This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Joint Data Association, NLOS Mitigation, and Clutter Suppression for Networked Device-Free Sensing in 6G Cellular Network

Abstract

Recently, there is a growing interest in achieving integrated sensing and communication (ISAC) in the sixth-generation (6G) cellular network. Inspired by this trend and the success of cooperative communication in cloud radio access network, this paper considers a networked device-free sensing architecture based on base station (BS) cooperation to transform the cellular network into a huge sensor that can provide ubiquitous and high-performance sensing services. Under this framework, the BSs first transmit the downlink communication signals to the mobile users and then estimate the range information of the targets based on their echoes. Next, a central processor collects the range information from all the BSs via the fronthaul links and localizes each target based on its distances to various BSs. To enable the above strategy in the 6G network, we will perform joint data association, non-line-of-sight (NLOS) mitigation, and clutter suppression, such that the central processor is able to find out the useful range estimations extracted from the line-of-sight (LOS) paths and match them to the right targets for localization. Numerical results show that our interested networked device-free sensing scheme for the 6G network can localize the targets with high accuracy in the challenging multi-path propagation environment.

Index Terms—  Integrated sensing and communication (ISAC), networked sensing, 6G, data association, non-line-of-sight (NLOS) mitigation, clutter suppression.

1 Introduction

Thanks to the wide bandwidth at the millimeter wave/Terahertz band and the large antenna array brought by the massive multiple-input multiple-output (MIMO) technique, the cellular network tends to be capable of sensing the environment via the communication signals with ultra-high range and angle resolution, similar to the radar systems. Hence, there is a recent trend in both the academia and the industry to achieve integrated sensing and communication (ISAC) in the sixth-generation (6G) cellular network, where the base stations (BSs) can employ a common wireless signal for conveying information to the mobile users and localizing the targets simultaneously [1, 2, 3, 4, 5, 6, 7, 8, 9]. It is anticipated that the 6G-enabled ISAC technique will play an important role in an enormous number of newly emerging applications from smart transportation systems, smart factories, etc., where both the sensing function and the communication function are of paramount significance.

In the literature of the ISAC technology, the performance trade-off between the capacity in communication and the estimation distortion in sensing have been optimized in various works [10, 11, 12, 13], because the optimal waveforms for the communication signals and the sensing signals are quite different [14]. Apart from the performance optimization, several interesting works have been done to design the practical signal processing techniques for embedding the sensing function into the 6G cellular network. For example, efficient algorithms have been proposed such that a BS can extract the range/angle/Doppler information of the targets based on the orthogonal frequency division multiplexing (OFDM) signals [15, 16], the orthogonal frequency time space (OFTS) signals [17], and the millimeter wave signals [18], that are reflected by these targets. Moreover, [19, 20] have devised powerful estimation schemes such that a mobile user can utilize the cellular signals for realizing simultaneous localization and mapping (SLAM).

Refer to caption
Fig. 1: System model of our considered networked device-free sensing architecture. The BSs are connected to the central processor via fronthaul links to share the range estimations. For wireless propagation, there are LOS paths (e.g., the path from BS 11 to Target 11 to BS 22), NLOS paths (e.g., the path from BS 11 to the building to Target 22 back to BS 11), and the paths arising from the clutters (e.g., the path from BS 11 to the building to BS 33).

It is worth noting that the above works mainly consider the scenario where localization is performed with one transmitter and one collocated/separate receiver, as in the monostatic/bistatic radar systems. Inspired by the cloud radio access network where the BSs can collaborate with each other to mitigate the inter-cell interference, our recent work [21] proposed a novel networked device-free sensing architecture, as shown in Fig. 1. Specifically, all the BSs in a certain area first emit the OFDM signals in the downlink, then estimate the range information of all the targets based on their echoes, and at last send their range estimations to a central processor via the fronthaul links. Next, the central processor can localize each target based on its distances to various BSs. As pointed out by [21], one main challenge of the above scheme lies in data association, i.e., how to match the range information in each received echo to the right target. Under the line-of-sight (LOS) propagation environment, an efficient data association algorithm was proposed in [21] to enable networked device-free sensing.

In this paper, we generalize our results in [21] to a more practical but also more challenging multi-path propagation environment [22, 23], where besides the LOS paths, non-line-of-sight (NLOS) paths and paths arising from clutters may exist as well among the BSs and the targets, as shown in Fig. 1. Under the two-phase networked device-free sensing protocol, we design an efficient range estimation algorithm based on the OFDM channel estimation technique in Phase I, and perform joint data association, NLOS mitigation, and clutter suppression in Phase II. After the useful range estimations from the LOS paths are identified and each of them is matched to the right target, we can localize these targets accurately. Numerical results verify that our proposed scheme can achieve very high localization accuracy with low complexity.

2 System Model

In this paper, we consider a 6G-enabled ISAC system consisting of MM BSs, KK targets to be localized (the value of KK is unknown and needs to be estimated), and II users for communication. Since the communication technology is very mature in the cellular network, we mainly focus on the sensing function in this ISAC system. Let (am,bm)(a_{m},b_{m}) and (xk,yk)(x_{k},y_{k}) denote the 2D coordinates of the mm-th BS and the kk-th target, respectively, m=1,,Mm=1,\ldots,M, k=1,,Kk=1,\ldots,K. Then, the distance between the mm-th BS and the kk-th target is given by

dm,k\displaystyle d_{m,k} =f(xk,yk,am,bm)\displaystyle=f(x_{k},y_{k},a_{m},b_{m})
=(amxk)2+(bmyk)2,m,k.\displaystyle=\sqrt{(a_{m}-x_{k})^{2}+(b_{m}-y_{k})^{2}},~{}\forall m,k. (1)

Moreover, the sum of the distance between the uu-th BS and the kk-th target and that between the kk-th target and the mm-th BS is

du,m,k=du,k+dm,k,u,m,k.\displaystyle d_{u,m,k}=d_{u,k}+d_{m,k},~{}\forall u,m,k. (2)

In the downlink, the BSs will transmit the OFDM signals to the information receivers, while these signals can be reflected by the targets to different BSs as well. Based on the propagation delay from BS uu to target kk to BS mm, we can estimate dm,kd_{m,k} if u=mu=m and du,m,kd_{u,m,k} if umu\neq m. Then, each target can be localized based on its estimated ranges to various BSs.

Specifically, let 𝒔m=[sm,1,,sm,N]T\boldsymbol{s}_{m}=[s_{m,1},\ldots,s_{m,N}]^{T} denote one frequency-domain OFDM symbol at the mm-th BS, m\forall m, where sm,ns_{m,n} is the signal at the nn-th sub-carrier and NN is the number of sub-carriers. Then, the time-domain modulated signal of BS mm over one OFDM symbol consisting of NN samples is given by 𝝌m=[χm,1,,χm,N]T=p𝑾H𝒔m\boldsymbol{\chi}_{m}=[\chi_{m,1},...,\chi_{m,N}]^{T}=\sqrt{p}\boldsymbol{W}^{H}\boldsymbol{s}_{m}, m\forall m, where pp denotes the common transmit power at the BSs, and 𝑾N×N\boldsymbol{W}\in\mathbb{C}^{N\times N} denotes the discrete Fourier transform (DFT) matrix with 𝑾𝑾H=𝑾H𝑾=𝑰\boldsymbol{W}\boldsymbol{W}^{H}=\boldsymbol{W}^{H}\boldsymbol{W}=\boldsymbol{I}. After inserting the cyclic prefix (CP) consisting of QQ OFDM samples, the time-domain signal transmitted by BS mm over one OFDM symbol period is given by 𝝌¯m=[χ¯m,Q,,χ¯m,1,χ¯m,0,,χ¯m,N1]\bar{\boldsymbol{\chi}}_{m}=[\bar{\chi}_{m,-Q},\ldots,\bar{\chi}_{m,-1},\bar{\chi}_{m,0},\ldots,\bar{\chi}_{m,N-1}], where if n>0n>0, χ¯m,n=χm,n+1\bar{\chi}_{m,n}=\chi_{m,n+1} denotes the useful signal, and if n0n\leq 0, χ¯m,n=χm,N+n+1\bar{\chi}_{m,n}=\chi_{m,N+n+1} denotes the CP.

Define 𝒉u,m=[hu,m,1,,hu,m,L]T\boldsymbol{h}_{u,m}=[h_{u,m,1},\ldots,h_{u,m,L}]^{T} as the LL-tap multi-path channel from BS uu to BS mm, where hu,m,lh_{u,m,l} denotes the complex channel coefficient of the path with a delay of ll OFDM sample periods. Then, the received signal at the mm-th BS in the nn-th OFDM sample period can be expressed as

ym,n=u=1Ml=1Lhu,m,lχ¯u,nl+zm,n,m,n,\displaystyle y_{m,n}=\sum_{u=1}^{M}\sum_{l=1}^{L}h_{u,m,l}\bar{\chi}_{u,n-l}+z_{m,n},~{}\forall m,n, (3)

where LL denotes the maximum number of resolvable paths and zm,n𝒞𝒩(0,σz2)z_{m,n}\sim\mathcal{CN}(0,\sigma_{z}^{2}) denotes the noise at the mm-th BS in the nn-th OFDM sample period. Note that each BS mm can potentially receive the signals transmitted by BS uu via three types of paths - Type I path: the LOS path from BS uu to some target to BS mm; Type II path: the NLOS path from BS uu to BS mm via some target and some other reflector/scatter; Type III path: the path from BS uu to some clutter to BS mm. Thereby, in (3), hu,m,l0h_{u,m,l}\neq 0 indicates that there exists a Type I/II/III path from BS uu to BS mm, whose propagation delay is of ll OFDM sample periods; and hu,m,l=0h_{u,m,l}=0 otherwise. Note that if hu,m,l0h_{u,m,l}\neq 0 is contributed by a Type I path from BS uu to some target kk to BS mm, then du,m,k/c0d_{u,m,k}/c_{0} is equal to ll OFDM sample periods, where c0c_{0} is the speed of the light. Therefore, the range information about the targets can be obtained by estimating the time-domain OFDM channels.

Based on the above observation, in this paper, we adopt a two-phase networked device-free sensing protocol [21]. Specifically, in Phase I, each BS mm estimates the time-domain OFDM channels, obtains the propagation delay information of each of its received signals based on the estimated channels, and send its delay (thus range) information to a central processor. However, the central processor does not know which ranges are obtained from the Type I paths that are useful for localization. Moreover, if a range is estimated from a Type I path, it is a challenging job to match the range of this path to the right target that reflects the signal on this path, as shown in [21]. In Phase II, the central processor thus needs to perform joint data association, NLOS mitigation, clutter suppression so as to identify the signals from the Type I paths that are useful for estimating du,m,kd_{u,m,k}’s and match the range estimations of du,m,kd_{u,m,k}’s to the right targets. Then, the number of the targets, i.e., KK, can be estimated, and each of the KK targets can be efficiently localized based on its distances to various BSs. In the following two sections, we show the details about Phase I and Phase II under the above protocol.

3 Phase I: Range Estimation

In this section, we show how to perform range estimation in Phase I of our considered two-phase localization protocol. It can be shown that the frequency-domain signal received at BS mm can be expressed as [24, 21]

𝒚¯m=pu=1Mdiag(𝒔u)𝑮𝒉u,m+𝒛¯m=p𝑮~𝒉m+𝒛¯m,m,\displaystyle\bar{\boldsymbol{y}}_{m}\!=\!\sqrt{p}\sum_{u=1}^{M}\mathrm{diag}(\boldsymbol{s}_{u})\boldsymbol{G}\boldsymbol{h}_{u,m}\!+\!\bar{\boldsymbol{z}}_{m}=\sqrt{p}\tilde{\boldsymbol{G}}\boldsymbol{h}_{m}\!+\!\bar{\boldsymbol{z}}_{m},~{}\forall m, (4)

where 𝒉m=[𝒉1,m,,𝒉M,m]T\boldsymbol{h}_{m}=[\boldsymbol{h}_{1,m},\ldots,\boldsymbol{h}_{M,m}]^{T}, 𝑮N×L\boldsymbol{G}\in\mathbb{C}^{N\times L} with the (n,l)(n,l)-th element being Gn,l=ej2π(n1)(l1)NG_{n,l}=e^{\frac{-j2\pi(n-1)(l-1)}{N}}, 𝑮~=[diag(𝒔1)𝑮,,\tilde{\boldsymbol{G}}=[\mathrm{diag}(\boldsymbol{s}_{1})\boldsymbol{G},\ldots, diag(𝒔M)𝑮]\mathrm{diag}(\boldsymbol{s}_{M})\boldsymbol{G}], and 𝒛¯m=𝑾𝒛m𝒞𝒩(0,σz2𝑰)\bar{\boldsymbol{z}}_{m}=\boldsymbol{W}\boldsymbol{z}_{m}\sim\mathcal{CN}(0,\sigma_{z}^{2}\boldsymbol{I}).

In this paper, we assume that all the BSs know 𝒔1,,𝒔M\boldsymbol{s}_{1},\ldots,\boldsymbol{s}_{M} sent by the BSs. For example, in the channel estimation phase for communication, 𝒔m\boldsymbol{s}_{m}’s are pilot signals and can be known by all the BSs. In the data transmission phase, the BSs can exchange the messages 𝒔m\boldsymbol{s}_{m}’s with each other over the fronthaul links as in cloud radio access network. Hence, 𝑮~\tilde{\boldsymbol{G}} in (4) is known by all the BSs. Moreover, due to the limited number of targets, scatters, and clutters, very few elements in 𝒉m\boldsymbol{h}_{m}’s are non-zero, i.e., 𝒉m\boldsymbol{h}_{m} is a sparse channel vector, m\forall m. This motivates us to utilize the LASSO technique to estimate the time-domain channels by solving the following problem [25]

minimize𝒉m12𝒚¯mp𝑮~𝒉m22+λ𝒉m1,\displaystyle\underset{{\boldsymbol{h}_{m}}}{\text{minimize}}~{}\frac{1}{2}\|\boldsymbol{\bar{y}}_{m}-\sqrt{p}\tilde{\boldsymbol{G}}\boldsymbol{h}_{m}\|_{2}^{2}+\lambda\|\boldsymbol{h}_{m}\|_{1}, (5)

where λ\lambda is a constant to control the sparsity of each 𝒉m\boldsymbol{h}_{m}. The above problem is convex and can be solved efficiently using CVX.

Let 𝒉¯m=[𝒉¯1,m,,𝒉¯M,m]T\bar{\boldsymbol{h}}_{m}=[\bar{\boldsymbol{h}}_{1,m},\ldots,\bar{\boldsymbol{h}}_{M,m}]^{T} denote the optimal solution to problem (5), where 𝒉¯u,m=[h¯u,m,1,,h¯u,m,1]T\bar{\boldsymbol{h}}_{u,m}=[\bar{h}_{u,m,1},\ldots,\bar{h}_{u,m,1}]^{T}, m,u=1,,Mm,u=1,\ldots,M. As discussed in Section 2, if h¯u,m,l0\bar{h}_{u,m,l}\neq 0 for some ll, then we claim that there exists a path from BS mm to BS uu whose propagation delay is of ll OFDM sample periods. In this case, we estimate the range of this path as follows [21]

r¯u,m,l=(l1)c0NΔf+c02NΔf,ifh¯u,m,l0,\bar{r}_{u,m,l}=\frac{(l-1)c_{0}}{N\Delta f}+\frac{c_{0}}{2N\Delta f},~{}{\rm if}~{}\bar{h}_{u,m,l}\neq 0, (6)

where Δf\Delta f (in Hz) denotes the OFDM sub-carrier spacing such that NΔfN\Delta f is the bandwidth. Based on the definitions of Type I, Type II, and Type III paths in Section 2, if h¯u,m,l0\bar{h}_{u,m,l}\neq 0, then r¯u,m,l\bar{r}_{u,m,l} in (6) satisfies

r¯u,m,l={du,m,ku,m,l+ϵu,m,ku,m,l,Type I pathdu,m,ku,m,l+ϵu,m,ku,m,l+ηu,m,l,Type II path,γ¯u,m,l,Type III path,\bar{r}_{u,m,l}=\left\{\begin{array}[]{ll}d_{u,m,k_{u,m,l}}+\epsilon_{u,m,k_{u,m,l}},&\text{Type I path}\\ d_{u,m,k_{u,m,l}}+\epsilon_{u,m,k_{u,m,l}}+\eta_{u,m,l},&\text{Type II path},\\ \bar{\gamma}_{u,m,l},&\text{Type III path},\end{array}\right. (7)

where ku,m,lk_{u,m,l} denotes the index of the target which reflects the signal from BS uu to BS mm with a delay of ll OFDM sample periods, ϵu,m,ku,m,l\epsilon_{u,m,k_{u,m,l}} denotes the error caused by the estimation shown in (6), ηu,m,l\eta_{u,m,l} denotes the bias introduce by the NLOS propagation, and γ¯u,m,l\bar{\gamma}_{u,m,l} denotes the estimated range of a Type III path with some clutter.

To summarize, after Phase I of our considered two-phase networked device-free sensing protocol, each BS mm will possess MM range estimation sets

𝒟u,m={r¯u,m,l|lwithh¯u,m,l0},u=1,,M.\displaystyle\mathcal{D}_{u,m}=\{\bar{r}_{u,m,l}|\forall l~{}{\rm with}~{}\bar{h}_{u,m,l}\neq 0\},~{}u=1,\cdots,M. (8)

Then, each BS mm will transmit the above MM range sets to the central processor via the fronthaul links. Note that 𝒟u,m\mathcal{D}_{u,m} contains the range information for all the paths (Types I, II, and III) from BS uu to BS mm. However, for each element in 𝒟u,m\mathcal{D}_{u,m}, we do not know whether it is the range of a Type I path, a Type II path, or a Type III path. Moreover, even if r¯u,m,l\bar{r}_{u,m,l} is identified to be the range estimation associated with a Type I path from BS uu to BS mm, we do not know whether r¯u,m,l\bar{r}_{u,m,l} is an estimation of du,m,1d_{u,m,1}, \ldots, or du,m,Kd_{u,m,K}. Therefore, data association, NLOS mitigation, and clutter suppression should be jointly conducted by the central processor to localize the targets in Phase II of our considered protocol.

4 Phase II: Joint Data Association, NLOS Mitigation, and Clutter Suppression

With the knowledge about 𝒟u,m\mathcal{D}_{u,m}’s, u,m\forall u,m, the objectives of the central processor in Phase II are two-fold. First, it needs to estimate the number of targets in the network, i.e., KK. Second, it needs to estimate the coordinates of the KK targets, i.e., (xk,yk)(x_{k},y_{k}), k=1,,Kk=1,...,K. For convenience, given any set 𝒟\mathcal{D}, let 𝒟(g)\mathcal{D}(g) denote its gg-th largest element. Then, define gu,m,kg_{u,m,k} as an integer such that 𝒟u,m(gu,m,k)\mathcal{D}_{u,m}(g_{u,m,k}) is the range estimation of the LOS path from BS uu to target kk and then to BS mm, u,m,k\forall u,m,k. Moreover, define 𝒢k={gu,m,k,u,m}\mathcal{G}_{k}=\{g_{u,m,k},\forall u,m\} as the solution of data association, NLOS mitigation, and clutter suppression for target kk to all the MM BSs, k=1,,Kk=1,\ldots,K. If 𝒢1,,𝒢K\mathcal{G}_{1},\ldots,\mathcal{G}_{K} can be found out, then the number of the targets can be known as well by checking how many LOS estimations are matched to the targets. Further, given 𝒢k\mathcal{G}_{k}, the location of each target kk can be estimated based on its range information 𝒟u,m(gu,m,k)\mathcal{D}_{u,m}(g_{u,m,k})’s, u,m\forall u,m. In the following, we show how to estimate the number of the targets and their locations via a proper design of 𝒢1,,𝒢K\mathcal{G}_{1},\ldots,\mathcal{G}_{K}.

First, we define the conditions that a feasible solution of 𝒢1,,𝒢K\mathcal{G}_{1},\ldots,\mathcal{G}_{K} should satisfy. Note that given u,mu,m, the number of elements in the range set 𝒟u,m\mathcal{D}_{u,m} is denoted by its cardinality |𝒟u,m||\mathcal{D}_{u,m}|. Therefore, the elements in 𝒢1,,𝒢K\mathcal{G}_{1},\ldots,\mathcal{G}_{K} should satisfy

gu,m,k{1,2,,|𝒟u,m|},u,m,k.\displaystyle g_{u,m,k}\in\{1,2,\ldots,|\mathcal{D}_{u,m}|\},~{}\forall u,m,k. (9)

Moreover, if one range estimation in 𝒟u,m\mathcal{D}_{u,m} is matched to target kk, then it cannot be matched to another user k¯k\bar{k}\neq k, i.e.,

gu,m,kgu,m,k¯,ifk¯k,u,m.\displaystyle g_{u,m,k}\neq g_{u,m,\bar{k}},~{}{\rm if}~{}\bar{k}\neq k,~{}\forall u,m. (10)

Another condition that 𝒢1,,𝒢K\mathcal{G}_{1},\ldots,\mathcal{G}_{K} should satisfy arises from (2): the length of the LOS path from BS uu to target kk to BS mm, i.e., du,m,kd_{u,m,k}, is equal to the sum of the distance between BS uu and target kk, i.e., du,kd_{u,k}, and that between BS mm and target kk, i.e., dm,kd_{m,k}. Note that the imperfect estimations of du,m,kd_{u,m,k}, du,kd_{u,k}, and dm,kd_{m,k}’s are 𝒟u,m(gu,m,k)\mathcal{D}_{u,m}(g_{u,m,k}) (also 𝒟m,u(gm,u,k)\mathcal{D}_{m,u}(g_{m,u,k})), 𝒟u,u(gu,u,k)/2\mathcal{D}_{u,u}(g_{u,u,k})/2, and 𝒟m,m(gm,m,k)/2\mathcal{D}_{m,m}(g_{m,m,k})/2. Therefore, we set the following constraints for 𝒢1,,𝒢K\mathcal{G}_{1},\ldots,\mathcal{G}_{K}:

|𝒟u,u(gu,u,k)2+𝒟m,m(gm,m,k)2𝒟u,m(gu,m,k)|δ,\displaystyle\left|\frac{\mathcal{D}_{u,u}(g_{u,u,k})}{2}\!+\!\frac{\mathcal{D}_{m,m}(g_{m,m,k})}{2}\!-\!\mathcal{D}_{u,m}(g_{u,m,k})\right|\leq\delta, (11)
|𝒟u,u(gu,u,k)2+𝒟m,m(gm,m,k)2𝒟m,u(gm,u,k)|δ,m,u,k,\displaystyle\left|\frac{\mathcal{D}_{u,u}(g_{u,u,k})}{2}\!+\!\frac{\mathcal{D}_{m,m}(g_{m,m,k})}{2}\!-\!\mathcal{D}_{m,u}(g_{m,u,k})\right|\leq\delta,~{}\forall m,u,k, (12)

where δ>0\delta>0 is a given threshold. The last constraint about 𝒢1,,𝒢K\mathcal{G}_{1},\ldots,\mathcal{G}_{K} is on the localization residual associated with this solution about data association, NLOS mitigation, and clutter suppression. Specifically, given 𝒢k\mathcal{G}_{k}, the location of target kk is estimated by solving the following nonlinear least squared (NLS) problem

(P1)minimizexk,yku=1Mm=1M\displaystyle{\rm(P1)}~{}\mathop{\textup{minimize}}_{x_{k},y_{k}}~{}\sum\limits_{u=1}^{M}\sum\limits_{m=1}^{M} (f(xk,yk,au,bu)+f(xk,yk,am,bm)\displaystyle(f(x_{k},y_{k},a_{u},b_{u})+f(x_{k},y_{k},a_{m},b_{m})
𝒟u,m(gu,m,k))2,\displaystyle-\mathcal{D}_{u,m}(g_{u,m,k}))^{2},

where f(xk,yk,am,bm)f(x_{k},y_{k},a_{m},b_{m})’s are given in (1). Problem (P1) is a non-convex problem. We can adopt the Gauss-Newton method to solve it [26]. Given 𝒢k\mathcal{G}_{k} for target kk, define R(𝒢k)R(\mathcal{G}_{k}) as the value of problem (P1) achieved by the Gauss-Newton method. Therefore, R(𝒢k)R(\mathcal{G}_{k}) can be interpreted as the residual for localizing target kk given 𝒢k\mathcal{G}_{k}. If 𝒢k\mathcal{G}_{k} is the right solution, then the localization residual R(𝒢k)R(\mathcal{G}_{k}) should be small, k\forall k. We thus set the following residual constraints about 𝒢k\mathcal{G}_{k}’s:

R(𝒢k)β,k=1,,K,\displaystyle R(\mathcal{G}_{k})\leq\beta,~{}k=1,\ldots,K, (13)

where β>0\beta>0 is some given threshold.

To summarize, any 𝒢1,,𝒢K\mathcal{G}_{1},\ldots,\mathcal{G}_{K} satisfying constraints (9)-(13) can be a feasible solution for data association, NLOS mitigation, and clutter suppression. Note that if 𝒢1,,𝒢K\mathcal{G}_{1},\ldots,\mathcal{G}_{K} is a feasible solution that satisfies constraints (9)-(13), then 𝒢2,,𝒢K\mathcal{G}_{2},\ldots,\mathcal{G}_{K} is also a new feasible solution, with target 11 not detected. In this paper, we want to maximize the number of targets whose locations can be estimated. Therefore, the solution of data association solution, NLOS mitigation, and clutter suppression can be found by solving the following problem

(P2)maximizeK,𝒢1,,𝒢K\displaystyle{\rm(P2)}~{}\mathop{\textup{maximize}}_{K,\mathcal{G}_{1},\ldots,\mathcal{G}_{K}} K\displaystyle~{}K
subject to\displaystyle\mathop{\textup{subject to}}~{} (9)(13).\displaystyle~{}(\ref{eqS4.1})-(\ref{eqS4.6}).

The above problem can be solved by exhaustive search, i.e., given each KK and 𝒢1,,𝒢K\mathcal{G}_{1},\ldots,\mathcal{G}_{K}, we check whether conditions (9)-(13) hold. However, such an approach needs to solve the non-convex problem (P1) many times, which is of high complexity. To resolve this issue, we first ignore constraints (10) and (13) in problem (P2), which leads to the following problem

(P3)maximizeK,𝒢1,,𝒢K\displaystyle{\rm(P3)}~{}\mathop{\textup{maximize}}_{K,\mathcal{G}_{1},\ldots,\mathcal{G}_{K}} K\displaystyle~{}K
subject to\displaystyle\mathop{\textup{subject to}}~{} (9),(11),(12).\displaystyle~{}(\ref{eqS4.1}),~{}(\ref{eqS4.3}),~{}(\ref{eqS4.4}).

Let K¯\bar{K} and 𝒢¯1,,𝒢¯K¯\bar{\mathcal{G}}_{1},\ldots,\bar{\mathcal{G}}_{\bar{K}} denote the optimal solution to the above problem. Due to the sum distance constraints (11) and (12), the value of K¯\bar{K} is generally small, because the probability that (11) and (12) hold for Type II paths and Type III paths is very small. For convenience, define 𝒢¯=𝒢¯1𝒢¯2𝒢¯K¯\bar{\mathcal{G}}=\bar{\mathcal{G}}_{1}\cup\bar{\mathcal{G}}_{2}\cup\ldots\cup\bar{\mathcal{G}}_{\bar{K}}. Then, we just need to check which subsets in 𝒢¯\bar{\mathcal{G}} satisfy constraint (13), i.e., the number of times to solve problem (P1) is significantly reduced compared to the exhaustive search approach to problem (P2). Define

𝒢~={𝒢~k|𝒢~k𝒢¯andR(𝒢~k)β}.\displaystyle\tilde{\mathcal{G}}=\{\tilde{\mathcal{G}}_{k}|\tilde{\mathcal{G}}_{k}\in\bar{\mathcal{G}}~{}{\rm and}~{}R(\tilde{\mathcal{G}}_{k})\leq\beta\}. (14)

In other words, by removing 𝒢¯k\bar{\mathcal{G}}_{k}’s that do not satisfy condition (13) from 𝒢¯\bar{\mathcal{G}}, we can obtain 𝒢~\tilde{\mathcal{G}}. Note that each subset contained in 𝒢~\tilde{\mathcal{G}} satisfies conditions (9), (11)-(13), i.e., it is a feasible solution of data association, NLOS mitigation, and clutter suppression to localize one target. However, for two subsets 𝒢~k𝒢~\tilde{\mathcal{G}}_{k}\in\tilde{\mathcal{G}} and 𝒢~k¯𝒢~\tilde{\mathcal{G}}_{\bar{k}}\in\tilde{\mathcal{G}}, it is possible that gu,m,k=gu,m,k¯g_{u,m,k}=g_{u,m,\bar{k}} for some u,mu,m, i.e., in these two solutions, some estiamted range at BS mm is matched to both target kk and target k¯\bar{k}. Therefore, the last step to solve problem (P2) is to select the maximum number of subsets in 𝒢~\tilde{\mathcal{G}} such that condition (10) can be satisfied. Such a problem can be formulated as

(P4)maximizeK,𝒢1,,𝒢K\displaystyle{\rm(P4)}~{}\mathop{\textup{maximize}}_{K,\mathcal{G}_{1},\ldots,\mathcal{G}_{K}} K\displaystyle~{}K
subject to\displaystyle\mathop{\textup{subject to}}~{} 𝒢k𝒢~,k=1,,K,\displaystyle~{}\mathcal{G}_{k}\in\tilde{\mathcal{G}},~{}k=1,\ldots,K,
(10).\displaystyle~{}(\ref{eqS4.2}).

Because the number of subsets in 𝒢~\tilde{\mathcal{G}} that satisfy so many conditions is small, problem (P4) can be efficiently solved. After this problem is solved, the number of targets is known, and we can solve problem (P1) to localize these KK targets.

Remark 1.

It is worth noting that a similar two-phase networked device-free sensing strategy was considered in our recent work [21], where Type II and Type III paths are assumed to be absent such that NLOS mitigation and clutter suppression are not needed. Moreover, the sum distance constraints (11) and (12) are not utilized in the data association algorithm design. In this work, we point out that the sum distance constraints (11) and (12) can greatly reduce the number of feasible solutions such that data association, NLOS mitigation, and clutter suppression can be jointly designed with low complexity.

5 Numerical Results

In this section, we provide numerical examples to verify the effectiveness of our considered two-phase networked device-free sensing scheme in the multi-path propagation environment. Specifically, the channel bandwidth is assumed to be B=NΔf=400B=N\Delta f=400 MHz. Moreover, we assume that M=4M=4 BSs and K[2,6]K\in[2,6] targets are uniformly distributed in a 120 m ×\times 120 m square, and randomly generate 10410^{4} realizations of their locations. In each realization, we also randomly generate some Type II paths, i.e., the NLOS paths, and some Type III paths, i.e., the paths arising from clutters. Then, given the Types I, II, and III paths in each realization, we apply the two-phase protocol described in Sections 3 and 4 to estimate the number and the locations of the targets. Under our strategy, if target kk is not detected, or if target kk is detected, but the estimated location of it is not lying within a radius of r=0.375r=0.375 m from its true location, then we claim that a missed detection event occurs for target kk. On the other hand, if a target that does not exit is detected, we claim that a false alarm event occurs. At the ii-th iteration, let NiN_{i} and TiT_{i} denote the numbers of the missed detection events and the false alarm events. Then, over the 10410^{4} realizations, the probabilities of missed detection and false alarm are defined as PMD=i=1104Ni/(K×104)P_{{\rm MD}}=\sum_{i=1}^{10^{4}}N_{i}/(K\times 10^{4}) and PFA=i=1104Ti/(K×104)P_{{\rm FA}}=\sum_{i=1}^{10^{4}}T_{i}/(K\times 10^{4}).

Refer to caption
Fig. 2: The missed detection and false alarm performance.

Fig. 2 shows the performance of our proposed two-phase networked device-free sensing scheme, when KK ranges from 22 to 66. For the performance benchmark, we select the scheme in [21], where the sum distances, i.e., du,m,kd_{u,m,k}’s, are not utilized for data association. It is observed from Fig. 2 that under our proposed scheme, the probabilities of missed detection and false alarm are below 3.4%3.4\% when KK ranges from 22 to 66. Moreover, it is also observed that the utilization of the sum distances for joint data association, NLOS mitigation, and clutter suppression can significantly reduce the probabilities of missed detection and false alarm compared to the scheme proposed in [21]. At last, because the constraints associated with the sum distances, i.e., (11) and (12), can significantly reduce the number the times to solve NLS problem (P1), which is non-convex, the strategy proposed in this paper is observed to generate the localization solution with a significantly reduced CPU running time compared to the strategy proposed in [21].

6 Conlusion

In this paper, we considered the networked device-free sensing scheme in the 6G network under a multi-path propagation environment. A two-phase localization protocol was studied. In the first phase, range estimation was performance with the OFDM channel estimation techniques. In the second phase, we proposed an efficient algorithm for joint data association, NLOS mitigation, and clutter suppression. Then, the number and the locations of the targets are estimated based on the range estimations from the LOS paths. Numerical results showed that our proposed strategy can enable the BSs to accurately localize the targets with small probabilities of missed detection and false alarm.

References

  • [1] F. Liu et al., “Integrated sensing and communications: Towards dual-functional wireless networks for 6G and beyond,” IEEE J. Sel. Areas Commun., vol. 40, no. 6, pp. 1728–1767, June 2022.
  • [2] J. A. Zhang et al., “Enabling joint communication and radar sensing in mobile networks-A survey,” IEEE Commun. Surveys Tuts., vol. 24, no. 1, pp. 306–345, 1st Quart. 2021.
  • [3] D. K. P. Tan, J. He, Y. Li, A. Bayesteh, Y. Chen, P. Zhu, and W. Tong, “Integrated sensing and communication in 6G: Motivations, use cases, requirements, challenges and future directions,” in Proc. 2021 1st IEEE Int. Online Symp. on Joint Commun. &\& Sens. (JC&\&S), Feb. 2021.
  • [4] K. V. Mishra, M. R. Bhavani Shankar, V. Koivunen, B. Ottersten, and S. A. Vorobyov, “Toward millimeter-wave joint radar communications: A signal processing perspective,” IEEE Signal Process. Mag., vol. 36, no. 5, pp. 100–114, Sep. 2019.
  • [5] A. Hassanien, M. G. Amin, E. Aboutanios, and B. Himed, “Dual-function radar communication systems: A solution to the spectrum congestion problem,” IEEE Signal Process. Mag., vol. 36, no. 5, pp. 115–126, Sep. 2019.
  • [6] B. Paul, A. R. Chiriyath, and D. W. Bliss, “Survey of RF communications and sensing convergence research,” IEEE Access, vol. 5, pp. 252–270, 2016.
  • [7] L. Zheng, M. Lops, Y. C. Eldar, and X. Wang, “Radar and communication coexistence: An overview: A review of recent methods,” IEEE Signal Process. Mag., vol. 36, no. 5, pp. 85–99, Sep. 2019.
  • [8] F. Liu, C. Masouros, A. Petropulu, H. Griffiths, and L. Hanzo, “Joint radar and communication design: Applications, state-of-the-art, and the road ahead,” IEEE Trans. Commun., vol. 68, no. 6, pp. 3834–3862, June 2020.
  • [9] A. Liu et al., “A survey on fundamental limits of integrated sensing and communication,” IEEE Commun. Surveys Tuts., vol. 24, no. 2, pp. 994–1034, 2nd Quart. 2022.
  • [10] F. Liu, L. Zhou, C. Masouros, A. Li, W. Luo, and A. Petropulu, “Toward dual functional radar-communication systems: Optimal waveform design,” IEEE Trans. Signal Process., vol. 66, no. 16, pp. 4264–4279, Aug. 2018.
  • [11] X. Mu, Y. Liu, L. Guo, J. Lin, and L. Hanzo, “NOMA-aided joint radar and multicast-unicast communication systems,” IEEE J. Sel. Areas Commun., vol. 40, no. 6, pp. 1978–1992, June 2022.
  • [12] C. G. Tsinos, A. Arora, S. Chatzinotas, and B. Ottersten, “Joint transmit waveform and receive filter design for dual-function radar-communication systems,” IEEE J. Sel. Topics Signal Process., vol. 15, no. 6, pp. 1378–1392, Nov. 2021.
  • [13] X. Liu, T. Huang, N. Shlezinger, Y. Liu, J. Zhou, and Y. C. Eldar, “Joint transmit beamforming for multiuser MIMO communications and MIMO radar,” IEEE Trans. Signal Process., vol. 68, pp. 3929–3944, 2020.
  • [14] C. Sturm and W. Wiesbeck, “Waveform design and signal processing aspects for fusion of wireless communications and radar sensing,” Proc. IEEE, vol. 99, no. 7, pp. 1236–1259, Jul. 2011.
  • [15] L. Zheng and X. Wang, “Super-resolution delay-Doppler estimation for OFDM passive radar,” IEEE Trans. Signal Process., vol. 65, no. 9, pp. 2197–2210, May 2017.
  • [16] L. Liu and S. Zhang, “A two-stage radar sensing approach based on MIMO-OFDM technology,” in Proc. IEEE Global Commun. Conf. (Globecom) Wkshps., 2020.
  • [17] L. Gaudio, M. Kobayashi, G. Caire, and G. Colavolpe, “On the effectiveness of OTFS for joint radar parameter estimation and communication,” IEEE Trans. Wireless Commun., vol. 19, no. 9, pp. 5951–5965, Sep. 2020.
  • [18] S. H. Dokhanchi, B. S. Mysore, K. V. Mishra, and B. Ottersten, “A mmWave automotive joint radar-communications system,” IEEE Trans. Aerosp. Electron. Syst., vol. 55, no. 3, pp. 1241–1260, June 2019.
  • [19] C. B. Barneto et al., “Millimeter-wave mobile sensing and environment mapping: Models, algorithms and validation,” IEEE Trans. Veh. Technol., vol. 71, no. 4, pp. 3900–3916, Apr. 2022.
  • [20] J. Yang, C.-K. Wen, and S. Jin, “Hybrid active and passive sensing for SLAM in wireless communication systems,” IEEE J. Sel. Areas Commun., vol. 40, no. 7, pp. 2146–2163, July 2022.
  • [21] Q. Shi, L. Liu, S. Zhang, and S. Cui, “Device-free sensing in OFDM cellular network,” IEEE J. Sel. Areas Commun., vol. 40, no. 6, pp. 1838–1853, June 2022.
  • [22] S. Aditya, A. F. Molisch, and H. M. Behairy, “A survey on the impact of multipath on wideband time-of-arrival based localization,” IEEE Trans. Aerosp. Electron., , no. 7, pp. 1183–1203, July 2018.
  • [23] I. Guvenc and C.-C. Chong, “A survey on TOA based wireless localization and NLOS mitigation techniques,” IEEE Commun. Surveys Tuts., , no. 3, pp. 107–124, 2009.
  • [24] T. Hwang, C. Yang, G. Wu, S. Li, and G. Y. Li, “OFDM and its wireless applications: A survey,” IEEE Trans. Veh. Technol., , no. 4, pp. 1673–1694, May 2009.
  • [25] M. Yuan and Y. Lin, “Model selection and estimation in regression with grouped variables,” J. R. Stat. Soc. Ser. B, Stat. Methodol., vol. 68, no. 1, pp. 49–67, Feb. 2006.
  • [26] D. J. Torrieri, “Statistical theory of passive location systems,” Proc. IEEE, , no. 2, pp. 183–198, Mar. 1984.