Next Article in Journal
Stock Market Forecasting Based on Spatiotemporal Deep Learning
Next Article in Special Issue
Age of Synchronization Minimization Algorithms in Wireless Networks with Random Updates under Throughput Constraints
Previous Article in Journal
Multifractality of Complex Networks Is Also Due to Geometry: A Geometric Sandbox Algorithm
Previous Article in Special Issue
Lossy State Communication over Fading Multiple Access Channels
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Design of Multi-User Noncoherent Massive SIMO Systems for Scalable URLLC

1
School of Information Science and Engineering, Shandong University, Qingdao 266237, China
2
Department of Information Engineering, The Chinese University of Hong Kong, Shatin, NT, Hong Kong SAR, China
3
Department of Electrical and Computer Engineering, McMaster University, Hamilton, ON L8S 4K1, Canada
*
Author to whom correspondence should be addressed.
J.-K. Zhang (Deceased).
Entropy 2023, 25(9), 1325; https://doi.org/10.3390/e25091325
Submission received: 7 August 2023 / Revised: 24 August 2023 / Accepted: 25 August 2023 / Published: 12 September 2023
(This article belongs to the Special Issue Advances in Multiuser Information Theory)

Abstract

:
This paper develops and optimizes a non-orthogonal and noncoherent multi-user massive single-input multiple-output (SIMO) framework, with the objective of enabling scalable ultra-reliable low-latency communications (sURLLC) in Beyond-5G (B5G)/6G wireless communication systems. In this framework, the huge diversity gain associated with the large-scale antenna array in the massive SIMO system is leveraged to ensure ultra-high reliability. To reduce the overhead and latency induced by the channel estimation process, we advocate for the noncoherent communication technique, which does not need the knowledge of instantaneous channel state information (CSI) but only relies on large-scale fading coefficients for message decoding. To boost the scalability of noncoherent massive SIMO systems, we enable the non-orthogonal channel access of multiple users by devising a new differential modulation scheme to ensure that each transmitted signal matrix can be uniquely determined in the noise-free case and be reliably estimated in noisy cases when the antenna array size is scaled up. The key idea is to make the transmitted signals from multiple geographically separated users be superimposed properly over the air, such that when the sum signal is correctly detected, the signal sent by each individual user can be uniquely determined. To further enhance the average error performance when the array antenna number is large, we propose a max–min Kullback–Leibler (KL) divergence-based design by jointly optimizing the transmitted powers of all users and the sub-constellation assignments among them. The simulation results show that the proposed design significantly outperforms the existing max–min Euclidean distance-based counterpart in terms of error performance. Moreover, our proposed approach also has a better error performance compared to the conventional coherent zero-forcing (ZF) receiver with orthogonal channel training, particularly for cell-edge users.

1. Introduction

Driven by the relentless growth of wireless data traffic over the past four decades, modern wireless communication systems (from 2G to nowadays 5G) have been consistently engineered and developed, with the objective of providing better mobile broadband services, aiming to provide subscribers with ever-higher data rates. The trend is envisioned to continue in Beyond-5G (B5G)/6G [1,2].
Moreover, with the grand ambition of offering connectivity to anything that may benefit from being connected, 5G cellular systems support two new service categories in addition to the conventional mobile broadband one: massive machine-type communication (mMTC) [3] and ultra-reliable low-latency communication (URLLC) [4], which will still be key features for future 6G systems [5,6,7].
The mMTC service refers to providing wireless connectivity for a massive number (tens of thousands) of low-cost and low-energy machine-type devices (MTDs) in a relatively large area. The mMTC can find potential applications in smart metering, smart agriculture, logistics, fleet management, etc. The traffic of these applications is characterized as massive yet sporadic small-packet transmissions that require the support of high-spectrum efficiency and network scalability. Furthermore, the network maintenance cost can be huge due to the large amount of nodes. As such, ultra-high energy efficiency is expected to achieve long battery lifetimes in MTDs. On the other hand, URLLC is a service category that is not present in today’s mobile systems, which target mission-critical applications, requiring low end-to-end latency with high reliability. Examples include fault detection and isolation in power systems, detection and responses to hazardous road conditions, self-driving vehicles, remote surgery, smart factories, and augmented reality.
Nevertheless, with the continuing deployment of 5G cellular systems, in practice, it gradually becomes clear that the current 5G system cannot fulfill the promised vision of being an enabler for the “Internet of Everything”, especially the most innovative URLLC part, due to its inherent limitations [1]. While the enormous network capacity growth is achievable through conventional methods of moving to higher parts of the radio spectrum and network densification, realizing URLLC will involve a departure from the underlying theoretical principles of wireless communications. More specifically, the coupling and contradictory requirements of low latency and high reliability render the design of URLLC systems challenging, since wireless channels are highly dynamic and are susceptible to fading, interference, blockage, and high path losses, especially when there are many moving devices, metallic reflectors, and electromagnetic radiation equipment [8,9,10,11,12]. Such design challenges will be further escalated to provide the envisioned scalable URLLC (sURLLC) services in wireless systems beyond 5G. As defined in [1], sURLLC will scale the 5G URLLC across the device dimension by seamlessly integrating 5G URLLC with legacy mMTC. In sURLLC, the augmented triple reliability–latency–scalability trade-off will need to be carefully dealt with, which calls for a totally new design framework.
In wireless communications, channel diversity, which refers to a measure of transmitting multiple copies of the same information through independent links along different time/frequency/spatial axes, is one of the most important techniques for boosting system reliability by effectively combating channel fading and interference [13]. As the diversity order increases, wireless channels will gradually become more stable, and the chance of requesting retransmissions from the receiver side will correspondingly decrease [9]. However, in realizing sURLLC, time diversity is not preferred since achieving time diversity is at the cost of additional delay, especially in slow-fading channels. Moreover, delivering the information along distinct frequency channels will consume additional bandwidth, which is costly for operations under 6 GHz, where the frequency band has already been overcrowded [14]. Thus, harnessing the spatial diversity by deploying multiple antennas at the transmitter and/or receiver side is the most appealing solution, and there have been extensive studies on various diversity technologies for conventional MIMO systems; see, e.g., [15,16] and references therein.
Recently, massive multiple-input multiple-output (MIMO) technology [17], which scales up the conventional MIMO by deploying a large number of antennas at the transmitter and/or receiver side, is regarded as an indispensable building block for ensuring ultra-high reliability [9].  Massive MIMO has already been an integrating part of 5G communications due to its great potential [18,19]. The main advantages of massive MIMO include its high array gain, high spatial multiplexing gain, and immunity to fast fading in rich-scattering environments. The fluctuations of wireless channels can be averaged out in massive MIMO, and high reliability can be maintained for short packets without the need for strong channel coding. Despite the advantages mentioned above, the mechanisms of leveraging massive MIMO for realizing sURLLC are still largely unexplored.
The reliability and latency gains associated with massive MIMO systems critically depend on the acquisition of the instantaneous channel state information (CSI) [20]. In conventional communication systems, the estimation of instantaneous CSI is commonly achieved by transmitting certain known pilot symbols that are orthogonal to different users, where the channel estimation overhead is relatively low compared with the long data payload. However, the packets in sURLLC applications are typically very short and, thus, the overhead induced by channel estimation becomes non-negligible and will reduce the effective transmission rate significantly [8]. Moreover, sending pilots will cause significant delays in short-packet communications, especially over fast-fading channels where the pilot symbols need to be dense in the time-frequency grid. As a matter of fact, obtaining instantaneous CSI is one of the most severe limiting factors to exploiting the full potential of massive MIMO, where the latency introduced by the channel estimation in massive MIMO constitutes a major barrier to meeting the extreme delay requirement [9]. To reduce latency in massive MIMO, the transmission protocol should rely as little as possible on the channel knowledge of small-scale fading [9]. Nevertheless, the knowledge of channel statistics remains crucial to provide high-reliability requirements, especially when the precise knowledge of instantaneous CSI is not available. Noncoherent detection, where no instantaneous CSI is required, can be the key supporting asset for low-latency applications. It was shown in [21] that noncoherent transmission is more energy-efficient than pilot-assisted transmission schemes, even when the number of pilot symbols and their power are optimized.
We note that there have been considerable efforts in designing single-user noncoherent massive single-input multiple-output (SIMO) systems, see e.g., [22,23,24,25,26,27,28], which demonstrate that a simple energy-based modulation and detector can be sufficient for reliable detection by leveraging the massive number of antennas. By considering the single-user scenario, these works implicitly assume that an orthogonal multiple access (OMA) mechanism (e.g., time-division multiple access) has been adopted at the data link layer to support the co-existence of multiple users. However, OMA mechanisms normally have poor scalability—the channel access latency scales up linearly as the number of end-devices increases, and, thus, are no longer suitable for the more challenging sURLLC applications with a large number of forecasted devices. One effective solution to address this scalability issue is to break the orthogonality of existing OMA protocols and empower a new non-orthogonal and noncoherent massive MIMO (nn-mMIMO) framework. It is worth mentioning here that non-orthogonal multiple access (NOMA) has recently received tremendous attention from the mobile communication research community as a promising technology for 5G cellular system, see a recent comprehensive survey [29], where the primary goal of applying NOMA is to boost spectral efficiency and user fairness. Existing NOMA solutions along this research line normally require the estimation of instantaneous CSI, such that the optimization of power allocation/control for different signal streams can be conducted at the transmitter side and successive interference cancellation can be implemented for detecting multiple user signals at the receiver side. These NOMA solutions are, thus, not applicable anymore for nn-mMIMO-enabled sURLLC applications.
Enabling NOMA in massive MIMO is straightforward when the instantaneous CSI is available, which can be achieved by applying spatial division multiple access (SDMA). However, how to support the non-orthogonal access of multiple users at the same time in noncoherent massive MIMO systems is a non-trivial task as beamforming techniques cannot be used anymore. Very recently, a new constellation domain-based NOMA methodology, with the objective of enabling nn-mMIMO, was developed in [30,31,32,33], which allows the simultaneous channel access of multiple devices at the data link layer without the availability of instantaneous CSI at the physical layer. However, all the designs in [30,31,32,33] only considered one-shot communications (i.e., the received signal is decoded in a symbol-by-symbol manner). As such, the phase information of the transmitted signals is lost at the receiver side and, thus, only unipolar PAM constellations can be used, which largely limits the system reliability performance as the number of devices increases.
In regard to enabling sURLLC, in this paper, we develop a new nn-mMIMO framework that can perform joint noncoherent detection of the uplink signals from multiple devices over more than one time slot, where the transmitted signals are allowed to use the more robust QAM constellations. The main contributions of this paper are two-fold:
Firstly, we apply a noncoherent maximum likelihood (ML) receiver, which relies only on the second-order channel statistics, and no instantaneous CSI is needed at either the transmitter or receiver sides. For the considered ML receiver, we systematically design a uniquely factorable multi-user space-time modulation (UF-MUSTM) scheme to enable the concurrent transmission of multiple devices to a noncoherent receiver equipped with a large number of antennas. We further identify the necessary and sufficient conditions for the receiver to recover the transmitted signals from all users. Note that our design connects to the conventional space-time code design. To date, most of the existing space-time code designs, such as [16,34,35,36], considered point-to-point MIMO systems, where all the transmitting antennas are connected to the same transmitter; hence, the transmitted information-carrying signals are accessible by all the antennas. However, in our considered UF-MUSTM-based nn-mMIMO system, the signals transmitted from different users are not allowed to fully collaborate, which dramatically limits the codebook design. Particularly, the widely used unitary space-time code design is, in general, intractable for the considered multi-user massive MIMO system.
Secondly, we further optimize the proposed design framework by jointly designing the constellations of multiple users. We note that the performance analysis for the non-unitary codeword of MUSTM is extremely challenging, if not possible, as shown in [34,35]. Confronting such a challenge, we propose a max–min Kullback–Leibler (KL) divergence-based design criterion, where we jointly optimize the transmit powers of all users and the sub-constellation assignments among them. Note that the basic idea of this paper was presented in the conference version [37], where we only consider the simple scenario where all users adopt 4-QAM. In this paper, we expand the design to a more general scenario where all users can utilize larger QAM, not necessarily of the same orders. This introduces added complexity to the optimization problem, making it more challenging to solve. We manage to resolve the formulated optimization problem in closed form. Simulations are provided to demonstrate the superiority of the proposed design over the benchmarking schemes.
The remainder of this paper is organized as follows. In Section 2, we describe the system model, the noncoherent detector, as well as the signal design. The design and optimization of the proposed UF-MUSTM framework are elaborated in Section 3. Simulations are conducted and the corresponding results are discussed in Section 4. The conclusions are drawn in Section 5.

2. System Model, Noncoherent Detector, and Signal Design

2.1. System Model and Noncoherent ML Detector

We consider a massive MIMO system, consisting of K single-antenna users transmitting simultaneously to a base station (BS) with M ( M K ) receiving antennas on the same time-frequency grid. By using a discrete-time complex baseband-equivalent model, the received signal at the antenna array of BS in the t-th time slot (each time slot refers to one symbol duration throughout this paper), is defined as y t = [ y 1 , t , , y M , t ] T , can be expressed by
y t = H x t + ξ t ,
where x t = [ x 1 , t , , x K , t ] T represents the transmitted signals from all K users, ξ t is an additive circularly symmetric complex Gaussian (CSCG) noise vector with covariance σ 2 I M . We let H = G D 1 / 2 denote the M × K complex channel matrix between the receiver antenna array and all users, where G characterizes the small-scale fading caused by local scattering while D = diag { β 1 , , β K } with β k > 0 capturing the propagation loss due to distance and shadowing. All the entries of G are assumed to be i.i.d. complex Gaussian distributed with zero mean and unit variance. The channel coefficients are assumed to suffer from block fading, which are quasi-static in the current block and change to other independent values in the next block with a channel coherence time T c K . We consider a space-time block modulation (STBM) [35] scheme over T time slots and the received signal vectors can be stacked together into a matrix form given by
Y T = H X T + Ξ T ,
where Y T = [ y 1 , , y T ] , X T = [ x 1 , , x T ] , and Ξ T = [ ξ 1 , , ξ T ] .
Assumption 1.
Throughout this paper, we adopt the following assumptions:
1.
The small-scale channel fading matrix G is completely unknown to the BS and all the users, while the large-scale fading matrix D is available at the BS, which will be leveraged to optimize the system performance;
2.
The transmitted signals are subject to an instantaneous average power constraint (note that our design can be directly extended to the case with the peak power constraint): E { | x k , t | 2 } P k , k = 1 , , K , t = 1 , , T . For convenience, we assume that the users are labeled in ascending order with P 1 β 1 P K β K .
In this work, we apply a noncoherent ML detector, which is optimal for uniformly distributed discrete input signals in terms of error probability. We note that (2) can be reformulated as Y T H = X T H D 1 / 2 G H + Ξ T H . With the help of [38], the vectorized form of the received signal can then be written as
y = vec ( Y T H ) = ( I M X T H D 1 / 2 ) vec ( G H ) + vec ( Ξ T H ) .
As all the entries of G and Ξ are i.i.d. CSCG, we immediately have E [ y ] = 0 , and the covariance matrix of y can be calculated as R y | X T = E [ y y H ] = I M ( X T H D X T + σ 2 I T ) . The conditional distribution of the received signal y at BS for any transmitted signal matrix X T can then be given by p ( y | X T ) = 1 π K M det ( R y | X T ) exp ( y H R y | X T 1 y ) , where R y | X T = I ( X T H D X T + σ 2 I T ) . The noncoherent ML detector can estimate the transmitted information-carrying matrix from the received signal vector y by resolving the following optimization problem:
X ^ T = arg min X T y H R y | X T 1 y + log det ( R y | X T ) .
From (3), we can observe that the detector relies on the sufficient statistics of the transmitted signal matrix R y | X T = I ( X T H D X T + σ 2 I T ) . The detailed discussion regarding the signal design is given in the following subsection.

2.2. Unique Identification of the Transmitted Signal Matrix

In this subsection, we first identify what conditions the transmitted signal matrix must satisfy to ensure the unique identification of the transmitted signal matrix X T . We can observe from (3) that, to achieve reliable communication between all users and the BS in the considered nn-mMIMO system, the BS must be able to uniquely determine each transmitted signal matrix X T once R = X T H D X T is identified, which can be formally stated as follows:
Proposition 1.
For the multi-user nn-mMIMO system described in (2) reliable communications necessitate the following condition for the transmitted signal matrix selected from M K × T C K × T . If and only if there exist any two signal matrices X T , X ˜ T M K × T satisfying X T H D X T = X ˜ T H D X ˜ T , then we have  X T = X ˜ T .
The proof is provided in Appendix A.1. Inspired by Proposition 1, to facilitate our system design, we introduce the concept of uniquely factorable multi-user space-time modulation (UF-MUSTM), the formal definition of which is given as follows:
Definition 1.
A multi-user space-time modulation codebook S K × T C K × T is said to form a UF-MUSTM codebook if for any pair of codewords S , S ˜ S K × T satisfying S H S = S ˜ H S ˜ , we have  S = S ˜ .
Definition 1 motivates us to design a UF-MUSTM codebook for the considered nn-mMIMO system. Therefore, our primary task in the rest of this paper is to develop a new framework for a systematic design of such a UF-MUSTM S K × T .
Before proceeding, it is worth clarifying that the UF-MUSTM code design is fundamentally different from the existing noncoherent space-time code/modulation designs. Specifically,
  • For the considered UF-MUSTM-based nn-mMIMO system, the signals transmitted from different users cannot fully collaborate; hence, the widely used unitary space-time code design is intractable for the considered system. This is fundamentally different from most conventional space-time code designs for the point-to-point MIMO system, where all transmitting antennas are connected to the same transmitter [16,35]. Note that the error performance analysis of the non-unitary codeword of MUSTM is very challenging, as shown in [34].
  • Our design is asymptotically optimal when the number of BS antennas goes to infinity while keeping the transmitted power fixed. This is in contrast to most previous space-time coding designs, which considered the asymptotic regime with the signal-to-noise ratio (SNR) going to infinity [34,35,36].

3. Design and Optimization of UF-MUSTM Framework

In this section, we present a UF-MUSTM framework with a slot-by-slot noncoherent ML detector. We find that when the number of receiving antennas increases, the pairwise error probability (PEP) between two codewords will be dominated by the KL divergence between them. Motivated by this fact, a max–min KL divergence design criterion is proposed to optimize the transmit powers of all users and the sub-constellations assignment among them.

3.1. KL Divergence between Transmitted Space-Time Modulation Codewords

In practice, the computational complexity of the optimal noncoherent ML detector described in (3) could be prohibitively high. Furthermore, the error performance analysis results available for the block transmission with general block size and ML receiver are too complicated to reveal insightful results for the input codeword design and the corresponding power allocation [34]. To resolve these problems and reduce the receiver complexity, our main objective is to input a small block size into the ML receiver. If only one time slot is involved in the ML detector given in (3), i.e., when T = 1 , the correlation matrix R = X T H D X T degenerates into a real scalar x 1 H D x 1 = k = 1 K β k | x k , 1 | 2 , where the phase information of the transmitted symbols is lost and information bits from all users can only be modulated on the amplitudes of the transmitted symbols. Such a design typically has a low spectral efficiency [22,23,30]. To improve the spectrum efficiency by allowing constellation with phase information being transmitted by all users, we need to feed the signals received in at least two time slots into the ML decoder [34,35,39].
As an initial attempt, in this paper, we focus on a slot-by-slot ML detection over the first and t-th time slots, which is similar to the differential modulation with hard-decision-based noncoherent multi-user detection. More specifically, we let the transmitted signal matrix be X T = [ x 1 , , x T ] . For detection purposes, we now stack the transmitted signal of the first and the t-th time slot as X t = [ x 1 , x t ] , and then make the decision on Y t = [ y 1 , y t ] by using (3). For simplicity, we consider the transmitted signal from the first and second time slots, i.e., X 2 = [ x 1 , x 2 ] , hereafter, and the case of X t follows similarly. We denote R y | X 2 = I R 2 , in which
R 2 = X 2 H D X 2 + σ 2 I 2 = x 1 H D x 1 + σ 2 x 1 H D x 2 x 2 H D x 1 x 2 H D x 2 + σ 2 .
By (4), we have
R 2 1 = 1 ( x 1 H D x 1 + σ 2 ) ( x 2 H D x 2 + σ 2 ) | x 1 H D x 2 | 2 x 2 H D x 2 + σ 2 x 1 H D x 2 x 2 H D x 1 x 1 H D x 1 + σ 2 .
As a consequence, the ML receiver can be reformulated as follows
X ^ 2 = arg min X 2 y H R y | X 2 1 y + log det ( R y | X 2 ) = arg min X 2 ( x 1 H D x 1 + σ 2 ) y 2 2 + ( x 2 H D x 2 + σ 2 ) y 1 2 2 ( x 1 H D x 2 y 2 H y 1 ) ( x 1 H D x 1 + σ 2 ) ( x 2 H D x 2 + σ 2 ) | x 1 H D x 2 | 2 + M ln ( x 1 H D x 1 + σ 2 ) ( x 2 H D x 2 + σ 2 ) | x 1 H D x 2 | 2 ,
where y 1 and y 2 are the received signal vectors in the first and second time slots, respectively. It can be observed that the diagonal entries in (4) are x 1 H D x 1 = k = 1 K β k | x k , 1 | 2 and x 2 H D x 2 = k = 1 K β k | x k , 2 | 2 , in which the phase information is lost, while the off-diagonal term is x 1 H D x 2 = k = 1 K β k x k , 1 * x k , 2 = k = 1 K β k | x k , 1 | | x k , 2 | exp j arg ( x k , 2 ) j arg ( x k , 1 ) , indicating that we can transmit a known reference signal vector x 1 in the first time slot and then transmit the information-bearing signal vector x 2 to imitate a “differential-like” transmission [40]. The exact PEP is extremely hard to evaluate for the matrix X 2 given above. Moreover, the exact expression for the PEP does not seem to be tractable for further optimization. Inspired by the Chernoff–Stein Lemma, when the number of receiver antennas M goes to infinity, the PEP will go to zero, exponentially, where the exponent is determined by the KL divergence [35]. Hence, we propose using the KL divergence between the conditional distributions of the received signals for different inputs as the design criterion, thanks to its mathematical tractability.
We now derive the KL divergence between the received signals induced by the transmitted signals matrices X 2 = [ x 1 , x 2 ] and X ˜ 2 = [ x ˜ 1 , x ˜ 2 ] , which is also the expectation of the likelihood function between two received signal vectors. Essentially, the likelihood function between the received signal vectors corresponding to the two transmitted signals converge in probability to the KL divergence as the number of receiver antennas increases [35]. More specifically, the KL divergence between the received signals corresponding to the transmitted matrix X 2 and X ˜ 2 can be calculated as
D KL ( M ) ( X 2 | | X ˜ 2 ) = E f ( y | X 2 ) ln f ( y | X ˜ 2 ) f ( y | X 2 ) = E f ( y | X 2 ) ln det ( R y | X 2 ) det ( R y | X ˜ 2 ) + y H R y | X ˜ 2 1 y y H R y | X 2 1 y = E f ( y | X 2 ) tr ( R y | X ˜ 2 1 R y | X 2 1 ) y y H + ln det ( R y | X 2 ) det ( R y | X ˜ 2 ) = tr R y | X ˜ 2 1 R y | X 2 1 R y | X 2 + ln det ( R y | X 2 ) det ( R y | X ˜ 2 ) = M D KL ( X 2 | | X ˜ 2 ) ,
in which
D KL ( X 2 | | X ˜ 2 ) = tr ( X 2 H D X 2 + σ 2 I 2 ) ( X ˜ 2 H D X ˜ 2 + σ 2 I 2 ) 1 ln det [ ( X 2 H D X 2 + σ 2 I 2 ) ( X ˜ 2 H D X ˜ 2 + σ 2 I 2 ) 1 ] 2 .
We can observe from the above expression that D KL ( X 2 | | X ˜ 2 ) is actually the KL divergence when there is only one receiving antenna. Due to the assumption of the independence of channel coefficients, and the KL divergence with M antennas D KL ( M ) ( X 2 | | X ˜ 2 ) is M times D KL ( X 2 | | X ˜ 2 ) .

3.2. QAM Division-Based Multi-User Space-Time Modulation

The main objective of this subsection is to develop a new QAM division-based MUSTM design framework for the considered nn-mMIMO system. The design is built upon the uniquely decomposable constellation group (UDCG) originally proposed in [41,42] for the commonly used spectrally efficient QAM signaling. We now introduce the definition of UDCG as follows:
Definition 2.
A group of constellations { X k } k = 1 K form a UDCG, denoted by k = 1 K x k : x k X k = k = 1 K X k = X 1 X K , if there exist two groups of x k , x ˜ k X k for k = 1 , , K such that k = 1 K x k = k = 1 K x ˜ k , then we have x k = x ˜ k for k = 1 , , K
As PAM and QAM constellations are commonly used in modern digital communications, which have simple geometric structures, we now provide the following construction of UDCG.
Lemma 1.
The UDCG with PAM and QAM constellations can be constructed as follows:
(1) UDCG with PAM constellation: For two given positive integers, K and N ( N K ), and a nonnegative integer sequence, { N k } k = 1 K , satisfying k = 1 K N k = N , a 2 N -ary PAM constellation G = { ± ( m 1 2 ) Δ : m = 1 , , 2 N 1 } , with Δ being the minimum Euclidean distance between the constellation points, can be uniquely decomposed into the sum of K sub-constellations { X k } k = 1 K denoted by G = k = 1 K X k , where X 1 = ± ( m 1 2 ) Δ m = 1 2 N 1 1 , and X k = ± ( m 1 2 ) × 2 = 1 k 1 N Δ m = 1 2 N k 1 for k 2 .
(2) UDCG with QAM constellation: For two positive integers K and N = N I + N Q ( N K ), with N I and N Q being nonnegative integers that denote the sizes of the in-phase and quadrature components, respectively. Let { N I , k } k = 1 K and { N Q , k } k = 1 K denote two given nonnegative integer sequences satisfying N I = k = 1 K N I , k and N Q = k = 1 K N Q , k with N k = N I , k + N Q , k > 0 . Then, there exists a PAM and QAM mixed constellation Q = k = 1 K X k such that X k = X I , k j X Q , k , with j X Q , k = { j x : x X Q , k } , where Q I = k = 1 K X I , k and Q Q = k = 1 K X Q , k are two PAM UDCGs according to the rate allocation { N I , k } k = 1 K and { N Q , k } k = 1 K , respectively.  
With the concept of UDCG, we are now ready to propose a QAM division-based UF-MUSTM for the considered nn-mMIMO system with a noncoherent ML receiver given in (6). The structure of each transmitted signal matrix is given by X 2 = [ x 1 , x 2 ] = D 1 / 2 Π S 2 , in which
S 2 = [ s 1 , s 2 ] = 1 p 1 p 1 s 1 1 p 2 p 2 s 2 1 p K p K s K .
In our design, the diagonal matrix D 1 / 2 is used to compensate for the different large-scale fading among various users. The vector p = [ p 1 , , p K ] is introduced to adjust the relative transmitting powers between all users, and s = [ s 1 , , s K ] is the information-carrying vector. The instantaneous power constraint can be given by E { | x k , t | 2 } P k , k = 1 , , K and t = 1 , 2 . We let s k X k , where all X k ’s constitute a UDCG with sum-QAM constellation Q , such that Q = k = 1 K X k as defined in Lemma 1. The rate allocation between the K users is based on the sum-decomposition, such that k = 1 K N k = N , in which N k = N I , k + N Q , k = log 2 ( | X k | ) denotes the bit rate of the user constellation X k . The matrix
Π = [ e π ( 1 ) , , e π ( K ) ] T
is a permutation matrix, where e k denotes a standard basis column vector of length K with 1 in the k-th position and 0 in other positions. π : { 1 , , K } { 1 , , K } is a permutation over K elements characterized by 1 2 K π ( 1 ) π ( 2 ) π ( K ) . We also let π 1 : { 1 , , K } { 1 , , K } be a permutation such that π 1 ( π ( k ) ) = k for k = 1 , , K . From the above definition, we immediately have Π T Π = I K .
For the transmitted signal matrix X 2 , we have the following desired properties:
Proposition 2.
Consider X 2 = D 1 / 2 Π S 2 and X ˜ 2 = D 1 / 2 Π S ˜ 2 , where S 2 and S ˜ 2 belong to S K × 2 as described in Definition 1. If X 2 H D X 2 = X ˜ 2 H D X ˜ 2 , then we have X 2 = X ˜ 2 .
The proof of Proposition 2 is given in Appendix A.2.

3.3. User-Constellation Assignment and Power Allocation

To further enhance the system reliability performance, we now optimize the user-constellation assignment policy π and power allocation vector p for the proposed nn-mMIMO framework. For the transmitted signal matrix considered in (8), we have
X 2 H D X 2 + σ 2 I 2 = s 1 H s 1 + σ 2 s 1 H s 2 s 2 H s 1 s 2 H s 2 + σ 2 = k = 1 K 1 / p k + σ 2 k = 1 K s k k = 1 K s k * k = 1 K p k | s k | 2 + σ 2 , X ˜ 2 H D X ˜ 2 + σ 2 I 2 = s 1 H s 1 + σ 2 s 1 H s ˜ 2 s ˜ 2 H s 1 s ˜ 2 H s ˜ 2 + σ 2 = k = 1 K 1 / p k + σ 2 k = 1 K s ˜ k k = 1 K s ˜ k * k = 1 K p k | s ˜ k | 2 + σ 2 .
We can see from (10) that X 2 H D X 2 + σ 2 I 2 and X ˜ 2 H D X ˜ 2 + σ 2 I 2 are independent of the permutation function π , but depends on the power allocation vector p = [ p 1 , , p K ] T , and the information carrying vectors s = [ s 1 , , s K ] T and s ˜ = [ s ˜ 1 , , s ˜ K ] T . In this case, the ML receiver given in (6) can be further simplified as
X ^ 2 = arg min X 2 a y 2 2 + b y 1 2 2 ( c y 2 H y 1 ) a b | c | 2 + M ln a b | c | 2 ,
in which a = k = 1 K 1 / p k + σ 2 , b = k = 1 K p k | s k | 2 + σ 2 , and c = k = 1 K s k . Inserting (10) into (7), and after some algebraic manipulations, we have
D KL ( X 2 | | X ˜ 2 ) = f 1 ( p , s , s ˜ ) + f 2 ( p , s , s ˜ ) ,
where
f 1 ( p , s , s ˜ ) = k = 1 K 1 p k + σ 2 k = 1 K p k | s k | 2 + σ 2 | k = 1 K s k | 2 k = 1 K 1 p k + σ 2 k = 1 K p k | s ˜ k | 2 + σ 2 | k = 1 K s ˜ k | 2 ln k = 1 K 1 p k + σ 2 k = 1 K p k | s k | 2 + σ 2 | k = 1 K s k | 2 k = 1 K 1 p k + σ 2 k = 1 K p k | s ˜ k | 2 + σ 2 | k = 1 K s ˜ k | 2 1 , f 2 ( p , s , s ˜ ) = | k = 1 K s k k = 1 K s ˜ k | 2 k = 1 K 1 p k + σ 2 k = 1 K p k | s ˜ k | 2 + σ 2 | k = 1 K s ˜ k | 2 .
Recall that the power constraints are E { | x k , t | 2 } P k for k = 1 , , K and t = 1 , 2 . That is, for the first and second time slots, we have E { | x k , 1 | 2 } = 1 p π ( k ) β k P k , and E { | x k , 2 | 2 } = p π ( k ) E π ( k ) Δ 2 β k P k , where
E k = E { | s k | 2 } Δ 2 .
The power constraints can, thus, be expressed as follows:
1 P π 1 ( k ) β π 1 ( k ) p k P π 1 ( k ) β π 1 ( k ) E k Δ 2 , k = 1 , , K .
Our design can now be formulated into the following optimization problem.
Problem 1.
Find the optimal power control vector p and permutation π under individual average power constraints:
max { π , p } min { s , s ˜ : s s ˜ } f 1 ( p , s , s ˜ ) + f 2 ( p , s , s ˜ ) s . t . 1 P π 1 ( k ) β π 1 ( k ) p k P π 1 ( k ) β π 1 ( k ) E k Δ 2 , k = 1 , , K .
For Problem 1, we first can attain that f 1 ( p , s , s ˜ ) 0 by applying the fundamental inequality in information theory ([43] Lemma 2.29), where the equality f 1 ( p , s , s ˜ ) = 0 holds if and only if
k = 1 K 1 p k + σ 2 k = 1 K p k ( | s k | 2 | s ˜ k | 2 ) | k = 1 K s k | 2 | k = 1 K s ˜ k | 2 = 0 .
Considering the fact that the joint minimization of f 1 ( p , s , s ˜ ) and f 2 ( p , s , s ˜ ) over { s , s ˜ : s s ˜ } could be extremely tedious, we consider the minimization of f 2 ( p , s , s ˜ ) first, which is a lower bound of D KL ( X 2 | | X ˜ 2 ) as f 1 ( p , s , s ˜ ) 0 . We will verify the condition when the minimum of f 1 ( p , s , s ˜ ) and f 2 ( p , s , s ˜ ) can be achieved simultaneously. Mathematically, we temporarily focus on solving the following optimization problem:
Problem 2.
We find the power control coefficients p and permutation policy π, such that
max { π , p } min { s , s ˜ : s s ˜ } f 2 ( p , s , s ˜ ) = | k = 1 K s k k = 1 K s ˜ k | 2 ( k = 1 K 1 p k + σ 2 ) ( k = 1 K p k | s ˜ k | 2 + σ 2 ) | k = 1 K s ˜ k | 2
s . t . 1 P π 1 ( k ) β π 1 ( k ) p k P π 1 ( k ) β π 1 ( k ) E k Δ 2 , k = 1 , , K .
We first consider the inner optimization problem in Problem 2. The denominator of (16) is independent of s and the numerator is minimized when the sum terms k = 1 K s k and k = 1 K s ˜ k are the neighboring points on the sum constellation, where the minimum value of | k = 1 K s k k = 1 K s ˜ k | 2 is Δ 2 . For notation simplicity, we define s ˜ = ( v ˜ + j w ˜ ) Δ , where v ˜ = [ v ˜ 1 , , v ˜ K ] T and w ˜ = [ w ˜ 1 , , w ˜ K ] T . As the power constraint given in (17) is independent of v and w , Problem 2 can be split into two subproblems as follows:
max v ˜ f 3 ( v ˜ ) = k = 1 K 1 p k + σ 2 k = 1 K p k v ˜ k 2 + σ 2 Δ 2 k = 1 K v ˜ k 2 s . t . v ˜ k ± m 1 2 × 2 = 1 k 1 N I , m = 1 2 N I , k 1 , k = 1 , , K .
and
max w ˜ f 4 ( w ˜ ) = k = 1 K 1 p k + σ 2 k = 1 K p k w ˜ k 2 + σ 2 Δ 2 k = 1 K w ˜ k 2 s . t . w ˜ k ± m 1 2 × 2 = 1 k 1 N Q , m = 1 2 N Q , k 1 , k = 1 , , K .
In the following, we only present the maximization of f 3 ( v ˜ ) over v ˜ in (18), and the maximization of f 4 ( w ˜ ) over w ˜ given in (19) follows similarly and, hence, is omitted for brevity. We now rewrite the objective function in (18) as
f 3 ( v ˜ ) = 1 p 1 + k = 2 K 1 p k + σ 2 p 1 v ˜ 1 2 + k = 2 K p k v ˜ k 2 + σ 2 Δ 2 v ˜ 1 + k = 2 K v ˜ k 2 = 1 p 1 k = 2 K p k v ˜ k 2 + σ 2 Δ 2 + p 1 v ˜ 1 2 k = 2 K 1 p k + σ 2 + k = 2 K 1 p k + σ 2 k = 2 K p k v ˜ k 2 + σ 2 Δ 2 2 v ˜ 1 k = 2 K v ˜ k k = 2 K v ˜ k 2 = 1 p 1 k = 2 K p k v ˜ k 2 + σ 2 Δ 2 + 1 p 2 k = 3 K p k v ˜ k 2 + σ 2 Δ 2 + p 1 v ˜ 1 2 k = 2 K 1 p k + σ 2 + p 2 v ˜ 2 2 k = 3 K 1 p k + σ 2 + k = 3 K 1 p k + σ 2 k = 3 K p k v ˜ k 2 + σ 2 Δ 2 k = 3 K v ˜ k 2 2 v ˜ 1 k = 2 K v ˜ k 2 v ˜ 2 k = 3 K v ˜ k = = 1 K 1 1 p k = + 1 K p k v ˜ k 2 + σ 2 Δ 2 + = 1 K 1 p v ˜ 2 k = + 1 K 1 p k + σ 2 + p K v ˜ K 2 σ 2 + σ 4 Δ 2 + p K v ˜ K 2 σ 2 + σ 4 Δ 2 2 = 1 K 1 v ˜ k = + 1 K v ˜ k = f 5 ( v ˜ ) f 6 ( v ˜ ) ,
where f 5 ( v ˜ ) = = 1 K 1 1 p k = + 1 K p k v ˜ k 2 + σ 2 Δ 2 + = 1 K 1 p v ˜ 2 k = + 1 K 1 p k + σ 2 + p K v ˜ K 2 σ 2 + σ 4 Δ 2 + p K v ˜ K 2 σ 2 + σ 4 Δ 2 , and f 6 ( v ˜ ) = 2 = 1 K 1 v ˜ k = + 1 K v ˜ k .
We then can maximize f 5 ( v ˜ ) f 6 ( v ˜ ) . In what follows, we will show that the maximization of f 5 ( v ˜ ) and the minimization of f 6 ( v ˜ ) can be achieved simultaneously. First, we can observe that the maximization of f 5 ( v ˜ ) is achieved when | v ˜ k | , k = 1 , , K , are maximized for a signal transmitted from every user.
We next consider the minimization of f 6 ( v ˜ ) . To that end, we have,
f 6 ( v ˜ ) v ˜ k = 2 = 1 , k K v ˜ , k = 1 , , K .
The optimal value can be attained by enumeration of v ˜ K m 1 2 × 2 = 1 K 1 N I , m = 1 2 N I , K 1 , and v ˜ K m 1 2 × 2 = 1 K 1 N I , m = 1 2 N I , K 1 .
  • If v ˜ K m 1 2 × 2 = 1 K 1 N I , m = 1 2 N I , K 1 , then for any v ˜ k ± m 1 2 × 2 = 1 k 1 N I , m = 1 2 N I , k 1 , k = 1 , , K 1 , we have
    f 6 ( v ˜ ) v ˜ k = 2 v ˜ K + 2 = 1 , k K 1 v ˜ 2 min v ˜ K + 2 min { v ˜ } = 1 K 1 = 1 , k K 1 v ˜ > 2 = 1 K 1 N I , + 2 min { v ˜ } = 1 K 1 = 1 K 1 v ˜ = 2 = 1 K 1 N I , 2 2 = 1 K 1 N I , 1 1 2 = 1 .
    In this case, the optimal value of { v ˜ k } k = 1 K 1 to minimize f 6 ( v ˜ ) is given by
    v ˜ k = 2 N I , k 1 × 2 = 1 k 1 N I , 1 , for k = 1 , , K 1 .
    Note that f 6 ( v ˜ ) v ˜ K = 2 = 1 K 1 v ˜ < 0 , then for v ˜ K m 1 2 × 2 = 1 K 1 N m = 1 2 N I , K 1 , the optimal value of v ˜ K is v ˜ K = 2 N K 1 × 2 = 1 K 1 N 1 .
  • If v ˜ K m 1 2 × 2 = 1 K 1 N m = 1 2 N I , K 1 , for v ˜ k ± m 1 2 × 2 = 1 k 1 N m = 1 2 N I , k 1 , k = 1 , , K 1 , we have
    f 6 ( v ˜ ) v ˜ k = 2 v ˜ K + 2 = 1 , k K 1 v ˜ 2 v ˜ K + 2 max { v ˜ } = 1 K 1 = 1 , k K v ˜ < 2 = 1 K 1 N I , + 2 max { v ˜ } = 1 K 1 = 1 K 1 v ˜ = 2 = 1 K 1 N I , + 2 2 = 1 K 1 N I , 1 1 2 = 1 .
    In this case, the optimal value of { v ˜ k } k = 1 K 1 to minimize f 6 ( v ˜ ) is given by
    v ˜ k = 2 N k 1 2 × 2 = 1 k 1 N I , , for k = 1 , , K 1 .
    In addition, we note that f 6 ( v ˜ ) v ˜ K = 2 = 1 K 1 v ˜ < 0 , then for v ˜ K m 1 2 × 2 = 1 K 1 N m = 1 2 N I , K 1 , the optimal value of v ˜ K is v ˜ K = 2 N I , K 1 × 2 = 1 K 1 N I , 1 .
In summary, the maximum value of f 6 ( v ˜ ) = 2 = 1 K 1 v ˜ k = + 1 K v ˜ k can be achieved by v ˜ = [ v ˜ 1 , , v ˜ K ] T where
v ˜ k = 2 N I , k 1 1 2 × 2 = 1 k 1 N I , , for k = 1 , , K 1 ; 2 N I , K 1 1 2 × 2 = 1 K 1 N I , , for k = K ,
or equivalently
v ˜ k = 2 N I , k 1 1 2 × 2 = 1 k 1 N I , , for k = 1 , , K 1 ; 2 N I , K 1 1 2 × 2 = 1 K 1 N I , , for k = K .
For both cases, we can observe that f 5 ( v ˜ ) as defined in (21) is also maximized by v ˜ as | v ˜ k | , k = 1 , , K , are maximized. Due to the symmetry of the solutions given in (22) and (23), in what follows, we only consider the solution given in (22). In this case, the sum constellation for achieving the inner minimum is
k = 1 K s ˜ k = k = 1 K v ˜ k + j w ˜ k = 1 + j 2 + 2 N I , K 1 1 × 2 = 1 K 1 N I , + j 2 N Q , K 1 1 × 2 = 1 K 1 N Q , Δ .
We now have the following remark:
Remark 1.
When N I , K = N Q , K = 1 , the solution given in (22), which minimizes f 2 ( p , s , s ˜ ) also minimizes f 1 ( p , s , s ˜ ) .
Proof. 
For the solution of s ˜ given in (22), the sum constellation is given in (24). When N I , K = N Q , K = 1 , we have k = 1 K s ˜ k = 1 + j 2 Δ , and we can let k = 1 K s k = 1 j 2 Δ . Inserting them back into (15), we have f 1 ( p , s , s ˜ ) = 0 . That is, the values that minimize f 2 ( p , s , s ˜ ) also minimizes f 1 ( p , s , s ˜ ) . This completes the proof.    □
We now consider the outer optimization problem, where the objective function is a monotonically decreasing function against the term f 7 ( π , p ) = k = 1 K 1 p k + σ 2 k = 1 K p k E k + σ 2 Δ 2 . The optimization problem can be reformulated as
min π , p f 7 ( π , p ) = k = 1 K 1 p k + σ 2 k = 1 K p k E k + σ 2 Δ 2 s . t . 1 p k P π 1 ( k ) β π 1 ( k ) , p k E k Δ 2 P π 1 ( k ) β π 1 ( k ) , k = 1 , , K .
The optimization problem in (25) can be resolved by first fixing π to find the optimal value of p , and then performing further optimization on π . To that end, we can observe from (25) that, for any given π , the feasible range of Δ 2 is given by Δ 2 P π 1 ( k ) β π 1 ( k ) p k E k P π 1 ( k ) 2 β π 1 ( k ) 2 E k for k = 1 , , K , or equivalently Δ 2 min P π 1 ( k ) 2 β π 1 ( k ) 2 E k k = 1 K . By the Cauchy–Schwarz inequality, we have
f 7 ( π , p ) = k = 1 K 1 p k + σ 2 k = 1 K p k E k + σ 2 Δ 2 ( a ) k = 1 K 1 p k p k E k Δ 2 + σ 2 Δ 2 = k = 1 K E k + σ 2 Δ 2 f 8 ( π ) ,
where the inequality in  ( a ) holds if and only if p k E k 1 / p k = 1 Δ , for k = 1 , K . Or equivalently, the optimal power allocation is p = [ p 1 , , p ] T , where p k = 1 E k Δ for k = 1 , , K . Our next task is to check if the power constraint on p k given in (25) is violated or not. For Δ 2 min P π 1 ( k ) 2 β π 1 ( k ) 2 E k k = 1 K , we have
1 p k = E k Δ P π 1 ( k ) β π 1 ( k ) , p k E k Δ 2 = E k Δ P π 1 ( k ) β π 1 ( k ) , for k = 1 , , K ,
where no power constraints are violated for p . Finally, the optimization problem on π can be given by
min π f 8 ( π ) = k = 1 K E k + σ 2 Δ s . t . Δ 2 P π 1 ( k ) 2 β π 1 ( k ) 2 E k , k = 1 , , K .
Or equivalently, we aim to solve
max π Δ s . t . Δ 2 P k 2 β k 2 E π ( k ) , k = 1 , , K .
Before proceeding, we establish the following lemma.
Lemma 2.
Suppose that two positive sequences { a n } n = 1 N and { b n } n = 1 N are arranged both in a nondecreasing order. If we let Π denote the set containing all the possible permutations of 1 , 2 , , N , then, the solution to the optimization problem, max π Π min a k b π ( k ) k = 1 K , is given by π ( k ) = k for k = 1 , 2 , , K .
By Lemma 2, and note that P 1 β 1 P k β K , to maximize Δ , we should let E π ( 1 ) E π ( K ) , i.e., the average power of the sub-constellations should be arranged in ascending order. All the above discussions can be summarized into the following theorem:
Theorem 1.
The users are ordered, such that P 1 β 1 P 2 β 2 P k β K , and we define Δ = min k P k β k E k k = 1 K , the optimal transmit power for all users can be given by p = 1 E 1 Δ , , 1 E K Δ T . In addition, the optimal permutation matrix is the identity matrix, i.e., Π = I K .
The above procedure can be summarized in Algorithm 1.
Algorithm 1 UF-MUSTM for multi-user massive SIMO systems.
  • 1: Given the large-scale fading diagonal matrix D = diag { β 1 , , β K } , power constraint P k , constellation size of each user N k = N I , k + N Q , k , k = 1 , , K .
  • 2: Obtain the optimal permutation matrix Π (or equivalently permutation π ) as defined in (9), the optimal value of Δ , and the power allocation vector of p = [ p 1 , , p K ] by Theorem 1, where E k is defined in (12).
  • 3: For given user constellation size N k = N I , k + N Q , k , k = 1 , , K and Δ , obtain the UDCG Q = k = 1 K X k by Lemma 1.
  • 4: Construct the transmitted signal vector X 2 = [ x 1 , x 2 ] = D 1 / 2 Π S 2 , in which S 2 = [ s 1 , s 2 ] with s 1 = [ 1 p 1 , , 1 p K ] T , and s 2 = [ p 1 s 1 , , p K s K ] T , as defined in (8) such that s k X k , k = 1 , , K .
  • 5: For each transmission, the transmitted signal X 2 can be recovered by solving (11) (or equivalently (6)).
We have the following remark on Algorithm 1.
Remark 2.
Computational complexity and training overhead analysis.
  • The main complexity of our algorithm for signal recovery comes from solving (11) in Step 5. More specifically, the complexity of evaluating y 1 , y 2 , and y 2 H y 1 in (11) is O ( M ) . For each transmitted signal matrix, the complexity of evaluating all possible b = k = 1 K p k | s k | 2 + σ 2 , and c = k = 1 K s k in (11) is O ( 2 N ) , where 2 N is the size of the sum constellation Q = k = 1 K X k . In conclusion, for each transmitted signal estimation, the overall complexity is O ( M ) + O ( 2 N ) , which is similar to other noncoherent designs [30,31,44]. In contrast, for the linear receiver, such as zero-forcing (ZF), the complexity is O ( K 2 M ) + O ( K 3 ) [20,45].
  • Our design is based on a noncoherent ML receiver, which only needs the estimation of the second-order channel statistics D , which can be done when the system is idle, such as the schemes in [30,31,44]; hence, there is no overhead for instantaneous CSI estimation. On the other hand, the instantaneous channel estimation, including the classical least-square (LS) and minimum mean-square error (MMSE) estimators [46], needs to send pilot symbols with a length proportional to the number of users K in each channel coherence time T c K [20].

4. Simulation Results and Discussions

In this section, computer simulations are performed to demonstrate the superior performance of our design in comparison with existing benchmarks. In our simulations, the small-scale fading is assumed to be the normalized Rayleigh fading. The path-loss as a function of the transmission distance d at the antenna’s far-field can be approximated by
10 log 10 L = 20 log 10 λ 4 π d 0 10 γ log 10 d d 0 ψ , d d 0 ,
where d 0 = 100 m is the reference distance, λ = v c / f c ( f c = 3  GHz) is the wavelength of carrier, γ = 3.71 is the path-loss exponent [47]. In the above model, ψ N ( 0 , σ ψ 2 ) ( σ ψ = 3.16 ) is the Gaussian random shadowing attenuation resulting from the blockage of objects. For the receiver, we assume that the noise power is 10 log 10 σ 2 = 10 log 10 N 0 B w = 10 log 10 3.2 × 10 10 = 125.97 dB where the channel bandwidth B w = 20 MHz, and N 0 = k 0 T 0 10 F 0 / 10 is the power spectral density of noise with k 0 = 1.38 × 10 23 J/K being the Boltzmann constant, reference temperature T 0 = 290 K (“room temperature”), and noise figure F 0 = 6 dB. For clarity, all the simulation parameters are summarized in Table 1.
We first examine the error performance of the proposed design under the instantaneous average power constraint for different user numbers, as illustrated in Figure 1. It is assumed that the average power upper bound is P k = 316 mW (25 dBm), k . All the K users are assumed to be uniformly distributed within the cell of radius d. It can be observed that, as the number of users increases, the error performance deteriorates quickly, which is caused by the mutual interference among users. Then, more BS antennas are needed to achieve the same average BER. We also compare our design with the max–min Euclidean distance (MED)-based method proposed in [30,31]. Since we use two time slots, while the MED methods only need one time slot, we assume that 2-PAM constellations are adopted by all users for the MED-based design. We can see from the figure that the proposed approach significantly outperforms the MED-based method in terms of BER in all simulated cases.
We next compare the error performance of the proposed framework with the conventional ZF receiver using orthogonal training sequence. The results are shown in Figure 2. In this simulation, we consider a system setup with K = 3 users. For the orthogonal training-based method, at least four time slots (three time slots for training and one time slot for data transmission) are needed, and we assume that the channel coefficients are quasi-static within these consecutive time slots. As 4-QAM is adopted by each user for the proposed scheme, 64-QAM is correspondingly adopted for the training-based approach in order to make a fair comparison. For the channel training algorithm, we consider that a widely used least-square (LS) channel estimator is employed [46]. It can be observed from Figure 2 that when the antenna number M is small and the channel gain is large (i.e., the distance d is small), the training-based method outperforms the proposed design in terms of BER. However, when the antenna number is relatively large, the proposed design has a better error performance, especially at the cell edge. The rationale is that without a reliable CSI, especially at low signal-to-noise ratio (SNR) regimes, coherent detection suffers from inferior decoding performance.
It is finally worth mentioning that a related noncoherent multi-user massive MIMO system was designed in [44] for differential phase shift keying (DPSK) constellations. All users’ transmitted information is modulated based on the phase offset between consecutive symbols. Indeed, the DBPSK and DQPSK constellations, which have an optimal scale between each sub-constellation, are specific instances of our QAMD. However, for larger constellations, such as 8-DPSK, our design has a greater normalized minimal Euclidean distance. The resulting sum constellation of two 8-DQPSKs is not a regular constellation anymore, just as studied in [48]. Also, in [44], the actual transmitted power of each user is not given explicitly and, hence, the optimal power allocation under both the average and the peak power constraint case is hard to evaluate. To make a comparison, especially when the constellation size is large, we compare the 8-DPSK constellation suggested in [44] with the optimal scale of 1.765 between the two sub-constellations with the rectangular 8-QAM constellation in our case. The error performance of [44] and our proposed design with two users, using 8-DPSK and 8-QAM respectively, is studied in Figure 3. It can be observed that our scheme with 8-QAM sub-constellation has a better error performance than [44] using 8-DPSK constellation, since the normalized minimal distance for our constellation is larger. Also, it should be pointed out that the resulting sum constellation in [44] is not a regular constellation, and it must be either computed or stored in advance. The detection of the sum constellation typically requires an exhaustive search over the whole constellation. In addition, the optimal power scale for general DPSK needs to be optimized by numerical methods. In contrast, our design leads to a regular QAM sum constellation. Furthermore, the optimal transmit powers of all users and the sub-constellation assignments among them have been provided in closed form.

5. Conclusions

In this paper, a non-orthogonal and noncoherent massive MIMO (nn-mMIMO) framework with the objective of enabling scalable URLLC applications was developed based on a new uniquely factorable multi-user space-time modulation (UF-MUSTM) scheme. For the MUSTM code design, a simple yet systematic construction method based on the concept of the QAM division was devised. Assuming that large-scale fading coefficients are known at the base station, the detailed transmission scheme and the corresponding noncoherent detector were carefully designed. We further optimized the proposed design framework by jointly optimizing the constellations of multiple users. Specifically, we implemented a max–min Kullback–Leibler (KL) divergence-based design criterion, where we jointly optimized the transmitted powers of all users and the sub-constellation assignments among them. Simulations demonstrated that the optimized nn-mMIMO framework has better reliability performance compared to the state-of-the-art benchmarking schemes.

Author Contributions

Conceptualization, Z.D. and J.-K.Z.; Methodology, Z.D. and H.C.; Investigation, Z.D., H.C. and J.-K.Z.; Writing—original draft, Z.D.; Writing—review & editing, H.C.; Supervision, H.C. and J.-K.Z. All authors have read and agreed to the published version of the manuscript.

Funding

The work of Z. Dong was supported in part by the Key R&D Plan of Shandong Province of China under grant 2021SFGC0701, the Pre-hospital Emergency of Qilu Hospital of Shandong University under grant 2560022009. The work of H. Chen was supported in part by the RGC General Research Fund under project 14205020.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors wish to thank Branka Vucetic of the University of Sydney for her helpful discussions during the preparation of this paper.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Appendix A.1. Proof of Proposition 1

Proof. 
We first show the sufficiency of Proposition 1 for the considered massive MIMO system with an unlimited number of antennas. By Assumption 1 on channel statistics and the central limit theory, we have lim M G H G M = I K and lim M Ξ H Ξ M = σ 2 I T . Now, the receiver can employ a simple correlation-based detector by calculating R M = Y H Y M . When the antenna array size goes to infinity, we have lim M R M σ 2 I T = R , where R is a T × T Hermitian-positive semidefinite matrix, such that R = X T H D X T . Now, X T can be uniquely determined by an exhaustive search since for any X T , X ˜ T M K × T with X T H D X T = X ˜ T H D X ˜ T , we have X T = X ˜ T .
Next, we show the necessity of Proposition 1. Suppose that there exist X T , X ˜ T M K × T , such that X T X ˜ T for X T H D X T = X ˜ T H D X ˜ T . As a consequence, X T and X ˜ T will have exactly the same likelihood function as shown in Equation (3); hence, they are indistinguishable by the ML detector, where the reliable recovery of the transmitted signals cannot be guaranteed. This completes the proof of Proposition 1.   □

Appendix A.2. Proof of Proposition 2

Proof. 
Let X 2 = D 1 / 2 S 2 and X ˜ 2 = D 1 / 2 S ˜ 2 . Then, if X 2 H D X 2 = X ˜ 2 H D X ˜ 2 , and note that Π H Π = I M , we have S 2 H S 2 = S ˜ 2 H S ˜ 2 . As a consequence, we have k = 1 N s k = k = 1 K s ˜ k , where s k , s ˜ k X k . Since { X k } k = 1 K form a UDCG, by Lemma 1, we can attain s k = s ˜ k , or equivalently, S 2 = S ˜ 2 , and now we have X 2 = X ˜ 2 .
This completes the proof of Proposition 2.   □

Appendix A.3. Proof of Lemma 2

Proof. 
Let m = arg min k = 1 , 2 , , N a k b π * ( k ) = arg min k a k b k . In other words, m is the index, such that q m = a m b m = min k = 1 , 2 , , N a k b k . Now, we want to show that q m = max ( π ( 1 ) , π ( 2 ) , , π ( N ) ) U min k = 1 , 2 , , N a k b π ( k ) . To that end, we divide U into two mutually exclusive subsets, i.e., P = { ( π ( 1 ) , π ( 2 ) , , π ( N ) ) | π ( m ) m } and U \ P = { ( π ( 1 ) , π ( 2 ) , , π ( N ) ) | π ( m ) = m } . Consider the following cases:
  • ( π ( 1 ) , π ( 2 ) , , π ( N ) ) P . In this case, there exists an m , such that π ( ) = m and, hence, b π ( ) = b m . If < m , then, we have a b π ( ) = a b m a m b m = q m . If > m , there exists an n m , such that π ( n ) > m by the property of permutation. Then, we have a n b π ( n ) a m b π ( n ) a m b m = q m . Therefore, we conclude min k = 1 , 2 , , N a k b π ( k ) q m for any ( π ( 1 ) , π ( 2 ) , , π ( N ) ) P . Or equivalently, max ( π ( 1 ) , π ( 2 ) , , π ( N ) ) P min k = 1 , 2 , , N a k b π ( k ) q m .
  • ( π ( 1 ) , π ( 2 ) , , π ( N ) ) U \ P . In this case, π ( m ) = m and, hence, we have min k = 1 , 2 , , N a k b π ( k ) a m b π ( m ) = a m b m = q m . Therefore, max ( π ( 1 ) , π ( 2 ) , , π ( N ) ) U \ P
    min k = 1 , 2 , , N a k b π ( k ) q m .
In conclusion, we have max π U min k = 1 , 2 , , N a k b π ( k ) q m . In the following, we aim to prove that the equality is achievable for certain ( π ( 1 ) , π ( 2 ) , , π ( K ) ) . By setting ( π ( 1 ) , π ( 2 ) , , π ( N ) ) = ( π * ( 1 ) , π * ( 2 ) , , π * ( N ) ) and then, from the construction process above, we can find that for the given sequences a 1 a 2 a N and b 1 b 2 b N , min k = 1 , 2 , , N a k b π * ( k ) = a m b m = q m . Hence, the equality is achievable for ( π * ( 1 ) , π * ( 2 ) , , π * ( N ) ) . This completes the proof.   □

References

  1. Saad, W.; Bennis, M.; Chen, M. A Vision of 6G Wireless Systems: Applications, Trends, Technologies, and Open Research Problems. IEEE Netw. 2020, 34, 134–142. [Google Scholar] [CrossRef]
  2. Wang, C.X.; You, X.; Gao, X.; Zhu, X.; Li, Z.; Zhang, C.; Wang, H.; Huang, Y.; Chen, Y.; Haas, H.; et al. On the Road to 6G: Visions, Requirements, Key Technologies, and Testbeds. IEEE Commun. Surv. Tutor. 2023, 25, 905–974. [Google Scholar] [CrossRef]
  3. Dawy, Z.; Saad, W.; Ghosh, A.; Andrews, J.G.; Yaacoub, E. Toward Massive Machine Type Cellular Communications. IEEE Wirel. Commun. 2017, 24, 120–128. [Google Scholar] [CrossRef]
  4. Soldani, D.; Guo, Y.J.; Barani, B.; Mogensen, P.; Chih-Lin, I.; Das, S.K. 5G for Ultra-Reliable Low-Latency Communications. IEEE Netw. 2018, 32, 6–7. [Google Scholar] [CrossRef]
  5. Fettweis, G.P.; Boche, H. 6G: The Personal Tactile Internet—And Open Questions for Information Theory. IEEE BITS Inf. Theory Mag. 2021, 1, 71–82. [Google Scholar] [CrossRef]
  6. Khan, L.U.; Saad, W.; Niyato, D.; Han, Z.; Hong, C.S. Digital-Twin-Enabled 6G: Vision, Architectural Trends, and Future Directions. IEEE Commun. Mag. 2022, 60, 74–80. [Google Scholar] [CrossRef]
  7. Popovski, P.; Chiariotti, F.; Huang, K.; Kalør, A.E.; Kountouris, M.; Pappas, N.; Soret, B. A Perspective on Time Toward Wireless 6G. Proc. IEEE 2022, 110, 1116–1146. [Google Scholar] [CrossRef]
  8. Durisi, G.; Koch, T.; Popovski, P. Toward Massive, Ultrareliable, and Low-Latency Wireless Communication with Short Packets. Proc. IEEE 2016, 104, 1711–1726. [Google Scholar] [CrossRef]
  9. Popovski, P.; Nielsen, J.J.; Stefanovic, C.; de Carvalho, E.; Strom, E.; Trillingsgaard, K.F.; Bana, A.; Kim, D.M.; Kotaba, R.; Park, J.; et al. Wireless Access for Ultra-Reliable Low-Latency Communication: Principles and Building Blocks. IEEE Netw. 2018, 32, 16–23. [Google Scholar] [CrossRef]
  10. Ji, H.; Park, S.; Yeo, J.; Kim, Y.; Lee, J.; Shim, B. Ultra-Reliable and Low-Latency Communications in 5G Downlink: Physical Layer Aspects. IEEE Wirel. Commun. 2018, 25, 124–130. [Google Scholar] [CrossRef]
  11. Bennis, M.; Debbah, M.; Poor, H.V. Ultrareliable and Low-Latency Wireless Communication: Tail, Risk, and Scale. Proc. IEEE 2018, 106, 1834–1853. [Google Scholar] [CrossRef]
  12. Chen, H.; Abbas, R.; Cheng, P.; Shirvanimoghaddam, M.; Hardjawana, W.; Bao, W.; Li, Y.; Vucetic, B. Ultra-Reliable Low Latency Cellular Networks: Use Cases, Challenges and Approaches. IEEE Commun. Mag. 2018, 56, 119–125. [Google Scholar] [CrossRef]
  13. Tse, D.N.C.; Viswanath, P. Fundamentals of Wireless Communications; Cambridge University Press: Cambridge, UK, 2005. [Google Scholar]
  14. ACMA. The Internet of Things and the ACMA’s Areas of Focus Emerging Issues in Media and Communications Occasional Paper; ACMA: Little Rock, AR, USA, 2015. [Google Scholar]
  15. Zheng, L.; Tse, D. Diversity and multiplexing: A fundamental tradeoff in multiple-antenna channels. IEEE Trans. Inf. Theory 2003, 49, 1073–1096. [Google Scholar] [CrossRef]
  16. Hochwald, B.M.; Marzetta, T.L. Unitary space-time modulation for multiple-antenna communications in Rayleigh flat fading. IEEE Trans. Inf. Theory 2000, 46, 543–564. [Google Scholar] [CrossRef]
  17. Marzetta, T.L. Noncooperative Cellular Wireless with Unlimited Numbers of Base Station Antennas. IEEE Trans. Wirel. Commun. 2010, 9, 3590–3600. [Google Scholar] [CrossRef]
  18. Andrews, J.G.; Buzzi, S.; Choi, W.; Hanly, S.V.; Lozano, A.; Soong, A.C.K.; Zhang, J.C. What Will 5G Be? IEEE J. Sel. Areas Commun. 2014, 32, 1065–1082. [Google Scholar] [CrossRef]
  19. Boccardi, F.; Heath, R.W.; Lozano, A.; Marzetta, T.L.; Popovski, P. Five disruptive technology directions for 5G. IEEE Commun. Mag. 2014, 52, 74–80. [Google Scholar] [CrossRef]
  20. Lu, L.; Li, G.; Swindlehurst, A.; Ashikhmin, A.; Zhang, R. An Overview of Massive MIMO: Benefits and Challenges. IEEE J. Sel. Top. Signal Process. 2014, 8, 742–758. [Google Scholar] [CrossRef]
  21. Östman, J.; Durisi, G.; Ström, E.G.; Coskun, M.C.; Liva, G. Short Packets over Block-Memoryless Fading Channels: Pilot-Assisted or Noncoherent Transmission? CoRR 2017. [Google Scholar] [CrossRef]
  22. Manolakos, A.; Chowdhury, M.; Goldsmith, A. Energy-Based Modulation for Noncoherent Massive SIMO Systems. IEEE Trans. Wirel. Commun. 2016, 15, 7831–7846. [Google Scholar] [CrossRef]
  23. Jing, L.; Carvalho, E.D.; Popovski, P.; Martínez, À.O. Design and Performance Analysis of Noncoherent Detection Systems with Massive Receiver Arrays. IEEE Trans. Signal Process. 2016, 64, 5000–5010. [Google Scholar] [CrossRef]
  24. Xie, H.; Xu, W.; Xiang, W.; Shao, K.; Xu, S. Non-Coherent Massive SIMO Systems in ISI Channels: Constellation Design and Performance Analysis. IEEE Syst. J. 2019, 13, 2252–2263. [Google Scholar] [CrossRef]
  25. Gao, X.; Zhang, J.; Chen, H.; Dong, Z.; Vucetic, B. Energy-Efficient and Low-Latency Massive SIMO using Noncoherent ML Detection for Industrial IoT Communications. IEEE Internet Things J. 2018, 6, 6247–6261. [Google Scholar] [CrossRef]
  26. Xie, H.; Xu, W.; Ngo, H.Q.; Li, B. Non-Coherent Massive MIMO Systems: A Constellation Design Approach. IEEE Trans. Wirel. Commun. 2020, 19, 3812–3825. [Google Scholar] [CrossRef]
  27. Mallik, R.K.; Murch, R. Channel Capacity of an Asymmetric Constellation in Rayleigh Fading with Noncoherent Energy Detection. IEEE Trans. Wirel. Commun. 2021, 20, 7375–7388. [Google Scholar] [CrossRef]
  28. Duong, S.T.; Nguyen, H.H.; Bedeer, E. Multi-level Design for Multiple-Symbol Non-Coherent Unitary Constellations for Massive SIMO Systems. IEEE Wirel. Commun. Lett. 2023, 12, 1349–1353. [Google Scholar] [CrossRef]
  29. Dai, L.; Wang, B.; Ding, Z.; Wang, Z.; Chen, S.; Hanzo, L. A Survey of Non-Orthogonal Multiple Access for 5G. IEEE Commun. Surv. Tutor. 2018, 20, 2294–2323. [Google Scholar] [CrossRef]
  30. Chowdhury, M.; Manolakos, A.; Goldsmith, A. Scaling Laws for Noncoherent Energy-Based Communications in the SIMO MAC. IEEE Trans. Inf. Theory 2016, 62, 1980–1992. [Google Scholar] [CrossRef]
  31. Zhang, Y.; Zhang, J.; Yu, H. Physically Securing Energy-Based Massive MIMO MAC via Joint Alignment of Multi-User Constellations and Artificial Noise. IEEE J. Sel. Areas Commun. 2018, 36, 829–844. [Google Scholar] [CrossRef]
  32. Xu, W.; Xie, H.; Ngo, H.Q. Non-Coherent Massive MIMO Systems: A Constellation Design Approach. In Proceedings of the ICC 2019—2019 IEEE International Conference on Communications (ICC), Shanghai, China, 21–23 May 2019; pp. 1–6. [Google Scholar]
  33. Chen, H.; Dong, Z.; Vucetic, B. Noncoherent and Non-orthogonal Massive SIMO for Critical Industrial IoT Communications. In Proceedings of the 2019 IEEE International Conference on Industrial Cyber Physical Systems (ICPS), Taipei, Taiwan, 6–9 May 2019; pp. 436–441. [Google Scholar]
  34. Brehler, M.; Varanasi, M.K. Asymptotic error probability analysis of quadratic receivers in Rayleigh-fading channels with applications to a unified analysis of coherent and noncoherent space-time receivers. IEEE Trans. Inf. Theory 2001, 47, 2383–2399. [Google Scholar] [CrossRef]
  35. Borran, M.J.; Sabharwal, A.; Aazhang, B. On design criteria and construction of noncoherent space-time constellations. IEEE Trans. Inf. Theory 2003, 49, 2332–2351. [Google Scholar] [CrossRef]
  36. Zhang, J.K.; Huang, F.; Ma, S. Full Diversity Blind Space-Time Block Codes. IEEE Trans. Inf. Theory 2011, 57, 6109–6133. [Google Scholar] [CrossRef]
  37. Dong, Z.; Chen, H.; Zhang, J.; Vucetic, B. Noncoherent Multiuser Massive SIMO for Low-Latency Industrial IoT Communications. In Proceedings of the 2019 IEEE International Conference on Industrial Cyber Physical Systems (ICPS), Taipei, Taiwan, 6–9 May 2019; pp. 442–447. [Google Scholar]
  38. Petersen, K.B.; Pedersen, M.S. The Matrix Cookbook; Technical University of Denmark: Lyngby, Denmark, 2012. [Google Scholar]
  39. Warrier, D.; Madhow, U. Spectrally efficient noncoherent communication. IEEE Trans. Inf. Theory 2002, 48, 651–668. [Google Scholar] [CrossRef]
  40. Clarkson, K.L.; Sweldens, W.; Zheng, A. Fast multiple-antenna differential decoding. IEEE Trans. Commun. 2001, 49, 253–261. [Google Scholar] [CrossRef]
  41. Dong, Z.; Zhang, Y.Y.; Zhang, J.K.; Gao, X. Quadrature Amplitude Modulation Division for Multiuser MISO Broadcast Channels. IEEE J. Sel. Topics Signal Process. 2016, 10, 1551–1566. [Google Scholar] [CrossRef]
  42. Dong, Z.; Zhang, J.; Huang, L. Multi-users space-time modulation with QAM division for massive uplink communications. In Proceedings of the 2017 IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, 25–30 June 2017; pp. 1087–1091. [Google Scholar]
  43. Yeung, R.W. Information Theory and Network Coding; Springer: Berlin/Heidelberg, Germany, 2008. [Google Scholar]
  44. Armada, A.G.; Hanzo, L. A non-coherent multi-user large scale SIMO system relaying on M-ary DPSK. In Proceedings of the 2015 IEEE International Conference on Communications (ICC), London, UK, 8–12 June 2015; pp. 2517–2522. [Google Scholar] [CrossRef]
  45. Fatema, N.; Hua, G.; Xiang, Y.; Peng, D.; Natgunanathan, I. Massive MIMO linear precoding: A survey. IEEE Syst. J. 2018, 12, 3920–3931. [Google Scholar] [CrossRef]
  46. Biguesh, M.; Gershman, A.B. Training-based MIMO channel estimation: A study of estimator tradeoffs and optimal training signals. IEEE Trans. Signal Process. 2006, 54, 884–893. [Google Scholar] [CrossRef]
  47. Goldsmith, A. Wireless Communications; Cambridge University Press: Cambridge, UK, 2005. [Google Scholar]
  48. Harshan, J.; Rajan, B. On Two-User Gaussian Multiple Access Channels With Finite Input Constellations. IEEE Trans. Inf. Theory 2011, 57, 1299–1327. [Google Scholar] [CrossRef]
Figure 1. Comparison of the proposed scheme with the MED detector on the average BER of all users versus M, 4-QAM is used by all users with an average power constraint.
Figure 1. Comparison of the proposed scheme with the MED detector on the average BER of all users versus M, 4-QAM is used by all users with an average power constraint.
Entropy 25 01325 g001
Figure 2. The comparison between the proposed and the orthogonal training method with K = 3 users and 4 time slots.
Figure 2. The comparison between the proposed and the orthogonal training method with K = 3 users and 4 time slots.
Entropy 25 01325 g002
Figure 3. The comparison between the proposed and the noncoherent receiver with 8-QAM and 8-DPSK, respectively.
Figure 3. The comparison between the proposed and the noncoherent receiver with 8-QAM and 8-DPSK, respectively.
Entropy 25 01325 g003
Table 1. Simulation parameters.
Table 1. Simulation parameters.
ParameterValue
Cell radius d max 1000 m
Reference distance d 0 100 m
Carrier frequency f c 3 GHz
Channel bandwidth B w 20 MHz
Path loss exponent γ 3.71
Reference temperature/Noise figure290 K/6 dB
Standard deviation of shadow fading σ ψ 3.16
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Dong, Z.; Chen, H.; Zhang, J.-K. Design of Multi-User Noncoherent Massive SIMO Systems for Scalable URLLC. Entropy 2023, 25, 1325. https://doi.org/10.3390/e25091325

AMA Style

Dong Z, Chen H, Zhang J-K. Design of Multi-User Noncoherent Massive SIMO Systems for Scalable URLLC. Entropy. 2023; 25(9):1325. https://doi.org/10.3390/e25091325

Chicago/Turabian Style

Dong, Zheng, He Chen, and Jian-Kang Zhang. 2023. "Design of Multi-User Noncoherent Massive SIMO Systems for Scalable URLLC" Entropy 25, no. 9: 1325. https://doi.org/10.3390/e25091325

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop