Skip to main content

ORIGINAL RESEARCH article

Front. Comms. Net., 14 June 2021
Sec. Wireless Communications
This article is part of the Research Topic Index Modulation for 6G Communications View all 5 articles

Index Modulation–Aided Mixed Massive Random Access

Zijie LiangZijie LiangJianping Zheng
Jianping Zheng*Jie NiJie Ni
  • State Key Laboratory of Integrated Services Networks, School of Telecommunications Engineering, Xidian University, Xi’an, China

In this study, a mixed massive random access scheme is considered where part of users transmit both common information and user-specific information, while others transmit only common information. In this scheme, common information is transmitted by index modulation (IM)–aided unsourced random access (URA), while user-specific information is by IM-aided sourced random access (SRA). Practically, IM-aided URA partitions channel blocks of one transmission frame into multiple groups and then employs the IM principle to activate only part of the channel blocks in each group. IM-aided SRA allocates multiple pilot sequences to each user and activates only one pilot sequence whose index carries the data information. At the receiver, the covariance-based maximum likelihood detection (CB-MLD) is employed to recover the active compressed sensing (CS) code words of URA and information of SRA jointly. To stitch the common information at different blocks of URA, a modified tree decoder is proposed to take the IM constraint into account. Furthermore, to relax the strict threshold requirement and improve the performance, an iterative CS detector and tree decoder are employed to decode the common information, where successive signal reconstruction and interference cancellation are utilized. Finally, computer simulations are given to demonstrate the performance of the proposed scheme.

1 Introduction

Massive machine-type communication (mMTC) (Bockelmann et al., 2016) is one of the three main scenarios in the fifth-generation cellular techniques, along with enhanced mobile broadband and ultra-reliable, low-latency communications. The mMTC is motivated by the typical Internet of Things (IoT) applications (Xu et al., 2014), such as smart health care, smart homes, smart manufacturing, and smart transportation. Thus, it is expected to provide wireless connectivity to a massive number of machine-type devices. Unlike human-type communication, in MTC, the packet size of uplink data traffic is short. Therefore, the control signaling overhead becomes very significant compared to the transmit data in the conventional grant-based multiple access. Another feature of mMTC is that the traffic pattern of each device may be sporadic, that is, there are only a small fraction of devices that are active at any time and frequency. Moreover, owing to the massive number of devices, it is impossible to assign orthogonal pilot sequences to all devices (Durisi et al., 2016; Dai et al., 2015; Hasan et al., 2013; Ding et al., 2017).

Unsourced random access (URA) is a promising technique to implement the massive connection in mMTC proposed recently in (Polyanskiy, 2017). In URA, active users transmit signals to base stations (BSs) or access points randomly, and thus avoid the control signaling overhead resulted by the handshake protocol in the grant-based access. Moreover, all users employ the same codebook, and unique pilot allocation for each user required in sourced random access (SRA) can be avoided. This makes URA very suitable for the Internet of Things with a massive number of users. Correspondingly, a receiver at a BS is designed to identify the list of transmit code words, and thus, the per-user probability of error (PUPE) is introduced as a performance metric.

Since the invention of URA, many low-complexity coding schemes have been proposed. In Ordentlich and Polyanskiy (2017), the T-fold slotted ALOHA with the compute-and-forward strategy was proposed. In Vem et al. (2017), this scheme was further studied and an improved scheme was proposed. In this improvement, the user information was first repeated and then transmitted over multiple blocks at the transmitter, and successive interference cancellation (SIC) was utilized at BS.

In Amalladinne (2020), the concatenated URA scheme consisting of inner and outer codes was proposed. In this scheme, the divide-and-conquer strategy was utilized, and the transmit frame is divided into multiple channel blocks. The common compressed sensing (CS) code is employed as an inner code in all blocks and a simple parity-check code as outer tree code across blocks. At BSs, the active code words of inner code are detected through CS-based sparse signal recovery, and the outer tree decoder is utilized to stitch the transmit information sequences in different channel blocks. In Amalladinne et al. (2020a), an enhanced decoder was proposed which performed inner CS detection and outer tree decoding in tandem. This method can reduce the search size of the inner CS detector in later channel blocks and thus reduce the complexity. In Fengler (2019), the concatenated URA scheme was extended to massive MIMO, and covariance-based maximum likelihood detection (CB-MLD) (Haghighatshoar et al., 2018; Fengler et al., 2021) was utilized to perform the inner CS detection. In Xie et al. (2020), the URA for correlated massive MIMO was further studied, and an improved coordinate descent method was proposed to reduce the iteration number. In Fengler et al. (2019), the sparse regression code (SPARC) was utilized in URA, where the approximated messing passing algorithm (AMP) (Donoho et al., 2009; Rangan, 2011) was employed to perform the inner CS detection. In Amalladinne et al. (2020b), motivated by Amalladinne et al. (2020b), an integrating AMP and belief propagation (BP) method was proposed to perform inner CS detection and outer tree decoding in tandem.

In Pradhan et al. (2019), another scheme was proposed for Gaussian channels, where the transmit data are partitioned into two parts. The former is transmitted using a CS code and also acts to determine the corresponding interleaving pattern. The latter is conveyed using low-density parity-check (LDPC)–coded interleave-division multiple access (IDMA) scheme. In Kowshik et al. (2020), this scheme was extended to fading channels, where fading coefficient estimation and LDPC decoding were implemented by the BP algorithm based on the joint factor graph. In Li et al. (2020a), the SPARC-LDPC scheme was proposed for massive MIMO systems, where the CS code in (Pradhan et al., 2019) is replaced by the SPARC. In Marshakov et al. (2019), Pradhan et al. (2020), Zheng et al. (2020), the polar code was taken to replace the LDPC code, in conjunction with the receiver framework of treat interference as noise and SIC (TIN-SIC).

In this article, we extend our earlier works in Liang and Zheng (2020), Liang and Zheng (2021), Liang et al. (2021), and the massive random access scenario where users are divided into two classes is considered. In the first class, users transmit both common and user-specific information. These users need some key devices to transmit user identification (UID)–related information, besides common information uncorrelated to UID. For example, UID-related information can be some urgent event related to its location, and the BS can know the location where urgent event happens and thus make fast response by identifying the active user. In the second class, users transmit only common information. For this scenario, an index modulation (IM) (Basar et al., 2013a; Wen et al., 2017)–aided mixed massive random access is proposed here, where a novel IM-aided URA scheme is presented to transmit common information, and IM-aided SRA (Senel and Larsson, 2018; Ni and Zheng, 2021) is utilized to transmit user-specific information. In IM, only part of resources (time/frequency/space/code sequence) is activated to transmit information by conventional modulations, and the resource activation pattern also carries information. In general, IM has attracted much attention in many aspects due to the potential advantages. For example, better error performance (Basar et al., 2013b; Zheng and Chen, 2017), stronger robustness in the rapidly time-varying channel (Basar et al., 2013c), higher spectral efficiency (Wen et al., 2016), and energy efficiency (Wen et al., 2014). Moreover, in the massive multiple access, IM has been employed in coherent grant-based NOMA (Arslan et al., 2020; Althunibat et al., 2019; Tusha et al., 2020; Li et al., 2020b) and non-coherent grant-free NOMA (Senel and Larsson, 2018; Ni and Zheng, 2021; Ni and Zheng, 2020).

The proposed IM-aided URA is constructed on the general framework of a concatenated URA scheme (Fengler et al., 2019; Amalladinne et al., 2020a) to transmit common information. The motivation is that with the implementation of IM in URA, the signal to be recovered will be sparser, which will facilitate the CB-MLD and result in better decoding performance. On the other hand, the implementation of IM will decrease the number of parity check bits in the outer code, which will increase the complexity of the tree decoder generally. However, the better CB-MLD results will reduce the false alarm probability and thus decrease the number of candidate-active code words. This will instead reduce the complexity of the tree decoder since the CB-MLD results are inputs of the tree decoder. Therefore, with proper design of IM, a better trade-off by IM-aided URA can be expected.

Concretely, in the proposed IM-aided URA, the Ntot channel blocks in one transmit frame are partitioned into G groups, each consisting of N consecutive blocks. In each group, only Na blocks are activated to transmit CS code words. Correspondingly, the transmit information is divided into two parts: the first part is to determine the active channel blocks in each group and the second is to determine the transmitted CS code words in active blocks. In general, the proposed IM-aided URA decreases the average number of active CS code words in each channel block, thus can increase the performance of inner CS detection. In the IM-aided SRA for user-specific information transmission, each user is allocated D=2q unique pilot sequences, and only one pilot sequence is activated, which is determined by q information bits according to the IM principle.

At the BS, the CB-MLD is first employed block by block to estimate active code words of IM-aided URA and user-specific information of SRA simultaneously. Moreover, to stitch the common information in different blocks, a modified tree decoder is proposed to take the IM signal property into account. Next, to relax the strict threshold requirement and improve the performance, an iterative CS detection and tree decoding are employed to decode the common information, where the covariance of the received signal associated with code words decided in the last iteration is reconstructed and pre-subtracted, and the resulted residual covariance is used for inner CS detection in the current iteration.

The main contributions of this study are summarized as follows:

(1) A mixed massive random access scheme is presented, where part of vital users transmit both common information and user-specific information, while other users transmit only common information. This scheme can model the random access scenario consisting of key devices whose UID is required at the BS and conventional devices whose transmit information is the only interest for the BS.

(2) An IM-aided URA technique is proposed for the common information transmission. Moreover, the corresponding modified tree decoder is presented. The proposed scheme shows better performance than conventional URA when the transmit information is short, for example, 36 bits per frame in our simulations.

(3) An iterative receiver is proposed to decode the common information. The iterative receiver can lift the performance and relax the requirement of thresholds in the inner CS detector, compared with conventional non-iterative receiver.

The rest of this article is organized as follows. In Section 2, the signal model of the proposed mixed massive random access is given. In Section 3, the CB-MLD is presented. In Section 4, a modified tree decoder is described. In Section 4, the proposed iterative receiver is presented. Finally, computer simulation results are given in Section 6, and we conclude this study in Section 7.

Notations: For a set S, |S| denotes its size. For a matrix A, |A| and tr(A) denote its determinant and trace, respectively. For a vector v, diag{v} denotes the diagonal matrix with v on the main diagonal. The superscripts T and H indicate the transpose and Hermitian transpose of a vector or matrix, respectively. Furthermore, denotes the complex field. CN(0,σ2) denotes that complex Gaussian distribution with zero mean and variance σ2 is the maximum integer no larger than the argument and denotes the Kronecker product. The notations 1n and en present the all-one vector of length n and the nth column of the identity matrix I with proper size, respectively. Moreover, the set {1,2,,N} is abbreviated to [N]. Finally, definitions of some variables in this article are listed in Table 1.

TABLE 1
www.frontiersin.org

TABLE 1. Definitions of some variables in the article.

2 Signal Model

2.1 Transmitter

The uplink IM-aided URA considered here consists of K single-antenna users and one M-antennas BS, as shown in Figure 1. In the mMTC-enabled massive MIMO system, K and M are of the order of hundreds or thousands. The K users are divided into two classes. As shown in Figure 2, in the first class with K1 users in set K1, each user transmits both user-specific information and common information to the BS using IM-aided URA and IM-aided SRA, respectively. In the second class with K2 users in set K2, each user transmits only common information via IM-aided URA. Among all the K users, only Ka, KaK, users in set Ka are active and transmit information to the BS in one transmit frame. Furthermore, Ka is partitioned into Ka,1 and Ka,2, which denote the sets of Ka1 active users in K1 and Ka2 active users in K2, respectively. In the proposed mixed massive random access scheme, one transmit frame consists of Ntot sub-blocks, each occupying L channel slots. The common information and user-specific information transmissions are described as follows.

FIGURE 1
www.frontiersin.org

FIGURE 1. Uplink mMTC system. All users are divided into two classes with sets K1 and K2. Users in K1 transmit both user-specific and common information, and users in K2 transmit only common information. Moreover, only part of users in both classes is active due to the sporadic transmission character.

FIGURE 2
www.frontiersin.org

FIGURE 2. Block diagram of transmitter in the mixed massive random access.

2.1.1 Common Information Transmission

The common information is transmitted by all active users. For each active user to transmit the common information, the IM-aided URA is employed. In the proposed IM-aided URA, all the Ntot sub-blocks in one transmission frame are first divided into G groups, each consisting of consecutive N sub-blocks. Then, each active user transmits common information only by Na out of N channel blocks in each group. In the activated channel blocks, the concatenated scheme is employed to transmit common information. The inner code of this concatenated scheme uses the CS codebook to facilitate the sparse multiuser detection at the receiver, and the outer code uses simple parity check to ensure the integrity of the transmit information in different sub-blocks (Fengler et al., 2019; Amalladinne et al., 2020a).

The transmitter of the proposed URA-IM scheme is shown in Figure 3. Consider the active user k. The length B0 information sequence mk{0,1}B0 is first encoded by tree code through by random causal parity check bits, and the resulted length B1 coded bit sequence ck{0,1}B1 is further portioned into two parts ck,1{0,1}B2 and ck,2{0,1}B3, with B2+B3=B1. The structure of coded bit sequence ck is illustrated in Figure 4.

FIGURE 3
www.frontiersin.org

FIGURE 3. Transmission of common information by the proposed IM-aided URA.

FIGURE 4
www.frontiersin.org

FIGURE 4. Structure of coded bit sequence ck in the proposed IM-aided URA.

The first part ck,1=[ck,1,1T,,ck,1,GT]T is used as index bits to determine the active channel blocks in G groups. Concretely, in the gth group, ck,1,g{0,1}B4 is used to determine the Na active blocks in this group, and the indices of active blocks are collected as the vector ik,g=[i(k,g,1),,i(k,g,Na)]T with 1i(k,g,n)N,n=1,,Na. Define the channel block activity indicator as βk,g,n=1 if the nth block of the gth group is activated by the user k, that is, it exists some m such that i(k,g,m)=n, and βk,g,n=0 otherwise.

The IM principle is utilized to perform the mapping from ck,1,g to ik,g. By IM, only 2B4 active patterns (APs) are legitimate, and the remaining (NNa)2B4 APs are forbidden. Denote the set of 2B4 legitimate APs as AP={AP1,,AP2B4} with APm,m=1,,2B4 being the Na-dimensional vector including the indices of active blocks in the mth legitimate combination. Obviously, it has B4=log2(NNa), B2=B4G, and ik,gAP. The bit sequence ck,1,g is used to determine the AP, for example, APm, and then set ik,g=APm, where m is the decimal representation of ck,1,g. An IM mapping example with N = 5, Na = 2, and B4 = 3 is given in Table 2.

TABLE 2
www.frontiersin.org

TABLE 2. IM mapping example with N=5, Na=2, and B4=3.

On the other hand, the second part ck,2=[ck,2,1T,,ck,2,GT]T is used to select the transmit code words from the inner Gaussian CS codebook A=(a1;;a2J)L×2J with E||aj||2=LP,j=1,,2J. Concretely, in the gth group, ck,2,g=[ck,2,g,1T,,ck,2,g,NaT]T{0,1}B5 is used to determine the transmit code words ak,g=[al(k,g,1)T,,al(k,g,Na)T]TLNa in Na active blocks in this group, with the index l(k,g,n) being the decimal representation of ck,2,g,n for n=1,,Na. Obviously, it has B5=NaJ and B3=B5G=NaJG.

Denote xk,g,n as the transmit signal in the nth block of the gth group. It has

xk,g,n=βk,g,nal(k,g,m),(1)

where the index m is such that i(k,g,m)=n when βk,g,n=1. Then, the transmit signal of the user k in the gth group xk,g=[xk,g,1T,,xk,g,NT]T can be presented by

xk,gT=n=1Naei(k,g,n)Tal(k,g,n)T,g=1,,G,(2)

where ei(k,g,n) is the i(k,g,n)-th column of the identity matrix IN.

Finally, the transmit signals of the user k in all groups are collected as xk=[xk,1T,,xk,GT]T.

Example 1: Consider the case of J=4, N=5, and Na=2. Assume the B4 = 3-bit information sequence ck,1,g selects AP=[1,3]T, that is, i(k,g,1)=1 and i(k,g,2)=3. The NaJ = 8-bit information ck,2,g determines l(k,g,1)=3 and l(k,g,2)=12. Then, the transmit signal of the user k in the N=5 channel blocks of the gth group is xk,g=(a3,0,a12,0,0).

Finally, from Figure 2, for the active user k in K2, xk,g,n is sent to BS, and for the active user k in K1, ρxk,g,n is sent. Here, ρ is the power factor allocated to common information transmission by the user K1.

Remark 1: By employing the proposed IM-aided URA scheme to transmit common information, the average number of active code words in each block is NaKa/N. Note that the average number of active code words in convention URA (Fengler et al., 2019; Amalladinne et al., 2020a) is Ka. The signal to be estimated will be sparser in IM-aided URA, which will result in better CB-MLD performance. This is also the major motivation of this IM-aided URA scheme.

Remark 2: Compared with conventional URA (Fengler et al., 2019; Amalladinne et al., 2020a), the number of parity check bits of the proposed IM-aided URA will be reduced from GNJB0 to (B4+Na×J)GB0. This will increase the complexity of the outer tree decoder due to the less parity check constraints. On the other hand, due to the sparser signal to be estimated, the number of decided code words of the inner CS detector (also the inputs to outer tree decoder) will be decreased, and thus the complexity of the outer tree decoder can be reduced. In summary, there is a trade-off between negative and positive impacts on complexity due to the introduction of IM in the proposed IM-aided URA. In Section 6, simulation results show that the positive impact outperforms the negative in the case of B0=36-bit information transmission per user.

2.1.2 User-Specific Information Transmission

The user-specific information is also transmitted by active users in K1. To transmit the qNtot-bit specific information, the IM-aided non-coherent scheme (Senel and Larsson, 2018) is employed here. Concretely, each user in K1 is allocated D length L unique pilot sequences, and this allocation is assumed to be known at the BS which is also used to identify the active user. Denote the D=2q Gaussian pilot sequences allocated for device k as φk,1,,φk,D with φk,d=[φk,1,,φk,L]T and E||φk,d||2=LP, d=1,,D. In each block, active user selects only one active pilot sequence as the transmit signal, which is determined by user-specific information according to the IM principle. The transmit user-specific signal of the active user k can be presented as 1ρd=1Dζk,d(g,n)φk,d, where the pilot activity indicator ζk,d(g,n)=1 if the dth pilot sequence of the device k is activated in the nth block of the gth group, and ζk,d(g,n)=0 otherwise.

Remark 3: Here, for simplicity, only one active pilot sequence (Senel and Larsson, 2018) is considered. This can be extended straightforwardly to the case where multiple pilot sequences are activated (Ni and Zheng, 2021).

Finally, the superimposed transmit signal of user k in the nth block of the gth group can be presented by

sk,g,n=αk(ρxk,g,n+(1ρ)d=1Dζk,d(g,n)φk,d),kK1sk,g,n=αkxk,g,n,kK2,(3)

where αk is the user activity indicator and αk=1 if user k is active, and αk=0 otherwise.

2.2 Received Signal

At the BS, the received signal Yg,nL×M in the nth block of the gth group can be presented as

Yg,n=kK1sk,g,nh˜k,g,nT+kK2sk,g,nh˜k,g,nT+Zg,n=kK1αk(ρxk,g,nh˜k,g,nT+(1ρ)d=1Dζk,d(g,n)φk,dh˜k,g,nT)+kK2αkxk,g,nh˜k,g,nT+Zg,n.(4)

Here, Zg,nL×M is the Gaussian noise with independent and identically distributed (i.i.d.) entriesCN(0,σ2) and ck,g,n is the channel from device k to the BS in the nth block of the gth group and is assumed to be block-independent and unknown at the BS. Further, it has h˜k,g,n=ωkhk,g,n, where ωk is the large-scale fading coefficient and hk,g,n is the small-scale fading coefficient with i.i.d. entriesCN(0,1).

Assuming the first K1 users belong to the first class, after some algebra, Eq. 4 can be rewritten as

Yg,n=ABg,nG1/2Hg,n+ΦΛg,n1/2Hg,n,1+Zg,n.(5)

Here, G=diag(ρω1,,ρωK1,ωK1+1,,ωK), Hg,n=[Hg,n,1,Hg,n,2]K×M with Hg,n,1=[h1,g,n,,hK1,g,n]TK1×M and Hg,n,2=[hK1+1,g,n,,hK,g,n]TK2×M , Hg,n,1=[1DTh1,g,n,,1DThK1,g,n]TDK1×M. Bg,n{0,1}2J×K is a binary activity matrix. Denote the index of active CS code word as l(k,g,m) with such m that i(k,g,m)=n when βk,g,n=1. The kth column bk(g,n) of Bg,n can be defined as follows: bk(g,n)=0 if the user k is not active and bk(g,n) is the all-zero vector, except a single 1 in position l(k,g,m) otherwise. Moreover, it has Φ=[φ1,1,,φ1,D,,φK1,1,,φK1,D]L×K1D and Λg,n=diag(λ1,1(g,n),,λ1,D(g,n),,λK1,1(g,n),,λK1,D(g,n)) with λk,d(g,n)=(1ρ)αkζk,d(g,n)ωk.

3 Covariance-Based ML Detection

In this section, the CB-MLD is presented. To facilitate the presentation, Eq. 5 is first represented according to the following procedure.

Let γr(g,n)=kKa,1ρωkbr,k(g,n)+kKa,2ωkbr,k(g,n),r[2J] with br,k(g,n) being the rth entry of bk(g,n) and Γg,n=diag(γ1(g,n),,γ2J(g,n)). Then, Eq. 5 is equivalent to

Yg,n=AΓg,n1/2H˜+ΦΛg,n1/2Hg,n,1+Zg,n,n=1,,Na,g=1,,G,(6)

where H˜2J×M has Gaussian i.i.d. entries CN(0,1) and is independent of Hg,n,1. Noting that all the data information is conveyed by Γ and Λ, the goal of multiuser detection is to recover them.

From Eq. 6, the columns yg,n,m, m=1,,M, of Yg,n are i.i.d. vectors with CN(0,g,n). From Lemma 1 of Ni and Zheng (2021), for the case of only one active pilot sequence considered in Section 2.1.2, it has

1ME[(ΦΛg,n1/2Hg,n,1)(ΦΛg,n1/2Hg,n,1)H]=1MΦΛg,nΦH=k=1K1d=1Dλk,d(g,n)φk,dφk,dH.(7)

Then, the covariance matrix Σg,n can be computed by the following equation:

Σg,n=1ME[Yg,nYg,nH]=AΓg,nAH+ΦΛg,nΦH+σ2I=(A,Φ)(Γg,n1/2Λg,n1/2)(A,Φ)H+σ2I=r=12Jγr(g,n)ararH+k=1K1d=1Dλk,d(g,n)φk,dφk,dH+σ2I.(8)

On the other hand, the empirical covariance matrix can be acquired by the following equation:

Σ^l=1MYg,nYg,nH=1Mm=1Myg,n,myg,n,mH.(9)

Define the log-likelihood function by the following equation:

f(γ(g,n),λ(g,n))=1Mlogp(Yg,n|γ(g,n),λ(g,n))=1Mm=1Mlogp(yg,n,m|γ(g,n),λ(g,n))=log|AΓg,nAH+ΦΛg,nΦH+σ2I|+tr((AΓg,nAH+ΦΛg,nΦH+σ2I)1Σ^g,n).(10)

Then, the ML estimate can be acquired by the following equation:

(γ^(g,n),λ^(g,n))=argmaxγ(g,n)+2J,λ(g,n)+K1Nf(γ(g,n),λ(g,n)).(11)

This problem is non-convex and can be solved efficiently by decent method (Haghighatshoar et al., 2018; Fengler et al., 2021). For autonomy, this algorithm is summarized in Algorithm 1, whose complexity is linear in 2J+K1D.

ALGORITHM 1
www.frontiersin.org

Algorithm 1. CB-MLD

After obtaining λ^(g,n) from Eq. 11, the user-specific information is first determined by threshold-aided detection. Concretely, first compute the metric as follows:

ςk=g=1Gn=1Nmaxd=1,,Dλ^k,d(g,n),k=1,,K1,(14)

where the max operation is from the fact that only one λk,d(g,n) is non-zero since only one pilot sequence is activated. Then, the user activity is decided by the threshold-aided method. Concretely, the metric ςk is compared with a predetermined threshold γth,1, and α^k=1 if ςkvth,1 and α^k=0 otherwise. If α^k=1, the pilot activity indicator is further estimated as ζ^k,d(g,n)=1 if d=d*, and ζ^k,d(g,n)=0, otherwise, where

d*=argmaxd=1,,Dλ^k,d(g,n).(15)

Transmit user-specific information can then be recovered by inverse IM mapping from ζ^k,d(g,n),d[D] to information bits.On the other hand, after obtaining γ^r(g,n),r[2J],n=1,,N,g=1,,G from Eq. 11, the set of indices of active code words in the nth block of the gth group is decided by the following equation:

Sg,n={r[2J]|γ^r(g,n)γth,2},(16)

where γth,2 is the predetermined threshold for common information.Note that not all code words in S1,1×S1,2××S1,N××SG,1×SG,2××SG,N are legal. The outer tree decoder is used to identify the legal code words and then recover the corresponding information sequences. To guarantee the performance, the IM constraint should be integrated into the outer tree decoder, which will be described in the next section.

4 Modified Tree Decoder for Common Information

To take IM constraint into account, the modified outer tree decoder is processed group by group. Here, only the processing of the gth, g=1,,G, group is considered. It is assumed that Npath survived paths have been obtained from the processing of the (g1)-st group, and the corresponding bit streams are denoted as TC(l,1:(g1)(NaJ+B4)),l=1,,Npath, that is, each path up to the (g1)-st group has a length (g1)(NaJ+B4) bit stream. The nodes in the decoding tree are partitioned into two classes, index bit node and channel block node, which are associated with the index bit stream ck,1,g and CS bit stream ck,2,g, respectively. In the following, the processing procedure of the gth group is presented in detail.

4.1 Index Bit Node Processing

In the index bit node, for each survived path l obtained from the last node processing, the 2B4 possible APs are tested. Denote the binary representation of the AP index ap as bap for ap=1,,2B4. If the concatenation of TC(l,1:(g1)(NaJ+B4)) with bap satisfies the parity check, that is, APap passes the check, the lth path survives in this node, and the bit stream is updated as TC(l,1:(g1)(NaJ+B4)+B4)=(TC(l,1:(g1)(NaJ+B4)),bap). Moreover, the legitimate APs APap are saved in TC1 for the upcoming channel block node processing. The detailed implementations are given in Lines 4–14 in Algorithm 2.

4.2 Channel Block Node Processing

The whole process is done for each survived path l of TC obtained from the last node processing. For each survived index bit node APap, the channel block nodes positioned by APap(1),,APap(Na) are processed recursively. In the first block node APap(1), first, for each code word in Sg,APap(1), compute the binary representation of the code word index and then test whether it satisfies the parity check. If it passes this check, a new path is found and survives. The same operations in subsequent block nodes are done until all the Na active block nodes are tested. The detailed implementations are given in Lines 16–31 in Algorithm 2. An illustration of the tree-decoder procedure with Na=2 in the gth group is given in Figure 5.

FIGURE 5
www.frontiersin.org

FIGURE 5. Illustration of the modified outer tree decoder in the gth group with Na = 2. The notation “✓” denotes this node passes the parity-check.

5 Iterative Receiver for Common Informaiton

5.1 Motivations and Ideas

By the CB-MLD described in Section 3, we observe a good decoding performance of user-specific information from extensive simulations. On the other hand, the decoding performance of common information is highly dependent on the threshold γth,2. However, the optimal γth,2 is involved with multiple system parameters, and its optimization is very difficult. In general, a larger γth,2 will result in higher probability of misdetection, while lower probability of false alarm and lower computational complexity of the outer decoder. In Fengler et al. (2019), it is selected carefully through simulations and varies from different system parameters.

Here, the iterative receiver for common information is studied. The basic ideas are two-fold. First, the SIC strategy is employed where the covariance of active code words obtained in former iteration is reconstructed and pre-subtracted from the empirical covariance matrix. This means that the signal to be estimated will be sparser in the subsequent iterations and thus can improve the performance of CB-MLD. Second, the strict threshold requirement can be relaxed since multiple iterations exist, and the threshold should decrease with iteration number. Then, in former iterations, low probability of false alarm can be guaranteed by larger threshold which also alleviates the error propagation. In subsequent iterations, the smaller threshold can reduce the probability of misdetection. In the following text, the iterative receiver is described in detail.

5.2 Covariance Reconstruction and Cancellation of User-Specific Information

Noting that a good decoding performance of user-specific information is observed using CB-MLD, the covariance associated with user-specific information can be reconstructed and canceled first.

ALGORITHM 2
www.frontiersin.org

Algorithm 2. Modified Outer Tree Decoder

Denote the set of decided active users associated with user-specific information as follows:

K^a,1={k[K1]|α^k=1}.(17)

Then, the Λg,n can be reconstructed as follows:

Λ¯g,n=diag(λ¯(g,n)),(18)

where

λ¯k,d(g,n)={λk,d(g,n)kK^a,1andd=d*0kK^a,1anddd*0kK^a,1.(19)

Therefore, the covariance is reconstructed and subtracted from the empirical covariance by the following equation:

Σ^˜y,g,n=Σ^y,g,nΦΛ¯g,nΦHAΓg,nAH+σ2I,(20)

where the approximation Λ¯g,nΛg,n is utilized and from the good decoding performance of user-specific information by CB-MLD.

5.3 Iterative Receiver for Common Information

The block diagram of the proposed iterative receiver for common information is shown in Figure 6. By using the SIC strategy, the processing in the tth iteration is described as below.

FIGURE 6
www.frontiersin.org

FIGURE 6. Block diagram of the proposed iterative receiver for common information.

Denote the modified output list of inner CB-MLD in the tth iteration as follows:

Sg,nt={r[2J]|γ^g,nr>γth,2t},(21)

where γth,2t is the threshold in this iteration. Here, this threshold is set as follows:

γth,21=γ0,γth,2t=max(γth,21αt1Δ,ε),t=2,3,,(22)

where γ0>0 is the initial threshold which is usually set to be a large value to reduce the probability of false alarm, Δ is the step size with small positive value, and α>1 is the reducing factor with iteration number. Moreover, ε is introduced to avoid the resulted very small threshold by the exponential decreasing rule.

Denote the message list after outer modified tree decoder as follows:

t={r=Δ[r1,1,,r1,N,,rG,1,,rG,N]T|rg,nSg,ntandrpassestheouterparitycheck}(23)

and the corresponding list in the nth block of group g as follows:

g,nt={rg,n|rt}.(24)

Note that one code word in some sub-frame can appear multiple times in the message list of the tree decoder output. Define the times of index r appears in g,nt by the following equation:

nrg,n,t=|{r[2J]|rg,nt}|(25)

and the set of indices which appear m times, m0, as follows:

g,n,m={r[2J]|nrg,n,t=m}(26)

Then, the Γg,n is reconstructed by the equation as follows:

Γ¯g,nt=diag(γ^¯(g,n,t)),(27)

with γ^¯(g,n,t)=[γ^¯1(g,n,t),γ^¯2(g,n,t),,γ^¯2J(g,n,t)]T and

γ^¯r(g,n,t)={0,rg,ntξ(nrg,n,t),rg,nt.(28)

Here, ξ(nrg,n,t) is the empirical average of γr associated with the code word ar appearing nrg,n,t times in the tth iteration and defined as follows:

ξ(nrg,n,t)=1|g,n,nrg,n,t|lg,n,nrg,n,tγ^l(g,n,t),l=1,,2J.(29)

Example 2: Assume g,nt={2,2,3,3,1} from 5 legal message sequences in t and J=2. Then, it has g,n,1={1} and g,n,2={2,3}. Furthermore, assume γ^1(g,n,t)=0.2, γ^2(g,n,t)=0.4, and γ^3(g,n,t)=0.5. Then, it has ξ(1)=γ^1(g,n,t)=0.2 and ξ(2)=0.5(γ^2(g,n,t)+γ^3(g,n,t))=0.45. Finally, γ^¯1(g,n,t)=ξ(1)=0.2, γ^¯2(g,n,t)=γ^¯3(g,n,t)=ξ(2)=0.45, and γ^¯4(g,n,t)=0.

Next, the reconstructed covariance is subtracted from the residual empirical covariance matrix by the following equation:

Σ^y,g,nt+1=Σ^y,g,ntAΓ¯g,ntAH(30)

with initialization Σ^y,g,n1=Σ^˜y,g,n. The corresponding theoretical residual covariance matrix is

Σ^y,g,nt+1=Σ^y,g,ntAΓ¯g,ntAH=A(Γg,nt=1tΓ¯g,nt)AH+σ2I=AΓ˜g,ntAH+σ2I,(31)

where Γ˜g,nt=Γg,nt=1tΓ¯g,nt is the residual after the tth iteration. Then, given Σ^y,g,nt+1, the inner CB-MLD is employed again to obtain the estimate γ^r(g,n,t+1) of Γ˜g,nt. Noting that Γ˜g,nt becomes sparser with the increase in the iteration number, an improved detection performance can be achieved.

Before sending to outer tree decoder, γ^r(g,n,t+1) is further modified as

γ^r(g,n,t+1)=max(γ^r(g,n,t+1),γ^r(g,n,t)ξ(nrg,n,t)).(32)

This modification is to take the following case into account when γ^r(g,n,t+1) is smaller than γth,2t+1. This case is that some code words appear multiple times, but only less times (including zero time) were accepted by the outer tree decoder in the tth iteration, that is, γ^r(g,n,t) is larger than the average ξ(nrg,n,t).

ALGORITHM 3
www.frontiersin.org

Algorithm 3. Iterative Receiver for Common Information

In summary, the iterative receiver is summarized in Algorithm 3.

Remark 4: In the threshold Eq. 22, four parameters ε,γ0,α, and Δ are required to be selected properly. From our simulations in Section 6, an experimental setting of these parameters will show good performance for various system settings. However, in the conventional non-iterative receiver, the threshold γth,2 in Eq. 16 should be different for various system settings to ensure good performance. Therefore, in conjunction with multiple iterations, the threshold setting by Eq. 22 can relax the requirement of threshold selection for various system settings.

6 Simulation Results

In this section, simulation results are given to validate the performance of the proposed IM-aided mixed massive random access. For common information, the per-user probabilities of misdetection and false alarm are defined as follows:

Pc,md=1KakKaP(mk^)(33)
Pc,fa=|^\{mk,kKa}||^|,(34)

where ^ is the output message list at the receiver and mk is the message sent by the user k. The per-user error probability of common information is defined as Pc,e=Pc,md+Pc,fa. For user-specific information, the probabilities of misdetection and false alarm are defined as follows:

Pus,md=1E[|Ka,1K^a,1|]Ka,1(35)
Pus,fa=E[|K^a,1\Ka,1|]K1Ka,1,(36)

where K^a,1 is the decided active user set defined in Eq. 17. Further, the bit error rate (BER) is defined as follows:

Pus,e=Pus,md+(1Pus,md)Pe,b,(37)

where Pe,b is the BER of the correct decision user in Ka,1K^a,1.

The system parameters for common information of the IM-aided URA scheme are N=2, Na=1, G=16, Ntot=32, J=11, B0=36, B1=192, B2=16, and B3=176. Therefore, there are B1B0=156 parity check bits in the outer tree code word, and the total code rate is 36/(32×100)=0.01125. For comparison, the performance of conventional URA (Fengler et al., 2019) is also given. In conventional URA, the parameters are Ntot=32, J=11, B0=36, and B1=32×11=352, and the number of parity check bits is B1B0=316. The total code rate of URA is also 0.01125. The check profile of IM-aided URA is [2,10,. . . ,10,12,12] for the GNa=16 active blocks and that of URA is [0,10,. . . ,10,11,11,11,11,11,11] for the Ntot=32 blocks. All the large-scale fading coefficients are set as gk=1,k=1,,K, which corresponds to the perfect power control at users. The signal-to-noise ratio (SNR) of common information EbN0=PRcσ2 is fixed as 0dB in all simulations, where Rc=B0GNL is the total code rate. Furthermore, in the iterative receiver for common information, the parameters in Eq. 22 are set as ε=0.08, γ0=0.3, α=1.646, and Δ=0.06824. The parameters for user-specific information transmission are q=2 and D=4.

Moreover, the power allocation coefficient is set as ρ=0.5. In general, we set K1=0.05K, K2=0.95K, Ka=1/15K=4/3K1, Ka1=0.05Ka, and Ka2=0.95Ka in all simulations. This means that a small fraction of users belong to the first class, and all users have the same activity probability. Moreover, 80 transmission frames are tested to obtain all the simulation results.

In Figure 7, the error probability vs. the number of active user Ka is given. Here, no iterative receiver is utilized in URA-IM. The number of BS antennas is M=200, and the channel block length is L=100. The thresholds γth,1 and γth,2 are set to 2 and 0.2 in IM-aided URA and are set to 4 and 0 in conventional URA. These settings of thresholds show good performance from extensive computer simulations. From this figure, for user-specific information, IM-aided URA has better Pus,e performance than conventional URA, which can be interpreted by that IM-aided URA, resulting in the signal to be estimated sparser. For common information, IM-aided URA shows better performance than conventional URA when Ka is larger than about 190.

FIGURE 7
www.frontiersin.org

FIGURE 7. Error probability vs. the number of active users Ka. Here, the number of BS antennas is M = 200. The channel block length is fixed at L = 100. For user-specific information, misdetection is not observed in both schemes, and false alarm is observed only at Ka=350 in conventional URA (Fengler et al., 2019).

In Figure 8, the performance with M=300 is given. The other settings are the same as those in Figure 7. From the figure, for user-specific information, Pus,e, of IM-aided URA is observed only at Ka=350, which outperforms that of conventional URA enormously. For common information, IM-aided URA shows better performance than conventional URA when Ka is larger than about 250. Finally, compared with the result in Figure 7 with M=200, better performance is achieved with increased M.

FIGURE 8
www.frontiersin.org

FIGURE 8. Error probability vs. the number of active users Ka. Here, the number of BS antennas is M=300. The channel block length is fixed at L = 100. For user-specific information, misdetection and false alarm are not observed in both schemes.

Figure 9 gives the error probability vs. channel block length L with fixed Ka=200 and M=100. The other settings are same as those in Figure 7. For user-specific information, the performance of Pus,e in the IM-aided URA scheme is much better than that of conventional URA in all L considered here. For common information, the Pc,e performance of IM-aided URA is also much better than that of conventional URA.

FIGURE 9
www.frontiersin.org

FIGURE 9. Error probability vs. channel blocks length L. Here, the numbers of BS antennas and active users are M=100 and Ka=200, respectively. For user-specific information, misdetection is observed only at L=60 in conventional URA (Fengler et al., 2019) and false alarm is observed only at L=60 and L=70 in both schemes.

Figure 10 gives the error probability vs. channel block length L with fixed Ka=M=200. The other settings are the same as those in Figure 7. For user-specific information, the performance of Pus,e in IM-aided URA is much better than that of conventional URA in all L considered here. For common information, from this figure, to achieve Pc,e = 0.1 at M = 200, L65 is sufficient for the IM-aided URA scheme, while L85 is required for conventional URA. Noting that the channel is assumed to be unchanged during one block, the channel coherent interval is required to be no shorter than the channel block length. Therefore, the proposed IM-aided URA scheme can work in the scenario with a shorter channel coherent interval.

FIGURE 10
www.frontiersin.org

FIGURE 10. Error probability vs. channel blocks length L. Here, the numbers of BS antennas and active users are M=200 and Ka=200, respectively. For user-specific information, misdetection and false alarm are not observed in both schemes.

Table 3 lists the runtime of the receiver signal processing in both IM-aided URA and URA (Fengler et al., 2019). Here, L=100, M=200, and Ka=300 and the other parameters are same as those in Figure 7. From this table, as analyzed in Remark 1 and Remark 2 of Section 2, the smaller number of average active code words in each channel block results in the complexity reduction of CB-MLD and the decrease of the number of decided code words, and further the complexity reduction of the outer tree decoder.

TABLE 3
www.frontiersin.org

TABLE 3. Runtime of receiver of IM-aided URA and URA (Fengler et al., 2019), L=100,M=200,Ka=300 (unit: second).

The case with more common information bit transmission, that is, larger B0, for example, B0=64, is also tested in our simulations. However, in this scenario, the complexity of the outer tree decoder is prohibitively high due to the fact there are only 192–64 = 128 parity check bits. This less parity check constraints make more paths to be survived at each tree node and thus the whole outer decoding tree is very large.

Next, the performance of the iterative receiver is studied. In Figure 11, Pc,md of common information in the proposed iterative scheme vs. the iteration number given. All combinations with the number of receive antennas M = 200, 300 and the number of active users Ka = 150 : 50 : 350 are considered. From this figure, the performance improves with the iterative number in all cases. Moreover, the iterative receiver converges very fast. For example, for the case M = Ka= 200, only four iterations are required. In Figure 12, the convergence of Pc,fa is illustrated. From this figure, Pc,fa is small with all iterations. Figure 13 depicts the performance comparison of the proposed iterative receiver and conventional non-iterative receiver at M = 200 and 300, respectively. From this figure, the proposed iterative receiver achieves better Pc,e performance.

FIGURE 11
www.frontiersin.org

FIGURE 11. Per-user error probability of misdetection for common information as a function of the iterative number for various numbers of antennas and active users.

FIGURE 12
www.frontiersin.org

FIGURE 12. Per-user error probability of false alarm for common information as a function of the iterative number for various numbers of antennas and active users.

FIGURE 13
www.frontiersin.org

FIGURE 13. Per-user error probability for common information as a function of the number of active users.

Table 4 gives the runtime of the proposed iterative receiver in the case of M=200 and Ka=300. The runtime of inner CB-MLD, average size of list, and runtime time of outer decoder, are listed in this table. Here, L=100 and the other parameters are same as those in Figure 13. It is easy to see that the runtimes of inner CB-MUD and outer decoder decrease in later iterations. This can be interpreted by that in inner CB-MLD, the sparsity of the signal Γg,n to be estimated increases. In the outer decoder, the list size is still large due to the low threshold in later iterations, while most of them cannot pass the parity check.

TABLE 4
www.frontiersin.org

TABLE 4. Runtime of the proposed receiver in different iterations, M=200,Ka=300 (unit: second).

In non-iterative IM-aided URA receiver, the runtime, as shown in Table 3, is 113.4s for the inner CB-MLD detector, 12.4s for the outer tree decoder, and the whole runtime is 125.8s. From Table 4, in the proposed iterative IM-aided receiver, the total runtime is 396.8s, about 3 times longer than that of the non-iterative IM-aided receiver, although there are five iterations in the iterative receiver. Recalling the superiority of the proposed iterative receiver in terms of the relaxed requirement of thresholds and better PUPE performance, this mild increased complexity is tolerable.

7 Conclusion

In this article, a mixed massive random access was proposed where the considered uplink massive access system consists of users transmitting both common and user-specific information and users transmitting only common information. An IM-aided URA was proposed to transmit common information, and IM-aided non-coherent SRA was utilized to transmit user-specific information. The CB-MLD was employed to recover the user-specific information directly and the active code words associated with common information. Furthermore, the modified outer tree decoder was proposed to stitch the common information in different blocks, and an iterative receiver consisting of inner CS-based detection and outer tree decoding was employed to improve the performance. Finally, simulation results validated the superiority of the proposed mixed random access scheme.

Compared to conventional URA (Fengler et al., 2019), when there are more common information bits, that is, larger B0, and thus less parity check bits due to the IM principle, the modified outer tree decoder of IM-aided URA presented in Section 4 has a prohibitively high complexity. Therefore, more efficient outer tree decoder or smarter application of IM principle deserves further research to make the IM-aided URA suitable for more common information bit transmission.

Data Availability Statement

The original contributions presented in the study are included in the article/Supplementary Material, and further inquiries can be directed to the corresponding author.

Author Contributions

ZL and JZ conceived the work and wrote the article and ZL and JN carried out investigations.

Funding

This work was supported in part by the National Natural Science Foundation of China (grant 61671340).

Conflict of Interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

Althunibat, S., Mesleh, R., and Rahman, T. F. (2019). A Novel Uplink Multiple Access Technique Based on index-modulation Concept. IEEE Trans. Commun. 67 (7), 4848–4855. doi:10.1109/TCOMM.2019.2909211

CrossRef Full Text | Google Scholar

Amalladinne, V. K., Pradhan, A. K., Rush, C., Chamberland, J.-F., Narayanan, K. R., et al. (2020). Unsourced Random Access with Coded Compressed Sensing: Integrating AMP and Belief Propagation. arXiv: 2010.04364v1, [cs.IT].

Amalladinne, V. K., Chamberland, J.-F., and Narayanan, K. R. (2020a). A Coded Compressed Sensing Scheme for Unsourced Multiple Access. IEEE Trans. Inform. Theor. 66 (10), 6509–6533. doi:10.1109/TIT.2020.3012948

CrossRef Full Text | Google Scholar

Amalladinne, V. K., Chamberland, J.-F., and Narayanan, K. R. (2020b). An Enhanced Decoding Algorithm for Coded Compressed sensingICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Barcelona, Spain, 5270–5274. doi:10.1109/ICASSP40776.2020.9054142

CrossRef Full Text

Arslan, E., Dogukan, A. T., and Basar, E. (2020). Index Modulation-Based Flexible Non-orthogonal Multiple Access. IEEE Wireless Commun. Lett. 9 (11), 1942–1946. doi:10.1109/LWC.2020.3009100

CrossRef Full Text | Google Scholar

Basar, E., Aygolu, U., Panayirci, E., and Poor, H. V. (2013a). Orthogonal Frequency Division Multiplexing with index Modulation. IEEE Trans. Signal. Process. 61 (22), 5536–5549. doi:10.1109/TSP.2013.2279771

CrossRef Full Text | Google Scholar

Basar, E., Aygölü, U., and Panaylrcl, E. (2013b). Orthogonal Frequency Division Multiplexing with index Modulation in the Presence of High Mobility. (BlackSeaCom). Georgia: Batumi, 5536–5549. doi:10.1109/BlackSeaCom.2013.6623399

CrossRef Full Text

Basar, E. (2016). Index Modulation Techniques for 5G Wireless Networks. IEEE Commun. Mag. 54 (7), 168–175. doi:10.1109/MCOM.2016.7509396

CrossRef Full Text | Google Scholar

Bockelmann, C., Pratas, N., Nikopour, H., Au, K., Svensson, T., Stefanovic, C., et al. (2016). Massive Machine-type Communications in 5G: Physical and MAC-Layer Solutions. IEEE Commun. Mag. 54 (9), 59–65. doi:10.1109/MCOM.2016.7565189

CrossRef Full Text | Google Scholar

Dai, L., Wang, B., Yuan, Y., Han, S., Chih-lin, I., and Wang, Z. (2015). Non-orthogonal Multiple Access for 5G: Solutions, Challenges, Opportunities, and Future Research Trends. IEEE Commun. Mag. 53 (9), 74–81. doi:10.1109/MCOM.2015.7263349

CrossRef Full Text | Google Scholar

Ding, Z., Lei, X., Karagiannidis, G. K., Schober, R., Yuan, J., and Bhargava, V. K. (2017). A Survey on Non-orthogonal Multiple Access for 5G Networks: Research Challenges and Future Trends. IEEE J. Select. Areas Commun. 35 (10), 2181–2195. doi:10.1109/JSAC.2017.2725519

CrossRef Full Text | Google Scholar

Donoho, D. L., Maleki, A., and Montanari, A. (2009). Message-passing Algorithms for Compressed Sensing. Pnas. 106 (45), 18914–18919. doi:10.1073/pnas.0909892106

PubMed Abstract | CrossRef Full Text | Google Scholar

Durisi, G., Koch, T., and Popovski, P. (2016). Toward Massive, Ultrareliable, and Low-Latency Wireless Communication with Short Packets. Proc. IEEE. 104 (9), 1711–1726. doi:10.1109/JPROC.2016.2537298

CrossRef Full Text | Google Scholar

Fengler, A., Caire, G., Jung, P., and Haghighatshoar, S. (2019). Massive MIMO Unsourced Random Access. arXiv: 1901.00828v1, [cs.IT].

Fengler, A., Jung, P., and Caire, G. (2019). SPARCs for Unsourced Random Access. arXiv:1901.06234v1, [cs.IT].

Fengler, A., Haghighatshoar, S., Jung, P., and Caire, G. (2021). Non-Bayesian Activity Detection, Large-Scale Fading Coefficient Estimation, and Unsourced Random Access with a Massive MIMO Receiver. IEEE Trans. Inform. Theor. 67, 2925–2951. doi:10.1109/TIT.2021.3065291

CrossRef Full Text | Google Scholar

Haghighatshoar, S., Jung, P., and Caire, G. (2018). Improved Scaling Law for Activity Detection in Massive MIMO Systems. Proc IEEE ISITVail, 381–385. doi:10.1109/ISIT.2018.8437359

CrossRef Full Text | Google Scholar

Hasan, M., Hossain, E., and Niyato, D. (2013). Random Access for Machine-To-Machine Communication in LTE-Advanced Networks: Issues and Approaches. IEEE Commun. Mag. 51 (6), 86–93. doi:10.1109/MCOM.2013.6525600

CrossRef Full Text | Google Scholar

Kowshik, S. S., Andreev, K., Frolov, A., and Polyanskiy, Y. (2020). Energy Efficient Coded Random Access for the Wireless Uplink. IEEE Trans. Commun. 68 (8), 4694–4708. doi:10.1109/TCOMM.2020.3000635

CrossRef Full Text | Google Scholar

Li, T., Wu, Y., Zheng, M., Wang, D., and Zhang, W. (2020a). SPARC-LDPC Coding for MIMO Massive Unsourced Random Access. arXiv: 2009.10912v2, [cs.IT]. doi:10.1109/GCWkshps50303.2020.9367450

CrossRef Full Text

Li, J., Li, Q., Dang, S., Wen, M., Jiang, X.-Q., and Peng, Y. (2020b). Low-Complexity Detection for Index Modulation Multiple Access. IEEE Wireless Commun. Lett. 9 (7), 1. doi:10.1109/LWC.2020.2974730

CrossRef Full Text | Google Scholar

Liang, Z., and Zheng, J. (2021). Iterative Receiver of Uplink Massive MIMO Unsourced Random Access. Harbin, China: IEEE IWCMCIn press.

Liang, Z., and Zheng, J. (2020). Mixed Massive Random Access. IEEE ICCT, 311–316. doi:10.1109/ICCT50939.2020.9295776

CrossRef Full Text | Google Scholar

Liang, Z., Zheng, J., and Ni, J. (2021). Index Modulation Aided Massive MIMO Un-sourced Random Access. Melbourne, Victoria, Austria: IEEE ISITIn press

Marshakov, E., Balitskiy, G., Andreev, K., and Frolov, A. (2019). A Polar Code Based Unsourced Random Access for the Gaussian MAC. Honolulu, HI, USA: IEEE VTC-fall. doi:10.1109/VTCFall.2019.8891583

CrossRef Full Text

Ni, J., and Zheng, J. (2021). Index Modulation-Based Non-coherent Transmission in grant-free Massive Access. IEEE Trans. Veh. Technol. 70 (1), 1025–1029. doi:10.1109/TVT.2020.3045448

CrossRef Full Text | Google Scholar

Ni, J., and Zheng, J. (2020). Non-Coherent Grant-Free NOMA through Pilot-And Channel Block-Index Modulation. IEEE Wireless Commun. Lett. 10 (4), 1. doi:10.1109/LWC.2020.3040363

CrossRef Full Text | Google Scholar

Ordentlich, O., and Polyanskiy, Y. (2017). Low Complexity Schemes for the Random Access Gaussian Channel. Proc. IEEE ISIT, 2528–2532. doi:10.1109/ISIT.2017.8006985

CrossRef Full Text | Google Scholar

Polyanskiy, Y. (2017). A Perspective on Massive Random-Access. Proc. IEEE ISIT, 2523–2527. doi:10.1109/ISIT.2017.8006984

CrossRef Full Text | Google Scholar

Pradhan, A., Amalladinne, V., Vem, A., Narayanan, K. R., and Chamberland, J.-F. (2019). A Joint Graph Based Coding Scheme for the Unsourced Random Access Gaussian Channel. Proc. IEEE GLOBECOM, 1–6. doi:10.1109/GLOBECOM38437.2019.9013278

CrossRef Full Text | Google Scholar

Pradhan, A. K., Amalladinne, V. K., Narayanan, K. R., and Chamberland, J.-F. (2020). Polar Coding and Random Spreading for Unsourced Multiple Access. arXiv: 1911.01009v1, [cs.IT]. doi:10.1109/ICC40277.2020.9148687

CrossRef Full Text

Rangan, S. (2011). Generalized Approximate Message Passing for Estimation with Random Linear Mixing. Proc IEEE ISIT, 2168–2172. doi:10.1109/ISIT.2011.6033942

CrossRef Full Text | Google Scholar

Senel, K., and Larsson, E. G. (2018). Grant-free Massive MTC-Enabled Massive MIMO: A Compressive Sensing Approach. IEEE Trans. Commun. 66 (12), 6164–6175. doi:10.1109/TCOMM.2018.2866559

CrossRef Full Text | Google Scholar

Tusha, A., Dogan, S., and Arslan, H. (2020). A Hybrid Downlink NOMA with OFDM and OFDM-IM for beyond 5G Wireless Networks. IEEE Signal. Process. Lett. 27 (3), 491–495. doi:10.1109/LSP.2020.2979059

CrossRef Full Text | Google Scholar

Vem, A., Narayanan, K. R., Cheng, J., and Chamberland, J.-F. (2017). A User-independent Serial Interference Cancellation Based Coding Scheme for the Unsourced Random Access Gaussian Channel. Proc. IEEE ITW, 121–125. doi:10.1109/ITW.2017.8278023

CrossRef Full Text | Google Scholar

Wen, M., Cheng, X., Ma, M., Jiao, B., and Poor, H. V. (2016). On the Achievable Rate of OFDM with Index Modulation. IEEE Trans. Signal. Process. 64 (8), 1919–1932. doi:10.1109/TSP.2015.2500880

CrossRef Full Text | Google Scholar

Wen, M., Cheng, X., and Yang, L. (2014). Optimizing the Energy Efficiency of OFDM with index Modulation. IEEE Int. Conf. Commun. Syst., 31–35. doi:10.1109/ICCS.2014.7024760

CrossRef Full Text | Google Scholar

Wen, M., Cheng, X., and Yang, L. (2017). Index Modulation for 5G Wireless Communications (Wireless Networks). Berlin, Germany: Springer.

Xie, X., Wu, Y., Gao, J., and Zhang, W. (2020). Massive Unsourced Random Access for Massive MIMO Correlated Channels. arXiv: 2008.08742v2 [cs.IT]. doi:10.1109/GLOBECOM42002.2020.9347959

CrossRef Full Text

Xu, L. D., He, W., and Li, S. (2014). Internet of Things in Industries: A Survey. IEEE Trans. Ind. Inf. 10 (4), 2233–2243. doi:10.1109/TII.2014.2300753

CrossRef Full Text | Google Scholar

Zheng, J., and Chen, R. (2017). Achieving Transmit Diversity in OFDM-IM by Utilizing Multiple Signal Constellations. IEEE Access 5, 8978–8988. doi:10.1109/ACCESS.2017.2708718

CrossRef Full Text | Google Scholar

Zheng, M., Wu, Y., and Zhang, W. (2020). Polar Coding and Sparse Spreading for Massive Unsourcess Random Access. arXiv: 2007.05739v1, [cs.IT]. doi:10.1109/VTC2020-Fall49728.2020.9348654

CrossRef Full Text

Keywords: index modulation, random access, compressed sensing, iterative receiver, non-Bayesian detection, tree decoder, massive MIMO

Citation: Liang Z, Zheng J and Ni J (2021) Index Modulation–Aided Mixed Massive Random Access. Front. Comms. Net 2:694557. doi: 10.3389/frcmn.2021.694557

Received: 13 April 2021; Accepted: 21 May 2021;
Published: 14 June 2021.

Edited by:

Shuping Dang, King Abdullah University of Science and Technology, Saudi Arabia

Reviewed by:

Xuan Chen, South China University of Technology, China
Ferhat Yarkin, University of Oxford, United Kingdom
Jiusi Zhou, King Abdullah University of Science and Technology, Saudi Arabia

Copyright © 2021 Liang, Zheng and Ni. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Jianping Zheng, jpzheng@xidian.edu.cn

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.