This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Design of Non-orthogonal and Noncoherent Massive MIMO for Scalable URLLC Beyond 5G

He Chen, Zheng Dong, Jian-Kang Zhang, and Branka Vucetic Part of the paper has been presented at 2019 IEEE International Conference on Industrial Cyber Physical Systems (ICPS) [1]. H. Chen is with the Department of Information Engineering, The Chinese University of Hong Kong, Shatin, NT, Hong Kong SAR, China (Email: [email protected]). Z. Dong is with the School of Information Science and Engineering, Shandong University, China (Email: [email protected]). J.-K. Zhang is with the Department of Electrical and Computer Engineering, McMaster University, Hamilton, Ontario, L8S 4K1, Canada (Email:[email protected]). B. Vucetic are with the School of Electrical and Information Engineering, The University of Sydney, NSW 2006, Australia (Email: [email protected]). The first two authors contributed equally to this work.
Abstract

This paper is to develop and optimize a non-orthogonal and noncoherent massive multiple-input multiple-output (MIMO) framework towards enabling scalable ultra-reliable low-latency communications (sURLLC) in wireless systems beyond 5G. In this framework, the huge diversity gain associated with the large-scale antenna array in massive MIMO systems is leveraged to ensure ultrahigh reliability. To reduce the overhead and latency induced by the channel estimation process, we advocate the noncoherent communication technique which does not need the knowledge of instantaneous channel state information but only relies on the large-scale fading coefficients for information decoding. To boost the scalability of noncoherent massive MIMO systems, we enable the non-orthogonal channel access of multiple users by devising a new differential modulation scheme to assure that each transmitted signal matrix can be uniquely determined in the noise-free case and be reliably estimated in noisy cases when the antenna array size is scaled up. The key idea is to make the transmitted signals from multiple users be superimposed properly over the air such that when the sum-signal is correctly detected, the signal sent by each individual user can be uniquely determined. To further enhance the average error performance when the array antenna number is large, we propose a max-min Kullback-Leibler (KL) divergence-based design by jointly optimizing the transmitted powers of all users and the sub-constellation assignment among them. Simulation results show that the proposed design significantly outperforms the existing max-min Euclidean distance-based counterpart in terms of error performance. Moreover, our proposed approach also has a better error performance than the conventional coherent zero-forcing (ZF) receiver with orthogonal channel training, particularly for cell-edge users.

Index Terms:
Scalable ultra-reliable low-latency communications, massive MIMO, noncoherent communication, non-orthogonal multiple access, uniquely-decomposable constellation group.

I Introduction

The fifth generation (5G) of mobile networks is now rolling out globally and the newly deployed 5G infrastructure is expected to provide commercial services in 2020. Driven by the relentless growth of wireless data traffic over the past three decades, modern wireless communication systems (from 2G to nowadays 4G) have been consistently engineered and developed towards providing better mobile broadband services, with higher and higher data rates to subscribers. The trend is envisioned to continue in 5G as it will need to carry 10,000 times more traffic [2]. Besides, with the grand ambition of offering the connectivity to anything that may benefit from being connected, 5G cellular systems are envisaged to support two brand new service categories in addition to the conventional mobile broadband one: massive machine-type communication (mMTC) [3] and ultra-reliable low-latency communication (URLLC) [4].

The mMTC service refers to providing wireless connectivity for a massive number (tens of thousands) of low-cost and low-energy machine-type devices (MTDs) in a relatively large area. The mMTC can find potential applications in smart metering, smart agriculture, logistics, fleet management, etc. The traffic of these applications is characterized as massive yet sporadic small-packet transmissions which require the support of high spectrum efficiency and network scalability. Furthermore, the network maintenance cost can be huge due to the large amount of nodes. As such, ultra-high energy efficiency is demanded to achieve long battery lifetime of MTDs. On the other hand, URLLC is a service category not present in today’s mobile systems, which targets for mission-critical applications requiring low end-to-end latency with high reliability. Examples are fault detection and isolation in power systems, detection and responses to hazardous road conditions, self-driven vehicles, remote surgery, smart factories, and augmented reality.

Nevertheless, with the continuing deployment of 5G cellular systems in practice, it gradually becomes clear that 5G is inadequate to fulfill the promised vision of being an enabler for the “Internet of Everything”, especially the most innovative URLLC part, due to its inherent limitations [5]. While the enormous network capacity growth is achievable through conventional methods of moving to higher parts of the radio spectrum and network densifications, realizing URLLC will involve a departure from the underlying theoretical principles of wireless communications. More specifically, the coupling and contradictory requirements of low latency and high reliability render the design of URLLC systems a challenging task, since wireless channels are highly dynamic and are susceptible to fading, interference, blockage, and high pathloss, especially when there are lots of moving devices, metallic reflectors and electromagnetic radiation equipments [6, 7, 8, 9, 10]. Such design challenges will be further escalated to provide the envisioned scalable URLLC (sURLLC) services in wireless systems beyond 5G. As defined in [5], sURLLC will scale the 5G URLLC across the device dimension by seamlessly integrating 5G URLLC with legacy mMTC. In sURLLC, the augmented triple reliability-latency-scalability tradeoff will need to be carefully dealt with, which calls for a totally new design framework.

In wireless communications, channel diversity, which refers to a measure of transmitting multiple copies of the same information through independent links along different time/frequency/spatial axises, is one of the most important techniques for boosting system reliability by effectively combating channel fading and interference [11]. As the diversity order increases, wireless channels will gradually become more stable and the chance of requesting retransmissions from the receiver side will correspondingly decrease [7]. However, in realizing sURLLC, time diversity is not preferred since achieving time diversity is at the cost of additional delay, especially in slow fading channels. Besides, delivering the information along distinct frequency channels will consume additional bandwidth, which is costly for the operations under 6 GHz where the frequency band has already been over-crowded [12]. Thus, harnessing the spatial diversity by deploying multiple antennas at the transmitter and/or receiver side becomes the most appealing solution, and there have been extensive studies on various diversity technologies for conventional MIMO systems, see e.g., [13, 14] and references therein.

Recently, massive multiple-input multiple-output (MIMO) technology [15], which scales up the conventional MIMO by deploying a large number of antennas at the transmitter and/or receiver side, has been regarded as an indispensable building block for ensuring ultrahigh reliability [7]. Actually, massive MIMO has already been an integrating part of 5G communications for its great potential [16, 17]. The main advantages of massive MIMO include high array gain, high spatial multiplexing gain and the immune to fast fading in rich scattering environments. The fluctuations of wireless channels can be averaged out in massive MIMO, and high reliability can be maintained for short packets without the need of strong channel coding. Despite the advantages mentioned above, the mechanisms of leveraging massive MIMO for realizing sURLLC are still largely unexplored.

The reliability and latency gains associated with massive MIMO systems depend critically on the acquisition of the instantaneous channel state information (CSI) [18]. In conventional communication systems, the estimation of instantaneous CSI is commonly achieved by transmitting certain known pilot symbols that are orthogonal to different users, where the channel estimation overhead is relatively low compared with the long data payload. However, the packets in sURLLC applications are typically very short and thus the overhead induced by channel estimation becomes non-negligible and will reduce the effective transmission rate significantly [19]. Moreover, sending pilots will cause significant delay in short-packet communications, especially over fast fading channels where the pilot symbols need to be dense in the time-frequency grid. As a matter of fact, obtaining instantaneous CSI is one of the most severe limiting factors to exploit the full potential of massive MIMO, where the latency introduced by the channel estimation in massive MIMO constitutes a major barrier for meeting the extreme delay requirement [7]. To reduce the latency in massive MIMO, the transmission protocol should depend on as less of the channel knowledge of small-scale fading as possible [7]. Nevertheless, the knowledge of channel statistics remains crucial to provide high reliability requirements, especially when the precise knowledge of instantaneous CSI is not available. Noncoherent detection, where no instantaneous CSI is required, can be the key supporting asset for low-latency applications. It was showed in [20] that noncoherent transmission is more energy efficient than pilot-assisted transmission schemes, even when the number of pilot symbols and their power are optimized.

We note that there have been considerable efforts on designing single-user noncoherent massive single-input multiple-output (SIMO) systems, see e.g., [21, 22, 23, 24], which demonstrated that simple energy-based modulation and detector can be sufficient for reliable detection by leveraging the massive number of antennas. By considering the single-user scenario, these work implicitly assumed that an orthogonal multiple access (OMA) mechanism (e.g., time-division multiple access) has been adopted at the data link layer to support the co-existence of multiple users. However, OMA mechanisms normally have poor scalability—the channel access latency scales up linearly as the number of end-devices increases, and thus are no longer suitable for the more challenging sURLLC applications with a large forecasted number of devices. One effective solution to address this scalability issue is to break the orthogonality of existing OMA protocols and empower a new non-orthogonal and noncoherent massive MIMO (nn-mMIMO) framework. It is worth mentioning here that non-orthogonal multiple access (NOMA) has recently received tremendous attentions from the mobile communication research community as a promising technology for 5G cellular system, see a recent comprehensive survey [25], where the primary goal of applying NOMA is to boost spectral efficiency and user fairness. Existing NOMA solutions along this research line normally require the estimation of instantaneous CSI such that the optimization of power allocation/control for different signal streams can be conducted at the transmitter side and successive interference cancellation can be implemented for detecting multiple users’ signals at the receiver side. These NOMA solutions are thus not applicable anymore for nn-mMIMO enabled sURLLC applications.

Enabling NOMA in massive MIMO is in fact straightforward when the instantaneous CSI is available, which can be achieved by applying space domain multiple access (SDMA). However, how to empower the non-orthogonal access of multiple users at the same time in noncoherent massive MIMO systems becomes a non-trivial task as beamforming techniques can not be used anymore. Very recently, a new constellation domain-based NOMA methodology towards enabling nn-mMIMO has been developed in [26, 27, 28, 29], which allows the simultaneous channel access of multiple devices at the data link layer without the availability of instantaneous CSI at the physical layer. However, all the designs in [26, 27, 28, 29] only considered one-shot communications (i.e., the received signal is decoded in a symbol-by-symbol manner). As such, the phase information of the transmitted signals is lost at the receiver side and thus only unipolar PAM constellations can be used, which largely limits the system reliability performance as the number of devices increases.

Towards enabling sURLLC, in this paper we develop a new nn-mMIMO framework that can perform joint noncoherent detection of the uplink signals from multiple devices over more than one time slots, where the transmitted signals are allowed to use the more robust QAM constellations. The main contributions of this paper are two-fold:

Firstly, we apply a noncoherent maximum likelihood (ML) receiver which relies only on the second-order channel statistics and no instantaneous CSI is needed at either the transmitter or receiver sides. For the considered ML receiver, we systematically design a uniquely-factorable multiuser space-time modulation (UF-MUSTM) scheme to enable the concurrent transmission of multiple devices to a noncoherent receiver equipped with a large number of antennas. We further identify the necessary and sufficient conditions for the receiver to recover the transmitted signals from all users. Note that our design connects to the conventional space-time code design. Up to now, most of the existing space-time code designs, such as [14, 30, 31, 32], considered point-to-point MIMO systems, where all the transmitting antennas are connected to the same transmitter, and hence the transmitted information-carrying signals are accessible by all the antennas. However, in our considered UF-MUSTM based nn-mMIMO system, the signals transmitted from different users are not allowed to fully collaborate, which dramatically limits the codebook design. Particularly, the widely used unitary space-time code design is in general intractable for the considered multiuser massive MIMO system.

Secondly, we further optimize the proposed design framework by jointly design the constellations of multiple users. We note that the performance analysis for non-unitary codeword of MUSTM is extremely challenging, if not possible, as shown in [30, 31]. Confronting such a challenge, we propose a max-min Kullback-Leibler (KL) divergence-based design criterion, based on which we jointly optimize the transmit powers of all users and the sub-constellation assignment among them. Note that the basic idea of this paper has been presented in the conference version [1], in which we only consider the simple scenario that all users adopt 4-QAM. In this paper, we have extended the design to the more general case that all users can adopt the larger QAM with not necessarily the same orders, which makes the optimization problem more complex and harder to resolve. We manage to resolve the formulated optimization problem in closed-form. Simulations are provided to demonstrate the superiority of the proposed design over the state-of-the-art benchmarking schemes.

The remainder of this paper is organized as follows. In Sec. II, we describe the system model, the noncoherent detector, as well as the signal design. The design and optimization of the proposed UF-MUSTM framework is elaborated in Sec. III. Simulations are conducted and the corresponding results are discussed in Sec. IV. The conclusions are finally drawn in Sec. V.

II System Model, Noncoherent Detector, and Signal Design

II-A System Model and Noncoherent ML Detector

We consider a massive multiple-input multiple-output (MIMO) system consisting of KK single-antenna users transmitting simultaneously to a base station (BS) with MM (MKM\gg K) receiving antennas on the same time-frequency grid. By using a discrete-time complex baseband-equivalent model, the received signal at the antenna array of BS in the tt-th time slot111Each time slot refers to one symbol duration throughout this paper., defined as 𝐲t=[y1,t,,yM,t]T\mathbf{y}_{t}=[y_{1,t},\ldots,y_{M,t}]^{T}, can be expressed by

𝐲t=𝐇𝐱t+𝝃t,\displaystyle\mathbf{y}_{t}=\mathbf{H}\mathbf{x}_{t}+{\boldsymbol{\xi}}_{t},

where 𝐱t=[x1,t,,xK,t]T\mathbf{x}_{t}=[x_{1,t},\ldots,x_{K,t}]^{T} represents the transmitted signals from all KK users, 𝝃t{\boldsymbol{\xi}}_{t} is an additive circularly-symmetric complex Gaussian (CSCG) noise vector with covariance σ2𝐈M\sigma^{2}\mathbf{I}_{M}. We let 𝐇=𝐆𝐃1/2\mathbf{H}=\mathbf{G}\mathbf{D}^{1/2} denote the M×KM\times K complex channel matrix between the receiver antenna array and all users, where 𝐆\mathbf{G} characterizes the small-scale fading caused by local scattering while 𝐃=diag{β1,,βK}\mathbf{D}={\rm diag}\{\beta_{1},\cdots,\beta_{K}\} with βk>0\beta_{k}>0 capturing the propagation loss due to distance and shadowing. All the entries of 𝐆\mathbf{G} are assumed to be i.i.d. complex Gaussian distributed with zero mean and unit variance. The channel coefficients are assumed to suffer from block fading which are quasi-static in the current block and change to other independent values in the next block with a channel coherence time TcKT_{c}\geq K. We consider a space-time block modulation (STBM) [31] scheme over TT time slots and the received signal vectors can be stacked together into a matrix form given by

𝐘T=𝐇𝐗T+𝚵T,\displaystyle\mathbf{Y}_{T}=\mathbf{H}\mathbf{X}_{T}+{\mathbf{\Xi}}_{T}, (1)

where 𝐘T=[𝐲1,,𝐲T]\mathbf{Y}_{T}=[\mathbf{y}_{1},\ldots,\mathbf{y}_{T}], 𝐗T=[𝐱1,,𝐱T]\mathbf{X}_{T}=[\mathbf{x}_{1},\ldots,\mathbf{x}_{T}] and 𝚵T=[𝝃1,,𝝃T]{\mathbf{\Xi}}_{T}=[\boldsymbol{\xi}_{1},\cdots,\boldsymbol{\xi}_{T}].

Assumption 1

Throughout this paper, we adopt the following assumptions:

  1. 1.

    The small scale channel fading matrix 𝐆\mathbf{G} is completely unknown to the BS and all the users, while the large scale fading matrix 𝐃\mathbf{D} is available at the BS that will be leveraged to optimize the system performance;

  2. 2.

    The transmitted signals are subject to an instantaneous average power constraint222Note that our design can be directly extended to the case with peak power constraint.: 𝔼{|xk,t|2}Pk\mathbb{E}\{|x_{k,t}|^{2}\}\leq P_{k}, k=1,,Kk=1,\ldots,K, t=1,,Tt=1,\ldots,T. For convenience, we assume that the users are labeled in an ascending order with P1β1PKβKP_{1}\beta_{1}\leq\ldots\leq P_{K}\beta_{K}. ∎

In this work, we apply a noncoherent ML detector which is optimal for uniformly distributed discrete input signals in terms of error probability. We note that (1) can be reformulated as 𝐘TH=𝐗TH𝐃1/2𝐆H+𝚵TH\mathbf{Y}_{T}^{H}=\mathbf{X}_{T}^{H}\mathbf{D}^{1/2}\mathbf{G}^{H}+{\boldsymbol{\Xi}}_{T}^{H}. With the help of [33], the vectorized form of the received signal can then be written as

𝐲=vec(𝐘TH)=(𝐈M𝐗TH𝐃1/2)vec(𝐆H)+vec(𝚵TH).\displaystyle\mathbf{y}={\rm vec}(\mathbf{Y}_{T}^{H})=(\mathbf{I}_{M}\otimes\mathbf{X}_{T}^{H}\mathbf{D}^{1/2}){\rm vec}(\mathbf{G}^{H})+{\rm vec}(\boldsymbol{\Xi}_{T}^{H}).

As all the entries of 𝐆\mathbf{G} and 𝚵\boldsymbol{\Xi} are i.i.d. CSCG, we immediately have 𝔼[𝐲]=𝟎\mathbb{E}[\mathbf{y}]=\mathbf{0}, and the covariance matrix of 𝐲\mathbf{y} can be calculated as 𝐑𝐲|𝐗T=𝔼[𝐲𝐲H]=𝐈M(𝐗TH𝐃𝐗T+σ2𝐈T)\mathbf{R}_{\mathbf{y}|\mathbf{X}_{T}}=\mathbb{E}[\mathbf{y}\mathbf{y}^{H}]=\mathbf{I}_{M}\otimes(\mathbf{X}_{T}^{H}\mathbf{D}\mathbf{X}_{T}+\sigma^{2}\mathbf{I}_{T}). The conditional distribution of the received signal 𝐲\mathbf{y} at BS for any transmitted signal matrix 𝐗T\mathbf{X}_{T} can then be given by p(𝐲|𝐗T)=1πKMdet(𝐑𝐲|𝐗T)exp(𝐲H𝐑𝐲|𝐗T1𝐲)p({\mathbf{y}|\mathbf{X}_{T}})=\frac{1}{\pi^{KM}\det({\mathbf{R}_{\mathbf{y}|\mathbf{X}_{T}}})}\exp(-\mathbf{y}^{H}\mathbf{R}_{\mathbf{y}|\mathbf{X}_{T}}^{-1}\mathbf{y}), where 𝐑𝐲|𝐗T=𝐈(𝐗TH𝐃𝐗T+σ2𝐈T)\mathbf{R}_{\mathbf{y}|\mathbf{X}_{T}}=\mathbf{I}\otimes(\mathbf{X}_{T}^{H}\mathbf{D}\mathbf{X}_{T}+\sigma^{2}\mathbf{I}_{T}). The noncoherent ML detector can estimate the transmitted information carrying matrix from the received signal vector 𝐲\mathbf{y} by resolving the following optimization problem:

𝐗^T=argmin𝐗T𝐲H𝐑𝐲|𝐗T1𝐲+logdet(𝐑𝐲|𝐗T).\displaystyle\widehat{\mathbf{X}}_{T}={\arg\min}_{\mathbf{X}_{T}}~{}\mathbf{y}^{H}\mathbf{R}_{\mathbf{y}|\mathbf{X}_{T}}^{-1}\mathbf{y}+\log\det(\mathbf{R}_{\mathbf{y}|\mathbf{X}_{T}}). (2)

From (2), we can observe that the detector relies on the sufficient statistics of the transmitted signal matrix 𝐑𝐲|𝐗T=𝐈(𝐗TH𝐃𝐗T+σ2𝐈T)\mathbf{R}_{\mathbf{y}|\mathbf{X}_{T}}=\mathbf{I}\otimes(\mathbf{X}_{T}^{H}\mathbf{D}\mathbf{X}_{T}+\sigma^{2}\mathbf{I}_{T}). The detailed discussion regarding the signal design is given in the following subsection.

II-B Unique Identification of the Transmitted Signal Matrix

In this subsection, we first identify what conditions the transmitted signal matrix must satisfy to ensure the unique identification of the transmitted signal matrix 𝐗T\mathbf{X}_{T}. We can observe from (2) that, to achieve reliable communication between all users and the BS in the considered nn-mMIMO system, the BS must be able to uniquely determine each transmitted signal matrix 𝐗T{\mathbf{X}}_{T} once 𝐑=𝐗TH𝐃𝐗T\mathbf{R}=\mathbf{X}_{T}^{H}\mathbf{D}\mathbf{X}_{T} has been identified, which can be formally stated as follows:

Proposition 1

Any reliable communications for the multiuser nn-mMIMO system described in (1) require that, for the transmitted signal matrix selected from K×TK×T{\mathcal{M}}^{K\times T}\subseteq\mathbb{C}^{K\times T}, if and only if there exist any two signal matrices 𝐗T,𝐗~TK×T\mathbf{X}_{T},\widetilde{\mathbf{X}}_{T}\in{\mathcal{M}}^{K\times T} satisfying 𝐗TH𝐃𝐗T=𝐗~TH𝐃𝐗~T\mathbf{X}_{T}^{H}\mathbf{D}\mathbf{X}_{T}=\widetilde{\mathbf{X}}_{T}^{H}\mathbf{D}\widetilde{\mathbf{X}}_{T}, then we have 𝐗T=𝐗~T{\mathbf{X}}_{T}=\widetilde{\mathbf{X}}_{T}. ∎

The proof is provided in Appendix-A.

Inspired by Proposition 1, to facilitate our system design, we introduce the concept of uniquely-factorable multiuser space-time modulation (UF-MUSTM), the formal definition of which is given as follows:

Definition 1

A multiuser space-time modulation codebook 𝒮K×TK×T\mathcal{S}^{K\times T}\subseteq\mathbb{C}^{K\times T} is said to form a UF-MUSTM codebook if for any pair of codewords 𝐒,𝐒~𝒮K×T\mathbf{S},\widetilde{\mathbf{S}}\in\mathcal{S}^{K\times T} satisfying 𝐒H𝐒=𝐒~H𝐒~\mathbf{S}^{H}\mathbf{S}=\widetilde{\mathbf{S}}^{H}\widetilde{\mathbf{S}}, we have 𝐒=𝐒~\mathbf{S}=\widetilde{\mathbf{S}}. ∎

Definition 1 motivates us to design a UF-MUSTM codebook for the considered nn-mMIMO system. Therefore, our primary task in the rest of this paper is to develop a new framework for a systematic design of such UF-MUSTM 𝒮K×T{\mathcal{S}}^{K\times T}.

Before proceeding on, it is worth clarifying here that the UF-MUSTM code design is fundamentally different from existing noncoherent space-time code/modulation designs. Specifically,

  • For the considered UF-MUSTM based nn-mMIMO system, the signals transmitted from different users cannot fully collaborate, and hence the widely used unitary space-time code design is intractable for the considered system. This is fundamentally different from most of conventional space-time code designs for point-to-point MIMO system, where unitary space-time code is feasible since all the transmitting antennas are connected to the same transmitter [14, 31]. Note that the error performance analysis of non-unitary codeword of MUSTM is very challenging as shown in [30].

  • Our design is asymptotically optimal when the number of BS antennas goes to infinity while keeping the transmitted power fixed. This is in contrast to most previous space-time coding designs which considered the asymptotic regime with the signal-to-noise ratio (SNR) going to infinity [30, 32, 31].

III Design and Optimization of UF-MUSTM Framework

In this section, we present a UF-MUSTM framework with a slot-by-slot noncoherent ML detector. We find that when the number of receiving antennas increases, the pairwise error probability (PEP) between two codewords will be dominated by the Kullback-Leibler (KL) divergence between them. Motivated by this fact, a max-min KL divergence design criterion is proposed to optimize the transmit powers of all users and the sub-constellation assignment among them.

III-A KL Divergence between Transmitted Space-Time Modulation Codewords

In practice, the computational complexity of the optimal noncoherent ML detector described in (2) could be prohibitively high. Furthermore, the error performance analysis results available for the block transmission with general block size and ML receiver are too complicated to reveal insightful results for the input codeword design and the corresponding power allocation [30]. To resolve these problems as well as to reduce the receiver complexity, our main idea is to input a small block size into the ML receiver. If only one time slot is involved in the ML detector given in (2), i.e., when T=1T=1, the correlation matrix 𝐑=𝐗TH𝐃𝐗T\mathbf{R}=\mathbf{X}_{T}^{H}\mathbf{D}\mathbf{X}_{T} degenerates into a real scalar 𝐱1H𝐃𝐱1=k=1Kβk|xk,1|2\mathbf{x}_{1}^{H}\mathbf{D}\mathbf{x}_{1}=\sum_{k=1}^{K}\beta_{k}|x_{k,1}|^{2}, where the phase information of the transmitted symbols is lost and information bits from all users can only be modulated on the amplitudes of the transmitted symbols. Such a design typically has a low spectral efficiency [21, 26, 22]. To improve the spectrum efficiency by allowing constellation with phase information being transmitted by all users, we need to feed the signals received in at least two time slots into the ML decoder [30, 34, 31].

As an initial attempt, in this paper we focus on a slot-by-slot ML detection over the first and tt-th time slots, which is similar to the differential modulation with the hard-decision based noncoherent multiuser detection. More specifically, we let the transmitted signal matrix be 𝐗T=[𝐱1,,𝐱T]\mathbf{X}_{T}=[\mathbf{x}_{1},\ldots,\mathbf{x}_{T}]. For detection purpose, we now stack the transmitted signal of the first and the tt-th time slot as 𝐗t=[𝐱1,𝐱t]\mathbf{X}_{t}=[\mathbf{x}_{1},\mathbf{x}_{t}], and then make the decision on 𝐘t=[𝐲1,𝐲t]\mathbf{Y}_{t}=[\mathbf{y}_{1},\mathbf{y}_{t}] by using (2). For simplicity, we consider the transmitted signal from the first and second time slots, i.e., 𝐗2=[𝐱1,𝐱2]\mathbf{X}_{2}=[\mathbf{x}_{1},\mathbf{x}_{2}], hereafter, and the case of 𝐗t\mathbf{X}_{t} follows similarly. We denote 𝐑𝐲|𝐗2=𝐈𝐑2\mathbf{R}_{\mathbf{y}|\mathbf{X}_{2}}=\mathbf{I}\otimes\mathbf{R}_{2}, in which

𝐑2=𝐗2H𝐃𝐗2+σ2𝐈2=[𝐱1H𝐃𝐱1+σ2𝐱1H𝐃𝐱2𝐱2H𝐃𝐱1𝐱2H𝐃𝐱2+σ2].\displaystyle\mathbf{R}_{2}=\mathbf{X}_{2}^{H}\mathbf{D}\mathbf{X}_{2}+\sigma^{2}\mathbf{I}_{2}=\begin{bmatrix}\mathbf{x}_{1}^{H}\mathbf{D}\mathbf{x}_{1}+\sigma^{2}&\mathbf{x}_{1}^{H}\mathbf{D}\mathbf{x}_{2}\\ \mathbf{x}_{2}^{H}\mathbf{D}\mathbf{x}_{1}&\mathbf{x}_{2}^{H}\mathbf{D}\mathbf{x}_{2}+\sigma^{2}\end{bmatrix}. (3)

By (3), we have

𝐑21=1(𝐱1H𝐃𝐱1+σ2)(𝐱2H𝐃𝐱2+σ2)|𝐱1H𝐃𝐱2|2[𝐱2H𝐃𝐱2+σ2𝐱1H𝐃𝐱2𝐱2H𝐃𝐱1𝐱1H𝐃𝐱1+σ2].\displaystyle\mathbf{R}_{2}^{-1}=\frac{1}{(\mathbf{x}_{1}^{H}\mathbf{D}\mathbf{x}_{1}+\sigma^{2})(\mathbf{x}_{2}^{H}\mathbf{D}\mathbf{x}_{2}+\sigma^{2})-|\mathbf{x}_{1}^{H}\mathbf{D}\mathbf{x}_{2}|^{2}}\begin{bmatrix}\mathbf{x}_{2}^{H}\mathbf{D}\mathbf{x}_{2}+\sigma^{2}&-\mathbf{x}_{1}^{H}\mathbf{D}\mathbf{x}_{2}\\ -\mathbf{x}_{2}^{H}\mathbf{D}\mathbf{x}_{1}&\mathbf{x}_{1}^{H}\mathbf{D}\mathbf{x}_{1}+\sigma^{2}\end{bmatrix}. (4)

As a consequence, the ML receiver can be reformulated as follows

𝐗^2\displaystyle\widehat{\mathbf{X}}_{2} =argmin𝐗2𝐲H𝐑𝐲|𝐗21𝐲+logdet(𝐑𝐲|𝐗2)\displaystyle={\arg\min}_{\mathbf{X}_{2}}~{}\mathbf{y}^{H}\mathbf{R}_{\mathbf{y}|\mathbf{X}_{2}}^{-1}\mathbf{y}+\log\det(\mathbf{R}_{\mathbf{y}|\mathbf{X}_{2}})
=argmin𝐗2(𝐱1H𝐃𝐱1+σ2)𝐲22+(𝐱2H𝐃𝐱2+σ2)𝐲122(𝐱1H𝐃𝐱2𝐲2H𝐲1)(𝐱1H𝐃𝐱1+σ2)(𝐱2H𝐃𝐱2+σ2)|𝐱1H𝐃𝐱2|2\displaystyle={\arg\min}_{\mathbf{X}_{2}}~{}\frac{(\mathbf{x}_{1}^{H}\mathbf{D}\mathbf{x}_{1}+\sigma^{2})\|\mathbf{y}_{2}\|^{2}+(\mathbf{x}_{2}^{H}\mathbf{D}\mathbf{x}_{2}+\sigma^{2})\|\mathbf{y}_{1}\|^{2}-2\Re(\mathbf{x}_{1}^{H}\mathbf{D}\mathbf{x}_{2}\mathbf{y}_{2}^{H}\mathbf{y}_{1})}{(\mathbf{x}_{1}^{H}\mathbf{D}\mathbf{x}_{1}+\sigma^{2})(\mathbf{x}_{2}^{H}\mathbf{D}\mathbf{x}_{2}+\sigma^{2})-|\mathbf{x}_{1}^{H}\mathbf{D}\mathbf{x}_{2}|^{2}}
+Mln[(𝐱1H𝐃𝐱1+σ2)(𝐱2H𝐃𝐱2+σ2)|𝐱1H𝐃𝐱2|2],\displaystyle\qquad\qquad\qquad\qquad\qquad+M\ln\Big{[}(\mathbf{x}_{1}^{H}\mathbf{D}\mathbf{x}_{1}+\sigma^{2})(\mathbf{x}_{2}^{H}\mathbf{D}\mathbf{x}_{2}+\sigma^{2})-|\mathbf{x}_{1}^{H}\mathbf{D}\mathbf{x}_{2}|^{2}\Big{]}, (5)

where 𝐲1\mathbf{y}_{1} and 𝐲2\mathbf{y}_{2} are the received signal vectors in the first and second time slots, respectively. It can be observed that the diagonal entries in (3) are 𝐱1H𝐃𝐱1=k=1Kβk|xk,1|2\mathbf{x}_{1}^{H}\mathbf{D}\mathbf{x}_{1}=\sum_{k=1}^{K}\beta_{k}|x_{k,1}|^{2} and 𝐱2H𝐃𝐱2=k=1Kβk|xk,2|2\mathbf{x}_{2}^{H}\mathbf{D}\mathbf{x}_{2}=\sum_{k=1}^{K}\beta_{k}|x_{k,2}|^{2}, in which the phase information is lost, while the off-diagonal term is 𝐱1H𝐃𝐱2=k=1Kβkxk,1xk,2=k=1Kβk|xk,1||xk,2|exp(jarg(xk,2)jarg(xk,1))\mathbf{x}_{1}^{H}\mathbf{D}\mathbf{x}_{2}=\sum_{k=1}^{K}\beta_{k}x_{k,1}^{*}x_{k,2}=\sum_{k=1}^{K}\beta_{k}|x_{k,1}||x_{k,2}|\exp\big{(}j\arg(x_{k,2})-j\arg(x_{k,1})\big{)}, indicating that we can transmit a known reference signal vector 𝐱1\mathbf{x}_{1} in the first time slot and then transmit the information bearing signal vector 𝐱2\mathbf{x}_{2} to imitate a “differential-like” transmission [35]. The exact PEP is extremely hard to evaluate for the matrix 𝐗2\mathbf{X}_{2} given above. Moreover, the exact expression for the PEP does not seem to be tractable for further optimization. Inspired by the Chernoff-Stein Lemma, when the number of receiver antennas MM goes to infinity, the PEP will goes to zero exponentially where the exponent is determined by the KL divergence [31]. Hence, in this paper we propose to use the KL divergence between the conditional distributions of the received signals for different inputs as the design criterion thanks to its mathematical tractability.

We now derive the KL divergence between the received signals induced by the transmitted signals matrices 𝐗2=[𝐱1,𝐱2]\mathbf{X}_{2}=[\mathbf{x}_{1},\mathbf{x}_{2}] and 𝐗~2=[𝐱~1,𝐱~2]\widetilde{\mathbf{X}}_{2}=[\tilde{\mathbf{x}}_{1},\tilde{\mathbf{x}}_{2}], which is also the expectation of the likelihood function between two received signal vectors. Essentially, the likelihood function between the received signal vectors corresponding to the two transmitted signals converge in probability to the KL-divergence as the number of receiver antennas increases [31]. More specifically, the KL-divergence between the received signals corresponding to the transmitted matrix 𝐗2\mathbf{X}_{2} and 𝐗~2\widetilde{\mathbf{X}}_{2} can be calculated as

𝒟KL(M)(𝐗2||𝐗~2)=𝔼f(𝐲|𝐗2){ln(f(𝐲|𝐗~2)f(𝐲|𝐗2))}\displaystyle\mathcal{D}_{\rm KL}^{(M)}(\mathbf{X}_{2}||\widetilde{\mathbf{X}}_{2})=\mathbb{E}_{f({\mathbf{y}|\mathbf{X}_{2}})}\bigg{\{}\ln\Big{(}\frac{f({\mathbf{y}|\widetilde{\mathbf{X}}_{2}})}{f({\mathbf{y}|\mathbf{X}_{2}})}\Big{)}\bigg{\}}
=𝔼f(𝐲|𝐗2){ln(det(𝐑𝐲|𝐗2)det(𝐑𝐲|𝐗~2))+(𝐲H𝐑𝐲|𝐗~21𝐲𝐲H𝐑𝐲|𝐗21𝐲)}\displaystyle=\mathbb{E}_{f({\mathbf{y}|\mathbf{X}_{2}})}\bigg{\{}\ln\Big{(}\frac{\det({\mathbf{R}_{\mathbf{y}|\mathbf{X}_{2}}})}{\det({\mathbf{R}_{\mathbf{y}|\widetilde{\mathbf{X}}_{2}}})}\Big{)}+\Big{(}\mathbf{y}^{H}\mathbf{R}_{\mathbf{y}|\widetilde{\mathbf{X}}_{2}}^{-1}\mathbf{y}-\mathbf{y}^{H}\mathbf{R}_{\mathbf{y}|\mathbf{X}_{2}}^{-1}\mathbf{y}\Big{)}\bigg{\}}
=𝔼f(𝐲|𝐗2){tr((𝐑𝐲|𝐗~21𝐑𝐲|𝐗21)𝐲𝐲H)}+ln(det(𝐑𝐲|𝐗2)det(𝐑𝐲|𝐗~2))\displaystyle=\mathbb{E}_{f({\mathbf{y}|\mathbf{X}_{2}})}\bigg{\{}{\rm tr}\Big{(}\big{(}\mathbf{R}_{\mathbf{y}|\widetilde{\mathbf{X}}_{2}}^{-1}-\mathbf{R}_{\mathbf{y}|\mathbf{X}_{2}}^{-1}\big{)}\mathbf{y}\mathbf{y}^{H}\Big{)}\bigg{\}}+\ln\Big{(}\frac{\det({\mathbf{R}_{\mathbf{y}|\mathbf{X}_{2}}})}{\det({\mathbf{R}_{\mathbf{y}|\widetilde{\mathbf{X}}_{2}}})}\Big{)}
=tr((𝐑𝐲|𝐗~21𝐑𝐲|𝐗21)𝐑𝐲|𝐗2)+ln(det(𝐑𝐲|𝐗2)det(𝐑𝐲|𝐗~2))\displaystyle={\rm tr}\Big{(}\big{(}\mathbf{R}_{\mathbf{y}|\widetilde{\mathbf{X}}_{2}}^{-1}-\mathbf{R}_{\mathbf{y}|\mathbf{X}_{2}}^{-1}\big{)}\mathbf{R}_{\mathbf{y}|\mathbf{X}_{2}}\Big{)}+\ln\Big{(}\frac{\det({\mathbf{R}_{\mathbf{y}|\mathbf{X}_{2}}})}{\det({\mathbf{R}_{\mathbf{y}|\widetilde{\mathbf{X}}_{2}}})}\Big{)}
=M𝒟KL(𝐗2||𝐗~2),\displaystyle=M\,\mathcal{D}_{\rm KL}(\mathbf{X}_{2}||\widetilde{\mathbf{X}}_{2}),

in which

𝒟KL(𝐗2||𝐗~2)\displaystyle\mathcal{D}_{\rm KL}(\mathbf{X}_{2}||\widetilde{\mathbf{X}}_{2}) =tr{(𝐗2H𝐃𝐗2+σ2𝐈2)(𝐗~2H𝐃𝐗~2+σ2𝐈2)1}\displaystyle={\rm tr}\big{\{}(\mathbf{X}_{2}^{H}\mathbf{D}\mathbf{X}_{2}+\sigma^{2}\mathbf{I}_{2})(\widetilde{\mathbf{X}}_{2}^{H}\mathbf{D}\widetilde{\mathbf{X}}_{2}+\sigma^{2}\mathbf{I}_{2})^{-1}\big{\}}
ln{det((𝐗2H𝐃𝐗2+σ2𝐈2)(𝐗~2H𝐃𝐗~2+σ2𝐈2)1)}2.\displaystyle\qquad-\ln\Big{\{}\det\big{(}(\mathbf{X}_{2}^{H}\mathbf{D}\mathbf{X}_{2}+\sigma^{2}\mathbf{I}_{2})(\widetilde{\mathbf{X}}_{2}^{H}\mathbf{D}\widetilde{\mathbf{X}}_{2}+\sigma^{2}\mathbf{I}_{2})^{-1}\big{)}\Big{\}}-2. (7)

We can observe from the above expression that 𝒟KL(𝐗2||𝐗~2)\mathcal{D}_{\rm KL}(\mathbf{X}_{2}||\widetilde{\mathbf{X}}_{2}) is actually the KL-divergence when there is only one receiving antenna. Due to the assumption of the independence of channel coefficients, and the KL divergence with MM antennas 𝒟KL(M)(𝐗2||𝐗~2)\mathcal{D}_{\rm KL}^{(M)}(\mathbf{X}_{2}||\widetilde{\mathbf{X}}_{2}) is MM times of 𝒟KL(𝐗2||𝐗~2)\mathcal{D}_{\rm KL}(\mathbf{X}_{2}||\widetilde{\mathbf{X}}_{2}).

III-B QAM Division Based Multiuser Space-Time Modulation

The main objective of this subsection is to develop a new QAM division based MUSTM design framework for the considered nn-mMIMO system. The design is built upon the uniquely decomposable constellation group (UDCG) originally proposed in [36, 37] for the commonly used spectrally efficient QAM signaling. We now introduce the definition of UDCG as follows:

Definition 2

A group of constellations {𝒳k}k=1K\{\mathcal{X}_{k}\}_{k=1}^{K} form a UDCG, denoted by {k=1Kxk:xk𝒳k}=k=1K𝒳k=𝒳1𝒳K\big{\{}\sum_{k=1}^{K}x_{k}:x_{k}\in\mathcal{X}_{k}\big{\}}=\uplus_{k=1}^{K}\mathcal{X}_{k}=\mathcal{X}_{1}\uplus\ldots\uplus\mathcal{X}_{K}, if there exist two groups of xk,x~k𝒳kx_{k},\tilde{x}_{k}\in\mathcal{X}_{k} for k=1,,Kk=1,\cdots,K such that k=1Kxk=k=1Kx~k\sum_{k=1}^{K}x_{k}=\sum_{k=1}^{K}\tilde{x}_{k}, then we have xk=x~kx_{k}=\tilde{x}_{k} for k=1,,Kk=1,\cdots,K.  ∎

As PAM and QAM constellations are commonly used in modern digital communications, which have simple geometric structures, we now give the following construction of UDCG.

Lemma 1

The UDCG with PAM and QAM constellations can be constructed as follows:

1) UDCG with PAM Constellation: For two given positive integers KK and NN (NKN\geq K) and nonnegative integer sequence {Nk}k=1K\{N_{k}\}_{k=1}^{K} satisfying k=1KNk=N\sum_{k=1}^{K}N_{k}=N, a 2N2^{N}-ary PAM constellation 𝒢={±(m12)d:m=1,,2N1}\mathcal{G}=\{\pm(m-\frac{1}{2})d:m=1,\ldots,2^{N-1}\}, with dd being the minimum Euclidean distance between the constellation points, can be uniquely decomposed into the sum of KK sub-constellations {𝒳k}k=1K\{{\mathcal{X}}_{k}\}_{k=1}^{K} denoted by 𝒢=k=1K𝒳k\mathcal{G}=\uplus_{k=1}^{K}\mathcal{X}_{k}, where 𝒳1={±(m12)d}m=12N11\mathcal{X}_{1}=\big{\{}\pm(m-\frac{1}{2})d\big{\}}_{m=1}^{2^{N_{1}-1}}, and 𝒳k={±(m12)×2=1k1Nd}m=12Nk1\mathcal{X}_{k}=\big{\{}\pm(m-\frac{1}{2})\times 2^{\sum_{\ell=1}^{k-1}N_{\ell}}d\big{\}}_{m=1}^{2^{N_{k}-1}} for k2k\geq 2.

2) UDCG with QAM Constellation: For two positive integers KK and N=NI+NQN=N_{I}+N_{Q} (NKN\geq K), with NIN_{I} and NQN_{Q} being nonnegative integers that denote the sizes of the in-phase and quadrature components, respectively. Let {NI,k}k=1K\{N_{I,k}\}_{k=1}^{K} and {NQ,k}k=1K\{N_{Q,k}\}_{k=1}^{K} denote two given nonnegative integer sequences satisfying NI=k=1KNI,kN_{I}=\sum_{k=1}^{K}N_{I,k} and NQ=k=1KNQ,kN_{Q}=\sum_{k=1}^{K}N_{Q,k} with Nk=NI,k+NQ,k>0N_{k}=N_{I,k}+N_{Q,k}>0. Then, there exists a PAM and QAM mixed constellation 𝒬=k=1K𝒳k\mathcal{Q}=\uplus_{k=1}^{K}\mathcal{X}_{k} such that 𝒳k=𝒳I,kj𝒳Q,k\mathcal{X}_{k}=\mathcal{X}_{I,k}\uplus j\mathcal{X}_{Q,k}, with j𝒳Q,k={jx:x𝒳Q,k}j\mathcal{X}_{Q,k}=\{jx:x\in\mathcal{X}_{Q,k}\}, where 𝒬I=k=1K𝒳I,k\mathcal{Q}_{I}=\uplus_{k=1}^{K}\mathcal{X}_{I,k} and 𝒬Q=k=1K𝒳Q,k\mathcal{Q}_{Q}=\uplus_{k=1}^{K}\mathcal{X}_{Q,k} are two PAM UDCGs according to the rate allocation {NI,k}k=1K\{N_{I,k}\}_{k=1}^{K} and {NQ,k}k=1K\{N_{Q,k}\}_{k=1}^{K}, respectively.   ∎

With the concept of UDCG, we are now ready to propose a QAM division based UF-MUSTM for the considered nn-mMIMO system with a noncoherent ML receiver given in (III-A). The structure of each transmitted signal matrix is given by 𝐗2=[𝐱1,𝐱2]=𝐃1/2𝚷𝐒2\mathbf{X}_{2}=[\mathbf{x}_{1},\mathbf{x}_{2}]=\mathbf{D}^{-1/2}\mathbf{\Pi}{\mathbf{S}}_{2}, in which

𝐒2\displaystyle\mathbf{S}_{2} =[𝐬1,𝐬2]=[1p1p1s11p2p2s21pKpKsK].\displaystyle=[\mathbf{s}_{1},\mathbf{s}_{2}]=\begin{bmatrix}\frac{1}{\sqrt{p_{1}}}&\sqrt{p_{1}}s_{1}\\ \frac{1}{\sqrt{p_{2}}}&\sqrt{p_{2}}s_{2}\\ \vdots&\vdots\\ \frac{1}{\sqrt{p_{K}}}&\sqrt{p_{K}}s_{K}\end{bmatrix}. (8)

In our design, the diagonal matrix 𝐃1/2\mathbf{D}^{-1/2} is used to compensate for the different large scale fading among various users. The vector 𝐩=[p1,,pK]\mathbf{p}=[p_{1},\ldots,p_{K}] is introduced to adjust the relative transmitting powers between all users, and 𝐬=[s1,,sK]\mathbf{s}=[s_{1},\ldots,s_{K}] is the information-carrying vector. The instantaneous power constraint can be given by 𝔼{|xk,t|2}Pk\mathbb{E}\{|x_{k,t}|^{2}\}\leq P_{k}, k=1,,Kk=1,\ldots,K and t=1,2t=1,2. We let sk𝒳ks_{k}\in\mathcal{X}_{k}, where all 𝒳k\mathcal{X}_{k}’s constitute a UDCG with sum-QAM constellation 𝒬\mathcal{Q} such that 𝒬=k=1K𝒳k\mathcal{Q}=\uplus_{k=1}^{K}\mathcal{X}_{k} as defined in Lemma 1. The rate allocation between the KK users are based on the sum-decomposition such that k=1KNk=N\sum_{k=1}^{K}N_{k}=N in which Nk=NI,k+NQ,k=log2(|𝒳k|)N_{k}=N_{I,k}+N_{Q,k}=\log_{2}(|\mathcal{X}_{k}|) denotes the bit rate of the user constellation 𝒳k\mathcal{X}_{k}. The matrix 𝚷=[𝐞π(1),,𝐞π(K)]T\mathbf{\Pi}=[\mathbf{e}_{\pi{(1)}},\ldots,\mathbf{e}_{\pi(K)}]^{T} is a permutation matrix, where 𝐞k\mathbf{e}_{k} denotes a standard basis column vector of length KK with 1 in the kk-th position and 0 in other positions. π:{1,,K}{1,,K}\pi:\{1,\ldots,K\}\to\{1,\ldots,K\} is a permutation over KK elements characterized by (12Kπ(1)π(2)π(K))\begin{pmatrix}1&2&\ldots&K\\ \pi(1)&\pi(2)&\ldots&\pi(K)\end{pmatrix}. We also let π1:{1,,K}{1,,K}\pi^{-1}:\{1,\ldots,K\}\to\{1,\ldots,K\} be a permutation such that π1(π(k))=k\pi^{-1}(\pi(k))=k for k=1,,Kk=1,\ldots,K. From the above definition, we immediately have 𝚷T𝚷=𝐈K\mathbf{\Pi}^{T}\mathbf{\Pi}=\mathbf{I}_{K}.

For the transmitted signal matrix 𝐗2\mathbf{X}_{2}, we have the following desired properties:

Proposition 2

Consider 𝐗2=𝐃1/2𝚷𝐒2\mathbf{X}_{2}=\mathbf{D}^{-1/2}{\mathbf{\Pi}}{\mathbf{S}}_{2} and 𝐗~2=𝐃1/2𝚷𝐒~2\widetilde{\mathbf{X}}_{2}=\mathbf{D}^{-1/2}\mathbf{\Pi}\widetilde{\mathbf{S}}_{2}, where 𝐒2{\mathbf{S}}_{2} and 𝐒~2\widetilde{\mathbf{S}}_{2} belong to 𝒮K×2{\mathcal{S}}^{K\times 2} as described in Definition 1. If 𝐗2H𝐃𝐗2=𝐗~2H𝐃𝐗~2{\mathbf{X}}^{H}_{2}{\mathbf{D}}{\mathbf{X}}_{2}=\widetilde{\mathbf{X}}^{H}_{2}{\mathbf{D}}\widetilde{\mathbf{X}}_{2}, then we have 𝐗2=𝐗~2{\mathbf{X}}_{2}=\widetilde{\mathbf{X}}_{2}. ∎

The proof of Proposition 2 is given in Appendix-B.

III-C User-constellation Assignment and Power Allocation

To further enhance the system reliability performance, we now optimize the user-constellation assignment π\pi and power allocation vector 𝐩\mathbf{p} for the proposed nn-mMIMO framework. For the transmitted signal matrix considered in (8), we have

𝐗2H𝐃𝐗2+σ2𝐈2=[𝐬1H𝐬1+σ2𝐬1H𝐬2𝐬2H𝐬1𝐬2H𝐬2+σ2]=[k=1K1/pk+σ2k=1Kskk=1Kskk=1Kpk|sk|2+σ2],\displaystyle\mathbf{X}_{2}^{H}\mathbf{D}\mathbf{X}_{2}+\sigma^{2}\mathbf{I}_{2}=\begin{bmatrix}\mathbf{s}_{1}^{H}\mathbf{s}_{1}+\sigma^{2}&\mathbf{s}_{1}^{H}\mathbf{s}_{2}\\ \mathbf{s}_{2}^{H}\mathbf{s}_{1}&\mathbf{s}_{2}^{H}\mathbf{s}_{2}+\sigma^{2}\end{bmatrix}=\begin{bmatrix}\sum_{k=1}^{K}{1}/{p_{k}}+\sigma^{2}&\sum_{k=1}^{K}s_{k}\\ \sum_{k=1}^{K}s_{k}^{*}&\sum_{k=1}^{K}p_{k}|s_{k}|^{2}+\sigma^{2}\end{bmatrix},
𝐗~2H𝐃𝐗~2+σ2𝐈2=[𝐬1H𝐬1+σ2𝐬1H𝐬~2𝐬~2H𝐬1𝐬~2H𝐬~2+σ2]=[k=1K1/pk+σ2k=1Ks~kk=1Ks~kk=1Kpk|s~k|2+σ2].\displaystyle\widetilde{\mathbf{X}}_{2}^{H}\mathbf{D}\widetilde{\mathbf{X}}_{2}+\sigma^{2}\mathbf{I}_{2}=\begin{bmatrix}\mathbf{s}_{1}^{H}\mathbf{s}_{1}+\sigma^{2}&\mathbf{s}_{1}^{H}\tilde{\mathbf{s}}_{2}\\ \tilde{\mathbf{s}}_{2}^{H}\mathbf{s}_{1}&\tilde{\mathbf{s}}_{2}^{H}\tilde{\mathbf{s}}_{2}+\sigma^{2}\end{bmatrix}=\begin{bmatrix}\sum_{k=1}^{K}{1}/{p_{k}}+\sigma^{2}&\sum_{k=1}^{K}\tilde{s}_{k}\\ \sum_{k=1}^{K}\tilde{s}_{k}^{*}&\sum_{k=1}^{K}p_{k}|\tilde{s}_{k}|^{2}+\sigma^{2}\end{bmatrix}. (9)

We can see from (III-C) that 𝐗2H𝐃𝐗2+σ2𝐈2\mathbf{X}_{2}^{H}\mathbf{D}\mathbf{X}_{2}+\sigma^{2}\mathbf{I}_{2} and 𝐗~2H𝐃𝐗~2+σ2𝐈2\widetilde{\mathbf{X}}_{2}^{H}\mathbf{D}\widetilde{\mathbf{X}}_{2}+\sigma^{2}\mathbf{I}_{2} are independent of the permutation function π\pi, but depends on the power allocation vector 𝐩=[p1,,pK]T\mathbf{p}=[p_{1},\ldots,p_{K}]^{T}, and the information carrying vectors 𝐬=[s1,,sK]T\mathbf{s}=[s_{1},\ldots,s_{K}]^{T} and 𝐬~=[s~1,,s~K]T\tilde{\mathbf{s}}=[\tilde{s}_{1},\ldots,\tilde{s}_{K}]^{T}. In this case, the ML receiver given in (III-A) can be further simplified as

𝐗^2\displaystyle\widehat{\mathbf{X}}_{2} =argmin𝐗2a𝐲22+b𝐲122(c𝐲1H𝐲2)ab|c|2+Mln(ab|c|2),\displaystyle={\arg\min}_{\mathbf{X}_{2}}~{}\frac{a\|\mathbf{y}_{2}\|^{2}+b\|\mathbf{y}_{1}\|^{2}-2\Re(c\mathbf{y}_{1}^{H}\mathbf{y}_{2})}{ab-|c|^{2}}+M\ln\big{(}ab-|c|^{2}\big{)},

Inserting (III-C) into (7), and after some algebraic manipulations, we have

𝒟KL(𝐗2||𝐗~2)=f1(𝐩,𝐬,𝐬~)+f2(𝐩,𝐬,𝐬~),\displaystyle\mathcal{D}_{\rm KL}(\mathbf{X}_{2}||\widetilde{\mathbf{X}}_{2})=f_{1}(\mathbf{p},\mathbf{s},\tilde{\mathbf{s}})+f_{2}(\mathbf{p},\mathbf{s},\tilde{\mathbf{s}}),

where

f1(𝐩,𝐬,𝐬~)=(k=1K1pk+σ2)(k=1Kpk|sk|2+σ2)|k=1Ksk|2(k=1K1pk+σ2)(k=1Kpk|s~k|2+σ2)|k=1Ks~k|2\displaystyle f_{1}(\mathbf{p},\mathbf{s},\tilde{\mathbf{s}})=\frac{\big{(}\sum_{k=1}^{K}\frac{1}{p_{k}}+\sigma^{2}\big{)}\big{(}\sum_{k=1}^{K}p_{k}|s_{k}|^{2}+\sigma^{2}\big{)}-\big{|}\sum_{k=1}^{K}s_{k}\big{|}^{2}}{\big{(}\sum_{k=1}^{K}\frac{1}{p_{k}}+\sigma^{2}\big{)}\big{(}\sum_{k=1}^{K}p_{k}|\tilde{s}_{k}|^{2}+\sigma^{2}\big{)}-\big{|}\sum_{k=1}^{K}\tilde{s}_{k}\big{|}^{2}}
ln[(k=1K1pk+σ2)(k=1Kpk|sk|2+σ2)|k=1Ksk|2(k=1K1pk+σ2)(k=1Kpk|s~k|2+σ2)|k=1Ks~k|2]1,\displaystyle\qquad\qquad\quad-\ln\left[\frac{\big{(}\sum_{k=1}^{K}\frac{1}{p_{k}}+\sigma^{2}\big{)}\big{(}\sum_{k=1}^{K}p_{k}|s_{k}|^{2}+\sigma^{2}\big{)}-\big{|}\sum_{k=1}^{K}s_{k}\big{|}^{2}}{\big{(}\sum_{k=1}^{K}\frac{1}{p_{k}}+\sigma^{2}\big{)}\big{(}\sum_{k=1}^{K}p_{k}|\tilde{s}_{k}|^{2}+\sigma^{2}\big{)}-\big{|}\sum_{k=1}^{K}\tilde{s}_{k}\big{|}^{2}}\right]-1,
f2(𝐩,𝐬,𝐬~)=|k=1Kskk=1Ks~k|2(k=1K1pk+σ2)(k=1Kpk|s~k|2+σ2)|k=1Ks~k|2.\displaystyle f_{2}(\mathbf{p},\mathbf{s},\tilde{\mathbf{s}})=\frac{\big{|}\sum_{k=1}^{K}s_{k}-\sum_{k=1}^{K}\tilde{s}_{k}\big{|}^{2}}{\big{(}\sum_{k=1}^{K}\frac{1}{p_{k}}+\sigma^{2}\big{)}\big{(}\sum_{k=1}^{K}p_{k}|\tilde{s}_{k}|^{2}+\sigma^{2}\big{)}-\big{|}\sum_{k=1}^{K}\tilde{s}_{k}\big{|}^{2}}.

Recall that the power constraints are 𝔼{|xk,t|2}Pk\mathbb{E}\{|x_{k,t}|^{2}\}\leq P_{k} for k=1,,Kk=1,\ldots,K and t=1,2t=1,2. That is, for the first and second time slots, we have 𝔼{|xk,1|2}=1pπ(k)βkPk\mathbb{E}\{|x_{k,1}|^{2}\}=\frac{1}{p_{\pi(k)}\beta_{k}}\leq P_{k}, and 𝔼{|xk,2|2}=pπ(k)Eπ(k)d2βkPk\mathbb{E}\{|x_{k,2}|^{2}\}=\frac{p_{\pi(k)}E_{\pi(k)}d^{2}}{\beta_{k}}\leq P_{k}, where Ek=𝔼{|sk|2}d2E_{k}=\frac{\mathbb{E}\{|s_{k}|^{2}\}}{d^{2}}. The power constraints can thus be expressed as:

1Pπ1(k)βπ1(k)pkPπ1(k)βπ1(k)Ekd2,k=1,,K.\displaystyle\frac{1}{P_{\pi^{-1}(k)}\beta_{\pi^{-1}(k)}}\leq p_{k}\leq\frac{P_{\pi^{-1}(k)}\beta_{\pi^{-1}(k)}}{E_{k}d^{2}},\quad k=1,\ldots,K. (11)

Our design can now be formulated into the following optimization problem.

Problem 1

Find the optimal power control vector 𝐩\mathbf{p} and permutation π\pi under individual average power constraints:

max{π,𝐩}min{𝐬,𝐬~:𝐬𝐬~}f1(𝐩,𝐬,𝐬~)+f2(𝐩,𝐬,𝐬~)\displaystyle\max_{\{\pi,\mathbf{p}\}}\,\min_{\{\mathbf{s},\tilde{\mathbf{s}}:\,\mathbf{s}\neq\tilde{\mathbf{s}}\}}~{}f_{1}(\mathbf{p},\mathbf{s},\tilde{\mathbf{s}})+f_{2}(\mathbf{p},\mathbf{s},\tilde{\mathbf{s}}) (12a)
s.t.,1Pπ1(k)βπ1(k)pkPπ1(k)βπ1(k)Ekd2,k=1,,K.\displaystyle{\rm~{}s.t.},~{}\frac{1}{P_{\pi^{-1}(k)}\beta_{\pi^{-1}(k)}}\leq p_{k}\leq\frac{P_{\pi^{-1}(k)}\beta_{\pi^{-1}(k)}}{E_{k}d^{2}},\quad k=1,\ldots,K. (12b)

For Problem 1, we first can attain that f1(𝐩,𝐬,𝐬~)0f_{1}(\mathbf{p},\mathbf{s},\tilde{\mathbf{s}})\geq 0 by applying the fundamental inequality in information theory [38, Lemma 2.29], where the equality f1(𝐩,𝐬,𝐬~)=0f_{1}(\mathbf{p},\mathbf{s},\tilde{\mathbf{s}})=0 holds if and only if

(k=1K1pk+σ2)(k=1Kpk(|sk|2|s~k|2))(|k=1Ksk|2|k=1Ks~k|2)=0.\displaystyle\Big{(}\sum_{k=1}^{K}\frac{1}{p_{k}}+\sigma^{2}\Big{)}\Big{(}\sum_{k=1}^{K}p_{k}(|s_{k}|^{2}-|\tilde{s}_{k}|^{2})\Big{)}-\Big{(}\big{|}\sum_{k=1}^{K}s_{k}\big{|}^{2}-\big{|}\sum_{k=1}^{K}\tilde{s}_{k}\big{|}^{2}\Big{)}=0. (13)

Considering the fact that the joint minimization of f1(𝐩,𝐬,𝐬~)f_{1}(\mathbf{p},\mathbf{s},\tilde{\mathbf{s}}) and f2(𝐩,𝐬,𝐬~)f_{2}(\mathbf{p},\mathbf{s},\tilde{\mathbf{s}}) over {𝐬,𝐬~:𝐬𝐬~}\{\mathbf{s},\tilde{\mathbf{s}}:\mathbf{s}\neq\tilde{\mathbf{s}}\} could be extremely tedious, we consider the minimization of f2(𝐩,𝐬,𝐬~)f_{2}(\mathbf{p},\mathbf{s},\tilde{\mathbf{s}}) first, which is a lower bound of 𝒟KL(𝐗2||𝐗~2)\mathcal{D}_{\rm KL}(\mathbf{X}_{2}||\widetilde{\mathbf{X}}_{2}) as f1(𝐩,𝐬,𝐬~)0f_{1}(\mathbf{p},\mathbf{s},\tilde{\mathbf{s}})\geq 0. We will verify the condition when the minimum of f1(𝐩,𝐬,𝐬~)f_{1}(\mathbf{p},\mathbf{s},\tilde{\mathbf{s}}) and f2(𝐩,𝐬,𝐬~)f_{2}(\mathbf{p},\mathbf{s},\tilde{\mathbf{s}}) can be achieved simultaneously. Mathematically, we temporarily focus on solving the following optimization problem:

Problem 2

Find the power control coefficients 𝐩\mathbf{p} and permutation π\pi, such that

max{π,𝐩}min{𝐬,𝐬~:𝐬𝐬~}f2(𝐩,𝐬,𝐬~)=|k=1Kskk=1Ks~k|2(k=1K1pk+σ2)(k=1Kpk|s~k|2+σ2)|k=1Ks~k|2\displaystyle\max_{\{\pi,\mathbf{p}\}}\,\min_{\{\mathbf{s},\tilde{\mathbf{s}}:\,\mathbf{s}\neq\tilde{\mathbf{s}}\}}~{}f_{2}(\mathbf{p},\mathbf{s},\tilde{\mathbf{s}})=\frac{\big{|}\sum_{k=1}^{K}s_{k}-\sum_{k=1}^{K}\tilde{s}_{k}\big{|}^{2}}{(\sum_{k=1}^{K}\frac{1}{p_{k}}+\sigma^{2})(\sum_{k=1}^{K}p_{k}|\tilde{s}_{k}|^{2}+\sigma^{2})-|\sum_{k=1}^{K}\tilde{s}_{k}|^{2}} (14a)
s.t.1Pπ1(k)βπ1(k)pkPπ1(k)βπ1(k)Ekd2,k=1,,K.\displaystyle~{}{\rm s.t.}~{}\frac{1}{P_{\pi^{-1}(k)}\beta_{\pi^{-1}(k)}}\leq p_{k}\leq\frac{P_{\pi^{-1}(k)}\beta_{\pi^{-1}(k)}}{E_{k}d^{2}},\quad k=1,\ldots,K. (14b)

We first consider the inner optimization problem in Problem 2. The denominator of (14a) is independent of 𝐬\mathbf{s} and the numerator is minimized when the sum terms k=1Ksk\sum_{k=1}^{K}s_{k} and k=1Ks~k\sum_{k=1}^{K}\tilde{s}_{k} are the neighboring points on the sum-constellation, where the minimum value of |k=1Kskk=1Ks~k|2\big{|}\sum_{k=1}^{K}s_{k}-\sum_{k=1}^{K}\tilde{s}_{k}\big{|}^{2} is d2d^{2}. For notation simplicity, we define 𝐬~=(𝐯~+j𝐰~)d\tilde{\mathbf{s}}=(\tilde{\mathbf{v}}+j\tilde{\mathbf{w}})d, where 𝐯~=[v~1,,v~K]T\tilde{\mathbf{v}}=[\tilde{v}_{1},\ldots,\tilde{v}_{K}]^{T} and 𝐰~=[w~1,,w~K]T\tilde{\mathbf{w}}=[\tilde{w}_{1},\ldots,\tilde{w}_{K}]^{T}. As the power constraint given in (14b) is independent of 𝐯\mathbf{v} and 𝐰\mathbf{w}, Problem 2 can be split into two subproblems:

max𝐯~f3(𝐯~)=(k=1K1pk+σ2)(k=1Kpkv~k2+σ2d2)(k=1Kv~k)2\displaystyle\max_{\tilde{\mathbf{v}}}~{}f_{3}(\tilde{\mathbf{v}})=\Big{(}\sum_{k=1}^{K}\frac{1}{p_{k}}+\sigma^{2}\Big{)}\Big{(}\sum_{k=1}^{K}p_{k}\tilde{v}_{k}^{2}+\frac{\sigma^{2}}{d^{2}}\Big{)}-\Big{(}\sum_{k=1}^{K}\tilde{v}_{k}\Big{)}^{2} (15a)
s.t.v~k{±(m12)×2=1k1NI,}m=12NI,k1,k=1,,K.\displaystyle{\rm~{}s.t.}~{}\tilde{v}_{k}\in\Big{\{}\pm\Big{(}m-\frac{1}{2}\Big{)}\times 2^{\sum_{\ell=1}^{k-1}N_{I,\ell}}\Big{\}}_{m=1}^{2^{N_{I,k}-1}},\quad k=1,\ldots,K. (15b)

and

max𝐰~f4(𝐰~)=(k=1K1pk+σ2)(k=1Kpkw~k2+σ2d2)(k=1Kw~k)2\displaystyle\max_{\tilde{\mathbf{w}}}~{}f_{4}(\tilde{\mathbf{w}})=\Big{(}\sum_{k=1}^{K}\frac{1}{p_{k}}+\sigma^{2}\Big{)}\Big{(}\sum_{k=1}^{K}p_{k}\tilde{w}_{k}^{2}+\frac{\sigma^{2}}{d^{2}}\Big{)}-\Big{(}\sum_{k=1}^{K}\tilde{w}_{k}\big{)}^{2} (16a)
s.t.w~k{±(m12)×2=1k1NQ,}m=12NQ,k1,k=1,,K.\displaystyle{\rm~{}s.t.}~{}\tilde{w}_{k}\in\Big{\{}\pm\Big{(}m-\frac{1}{2}\Big{)}\times 2^{\sum_{\ell=1}^{k-1}N_{Q,\ell}}\Big{\}}_{m=1}^{2^{N_{Q,k}-1}},\quad k=1,\ldots,K. (16b)

In the following, we only present the maximization of f3(𝐯~)f_{3}(\tilde{\mathbf{v}}) over 𝐯~\tilde{\mathbf{v}} in (15), and the maximization of f4(𝐰~)f_{4}(\tilde{\mathbf{w}}) over 𝐰~\tilde{\mathbf{w}} given in  (16) follows similarly and hence is omitted fore brevity. We now rewrite the objective function (15a) as

f3(𝐯~)=\displaystyle f_{3}(\tilde{\mathbf{v}})= (1p1+(k=2K1pk+σ2))(p1v~12+(k=2Kpkv~k2+σ2d2))(v~1+k=2Kv~k)2\displaystyle\bigg{(}\frac{1}{p_{1}}+\Big{(}\sum_{k=2}^{K}\frac{1}{p_{k}}+\sigma^{2}\Big{)}\bigg{)}\Big{(}p_{1}\tilde{v}_{1}^{2}+\big{(}\sum_{k=2}^{K}p_{k}\tilde{v}_{k}^{2}+\frac{\sigma^{2}}{d^{2}}\big{)}\Big{)}-\Big{(}\tilde{v}_{1}+\sum_{k=2}^{K}\tilde{v}_{k}\Big{)}^{2}
=\displaystyle= 1p1(k=2Kpkv~k2+σ2d2)+p1v~12(k=2K1pk+σ2)+(k=2K1pk+σ2)(k=2Kpkv~k2+σ2d2)\displaystyle\frac{1}{p_{1}}\Big{(}\sum_{k=2}^{K}p_{k}\tilde{v}_{k}^{2}+\frac{\sigma^{2}}{d^{2}}\Big{)}+p_{1}\tilde{v}_{1}^{2}\Big{(}\sum_{k=2}^{K}\frac{1}{p_{k}}+\sigma^{2}\Big{)}+\Big{(}\sum_{k=2}^{K}\frac{1}{p_{k}}+\sigma^{2}\Big{)}\Big{(}\sum_{k=2}^{K}p_{k}\tilde{v}_{k}^{2}+\frac{\sigma^{2}}{d^{2}}\Big{)}
2v~1(k=2Kv~k)(k=2Kv~k)2\displaystyle-2\tilde{v}_{1}\big{(}\sum_{k=2}^{K}\tilde{v}_{k}\big{)}-\big{(}\sum_{k=2}^{K}\tilde{v}_{k}\big{)}^{2}
=\displaystyle= 1p1(k=2Kpkv~k2+σ2d2)+1p2(k=3Kpkv~k2+σ2d2)+p1v~12(k=2K1pk+σ2)+p2v~22(k=3K1pk+σ2)\displaystyle\frac{1}{p_{1}}\Big{(}\sum_{k=2}^{K}p_{k}\tilde{v}_{k}^{2}+\frac{\sigma^{2}}{d^{2}}\Big{)}+\frac{1}{p_{2}}\Big{(}\sum_{k=3}^{K}p_{k}\tilde{v}_{k}^{2}+\frac{\sigma^{2}}{d^{2}}\Big{)}+p_{1}\tilde{v}_{1}^{2}\Big{(}\sum_{k=2}^{K}\frac{1}{p_{k}}+\sigma^{2}\Big{)}+p_{2}\tilde{v}_{2}^{2}\Big{(}\sum_{k=3}^{K}\frac{1}{p_{k}}+\sigma^{2}\Big{)}
+(k=3K1pk+σ2)(k=3Kpkv~k2+σ2d2)(k=3Kv~k)22v~1(k=2Kv~k)2v~2(k=3Kv~k)\displaystyle+\Big{(}\sum_{k=3}^{K}\frac{1}{p_{k}}+\sigma^{2}\Big{)}\Big{(}\sum_{k=3}^{K}p_{k}\tilde{v}_{k}^{2}+\frac{\sigma^{2}}{d^{2}}\Big{)}-\big{(}\sum_{k=3}^{K}\tilde{v}_{k}\big{)}^{2}-2\tilde{v}_{1}\big{(}\sum_{k=2}^{K}\tilde{v}_{k}\big{)}-2\tilde{v}_{2}\big{(}\sum_{k=3}^{K}\tilde{v}_{k}\big{)}
=\displaystyle= =1K11p(k=+1Kpkv~k2+σ2d2)+=1K1pv~2(k=+1K1pk+σ2)+pKv~K2σ2\displaystyle\sum_{\ell=1}^{K-1}\frac{1}{p_{\ell}}\Big{(}\sum_{k=\ell+1}^{K}p_{k}\tilde{v}_{k}^{2}+\frac{\sigma^{2}}{d^{2}}\Big{)}+\sum_{\ell=1}^{K-1}p_{\ell}\tilde{v}_{\ell}^{2}\Big{(}\sum_{k=\ell+1}^{K}\frac{1}{p_{k}}+\sigma^{2}\Big{)}+p_{K}\tilde{v}_{K}^{2}\sigma^{2}
+σ4d2+pKv~K2σ2+σ4d22=1K1v~k=+1Kv~k\displaystyle+\frac{\sigma^{4}}{d^{2}}+p_{K}\tilde{v}_{K}^{2}\sigma^{2}+\frac{\sigma^{4}}{d^{2}}-2\sum_{\ell=1}^{K-1}\tilde{v}_{\ell}\sum_{k=\ell+1}^{K}\tilde{v}_{k}
=\displaystyle= f5(𝐯~)f6(𝐯~),\displaystyle f_{5}(\tilde{\mathbf{v}})-f_{6}(\tilde{\mathbf{v}}),

where f5(𝐯~)==1K11p(k=+1Kpkv~k2+σ2d2)+=1K1pv~2(k=+1K1pk+σ2)+pKv~K2σ2+σ4d2+pKv~K2σ2+σ4d2f_{5}(\tilde{\mathbf{v}})=\sum_{\ell=1}^{K-1}\frac{1}{p_{\ell}}\Big{(}\sum_{k=\ell+1}^{K}p_{k}\tilde{v}_{k}^{2}+\frac{\sigma^{2}}{d^{2}}\Big{)}+\sum_{\ell=1}^{K-1}p_{\ell}\tilde{v}_{\ell}^{2}\Big{(}\sum_{k=\ell+1}^{K}\frac{1}{p_{k}}+\sigma^{2}\Big{)}+p_{K}\tilde{v}_{K}^{2}\sigma^{2}+\frac{\sigma^{4}}{d^{2}}+p_{K}\tilde{v}_{K}^{2}\sigma^{2}+\frac{\sigma^{4}}{d^{2}}, and f6(𝐯~)=2=1K1v~k=+1Kv~kf_{6}(\tilde{\mathbf{v}})=2\sum_{\ell=1}^{K-1}\tilde{v}_{\ell}\sum_{k=\ell+1}^{K}\tilde{v}_{k}. We then can maximize f5(𝐯~)f6(𝐯~)f_{5}(\tilde{\mathbf{v}})-f_{6}(\tilde{\mathbf{v}}). In what follows, we will show that the maximization of f5(𝐯~)f_{5}(\tilde{\mathbf{v}}) and the minimization of f6(𝐯~)f_{6}(\tilde{\mathbf{v}}) can be achieved simultaneously. First, we can observe that the maximization of f5(𝐯~)f_{5}(\tilde{\mathbf{v}}) is achieved when |v~k||\tilde{v}_{k}|, k=1,,Kk=1,\ldots,K, are maximized for signal transmitted from every user. We next consider the minimization of f6(𝐯~)f_{6}(\tilde{\mathbf{v}}). To that end, we have,

f6(𝐯~)v~k=2=1,kKv~,k=1,,K.\displaystyle\frac{\partial f_{6}(\tilde{\mathbf{v}})}{\partial\tilde{v}_{k}}=2\sum_{\ell=1,\ell\neq k}^{K}\tilde{v}_{\ell},k=1,\ldots,K. (18)

The optimal value can be attained by enumeration of v~K{(m12)×2=1K1N}m=12NK1\tilde{v}_{K}\in\Big{\{}\big{(}m-\frac{1}{2}\big{)}\times 2^{\sum_{\ell=1}^{K-1}N_{\ell}}\Big{\}}_{m=1}^{2^{N_{K}-1}}, and v~K{(m12)×2=1K1N}m=12NK1\tilde{v}_{K}\in\Big{\{}-\big{(}m-\frac{1}{2}\big{)}\times 2^{\sum_{\ell=1}^{K-1}N_{\ell}}\Big{\}}_{m=1}^{2^{N_{K}-1}}.

  1. 1.

    If v~K{(m12)×2=1K1N}m=12NK1\tilde{v}_{K}\in\Big{\{}\big{(}m-\frac{1}{2}\big{)}\times 2^{\sum_{\ell=1}^{K-1}N_{\ell}}\Big{\}}_{m=1}^{2^{N_{K}-1}}, then for any v~k{±(m12)×2=1k1N}m=12Nk1\tilde{v}_{k}\in\Big{\{}\pm\big{(}m-\frac{1}{2}\big{)}\times 2^{\sum_{\ell=1}^{k-1}N_{\ell}}\Big{\}}_{m=1}^{2^{N_{k}-1}}, k=1,,K1k=1,\ldots,K-1, we have

    f6(𝐯~)v~k=2v~K+2=1,kK1v~2minv~K+2min{v~}=1K1=1,kK1v~\displaystyle\frac{\partial f_{6}(\tilde{\mathbf{v}})}{\partial\tilde{v}_{k}}=2\tilde{v}_{K}+2\sum_{\ell=1,\ell\neq k}^{K-1}\tilde{v}_{\ell}\geq 2\min\tilde{v}_{K}+2\min_{\{\tilde{v}_{\ell}\}_{\ell=1}^{K-1}}\sum_{\ell=1,\ell\neq k}^{K-1}\tilde{v}_{\ell}
    >2=1K1N+2min{v~}=1K1=1K1v~=2=1K1N2(2=1K1N112)=1.\displaystyle>2^{\sum_{\ell=1}^{K-1}N_{\ell}}+2\min_{\{\tilde{v}_{\ell}\}_{\ell=1}^{K-1}}\sum_{\ell=1}^{K-1}\tilde{v}_{\ell}=2^{\sum_{\ell=1}^{K-1}N_{\ell}}-2\Big{(}2^{\sum_{\ell=1}^{K-1}N_{\ell}-1}-\frac{1}{2}\Big{)}=1.

    In this case, the optimal value of {v~k}k=1K1\{\tilde{v}_{k}\}_{k=1}^{K-1} to minimize f6(𝐯~)f_{6}(\tilde{\mathbf{v}}) is given by

    v~k=(2Nk1)×2=1k1N1,fork=1,,K1.\displaystyle\tilde{v}_{k}=-\big{(}2^{N_{k}}-1\big{)}\times 2^{\sum_{\ell=1}^{k-1}N_{\ell}-1},{\rm~{}for~{}}k=1,\ldots,K-1.

    Note that f6(𝐯~)v~K=2=1K1v~<0\frac{\partial f_{6}(\tilde{\mathbf{v}})}{\partial\tilde{v}_{K}}=2\sum_{\ell=1}^{K-1}\tilde{v}_{\ell}<0, then for v~K{(m12)×2=1K1N}m=12NK1\tilde{v}_{K}\in\Big{\{}\big{(}m-\frac{1}{2}\big{)}\times 2^{\sum_{\ell=1}^{K-1}N_{\ell}}\Big{\}}_{m=1}^{2^{N_{K}-1}}, the optimal value of v~K\tilde{v}_{K} is v~K=(2NK1)×2=1K1N1\tilde{v}_{K}=\big{(}2^{N_{K}}-1\big{)}\times 2^{\sum_{\ell=1}^{K-1}N_{\ell}-1}.

  2. 2.

    If v~K{(m12)×2=1K1N}m=12NK1\tilde{v}_{K}\in\Big{\{}-\big{(}m-\frac{1}{2}\big{)}\times 2^{\sum_{\ell=1}^{K-1}N_{\ell}}\Big{\}}_{m=1}^{2^{N_{K}-1}}, for v~k{±(m12)×2=1k1N}m=12Nk1\tilde{v}_{k}\in\Big{\{}\pm\big{(}m-\frac{1}{2}\big{)}\times 2^{\sum_{\ell=1}^{k-1}N_{\ell}}\Big{\}}_{m=1}^{2^{N_{k}-1}}, k=1,,K1k=1,\ldots,K-1, we have

    f6(𝐯~)v~k=2v~K+2=1,kK1v~2v~K+2max{v~}=1K1=1,kKv~\displaystyle\frac{\partial f_{6}(\tilde{\mathbf{v}})}{\partial\tilde{v}_{k}}=2\tilde{v}_{K}+2\sum_{\ell=1,\ell\neq k}^{K-1}\tilde{v}_{\ell}\leq 2\tilde{v}_{K}+2\max_{\{\tilde{v}_{\ell}\}_{\ell=1}^{K-1}}\sum_{\ell=1,\ell\neq k}^{K}\tilde{v}_{\ell}
    <2=1K1N+2max{v~}=1K1=1K1v~=2=1K1N+2(2=1K1N112)=1.\displaystyle<-2^{\sum_{\ell=1}^{K-1}N_{\ell}}+2\max_{\{\tilde{v}_{\ell}\}_{\ell=1}^{K-1}}\sum_{\ell=1}^{K-1}\tilde{v}_{\ell}=-2^{\sum_{\ell=1}^{K-1}N_{\ell}}+2\Big{(}2^{\sum_{\ell=1}^{K-1}N_{\ell}-1}-\frac{1}{2}\Big{)}=-1.

    In this case, the optimal value of {v~k}k=1K1\{\tilde{v}_{k}\}_{k=1}^{K-1} to minimize f6(𝐯~)f_{6}(\tilde{\mathbf{v}}) is given by

    v~k=(2Nk12)×2=1k1N,fork=1,,K1.\displaystyle\tilde{v}_{k}=\Big{(}2^{N_{k}}-\frac{1}{2}\Big{)}\times 2^{\sum_{\ell=1}^{k-1}N_{\ell}},{\rm~{}for~{}}k=1,\ldots,K-1.

    In addition, we note that f6(𝐯~)v~K=2=1K1v~<0\frac{\partial f_{6}(\tilde{\mathbf{v}})}{\partial\tilde{v}_{K}}=2\sum_{\ell=1}^{K-1}\tilde{v}_{\ell}<0, then for v~K{(m12)×2=1K1N}m=12NK1\tilde{v}_{K}\in\Big{\{}-\big{(}m-\frac{1}{2}\big{)}\times 2^{\sum_{\ell=1}^{K-1}N_{\ell}}\Big{\}}_{m=1}^{2^{N_{K}-1}}, the optimal value of v~K\tilde{v}_{K} is v~K=(2NK1)×2=1K1N1\tilde{v}_{K}=-\big{(}2^{N_{K}}-1\big{)}\times 2^{\sum_{\ell=1}^{K-1}N_{\ell}-1}.

Overall, the maximum value of f6(𝐯~)=2=1K1v~k=+1Kv~kf_{6}(\tilde{\mathbf{v}})=2\sum_{\ell=1}^{K-1}\tilde{v}_{\ell}\sum_{k=\ell+1}^{K}\tilde{v}_{k} can be achieved by 𝐯~=[v~1,,v~K]T\tilde{\mathbf{v}}^{\star}=[\tilde{v}_{1}^{\star},\ldots,\tilde{v}_{K}^{\star}]^{T} where

v~k={(2NI,k112)×2=1k1NI,,fork=1,,K1;(2NI,K112)×2=1K1NI,,fork=K,\displaystyle\tilde{v}_{k}^{\star}=\begin{cases}-\big{(}2^{N_{I,k}-1}-\frac{1}{2}\big{)}\times 2^{\sum_{\ell=1}^{k-1}N_{I,\ell}},&{\rm for~{}}k=1,\ldots,K-1;\\ \big{(}2^{N_{I,K}-1}-\frac{1}{2}\big{)}\times 2^{\sum_{\ell=1}^{K-1}N_{I,\ell}},&{\rm for~{}}k=K,\end{cases} (19)

or equivalently

v~k={(2NI,k112)×2=1k1NI,,fork=1,,K1;(2NI,K112)×2=1K1NI,,fork=K.\displaystyle\tilde{v}_{k}^{\star}=\begin{cases}\big{(}2^{N_{I,k}-1}-\frac{1}{2}\big{)}\times 2^{\sum_{\ell=1}^{k-1}N_{I,\ell}},&{\rm for~{}}k=1,\ldots,K-1;\\ -\big{(}2^{N_{I,K}-1}-\frac{1}{2}\big{)}\times 2^{\sum_{\ell=1}^{K-1}N_{I,\ell}},&{\rm for~{}}k=K.\end{cases} (20)

For both cases, we can observe that f5(𝐯~)f_{5}(\tilde{\mathbf{v}}) is also maximized by 𝐯~\tilde{\mathbf{v}}^{\star}. Due to the symmetry of the solutions given in (19) and (20), in what follows, we only consider the solution given in (19). In this case, the sum-constellation for achieving the inner minimum is

k=1Ks~k=k=1Kv~k+jw~k\displaystyle\sum_{k=1}^{K}\tilde{s}_{k}=\sum_{k=1}^{K}\tilde{v}_{k}+j\tilde{w}_{k}
=[1+j2+(2NI,K11)×2=1K1NI,+j(2NQ,K11)×2=1K1NQ,]d.\displaystyle=\bigg{[}\frac{1+j}{2}+\big{(}2^{N_{I,K}-1}-1\big{)}\times 2^{\sum_{\ell=1}^{K-1}N_{I,\ell}}+j\big{(}2^{N_{Q,K}-1}-1\big{)}\times 2^{\sum_{\ell=1}^{K-1}N_{Q,\ell}}\bigg{]}d. (21)

We then can have the following remark:

Remark 1

When NI,K=NQ,K=1N_{I,K}=N_{Q,K}=1, the solution given in (19), which minimizes f2(𝐩,𝐬,𝐬~)f_{2}(\mathbf{p},\mathbf{s},\tilde{\mathbf{s}}) also minimizes f1(𝐩,𝐬,𝐬~)f_{1}(\mathbf{p},\mathbf{s},\tilde{\mathbf{s}}). \Box

Proof: For the solution of 𝐬~\tilde{\mathbf{s}} given in (19), the sum constellation is given in (III-C). When NI,K=NQ,K=1N_{I,K}=N_{Q,K}=1, we have k=1Ks~k=1+j2d\sum_{k=1}^{K}\tilde{s}_{k}=\frac{1+j}{2}d, and we can let k=1Ksk=1j2d\sum_{k=1}^{K}s_{k}=\frac{1-j}{2}d. Inserting them back into (13), we have f1(𝐩,𝐬,𝐬~)=0f_{1}(\mathbf{p},\mathbf{s},\tilde{\mathbf{s}})=0. That is, the values that minimize f2(𝐩,𝐬,𝐬~)f_{2}(\mathbf{p},\mathbf{s},\tilde{\mathbf{s}}) also minimizes f1(𝐩,𝐬,𝐬~)f_{1}(\mathbf{p},\mathbf{s},\tilde{\mathbf{s}}). \Box

We now consider the outer optimization problem, where the objective function is a monotonically decreasing function against the term abd2\frac{ab}{d^{2}}. The optimization problem can be reformulated as

maxπ,𝐩(k=1K1pk+σ2)(k=1KpkEk+σ2d2)\displaystyle\max_{\pi,\mathbf{p}}~{}\bigg{(}\sum_{k=1}^{K}\frac{1}{p_{k}}+\sigma^{2}\bigg{)}\bigg{(}\sum_{k=1}^{K}p_{k}E_{k}+\frac{\sigma^{2}}{d^{2}}\bigg{)} (22a)
s.t.1pkPπ1(k)βπ1(k),pkEkd2Pπ1(k)βπ1(k),k=1,,K.\displaystyle\quad{\rm s.t.}~{}\frac{1}{p_{k}}\leq P_{\pi^{-1}(k)}\beta_{\pi^{-1}(k)},~{}p_{k}E_{k}d^{2}\leq P_{\pi^{-1}(k)}\beta_{\pi^{-1}(k)},\quad k=1,\ldots,K. (22b)

The optimization problem in (22) can be resolved by first fixing π\pi to find the optimal value of 𝐩\mathbf{p}, and then perform further optimization on π\pi. To that end, we can observe from (22b) that, for any given π\pi, the feasible range of d2d^{2} is given by d2Pπ1(k)βπ1(k)pkEkPπ1(k)2βπ1(k)2Ekd^{2}\leq\frac{P_{\pi^{-1}(k)}\beta_{\pi^{-1}(k)}}{p_{k}E_{k}}\leq\frac{P_{\pi^{-1}(k)}^{2}\beta_{\pi^{-1}(k)}^{2}}{E_{k}} for k=1,,Kk=1,\ldots,K, or equivalently d2min{Pπ1(k)2βπ1(k)2Ek}k=1Kd^{2}\leq\min\,\Big{\{}\frac{P_{\pi^{-1}(k)}^{2}\beta_{\pi^{-1}(k)}^{2}}{E_{k}}\Big{\}}_{k=1}^{K}. By the Cauchy-Swartz inequality, we have

(k=1K1pk+σ2)(k=1KpkEk+σ2d2)\displaystyle\bigg{(}\sum_{k=1}^{K}\frac{1}{p_{k}}+\sigma^{2}\bigg{)}\bigg{(}\sum_{k=1}^{K}p_{k}E_{k}+\frac{\sigma^{2}}{d^{2}}\bigg{)}
(a)(k=1K1pkpkEkd2+σ2d)2=(k=1KEk+σ2d)2,\displaystyle\stackrel{{\scriptstyle(a)}}{{\geq}}\bigg{(}\sum_{k=1}^{K}\frac{1}{\sqrt{p_{k}}}\sqrt{p_{k}E_{k}d^{2}}+\frac{\sigma^{2}}{d}\bigg{)}^{2}=\bigg{(}\sum_{k=1}^{K}\sqrt{E_{k}}+\frac{\sigma^{2}}{d}\bigg{)}^{2},

where the inequality in (a)(a) holds if and only if pkEk1/pk=1d\frac{\sqrt{p_{k}E_{k}}}{{1}/{\sqrt{p_{k}}}}=\frac{1}{d}, for k=1,Kk=1,\ldots K. Or equivalently, the optimal power allocation is 𝐩=[p1,,p]T\mathbf{p}=[p_{1}^{\star},\ldots,p^{\star}]^{T} where pk=1Ekdp_{k}^{\star}=\frac{1}{\sqrt{E_{k}}d} for k=1,,Kk=1,\ldots,K. Our next task is to check the power constraint on pkp_{k}^{\star} given in (22b) is violated or not. For d2min{Pπ1(k)2βπ1(k)2Ek}k=1Kd^{2}\leq\min\,\Big{\{}\frac{P_{\pi^{-1}(k)}^{2}\beta_{\pi^{-1}(k)}^{2}}{E_{k}}\Big{\}}_{k=1}^{K}, we have

1pk=EkdPπ1(k)βπ1(k),pkEkd2=EkdPπ1(k)βπ1(k),fork=1,,K,\displaystyle\frac{1}{p_{k}^{\star}}=\sqrt{E_{k}}d\leq P_{\pi^{-1}(k)}\beta_{\pi^{-1}(k)},\quad p_{k}^{\star}E_{k}d^{2}=\sqrt{E_{k}}d\leq P_{\pi^{-1}(k)}\beta_{\pi^{-1}(k)},{\rm~{}for~{}}k=1,\ldots,K, (23)

where no power constraints are violated for 𝐩\mathbf{p}. Finally, the optimization problem on π\pi can be given by

minπk=1KEk+σ2ds.t.d2Pπ1(k)2βπ1(k)2Ek,k=1,,K.\displaystyle\min_{\pi}~{}\sum_{k=1}^{K}\sqrt{E_{k}}+\frac{\sigma^{2}}{d}\quad{\rm s.t.}~{}d^{2}\leq\frac{P_{\pi^{-1}(k)}^{2}\beta_{\pi^{-1}(k)}^{2}}{E_{k}},\quad k=1,\ldots,K. (24)

Or equivalently, we aim to solve

maxπds.t.d2Pk2βk2Eπ(k),k=1,,K.\displaystyle\max_{\pi}~{}d\quad{\rm s.t.}~{}d^{2}\leq\frac{P_{k}^{2}\beta_{k}^{2}}{E_{\pi(k)}},\quad k=1,\ldots,K. (25)

Before proceeding on, we establish the following lemma.

Lemma 2

Suppose that two positive sequences {an}n=1N\{a_{n}\}_{n=1}^{N} and {bn}n=1N\{b_{n}\}_{n=1}^{N} are arranged both in a nondecreasing order. If we let Π\Pi denote the set containing all the possible permutations of 1,2,,N1,2,\cdots,N, then, the solution to the optimization problem, maxπΠmin{akbπ(k)}k=1K\max_{\pi\in\Pi}\min\Big{\{}\frac{a_{k}}{b_{\pi(k)}}\Big{\}}_{k=1}^{K}, is given by π(k)=k\pi^{\star}(k)=k for k=1,2,,Kk=1,2,\cdots,K.  ∎

By Lemma 2, and note that P1β1PkβKP_{1}\beta_{1}\leq\ldots\leq P_{k}\beta_{K}, to maximize dd, we should let Eπ(1)Eπ(K)E_{\pi(1)}\leq\ldots\leq E_{\pi(K)}, i.e., the average power of the sub-constellations should be arranged in an ascending order. All the above discussions can be summarized into the following theorem:

Theorem 1

The users are ordered such that P1β1P2β2PkβKP_{1}\beta_{1}\leq P_{2}\beta_{2}\leq\ldots\leq P_{k}\beta_{K}, and we define d=mink{PkβkEk}k=1Kd^{\star}=\min_{k}\big{\{}\frac{P_{k}\beta_{k}}{\sqrt{E_{k}}}\big{\}}_{k=1}^{K}, the optimal transmit power for all users can be given by 𝐩=[1E1d,,1EKd]T\mathbf{p}^{\star}=[\frac{1}{\sqrt{E_{1}}d^{\star}},\ldots,\frac{1}{\sqrt{E_{K}}d^{\star}}]^{T}. And the optimal permutation matrix is the identity matrix, i.e., 𝚷=𝐈K\mathbf{\Pi}=\mathbf{I}_{K}. ∎

IV Simulation Results and Discussions

In this section, computer simulations are performed to demonstrate the superior performance of our design in comparison with existing benchmarks. In our simulations, the small-scale fading is assumed to be the normalized Rayleigh fading. The path-loss as a function of transmission distance dd at antenna far-field can be approximated by

10log10L=20log10(λ4πd0)10γlog10(dd0)ψ,dd0,\displaystyle 10\log_{10}L=20\log_{10}\Big{(}\frac{\lambda}{4\pi d_{0}}\Big{)}-10\gamma\log_{10}\Big{(}\frac{d}{d_{0}}\Big{)}-\psi,\quad d\geq d_{0},

where d0=100d_{0}=100m is the reference distance, λ=vc/fc\lambda=v_{c}/f_{c} (fc=3f_{c}=3GHz) is the wavelength of carrier, γ=3.71\gamma=3.71 is the path-loss exponent [39]. In the above model, ψ𝒩(0,σψ2)\psi\sim\mathcal{N}(0,\sigma_{\psi}^{2}) (σψ=3.16\sigma_{\psi}=3.16) is the Gaussian random shadowing attenuation resulting from the blockage of objects. For the receiver, we assume that the noise power is 10log10σ2=10log10N0Bw=10log103.2×1010=125.97dB10\log_{10}\sigma^{2}=10\log_{10}N_{0}B_{w}=10\log_{10}3.2\times 10^{-10}=-125.97\,{\rm dB} where the channel bandwidth Bw=20B_{w}=20MHz, and N0=k0T010F0/10N_{0}=k_{0}T_{0}10^{F_{0}/10} is the power spectral density of noise with k0=1.38×1023k_{0}=1.38\times 10^{-23} J/K being the Boltzman’s constant, reference temperature T0=290T_{0}=290K (“room temperature”), and noise figure F0=6F_{0}=6 dB. For clarity, all the simulation parameters are summarized in Table I.

TABLE I: Simulation Parameters
Cell radius dmaxd_{\rm max} 10001000 m
Reference distance d0d_{0} 100 m
Carrier frequency fcf_{c} 3 GHz
Channel bandwidth BwB_{w} 20 MHz
Pathloss exponent γ\gamma 3.71
Reference temperature / Noise figure 290 K / 6 dB
Standard deviation of shadow fading σψ\sigma_{\psi} 3.16

We first examine the error performance of the proposed design under the instantaneous average power constraint for different number of users, as illustrated in Fig. LABEL:fig:avrbervsdist. It is assumed that the average power upper bound is Pk=316{P}_{k}=316 mW (25 dBm), k\forall k. All the KK users are assumed to be uniformly distributed within the cell of radius dd. It can be observed that, as the number of users increases, the error performance deteriorates quickly which is caused by the mutual interference among users. Then, more BS antennas are needed to achieve the same average BER. We also compare our design with the max-min Euclidean distance (MED)-based method proposed in [26, 27]. Since we use two time slots, while the MED methods only need one time slot, we assume that 2-PAM constellations are adopted by all users for the MED based design. We can see from the figure that the proposed approach significantly outperforms the MED-based method in terms of BER in all simulated cases.

We next compare the error performance of the proposed framework with the conventional zero-forcing (ZF) receiver using orthogonal training sequence. The results are shown in Fig. LABEL:fig:trainingbsproposed. In this simulation, we consider a system setup with N=3N=3 users. For the orthogonal training-based method, at least 4 time slots (3 time slots for training and 1 time slot for data transmission) are needed and we assume that the channel coefficients are quasi-static within these consecutive time slots. As 4-QAM is adopted by each user for the proposed scheme, 64-QAM are correspondingly adopted for the training-based approach in order to make a fair comparison. For the channel training algorithm, we consider that a widely-used least-square (LS) channel estimator is employed [40]. It can be observed from Fig. LABEL:fig:trainingbsproposed that, when the antenna number MM is small and the channel gain is large (i.e., the distance dd is small), the training-based method outperforms the proposed design in term of BER. However, when the antenna number is relatively large, the proposed design has a better error performance, especially at the cell edge. The rationale is that without a reliable CSI, especially at low signal-to-noise ratio (SNR) regimes, coherent detection suffers from inferior decoding performance.

It is finally worth mentioning that a related noncoherent multiuser massive MIMO system was designed in [41] for differential phase shift keying (DPSK) constellations. The transmitted information of all the users is modulated on the phase offset between successive symbols. In fact, the DBPSK and the DQPSK constellations with optimal scale between every sub-constellation are the special case of our QAMD. However, for larger constellations such as 8-DPSK, our design has greater normalized minimal Euclidean distance. The resulting sum-constellation of two 8-DQPSK is not a regular constellation anymore, just as studied in [42]. Also, in[41], the actual transmitted power of each user is not given explicitly, and hence, the optimal power allocation under both the average and the peak power constraint case is hard to evaluate. To make a comparison, especially when the constellation size is large, we compare the 8-DPSK constellation suggested in [41] with the optimal scale 1.765 between the two sub-constellations with the rectangular 8-QAM constellation in our case. The error performance of [41] and our proposed design with two users, using 8-DPSK and 8-QAM respectively, is studied in Fig. LABEL:fig:MLvshanzo. It can be observed that our scheme with 8-QAM sub-constellation has a better error performance than [41] with 8-DPSK constellation, since the normalized minimal distance for our constellation is larger. Also, it should be pointed out that the resulting sum-constellation in [41] is not a regular constellation and it must be either computed or stored in advance. The detection of the sum-constellation typically requires a exhaustive search over the whole constellation. In addition, the optimal power scale for general DPSK needs to be optimized by numerical methods. In contract, our design leads to a regular QAM sum-constellations. Furthermore, the optimal transmit powers of all users and the sub-constellation assignment among them have been provided in closed-form.

V Conclusions

In this paper, a non-orthogonal and noncoherent massive MIMO (nn-mMIMO) framework towards enabling scalable URLLC applications has been developed based on a new uniquely-factorable multiuser space-time modulation (UF-MUSTM) scheme. For the MUSTM code design, a simple yet systematic construction method based on the concept of QAM division has been devised. Assuming that the large scale fading coefficients are known at the base station, the detailed transmission scheme and the corresponding noncoherent detector have been carefully designed. We further optimized the proposed design framework by jointly optimizing the constellations of multiple users. Specifically, we implemented a max-min Kullback-Leibler (KL) divergence-based design criterion, based on which we jointly optimize the transmitted powers of all users and the sub-constellation assignment among them. Simulations demonstrated that the optimized nn-mMIMO framework has better reliability performance compared to the state-of-the-art benchmarking schemes.

Appendix

-A Proof of Proposition 1

We first show the sufficiency of Proposition 1 for the considered massive MIMO system with unlimited number of antennas. By Assumption 1 on channel statistics and the central limit theory, we have limM𝐆H𝐆M=𝐈K\lim_{M\to\infty}\frac{\mathbf{G}^{H}\mathbf{G}}{M}=\mathbf{I}_{K} and limM𝚵H𝚵M=σ2𝐈T\lim_{M\to\infty}\frac{\mathbf{\Xi}^{H}\mathbf{\Xi}}{M}=\sigma^{2}\mathbf{I}_{T}. Now, the receiver can employ a simple correlation-based detector by calculating 𝐑M=𝐘H𝐘M\mathbf{R}_{M}=\frac{\mathbf{Y}^{H}\mathbf{Y}}{M}. When the antenna array size goes to infinity, we have limM𝐑Mσ2𝐈T=𝐑\lim_{M\to\infty}\mathbf{R}_{M}-\sigma^{2}\mathbf{I}_{T}=\mathbf{R}, where 𝐑{\mathbf{R}} is a T×TT\times T Hermitian positive semidefinite matrix such that 𝐑=𝐗TH𝐃𝐗T\mathbf{R}=\mathbf{X}_{T}^{H}\mathbf{D}\mathbf{X}_{T}. Now, 𝐗T\mathbf{X}_{T} can be uniquely determined by an exhaustive search since for any 𝐗T,𝐗~TK×T\mathbf{X}_{T},\widetilde{\mathbf{X}}_{T}\in{\mathcal{M}}_{K\times T} with 𝐗TH𝐃𝐗T=𝐗~TH𝐃𝐗~T\mathbf{X}_{T}^{H}\mathbf{D}\mathbf{X}_{T}=\widetilde{\mathbf{X}}_{T}^{H}\mathbf{D}\widetilde{\mathbf{X}}_{T}, we have 𝐗T=𝐗~T{\mathbf{X}}_{T}=\widetilde{\mathbf{X}}_{T}.

Next, we show the necessity of Proposition 1. Suppose that there exist 𝐗T,𝐗~TK×T\mathbf{X}_{T},\widetilde{\mathbf{X}}_{T}\in{\mathcal{M}}_{K\times T} such that 𝐗T𝐗~T{\mathbf{X}}_{T}\neq\widetilde{\mathbf{X}}_{T} for 𝐗TH𝐃𝐗T=𝐗~TH𝐃𝐗~T\mathbf{X}_{T}^{H}\mathbf{D}\mathbf{X}_{T}=\widetilde{\mathbf{X}}_{T}^{H}\mathbf{D}\widetilde{\mathbf{X}}_{T}. As a consequence, 𝐗T{\mathbf{X}}_{T} and 𝐗~T\widetilde{\mathbf{X}}_{T} will have exactly the same likelihood function as shown in Eq. (2), and hence they are indistinguishable by the ML detector where reliable recovery of the transmitted signals can not be guaranteed. This finish the proof of Proposition 1. \Box

-B Proof of Proposition 2

Let 𝐗2=𝐃1/2𝐒2{\mathbf{X}}_{2}=\mathbf{D}^{-1/2}{\mathbf{S}}_{2} and 𝐗~2=𝐃1/2𝐒~2\widetilde{\mathbf{X}}_{2}=\mathbf{D}^{-1/2}\widetilde{\mathbf{S}}_{2}. Then, if 𝐗2H𝐃𝐗2=𝐗~2H𝐃𝐗~2{\mathbf{X}}_{2}^{H}{\mathbf{D}}{\mathbf{X}}_{2}=\widetilde{\mathbf{X}}_{2}^{H}{\mathbf{D}}\widetilde{\mathbf{X}}_{2}, and note that 𝚷H𝚷=𝐈M\mathbf{\Pi}^{H}\mathbf{\Pi}=\mathbf{I}_{M}, we have 𝐒2H𝐒2=𝐒~2H𝐒~2{\mathbf{S}}_{2}^{H}{\mathbf{S}}_{2}=\widetilde{\mathbf{S}}_{2}^{H}\widetilde{\mathbf{S}}_{2}. As a consequence, we have k=1Nsk=k=1Ks~k\sum_{k=1}^{N}s_{k}=\sum_{k=1}^{K}\tilde{s}_{k}, where sk,s~k𝒳ks_{k},\tilde{s}_{k}\in\mathcal{X}_{k}. Since {𝒳k}k=1K\{{\mathcal{X}}_{k}\}_{k=1}^{K} form a UDCG, by Lemma 1, we can attain sk=s~ks_{k}=\tilde{s}_{k}, or equivalently, 𝐒2=𝐒~2\mathbf{S}_{2}=\tilde{\mathbf{S}}_{2} and now we have 𝐗2=𝐗~2{\mathbf{X}}_{2}=\widetilde{\mathbf{X}}_{2}.

This completes the proof of Proposition 2. \Box

-C Proof of Lemma 2

Let m=argmink=1,2,,N{akbπ(k)}=argmink{akbk}m=\arg\min_{k=1,2,\ldots,N}\big{\{}\frac{a_{k}}{b_{\pi^{*}(k)}}\big{\}}=\arg\min_{k}\big{\{}\frac{a_{k}}{b_{k}}\big{\}}. In other words, mm is the index such that qm=ambm=mink=1,2,,N{akbk}q_{m}=\frac{a_{m}}{b_{m}}=\min_{k=1,2,\ldots,N}\big{\{}\frac{a_{k}}{b_{k}}\big{\}}. Now, we want to show that qm=max(π(1),π(2),,π(N))𝒰mink=1,2,,N{akbπ(k)}q_{m}=\max_{(\pi(1),\pi(2),\ldots,\pi(N))\in\mathcal{U}}\min_{k=1,2,\cdots,N}\big{\{}\frac{a_{k}}{b_{\pi(k)}}\big{\}}. To that end, we divide 𝒰\mathcal{U} into two mutually exclusive subsets, i.e., 𝒫={(π(1),π(2),,π(N))|π(m)m}\mathcal{P}=\{(\pi(1),\pi(2),\ldots,\pi(N))|\pi(m)\neq m\} and 𝒰𝒫={(π(1),π(2),,π(N))|π(m)=m}\mathcal{U}\setminus\mathcal{P}=\{(\pi(1),\pi(2),\ldots,\pi(N))|\pi(m)=m\}. Consider the following cases:

  • (π(1),π(2),,π(N))𝒫(\pi^{\prime}(1),\pi^{\prime}(2),\ldots,\pi^{\prime}(N))\in\mathcal{P}. In this case, there exists an m\ell\neq m such that π()=m\pi^{\prime}(\ell)=m and hence bπ()=bmb_{\pi^{\prime}(\ell)}=b_{m}. If <m\ell<m, then, we have abπ()=abmambm=qm\frac{a_{\ell}}{b_{\pi^{\prime}(\ell)}}=\frac{a_{\ell}}{b_{m}}\leq\frac{a_{m}}{b_{m}}=q_{m}. If >m\ell>m, there exits an nmn\leq m such that π(n)>m\pi^{\prime}(n)>m by the property of permutation. Then, we have anbπ(n)ambπ(n)ambm=qm\frac{a_{n}}{b_{\pi^{\prime}(n)}}\leq\frac{a_{m}}{b_{\pi^{\prime}(n)}}\leq\frac{a_{m}}{b_{m}}=q_{m}. Therefore, we conclude mink=1,2,,N{akbπ(k)}qm\min_{k=1,2,\ldots,N}\big{\{}\frac{a_{k}}{b_{\pi^{\prime}(k)}}\big{\}}\leq q_{m} for any (π(1),π(2),,π(N))𝒫(\pi^{\prime}(1),\pi^{\prime}(2),\ldots,\pi^{\prime}(N))\in\mathcal{P}. Or equivalently, max(π(1),π(2),,π(N))𝒫mink=1,2,,N{akbπ(k)}qm\max_{(\pi(1),\pi(2),\ldots,\pi(N))\in\mathcal{P}}\min_{k=1,2,\cdots,N}\big{\{}\frac{a_{k}}{b_{\pi(k)}}\big{\}}\leq q_{m}.

  • (π(1),π(2),,π(N))𝒰𝒫(\pi^{\prime}(1),\pi^{\prime}(2),\ldots,\pi^{\prime}(N))\in\mathcal{U}\setminus\mathcal{P}. In this case, π(m)=m\pi^{\prime}(m)=m and hence, we have mink=1,2,,N{akbπ(k)}ambπ(m)=ambm=qm\min_{k=1,2,\cdots,N}\big{\{}\frac{a_{k}}{b_{\pi^{\prime}(k)}}\big{\}}\leq\frac{a_{m}}{b_{\pi^{\prime}(m)}}=\frac{a_{m}}{b_{m}}=q_{m}. Therefore, max(π(1),π(2),,π(N))𝒰𝒫mink=1,2,,N{akbπ(k)}qm\max_{(\pi(1),\pi(2),\cdots,\pi(N))\in\mathcal{U}\setminus\mathcal{P}}\min_{k=1,2,\cdots,N}\big{\{}\frac{a_{k}}{b_{\pi(k)}}\big{\}}\leq q_{m}.

In conclusion, we have maxπ𝒰mink=1,2,,N{akbπ(k)}qm\max_{\pi\in\mathcal{U}}\min_{k=1,2,\cdots,N}\big{\{}\frac{a_{k}}{b_{\pi(k)}}\big{\}}\leq q_{m}. In the following, we aim to prove that the equality is achievable for certain (π(1),π(2),,π(K))(\pi(1),\pi(2),\ldots,\pi(K)). By setting (π(1),π(2),,π(N))=(π(1),π(2),,π(N))(\pi(1),\pi(2),\cdots,\pi(N))=(\pi^{*}(1),\pi^{*}(2),\ldots,\pi^{*}(N)) and then, from the construction process above, we can find that for the given sequences a1a2aNa_{1}\leq a_{2}\leq\cdots\leq a_{N} and b1b2bNb_{1}\leq b_{2}\leq\cdots\leq b_{N}, mink=1,2,,N{akbπ(k)}=ambm=qm\min_{k=1,2,\cdots,N}\big{\{}\frac{a_{k}}{b_{\pi^{*}(k)}}\big{\}}=\frac{a_{m}}{b_{m}}=q_{m}. Hence, the equality is achievable for (π(1),π(2),,π(N))(\pi^{*}(1),\pi^{*}(2),\cdots,\pi^{*}(N)). This completes the proof.  \Box

References

  • [1] Z. Dong, H. Chen, J. Zhang, and B. Vucetic, “Noncoherent multiuser massive SIMO for low-latency industrial IoT communications,” in 2019 IEEE International Conference on Industrial Cyber Physical Systems (ICPS), pp. 442–447, May 2019.
  • [2] Nokia, “5G use cases and requirements.” https://www.ramonmillan.com/documentos/bibliografia/5GUseCases_Nokia.pdf. Accessed 17 Dec. 2019.
  • [3] Z. Dawy, W. Saad, A. Ghosh, J. G. Andrews, and E. Yaacoub, “Toward massive machine type cellular communications,” IEEE Wireless Communications, vol. 24, pp. 120–128, February 2017.
  • [4] D. Soldani, Y. J. Guo, B. Barani, P. Mogensen, C. I, and S. K. Das, “5G for ultra-reliable low-latency communications,” IEEE Network, vol. 32, pp. 6–7, March 2018.
  • [5] W. Saad, M. Bennis, and M. Chen, “A vision of 6g wireless systems: Applications, trends, technologies, and open research problems,” CoRR, vol. abs/1902.10265, 2019.
  • [6] G. Durisi, T. Koch, and P. Popovski, “Toward massive, ultrareliable, and low-latency wireless communication with short packets,” Proceedings of the IEEE, vol. 104, pp. 1711–1726, Sep. 2016.
  • [7] P. Popovski, J. J. Nielsen, C. Stefanovic, E. d. Carvalho, E. Strom, K. F. Trillingsgaard, A. Bana, D. M. Kim, R. Kotaba, J. Park, and R. B. Sorensen, “Wireless access for ultra-reliable low-latency communication: Principles and building blocks,” IEEE Netw., vol. 32, pp. 16–23, March 2018.
  • [8] H. Ji, S. Park, J. Yeo, Y. Kim, J. Lee, and B. Shim, “Ultra-reliable and low-latency communications in 5G downlink: Physical layer aspects,” IEEE Wireless Communications, vol. 25, pp. 124–130, JUNE 2018.
  • [9] M. Bennis, M. Debbah, and H. V. Poor, “Ultrareliable and low-latency wireless communication: Tail, risk, and scale,” Proceedings of the IEEE, vol. 106, pp. 1834–1853, Oct 2018.
  • [10] H. Chen, R. Abbas, P. Cheng, M. Shirvanimoghaddam, W. Hardjawana, W. Bao, Y. Li, and B. Vucetic, “Ultra-reliable low latency cellular networks: Use cases, challenges and approaches,” IEEE Commun. Mag., 2018.
  • [11] D. N. C. Tse and P. Viswanath, Fundamentals of Wireless Communications. Cambridge Univ. Press, 2005.
  • [12] ACMA, “The internet of things and the ACMA’s areas of focus emerging issues in media and communications occasional paper,” Nov. 2015.
  • [13] L. Zheng and D. Tse, “Diversity and multiplexing: a fundamental tradeoff in multiple-antenna channels,” IEEE Trans. Inf. Theory, vol. 49, pp. 1073–1096, May 2003.
  • [14] B. M. Hochwald and T. L. Marzetta, “Unitary space-time modulation for multiple-antenna communications in Rayleigh flat fading,” IEEE Trans. Inf. Theory, vol. 46, pp. 543–564, March 2000.
  • [15] T. L. Marzetta, “Noncooperative cellular wireless with unlimited numbers of base station antennas,” IEEE Trans. Wireless Commun., vol. 9, pp. 3590–3600, Nov. 2010.
  • [16] J. G. Andrews, S. Buzzi, W. Choi, S. V. Hanly, A. Lozano, A. C. K. Soong, and J. C. Zhang, “What will 5G be?,” IEEE J. Sel. Areas Commun., vol. 32, pp. 1065–1082, Jun. 2014.
  • [17] F. Boccardi, R. W. Heath, A. Lozano, T. L. Marzetta, and P. Popovski, “Five disruptive technology directions for 5G,” IEEE Commun. Mag., vol. 52, pp. 74–80, Feb. 2014.
  • [18] L. Lu, G. Li, A. Swindlehurst, A. Ashikhmin, and R. Zhang, “An overview of massive MIMO: Benefits and challenges,” IEEE J. Sel. Topics Signal Process., vol. 8, pp. 742–758, Oct. 2014.
  • [19] G. Durisi, T. Koch, and P. Popovski, “Toward massive, ultrareliable, and low-latency wireless communication with short packets,” Proc. IEEE, vol. 104, pp. 1711–1726, Sept. 2016.
  • [20] J. Östman, G. Durisi, E. G. Ström, M. C. Coskun, and G. Liva, “Short packets over block-memoryless fading channels: Pilot-assisted or noncoherent transmission?,” CoRR, vol. abs/1712.06387, 2017.
  • [21] A. Manolakos, M. Chowdhury, and A. Goldsmith, “Energy-based modulation for noncoherent massive SIMO systems,” IEEE Trans. Wireless Commun., vol. 15, pp. 7831–7846, Nov 2016.
  • [22] L. Jing, E. D. Carvalho, P. Popovski, and À. O. Martínez, “Design and performance analysis of noncoherent detection systems with massive receiver arrays,” IEEE Trans. Signal Process., vol. 64, pp. 5000–5010, Oct 2016.
  • [23] H. Xie, W. Xu, W. Xiang, K. Shao, and S. Xu, “Non-coherent massive SIMO systems in ISI channels: Constellation design and performance analysis,” IEEE Systems Journal, vol. 13, Sep. 2019.
  • [24] X. Gao, J. Zhang, H. Chen, Z. Dong, and B. Vucetic, “Energy-efficient and low-latency massive SIMO using noncoherent ML detection for industrial IoT communications,” IEEE Internet Things J., pp. 1–1, 2018.
  • [25] L. Dai, B. Wang, Z. Ding, Z. Wang, S. Chen, and L. Hanzo, “A survey of non-orthogonal multiple access for 5G,” IEEE Communications Surveys Tutorials, vol. 20, pp. 2294–2323, thirdquarter 2018.
  • [26] M. Chowdhury, A. Manolakos, and A. Goldsmith, “Scaling laws for noncoherent energy-based communications in the SIMO MAC,” IEEE Trans. Inf. Theory, vol. 62, pp. 1980–1992, April 2016.
  • [27] Y. Zhang, J. Zhang, and H. Yu, “Physically securing energy-based massive MIMO MAC via joint alignment of multi-user constellations and artificial noise,” IEEE Journal on Selected Areas in Communications, vol. 36, pp. 829–844, April 2018.
  • [28] W. Xu, H. Xie, and H. Q. Ngo, “Non-coherent massive MIMO systems: A constellation design approach,” in ICC 2019 - 2019 IEEE International Conference on Communications (ICC), pp. 1–6, May 2019.
  • [29] H. Chen, Z. Dong, and B. Vucetic, “Noncoherent and non-orthogonal massive SIMO for critical industrial IoT communications,” in 2019 IEEE International Conference on Industrial Cyber Physical Systems (ICPS), pp. 436–441, May 2019.
  • [30] M. Brehler and M. K. Varanasi, “Asymptotic error probability analysis of quadratic receivers in rayleigh-fading channels with applications to a unified analysis of coherent and noncoherent space-time receivers,” IEEE Trans. Inf. Theory, vol. 47, pp. 2383–2399, Sep 2001.
  • [31] M. J. Borran, A. Sabharwal, and B. Aazhang, “On design criteria and construction of noncoherent space-time constellations,” IEEE Trans. Inf. Theory, vol. 49, pp. 2332–2351, Oct 2003.
  • [32] J.-K. Zhang, F. Huang, and S. Ma, “Full diversity blind space-time block codes,” IEEE Trans. Inf. Theory, vol. 57, pp. 6109–6133, Sept 2011.
  • [33] K. B. Petersen and M. S. Pedersen, The Matrix Cookbook. Technical University of Denmark, Nov. 2012.
  • [34] D. Warrier and U. Madhow, “Spectrally efficient noncoherent communication,” IEEE Trans. Inf. Theory, vol. 48, pp. 651–668, March 2002.
  • [35] K. L. Clarkson, W. Sweldens, and A. Zheng, “Fast multiple-antenna differential decoding,” IEEE Trans. Commun., vol. 49, pp. 253–261, Feb 2001.
  • [36] Z. Dong, Y. Y. Zhang, J. K. Zhang, and X. Gao, “Quadrature amplitude modulation division for multiuser MISO broadcast channels,” IEEE J. Sel. Topics Signal Process., vol. 10, pp. 1551–1566, Dec. 2016.
  • [37] Z. Dong, J. Zhang, and L. Huang, “Multi-users space-time modulation with qam division for massive uplink communications,” in 2017 IEEE International Symposium on Information Theory (ISIT), pp. 1087–1091, June 2017.
  • [38] R. W. Yeung, Information Theory and Network Coding. Springer, 2008.
  • [39] A. Goldsmith, Wireless Communications. Cambridge Univ. Press, 2005.
  • [40] M. Biguesh and A. B. Gershman, “Training-based MIMO channel estimation: a study of estimator tradeoffs and optimal training signals,” IEEE Trans. Signal Process., vol. 54, pp. 884–893, Mar. 2006.
  • [41] A. G. Armada and L. Hanzo, “A non-coherent multi-user large scale SIMO system relaying on M-ary DPSK,” in In Proc. IEEE ICC’ 15, pp. 2517–2522, Jun. 2015.
  • [42] J. Harshan and B. Rajan, “On two-user Gaussian multiple access channels with finite input constellations,” IEEE Trans. Inf. Theory, vol. 57, pp. 1299–1327, Mar. 2011.