Unsourced Random Massive Access with Beam-Space Tree Decoding
Abstract
The core requirement of massive Machine-Type Communication (mMTC) is to support reliable and fast access for an enormous number of machine-type devices (MTDs). In many practical applications, the base station (BS) only concerns the list of received messages instead of the source information, introducing the emerging concept of unsourced random access (URA). Although some massive multiple-input multiple-output (MIMO) URA schemes have been proposed recently, the unique propagation properties of millimeter-wave (mmWave) massive MIMO systems are not fully exploited in conventional URA schemes. In grant-free random access, the BS cannot perform receive beamforming independently as the identities of active users are unknown to the BS. Therefore, only the intrinsic beam division property can be exploited to improve the decoding performance. In this paper, a URA scheme based on beam-space tree decoding is proposed for mmWave massive MIMO system. Specifically, two beam-space tree decoders are designed based on hard decision and soft decision, respectively, to utilize the beam division property. They both leverage the beam division property to assist in discriminating the sub-blocks transmitted from different users. Besides, the first decoder can reduce the searching space, enjoying a low complexity. The second decoder exploits the advantage of list decoding to recover the miss-detected packets. Simulation results verify the superiority of the proposed URA schemes compared to the conventional URA schemes in terms of error probability.
Index Terms:
Unsourced random access, massive access, beam-space tree decoder, Machine-Type Communication (mMTC).I Introduction
I-A Motivation
One imminent demand for the next generation wireless mobile communication systems is to provide instant and reliable access for an increasingly large number of machine-type devices (MTDs) [1, 2]. Different from human-centric communication, the resultant Massive Machine-Type Communication (mMTC) has two distinct features. In particular, only a small number of devices are active in each communication round due to the sporadic activity in mMTC[3]. Besides, MTDs usually transmit small data payloads adopting short-packet signaling [4]. These make traditional grant-based random access schemes generally not very suitable for the mMTC scenario because of their low spectral efficiency and exceedingly long latency [5]. Therefore, the design of reliable and efficient grant-free random access schemes has attracted significant attention recently, where active users transmit pilots and data to the base station (BS) directly without permission granted [6, 7]. In most grant-free random access schemes, a set of pilot sequences that are designated to the users are used for the BS to ensure its accurate user activity detection and channel estimation [8, 9, 10]. However, this is neither affordable nor feasible in the next generation multiple access (NGMA) scenarios due to the high density, the large number of connections therein, and the frequent collisions that may occur. To tackle the issues, a special type of grant-free random access, the so-called unsourced random access (URA), is introduced in [11], in which users do not transmit preambles, all the potential users share a common codebook, and the BS only needs to decode a list of messages instead of the identities of active users. This scheme can avoid the huge cost of preambles and the extra protocol of collision resolution, thus well meeting the requirements of next generation massive access.
On the other hand, massive or super MIMO technology, in combination with the millimeter-wave (mmWave) technology, have been promoted as two core technological features for the next generation wireless communication system with a witnessed potential to boost the capacity and efficiency. These two underlying key technologies jointly bring additional spatial-domain signal dimension with their excellent intrinsic directivity and proper beamforming, and also result in salient beam-space sparsity due to the lack of scattering in a mmWave MIMO channel [12, 13, 14]. To further increase the efficiency of the future massive access systems, such spatial-domain resources and properties should be fully explored and exploited. Various multi-user transmission schemes have been proposed to unleash the potential and properties of the beam-space resources, such as the typical works on beam division multiple access (BDMA), which simultaneously serves multiple users via different beams [15, 16, 17].
However, for grant-free random access, even if the information of the location of all potential users is stored at the BS, the identities of active users are unknown to the BS. Therefore, the beam dimension cannot be directly exploited in the design of the encoding process of an unsourced grant-free random access, which is different from previous works [15, 16, 17]. Moreover, in a general URA system, the messages of active users are divided into several sub-blocks and transmitted in consecutive sub-slots. As the signals transmitted from active users often experience deep fading, some sub-blocks may be missed by the decoder at the receiver. The loss of any sub-block in any sub-slot finally leads to the failure of recovering the corresponding original message. The problem of packet loss is also needed to be solved as it can cause severe decoding performance degradation. Note that the user location information can generally serve as a hint of the indices of the messages originated from it. Therefore, the intrinsic beam division property and salient spatial sparsity in a mmWave MIMO system can provide extra extrinsic information for both multi-user signal separation and multi-sub-block message stitching. This motivates us to exploit the beam space properties to design new URA schemes for next generation multiple access to help the entire system accommodate more active users and improve the decoding performance.
I-B Related Works
Y. Polyanskiy first introduced a framework named URA [11]. Specifically, in URA, all the users share a common codebook, and the decoder only needs to decode a list of messages transmitted from the active users. The error probability is defined as the average fraction of mis-decoded messages over the number of active users, including both missed detection and false alarm. It is obvious that the message recovery at the BS can be formulated as a compressed sensing (CS) problem due to the sporadic activity in mMTC, which is similar to the conventional grant-free random access schemes [18, 19]. However, the size of the common codebook grows exponentially with the number of information bits. In practice, even if a short packet is transmitted, the size of information messages is typically at the order of 100 bits, which makes the CS algorithms computationally intractable. In this context, V. K. Amalladinne proposed a coded compressed sensing (CCS) scheme for URA communication [20]. In particular, the messages from active users are first divided into several sub-blocks. Then, a systematic linear code adds redundancy to those sub-blocks. Once this is achieved, each sub-block is mapped into a codeword in a common codebook and transmitted in a certain sub-slot. Then a standard CS algorithm implements the detection of the sub-blocks. Finally, the sub-blocks transmitted in different sub-slots are stitched together to obtain the original messages. Build upon the findings in [20] and the structure of sparse regression codes (SPARCs), A. Fengler provided an improved inner decoder, and a complete asymptotic error analysis [21].
Apart from the above works, the study of massive multiple-input multiple-output (MIMO) URA has also attracted much attention. A. Fengler extended the URA model of [20] to a block-fading MIMO channel by using a low-complexity covariance-based CS (CB-CS) recovery algorithm [22]. Considering the low code rate and spectral efficiency of the CCS scheme, V. Shyianov proposed a new algorithmic solution to solve the massive URA problem by leveraging the rich spatial dimensionality offered by large-scale antenna arrays [23]. Besides, without requiring a separate activity detection or channel estimation step, A. Decurninge introduced a structure that allows the receiver to separate the users using a classical tensor decomposition [24]. As URA is a special scheme of grant-free random access, A. Fengler presented a conceptually simple algorithm based on pilot transmission, activity detection, channel estimation, Maximum Ratio Combining (MRC), and single-user decoding [25], which is similar to the existing grant-free random access schemes [3, 18]. The difference is that they use a pool of non-orthogonal pilots where every active user picks one of them pseudo-randomly. Furthermore, X. Shao proposed a unified cooperative activity detection framework for sourced and unsourced random access based on the covariance of the received signals for the sixth generation (6G) cell-free wireless networks [26].
I-C Main Contributions
In this paper, we propose a URA scheme with beam-space tree decoding. Specifically, we adopt the CCS scheme [20] suitably to our case and design two beam-space tree decoders, which are based on hard decision and soft decision, respectively. By leveraging the beam division property to assist in distinguishing the sub-blocks transmitted from different users, both decoders can help the system serve more active users. As the discriminating power is improved, the searching space of the solution in the decoding process is reduced, such that the first decoder has low complexity. In addition, notice that any sub-block missed by the CS decoder would finally lead to missed detection, which degrades the decoding performance. To tackle this issue, the second decoder establishes factor graphs at each stage during the decoding process and implements message passing algorithm (MPA) to give each candidate sub-block drawn from the checking relationship a log-likelihood ratio (LLR) value. Then the reliability of every candidate path is calculated by a path metric (PM). At every stage, some reliable paths are kept, and finally, the surviving path is output as the valid message. Even if a sub-block is missed by the CS decoder, it is possible that the path of the original message is reliable and kept. The main contributions of this paper are summarized as follows:
-
A URA scheme with beam-space tree decoding is proposed for mmWave communication systems in mMTC to accommodate more active users and to improve the system performance.
-
Two beam-space tree decoders are designed. Both of them can exploit the intrinsic beam division property to improve the decoding performance of the tree decoder by enhancing the discriminating power and helping the system serve more active users. Besides, the first decoder is based on hard decision with low complexity. The second one is based on soft decision and exploits the advantage of list decoding to recover the packet loss, which is the key of the proposed URA scheme.
-
Simulation results verify that our URA schemes have significantly better performances than existing works.
I-D Paper Organization and Notations
The rest of this paper is organized as follows: Section II provides a brief introduction of the considered massive URA system. Section III provides the encoding and decoding process of the considered system. Section IV proposes a beam-space tree decoder with hard decision. Then, Section V designs a beam-space tree decoder with soft decision. Next, Section VI analyzes the performance of the proposed URA scheme. Afterward, Section VII provides extensive simulation results to validate the effectiveness of the proposed algorithm. Finally, Section VIII concludes the paper.
Throughout this paper, we use bold letters to denote matrices or vectors and non-bold letters to denote scalars. We denote the -th row and the -th column of a matrix with the row-vector and the column-vector respectively. We denote by the space of complex matrices of size . We use to denote the absolute value of a complex number, and to denote conjugate transpose and transpose, respectively. The -norm of an input vector is denoted by . denotes the number of elements of set . The notation denotes that the random variable (r.v.) follows the circular symmetric complex Gaussian distribution. stands for the big-O notation.

II System Model
Consider an uplink single-cell cellular network consisting of single-antenna users. The BS is equipped with antennas and radio frequency (RF) chains such that , as shown in Fig. 1. Due to the sporadic user activity of mMTC, only a small number of users are active in a transmisson process, i.e., . Each active user has bits of information to be transmitted in a block-fading channel. According to [12, 14], the channel vector from user to the BS can be written as
(1) |
where denotes the total number of clusters and within the -th cluster there are sub-paths. and denote the gain and the the angle of arrival (AOA) of the -th sub-path within the -th cluster. For the uniform linear array (ULA), the array steering vector can be expressed as
(2) |
where , , is the signal wavelength, and is the antenna spacing which is usually half of the signal wavelength.
To overcome the strong path loss in mmWave channels, a beamforming technique should be adopted. However, the BS cannot focus in any specific direction in grant-free random access. The reason is that even if the location of all potential users is stored at the BS, which users are active is not prior information known to the BS. Besides, due to the constraint of hardware implementations and large energy consumption of RF chains, we have . Therefore, many beamforming methods in existing works [27, 28] cannot be applied in our system directly as narrow beams cannot cover the whole beam space. In this paper, we give a beamforming method based on the widely used Discrete Fourier Transform (DFT) based beamforming codebook [27, 28], to overcome the strong path loss of mmWave channels in grant-free random access. Specifically, the DFT based beamforming codework, which is denoted by , can be writtern as
(3) |
where
(4) | ||||
Consider the process of hardware implementations, the number of antennas is usually a multiple of the number of RF chains. Therefore, the consecutive beamforming vectors can be grouped and summed together to form a new beamforming vector , . is expressed as
(5) |
where the parameter is set to constrain the power of receive beamforming, i.e., . Then the beamforming matrix is obtained, where is written as . By applying this beamforming method, the width of every beam is , thus the beams can cover the whole beam space, which means that the signals coming from all directions can be received by the BS.
In a typical URA scenario, all the users share a common codebook , which is denoted by . The power of each codeword is constrained to 1, i.e., . Let denote whether user transmits the codeword . can be written as
(6) |
After receive beamforming at the receiver, the beam domain channel vector of the active user is denoted by . Also, the random noise vector is denoted by , where is modeled by a complex circular Gaussian random vector with i.i.d. components, i.e., . Then the received signal on the -th beam can be written as
(7) |
By summarizing all the samples in a transmission block, the received signal can be recast as
(8) |


where , , and . The matrix contains only non-zero columns each of which having a non-zero entry.
For the matrix , where , the -th row of such matrix is given as
(9) |
The probability that is identically zero is given by . Since is significantly larger than , the matrix is row-sparse, which is shown in Fig. 2. The reason is that only a small number of users are active due to the sporadic traffic of users, i.e., . For the same reason, the matrix is also row-sparse. Moreover, due to the lack of scattering in mmWave bands, the signal propagates from the transmitter to the receiver through a small number of path clusters. This leads to the sparsity of mmWave massive MIMO channels in the beam domain as well, i.e., the channel vector is sparse. Therefore, for the matrix , the number of non-zero entries of its columns is less than that of , which is shown in Fig. 2. Note that the total number of users plays no role in the matrix . This means that if the matrix is recovered, only the codeword index is known to the BS, instead of the user’s ID, which leads to the so-called unsourced property.
Let and denote the set of the recovered messages at the BS and the set of the active users, respectively. Each active user expects to transmit bits of information, i.e., . The performance in URA is evaluated by the probability of missed detection and false alarm, denoted by and respectively, which can be given by:
(10) |
(11) |
and the error probability of the system is defined as
(12) |
III Proposed URA Scheme
In this section, we first review the studies of the CCS scheme in [20] and then propose a URA scheme. In the CCS scheme, each active user partitions the message into several sub-blocks and adds parity bits. The CS techniques detect the sub-blocks transmitted by active users in all sub-slots. A tree-based algorithm then stitched these sub-blocks to recover the original messages.
III-A Encoding Process
The transmission strategy includes two encoders: tree encoder and CS encoder. The tree encoder uses a systematic linear block code based on random parity checks to add parity bits to every sub-block. The CS encoder maps each sub-block into a codeword in the common codebook.
III-A1 Tree Encoder
Divide bits message into sub-blocks of size , where . Let and , . Each sub-block is resized to length by appending parity bits, which is obtained by linear combinations of the information bits of the previous sub-blocks. Mathematically, define as a coded message, then we have . Herein, is obtained by
(13) |
where is a binary matrix. Parity bits are computed using modulo-2 arithmetic and, as such, they remain binary. Every sub-block has the same size , and the code rate is fixed as .
III-A2 CS Encoder
For each active user , is the coded message output by the tree encoder. are mapped in to , which denote the indices of the codewords in the common codebook , where . Then the active user transmits the consecutive codewords of length , i.e., .
III-B Decoding Process
The input to the decoder is the sum of the signals transmitted by active users plus noise after receive beamforming. The decoding process also consists of a CS decoder and tree decoder. The conventional CS decoder exploits CS techniques to recover the sub-blocks transmitted from all active users. The tree decoder forms code trees to piece these sub-blocks together to obtain the original messages.
III-B1 CS Decoder
For each sub-slot s, the received signal can be expressed as
(14) |
is a row sparse matrix and can be recovered by CS techniques such as Approximate Message Passing (AMP) [29].
For rich-scattering environments, an accurate and widely used statistical model for the actual channel coefficients is the Gaussian model. However, in mmWave communications, the entries cannot be approximated by a Gaussian distribution due to the lack of scatterers. Thus, we design a special activity detector for our considered scenario. Specifically, we approximate the unknown prior distribution with Gaussian mixture (GM) [13] and EM-GM-AMP [30] models for activity detection and channel estimation. The coefficients in the -th column of are approximated to be i.i.d with marginal pdf
(15) |
where is the Dirac delta, is the sparsity rate, and for the -th GM component, , , are the weight, mean, and variance, respectively. The sparsity of the vector is captured by the sparsity rate . The weights, means, and variances can be iteratively learned by the Expectation-Maximization (EM) algorithm.
For each sub-slot , the CS algorithm outputs the estimation of , i.e., . Via maximum-ratio-combining (MRC), the activity detector is defined as
(16) |
where is a threshold, and is expressed as
(17) |
Through the activity detector, the indices of the transmitted codewords in the common codebook are obtained and collected in the set , which is written as . As the relationship between a sub-block and the corresponding codeword is a one-to-one mapping, if a codeword is detected, then the corresponding sub-block can be recovered automatically. The CS Decoder finally outputs the set of the sub-blocks and the corresponding estimated channel vectors . Notice that the index cannot represent the identity of the active user. The information that is known at the BS is that a sub-block is transmitted, it comes from a certain user and the estimated channel gain of that user is . Besides, let , means the number of the sub-blocks collected in sub-slot s. is usually less than , i.e., , due to the following two reasons:
-
i)
Since all users use a common codebook, the messages from different users may share some sub-blocks, which is defined as collision.
-
ii)
Due to the poor channel condition and the mistake of the CS decoder, some sub-blocks may be lost.
III-B2 Tree Decoder
The traditional tree decoder in [20] aims to recover the original messages transmitted from all active users by piecing together valid sequences of the sub-blocks drawn from . As an initial step, the decoder fixes a sub-block in as the root of a tree and gets the parity bits of the next sub-block by (13). All sub-blocks in matching the parity bits are attached to the root. This process then moves forward. For every candidate path at stage , parity bits are computed, and the matching sub-blocks in are attached to this path, forming new branches. This continues until the last sub-slot is reached. At this point, every surviving path is output as a valid tree message.
However, the traditional tree decoder has the following two problems:
-
i)
The loss of a sub-block from a particular user by the CS decoder finally leads to missed detection of the original message from that user.
-
ii)
The parity bits to be attended in every sub-block are fixed, which restricts the maximum active users that the system can serve.
To tackle the above problems, we propose two beam-space tree decoders, which are based on hard decision and soft decision, respectively. The beam-space tree decoder with hard decision has low complexity, which is suitable to the scenario of massive connectivity. The beam-space tree decoder with soft decision considers the problem of packet loss, which can be applied to the scenario with poor channel condition.
Notation | Parameter Description |
The -th sub-block detected in the -th sub-slot | |
The index of the sub-block at stage in the -th path | |
The beam pattern of the sub-block | |
A set that contains the indexes of the detected sub-blocks that meet the parity constraints at stage for the -th path | |
A set that contains the detected sub-blocks that meet the parity constraints at stage for the -th path | |
A set that contains the detected sub-blocks that meet the parity and beam pattern matching constraints at stage for the -th path |
IV Beam-space Tree Decoder with Hard Decision
The traditional tree decoder exploits the discriminating power of parity bits to stitch the sub-blocks together to form a valid message instead of the erroneous one. At any stage of a path during the decoding process, the sub-blocks meeting the parity constraints are attached to the path. Besides the valid sub-block, other attached sub-blocks are the ones that cannot be distinguished by the parity bits. These invalid sub-blocks may finally lead to an erroneous message output by the tree decoder. Notice that in all sub-slots, the sub-blocks sent by different users are received by different beams at the BS according to the location of the users and scatterers. Therefore, the discriminating power of beams can be exploited to distinguish the invalid sub-blocks that meet the parity constraints. By leveraging the beam dimension, the decoding process can be formulated as a problem of path search in the three-dimensional space, which is shown in Fig. 3.


To better describe the decoding process of the beam-space tree decoder with hard decision, Table I is given to summarize the important parameters encountered in this Section. Specifically, define the beam pattern of a sub-block as a set that contains the indices of the beams that receive the sub-block. Then different sub-blocks can be distinguished by their beam patterns. The beam pattern is written as . To get accurate beam patterns, assume the gains of the active beams obey a prior known Gaussian distribution, i.e., , where an ”active” beam means that at least the signal from one user is received by the beam. And the gains of the inactive beams obey another known Gaussian distribution, i.e., , where and . For the gains of the inactive beams, as no signal is received or the signal experiences deep fading, is close to zero. For the gains of the active beams, is large as the signals experience random fading. Using these two prior distributions, the gains of the beams can be grouped into two classes. And for each class, the mean and variance of the samples are calculated and the prior distributions can be updated, i.e., , , and . Then according to these updated distributions, we can give the decision rules of the beam patterns. Specifically, is obtained by , which is expressed as
(18) |
where .
Input:
Output:
For this proposed beam-space tree decoder, take the decoding process of a certain user for example. At the first stage, a code tree is created and a detected sub-block in the first sub-slot becomes the root of the tree and forms the first path. The root sub-block is written as and its beam pattern is . At later stages, the sub-blocks that meet the parity and the beam pattern matching constraints are kept. By meeting the parity constraints, is written as
(19) |
And is obtained by
(20) |
After beam pattern matching, only the sub-blocks in are survived. can be written as
(21) |
where . Also, means that the sub-blocks and are received by at least one same beam at the BS, then and have the probability to be transmitted by the same user. By beam pattern matching, the proposed beam-space tree decoder can reduce the number of surviving sub-blocks in each sub-slot, which improves the discriminating power of the decoder. A practical pruning process of this algorithm is shown in Fig. 4. The sub-block is received by several beams at the BS, which is shown in the beam pattern. For every candidate path at stage , there are candidate sub-blocks in the common codebook that meet the parity constraints according to the parity bits. A part of them are inactive, while another part of them are discriminated by the beam pattern matching. As shown in Fig .4, the lines of the 2-nd and the -th candidate sub-blocks change from solid lines to dashed lines, which means that they are deleted, as there is no overlap between their beam patterns and the beam pattern of the root sub-block at stage 1.
Finally, the proposed beam-space tree decoder with hard decision is summarized and given in Algorithm 1. is a set that contains the beam patterns of the sub-blocks detected in sub-slot s, where is expressed as .
V Beam-space Tree Decoder with Soft Decision
As described above, the CS decoder cannot always detect all the transmitted sub-blocks because the received signals may experience deep fading. The loss of a sub-block by the CS decoder in any sub-slot finally leads to missed detection of the original message. This is because the traditional tree decoder and the beam-space tree decoder with hard decision just stitch the sub-blocks drawn from the output of the CS decoder. At any stage, according to the parity bits, the set of candidate sub-blocks can be obtained. At stage s, the tree decoder keeps the intersection between the candidate set and . In this proposed algorithm, we keep all the candidate sub-blocks and calculate the LLR values of them by implementing the MPA algorithm, which denotes the probability of whether the sub-blocks are transmitted. Then, we define a path metric to calculate the reliability of the consecutive sub-blocks and keep some reliable paths at every stage. Even if a sub-block in a sub-slot is missed, it is possible for the path to be reliable because the path metric measures the reliability of the entire path. Therefore, the purpose of packet loss recovery is achieved.
Specifically, take a user’s decoding process for example. At stage for the -th path, the number of the candidate sub-blocks is , and these sub-blocks are collected in the set . is expressed as
(22) |
where
(23) |
The difference between and in (20) is that the candidate sub-blocks in are drawn according to the parity bits only, thus . To reduce interference, only the received signals of those candidate sub-blocks are kept, which is denoted by . is written as
(24) |
where means that is in the set instead of . Then a factor graph is formed, taking the corresponding codewords as variable nodes and beam resources as resource nodes. Let and denote the number of variable nodes and resource nodes. To exploit the beam division property, the active beams in the beam pattern of the root sub-block form the resource nodes. Then the remaining received signal is defined as . A certain row of comes from the -th row of , where . For the sake of simplicity, define as the received signal at the -th resource, as the estimated channel gain between the user transmitting the -th codeword and the BS at the -th resource as the -th possible codeword and as a random variable that indicates whether the codeword is transmitted. Then is written as , where can be expressed as
(25) |
where
(26) |
and . To reduce the computational complexity, we resort to Gaussian Approximation (GA) as in [31], and approximate as a complex Gaussian-distributed random variable with mean and variance , i..e., . and can be expressed as

(27) | ||||
respectively, where
(28) |
is the log likelihood ratio (LLR) delivered from the -th variable node to the -th resource node. Also, denotes the LLR delivered from the -th resource node to the -th variable node, which is written as
(29) |
where
(30) | ||||
(31) |
Besides, is given as
(32) |
Finally, can be expressed as
(33) |
Denote as the new paths that are split from the -th path. By implementing MPA, from path at stage s, we can obtain the LLRs of the candidate sub-blocks in , which are written as . Learning from the way of list decoding [32], we define a path metric to calculate the reliability of the new branches from path at stage . Specifically, the PM of the new branch is written as
(34) | ||||
where denotes the LLR of the sub-block at stage in the path . The decoder calculates the PM of all the branches from every candidate path and keep some reliable paths at every stage. And at the last stage, the decoder outputs the most reliable path as the recovered message.
However, this scheme is not suitable in the case that collision occurs. As mentioned above, active users select codewords from a common codebook . Even if the dimension of is large, collisions may still occur. If the traditional tree decoder fixes a sub-block transmitted by two active users at the first stage, then the decoder finally outputs two valid tree messages. According to [25], we give as the average number of collisions of users on consistent s sub-blocks started from the first one, which is written as
(35) |
The collision of more than two users is ignored because the number is usually much smaller than 1. As grows, the collision can be ignored when . In other words, it is impossible for the valid messages of the collision users to be the new branches of the same candidate path. However, when the depth of a code tree grows, the LLR of a sub-block has less impact on the PM of the entire path. Therefore, the remaining paths at stage s may all come from the new branches of the most reliable path at stage , leading to missed detection. Actually, there is no need to keep all new branches from a candidate path because the valid messages of collision users come from different candidate paths. Denote as the number of splitting paths, which means that only new branches from a candidate path are kept according to the PM. Then for the current stage, keep most reliable paths, where . This pruning process is shown in Fig. 5. The number of candidate sub-blocks at stage is , which is equivalent to the process in Fig. 4. At stage , for the new branches of a path, a factor graph is created to implement the MPA algorithm and give the candidate sub-blocks LLRs. Then the most reliable paths are kept, and others are deleted, which is shown in Fig. 5 that the lines of those deleted sub-blocks change from solid to dashed. Finally at stage , for the paths, the most reliable paths are kept and others are deleted. is chosen according to the trade-off between the computational complexity and decoding performance of the decoder.
Input:
Output:
At the last stage, the number of messages output by the decoder cannot be determined because whether a collision occurs is unknown to the decoder. Notice that the traditional tree decoder outputs all the paths meeting the parity constraints as valid messages. When a collision occurs, the traditional tree decoder outputs several paths as the recovered messages. Besides, more parity bits are pushed towards later stages to reduce the probability of error according to [20]. Thus, we exploit the discriminating power of the parity bits at later stages to output the results of the beam-space tree decoder with soft decision. To summarize, list decoding is implemented at the former stages to keep the missed sub-blocks, and the sub-blocks that are full of parity bits are exploited to prune the erroneous paths at the latter stages.
However, due to the loss packet recovery, the missed detection rate decreases while the false alarm rate increases. The reason is that some undetected sub-blocks may be kept in the decoding process. Some of them are not transmitted actually, which may lead to false alarm. As the valid messages from collision users are not similar with each other, the invalid messages can be discriminated. Specifically, define a similarity metric , which is denoted by
(36) |
where is the indicator function, and are two messages output by a code tree. Calculate every pair of the outputs from a code tree, if , , then keep the more reliable one according to the PM, otherwise keep both, where is a threshold. By leveraging the similarity metric, the invalid messages meeting the parity constraints are deleted. The beam-space tree decoder with soft decision is summarized and given in Algorithm 2.
VI Performance Analysis
The performance of our proposed URA system is connected with the reliability of CS techniques in each sub-slot and the efficiency of message stitching across different sub-slots. In the remainder of this section, we ignore the collision that different active users share a sub-block in the first sub-slot.
Take the decoding process of user for example. Let be the probability that at least one sub-block of user is not output by the CS decoder, be the probability of error, be the probability of missed detection, and be the probability of false alarm. is written as
(37) | ||||
where , which denotes the probability that the CS decoder is error-free. denotes the probability that the message of user is not output by the tree decoder in the case that the CS decoder is error-free.
VI-A Tree Code Analysis
In this subsection, we analyze the error probability of all the tree decoders. Denote , , as the error probability of the traditional tree decoder, the beam-space tree decoder with hard decision and the beam-space tree decoder with soft decision.
For the traditional tree decoder and the beam-space tree decoder with hard decision, it is obvious that because these two decoders cannot deal with the problem of packet loss. In contrast, because there is no missed detection when the CS decoder is error-free. Thus, we use to analyze the performance of the two decoders, respectively.
Let , be the number of erroneous paths of the traditional tree decoder and the beam-space tree decoder with hard decision at stage , respectively. Define as the probability of the event that the intersection between the beam patterns of two sub-blocks are not empty. Assume the signal transmitted from an active user is received by beams at the BS. According to (21), the beam pattern matching is implemented by . Then is given as
(38) |
because of the lack of scatterers in the mmWave communication system, i.e., .
For the beam-space tree decoder with hard decision, we give the expected values of in Theorem 39.
Theorem 1:
The expected values of , which is denoted by , can be expressed as
(39) |
where , .
Proof:
Based on Theorem 39, we give the upper bound of the false alarm rate of the beam-space tree decoder with hard decision in Corollary 44.
Corollary 1:
is bounded by
(44) |
Proof:
is the probability of false alarm, which means that the number of erroneous paths at the last stage is at least one. Therefore, is written as
(45) |
The inequality (45) is obtained by the application of Markov inequality.
For the beam-space tree decoder with soft decision, because the decoder considers the problem of packet loss. because the decoder keeps limit reliable paths at every stage. As grows, decreases. Besides, notice that the decoder outputs the most reliable path at the last stage. If the recovered message is invalid, then missed detection and false alarm occur simultaneously, i.e., .
VI-B CS Analysis
A fundamental limitation of compressed sensing is that the required signal dimension to reliably identify a subset of transmitted codewords among a set consisting of codewords in the common codebook scales as . is almost linearly with . is bounded by .
In our scenario, although active users transmit codewords simultaneously, only a small number of codewords is received by a certain beam at the BS. The average number of codewords received by a beam is given as
(46) |
Denote , then is bounded by
(47) |
Similarly, is bounded by
(48) |
Considering the limitation of both the CS decoder and the tree decoder, we give the upper bound of the number of active users in Lemma 49.
Lemma 1:
In our scenario, the number of active users, i.e., , is bounded by
(49) |
where is a constant.
Proof:
Denote the average number of sub-blocks detected in a certain beam as , where . According to the limitation of the tree decoder given in [33], is bounded by . Substituting by in the inequality, the bound of is obtained, i.e., .
VI-C Asymptotic Analysis
In this subsection, we study the proposed algorithms in the context of large settings. The asymptotic analysis in [20] shows that the probability of false alarm goes to zero in the logarithmic regime with constant code rate . In this subsection, we analyze the impact of the beam division property on system performance in the asymptotic regime while fixing the number of parity bits.
Lemma 2:
Fix , for some and consider the number of active users . For the CS decoder, the required signal dimension is given as
(50) |
where is a constant.
Proof:
Lemma 50 shows that as the number of RF chains and active users increases together while keeping a fixed ratio, the number of active users plays no role in the required signal dimension . This means that the decoding performance of the CS decoder is guaranteed by exploiting the beam division property while keeping the dimension of the common codebook .
Theorem 2:
Fix , for some , , consider the number of active users and the number of paths . The decoding performance of the beam-space tree decoder with hard decision and the beam-space tree decoder with soft decision, i.e., and , is close to zero.
Proof:
For the beam-space tree decoder with hard decision, according to (38), . For the sake of similarity, assume for s = 2,3,…,S. Then is approximated as
(52) | ||||
where is a constant.
According to Corollary 44, is rewritten as
(53) |
For the beam-space tree decoder with soft decision, let the number of paths . At every stage, although sub-blocks are drawn by the checking relationship, most of the new paths are not reliable. Only codewords are needed to be verified. Without the process of pruning, possible paths are kept at the last stage. As , the valid path is reliable and kept. At the last stage, the valid path has a high probability of being the most reliable path according to the PM and being output by the decoder as a result.
It can be seen from Theorem 2 that in the regime, the decoding performance of the beam-space tree decoder with hard decision and the beam-space tree decoder with soft decision is guaranteed by exploiting the beam division property.
VI-D Computational Complexity Analysis
We denote as the computational complexity of the traditional tree decoder, the beam-space tree decoder with hard decision and the beam-space tree decoder with soft decision. For the sake of simplicity, let be the candidate sub-blocks in every sub-slot and ignore the collision. According to [20], the expected computational computational complexity of the traditional tree decoder, i.e., , is given as
(54) |
The computational complexity of the beam-space tree decoder with hard decision, i.e., , is written as
(55) |
Notice that because . Therefore, the beam-space tree decoder with hard decision has low computational complexity.
For the beam-space tree decoder with soft decision, the computational complexity is given as
(56) |
where and are the number of variable nodes and resource nodes of the factor graph, is the max number of iterations of MPA.
VII Numerical Results
In this section, we investigate the performance of our proposed scheme in terms of error probability. We consider a simulation scenario where the BS employs a ULA antenna array with , and the RF chains are set to . The multipath channel consists of clusters each of which containing sub-paths. It is assumed that the location of users obeys a two-dimensional Poisson distribution. The transmit power is fixed as dBm for all users. For the tree code scheme, bits of information are split into sub-blocks with length bits. Data profile and parity profile are given as and , respectively. For the beam-space tree decoder with soft decision, . As a reference, we compare the proposed beam-space tree decoders with the traditional tree decoder [20] and the CB-CS algorithm [22]. For the sake of simplicity, in the following figures, TD means tree decoder, HD means hard decision, and SD means soft decision.

Fig. 6 depicts the error probability of different URA schemes versus when . The difference between the tree decoder (beam domain) and the tree decoder (spatial domain) is whether the tree decoding process is performed after receive beamforming. Comparing these two algorithms, we can see that the decoding performance is significantly improved after receive beamforming because the detection performance of CS techniques is improved by exploiting the sparsity of beam domain channel and the beamforming gain. Besides, at the BS the signals are received after beamforming, which means that the dimension of the received signals is determined by the number of RF chains instead of the number of antennas. Therefore, the high dimension of antennas can not be exploited by the CB-CS algorithm in mmWave scenarios. In addition, there is a gap between the beam-space tree decoder with hard decision and the traditional tree decoder (beam domain). The reason is that getting accurate beam patterns of the sub-blocks, which means that whether the signal is received by every beam at the BS should be accurately determined, is harder than the activity detection of these sub-blocks. Therefore, the beam patterns of the sub-blocks obtained by (18) may not always be accurate, resulting in a decrease in the decoding performance. Besides, it is observed that for the considered , the beam-space tree decoder with soft decision achieves the best performance. Such advantages come from the fact that this algorithm considers the problem of packet loss.

Fig. 7 plots the decoding performance with different active users when dB. Initially, in the regime with a few number of active users, the error probability of all algorithms increases slowly. However, when the number of active users continues to increase, the error probability of the tree decoder increases sharply to 1, which means that the tree decoder cannot discriminate and stitch the valid sub-blocks when the number of active users is large. Actually, allocating more parity bits can help the traditional tree decoder accommodate more active users while the computational complexity of the CS techniques and the tree decoders grows. It is observed that the error probability of the two beam-space tree decoders increases slowly when the number of active users is large. Such an advantage of the beam-space tree decoders mainly comes from enhancing the discriminating power of the decoder by exploiting beam resources.



Then we study the impact of the number of parity bits on the system performance. For , data profile and parity profile are given as and , respectively. In Fig. 8, we compare the performance of the tree decoder (beam domain), the beam-space tree decoder with hard decision, and the beam-space tree decoder with soft decision. It is observed that allocating more parity bits can improve the decoding performance, which is seen in Fig. 8(a). Notice that as the number of active users grows, the error probability of the tree decoder and the beam-space tree decoder with hard decision increase sharply to 1. This is because the number of parity bits added to sub-blocks is fixed, the max number of active users the system can serve is limited. Once beyond the limit, the decoders cannot recover any original message of the active users, thus , . As the beam-space tree decoder with hard decision exploits the beam division property, more active users can be served by the system. For the beam-space tree decoder with soft decision, the number of candidate sub-blocks to be kept is determined by the list numbers, not the parity bits. Therefore, the decoder is implemented successfully as the number of active users is sufficiently large. Besides, Fig. 8(b) shows that the missed detection rate of the tree decoder (beam domain) and the beam-space tree decoder with hard decision decreases slowly as the number of parity bits increases. This is because these two algorithms do not deal with the problem of packet loss. Besides, as the number of parity bits is increased, the discriminating power of the tree decoder is improved. Therefore, the false alarm rate of the tree decoder (beam domain) decreases, which is shown in Fig. 8(c). Since the beam-space tree decoders exploit beam resources to improve the discriminating power, there is no false alarm when .


Fig. 9 depicts the error probability of different URA schemes with different spectral efficiency when . The total spectral efficiency is calculated by . As the number of observations controls the spectral efficiency, the code length is set as the axis. It can be seen that as the spectral efficiency increases, decreases, and the error probability increases. The reason is that as fewer observations are obtained, the performance of activity detection and channel estimation decreases.
Next, we evaluate the decoding performance with different active users when the BS is equipped with different antennas and RF chains in Fig. 10. It can be observed that as the number of antennas and RF chains grows, the error probability decreases, and more active users can be served. The reason is that the BS can generate more narrow beams for the receive beamforming simultaneously, which means that the spatial resolution of the beams is improved, and the beam division property can be exploited completely.

Besides, Fig. 11 plots the increasing number of users and antennas together while keep a fixed ratio, i.e., . It can be observed that as the number of users and antennas increases, the error probability increases slowly. The reason is that although the number of users increases, more antenna array gain is obtained, and the beam division property is exploited. For the conventional tree decoder, as the beam division property is not exploited, the error probability increases more rapidly.
VIII Conclusion
An URA scheme with beam-space tree decoding under the framework of bit partition and slotted transmission was proposed in this paper. Specifically, we designed two beam-space tree decoders, which are based on hard decision and soft decision, respectively. Both of them exploit the intrinsic beam division property to improve the system performance and help the system serve more active users. Besides, the first decoder can reduce the solution searching space and has low complexity, while the second decoder exploits the advantage of list decoding to recover the miss-detected packets. Simulation results validated that our proposed URA scheme was superior with respect to error probability.
The beam division property is an intrinsic property in mmWave communication systems due to channel propagation. Therefore, this property exploited by our proposed decoders can also be exploited by other schemes under the scenarios of NGMA to help the system serve more users and improve the system performance.
References
- [1] C. Bockelmann, N. Pratas, H. Nikopour, K. Au, T. Svensson, C. Stefanovic, P. Popovski, and A. Dekorsy, “Massive machine-type communications in 5G: Physical and MAC-layer solutions,” IEEE Commun. Mag., vol. 54, no. 9, pp. 59–65, 2016.
- [2] H. Shariatmadari, R. Ratasuk, S. Iraji, A. Laya, T. Taleb, R. Jäntti, and A. Ghosh, “Machine-type communications: current status and future perspectives toward 5G systems,” IEEE Commun. Mag., vol. 53, no. 9, pp. 10–17, 2015.
- [3] Z. Chen, F. Sohrabi, and W. Yu, “Sparse activity detection for massive connectivity,” IEEE Trans. Signal Process., vol. 66, no. 7, pp. 1890–1904, 2018.
- [4] G. Durisi, T. Koch, and P. Popovski, “Toward massive, ultrareliable, and low-latency wireless communication with short packets,” Proc. IEEE, vol. 104, no. 9, pp. 1711–1726, 2016.
- [5] X. Chen, D. W. K. Ng, W. Yu, E. G. Larsson, N. Al-Dhahir, and R. Schober, “Massive access for 5G and beyond,” IEEE J. Sel. Areas Commun., vol. 39, no. 3, pp. 615–637, 2020.
- [6] Y. Liang, X. Li, J. Zhang, and Z. Ding, “Non-orthogonal random access for 5G networks,” IEEE Trans. Wireless Commun., vol. 16, no. 7, pp. 4817–4831, 2017.
- [7] Z. Zhang, X. Wang, Y. Zhang, and Y. Chen, “Grant-free rateless multiple access: A novel massive access scheme for Internet of Things,” IEEE Commun. Lett., vol. 20, no. 10, pp. 2019–2022, 2016.
- [8] K. Senel and E. G. Larsson, “Grant-free massive MTC-enabled massive MIMO: A compressive sensing approach,” IEEE Trans. Commun, vol. 66, no. 12, pp. 6164–6175, 2018.
- [9] S. Kim, H. Kim, H. Noh, Y. Kim, and D. Hong, “Novel transceiver architecture for an asynchronous grant-free IDMA system,” IEEE Trans. Wireless Commun., vol. 18, no. 9, pp. 4491–4504, 2019.
- [10] J. Wang, Z. Zhang, and L. Hanzo, “Joint active user detection and channel estimation in massive access systems exploiting Reed–Muller sequences,” IEEE J. Sel. Topics Signal Process., vol. 13, no. 3, pp. 739–752, 2019.
- [11] Y. Polyanskiy, “A perspective on massive random-access,” in IEEE Int. Symp. Inf. Theory (ISIT). IEEE, 2017, pp. 2523–2527.
- [12] M. R. Akdeniz, Y. Liu, M. K. Samimi, S. Sun, S. Rangan, T. S. Rappaport, and E. Erkip, “Millimeter wave channel modeling and cellular capacity evaluation,” IEEE J. Sel. Areas Commun., vol. 32, no. 6, pp. 1164–1179, 2014.
- [13] C.-K. Wen, S. Jin, K.-K. Wong, J.-C. Chen, and P. Ting, “Channel estimation for massive MIMO using Gaussian-mixture bayesian learning,” IEEE Trans. Wireless Commun., vol. 14, no. 3, pp. 1356–1368, 2014.
- [14] F. Bellili, F. Sohrabi, and W. Yu, “Generalized approximate message passing for massive MIMO mmwave channel estimation with laplacian prior,” IEEE Trans. Commun., vol. 67, no. 5, pp. 3205–3219, 2019.
- [15] C. Sun, X. Gao, S. Jin, M. Matthaiou, Z. Ding, and C. Xiao, “Beam division multiple access transmission for massive MIMO communications,” IEEE Trans. Commun., vol. 63, no. 6, pp. 2170–2184, 2015.
- [16] L. You, X. Gao, G. Y. Li, X.-G. Xia, and N. Ma, “BDMA for millimeter-wave/terahertz massive MIMO transmission with per-beam synchronization,” IEEE J. Sel. Areas Commun., vol. 35, no. 7, pp. 1550–1563, 2017.
- [17] R. Jia, X. Chen, Q. Qi, and H. Lin, “Massive beam-division multiple access for B5G cellular Internet of Things,” IEEE Internet Things J., vol. 7, no. 3, pp. 2386–2396, 2019.
- [18] L. Liu and W. Yu, “Massive connectivity with massive MIMO—Part I: Device activity detection and channel estimation,” IEEE Trans. Signal Process., vol. 66, no. 11, pp. 2933–2946, 2018.
- [19] L. Liu and W. Yu, “Massive connectivity with massive MIMO—Part II: Achievable rate characterization,” IEEE Trans. Signal Process., vol. 66, no. 11, pp. 2947–2959, 2018.
- [20] V. K. Amalladinne, J-F. Chamberland, and K. R. Narayanan, “A coded compressed sensing scheme for unsourced multiple access,” IEEE Trans. Inf. Theory, vol. 66, no. 10, pp. 6509–6533, 2020.
- [21] A. Fengler, P. Jung, and G. Caire, “SPARCs for unsourced random access,” IEEE Trans. on Inf. Theory, pp. 1–1, 2021.
- [22] A. Fengler, S. Haghighatshoar, P. Jung, and G. Caire, “Non-Bayesian activity detection, large-scale fading coefficient estimation, and unsourced random access with a massive MIMO receiver,” IEEE Trans. Inf. Theory, vol. 67, no. 5, pp. 2925–2951, 2021.
- [23] V. Shyianov, F. Bellili, A. Mezghani, and E. Hossain, “Massive unsourced random access based on uncoupled compressive sensing: Another blessing of massive MIMO,” IEEE J. Sel. Areas Commun., vol. 39, no. 3, pp. 820–834, 2020.
- [24] A. Decurninge, I. Land, and M. Guillaud, “Tensor-based modulation for unsourced massive random access,” IEEE Wireless Commun. Lett., vol. 10, no. 3, pp. 552–556, 2020.
- [25] A. Fengler, P. Jung, and G. Caire, “Pilot-based unsourced random access with a massive MIMO receiver, MRC and polar codes,” arXiv preprint arXiv:2012.03277, 2020.
- [26] X. Shao, X. Chen, D. W. K. Ng, C. Zhong, and Z. Zhang, “Cooperative activity detection: Sourced and unsourced massive random access paradigms,” IEEE Trans. Signal Process., vol. 68, pp. 6578–6593, 2020.
- [27] X. Gao, L. Dai, Z. Chen, Z. Wang, and Z. Zhang, “Near-optimal beam selection for beamspace mmwave massive MIMO systems,” IEEE Commun. Lett., vol. 20, no. 5, pp. 1054–1057, 2016.
- [28] B. Wang, L. Dai, Z. Wang, N. Ge, and S. Zhou, “Spectrum and energy-efficient beamspace MIMO-NOMA for millimeter-wave communications using lens antenna array,” IEEE J. Sel. Areas Commun., vol. 35, no. 10, pp. 2370–2382, 2017.
- [29] D.L. Donoho, A. Maleki, and A. Montanari, “Message-passing algorithms for compressed sensing,” Proc. Nat. Acad. Sci., vol. 106, no. 45, pp. 18914–18919, 2009.
- [30] J.P. Vila and P. Schniter, “Expectation-maximization Gaussian-mixture approximate message passing,” IEEE Trans. Signal Process., vol. 61, no. 19, pp. 4658–4672, 2013.
- [31] P. Li, L. Liu, K. Wu, and W.K. Leung, “Interleave division multiple-access,” IEEE Trans. Wireless Commun., vol. 5, no. 4, pp. 938–947, 2006.
- [32] I. Tal and A. Vardy, “List decoding of polar codes,” IEEE Trans. Inf. Theory, vol. 61, no. 5, pp. 2213–2226, 2015.
- [33] A. Fengler, G. Caire, P. Jung, and S. Haghighatshoar, “Massive MIMO unsourced random access,” arXiv preprint arXiv:1901.00828, 2019.