This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

A Sparsity Adaptive Algorithm to Recover NB-IoT Signal from Legacy LTE Interference

Yijia Guo, Wenkun Wen, Peiran Wu, and Minghua Xia Manuscript received June 12, 2021; revised August 4, 2021; accepted September 10, 2021. This work was supported in part by the Key-Area Research and Development Program of Guangdong Province under Grant No. 2018B010114001, and in part by the National Natural Science Foundation of China under Grants 61801526, 62171486, and U2001213. The associate editor coordinating the review of this letter and approving it for publication was Kun Yang. (Corresponding author: Minghua Xia.)Y. Guo, P. Wu and M. Xia are with the School of Electronics and Information Technology, Sun Yat-sen University, Guangzhou 510006, China (e-mail: [email protected], {wupr3, xiamingh}@mail.sysu.edu.cn).W. Wen is with the Guangzhou Techphant Co. Ltd., Guangzhou 510310, China (e-mail: [email protected]).
Abstract

As a forerunner in 5G technologies, Narrowband Internet of Things (NB-IoT) will be inevitably coexisting with the legacy Long-Term Evolution (LTE) system. Thus, it is imperative for NB-IoT to mitigate LTE interference. By virtue of the strong temporal correlation of the NB-IoT signal, this letter develops a sparsity adaptive algorithm to recover the NB-IoT signal from legacy LTE interference, by combining KK-means clustering and sparsity adaptive matching pursuit (SAMP). In particular, the support of the NB-IoT signal is first estimated coarsely by KK-means clustering and SAMP algorithm without sparsity limitation. Then, the estimated support is refined by a repeat mechanism. Simulation results demonstrate the effectiveness of the developed algorithm in terms of recovery probability and bit error rate, compared with competing algorithms.

Index Terms:
KK-means clustering, LTE interference, Narrowband Internet of Things, sparse recovery.

I Introduction

With the online convening of the ITU-R WP5D #35 meeting held on July 9th, 2020, Narrowband Internet of Things (NB-IoT) has been formally approved as part of the 5G standard, aiming at massive machine-type communications. As a forerunner in 5G ecosystem construction and industrial applications, NB-IoT will be inevitably coexisting with legacy Long-Term Evolution (LTE) systems. In real-world applications, NB-IoT can operate in three distinct modes: stand-alone, guard-band, or in-band. Among them, the in-band mode impacts NB-IoT and LTE performance as it bundles NB-IoT directly into the LTE’s channels. Thus, eliminating interference from legacy LTE signal benefits the performance of in-band operating NB-IoT.

As the bandwidth of NB-IoT is much smaller than that of LTE, the NB-IoT signal is sparse in the frequency domain. Accordingly, recovering the NB-IoT signal from wideband LTE interference can be modeled as a sparse recovery problem. In recent years, the theory of compressed sensing (CS) [1] was widely used to solve various sparse recovery problems in wireless systems. For instance, in [2] the CS theory was exploited to cancel narrow-band interference (NBI) in orthogonal frequency division multiplexing (OFDM) systems. In [3, 4], several CS-based greedy algorithms were developed for joint data recovery and NBI mitigation in OFDM systems. In [5], the CS theory was applied to achieve both high detection and low false alarm probabilities for wideband spectrum sensing in cognitive radio systems. On the other hand, there have been extensive works on designing CS-based greedy algorithms, such as subspace pursuit [6], sparsity adaptive matching pursuit (SAMP) [7], and iterative reweighted least-squares [8]. However, the CS theory requires that an observation matrix must satisfy the restricted isometry property [9], which does not always hold in practice.

Unlike the statistical schemes described above, machine learning was recently applied in [10] to eliminate NB-IoT interference to LTE system, where the support of NB-IoT subcarriers was located by an initial support distribution vector. In particular, this initial vector was first used to generate candidate supports from which several favorable ones were chosen, then the support distribution vector was updated as per the favorable ones by minimizing their cross-entropy. However, NB-IoT signal was simply modeled as an NBI in [10], without exploiting the signal characteristics. By accounting for the continuous distribution of multiple NB-IoT subcarriers, a recent work [11] developed an intelligent recovery algorithm based on KK-means clustering, where the support of subcarriers was first estimated based on KK-means strategy and then located by a sliding window whose length equals the prior sparsity of NB-IoT signals.

For in-band operating NB-IoT, as the coherence time of NB-IoT signal is much larger than that of one OFDM symbol[12], the NB-IoT signal is characterized by strong temporal correlation, implying it has invariant support over one received OFDM frame of interest [10]. On account of the temporal correlation effect, this letter designs a sparsity adaptive recovery algorithm by combining KK-means clustering and SAMP algorithm. In particular, the support of the NB-IoT signal is first estimated coarsely by KK-means clustering and SAMP algorithm without sparsity limitation. Then, the estimated support is refined by a repeat mechanism. Compared with state-of-the-art competing algorithms, extensive simulation results demonstrate the effectiveness of the developed algorithm in terms of recovery probability, bit error rate, and convergence.

Notation: Vectors and matrices are denoted by lower- and upper-case letters in bold typeface. The superscripts ()(\cdot)^{\dagger} and ()H(\cdot)^{H} indicate the pseudo-inverse and conjugate transpose, respectively. The matrices 𝑭N\bm{F}_{N} and 𝑭NH\bm{F}_{N}^{H} with size N×NN\times N refer to discrete Fourier transform (DFT) and inverse discrete Fourier transform (IDFT), respectively. The symbol 𝒙~\tilde{\bm{x}} transforms 𝒙\bm{x} in time domain into frequency domain. The norms 0\left\|\cdot\right\|_{0} and 2\left\|\cdot\right\|_{2} stand for the 0\ell_{0}- and 2\ell_{2}-norm, respectively. The operator Card(𝒮)\text{Card}\left(\mathcal{S}\right) gives the cardinality of set 𝒮\mathcal{S} and 𝑾𝒮\bm{W}_{\mathcal{S}} indicates the submatrix of 𝑾\bm{W}, whose columns are indexed by set 𝒮\mathcal{S}.

II System Model

As shown in Fig. 1, the base station (BS) multiplexes the NB-IoT and LTE traffic onto the same frequency spectrum. To be specific, the NB-IoT occupies one physical resource block (PRB) in the LTE system bandwidth while the LTE occupies the other PRBs. Obviously, the mutual interference between NB-IoT and LTE signals is inevitable.

Refer to caption
Figure 1: The time-frequency frame structure of in-band NB-IoT (PUSCH: physical uplink shared channel; PUCCH: physical uplink control channel; RS: reference signal; NPUSCH: narrowband physical uplink shared channel; DMRS: demodulation reference signal).

Figure 2 depicts the frame structure of LTE. It is clear that the zero-padding (ZP) is the guard interval between two consecutive OFDM blocks, so as to eliminate the inter-symbol interference (ISI). As a result, each OFDM symbol is composed of an OFDM block consisting of NN subcarriers and a length-vv zero sequence.

Refer to caption
Figure 2: The ZP-OFDM frame structure of LTE.

Suppose the channel between an LTE user equipment (UE) and its associated BS has a channel impulse response (CIR) 𝒉[h(0),h(1),,h(L)]\bm{h}\triangleq\begin{bmatrix}h(0),h(1),\cdots,h(L)\end{bmatrix} where LL is the length of CIR, then, the received LTE signal at the BS can be formulated as

𝒚LTE=𝑯LTE𝑻ZP𝒙~LTE,\bm{y}_{\text{LTE}}=\bm{H}_{\text{LTE}}\bm{T}_{\text{ZP}}\tilde{\bm{x}}_{\text{LTE}}, (1)

where 𝒙~LTE\tilde{\bm{x}}_{\text{LTE}} denotes the transmitted LTE signal in the frequency domain; 𝑻ZP[𝑭N𝟎N×v]H\bm{T}_{\text{ZP}}\triangleq\begin{bmatrix}\bm{F}_{N}&\bm{0}_{N\times v}\end{bmatrix}^{H} indicates the zero-padding process; 𝑯LTE\bm{H}_{\text{LTE}} is modeled as a P×PP\times P lower triangular Toeplitz matrix whose first column is [𝒉𝟎1×(PL1)]H\begin{bmatrix}\bm{h}&\bm{0}_{1\times(P-L-1)}\end{bmatrix}^{H}, where PN+vP\triangleq N+v. In view of all-zero submatrix 𝟎v×N\bm{0}_{v\times N} in 𝑻ZP\bm{T}_{\text{ZP}}, 𝑯LTE\bm{H}_{\text{LTE}} can be expressed as a circulant matrix, with first row being [h(0),𝟎1×(PL1),h(L),,h(1)]\begin{bmatrix}h(0),\bm{0}_{1\times(P-L-1)},h(L),\cdots,h(1)\end{bmatrix}.

As specified in Release 13 of the 3GPP specification TS 36.211 [13], a transport data block of NB-IoT is first generated through channel coding, modulation and resource mapping, and then transmitted over resource units (RUs). As illustrated in Fig. 3, there are four distinct RU formats in NPUSCH, with each occupying different subcarriers and slots. For instance, the RU format 1 occupies 1212 subcarriers and 22 slots whereas format 4 occupies 11 subcarrier and 1616 slots.

Refer to caption
Figure 3: The deployment of different RUs in NPUSCH.

Based on the aforementioned discussion, the received NB-IoT signal at the BS can be formulated as a sparse signal:

𝒚~NB=[y~NB(0),y~NB(1),,y~NB(P1)]H,\tilde{\bm{y}}_{\text{NB}}=\begin{bmatrix}\tilde{y}_{\text{NB}}(0),\tilde{y}_{\text{NB}}(1),\cdots,\tilde{y}_{\text{NB}}(P-1)\end{bmatrix}^{H}, (2)

with

y~NB(t)={at,mtn;0,otherwise,\tilde{y}_{\text{NB}}(t)=\left\{\begin{aligned} a_{t},&\ m\leq t\leq n;\\ 0,&\ \text{otherwise},\end{aligned}\right. (3)

where ata_{t}\in\mathbb{C} is the signal amplitude at the ttht^{\rm th} subcarrier, and m0m\geq 0 and nP1n\leq P-1 are the indices of the first and last subcarriers of the NB-IoT signal, respectively. 𝒮{t|y~NB(t)0,t=0,1,,P1}\mathcal{S}\triangleq\left\{t|\tilde{y}_{\text{NB}}(t)\neq 0,\ t=0,1,\cdots,P-1\right\} is the support of 𝒚~NB\tilde{\bm{y}}_{\text{NB}}, namely, the index set of nonzero elements of 𝒚~NB\tilde{\bm{y}}_{\text{NB}}. Also, it is evident that Card(𝒮)=Nsc\text{Card}\left(\mathcal{S}\right)=N_{\rm sc} with Nsc{1,3,6,12}N_{\rm sc}\in\left\{1,3,6,12\right\}, as configured in Fig. 3.

In light of (1) and (2), the received signal in time domain at the BS can be expressed as

𝒚\displaystyle\bm{y} =𝒚LTE+𝑭PH𝒚~NB+𝒏\displaystyle=\bm{y}_{\text{LTE}}+\bm{F}_{P}^{H}\tilde{\bm{y}}_{\text{NB}}+\bm{n} (4)
=𝑯LTE𝑻ZP𝒙~LTE+𝑭PH𝒚~NB+𝒏,\displaystyle=\bm{H}_{\text{LTE}}\bm{T}_{\text{ZP}}\tilde{\bm{x}}_{\text{LTE}}+\bm{F}_{P}^{H}\tilde{\bm{y}}_{\text{NB}}+\bm{n}, (5)

where 𝒏\bm{n} denotes an additive white Gaussian noise (AWGN) with zero mean and covariance matrix σ2𝑰\sigma^{2}\bm{I}. Moreover, the instantaneous received power of the NB-IoT signal and LTE signal can be explicitly computed as

PNB=𝒚NBH𝒚NBNsc,PLTE=𝒚LTEH𝒚LTEN,P_{\text{NB}}=\frac{\bm{y}_{\text{NB}}^{H}\bm{y}_{\text{NB}}}{N_{\rm sc}},\quad P_{\text{LTE}}=\frac{\bm{y}_{\text{LTE}}^{H}\bm{y}_{\text{LTE}}}{N}, (6)

respectively. By definition, the received signal-to-noise ratio (SNR) is given by PNB/σ2P_{\text{NB}}/\sigma^{2} while the received signal-to-interference ratio (SIR) is PNB/PLTEP_{\text{NB}}/P_{\text{LTE}}.

III Algorithm Development

In this section, we first preprocess the received signal given by (5) so as to eliminate the interference caused by the LTE signal. Then, a sparsity adaptive algorithm combining KK-means clustering and SAMP algorithm is developed to efficiently recover NB-IoT signal.

III-A Preprocessing the Received Signal

As 𝑯LTE\bm{H}_{\text{LTE}} defined after (1) is a circulant matrix, it can be diagonalized such that (5) can be rewritten as

𝒚=𝑭PH𝚲LTE𝑭P𝑻ZP𝒙~LTE+𝑭PH𝒚~NB+𝒏,\displaystyle\bm{y}=\bm{F}_{P}^{H}\bm{\Lambda}_{\text{LTE}}\bm{F}_{P}\bm{T}_{\text{ZP}}\tilde{\bm{x}}_{\text{LTE}}+\bm{F}_{P}^{H}\tilde{\bm{y}}_{\text{NB}}+\bm{n}, (7)

where 𝚲LTE\bm{\Lambda}_{\text{LTE}} is a diagonal matrix. After performing DFT over (7), we obtain the received signal in frequency domain:

𝒚~=𝚲LTE𝑭P𝑻ZP𝒙~LTE+𝒚~NB+𝒏~.\tilde{\bm{y}}=\bm{\Lambda}_{\text{LTE}}\bm{F}_{P}\bm{T}_{\text{ZP}}\tilde{\bm{x}}_{\text{LTE}}+\tilde{\bm{y}}_{\text{NB}}+\tilde{\bm{n}}. (8)

Now, we are in a position to mitigate the LTE signal in (8). In light of 𝑭P\bm{F}_{P} being an orthogonal matrix and 𝚲LTE\bm{\Lambda}_{\text{LTE}} being a diagonal matrix, let 𝑮1𝑭PH𝚲LTE1\bm{G}_{1}\triangleq\bm{F}_{P}^{H}\bm{\Lambda}_{\text{LTE}}^{-1}, then, multiplying 𝒚~\tilde{\bm{y}} by 𝑮1\bm{G}_{1} gives

𝒚1=𝑻ZP𝒙~LTE+𝑮1𝒚~NB+𝑮1𝒏~.\bm{y}_{1}=\bm{T}_{\text{ZP}}\tilde{\bm{x}}_{\text{LTE}}+\bm{G}_{1}\tilde{\bm{y}}_{\text{NB}}+\bm{G}_{1}\tilde{\bm{n}}. (9)

Next, by recalling the special structure of the ZP-OFDM system illustrated in Fig. 2, we can fully eliminate the LTE signal by using the zero-padding appended at the end of each OFDM block. To be specific, let 𝑮2[𝟎v×N𝑰v]\bm{G}_{2}\triangleq\begin{bmatrix}\bm{0}_{v\times N}&\bm{I}_{v}\end{bmatrix}, then, multiplying 𝒚1\bm{y}_{1} by 𝑮2\bm{G}_{2} yields

𝒚2=𝑮2𝑮1𝒚~NB+𝑮2𝑮1𝒏~=𝑾𝒚~NB+𝑾𝒏~,\displaystyle\bm{y}_{2}=\bm{G}_{2}\bm{G}_{1}\tilde{\bm{y}}_{\text{NB}}+\bm{G}_{2}\bm{G}_{1}\tilde{\bm{n}}=\bm{W}\tilde{\bm{y}}_{\text{NB}}+\bm{W}\tilde{\bm{n}}, (10)

where 𝑾𝑮2𝑮1v×P\bm{W}\triangleq\bm{G}_{2}\bm{G}_{1}\in\mathbb{C}^{v\times P} is known as an observation matrix. Thus, our remaining task is to recover the sparse signal 𝒚~NB\tilde{\bm{y}}_{\text{NB}} from the postprocessed 𝒚2\bm{y}_{2}.

As shown in Fig. 3, when NB-IoT operates in the in-band mode, the NB-IoT signal in frequency domain occupies several consecutive subcarriers. More accurately, the number of subcarriers is allowed to be 11, 33, 66 or 1212, i.e., Nsc{1,3,6,12}N_{\rm sc}\in\left\{1,3,6,12\right\}. This feature implies that 𝒚2\bm{y}_{2} shown in (10) is a linear combination of several consecutive column vectors of 𝑾\bm{W}. In other words, the correlation coefficients of 𝒚2\bm{y}_{2} and each column vector of 𝑾\bm{W} will show one or more spikes, which can be located by the KK-means clustering.

Applying the least squares (LS) principle to (10), the optimization problem can be formulated as

𝒫1:\displaystyle\mathcal{P}1:\ 𝒚~NB=argmin𝒚~NB𝒚2𝑾𝒚~NB2,\displaystyle\tilde{\bm{y}}_{\text{NB}}^{*}=\underset{\tilde{\bm{y}}_{\text{NB}}}{\arg\min}\left\|\bm{y}_{2}-\bm{W}\tilde{\bm{y}}_{\text{NB}}\right\|_{2}, (11)
s.t. 𝒚~NB0{1,3,6,12},\displaystyle\text{ s.t. }\left\|\tilde{\bm{y}}_{\text{NB}}\right\|_{0}\in\left\{1,3,6,12\right\}, (12)

where the objective function is indeed the 2\ell_{2}-norm of the residue error, that is, r𝒚2𝑾𝒚~NB2r\triangleq\left\|\bm{y}_{2}-\bm{W}\tilde{\bm{y}}_{\text{NB}}\right\|_{2}.

III-B Coarse Estimation of the Support

In principle, finding the support of 𝒚~NB\tilde{\bm{y}}_{\text{NB}} amounts to choosing a set of consecutive column vectors of 𝑾\bm{W} such that their linear combination minimizes the residue error in (11). To this end, the correlation coefficient of 𝒚2\bm{y}_{2} and each column of 𝑾\bm{W} is computed as

γ(i)=|𝒚2H𝑾(:,i)|𝑾(:,i)2,i=1,,P.{\gamma}(i)=\frac{\left|{\bm{y}_{2}^{H}\bm{W}(:,i)}\right|}{\left\|\bm{W}(:,i)\right\|_{2}},\ \forall i=1,\cdots,P. (13)

On account of the continuous distribution of the support of 𝒚~NB\tilde{\bm{y}}_{\text{NB}} (cf. Fig. 3), we employ the KK-means clustering algorithm to classify these coefficients by Euclidean distance [14]. Suppose that we obtain QQ clusters, say, {𝒞q}q=1Q\left\{\mathcal{C}_{q}\right\}_{q=1}^{Q}, where 𝒞q\mathcal{C}_{q} contains correlation coefficients in the qthq^{\rm th} cluster, then, the optimal cluster is determined by

𝒞opt=argmax{γ(i)Card(𝒞q)}q=1Q,γ(i)𝒞q,\mathcal{C}_{\text{opt}}=\arg\max\left\{\frac{\sum\gamma(i)}{\text{Card}\left(\mathcal{C}_{q}\right)}\right\}_{q=1}^{Q},\ \forall\gamma(i)\in\mathcal{C}_{q}, (14)

where 𝒞opt\mathcal{C}_{\text{opt}} is the cluster with the largest mean value of the correlation coefficients. As a result, the optimal column index set is given by

𝒮opt={i|γ(i)𝒞opt}.\mathcal{S}_{\text{opt}}=\left\{i\left|\gamma(i)\in\mathcal{C}_{\text{opt}}\right.\right\}. (15)

Now, since 𝒚2\bm{y}_{2} is more likely a linear combination of column vectors whose column indices belong to 𝒮opt\mathcal{S}_{\text{opt}}, the optimization problem 𝒫1\mathcal{P}1 can be further simplified as

𝒫2:\displaystyle\mathcal{P}2:\ 𝒚~NB=argmin𝒚~NB𝒚2𝑾𝒮opt(𝒚~NB)𝒮opt2,\displaystyle\tilde{\bm{y}}_{\text{NB}}^{*}=\underset{\tilde{\bm{y}}_{\text{NB}}}{\arg\min}\left\|\bm{y}_{2}-\bm{W}_{\mathcal{S}_{\text{opt}}}\left(\tilde{\bm{y}}_{\text{NB}}\right)_{\mathcal{S}_{\text{opt}}}\right\|_{2}, (16)
s.t. (𝒚~NB)𝒮opt0{1,3,6,12}.\displaystyle\text{ s.t. }\left\|\left(\tilde{\bm{y}}_{\text{NB}}\right)_{\mathcal{S}_{\text{opt}}}\right\|_{0}\in\left\{1,3,6,12\right\}. (17)

To deal with 𝒫2\mathcal{P}2, we define a count vector 𝒇P×1\bm{f}_{P\times 1} initialized as a null vector, then, the SAMP algorithm is used to solve the minimization problem in (16) without considering the sparsity constraint in (17). With the estimated support denoted \mathcal{I}, the count vector 𝒇\bm{f} is updated as per

𝒇(j)𝒇(j)+1,j.\bm{f}(j)\leftarrow\bm{f}(j)+1,\ \forall j\in\mathcal{I}. (18)

It is noteworthy that, in practice, the column vectors chosen by 𝒮opt\mathcal{S}_{\text{opt}} shown in (15) may be linearly dependent. If so, this dependence would degrade the recovery probability. To deal with this situation, we randomly disturb the columns of 𝑾\bm{W} to form a new observation matrix 𝑾\bm{W}^{\prime} and corresponding measurement vector 𝒚2\bm{y}_{2}^{\prime}. According to (13)-(15), a new optimal column index set 𝒮opt\mathcal{S}_{\text{opt}}^{\prime} is generated and 𝑾𝒮opt\bm{W}_{\mathcal{S}_{\text{opt}}} in 𝒫2\mathcal{P}2 is replaced by 𝑾𝒮opt\bm{W}_{\mathcal{S}_{\text{opt}}^{\prime}}. Then, the SAMP algorithm is repeatedly used to solve the problem in (16) again. The estimated support is denoted \mathcal{I}^{\prime}, and the count vector 𝒇\bm{f} proceeds with updating by \mathcal{I}^{\prime} according to (18). The aforementioned operations are repeated RmaxR_{\max} times to obtain the final count vector 𝒇\bm{f}, which is next used to refine the estimate of the support.

III-C Refined Estimation of the Support

To minimize the 2\ell_{2}-norm of the residue error in (16), the estimated support \mathcal{I} by the SAMP at each repetition described above does not satisfy the constraint in (17). Now, we exploit the final count vector 𝒇\bm{f} to refine the estimate of the support. It is not hard to understand that, after RmaxR_{\max} repetitions, the final 𝒇\bm{f} contains the distribution information of the real support of NB-IoT signal. Since NB-IoT occupies several continuous subcarriers in the LTE spectrum, finding the real support of the NB-IoT signal is equivalent to finding an index range in 𝒇\bm{f} where an spike occurs.

The procedure to recover the support of NB-IoT signal from the final count vector 𝒇\bm{f} is as follows. First, we define a difference vector 𝒅P×1\bm{d}\in\mathbb{R}^{P\times 1} with entries given by

𝒅(l)={𝒇(l)𝒇(l+1),if 1l<P;𝒇(P)𝒇(1),if l=P.\bm{d}(l)=\left\{\begin{array}[]{rl}\bm{f}(l)-\bm{f}(l+1),&\text{if }1\leq l<P;\\ \bm{f}(P)-\bm{f}(1),&\text{if }l=P.\end{array}\right. (19)

Then, given the indices of the minimum and maximum values in the difference vector 𝒅\bm{d}, denoted p1p_{1} and p2p_{2}, respectively, determined by

p1=argminl=1,,P{𝒅(l)},p2=argmaxl=1,,P{𝒅(l)},\displaystyle p_{1}=\arg\min\limits_{l=1,\cdots,P}\left\{\bm{d}(l)\right\},\quad p_{2}=\arg\max\limits_{l=1,\cdots,P}\left\{\bm{d}(l)\right\}, (20)

the starting point and endpoint of the spike are located. Next, with p1p_{1} and p2p_{2}, a sample set 𝒳\mathcal{X} can be generated as per

𝒳={{𝒇(p1+1),,𝒇(p2)},if 1p1<P;{𝒇(1),,𝒇(p2)},if p1=P.\mathcal{X}=\left\{\begin{array}[]{rl}\left\{\bm{f}(p_{1}+1),\cdots,\bm{f}(p_{2})\right\},&\text{if }1\leq p_{1}<P;\\ \left\{\bm{f}(1),\cdots,\bm{f}(p_{2})\right\},&\text{if }p_{1}=P.\end{array}\right. (21)

If var(𝒳)<ϵ{\rm var}(\mathcal{X})<\epsilon, then it implies that the elements of 𝒇\bm{f} between indices p1p_{1} and p2p_{2} shape one spike. Further, if Card(𝒳){1,3,6,12}\text{Card}\left(\mathcal{X}\right)\in\left\{1,3,6,12\right\}, the estimated optimal support is finally given by

𝒵={(p1+1:p2),if 1p1<P;(1:p2),if p1=P.\mathcal{Z}^{*}=\left\{\begin{array}[]{rl}(p_{1}+1:p_{2}),&\text{if }1\leq p_{1}<P;\\ (1:p_{2}),&\text{if }p_{1}=P.\end{array}\right. (22)

Otherwise, repeat the aforementioned operations until var(𝒳)<ϵ{\rm var}(\mathcal{X})<\epsilon and Card(𝒳){1,3,6,12}\text{Card}\left(\mathcal{X}\right)\in\left\{1,3,6,12\right\}. Simulation results to be discussed at the end of the next section demonstrate that the algorithm converges after 3030 repetitions.

With the optimal support estimated, the transmitted NB-IoT signal can be recovered by using the LS principle. Specifically, let 𝒚LS𝑾𝒵𝒚2\bm{y}_{\text{LS}}\triangleq\bm{W}_{\mathcal{Z}^{*}}^{\dagger}\bm{y}_{2}, then 𝒚~NB\tilde{\bm{y}}_{\text{NB}}^{*} can be expressed as

𝒚~NB(t)={𝒚LS(t𝒵(1)+1),if t𝒵;0,otherwise.\tilde{\bm{y}}_{\text{NB}}^{*}(t)=\left\{\begin{array}[]{rl}\bm{y}_{\text{LS}}\left(t-\mathcal{Z}^{*}(1)+1\right),&\text{if }t\in\mathcal{Z}^{*};\\ 0,&\text{otherwise}.\end{array}\right. (23)

To sum up, the developed algorithm to recover the NB-IoT signal from LTE interference is formalized in Algorithm 1.

IV Simulation Results and Discussions

In this section, we present and discuss the computational complexity and simulation results pertaining to the developed algorithm. In the simulation experiments, to generate the NB-IoT signal, the information bits are encoded by Turbo code with code rate 1/31/3 and the coded bits are modulated with quadrature phase shift keying (QPSK) constellation. As for the LTE signal, the OFDM block length is set to N=600N=600 with ZP length v=144v=144. The length of CIR is L=50L=50. In the signal recovery algorithm, the maximum iteration number is set to Imax=30I_{\max}=30 with each the maximum repetition number Rmax=50R_{\max}=50, and the number of clusters generated by KK-means clustering is Q=30Q=30. The number of NB-IoT subcarriers is specified as {1,3,6,12}\{1,3,6,12\}, which coincides with the real configuration shown in Fig. 3.

Algorithm 1 Recovering NB-IoT Signal for LTE Interference
0:  The measurement vector 𝒚2(1)=𝒚2\bm{y}_{2}^{(1)}=\bm{y}_{2}, the observation matrix 𝑾(1)𝑾\bm{W}^{(1)}\triangleq\bm{W}, the maximum iteration number ImaxI_{\max}, the maximum repetition number RmaxR_{\max}, the variance threshold ϵ\epsilon, and the received signal 𝒚~\tilde{\bm{y}};
0:  The estimated support 𝒵\mathcal{Z}^{*} and NB-IoT signal 𝒚~NB\tilde{\bm{y}}_{\text{NB}}^{*};
1:  Initialization: 𝒇=𝟎P×1\bm{f}=\bm{0}_{P\times 1}, t=1t=1, 𝒜(1)=\mathcal{A}^{(1)}=\emptyset;
2:  while tImaxt\leq I_{\max} do
3:     for k=1:Rmaxk=1:R_{\max} do
4:        for i=1:Pi=1:P do
5:           Calculate γ(i)\gamma(i) according to (13);
6:           Add γ(i)\gamma(i) to the end of 𝒜(k)\mathcal{A}^{(k)};
7:        end for
8:        Apply the KK-means clustering algorithm to 𝒜(k)\mathcal{A}^{(k)};
9:        Compute 𝒞opt\mathcal{C}_{\text{opt}} and 𝒮opt\mathcal{S}_{\text{opt}} as per (14) and (15), resp.;
10:        Recover \mathcal{I} by solving (16) with SAMP algorithm;
11:        Update the count vector 𝒇\bm{f} according to (18);
12:        Update the columns in 𝑾(k)\bm{W}^{(k)} to form 𝑾(k+1)\bm{W}^{(k+1)};
13:        𝒚2(k+1)=𝑾(k+1)𝒚~\bm{y}_{2}^{(k+1)}=\bm{W}^{(k+1)}\tilde{\bm{y}};
14:        𝒜(k+1)=\mathcal{A}^{(k+1)}=\emptyset;
15:     end for
16:     Compute the difference vector 𝒅\bm{d} according to (19);
17:     Find p1p_{1} and p2p_{2} as per (20), and generate sample set 𝒳\mathcal{X} by (21);
18:     if Card(𝒳){1,3,6,12}\text{Card}\left(\mathcal{X}\right)\in\left\{1,3,6,12\right\} and var(𝒳)ϵ{\rm var}(\mathcal{X})\leq\epsilon then
19:        Estimate the support 𝒵\mathcal{Z}^{*} according to (22);
20:        break;
21:     end if
22:     𝒇=𝟎P×1\bm{f}=\bm{0}_{P\times 1};
23:     t=t+1t=t+1;
24:  end while
25:  Compute 𝒚~NB\tilde{\bm{y}}_{\text{NB}}^{*} according to (23);

IV-A Computational Complexity Analysis

Table I compares the computational complexity of the proposed algorithm with three benchmark ones developed in [7, 10, 11]. It is observed that the proposed algorithm has lower complexity than the classic SAMP [7], as the latter locates directly the support of NB-IoT subcarriers without any pre-estimate. The computational complexity of our algorithm and that in [11] (denoted ‘CWS’ for short) is independent of the number of NB-IoT subcarriers (i.e., KK), whereas that in [10] (denoted ‘SCEM’ for short) increases quadratically with KK. The proposed algorithm has a bit higher complexity than that in [11] because the latter assumes the prior sparsity of NB-IoT signal, which is however unknown in practice.

TABLE I: Comparison of Algorithm Complexity
Algorithm Computational Complexity
SAMP [7] 𝒪(Rmaxv2P2)\mathcal{O}(R_{\max}v^{2}P^{2})
SCEM [10] 𝒪(ImaxRmax(NcvK2+NfP))\mathcal{O}(I_{\max}R_{\max}(N_{c}vK^{2}+N_{f}P))
CWS [11] 𝒪(RmaxP2)\mathcal{O}(R_{\max}P^{2})
Proposed 𝒪(ImaxRmaxP2)\mathcal{O}(I_{\max}R_{\max}P^{2})

IV-B Simulation Results and Discussions

Figure 4 shows the recovery probability versus the number of NB-IoT subcarriers. In the pertaining simulation setup, the SNR is fixed to 2323 dB while the SIR is 2020 dB, which means that the system is interference dominated. It is seen from Fig. 4 that the recovery probability decreases with the number of NB-IoT subcarriers, as more subcarriers suffer higher interference. With sparsity known, the developed algorithm outperforms the SCEM and CWS algorithm and approaches the performance in the ideal case. On the other hand, in the case of unknown sparsity, the developed algorithm performs much better than the SCEM and SAMP algorithm.

Refer to caption
Figure 4: The recovery probability vs. the number of subcarriers.

Figure 5 illustrates the bit error rate (BER) versus the SNR of the NB-IoT signal with known sparsity, where the SIR is fixed to 1515 dB and Nsc=6N_{\rm sc}=6 in the left panel (or Nsc=12N_{\rm sc}=12 in the right panel). It is seen that the BER decreases with SNR but increases with the number of NB-IoT subcarriers, as expected. In the case of Nsc=6N_{\rm sc}=6, given the target BER being 10310^{-3}, the left panel of Fig. 5 shows that the required SNR corresponding to the ideal case is about 1212 dB and the SNR required by the proposed algorithm is about 1313 dB, which outperforms the CWS algorithm by 3.53.5 dB and the SCEM algorithm by 44 dB.

Refer to caption
Figure 5: The BER vs. the SNR of NB-IoT signal with known sparsity.
Refer to caption
Figure 6: The BER vs. the SIR of NB-IoT signal with unknown sparsity.

Figure 6 depicts the BER versus the SNR of the NB-IoT signal with unknown sparsity, where the SIR is fixed to 2020 dB and Nsc=6N_{\rm sc}=6 in the left panel (or Nsc=12N_{\rm sc}=12 in the right panel). It shows that the BER of the proposed algorithm approaches that in the ideal case without interference whereas the SAMP and SCEM algorithm perform much worse.

Figure 7 shows the recovery probability versus the maximum repetition number RmaxR_{\max} in each iteration. In the simulation setup, the number of NB-IoT subcarriers is set to Nsc=6N_{\rm sc}=6 with SNR being 2323 dB and SIR being 2020 dB. It is observed that all three curves converge after 30 repetitions. In the case of known sparsity, the proposed algorithm obtains 98%98\% recovery probability, which outperforms the CWS algorithm by 4%4\%, albeit a bit slower convergence. In the case of unknown sparsity, the CWS algorithm does not work anymore but the proposed algorithm has a recovery probability about 90%90\%.

Refer to caption
Figure 7: The recovery probability vs. the maximum repetition number.

V Conclusions

In this letter, a sparsity adaptive algorithm was designed to recover NB-IoT signal from legacy LTE interference. In particular, by using the strong temporal correlation of NB-IoT signal, the support of the NB-IoT signal was first estimated in a coarse way, and then was refined by a repeat mechanism. As the developed two-stage algorithm needs neither the restricted isometry property on the observation matrix nor the sparsity information of the NB-IoT signal, it is promising in real-world applications.

References

  • [1] Y. C. Eldar and G. Kutyniok, Compressed Sensing: Theory and Applications.   Cambridge University Press, 2012.
  • [2] A. Gomaa and N. Al-Dhahir, “A compressive sensing approach to NBI cancellation in mobile OFDM systems,” in Proc. IEEE GLOBECOM’2010, 2010, pp. 1–5.
  • [3] H. Al-Tous, I. Barhumi, and N. Al-Dhahir, “Atomic-norm for joint data recovery and narrow-band interference mitigation in OFDM systems,” in Proc. IEEE PIMRC’2016, 2016, pp. 1–5.
  • [4] H. Al-Tous, I. Barhumi, A. Kalbat, and N. Al-Dhahir, “ADMM for joint data and off-grid NBI recovery in OFDM systems,” in Proc. IEEE WCNC’2018, 2018, pp. 1–6.
  • [5] X. Zhang, Y. Ma, Y. Gao, and S. Cui, “Real-time adaptively regularized compressive sensing in cognitive radio networks,” IEEE Trans. Veh. Technol., vol. 67, no. 2, pp. 1146–1157, Feb. 2018.
  • [6] W. Dai and O. Milenkovic, “Subspace pursuit for compressive sensing signal reconstruction,” IEEE Trans. Inf. Theory, vol. 55, no. 5, pp. 2230–2249, May 2009.
  • [7] T. T. Do, L. Gan, N. Nguyen, and T. D. Tran, “Sparsity adaptive matching pursuit algorithm for practical compressed sensing,” in Proc. 42nd ACSSC, 2008, pp. 581–587.
  • [8] H. Xie, P. Wu, F. Tan, and M. Xia, “Adaptively-regularized compressive sensing with sparsity bound learning,” IEEE Commun. Lett., vol. 25, no. 4, pp. 1283–1287, Apr. 2021.
  • [9] I. Daubechies, R. DeVore, M. Fornasier, and C. S. Güntürk, “Iteratively reweighted least squares minimization for sparse recovery,” Commun. Pure and Applied Math., vol. 63, no. 1, pp. 1–38, Jan. 2010.
  • [10] S. Liu, L. Xiao, Z. Han, and Y. Tang, “Eliminating NB-IoT interference to LTE system: A sparse machine learning-based approach,” IEEE Internet of Things J., vol. 6, no. 4, pp. 6919–6932, Aug. 2019.
  • [11] Y. Guo, P. Wu, and M. Xia, “Recovering NB-IoT signal from legacy LTE interference via K-means clustering,” in Proc. IEEE 93rd VTC’2021-Spring, Helsinki, Finland, Apr. 2021, pp. 1–5.
  • [12] S. Liu, F. Yang, J. Song, and Z. Han, “Block sparse Bayesian learning-based NB-IoT interference elimination in LTE-advanced systems,” IEEE Trans. Commun., vol. 65, no. 10, pp. 4559–4571, Oct. 2017.
  • [13] 3GPP, TS 36.211: “Evolved Universal Terrestrial Radio Access (E-UTRA); Physical Channels and Modulation (Release 15)”, 2018.
  • [14] C. M. Bishop, Pattern Recognition and Machine Learning.   Springer-Verlag New York, Inc., 2006, ch. 9, pp. 423–459.