12, pp. 4203-4215, 2005.
to the practical tradeoff between the detection capability and [10] L. Liu and W. Yu, “Massive Connectivity With Massive MIMO-Part I:
Device Activity Detection and Channel Estimation,” IEEE Trans. Signal
the complexity. Process., vol. 66, no. 11, pp. 2933-2946, 2018.
[11] G. Wunder, P. Jung, and M. Ramadan, “Compressive Random Access
Using a Common Overloaded Control Channel,” in IEEE Globecom
1 Workshops (GC Wkshps), San Diego, 2015, pp. 1-6.
[12] H. F. Schepker, C. Bockelmann, and A. Dekorsy, “Exploiting Sparsity in
0.9
Channel and Data Estimation for Sporadic Multi-User Communication,”
0.8
in Tenth Int. Symp. Wireless Commun. Syst., Ilmenau, 2013, pp. 1-5.
Successful Detection Probability
R EFERENCES
[1] ITU-R Rec. M.2083-0, IMT Vision - Framework and Overall Objectives
of the Future Development of IMT for 2020 and Beyond, Sept. 2015.
14