This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

A GCICA Grant-Free Random Access Scheme for M2M Communications in Crowded Massive MIMO Systems

Huimei Han1, Lushun Fang1, Weidang Lu1, Wenchao Zhai2, Ying Li3, Jun Zhao4 Huimei Han, Lushun Fang, and Weidang Lu are with College of Information Engineering, Zhejiang University of Technology, Hangzhou, Zhejiang, 310032, P.R. China, Wenchao Zhai is with College of Information Engineering, China Jiliang University, Hangzhou, Zhejiang, 310018, P.R. China, Ying Li is with the State Key Lab of Integrated Services Networks, Xidian University, Xi’an, 710071, P.R. China, and Jun Zhao is with School of Computer Science and Engineering, Nanyang Technological University, Singapore. (Email: {hmhan1215, 2111903007, luweid}@zjut.edu.cn, [email protected], [email protected], [email protected])
Abstract

A high success rate of grant-free random access scheme is proposed to support massive access for machine-to-machine communications in massive multiple-input multiple-output systems. This scheme allows active user equipments (UEs) to transmit their modulated uplink messages along with super pilots consisting of multiple sub-pilots to a base station (BS). Then, the BS performs channel state information (CSI) estimation and uplink message decoding by utilizing a proposed graph combined clustering independent component analysis (GCICA) decoding algorithm, and then employs the estimated CSIs to detect active UEs by utilizing the characteristic of asymptotic favorable propagation of massive MIMO channel. We call this proposed scheme as GCICA based random access (GCICA-RA) scheme. We analyze the successful access probability, missed detection probability, and uplink throughput of the GCICA-RA scheme. Numerical results show that, the GCICA-RA scheme significantly improves the successful access probability and uplink throughput, decreases missed detection probability, and provides low CSI estimation error at the same time.

Index Terms:
Grant-free random access, independent component analysis (ICA), massive MIMO, M2M communications.

I Introduction

THE machine-to-machine (M2M) communications are centered on the intelligent interaction of user equipments (UEs) without human intervention, which is the enabler for the Internet of Things (IoT) to achieve the envision of the “Internet of Everything” [1, 2, 3, 4]. In recent years, M2M communications develop rapidly and have been applied to many scenarios, such as smart medical, smart vehicle, smart logistics, etc. Cisco visual networking index and forecast predicts that there will be around 28.5 billion connected UEs by 2022 [5]. The massive multiple-input multiple-output (MIMO) technology, which achieves significant improvements in energy and spectral efficiency and can serve massive UEs in the same time-frequency resource, is well suited for M2M communications [6, 7, 8].

For M2M communications in massive MIMO systems, random access procedure is a critical step to initiate a data transmission [9, 10]. Since payload data is usually in small size and the number of UEs in a cell is envisioned in the order of hundreds or thousands in M2M communications [11], random access procedure utilized in the long term evolution (LTE) network may induce excessive signaling overhead and cannot support massive access [9, 12].

Researchers are exploring new random access schemes for M2M communications in massive MIMO systems, and the grant-based random access schemes have been proposed in recent years. E. Björnson et al. proposed a strongest-user collision resolution (SUCRe) scheme, which allocates pilots to active UEs with largest channel gain among the contenders [13]. However, the number of successful accessing UEs decreases with the increase of the number of contenders [14]. To improve the pilot resource utilization of the SUCRe scheme, SUCR combined idle pilots access (SUCR-IPA) scheme was proposed in [15], where the weaker UEs randomly select idle pilots to increase the number of successful accessing UEs. A user identity-aided pilot access scheme was proposed for massive MIMO with interleave-division multiple-access systems, where the interleaver of each UE is available at the BS according to the one-to-one correspondence between UE’s identity number (ID) and its interleaver [16]. However, since the grant-based random access schemes require two handshake processes between the base station (BS) and UEs, considering the small packet transmission in M2M communication, such kind of random access scheme will introduce heavy signaling overhead and low data transmission efficiency.

To address this problem, the grant-free random access schemes have attracted much attention in recent years, which allow active UEs to transmit their pilots and uplink messages to the BS directly and perform activity detection, channel state information (CSI) estimation, and uplink message decoding in one shot. J. Ahn et al. proposed a Bayesian based random access scheme to detect the UE’s activity and estimate the CSI jointly by utilizing the expectation propagation algorithm, considering the BS with one antenna [17]. L. Liu et al. proposed a approximate message passing (AMP) based grant-free scheme to achieve the joint activity detection and CSI estimation for massive MIMO systems [18]. However, this AMP-based grant-free random access scheme requires long pilot sequence to achieve better performance, resulting in heavy pilot overhead. To support massive connectivity with low access delay and overhead, a novel grant-free random access scheme was proposed to detect active UEs and uplink message without CSI estimation in one shot [19]. However, the CSI estimation is needed for some M2M traffics for downlink beamforming in the case of time-division duplex (TDD) model, such as the telemedicine surgery requiring the downlink control signal transmission. The above-mentioned grant-free random access schemes consider the single pilot structure. Jiang et al. proposed to concatenate multiple orthogonal sub-pilots into a super pilot sequence, and the super pilot sequence is utilized for activity detection and CSI estimation [20]. Simulation results show that, compared to the single pilot structure, this super pilot structure can improve the number of successful UEs by utilizing their proposed detection approach. However, with the increase of the number of active UEs, the probability that more UEs have the same super pilot sequence increases, resulting in low row rank pilot selection matrix and thus degrading the number of successful UEs. This motivates interesting researches on how to support massive access by utilizing the super pilot structure.

To achieve this goal, we propose a graph combined clustering independent component analysis based random access (GCICA-RA) scheme. This scheme utilizes the super pilot structure and mainly consists of two steps. During the first step, all the active UEs concatenate their randomly selected sub-pilots to obtain their super pilot sequences, and send their super pilot sequences and modulated uplink messages to the BS. During the second step, the BS performs CSI estimation and uplink message decoding jointly by utilizing a proposed GCICA decoding algorithm, employs the estimated CSIs to detect active UEs by utilizing the characteristic of asymptotic favorable propagation of massive MIMO channel, and sends random access response (RAR) to active UEs. We analyze the successful access probability, missed detection probability, and uplink throughput of the GCICA-RA scheme. Numerical results show that, compared to the random access scheme proposed in [20], the GCICA-RA scheme significantly improves the successful access probability and uplink throughput, decreases missed detection probability, and provides low CSI estimation error at the same time.

The main contributions of this paper are summarized as follows.

  • We propose a GCICA algorithm to perform CSIs estimation and uplink message decoding jointly. Specifically, based on the received sub-pilot signal, the BS first utilizes a successive interference cancellation (SIC) algorithm to estimate CSIs of active UEs, and then decodes the uplink message by utilizing the estimated CSIs. Then, the BS utilizes a proposed CICA algorithm to decode uplink message and estimate CSIs of UEs whose CSIs cannot be estimated by the SIC algorithm. Simulation results show that, compared to the detection method proposed in [20], the number of successful UEs can be improved even multiple UEs having the same super pilot sequence.

  • For the SIC algorithm, we propose to employ the estimated CSIs without other overhead to find edges connecting to a recovered variable node, by utilizing the asymptotic favorable propagation of massive MIMO systems. This is different from the existing method where indexes of selected pilots should be inserted into the uplink message to find edges connected to a recovered variable node [14], which degrades data transmission efficiency.

  • We analyze the upper bound for the successful access probability and uplink throughput of the proposed GCICA-RA scheme, and derive the lower bound for the missed detection probability of the proposed GCICA-RA scheme.

The remainder of this paper is organized as follows. Section II introduces system model and the proposed GCICA-RA scheme. Section III describes SIC and CICA algorithms in the the proposed GCICA-RA scheme. We present the performance analysis in Section IV. Simulation results and the conclusion are given in Section V and VI, respectively.

Notations utilized throughout this paper are described in Table I.

TABLE I: notations.
Notations Description
Italic letters Scalars
Boldface lower-case Vectors
Boldface upper-case letters Matrices
()T(\cdot)^{T} and ()H(\cdot)^{H}  
The transpose and conjugate transpose
of a vector or a matrix
‘*’  Complex conjugate of a vector or a matrix
𝒙i\boldsymbol{x}_{i} The ithi^{th} element of a vector 𝒙\boldsymbol{x}
\mathbb{R} The set of all real numbers
𝒞𝒩(μ,σ2)\mathcal{C}\mathcal{N}(\mu,\sigma^{2})  
A circularly-symmetric complex Gaussian
distribution with mean μ\mu and variance σ2\sigma^{2}
||||||\cdot|| The Euclidean norm of a vector
|||\cdot| The cardinality of a set
arg(dd) The phase of complex dd
\lfloor\cdot\rceil The rounding operation
[𝒙]n[\bm{x}]_{n} The nthn^{th} element of vector 𝒙\bm{x}
𝑿(i)\bm{X}(i)  The ithi^{th} column of matrix 𝑿\bm{X}

II SYSTEM MODEL and The proposed GCICA-RA Scheme

II-A SYSTEM MODEL

In this paper, we consider massive MIMO communication systems in time-division duplex (TDD) mode. There is a BS with MM antennas and KK single-antenna UEs in a cell, where the number of active UEs in a random access procedure is NaN_{a}.

In the proposed GCICA-RA scheme, each UE transmits its modulated uplink message and super pilot to the BS directly. The BS performs CSI estimation and uplink message decoding by utilizing a proposed GCICA decoding algorithm, and then employs the estimated CSIs to detect active UEs. The frame structure of the GCICA-RA scheme is shown in Fig. 1. Specifically, the super pilot of each UE consists of LL consecutive sub-pilots, and the symbol length of each sub-pilot is τp\tau_{p}. Therefore, the symbol length of each super pilot is LτpL\tau_{p}. In addition, the proposed GCICA decoding algorithm utilizes multiple ICA classifiers to separate source signals. However, the phase of the separated signals is unpredictable.

To solve this problem, each active UE inserts a reference symbol (termed RS) with symbol length 1 into its uplink message [19]. Let 𝒗𝒌=[vk(1),vk(2),,vk(Nm)]T\bm{v_{k}}=[v_{k}(1),v_{k}(2),\ldots,v_{k}({N_{\text{m}}})]^{{T}} denote the modulated uplink message of UE kk, where NmN_{\text{m}} represents the symbol length of the modulated uplink message. Then, vk(1)v_{k}(1), [vk(2),,vk(Nm)][v_{k}(2),\ldots,v_{k}(N_{\text{m}})] represent the RS and the payload data with symbol length NPDN_{\text{PD}}, respectively. Furthermore, since any complex symbol can be represented as a real symbol [21], we employ the BPSK modulation scheme in the proposed GCICA-RA scheme, i.e. υk(i)={±1}\upsilon_{k}(i)=\left\{{\pm 1}\right\}.

Refer to caption
Figure 1: The frame structure of the proposed GCICA-RA scheme.
Refer to caption
Figure 2: Block diagram of the proposed GCICA-RA scheme. Each active UE sends its super pilot and modulated uplink message to the BS. The BS performs CSI estimation and uplink message decoding by utilizing a proposed GCICA decoding algorithm, employs the estimated CSIs to detect active UEs, and sends RAR information to active UEs. In addition, the proposed GCICA decoding algorithm utilizes a SIC algorithm to estimate CSIs and thus decodes the uplink message of active UEs, performs the number of active UEs estimation, and utilizes a proposed CICA algorithm to decode uplink message and estimate CSIs of active UEs whose CSIs cannot be recovered by the SIC algorithm.

II-B GCICA-RA scheme description

As shown in Fig. 2, the proposed GCICA-RA scheme allows each UE to transmit its modulated uplink message and super pilot to the BS directly. Then, the BS performs CSI estimation and uplink message decoding by utilizing a proposed GCICA decoding algorithm, employs the estimated CSIs to detect active UEs, and sends RAR information to active UEs. In addition, the proposed GCICA decoding algorithm first utilizes a SIC algorithm to estimate CSIs and decode the uplink message of active UEs, performs the number of active UEs estimation, and utilizes a proposed CICA algorithm to decode uplink messages and estimate CSIs of active UEs whose CSIs cannot be recovered by the SIC algorithm. The details are described as follows.

II-B1 Step 1: Super pilot and modulated uplink message transmission

There are LL sub-pilot phases, and each active UE randomly selects its sub-pilot from a set of mutually orthogonal normalized pilots 𝑷𝒐={𝑺𝟏,𝑺𝟐,,𝑺𝝉𝒑}τp×τp\bm{{{P}}_{{o}}}=\left\{\bm{S_{1}},\bm{S_{2}},\cdots,\bm{S_{\tau_{p}}}\right\}\in{\mathbb{R}^{{\tau_{p}}\times\tau_{p}}} during each sub-pilot phase. Concatenating these randomly selected sub-pilot sequences, each active UE obtains its super pilot. Following the frame structure as shown in Fig. 1, each active UE sends it super pilot and modulated uplink message to the BS. In addition, the value of RS is the same for all active UEs, and we set the RS to be 1, i.e., υk(1)=1k\upsilon_{k}(1)=1\ \forall k.

Then, let 𝒈𝒌=(gk1,gk2,,gkM)T\bm{g_{k}}={(g_{k}^{1},g_{k}^{2},\cdots,g_{k}^{M})^{{T}}} denote the independent and identically distributed (i.i.d.) small-scale fading channel from UE kk to the BS, i.e., 𝒈𝒌 𝒩(0,𝑰𝑴)\bm{g_{k}}\sim\text{ }\mathcal{N}(0,{\bm{{{I}}_{M}}}). Let ρk{\rho_{k}} denote UE kk’s transmitting power. Let βk{{{\beta_{k}}}} stand for the channel gain between UE kk and the BS, which can be known for UE kk before the random access procedure [13]. Then, the received sub-pilot signal during the lth(l=1,2,,L)l^{th}\ (l=1,2,\ldots,L) sub-pilot phase at the BS is

𝒀p𝒍=t=1τpk𝑨𝒕𝒍βkρk𝒈𝒌(𝑺𝒕)T+𝒁p𝒍,l=1,2,,L,\bm{Y_{\text{p}}^{l}}=\sum\limits_{t=1}^{{\tau_{p}}}\sum\limits_{k\in\bm{A_{t}^{l}}}{\sqrt{{\beta_{k}}{\rho_{k}}}}{{{\bm{g_{k}}(\bm{S_{t}})^{{T}}}}}+\bm{Z_{\text{p}}^{l}},~{}l=1,2,\ldots,L, (1)

where 𝑨𝒕𝒍\bm{A_{t}^{l}} stands for the set of UEs that select pilot StS_{t} during the lthl^{th} sub-pilot phase, 𝒁p𝒍 M×τp\bm{Z_{\text{p}}^{l}}\in{{\mathbb{R}}^{\text{ }M\times{\tau_{p}}}} denotes the additive white noise matrix with each element following from a distribution of 𝒩(0,σ2)\mathcal{N}(0,{{\sigma}^{2}}). In this paper, 𝒁\bm{Z} with different subscripts or superscripts will follow the same distribution. In addition, we consider ρkβk=1{{\rho_{k}}{{\beta}_{k}}}=1 to make the received signal from all active UEs have the same power [22].

The received superimposed uplink message 𝒀m M×Nm\bm{Y_{\text{m}}}\in{{\mathbb{R}}^{\text{ }M\times{N_{\text{m}}}}} at the BS is

𝒀m=k=1Na𝒈𝒌(𝒗𝒌)T+𝒁m.\bm{Y_{\text{m}}}=\sum\limits_{k=1}^{{N_{a}}}{{{\bm{g_{k}}(\bm{v_{k}})^{{T}}}}}+\bm{Z_{\text{m}}}. (2)

II-B2 CSI estimation, uplink message decoding, active UE detection and RAR transmission

Based on the received sub-pilot signal and the superimposed uplink message, the BS performs {①} CSI estimation and uplink message decoding jointly, and {②} active UE detection and RAR information transmission. The details are described as follows.

{①} CSI estimation and uplink message decoding

The BS utilizes the proposed GCICA decoding algorithm to perform CSI estimation and uplink message decoding. The details of the GCICA decoding algorithm are described as follows.

The BS first estimates the CSI corresponding to pilot 𝑺𝒕\bm{S_{t}} during the lthl^{th} sub-pilot phase by utilizing least squares (LS) method, denoted by 𝒉𝒕𝒍\bm{h_{t}^{l}}

𝒉𝒕𝒍=𝒀p𝒍(𝑺𝒕)=k𝑨𝒕𝒍𝒈𝒌+𝒁𝒕𝒍.\bm{h_{t}^{l}}=\bm{Y_{\text{p}}^{l}}\bm{(S_{t})^{*}}=\sum\limits_{k\in\bm{A_{t}^{l}}}{\bm{{g_{k}}}}+\bm{Z_{t}^{l}}. (3)

It can be seen from (3) that, during the lthl^{th} sub-pilot phase, the estimated CSI corresponding to pilot 𝑺𝒕\bm{S_{t}} is the sum of CSIs of active UEs selecting pilot 𝑺𝒕\bm{S_{t}}. So, considering all LL sub-pilot phases, a bipartite graph can be used to describe the proposed GCICA-RA scheme, and thus the SIC algorithm can be utilized to estimate UEs’ CSIs on the bipartite graph. The procedure of the SIC algorithm is described in Section III-A in detail. We use 𝑯^SIC=[𝒉^SIC𝟏,,𝒉^SICNSICs] M×NSICs\bm{\hat{H}_{\text{SIC}}}=[\bm{\hat{h}_{\text{SIC}}^{1},\cdots,\hat{h}_{\text{SIC}}}^{N_{\text{SIC}}^{\text{s}}}]\in{\mathbb{R}}^{\text{ }M\times{N_{\text{SIC}}^{\text{s}}}} to denote the estimated CSIs via the SIC algorithm, where NSICsN_{\text{SIC}}^{\text{s}} is the number of estimated CSIs via the SIC algorithm. Thus, the detected uplink message can be obtained by utilizing LS method

𝒙^SIC𝒊=(𝒉^SIC𝒊)H𝒀m(𝒉^SIC𝒊)H(𝒉^SIC𝒊),1iNSICs.\bm{\hat{x}_{\text{SIC}}^{i}}=\frac{(\bm{\hat{h}_{\text{SIC}}^{i}})^{H}\bm{{Y_{\text{m}}}}}{(\bm{\hat{h}_{\text{SIC}}^{i}})^{H}(\bm{\hat{h}_{\text{SIC}}^{i}})},1\leq i\leq N_{\text{SIC}}^{\text{s}}. (4)

After demodulating and decoding the detected uplink message 𝒙^SIC𝒊\bm{\hat{x}_{\text{SIC}}^{i}}, we obtain the corresponding decoded uplink message 𝒗^SIC𝒊\bm{\hat{v}_{\text{SIC}}^{i}}.

Then, based on the estimated CSIs corresponding to all pilots during the lthl^{th} sub-pilot phase, the BS estimates the number of active UEs by utilizing the estimation method proposed in [19], denoted by Na^\hat{{N_{a}}}, which is given by

Na^=t=1τp(𝒉𝒕𝒍)𝑯𝒉𝒕𝒍𝑴t=1τp|𝑨𝒕𝒍|=Na,M.\begin{array}[]{l}\hat{{N_{a}}}={\sum\limits_{t=1}^{\tau_{p}}\bm{\frac{(h_{t}^{l})^{H}h_{t}^{l}}{M}}}\to{\sum\limits_{t=1}^{\tau_{p}}|\bm{A_{t}^{l}}|}={N_{a}},M\to\infty.\end{array} (5)

We can observe from (5) that Na^\hat{{N_{a}}} approaches NaN_{a} with large MM. Therefore, the estimated number of active UEs whose CSIs cannot be obtained via the SIC algorithm is

N^r=N^aNSICs.\hat{N}_{\text{r}}=\hat{N}_{a}-N_{\text{SIC}}^{\text{s}}. (6)

Finally, by utilizing N^r\hat{N}_{\text{r}}, 𝒗^SIC𝒊(1iNSICs)\bm{\hat{v}_{\text{SIC}}^{i}}(1\leq i\leq N_{\text{SIC}}^{\text{s}}), and 𝒀𝒎\bm{{Y_{m}}}, the BS employs a proposed CICA algorithm to obtain the CSIs and decoded uplink message of active UEs whose CSIs cannot be obtained via the SIC algorithm, denoted by 𝑯^CICA=[𝒉^CICA𝟏,,𝒉^CICAN^r]M×N^r\bm{\hat{H}_{\text{CICA}}}=[\bm{\hat{h}_{\text{CICA}}^{1}},\cdots,\bm{\hat{h}_{\text{CICA}}}^{{\hat{N}_{\text{r}}}}]\in{\mathbb{R}}^{M\times{\hat{N}_{\text{r}}}} and 𝒗^CICA𝒊\bm{\hat{v}_{\text{CICA}}^{i}}, respectively. The details of the CICA algorithm are descried in Section III-B.

{②} Active UE detection and RAR information transmission

The BS detects an active UE by judging whether its CSI can be estimated (i.e., whether the corresponding estimated CSI is a valid CSI estimation), and this UE realizes whether it has been detected by the BS in a distributed manner. The details are described as follows.

We utilize 𝑯^=[𝑯^SIC,𝑯^CICA]\hat{\bm{H}}=[\bm{\hat{H}_{\text{SIC}}},\bm{\hat{H}_{\text{CICA}}}] to denote the estimated CSIs, and assume that 𝑯^(1)\hat{\bm{H}}(1) is a valid CSI estimation. More specifically, 𝑯^(1)\hat{\bm{H}}(1) is the estimated CSI for UE mm (i.e., 𝑯^(1)=𝒈𝒎+𝚫𝒈𝒎\hat{\bm{H}}(1)=\bm{g_{m}+\Delta g_{m}}, where 𝚫𝒈𝒎\bm{\Delta g_{m}} denotes the estimation error and takes small values). By correlating 𝑯^(1)\hat{\bm{H}}(1) with the estimated CSI corresponding to pilot 𝑺𝒕\bm{S_{t}} during the lthl^{th} sub-pilot phase (i.e., 𝒉𝒕𝒍,t=1,2,,τp\bm{h_{t}^{l}},~{}t=1,2,\ldots,\tau_{p}), we have

(𝒉𝒕𝒍)H𝑯^(1)M\displaystyle\frac{(\bm{h_{t}^{l}})^{H}\hat{\bm{H}}(1)}{M} =(k𝑨𝒕𝒍𝒈𝒌+𝒁𝒕𝒍)H(𝒈𝒎+𝚫𝒈𝒎)M\displaystyle=\frac{\left(\sum\limits_{k\in\bm{A_{t}^{l}}}{\bm{{g_{k}}}}+\bm{Z_{t}^{l}}\right)^{H}(\bm{g_{m}+\Delta g_{m}})}{M} (7)
=(𝒈𝒎)H𝒈𝒎M+k𝑨𝒕𝒍,km(𝒈𝒌)H𝒈𝒎M+\displaystyle=\frac{(\bm{{g_{m}}})^{H}\bm{g_{m}}}{M}+\frac{\sum\limits_{k\in\bm{A_{t}^{l}},k\neq m}({\bm{{g_{k}}})^{H}\bm{g_{m}}}}{M}+
k𝑨𝒕𝒍(𝒈𝒌)𝑯𝚫𝒈𝒎M+(𝒁𝒕𝒍)H(𝒈𝒎+𝚫𝒈𝒎)M\displaystyle\frac{\sum\limits_{k\in\bm{A_{t}^{l}}}\bm{{(\bm{{g_{k}}})^{H}}\Delta g_{m}}}{M}+\frac{(\bm{Z_{t}^{l}})^{H}(\bm{g_{m}+\Delta g_{m}})}{M}
\xlongrightarrow[](a)1,M,iftis the index of\displaystyle\xlongrightarrow[\quad]{(a)}1,M\to\infty,{\rm{\text{if}}}~{}t~{}{\rm{\text{is the index of}}}
the pilot selected by UEm\displaystyle{\rm{\text{the pilot selected by UE}}}~{}m
(𝒉𝒕𝒍)H𝑯^(1)M\displaystyle\frac{(\bm{h_{t}^{l}})^{H}\hat{\bm{H}}(1)}{M} =k𝑨𝒕𝒍(𝒈𝒌)H𝑯^(1)+(𝒁𝒕𝒍)H𝑯^(1)M\displaystyle=\frac{\sum\limits_{k\in\bm{A_{t}^{l}}}({\bm{{g_{k}}}})^{H}\hat{\bm{H}}(1)+(\bm{Z_{t}^{l}})^{H}\hat{\bm{H}}(1)}{M}
\xlongrightarrow[](b)0,M,otherwise\displaystyle\xlongrightarrow[\quad]{(b)}0,M\to\infty,{\rm{otherwise}}

where (a) follows from the fact that, when MM goes into infinity, terms (𝒈𝒎)H𝒈𝒎M=1\frac{(\bm{{g_{m}}})^{H}\bm{g_{m}}}{M}=1, k𝑨𝒕𝒍,km𝒈𝒌H𝒈𝒎M=0,(𝒁𝒕𝒍)H(𝒈𝒎+𝚫𝒈𝒎)M=0\frac{\sum\nolimits_{k\in\bm{A_{t}^{l}},k\neq m}{\bm{{g_{k}}}^{H}}\bm{g_{m}}}{M}=0,\frac{(\bm{Z_{t}^{l}})^{H}(\bm{g_{m}+\Delta g_{m}})}{M}=0 by utilizing the asymptotic favorable propagation of massive MIMO channel, term k𝑨𝒕𝒍(𝒈𝒌)H𝚫𝒈𝒎M\frac{\sum\nolimits_{k\in\bm{A_{t}^{l}}}{(\bm{{g_{k}}})^{H}}\bm{\Delta g_{m}}}{M} is close to 0 since elements in 𝚫𝒈𝒎\bm{\Delta g_{m}} are small values, and (b) is derived based on the random matrix theory. In addition, it is easy to derive that, when 𝑯^(i)\hat{\bm{H}}(i) is not a valid CSI estimation, (𝒉𝒕𝒍)H𝑯^(i)M\frac{\left(\bm{h_{t}^{l}}\right)^{H}\hat{\bm{H}}(i)}{M} is close to 0 by utilizing the random matrix theory. Therefore, the BS utilizes the following rule to judge whether 𝑯^(i)\hat{\bm{H}}(i) is a valid CSI estimation: for the lth(l{1,,L})l^{th}\left(l\in\{1,...,L\}\right) sub-pilot phase, if there only exits an element in set [(𝒉𝒍𝟏)H𝑯^(i)M,,(𝒉𝒍𝒕)H𝑯^(i)M,,(𝒉𝒍𝝉𝒑)H𝑯^(i)M][\frac{(\bm{h_{l}^{1}})^{H}\hat{\bm{H}}(i)}{M},\cdots,\frac{(\bm{h_{l}^{t}})^{H}\hat{\bm{H}}(i)}{M},\cdots,\frac{(\bm{h_{l}^{\tau_{p}}})^{H}\hat{\bm{H}}(i)}{M}] close to 1, 𝑯^(i)\hat{\bm{H}}(i) is a valid CSI estimation because each active UE only selects one pilot during each sub-pilot phase; otherwise, 𝑯^(i)\hat{\bm{H}}(i) is not a valid CSI estimation.

After obtaining all valid CSIs, the BS generates and broadcasts the RAR information 𝑽=u𝑩(𝑯^(𝒖))H\bm{V}=\sum\nolimits_{u\in\bm{B}}(\bm{\hat{H}(u)})^{H} to all active UEs where 𝑩\bm{B} stands for the index set of valid CSI estimations.

The received RAR at UE mm is

Rm=βm𝑽𝒈𝒎+Zd.{R_{m}}=\sqrt{{\beta_{m}}}\bm{{V}{g_{m}}}+{Z_{d}}. (8)

Then, we have

RmβmM=βm𝑽𝒈𝒎βmM+ZdβmM=βm(u𝑩(𝑯^(u))H𝒈𝒎)βmM+ZdβmM\xlongrightarrow[](a)M{1if UEmhas been detected0otherwise\begin{array}[]{l}\frac{{{R_{m}}}}{{\sqrt{{\beta_{m}}}M}}=\frac{{\sqrt{{\beta_{m}}}\bm{{{V}}{g_{m}}}}}{{\sqrt{{\beta_{m}}}M}}+\frac{{{Z_{d}}}}{{\sqrt{{\beta_{m}}}M}}\vspace{1ex}\\ =\frac{{\sqrt{{\beta_{m}}}\left({\sum\limits_{u\in\bm{B}}{{(\hat{\bm{H}}(u))}^{H}}{\bm{g_{m}}}}\right)}}{{\sqrt{{\beta_{m}}}M}}+\frac{{{Z_{d}}}}{{\sqrt{{\beta_{m}}}M}}\vspace{1ex}\\ \xlongrightarrow[\quad]{(a)M\to\infty}\left\{\begin{array}[]{l}1{\quad{\text{\rm{if UE}}}~{}m~{}{\text{{\rm{has been detected}}}}}\\ \\ 0{\quad\rm{otherwise}}\end{array}\right.\end{array} (9)

where (a) is derived by utilizing the asymptotic favorable propagation of massive MIMO channel, similar to (7). Based on the value of RmβmM\frac{{{R_{m}}}}{{\sqrt{{\beta_{m}}}M}}, UE mm can realize whether it has been detected. If not, UE mm will reattempt the random access procedure in the upcoming random access slot.

III SIC and CICA algorithms

III-A SIC Algorithm

As we described in Section II-B, a bipartite graph can be used to describe the proposed GCICA-RA scheme, and thus the SIC algorithm can be utilized to estimate UEs’ CSIs on the bipartite graph. In this subsection, we first present the bipartite graph representation, and then describe the SIC algorithm in detail.

III-A1 Bipartite Graph Representation

A bipartite graph consists of variable nodes, factor nodes, and edges connecting variable nodes and factor nodes. We utilize active UEs and available pilots during each sub-pilot phase to represent variable nodes and factor nodes, respectively. Furthermore, if pilot 𝑺𝒕\bm{S_{t}} is selected by UE kk during sub-pilot phase ll, we use tlt^{l} to denote the corresponding factor node, and there exists an edge connecting the variable node kk with the factor node tlt^{l}. The CSI of UE kk is marked on edges connected to UE kk. Note that, since we use the power control mechanism to make ρkβk=1{{\rho_{k}}{{\beta}_{k}}}=1, we only need to estimate the small-scale fading channel. So, we only mark the small-scale fading coefficients between the BS and active UE. Furthermore, the degree of a node is referred to the number of edges connected to this node.

Example: Fig. 3(a) illustrates a bipartite graph based on 5 active UEs, 2 sub-pilot phases, and 3 available pilots. During each sub-pilot phase, active UEs (represented by circles) are variable nodes and all available pilots (represented by squares) are factor nodes. Since UE 1 and UE 2 select pilot 𝑺𝟏\bm{S_{1}} during sub-pilot phase 11, UE 1 and UE 2 are connected to factor node 111^{1} by a black solid line. Since UE 3 selects pilot 𝑺𝟐\bm{S_{2}} during sub-pilot phase 11, UE 3 is connected to factor node 212^{1} by a black solid line. Since UE 4 and UE 5 select pilot 𝑺𝟑\bm{S_{3}} during sub-pilot phase 11, UE 4 and UE 5 are connected to factor node 313^{1} by a black solid line. Since UE 1 and UE 3 select pilot 𝑺𝟏\bm{S_{1}} during sub-pilot phase 22, UE 1 and UE 3 are connected to factor node 121^{2} by a black solid line. Since UE 2, UE 4, and UE 5 all select pilot 𝑺𝟑\bm{S_{3}} during sub-pilot phase 22, UE 2, UE 4 and UE 5 are connected to factor node 323^{2} by a black solid line.

Refer to caption
Figure 3: An example of SIC process.

III-A2 SIC Algorithm

The BS employs SIC algorithm to estimate UE’s CSI on the bipartite graph, and then utilizes the estimated CSIs to decode the uplink message. In the following, we briefly discuss the SIC algorithm, present the pseudo-code of the SIC algorithm in Algorithm 1, and give an example to show the SIC algorithm intuitively.

By performing the autocorrelation operation on CSI corresponding to each pilot during each sub-pilot phase, we have

(𝒉𝒕𝒍)H𝒉𝒕𝒍M\displaystyle\frac{(\bm{h_{t}^{l}})^{H}\bm{h_{t}^{l}}}{M} =k𝑨𝒕𝒍(𝒈𝒌)H𝒈𝒌+(k𝑨𝒕𝒍𝒈𝒌+𝒁𝒕𝒍)H𝒁𝒕𝒍M\displaystyle=\frac{\sum\limits_{k\in\bm{A_{t}^{l}}}(\bm{{g_{k}}})^{H}{\bm{{g_{k}}}}+\left({\sum\limits_{k\in\bm{A_{t}^{l}}}{\bm{{g_{k}}}}+\bm{Z_{t}^{l}}}\right)^{H}\bm{Z_{t}^{l}}}{M} (10)
\xlongrightarrow[](a)|𝑨𝒕𝒍|,M,\displaystyle\xlongrightarrow[\quad]{(a)}|\bm{A_{t}^{l}}|,M\to\infty,

where (a) can be easily derived by utilizing the characteristic of asymptotic favorable propagation of massive MIMO channel.

(10) shows that, with large MM, (𝒉𝒕𝒍)H𝒉𝒕𝒍M\frac{(\bm{h_{t}^{l}})^{H}\bm{h_{t}^{l}}}{M} approaches the number of active UEs selecting pilot 𝑺𝒕\bm{S_{t}} during the lthl^{th} sub-pilot phase. In other words, (𝒉𝒕𝒍)H𝒉𝒕𝒍M\frac{(\bm{h_{t}^{l}})^{H}\bm{h_{t}^{l}}}{M} represents the degree of factor node tlt^{l}.

During the first SIC iteration, the BS first finds factor nodes with degree 1 by utilizing (10). A factor node with degree 1 indicates that there is only one UE selecting the corresponding sub-pilot and the corresponding CSI can be recovered. Then, the BS finds other selected sub-pilots of UEs whose CSIs are recovered. More specifically, for each CSI corresponding to factor node with degree larger than 1, after subtracting each recovered CSI, the BS utilizes (10) to compute the new degree of this factor node. If the new degree is less than the previous degree, this means that the sub-pilot corresponding to this factor node is selected by active UE corresponding to this recovered CSI. We subtract the recovered CSI from the CSI corresponding to this factor node and update the new degree as the previous degree of this factor node. This is equivalent to delete the edges between this active UE and its selected sub-pilots on the bipartite graph. Thus, a new bipartite graph can be obtained, and SIC iteration continues until there is no factor node with degree 1.

Since each active UE selects its sub-pilots randomly, there exits the case of UE kk having no pilot collision during multiple sub-pilot phases. This results in the case of the recovered multiple CSIs corresponding to the same UE. Luckily, by utilizing the asymptotic favorable propagation of massive MIMO channel, we can find these CSIs from the recovered CSIs and select one of them as the recovered CSI of this UE. For example, if estimated 𝒉^𝟏\bm{\hat{h}_{1}} and 𝒉^𝟐\bm{\hat{h}_{2}} correspond to the same active UE, by utilizing the asymptotic favorable propagation of massive MIMO channel, (𝒉^𝟏)H𝒉^𝟐M\frac{(\bm{\hat{h}_{1}})^{H}\bm{\hat{h}_{2}}}{M} is close to 1 with large MM. Otherwise, (𝒉^𝟏)H𝒉^𝟐M\frac{(\bm{\hat{h}_{1}})^{H}\bm{\hat{h}_{2}}}{M} is close to 0 with large MM. Finally, the recovered CSIs via the SIC algorithm are 𝑯^SIC=[𝒉^SIC𝟏,,𝒉^SICNSICs] M×NSICs\bm{\hat{H}_{\text{SIC}}}=[\bm{\hat{h}_{\text{SIC}}^{1},\cdots,\hat{h}_{\text{SIC}}}^{N_{\text{SIC}}^{\text{s}}}]\in{\mathbb{R}}^{\text{ }M\times{N_{\text{SIC}}^{\text{s}}}}.

Input : 𝒉𝒕𝒍,(t=1,2,,τp;l=1,2,,L)\bm{h_{t}^{l}},(t=1,2,\ldots,\tau_{p};l=1,2,\ldots,L)
Output : 𝑯^SIC\bm{\hat{H}_{\text{SIC}}}: a set of recovered CSIs
1 𝒉1,tl=𝒉tl,flag=1,𝑯^SIC=ϕ,i=1\bm{h}_{1,t}^{l}=\bm{h}_{t}^{l},flag=1,\bm{\hat{H}_{\text{SIC}}}=\phi,i=1;
2 while (flag0)(flag\neq 0) do
3       flag=0flag=0;
4       for  all 𝐡i,tl,l{1,2,,L},t{1,2,,τp}\bm{h}_{i,t}^{l},l\in\{1,2,\ldots,L\},t\in\{1,2,\ldots,\tau_{p}\}  do
5             Compute the degree of the corresponding factor node by utilizing (10);
6             if the degree is 1 then
7                   Set flag=1flag=1;
8                   𝑯^SIC=𝑯^SIC𝒉i,tl\bm{\hat{H}_{\text{SIC}}}=\bm{\hat{H}_{\text{SIC}}}\cup\bm{h}_{i,t}^{l};
9                   for  all 𝐡i,mn,m{1,2,,L},n{1,2,,τp}\bm{h}_{i,m}^{n},m\in\{1,2,\ldots,L\},n\in\{1,2,\ldots,\tau_{p}\}  do
10                         if  (𝐡i,mn)H𝐡i,tlM\frac{(\bm{h}_{i,m}^{n})^{H}\bm{h}_{i,t}^{l}}{M} is less than the previous degree  then
11                               update the channel response: 𝒉𝒊+𝟏,𝒎𝒏=𝒉𝒊,𝒎𝒏𝒉i,tl\bm{h_{i+1,m}^{n}}=\bm{h_{i,m}^{n}}-\bm{h}_{i,t}^{l};
12                              
13                         end if
14                        else
15                               update the channel response: 𝒉𝒊+𝟏,𝒎𝒏=𝒉𝒊,𝒎𝒏\bm{h_{i+1,m}^{n}}=\bm{h_{i,m}^{n}};
16                              
17                         end if
18                        
19                   end for
20                  
21             end if
22            
23       end for
24      i=i+1i=i+1;
25      
26 end while
 Return : After deleting the recovered CSIs corresponding to the same UEs in set 𝑯SIC\bm{\bm{H}_{\text{SIC}}} and selecting one of them as the recovered CSI, we have 𝑯^SIC=[𝒉^SIC𝟏,,𝒉^SIC𝑵SIC𝒔]\bm{\hat{H}_{\text{SIC}}}=[\bm{\hat{h}_{\text{SIC}}^{1},\cdots,\hat{h}_{\text{SIC}}^{N_{\text{SIC}}^{s}}}]
Algorithm 1 The SIC Algorithm

Algorithm 1 gives the detailed iteration process of SIC algorithm, where 𝒉𝒊,𝒋𝒌\bm{h_{i,j}^{k}} to represent the CSI corresponding to factor node jkj^{k} during the ithi^{th} iteration.

To better understand the SIC algorithm, an example is given to illustrate the SIC algorithm. The details are described as follows:

During the first iteration (Fig. 3(a)), the BS finds that the degree of factor node 212^{1} is 1 based on (10). So the BS can directly recover the CSI of UE 3, and incorporates this CSI (i.e., 𝒉𝟏,𝟐𝟏\bm{h_{1,2}^{1}}) into the set 𝑯^SIC\bm{\hat{H}_{\text{SIC}}}. Then, after subtracting 𝒉SIC1\bm{h_{\text{SIC}}}^{1} from CSIs corresponding to factor node with degree larger than 1, the BS finds that the new degree of factor node 121^{2} is less than the previous degree according to (10), and thus realizes that the other index of sub-pilot selected by this UE is 1 in the second sub-pilot phase. Subtracting the recovered CSI from the CSI corresponding to factor node 121^{2} (i.e, deleting the lines connected to variable node UE 3), a new bipartite graph can be obtained. Same as above operation, the BS can recover the CSI of UE 1 during the second iteration (i.e., 𝒉𝟐,𝟏𝟐\bm{h_{2,1}^{2}} Fig.3(b)) and the CSI of UE 2 during the third iteration (i.e., 𝒉𝟑,𝟏𝟏\bm{h_{3,1}^{1}} Fig.3(c)). In the end, since there is no factor node with degree 1 (Fig.3(d)), SIC ends. Finally, by utilizing the asymptotic favorable propagation of massive MIMO channel, we find that the recovered CSIs (i.e., 𝒉𝟏,𝟐𝟏\bm{h_{1,2}^{1}}, 𝒉𝟐,𝟏𝟐\bm{h_{2,1}^{2}}, and 𝒉𝟑,𝟏𝟏\bm{h_{3,1}^{1}}) belong to different UEs. Hence, we have 𝒉^SIC𝟏=𝒉𝟏,𝟐𝟏\bm{\hat{h}_{\text{SIC}}^{1}}=\bm{h_{1,2}^{1}}, 𝒉^SIC𝟐=𝒉𝟐,𝟏𝟐\bm{\hat{h}_{\text{SIC}}^{2}}=\bm{h_{2,1}^{2}}, and 𝒉^SIC𝟑=𝒉𝟑,𝟏𝟏\bm{\hat{h}_{\text{SIC}}^{3}}=\bm{h_{3,1}^{1}}.

III-B CICA algorithm

We can see from Fig. 3 that, for these 5 active UEs, we can only recover CSIs of UE 1, UE 2, and UE 3 by utilizing the SIC algorithm, and UE 4 and UE 5 fail to access the network. We propose a CICA algorithm to further obtain the CSIs and decoded uplink messages of UE 4 and UE 5. We briefly describe the CICA algorithm in Algorithm 2. In the following, we use the term “the remaining active UEs” to represent active UEs whose CSIs cannot be recovered by the SIC algorithm for simplify representation. The proposed CICA algorithm first {①} utilizes multiple ICA classifiers to separate the source signals and obtain the decoded signals, and then {②} employs a proposed clustering algorithm to obtain estimated CSIs and decoded uplink messages of the remaining active UEs. The details are described as follows.

Input : 𝒀m=[𝒀m(1),𝒀m(2),,𝒀m(M)]T\bm{Y_{\text{m}}^{{}^{\prime}}}=[\bm{Y_{\text{m}}}(1),\bm{Y_{\text{m}}}(2),\cdots,\bm{Y_{\text{m}}}(M)]^{{T}}, N^r\hat{N}_{r}
Output : 𝒗^CICA\bm{\hat{v}_{\text{CICA}}}: a set of decoded uplink message, 𝑯^CICA\bm{\hat{H}_{\text{CICA}}}: a set of estimated CSIs;
1 r=NI,𝒗^CICA=ϕ,𝑯^CICA=ϕ{r}=N_{\text{I}},\bm{\hat{v}_{\text{CICA}}}=\phi,\bm{\hat{H}_{\text{CICA}}}=\phi;
2 while (r0)(r\neq 0) do
3       𝒇𝒊\bm{f_{i}}\leftarrow Select N^r\hat{N}_{r} row vectors from 𝒀𝒎\bm{Y_{m}^{{}^{\prime}}} randomly to obtain 𝒀ICA𝒊\bm{Y_{\text{ICA}}^{i}}, and then feed it to the ithi^{th} ICA classifier to obtain separated source signal 𝒇𝒊=[𝒇𝒊𝟏,𝒇𝒊𝟐,,𝒇𝒊𝑵^𝒓]\bm{f_{i}}=[\bm{f_{i}^{1}},\bm{f_{i}^{2}},...,\bm{f_{i}^{\hat{N}_{r}}}];
4       r=r1r=r-1;
5      
6 end while
7for  all i{1,2,,NI},t{1,2,,N^r}i\in\{1,2,...,N_{\text{I}}\},t\in\{1,2,...,{\hat{N}_{r}}\}  do
8       𝒇𝒊𝒕^\bm{\hat{f_{i}^{t}}}\leftarrow Use the first decoding symbol in 𝒇𝒊𝒕\bm{f_{i}^{t}} to solve the ICA phase ambiguity problem via (12);
9       DEC(𝒇𝒊𝒕^)\text{DEC}(\bm{\hat{f_{i}^{t}}})\leftarrow After the first symbol in 𝒇𝒊𝒕^\bm{\hat{f_{i}^{t}}} is deleted, 𝒇𝒊𝒕^\bm{\hat{f_{i}^{t}}} is fed into the decoder to obtain the decoded signal DEC(𝒇𝒊𝒕^)\text{DEC}(\bm{\hat{f_{i}^{t}}});
10       jj\leftarrow Judge which class DEC(𝒇𝒊𝒕^)\text{DEC}(\bm{\hat{f_{i}^{t}}}) belongs to by using the proposed clustering algorithm (assume it belongs to class jj) ;
11       𝑪𝒋\bm{C_{j}}\leftarrow Incorporate this signal to the decoded signal set of the corresponding class ;
12       𝒅^𝒋\bm{\hat{d}_{j}}\leftarrow Add the remodulated signal via (13);
13 end for
14for j{1,2,,N^r}j\in\{1,2,...,{\hat{N}_{r}}\}  do
15       𝒗^CICA𝒋=sign(𝒅^𝒋)\bm{\hat{v}_{\text{CICA}}^{j}}=\text{sign}(\bm{\hat{d}_{j}}), 𝒗^CICA=𝒗^CICA𝒗^CICA𝒋\bm{\hat{v}_{\text{CICA}}}=\bm{\hat{v}_{\text{CICA}}}\cup\bm{\hat{v}_{\text{CICA}}^{j}};
16       𝒉^CICA𝒋=𝒀𝒎(𝒗^CICA𝒋)(𝒗^CICAj)H(𝒗^CICAj)\bm{\hat{h}_{\text{CICA}}^{j}}=\frac{\bm{{Y_{m}^{{}^{\prime}}}({{\hat{\bm{v}}_{\text{CICA}}^{j}}})^{*}}}{({{\hat{\bm{v}}_{\text{CICA}}^{j}}})^{H}({{\hat{\bm{v}}_{\text{CICA}}^{j}}})} ;
17       𝑯^CICA=𝑯^CICA𝒉^CICA𝒋\bm{\hat{H}_{\text{CICA}}}=\bm{\hat{H}_{\text{CICA}}}\cup\bm{\hat{h}_{\text{CICA}}^{j}} ;
18 end for
Return : 𝒗^CICA=[𝒗^CICA𝟏,𝒗^CICA𝟐,,𝒗^CICA𝑵^𝒓]\bm{\hat{v}_{\text{CICA}}=[\hat{v}_{\text{CICA}}^{1},\hat{v}_{\text{CICA}}^{2},\cdots,\hat{v}_{\text{CICA}}^{\hat{N}_{r}}]};
           𝑯^CICA=[𝒉^CICA𝟏,,𝒉^CICAN^r]\bm{\hat{H}_{\text{CICA}}}=[\bm{\hat{h}_{\text{CICA}}^{1}},\cdots,\bm{\hat{h}_{\text{CICA}}}^{{\hat{N}_{\text{r}}}}].
Algorithm 2 CICA decoding algorithm

{①} ICA classifiers

The BS first obtains the sum of received superimposed uplink message of the remaining active UEs, denoted by 𝒀mM×Nm\bm{Y_{\text{m}}^{{}^{\prime}}}\in\mathbb{R}^{M\times N_{\text{m}}}.

𝒀m=𝒀mi=1NSICs𝒉SIC𝒊(𝒗^SIC𝒊)T=i=1Nr𝒈𝒊(𝒗𝒊)T+𝒁m=𝑮r𝑽r+𝒁m.\begin{array}[]{l}\bm{Y_{\text{m}}^{{}^{\prime}}}=\bm{Y_{\text{m}}}-\sum\limits_{i=1}^{N_{\text{SIC}}^{\text{s}}}{\bm{h_{\text{SIC}}^{i}}(\bm{\hat{v}_{\text{SIC}}^{i}})^{T}}\\ ={\sum\limits_{i=1}^{{N_{\text{r}}}}{{{\bm{g_{i}}(\bm{v_{i}})^{\text{T}}}}}}+\bm{Z_{\text{m}}^{{}^{\prime}}}\\ =\bm{G}_{\text{r}}\bm{V}_{\text{r}}+\bm{Z_{\text{m}}^{{}^{\prime}}}.\end{array} (11)

where Nr{N_{\text{r}}} denotes the number of the remaining active UEs. Recall that we can obtain the estimated value of Nr{N_{\text{r}}} (i,e., N^r\hat{N}_{\text{r}}) by utilizing (6).

Then, by utilizing the ICA method in [19], the BS utilizes NIN_{\text{I}} ICA classifiers to separate the source signals 𝑽r\bm{V_{\text{r}}} in 𝒀m\bm{Y_{\text{m}}^{{}^{\prime}}}. More specifically, the BS randomly selects N^r\hat{N}_{\text{r}} different row vectors from 𝒀m=[𝒀m(1),,𝒀m(M)]T\bm{Y_{\text{m}}^{{}^{\prime}}}=[\bm{Y_{\text{m}}^{{}^{\prime}}}(1),\cdots,\bm{Y_{\text{m}}^{{}^{\prime}}}(M)]^{T} as the input signal of the ithi^{th} ICA classifier, and the ithi^{th} ICA classifier outputs the separated source signal, denoted by 𝒇𝒊=[𝒇𝒊𝟏,,𝒇𝒊𝑵^r],i=1,,NI\bm{f_{i}}=[\bm{f_{i}^{1}},\cdots,\bm{f_{i}^{\hat{N}_{\text{r}}}}],~{}i=1,\ldots,N_{\text{I}}. We further use the first symbol in each separated source signal to solve the phase ambiguity problem introduced by the ICA classifier as follows

𝒇𝒊𝒕^=fi1(t)×𝒇𝒊𝒕,(i{1,2,,NI},t{1,2,,N^r}).\bm{\hat{f_{i}^{t}}}={f_{i}^{1}}(t)\times\bm{f_{i}^{t}},(i\in\{1,2,...,N_{\text{I}}\},t\in\{1,2,...,{\hat{N}_{\text{r}}}\}). (12)

Finally, after deleting the first symbol in 𝒇𝒊𝒕^\bm{\hat{f_{i}^{t}}}, 𝒇𝒊𝒕^\bm{\hat{f_{i}^{t}}} is fed into the channel decoder to obtain the decoded signal DEC(𝒇𝒊𝒕^)\text{DEC}(\bm{\hat{f_{i}^{t}}}). Thus, we can obtain the decoded signal from the ithi^{th} ICA classifier, i.e., DEC(𝒇𝒊)=[DEC(𝒇𝒊𝟏),,DEC(𝒇𝒊𝒕),,DEC(𝒇𝒊𝑵^r)]\text{DEC}(\bm{f_{i}})=[\text{DEC}(\bm{f_{i}^{1}}),\cdots,\text{DEC}(\bm{f_{i}^{t}}),\cdots,\text{DEC}(\bm{f_{i}^{\hat{N}_{\text{r}}}})].

{②} Clustering algorithm

The order of the ICA classifier output is undetermined, and thus we cannot sure which UE each decoded signal from the ithi^{th} ICA classifier belongs to. To solve this problem, we propose a clustering algorithm to cluster the decoded signals of the same UE from these NIN_{\text{I}} ICA classifiers, and further obtain the estimated CSIs and decoded uplink messages of the remaining active UEs.

We regard each remaining active UE as a class, and the decoded signals of one UE belong to the same class. Therefore, there are N^r{\hat{N}_{\text{r}}} classes, indexed by 1,2,,N^r1,2,\ldots,{\hat{N}_{\text{r}}}. Actually, since each ICA classifier outputs decoded signals of N^r{\hat{N}_{\text{r}}} UEs, we can utilize decoded signals from any ICA classifiers as the first sample in each class. Here, we assume that N^r{\hat{N}_{\text{r}}} decoded signals from the first ICA classifier (i.e., DEC(𝒇𝟏)\text{DEC}(\bm{f_{1}})) are the first sample in each class accordingly.

The BS first judges which class each decoded signal from the ith(i=2,,N^I)i^{th}~{}(i=2,\ldots,{\hat{N}_{\text{I}}}) ICA classifier belongs to. More specifically, considering that the fewer the number of different bits between two decoded signals, the more likely these two decoded signals come from the same UE. The BS compares the number of different bits between the decoded signal DEC(𝒇𝒊𝒕),(t=1,2,,N^r)\text{DEC}(\bm{f_{i}^{t}}),~{}(t=1,2,\ldots,{\hat{N}_{\text{r}}}) and each element in DEC(𝒇𝟏)\text{DEC}(\bm{f_{1}}), and judges DEC(𝒇𝒊𝒕)\text{DEC}(\bm{f_{i}^{t}}) belonging to the class which has the minimum number of different bits with DEC(𝒇𝒊𝒕)\text{DEC}(\bm{f_{i}^{t}}). We use 𝑪𝒋\bm{C_{j}} to denote a set of decoded signals in the jthj^{th} class.

Then, for the jthj^{th} class, the BS remodulates each element in set 𝑪𝒋\bm{C_{j}} by utilizing the BPSK modulator and performs the sum operation as follows

𝒅^𝒋=i=1|𝑪𝒋|2×𝑪𝒋(i)1,\bm{\hat{d}_{j}}=\sum\limits_{i=1}^{|\bm{C_{j}}|}2\times{\bm{C_{j}}(i)}-1, (13)

where 2×𝑪𝒋(i)12\times{\bm{C_{j}}(i)}-1 refers to the remodulated signal.

Finally, the decoded uplink message of the remaining active UE can be obtained by

𝒗^CICAj=sign(𝒅^𝒋),j=1,,N^r,{{\hat{\bm{v}}_{\text{CICA}}^{j}}}=\text{sign}(\bm{\hat{d}_{j}}),~{}j=1,\ldots,{\hat{N}_{\text{r}}}, (14)

and the estimated CSIs of the remaining active UEs can be obtained by

𝒉^CICA𝒋=𝒀𝒎(𝒗^CICA𝒋)(𝒗^CICAj)H(𝒗^CICAj),j=1,,N^r.\bm{\hat{h}_{\text{CICA}}^{j}}=\frac{\bm{{Y_{m}^{{}^{\prime}}}({{\hat{\bm{v}}_{\text{CICA}}^{j}}})^{*}}}{({{\hat{\bm{v}}_{\text{CICA}}^{j}}})^{H}({{\hat{\bm{v}}_{\text{CICA}}^{j}}})},~{}j=1,\ldots,{\hat{N}_{\text{r}}}. (15)

IV Performance Analysis

In this section, we analyze the performance of the proposed GCICA-RA scheme, including the successful access probability, missed detection probability, and the uplink throughput.

IV-A Successful access probability analysis

Based on the procedure of the proposed GCICA-RA scheme, if the CSI of one UE can be obtained, this UE is a detected UE and its uplink message can also be decoded. This means that this UE can access the network successfully. The GCICA-RA scheme first utilizes the SIC algorithm to obtain the CSIs of active UEs, and then employs the proposed CICA algorithm to obtain the CSIs of active UEs whose CSI cannot be recovered by the SIC algorithm. Let SGCICA-RAS_{\text{GCICA-RA}}, SSICS_{\text{SIC}} and SCICAS_{\text{CICA}} denote the number of successful UEs obtained by the proposed GCICA-RA scheme, the SIC algorithm and the CICA algorithm, respectively. Then, the successful access probability of the proposed GCICA-RA scheme is given by

Ps=SGCICA-RANa=SSIC+SCICANa.P_{s}=\frac{S_{\text{GCICA-RA}}}{N_{a}}=\frac{S_{\text{SIC}}+S_{\text{CICA}}}{N_{a}}. (16)

Next, we discuss how to compute terms SSICS_{\text{SIC}} and SCICAS_{\text{CICA}} in (16).

IV-A1 SSICS_{\rm{SIC}} computation

To compute SSICS_{\text{SIC}}, we follow the two assumptions below [14]:

Assumption 1: If an active UE has no pilot collision with other active UEs, its CSI can be recovered successfully.

Assumption 2: When an active UE selects the same pilot with other ll active UEs, if CSIs of these ll UEs can be recovered, its CSI can be recovered successfully.

Let PfailP_{\text{fail}} denote the probability that UE’s CSI cannot be recovered by the SIC algorithm. Then, we have

SSIC=Na(1Pfail).S_{\text{SIC}}=N_{a}\left(1-P_{\text{fail}}\right). (17)

The and-or tree principle is used to study random process, and we employ this principle to compute PfailP_{\text{fail}}. In the following, we first derive the degree distributions of the proposed GCICA-RA scheme, and then discuss how to utilize the and-or tree principle to compute PfailP_{\text{fail}} based on the derived degree distributions.

{①} Degree distributions of the proposed GCICA-RA scheme derivation

Let Λl\Lambda_{l} and Ψl\Psi_{l} denote the probability that the degree of a variable node is ll and the probability that the degree of a factor node is ll, respectively. Then, the corresponding polynomial representations are given by

Λ(x)lΛlxl,Ψ(x)lΨlxl.\Lambda(x)\triangleq\sum\nolimits_{l}{\Lambda_{l}x^{l}},\quad\Psi(x)\triangleq\sum\nolimits_{l}{\Psi_{l}x^{l}}. (18)

The proposed GCICA-RA scheme allows each active UE to select its sub-pilot during each sub-pilot phase, and there are LL sub-pilot phases. Therefore, the degree of each variable node is LL, i.e.,

Λl={1,l=L,0,otherwise.\Lambda_{l}=\left\{\begin{aligned} 1,&&l=L,\\ 0,&&{\rm{otherwise}}.\\ \end{aligned}\right. (19)

In addition, since each active UE randomly selects its sub-pilot during each sub-pilot phase, the event that ll active UEs select the same sub-pilot follows a Bernoulli distribution with parameters NaN_{a} and 1/τp{1}/{\tau_{p}}. Thus, the probability of a factor node with degree ll (i.e., Ψl\Psi_{l}) is

Ψl=(Nal)(1τp)l(11τp)(Nal).\Psi_{l}=\binom{N_{a}}{l}\left(\dfrac{1}{\tau_{p}}\right)^{l}\left(1-\dfrac{1}{\tau_{p}}\right)^{\left({N_{a}}-{l}\right)}. (20)

Let λl\lambda_{l} denote the probability of an edge connecting to a variable node with degree ll, and ρl\rho_{l} denote the probability of an edge connecting to a factor node with degree ll. Then, we transfer the node-perspective presentations in (19) and (20) into the edge perspective presentations, respectively

λl=ΛlllΛll,ρl=ΨlllΨll,\lambda_{l}=\dfrac{\Lambda_{l}l}{\sum\nolimits_{l}{\Lambda_{l}l}},\quad\rho_{l}=\dfrac{\Psi_{l}l}{\sum\nolimits_{l}{\Psi_{l}l}}, (21)

and the polynomial representations are

λ(x)lλlxl1,ρ(x)ρlxl1.\lambda(x)\triangleq\sum\nolimits_{l}{\lambda_{l}x^{l-1}},\rho(x)\triangleq\sum\nolimits{\rho_{l}x^{l-1}}. (22)

{②} PfailP_{\text{fail}} computation

Refer to caption
Figure 4: Probability updates

Considering a factor node with degree ll (i.e., there are ll UEs selecting the corresponding pilot), an edge connecting to this factor node can be recovered when the other l1l-1 edges connecting to this factor node have been recovered, as shown in Fig. 4(a). Similarly, as shown in Fig. 4(b), considering a variable node with degree ll (i.e., UE corresponding to this variable node sends ll sub-pilots to the BS), an edge connecting to a variable node with degree ll can be recovered when at least one of the other l1l-1 edges have been recovered. Let n(m)n(m) denote the probability that an edge connecting to a factor (variable) node with degree ll cannot be recovered. Then, we have

n=1(1m)l1,n=1-\left(1-m\right)^{l-1}, (23)

and

m=nl1.m=n^{l-1}. (24)

By averaging mm and nn over the edge distributions, the evolution of the average erasure probability during the ith(1iI)i^{th}~{}(1\leq i\leq I) iteration where II is the maximum number of iterations, can be written as

ni=lρl(1(1mi1)l1)=1ρ(1mi1),mi=lλlnil1=λ(ni).\begin{array}[]{rcl}n_{i}&=&\sum\nolimits_{l}{\rho_{l}\left(1-\left(1-m_{i-1}\right)^{l-1}\right)\hfill}\\ \\ &=&1-\rho\left(1-m_{i-1}\right),\hfill\\ \\ m_{i}&=&\sum\nolimits_{l}{\lambda_{l}n_{i}^{l-1}}=\lambda\left(n_{i}\right).\end{array} (25)

The update process of mim_{i} and nin_{i} is shown in Fig. 4(c). Specifically, given initial values m0m_{0} and n0n_{0}, mim_{i} and nin_{i} can be derived by (25).

It can be seen from Fig. 4(b) that, a variable node with degree ll is unknown when all of these ll edges cannot be recovered in the IthI^{th} iteration. So, the probability of the variable node being unknown is (nI)l(n_{I})^{l}. By averaging (nI)l(n_{I})^{l} over the degree distributions of variable nodes, PfailP_{\text{fail}} can be calculated by [23]

Pfail=lΛl(nI)l=Λ(nI).P_{\text{fail}}=\sum\nolimits_{l}{\Lambda_{l}(n_{I})^{l}}=\Lambda(n_{I}). (26)

Substituting (26) into (17), we have

SSIC=Na(1Pfail)=Na(1Λ(nI)).S_{\text{SIC}}=N_{a}\left(1-P_{\text{fail}}\right)=N_{a}(1-\Lambda(n_{I})). (27)

IV-A2 SCICAS_{\rm{CICA}} computation

The number of successful UEs obtained by the CICA algorithm can be written as

SCICA=(NaSSIC)PCICAs,S_{\text{CICA}}=(N_{a}-S_{\text{SIC}})P_{\text{CICA}}^{s}, (28)

where PCICAsP_{\text{CICA}}^{s} denotes the probability that the CSI of one UE can be obtained successfully.

Based on the procedure of the CICA algorithm described in Subsection III-B, we can see that, the CICA algorithm first obtains the decoded uplink message via (14), and then obtains UE’s CSI via (15). Thus, if the uplink message of one UE can be decoded successfully, the CSI of this UE can be recovered successfully. Then, PCICAsP_{\text{CICA}}^{s} can be computed by

PCICAs=(1Pe)Nm.P_{\text{CICA}}^{s}=\left(1-P_{e}\right)^{N_{\text{m}}}. (29)

where PeP_{e} is the bit error rate (BER) of the proposed CICA algorithm, which is larger than that using maximum likelihood (ML) decoding method [24], and can be written as

Pe\displaystyle{P_{e}} 1πρ1β1m=1M(g1,m)2ex2𝑑x\displaystyle\geq\dfrac{1}{{\sqrt{\pi}}}{\int}_{\sqrt{\rho_{1}\beta_{1}\sum\nolimits_{m=1}^{M}{{{({g_{1,m}})}^{2}}}}}^{\infty}{{e^{-{x^{2}}}}dx}\hfill
=(a)1π0yyM/21ey/22M/2Γ(M2)ex2𝑑x𝑑y,\displaystyle\mathop{=}\limits^{(a)}\dfrac{1}{{\sqrt{\pi}}}{\int}_{0}^{\infty}{{\int}_{\sqrt{y}}^{\infty}{\dfrac{{{y^{M/2-1}}{e^{-y/2}}}}{{{2^{M/2}}\Gamma(\frac{M}{2})}}}{e^{-{x^{2}}}}}dxdy, (30)

where step (a) follows from the fact that m=1M(g1,m)2\sum\nolimits_{m=1}^{M}{{{({g_{1,m}})}^{2}}} is a central chi-squared distribution with degree of freedom MM and that ρ1β1=1{\rho_{1}\beta_{1}}=1, and Γ(z)\Gamma(z) is the gamma function with parameter zz which is given by

Γ(z)=0tz1et𝑑t.\Gamma(z)=\int_{0}^{\infty}{{t^{z-1}}{e^{-t}}dt}. (31)

Substituting (30) into (29), we can derive the upper bound for PCICAsP_{\text{CICA}}^{s},

PCICAsPCICAU=(11π0yyM/21ey/22M/2Γ(M2)ex2𝑑x𝑑y)Nm,P_{\text{CICA}}^{s}\leq P_{\text{CICA}}^{\text{U}}=\leavevmode\resizebox{305.33788pt}{}{$\left(1-\dfrac{1}{{\sqrt{\pi}}}{\int}_{0}^{\infty}{{\int}_{\sqrt{y}}^{\infty}{\dfrac{{{y^{M/2-1}}{e^{-y/2}}}}{{{2^{M/2}}\Gamma(\frac{M}{2})}}}{e^{-{x^{2}}}}}dxdy\right)^{N_{\text{m}}}$}, (32)

and thus derive the upper bound for SCICAS_{\text{CICA}}

SCICA\displaystyle S_{\text{CICA}} SCICAU\displaystyle\leq S_{\text{CICA}}^{\text{U}}
=PCICAU(NaSSIC)\displaystyle=P_{\text{CICA}}^{\text{U}}(N_{a}-S_{\text{SIC}})\hfill
=(11π0yyM/21ey/22M/2Γ(M2)ex2𝑑x𝑑y)Nm\displaystyle=\leavevmode\resizebox{352.31624pt}{}{$\left(1-\dfrac{1}{{\sqrt{\pi}}}{\int}_{0}^{\infty}{{\int}_{\sqrt{y}}^{\infty}{\dfrac{{{y^{M/2-1}}{e^{-y/2}}}}{{{2^{M/2}}\Gamma(\frac{M}{2})}}}{e^{-{x^{2}}}}}dxdy\right)^{N_{\text{m}}}$}
×(NaSSIC).\displaystyle\quad\times(N_{a}-S_{\text{SIC}}). (33)

Substituting (33), (27) into (16), we can get the upper bound for the successful access probability of the proposed GCICA-RA scheme

PsPsU\displaystyle P_{s}\leq P_{s}^{\text{U}} =(NaΛ(nI))(11π0yyM/21ey/22M/2Γ(M2)ex2𝑑x𝑑y)NmNa\displaystyle=\frac{\leavevmode\resizebox{352.31624pt}{}{$(N_{a}\Lambda(n_{I}))\left(1-\dfrac{1}{{\sqrt{\pi}}}{\int}_{0}^{\infty}{{\int}_{\sqrt{y}}^{\infty}{\dfrac{{{y^{M/2-1}}{e^{-y/2}}}}{{{2^{M/2}}\Gamma(\frac{M}{2})}}}{e^{-{x^{2}}}}}dxdy\right)^{N_{\text{m}}}$}}{N_{a}}
+Na(1Λ(nI))Na.\displaystyle\qquad+\frac{N_{a}(1-\Lambda(n_{I}))}{N_{a}}. (34)

IV-B Missed detection probability analysis

The missed detection probability refers to the ratio of the number of undetected active UEs to the total number of active UEs, which can be calculated as

Pmd=NaSGCICA-RANa=1Ps.P_{\text{md}}=\dfrac{N_{a}-S_{\text{GCICA-RA}}}{N_{a}}=1-P_{s}. (35)

Substituting (34) into (35), we can get the lower bound for the missed detection probability

PmdPmdL=1PsU=1[Na(1Λ(nI))Na+(NaΛ(nI))×(11π0yyM/21ey/22M/2Γ(M2)ex2𝑑x𝑑y)NmNa].\begin{array}[]{rcl}P_{\text{md}}&\geq&P_{\text{md}}^{\text{L}}\hfill\\ &=&1-P_{s}^{\text{U}}\hfill\\ &=&1-[\frac{N_{a}(1-\Lambda(n_{I}))}{N_{a}}+(N_{a}\Lambda(n_{I}))\times\\ &&\frac{\leavevmode\resizebox{352.31624pt}{}{$\left(1-\dfrac{1}{{\sqrt{\pi}}}{\int}_{0}^{\infty}{{\int}_{\sqrt{y}}^{\infty}{\dfrac{{{y^{M/2-1}}{e^{-y/2}}}}{{{2^{M/2}}\Gamma(\frac{M}{2})}}}{e^{-{x^{2}}}}}dxdy\right)^{N_{\text{m}}}$}}{N_{a}}].\end{array} (36)

IV-C Uplink throughput analysis

We define the uplink throughput as follows

γ=SSchemeNameNPDRNPD+OSchemeName=NaPsNPDRNPD+OSchemeName,\begin{array}[]{l}\gamma=\dfrac{{{S_{\text{SchemeName}}}{N_{\text{PD}}}R}}{{N_{\text{PD}}}+O_{\text{SchemeName}}}=\dfrac{{{N_{a}}{P_{s}}{N_{\text{PD}}}R}}{{N_{\text{PD}}}+O_{\text{SchemeName}}},\end{array} (37)

where SSchemeName{S_{\text{SchemeName}}} denotes the number of successful UEs where subscript “SchemeName” stands for the name of the scheme, OSchemeNameO_{\text{SchemeName}} denotes the overhead of the random access scheme, and NPD+OSchemeName{N_{\text{PD}}+O_{\text{SchemeName}}} is the frame length. Fig. 1 indicates that the amount of total overhead of the proposed GCICA-RA scheme is OGCICA-RA=τp×L+1O_{\text{GCICA-RA}}=\tau_{p}\times L+1.

Substituting (34) into (37), we can derive the upper bound for the uplink throughput of the proposed GCICA-RA scheme

γγU=NaPsUNPDRNPD+τp×L+1.\gamma\leq\gamma^{\text{U}}=\dfrac{{{N_{a}P_{s}^{\text{U}}}{N_{\text{PD}}}R}}{{N_{\text{PD}}}+\tau_{p}\times L+1}. (38)

V Numerical Results

In this section, we first present the performance of the proposed GCICA-RA scheme, including the successful access probability, missed detection probability, and MSE performance of the CSI estimation method. Then, we make a comparison between the proposed GCICA-RA scheme, multiple-preamble grant-free RA scheme proposed in [20] and the traditional random access scheme in terms of the uplink throughput. For the traditional random access scheme, active UEs sends their randomly selected pilots along with their uplink messages to the BS, and the BS can only decode the uplink message of UE free from pilot collision.

In the simulation, we consider the urban micro scenario, where the path loss exponent is 3.8 [25]. The radius of the cell is 200 meters and all UEs are uniformly distributed among the location farther than 25 meters from the BS. Simulation parameters are shown in Table II. In addition, we utilize a LDPC code with 1/2 rate to code the payload data, and then employ the BPSK scheme to module the coded payload data. In the simulation, since the length of payload data is a few hundred bytes in M2M communications [26], the payload data size is set to 128 bytes to meet the communication requirements of M2M communications, and further to verify the proposed GCICA-RA scheme.

TABLE II: Simulation parameters
Parameter Value
RR  (Code rate) 1/2
NPDN_{\text{PD}} 
(Symbol length of the coded
payload data)
2048
MM (The number of antennas) 400
SNRe\text{SNR}_{e} 
(Median signal to noise ratio (SNR)
of the UEs at the corner of cell)
5, 10, 15, 20 dB
τp\tau_{p} (The number of pilots during each sub-pilot phase) 6,9,10
LL (The number of sub-pilot phases) 2,3
NIN_{\rm{I}} (The number of ICA classifiers) 5\sim30
NaN_{a} 
(The number of active UEs during
one random access procedure)
10 \sim 40
Refer to caption
Figure 5: Successful access probability versus the number of ICA classifiers NIN_{\text{I}}.
Refer to caption
Figure 6: Missed detection probability versus the number of ICA classifiers NIN_{\text{I}}.
Refer to caption
Figure 7: MSE performance versus the number of ICA classifiers NIN_{\text{I}}.
Refer to caption
Figure 8: Uplink throughput comparison between GCICA-RA and multiple-preamble grant-free RA scheme.

Fig. 5 shows how the successful access probability PsP_{s} changes with the number of ICA classifiers NIN_{\text{I}}, where SNRe=5,10,15,20\text{SNR}_{e}=5,10,15,20 dB, M=400M=400, L=2L=2, Na=20N_{a}=20 and τp=10\tau_{p}=10. The upper bound for the successful access probability can be obtained according to (34). We can see from Fig. 5 that, with the increase of NIN_{\text{I}}, the successful access probability increases dramatically first and then increases at a slower pace for different SNRe\text{SNR}_{e}. The reason is that, the more the number of ICA classifiers, the more signals of one UE we can obtain, which further improves the decoding performance. We can also observe that, with the increase of SNRe\text{SNR}_{e}, the successful access probability increases, and is close to the upper bound.

Fig. 6 shows how the missed detection probability changes with the number of ICA classifiers NIN_{\text{I}}, where SNRe=5,10,15,20\text{SNR}_{e}=5,10,15,20 dB, M=400M=400, L=2L=2, Na=20N_{a}=20 and τp=10\tau_{p}=10. The lower bound for the missed detection probability can be obtained according to (36). Fig. 6 illustrates that, with the increase of NIN_{\text{I}}, the missed detection probability decreases dramatically first and then decreases at a slower pace for different SNRe\text{SNR}_{e}. We can also note that, with the increase of SNRe\text{SNR}_{e}, the missed detection probability takes small values and decreases, and is close to the lower bound.

Fig. 7 illustrates MSE performance of the proposed GCICA-RA, where SNRe=5,10,15,20\text{SNR}_{e}=5,10,15,20 dB, M=400M=400, L=2L=2, Na=20N_{a}=20 and τp=10\tau_{p}=10. We can see from Fig. 7 that, with the increase of NIN_{\text{I}}, MSE decreases dramatically first and then decreases at a slower pace for different SNRe\text{SNR}_{e}. We can also note that MSE takes small values and decreases with the increase of SNRe\text{SNR}_{e}.

Fig. 8 compares the uplink throughput between the proposed GCICA-RA, multiple-preamble grant-free RA schemes in [20], and the traditional random access scheme with different LL. We set M=400M=400, SNRe=10\text{SNR}_{e}=10 dB and NI=30N_{\text{I}}=30. To see how the uplink throughput changes with the number of sub-pilot phases, we fix the length of the super pilot to 18, i.e., L×τp=18L\times\tau_{p}=18, and set LL to 2 and 3. To compare fairly, we ensure all random access scheme have the same pilot length and the same symbol length of the modulated uplink message. The upper bound for the uplink throughput of the proposed GCICA-RA is obtained via (38). Note that, since upper bounds for the uplink throughput of the proposed GCICA-RA are same for cases of L=2L=2 and L=3L=3 based on (38), we not distinguish these two upper bounds in this figure. It is observed that, the uplink throughput of L=3L=3 is slightly higher than that of L=2L=2 for the proposed GCICA-RA scheme. The reason is that the number of iterations of the SIC for L=2L=2 is larger than that for L=3L=3 on average, which results in the higher CSI estimation error [14] and further increase the equivalent noise introduced by the SIC algorithm. We also see that, the uplink throughput of the proposed GCICA-RA scheme is close to the upper bound, and significantly higher than those of baselines. With the increase of the number of active UEs, the gap between the uplink throughput of the proposed GCICA-RA scheme and those of baselines increases. This means that our proposed GCICA-RA is more suitable to crowded scenarios.

VI Conclusion

An GCICA-RA grant-free scheme was proposed to support massive connectivity for M2M communications in massive MIMO systems. The GCICA-RA scheme allows each active UE to transmit their super pilots and modulated uplink messages to the BS. Based on the received pilot signal and modulated uplink message, the BS utilizes a proposed GCICA algorithm to estimate the CSI and decode the uplink message of each active UE jointly, and then employs the estimated CSIs to detect active UEs. Simulation results demonstrated that, our proposed GCICA-RA scheme achieves performance gain even in the very crowded scenarios.

References

  • [1] J. A. Stankovic, “Research directions for the internet of things,” IEEE Internet of Things Journal, vol. 1, no. 1, pp. 3–9, Feb. 2014.
  • [2] P. Schulz, M. Matthe, H. Klessig, M. Simsek, G. Fettweis, J. Ansari, S. A. Ashraf, B. Almeroth, J. Voigt, I. Riedel, A. Puschmann, A. Mitschele-Thiel, M. Muller, T. Elste, and M. Windisch, “Latency critical IoT applications in 5G: Perspective on the design of radio interface and network architecture,” IEEE Communications Magazine, vol. 55, no. 2, pp. 70–78, Feb. 2017.
  • [3] K. Ashton, “That ’internet of things’ thing,” RFiD Journal, vol. 22, pp. 97–114, Jan. 2009.
  • [4] G. Wu, S. Talwar, K. Johnsson, N. Himayat, and K. Johnson, “M2m: From mobile to embedded internet,” Communications Magazine, IEEE, vol. 49, pp. 36 – 43, May. 2011.
  • [5] C. VNI, “Cisco visual networking index: Forecast and trends, 2017¨c2022,” White Paper, 2018.
  • [6] H. Q. Ngo, E. G. Larsson, and T. L. Marzetta, “Energy and spectral efficiency of very large multiuser MIMO systems,” IEEE Transactions on Communications, vol. 61, no. 4, pp. 1436–1449, Apr. 2013.
  • [7] C. Xu, Y. Hu, C. Liang, J. Ma, and L. Ping, “Massive MIMO, non-orthogonal multiple access and interleave division multiple access,” IEEE Access, vol. 5, pp. 14 728–14 748, 2017.
  • [8] C. Anton and M. Dohler, Machine-to-machine (M2M) Communications Architecture, Performance and Applications.   Elsevier, Jan. 2015.
  • [9] J. Yuan, H. Shan, A. Huang, T. Q. S. Quek, and Y. Yao, “Massive machine-to-machine communications in cellular network: Distributed queueing random access meets MIMO,” IEEE Access, vol. 5, pp. 2981–2993, 2017.
  • [10] L. Sanguinetti, A. A. D’Amico, M. Morelli, and M. Debbah, “Random access in uplink massive mimo systems: How to exploit asynchronicity and excess antennas,” in 2016 IEEE Global Communications Conference (GLOBECOM), Dec. 2016, pp. 1–5.
  • [11] Z. Dawy, W. Saad, A. Ghosh, J. G. Andrews, and E. Yaacoub, “Toward massive machine type cellular communications,” IEEE Wireless Communications, vol. 24, no. 1, pp. 120–128, Feb. 2017.
  • [12] J. H. Sørensen, E. de Carvalho, and P. Popovski, “Massive MIMO for crowd scenarios: A solution based on random access,” in IEEE Globecom Workshops, Dec. 2014, pp. 352–357.
  • [13] E. Björnson, E. de Carvalho, J. H. Sørensen, E. G. Larsson, and P. Popovski, “A random access protocol for pilot allocation in crowded massive MIMO systems,” IEEE Transactions on Wireless Communications, vol. 16, no. 4, pp. 2220–2234, Apr. 2017.
  • [14] H. Han, Y. Li, and X. Guo, “A graph-based random access protocol for crowded massive MIMO systems,” IEEE Transactions on Wireless Communications, vol. 16, no. 11, pp. 7348–7361, Nov. 2017.
  • [15] H. Han, X. Guo, and Y. Li, “A high throughput pilot allocation for M2M communication in crowded massive MIMO systems,” IEEE Transactions on Vehicular Technology, vol. 66, no. 10, pp. 9572–9576, Oct. 2017.
  • [16] H. Han, Y. Li, and X. Guo, “User identity-aided pilot access scheme for massive MIMO-IDMA system,” IEEE Transactions on Vehicular Technology, vol. 68, no. 6, pp. 6197–6201, Jun. 2019.
  • [17] J. Ahn, B. Shim, and K. B. Lee, “Ep-based joint active user detection and channel estimation for massive machine-type communications,” IEEE Transactions on Communications, vol. 67, no. 7, pp. 5178–5189, Jul. 2019.
  • [18] L. Liu and W. Yu, “Massive connectivity with massive MIMO-Part I: Device activity detection and channel estimation,” IEEE Transactions on Signal Processing, vol. 66, no. 11, pp. 2933–2946, Jun. 2018.
  • [19] H. Han, Y. Li, W. Zhai, and L. Qian, “A grant-free random access scheme for M2M communication in massive MIMO systems,” IEEE Internet of Things Journal, vol. 7, no. 4, pp. 3602–3613, Apri. 2020.
  • [20] H. Jiang, D. Qu, J. Ding, and T. Jiang, “Multiple preambles for high success rate of grant-free random access with massive MIMO,” IEEE Transactions on Wireless Communications, vol. 18, no. 10, pp. 4779–4789, Oct. 2019.
  • [21] L. Shen, Y. Yao, and H. Wang, “ICA based semi-blind decoding method for a multicell multiuser massive MIMO uplink system in Rician/Rayleigh fading channels,” IEEE Transactions on Wireless Communications, vol. 16, no. 11, pp. 7501–7511, Nov. 2017.
  • [22] J. Shen, J. Zhang, and K. B. Letaief, “Downlink user capacity of massive MIMO under pilot contamination,” IEEE Transactions on Wireless Communications, vol. 14, no. 6, pp. 3183–3193, Jun. 2015.
  • [23] G. Liva, “Graph-based analysis and optimization of contention resolution diversity slotted aloha,” IEEE Transactions on Communications, vol. 59, no. 2, pp. 477–487, Feb. 2011.
  • [24] G. P. John, Digital Communications.   Columbus, OH, USA: McGraw-Hill, 2001.
  • [25] M. Fallgren and B. Timus, “Spatial channel model for multiple input multiple output (MIMO) simulations (Release 13),” document TR 25.996, 3GPP, Tech. Rep., Dec. 2015.
  • [26] H. Lee, “The seven charicteristics of M2M traffic: Observations and implications,” IEEE Transactions on Vehicular Technology, vol. 2, pp. 341–349, Dec. 2013.