Professional Documents
Culture Documents
Liu 等。 - 2018 - Sparse Signal Processing for Grant-Free Massive Co
Liu 等。 - 2018 - Sparse Signal Processing for Grant-Free Massive Co
T
he next wave of wireless technologies will proliferate in
connecting sensors, machines, and robots for myriad new
applications, thereby creating the fabric for the Internet of
Things (IoT). A generic scenario for IoT connectivity involves
a massive number of machine-type connections, but in a typi-
cal application, only a small (unknown) subset of devices are
active at any given instant; therefore, one of the key challenges
of providing massive IoT connectivity is to detect the active
devices first and then decode their data with low latency. This
article advocates the usage of grant-free, rather than grant-
based random access schemes to overcome the challenge of
massive IoT access. Several key signal processing techniques
that promote the performance of the grant-free strategies are
outlined, with a primary focus on advanced compressed sens-
ing techniques and their applications for the efficient detection
of active devices. We argue that massive multiple-input, mul-
tiple-output (MIMO) is especially well suited for massive IoT
connectivity because the device detection error can be driven
to zero asymptotically in the limit as the number of antennas
at the base station (BS) goes to infinity by using the multiple-
measurement vector (MMV) compressed sensing techniques.
This article also provides a perspective on several related im
portant techniques for massive access, such as embedding
short messages onto the device-activity detection process and
Internet OF Things—istockphoto.com/Iaremenko
the coded random access.
circuits—image licensed by ingram publishing
Introduction
Wireless technology achievements in the past few decades are
providing people with unprecedented connectivity, and there is
growing interest in providing ubiquitous connectivity for ma-
chines and objects, many of which do not require interactions
with humans [1]. This is being driven by the rapid advance-
ment of the IoT, which will significantly impact the way we
live our lives, the way we conduct business, deliver education,
health care, and governmental services [2]. Typical IoT appli-
cations, as shown in Figure 1, include
1) smart health care in which the wearable devices transmit
continuous streams of accurate data to the cloud for better
Digital Object Identifier 10.1109/MSP.2018.2844952
Date of publication: 28 August 2018 care decisions
2) smart homes that enable home automation with the aid of Grant-based random access schemes
intelligent appliances, such as the smart speaker even when The common user access approach in cellular systems is to per-
the occupants are away from the home form grant-based random access using the dedicated random-
3) smart manufacturing that supports streamlined business access control channel so that the uncoordinated devices can
operations and optimized productivity in factories via contend for physical-layer resource blocks for data transmission
automatically collecting and analyzing data from the sen- [3], as illustrated in Figure 3. In the first stage, each active device
sors for making better-informed decisions to the actuators picks a random preamble, sometimes referred to as a pilot se-
(e.g., robotics) quence, from a predefined set of orthogonal preamble sequences
4) smart transportation in which the connected vehicles make to notify the BS that the user has become active. In the second
transportation itself more efficient and help us get from stage, the BS sends a response corresponding to each activated
place to place more quickly. preamble as a grant for transmitting in the next step. In the third
Targeting the emergence of the IoT, the fifth-generation cel- stage, each device that has received a response to its preamble
lular technologies road map has already identified massive transmission sends a connection request to demand resources
machine-type communications (mMTC) as one of the three for subsequent data transmission. In case a preamble has been
main use cases, along with enhanced mobile broadband and selected by a single device, the connection request of the device
ultrareliable, low-latency communications. is granted by the BS, which in turn sends a contention-resolution
The fundamental challenge of mMTC for the IoT is to message informing the device of the resources reserved for the
enable data transmission from a massive number of devices in pending data transmission. However, if two or more devices have
an efficient and timely manner. However, the key characteristic selected the same preamble in the first stage, their connection
of IoT traffic is that the device-activity patterns are typically requests collide. When the BS detects a collision, it does not re-
sporadic so that, at any given time, only a small and random ply with a contention-resolution message; rather, the affected de-
fraction of all devices are active (Figure 2). The sporadic traf- vices restart the random access procedure after a timer expires.
fic pattern may be because devices are often designed to sleep In the above procedure, the messages sent by the active devices
most of the time to conserve energy and are only activated in the first and third phases correspond to metadata since they
when triggered by external events, as is typically the case in belong to control information for establishing the connection
a sensor network. In these scenarios, the active users must be without containing any data information.
dynamically identified along with the reception of their data, This access mechanism is an example of the classic ALOHA,
which is a challenging task. which imposes a limit on the number of active devices that can
FIGURE 2. A typical IoT network with a massive number of devices, e.g., drones, smart watches, etc. Arising from the sporadic IoT data traffic, only a
subset of devices in the network are active at each time slot.
Device BS 100
1) Random Preamble 90
with Access to Networks
Number of Devices
80
2) Random Access Response
70
3) Connection Request 60
50
4) Contention Resolution
40
30
FIGURE 3. A grant-based random access procedure. Due to the lack of 100 200 300 400 500 600 700 800 900 1,000
coordination, collisions occur when two or more devices select the same Length of Preamble: L
pilot, prompting the need for new access attempts in this case.
Grant-Based Random
Access with Contention Resolution
Grant-Based Random
obtain the grant to access the network. Recently, extensive efforts Access Without Contention Resolution
have been devoted to different variations of the random access
schemes with advanced contention-resolution strategies [4], [5].
FIGURE 4. Grant-based random access with orthogonal pilots and captures.
However, due to the large number of collisions in the massive How many users can access the network?
IoT scenarios, still many users cannot access the network even if
some of the colliding connection requests could be resolved, as
shown in Example 1. the scenario in which the contention resolution is not per-
formed and the scenario in which (if) there is a collision, the
Example 1 BS can always grant access to one of the colliding devices
Consider a cellular network consisting of one BS and 2,000 (this could happen because of the capture effect in random
users. Let L denote the length (and thus the number) of the access networks). Under this setup, the average numbers of
orthogonal preambles available for the devices from which devices that are granted permission to access the network for
to choose. Assume that in each time slot 100 of these 2,000 both the cases with and without contention resolution, versus
devices are active, with each active device picking one of the the different values of L are plotted in Figure 4. The plot is
L orthogonal pilots at random. The coherence bandwidth and obtained by Monte Carlo simulations. To guarantee a 90%
the coherence time of the wireless channel are 1 MHz and success rate, at a minimum L = 470 and L = 930 out of
1 ms, respectively; therefore in each coherence block, 1,000 1,000 symbols are needed, respectively, as pilots for the cases
symbols can be transmitted. Moreover, we assume that both with and without contention resolution.
+ ~E 8 h t, n (X n + x t Vn) - X n B . (8)
2
2 v 2
x t +1 = 0.2
p
ηt,n(xtn)
"
regime, [16] shows that applying the denoiser to (r t) H a n + x tn 0
in (5) is statistically equivalent to applying the denoiser to Xt tn,
as shown in (7). –0.1
The statistical model of AMP as given in (7) and (8) can be
–0.2
utilized to design the denoiser functions h t, n ($)\s in (5) and to
quantify the performance of the AMP algorithm.
–0.3
–0.3 –0.2 –0.1 0 0.1 0.2 0.3
Minimax framework for denoiser designs xtn
"
The flexibility in the AMP algorithm design lies in the denois-
er h t, n ($) in (5). In the AMP literature, the prior distribution MMSE Denoiser: tt = 0.01
of x is generally assumed to be unknown. In this case, the MMSE Denoiser: tt = 0.03
Soft-Thresholding Denoiser: θtn = 0.01
denoiser h t, n ($) is designed under the minimax framework to
Soft-Thresholding Denoiser: θtn = 0.03
optimize the AMP algorithm performance for the worst-case
or least-favorable distribution of x [18]. Such a design leads to
a soft-thresholding denoiser for promoting sparsity even for x FIGURE 6. An MMSE denoiser versus a soft-thresholding denoiser in the
with the worst-case distribution [8]: AMP algorithm.
h t, n (xt n) = e xt n - o I ` xt n 2 i n j, (9)
t t
t t i n xt n t t
xt tn and has a complicated form. Similar to the soft-thresholding
denoiser case, with the MMSE denoiser (10), we can detect the
where the distribution of xt tn is captured by Xt tn, and i tn 2 0 is user activity based on whether the magnitude of (r t) H a n + x tn
the threshold for device n for the tth iteration of the AMP al- is larger than or smaller than a carefully designed threshold i tn .
gorithm, which can be optimized based on the state evolution A comparison between the soft-thresholding and MMSE
(8) to minimize the MSE as given in (4). With this denoiser, denoisers with a Bernoulli–Gaussian distributed x is given
after the tth iteration of the AMP algorithm as shown in (5) and in Figure 6. The MMSE denoiser is also a thresholding-based
(6), device n is declared to be active if (r t) H a n + x tn 2 i tn, and denoiser, but softer around the regime near the threshold.
declared to be inactive otherwise. Note that AMP with soft- Moreover, the threshold for the MMSE denoiser is obtained by
thresholding implicitly solves the least absolute shrinkage and calculating (10) to minimize the MSE (4), while the design of
selection operator (LASSO) problem [18], i.e., the sparse signal- the threshold for the soft-thresholding denoiser follows a mini-
recovery problem as an , 1-penalized least squares optimization. max framework, which is not optimal given the distribution of
x in general.
Bayesian framework for denoiser design
On the other hand, if the distribution of x is known in (2), Analytical performance characterization
we can design the minimum MSE (MMSE) denoiser via the The state evolution also allows an analytical performance char-
Bayesian approach to minimize the MSE for the estimation of acterization of the AMP algorithm. For example, with both the
x as given in (4) [18]. Considering the equivalent signal model soft-thresholding and MMSE denoisers, a missed-detection
(7), the MMSE denoiser is given as the following condi- event happens if one user is active but (r t) H a n + x tn 1 i tn,
tional expectation: while a false-alarm event happens if one user is inactive but
(r t) H a n + x tn 2 i tn . Since xt tn defined in (7) captures the sta-
h t, n (xt n) = E 8X n X
t n = xt nB,
t t t
6t, n, (10) tistical distribution of (r t) H a n + x tn, the probabilities of missed
detections and false alarms for device n after the tth iteration
where the expectation is over X n and Xt tn . of the AMP algorithm thus can be expressed as
For example, if we assume a Rayleigh fading channel such
that h n ~CN (0, b n), where b n denotes the path-loss and shad- P tMD
, n = Pr (xt tn 1 i tn | a n = 1), (11)
FA
owing component of user n and is assumed to be known by the P t, n = Pr (xt tn 2 i tn | a n = 0), (12)
BS, then the effective channel x n = a n h n follows a Bernoulli–
Gaussian distribution. Under this particular distribution of x, respectively.
an analytical expression of the previously mentioned MMSE Given the distribution of x and denoiser h t, n ($), we can
denoiser can be found in [14], which is generally nonlinear track the values of x t \s over all of the iterations based on the
0.35
From single-measurement vector to MMV:
0.3 Massive MIMO for massive IoT connectivity
0.25 As compared to most other applications of compressed sens-
ing such as imaging, a unique and essential opportunity pro-
0.2 vided by the wireless massive IoT connectivity system design
0.15 lies in the potential for utilizing the MMV technique for com-
pressed sensing [11], thanks to the multiantenna technologies
0.1
used today in cellular networks. The previous section deals
0.05 with the application of compressed sensing technique for user
activity detection when the BS is equipped with one antenna.
0
100 150 200 250 300 350 400 450 500 With regard to compressed sensing, the case with one mea-
Pilot Sequence Length: L surement vector is referred to as a single-measurement vec-
P FA = P MD: MMSE Denoiser
tor (SMV) problem. As a revolutionary technology, massive
P FA = P MD: Soft-Thresholding Denoiser
MIMO has recently emerged for dealing with the future data
deluge for human-type communications. In this section, we
show that massive MIMO is also a natural solution for accom-
FIGURE 7. The probabilities of missed detections and false alarms versus modating a huge number of IoT devices for future MTC. From
pilot sequence length L.
the compressed sensing perspective, device-activity detection
in massive MIMO systems corresponds to the MMV prob-
state evolution (8), then calculate the probabilities of missed lem, which generalizes the sparse signal-recovery problem to
detections and false alarms based on (11) and (12). the case with a group of measurement vectors for a group of
signal vectors that are assumed to be jointly sparse and share
Example 2 a common support. It is of both theoretical and practical im-
Here we provide a numerical example to show the probabil- portance to investigate the role of massive MIMO on massive
ities of missed detections and false alarms achieved by the IoT connectivity.
AMP algorithm under the same setup that is used in Example Suppose that the BS is equipped with M antennas. In this
1. The N = 2, 000 devices are assumed to be randomly located case, the channel from user n to the BS is h n ! C M # 1. Then,
in a cell with a radius of 1,000 m, while each device accesses the signal model given in (2) is generalized to
the channel with an identical probability e n = 0.05, 6n , i.e.,
e = 0.05 and K = 100 of the N = 2, 000 devices are active Y = p AX + Z, (13)
at any given time. The transmit power of each user for sending
its pilot is t pilot = 23 dBm. The power spectral density of the where Y ! C L # M is the matrix of received signals across M
AWGN at the BS is assumed to be −169 dBm/Hz. Moreover, antennas over L symbols, X = [x 1, f, x N ] T with x n = a n h n
we define the system-level missed-detection and false-alarm denoting the effective channel of user n, and Z = [z 1, f, z M]
probabilities as P MD = R nN= 1 P nMD /N and P FA = R nN= 1 P nFA /N, with z m ~ CN (0, v 2 I), 6m is the independent AWGN at
where P nMD and P nFA denote the missed-detection and false- the BS.
alarm probabilities of device n achieved by AMP after its As compared to the SMV signal model (2), the main differ-
convergence. Hence, eNP MD and (1 - e) NP FA are the av- ence lies in the fact that X in (13) is a row-sparse matrix, i.e., if
erage numbers of missed-detection and false-alarm events one entry of one particular row of A is zero, the other entries of
at each time slot in a system with N devices. In addition, that row must be also zero. This information can be utilized to
under both the soft-thresholding and MMSE-based AMP al- improve the user-detection accuracy. A comparison between the
gorithms, the thresholds i tn\s are carefully selected so that SMV model (2) and MMV model (13) is illustrated in Figure 8.
P MD = P FA. Next, we discuss how to generalize the AMP-based algorithm
Figure 7 shows the device-activity detection accuracy shown in the “AMP-Based Device Activity Detection” section
achieved by the AMP algorithm with the soft-thresholding so that it can be used in the massive MIMO scenario. We also
denoiser and the MMSE denoiser. With the MMSE denois- quantify the algorithm’s significant improvement in device
er, 90% active devices can be detected with the AMP algo- activity detection accuracy over the single-antenna BS case.
rithm when the length of pilot sequence satisfies L > 220.
Recall that in Example 1 of the random access scheme, such Algorithm design
a performance can be achieved only when the pilot sequence With massive MIMO at the BS, the user’s pilot sequence as-
length is longer than 470 even if contention resolution is signment still follows (3), which is the same as the case with
performed. Moreover, with a careful design of the MMSE one antenna at the BS. However, the AMP algorithm is modi-
denoiser, the MMSE denoiser-based AMP algorithm outper- fied as [12]
N
As compared to (5) and (6), the dimensions of the signals
are now x tn ! C M # 1 and R t ! C L # M; moreover, the denoiser
is a mapping in higher dimension, i.e., h t, n ($) : C M # 1 " C M # 1 . (a)
The state evolution of the AMP algorithm still holds for
MMV in the asymptotic regime that L, K, N " 3 with fixed
ratios N/L " ~ and K/N " e. Specifically, define [12] L = +
1
M N
Xt tn = X n + / t Vn, (16)
2
(b)
where the random vector X n captures the distribution of
x n, Vn ! CN (0, I ) is the independent Gaussian noise, and R t FIGURE 8. (a) An SMV-compressed sensing problem and (b) an MMV-
can be tracked over iterations as compressed sensing problem. Group sparsity provides additional
information about X because if one entry is zero, the other entries on the
2
same row should be also zero.
/ t + 1 = vp I + ~E
H
# ;c h t, n c X n + / 2 Vn m - X nm ch t, n c X n + / 2 Vn m - X n m E .
1 1
10–1
t t
Activity Detection Error Probability
(17) 10–2
Here, the expectation is over X n\s and Vn\s over all of n. 10–3
Then, in (14), applying the denoiser to (R t) H a n + x tn is statisti-
cally equivalent to applying the denoiser to 10–4
1
10–5
xt tn = x n + / t v n, (18)
2
P FA(M ) = P MD(M ): M = 16
10–6 P FA(M ) = P MD(M ): M = 32
where the distributions of xt tn and v n are captured by Xt tn P FA(M ) = P MD(M ): M = 64
10–7
and Vn. 80 85 90 95 100 105 110 115 120
Based on the above state evolution (18), denoisers of the Pilot Sequence Length: L
MMV-based AMP algorithm can be designed based on dif-
ferent criteria as for the SMV case. For example, the soft- FIGURE 9. The probabilities of missed detections and false alarms versus
thresholding denoiser is pilot sequence length L with massive MIMO.
t n) = e xt n - o I ` xt n 2 i tn j, (19)
t t
t t in x
tn t AMP algorithm, denoted by P tMD FA
, n (M) and P t, n (M) (reducing
h t, n (x 2
xt tn to (11) and (12) when M = 1), are characterized in [6]. Interest-
ingly, perfect device-activity detection is achieved in the as-
Furthermore, assuming Bernoulli–Gaussian distributed x n\s, ymptotic regime of M " 3 if the thresholds for device detec-
the MMSE denoiser tion, i.e., i tn\s, are properly selected (c.f. [6, Th. 4]):
t n) = E 8X n Xt n = xt nB (20)
t
h t, n (x
t t
lim P tMD FA
, n (M) = lim P t, n (M) = 0, 6t, n. (21)
M"3 M"3
is characterized in [6]. With both the soft-thresholding and This important result implies that in a massive MIMO system,
MMSE denoisers, after the tth iteration of the AMP algorithm, in which M can be larger than 100, the AMP-based grant-free
user n can be declared to be active if (R t) H a n + x tn 2 2 i tn , access scheme is able to detect device activity with extremely
and declared to be inactive otherwise, where i tn is the carefully high accuracy in the massive IoT connectivity systems.
designed threshold for device detection.
Example 3
Asymptotically perfect device-activity detection Here we provide a numerical example to show the power of mas-
Fix the number of antennas at the BS, M, the missed-detection sive MIMO for massive IoT connectivity under the same setup
and false-alarm probabilities from the MMSE denoiser-based that is used in Examples 1 and 2. Figure 9 shows the probabilities
a n, i = '
possible strategy and for short blocks, block codes with low- 1, if user n is active and its ith pilot is used,
(23)
coding gains must be used. Second, as only error probability 0, otherwise.