Design and Analysis of Massive Uncoupled Unsourced Random Access with Bayesian Joint Decoding
Abstract
In this paper, we investigate unsourced random access for massive machine-type communications (mMTC) in the sixth-generation (6G) wireless networks. Firstly, we establish a high-efficiency uncoupled framework for massive unsourced random accesss without extra parity check bits. Then, we design a low-complexity Bayesian joint decoding algorithm, including codeword detection and stitching. In particular, we present a Bayesian codeword detection approach by exploiting Bayes-optimal divergence-free orthogonal approximate message passing in the case of unknown priors. The output long-term channel statistic information is well leveraged to stitch codewords for recovering the original message. Thus, the spectral efficiency is improved by avoiding the use of parity bits. Moreover, we analyze the performance of the proposed Bayesian joint decoding-based massive uncoupled unsourced random access scheme in terms of computational complexity and error probability of decoding. Furthermore, by asymptotic analysis, we obtain some useful insights for the design of massive unsourced random access. Finally, extensive simulation results confirm the effectiveness of the proposed scheme in 6G wireless networks.
Index Terms:
6G, mMTC, unsourced random access, Bayesian joint decoding.I Introduction
The sixth-generation (6G) wireless networks are expected to provide various machine-type communication services for Internet-of-Things (IoT) [1, 2, 3]. Generally, machine-type communications in 6G wireless networks have the demands of massive connectivity and small payload. It is predicted that by 2030, the number of IoT devices will approach hundreds of billions and the length of a message is usually tens of bits. For such massive machine-type communications (mMTC), applying traditional grant-based random access schemes may lead to exceedingly high access latency and prohibitive signaling overhead [4]. To address these challenging issues, it is imperative to introduce grant-free random access schemes for supporting massive access according to the characteristics of mMTC in 6G wireless networks [5, 6, 7].
As a new grant-free random access scheme, unsourced random access overcomes the disadvantages of sourced grant-free random access, i.e., the leading process of acquisition of the device activity information and channel state information has been cancelled, such that the end-to-end delay is decreased and the spectral efficiency is increased [8, 9]. To be specific, in the unsourced random access protocol, the base station (BS) only focuses on the recovery of transmitted messages, but is not concerned about the identities and channel states of active devices which sent the messages [10, 11, 12]. In this context, sending unique long pilots in advance is not necessary for device detection and channel estimation, which reduces the consumption of wireless resources significantly in the case of massive connectivity. In fact, the biggest superiority of unsourced random access over sourced random access is that the millions of individual codebooks of devices are avoided [8]. Hence, all devices can share the same codebook in unsourced random access. The message of each active device is transmitted over uplink channel after map** to a codeword from this common codebook. Subsequently, the BS performs codeword activity detection and recovers the list of transmitted codewords. Note that a codebook needs to contain at least codewords to represent -bit message. As the length of the message increases, the size of the codebook grows exponentially, resulting in unbearable computational complexity for codeword activity detection even with short message of tens of bits. In order to reduce the computational complexity for codeword activity detection, a divide-and-send approach is introduced and each segmentation is independently sent based on a small codebook [13].
Recently, the authors of [9] proposed a low-complexity scheme for unsourced random access based on a coupled compressed sensing problem. In their scheme, the message transmission slot is divided into several sub-slots and the message fragments are transmitted by each active device across these sub-slots. Specifically, at the sender, the message is first divided into multiple fragments by a outer encoder with redundancy attached to form fixed-length sub-blocks. Then an inner encoder maps each sub-block to a codeword via a common codebook matrix. At the BS, the inner decoder identifies which codewords have been transmitted and a tree-based outer decoder connects the decoded sub-blocks to recover original long messages according to the redundant parity. Based on the proposed framework in [9], the authors of [14] extended the system model from a single-antenna receiver to a large-scale receive antenna array, which widens application scenarios of coupled unsourced random access. In [15], approximate meessage passing (AMP) was exploited as an inner decoder to realize codeword activity detection. Additionally, codeword activity detection of unsourced random access in the inner decoder was formulated as a non-Bayesian maximum likelihood (ML) problem in [16]. It is proved that this scheme has better stability over the Bayesian AMP schemes. In [17], a beam-space tree decoder was proposed to improve the decoding performance by exploiting the beam division property. On the other hand, the authors of [18] improved the unsourced random access framework in [9] by letting the inner and the outer decoder cooperate and passing information back and forth to enhance the performance of coded compressed sensing.
Meanwhile, in [19], the message of each active device was just divided into two parts. The first part is to determine the transmission rule and the second part is encoded by low density parity check (LDPC) code. The involved sparse joint Tanner graph can provide some improvements in performance. Similarly, the scheme that some message bits were mapped to pilot and spreading sequences and the other bits were processed by polar code and QPSK modulation was studied in [35], providing good solutions for supporting a large number of active UEs with finite block length. In addition, the authors of [36] also proposed an elegant semi-blind detection framework based on bilinear generalized approximate message passing algorithm, which can support both sourced and unsourced random access.
Although the redundancy introduced by coupled unsourced random access is limited compared with the pilot sequences in the sourced random access, in order to ensure the correctness and uniqueness of output of the outer decoder, these additional redundant parity bits usually occupy half or more of each sub-block, resulting in low spectral efficiency of the system, which is intolerable under the shortage of wireless resources. In this context, a distinct uncoupled compressed sensing-based unsourced random access scheme was proposed in [20]. At the sender, the message is not attached to the check bits and the tree-based outer decoder is changed into a clustering decoder, where the disordered sub-blocks are connected by leveraging the inherent correlations of instantaneous channels of the same active device across sub-slots. Further, the authors of [21] studied the unsourced random access scheme by exploiting the angular domain sparsity of channel based on this uncoupled framework, which has a better error performance with high spectral efficiency.
As a matter of fact, codeword connection by clustering instantaneous channels may be prone to errors because the channel state is not invariable in a long time slot. Intuitively, it is more reasonable to assume that statistic information of channel is constant in a certain long time slot. Hence, it makes sense to exploit the statistics of channel to implement the codeword stitching. Besides, the scheme in [21] is limited to 3D channel modeling in angle domain, leading to higher implementation complexity. In other words, existing methods trade complexity for the decoding performance of unsourced random access. In addition, to the best of authors’ knowledge, the error performance analysis of massive unsourced random access is still an open issue.
To improve the performance of unsourced random access schemes, we aim to provide a high-efficiency and low-complexity solution for uncoupled unsourced random access in 6G wireless networks. The contributions of this paper are as follows:
-
1.
We provide a high-efficiency unsourced random access scheme inspired by the recent uncoupled framework in which parity bits are avoided but channel characteristics are exploited for codeword concatenation.
-
2.
We design a low-complexity Bayesian joint decoding algorithm, which implements codeword detection in the case of unknown priors and codeword stitching with the assistance of channel statistics.
-
3.
We analyze the overall performance of the proposed Bayesian joint decoding-based uncoupled unsourced random access scheme, and confirm its low complexity and high reliability.
-
4.
We obtain some useful insights by asymptotic analysis and prove that the error probability of codeword detection tends to zero by increasing the number of BS antennas and transmit power.
The rest of this paper is organized as follows: Section II introduces the uncoupled unsourced random access-based 6G mMTC model. Section III designs a Bayesian joint decoding algorithm for the proposed massive uncoupled unsourced random access scheme. Section IV analyzes the convergence, complexity and error performance of the proposed decoding algorithm and provides some useful insights via asymptotic analysis. Then, simulation results are given in Section V to evaluate the effectiveness of the proposed scheme. Finally, Section VI concludes the paper.
Notations: Bold upper (lower) letters denote matrices (column vectors), denotes transpose, denotes conjugate transpose, denotes a complex matrix or vector of dimension , denotes the complex Gaussian distribution of a vector with mean x and covariance Y, denotes the probability of an event, denotes expectation, denotes the exponent, , and denote the -th element, -th row and -th column of matrix X, respectively, and denote the 2-norm of a vector and Frobenius norm of a matrix respectively, and denotes the trace of a matrix. denotes the -th element of set .
II System Model
Consider an unsourced random access protocol-based single-cell 6G mMTC system, where a BS equipped with antennas serves single-antenna IoT user equipments (UEs) over the same time-frequency resource block. Due to the sporadic traffic of IoT applications, only a small set of UEs, denoted by , are active in a certain time slot. Active UE transmits a binary message of bits to the BS and the transmitted message set is represented by . To reduce the complexity of receiver, the -bit message of the -th active UE is divided into short sub-blocks of length with , such that a small codebook can be employed. Meanwhile, a time slot is partitioned into sub-slots of duration symbols each. According to the principle of unsourced random access, all UEs share the same codebook. Each active UE maps its sub-blocks to codewords based on a common codeword selection scheme. Specifically, let be the codebook with each column representing a codeword with unit norm . In the -th () sub-slot, the -th sub-block of the -th () active UE is mapped to integer and the -th codeword will be transmitted. For a -bit binary sub-block, there are possible combinations, thus . Herein, the split of message and map** of codeword at the active UE terminal are called encoding.
After map**, all active UEs synchronously transmit their codewords to the BS over sub-slots in sequence. Hence, the received signal at the BS in the -th sub-slot can be expressed as
(1) |
where denotes the codeword sent by the -th active UE in the -th sub-slot. is the channel vector from the UE to the BS in the -th sub-slot. It follows Rayleigh block fading across sub-slots, i.e., with being the large-scale fading coefficient which are unknown at the BS. represents the additive white Gaussian noise (AWGN) with zero mean and variance , where is noise power and is the per-symbol maximum transmit power. By arrangement, we let . is a binary codeword activity indicator matrix. It has 1 elements in the -th row and the -th () column, and 0 entries in the rest. With the received signals, the BS detects active slot-wise codewords and stitches the codewords across sub-slots to recover messages . In the following section, we design a decoding algorithm for the BS to achieve this goal.
III Design of Bayesian Joint Decoding
In this section, we design a Bayesian joint decoding algorithm to recover the original messages from the received signals at the BS. Specifically, the decoder detects the transmitted codewords of every sub-slot based on noisy observation and common codebook C without prior information including the number of active UEs , channel fading coefficient , and noise variance . Then, the acquired codewords are unmapped to sub-blocks and stitched together to obtain original messages. The details of the Bayesian joint decoding algorithm are provided below.
III-A The preparation of decoding
Assumption: In this paper, to facilitate decoding design and performance analysis, it is assumed that the transmitted codewords within a certain sub-slot do not collide with each other due to suitable parameter settings111In general, the codewords in the common codebook are selected by active UEs independently across sub-slots. The codeword collision probability can be computed as . For convenience of decoding design and performance analysis, the ideal situation without collision under suitable parameters is considered. 2In the case of codeword collision, the following collision intervention mechanism before codeword stitching is given for reference [22]. When collisions occur in sub-slot , the number of non-zero rows of the codeword detection output is less than (the estimated in the former sub-slot without collisions can be used) and the BS can only recover the superimposed channels of collided codewords, resulting in the failure of codeword concatenation. At this time, the BS judges which codewords are sent by multiple UEs via energy detection and then feeds the indices of repeatedly transmitted codewords back to all UEs. The UEs who find they are in a collision slide their sub-block window of length bits forward with sliding length , such that the new sequences can be used to map different codewords. Note that these new codewords are retransmitted and only used to detect the channels of collided UEs, where the channels no longer overlap and can be used for the stitching of original codewords.,2.
Under this assumption, the following approximate distribution can be adopted in decoding. For the matrix , its -th row follows a Bernoulli-Gaussian distribution, i.e.,
(2) |
where denotes the non-zero probability of , i.e., codeword activity probability. represents the codeword variance with being the -th element of . For notational simplicity, we omit the sub-slot index since the codewords transmission and detection are identical in each sub-slot, and denote the above distribution as
(3) |
where is the dirac Delta at zero. In this context, X can be called a non-binary codeword state matrix and the row non-zero probability is . Due to the sporadic activation of UEs, matrix X is row-wise sparse. Moreover, it is seen that the dimensions of codeword state matrix are independent of the total number of potential UEs . Based on this model setting, the proposed Bayesian joint decoding algorithm containing codeword detection and stitching is implemented as illustrated in Fig. 1.
III-B The detection of codeword state matrix
Intuitively, the recovery of lists of transmitted codewords is equivalent to the reconstruction of codeword state matrix X, which is a compressed sensing problem because X is row-wise sparse. Further, this is also a multiple measurement vectors (MMV) setup due to multiple BS antennas [23]. By leveraging the sparsity structure of X as prior, in this part, we exploit the Bayes-optimal and divergence-free orthogonal approximate message passing (OAMP) method to detect the codeword state matrix [24, 25, 26]. Meanwhile, since the BS has no knowledge of codeword activity probability , codeword variance and noise variance , an expectation maximization (EM) algorithm is adopted to estimate them [27].
Generally, we aim to obtain the minimum mean square error (MMSE) estimation of X based on the received signals (1) and sparsity structure (3). Yet, it is not trivial to address these two constraints jointly. To this end, the proposed OAMP detector works in an iterative way. Specifically, two local modules, i.e., a linear estimator and a non-linear estimator , process linear constraint (1) and non-linear constraint (3) separately and run iteratively to obtain the final results. Define the iteration between the and as:
(4) | ||||
(5) |
where is the iteration index, in (4) (or in (5)) is the a-posterior estimation of X generated by estimator (or ) and the a-prior mean of X in (4) (or in (5)).
Now let’s decompose the MMV problem caused by multiple-antenna deployment to simplify OAMP iterations. For linear constraint (1), since the correlation between different antennas (i.e., different columns of X) is not considered in our paper, matrix operation is equivalent to column-vector operation . For non-linear constraint (3), because X is row-sparse and channels between different codewords (i.e., different rows of X) are independent, matrix operation is equivalent to row-vector operation .
First, we consider the linear estimator based on the received column-vector signals . Assume that the Gaussian observation of column vector at the -th iteration is given by
(6) |
where is the complex Gaussian random vector with variance . Starting with , and , the linear MMSE (LMMSE) estimation of at the -th iteration in column-by-column way can be computed as
(7) |
with
(8) |
To guarantee the convergence of iterative algorithm, the output of linear estimator at the -th iteration is imposed a scaling and an orthogonalization on LMMSE estimation as follows ()
(9) |
and the corresponding error variance can be calculated as
(10) |
Next, we consider the non-linear estimator based on the row-sparse structure of X. Assume that the Gaussian observation of row vector at the -th iteration is given by
(11) |
where is the complex Gaussian random vector with variance . Under this assumption, the MMSE estimations of in row-by-row way are generated as
(12) | |||
(13) |
where posterior activity probability , Gaussian posterior mean and variance are calculated as
(14) | |||
(15) | |||
(16) |
After that, similarly, we carry out the scaling and orthogonalization on MMSE estimations at the -th iteration to guarantee the convergence of OAMP detector as follows
(17) | |||
(18) |
The derivations and detailed explanations of the above content can be found in our previous work [28]. Notice that when the iteration between two estimators converges, the MMSE estimation before scaling and orthogonalization is the final estimation of X, i.e., , where is the index of last iteration.
III-C The estimation of unknown priors
During the above iteration between and , the prior information including noise variance , codeword activity probability and codeword variance are required simultaneously. However, it is difficult for the BS to acquire these information accurately and timely in advance. Therefore, a parameter estimator is needed and combined with and to realize the codeword detection.
In general, the maximum likelihood (ML) method is often used for parameter estimation [29]. However, the likelihood function cannot be directly solved due to the existence of hidden variables. Fortunately, the existing powerful EM algorithm is able to convert the ML problem into the maximization problem of its lower bound. In this case, the problem is done through an “expectation” step of finding the distribution of the hidden variable and a “maximization” step of maximizing the likelihood function. Inspired by that, we employ an EM algorithm to learn the codeword activity probability , codeword variance and noise variance , denoted by .
To be specific, we try to obtain the ML estimations of these unknown parameters, i.e., . It can be derived through the following two steps:
-
•
Expectation Step: Solve the expectation conditioned on Y with parameters .
(19) (20) -
•
Maximization Step: Find the maximum of conditional expectation.
(21)
The joint optimization of is intractable, thus we divide this ML problem into three independent parts, where one parameter is updated at one time while other parameters are fixed.
EM update of noise variance: The elements of AWGN matrix Z follow the i.i.d. Gaussian distribution . Due to
(22) |
with being a constant independent of , the EM update can be rewritten as
(23) | ||||
(24) |
Substituting into the above equation and zeroing the derivative, we can derive
(25) |
Therefore, we have
(26) |
with and being MMSE estimations in the non-linear estimator .
EM update of codeword activity probability: Due to
(27) |
with being a constant independent of , the EM update can be rewritten as
(28) |
Substituting into the above equation and zeroing the derivative, we can derive
(29) |
Hence, we have
(30) |
with being the posterior activity probability in the non-linear estimator .
EM update of codeword variance: Similarly, the EM update of can be rewritten as
(31) |
Substituting into the above equation and zeroing the derivative, we can derive
(32) |
Thus, we have
(33) |
with and being the Gaussian posterior mean and variance in the non-linear estimator . So far, the parameter estimator has been designed.
Remark: It is worth pointing out that initial values of these unknown parameters are crucial to the above EM updates. Following a previously relevant work [27], are set as
(34) | ||||
(35) | ||||
(36) |
where is usually set as 100, and denote the cumulative distribution function (CDF) and probability density function (PDF) of standard normal distribution, respectively. The iteration process of state detection and parameter estimation continues until the estimated codeword state matrix converges.
III-D The stitching of disordered codewords
Based on the estimated codeword state matrix in the -th sub-slot, we can determine the sets of active codewords present in each sub-slot. However, it is currently unknown which active codewords originate from the same active UE, making it impossible to recover their complete messages. To address this issue, we need to classify the disordered active codewords into distinct classes based on specific characteristics. These classes represent groups of active codewords transmitted by the same device, and the characteristics used for classification are referred to as class labels. Once the active codewords belonging to the same class are mapped back to binary sub-blocks and concatenated in the correct chronological order, we can obtain the original messages from each active UE.
Specifically, we set a flexible decision threshold for different codeword index to obtain the list of active codewords in each sub-slot. The specific expression of threshold is derived in Section IV-B. Denote the list of active codewords of sub-slot as , where is the -th row of estimated codeword state matrix and the in the list is ordered from smallest to largest. In other words, the -th codeword in codebook C, for , is the transmitted codeword from one of active UEs. Meanwhile, let , we can obtain channel vector estimations and channel fading coefficient estimations as follows, ,
(37) | ||||
(38) |
where the unknown true needs to be replaced with EM update result and the estimation error . and can be fonud in (33) and (13). Due to the flexible setting of thresholds in Section IV-B, the proposed Bayesian codeword detection can achieve high detection accuracy under favorable conditions, thereby it is assumed that is accurately estimated. As a supplement, we conduct experiments to evaluate the influence of inaccurate on the algorithm performance in Section V.
With these estimated information, we employ a Bayesian classification approach to stitch the codewords sent from the same active UE and recover its original long message [30, 31]. Based on the intrinsic correlations between the slot-wise channels experienced by a certain active UE, we pick codewords from lists of active codewords in sequence for each active UE. Codewords in one list must be selected by different active UEs due to the no-collision transmission.
First, let codewords in naturally be different classes, denoted by . Define the initial labels of these classes, i.e., the common channel statistics of codewords in the same class, as . For , the posterior probability of channel vector estimation in each class will be calculated to predict which class the estimated is actually in. Specifically, the -th class with the maximum posterior probability is the class to which belongs and the corresponding codeword index is grouped into this class. That is,
(39) | ||||
where represents the prior probability of class , represents the conditional probability and is the -th element of . Due to the Gaussian distribution of , the probability of observing given the class can be expressed as
(40) |
When all indices of active codewords in list have been grouped, each class label is updated as
(41) |
This is one round of codeword classification. The final class labels of this round are assigned to the initial class labels of the next round, and then the above classification process is repeated. The classification result when the class labels converge is the final result. After that, concatenate codewords which belong to the same class in chronological order. The long message consisting of sub-blocks mapped back by these codewords is one of the decoder outputs. Do this for all classes, the transmitted message set of all active UEs is obtained. In summary, the proposed Bayesian joint decoding algorithm can be described as Algorithm 1.
IV Performance Analysis of Massive Unsourced Random Access
In this section, the convergence, complexity and error probability of the proposed Bayesian joint decoding-based massive uncoupled unsourced random access scheme are analyzed. Meanwhile, asymptotic analysis in some extreme cases are performed to provide useful insights for the design of massive unsourced random access.
IV-A Convergence and Decoding Complexity
First, we discuss the convergence of the proposed decoding algorithm. There are two essential iterations involved. For the convergence of codeword detection. The orthogonalization of OAMP in (9), (10), (17) and (18) are diverge-free and de-correlated operations (please see [24] for proof), which ensures that are monotonically decreasing sequences. Besides, they both have lower bound . Combined with the monotone bounded theorem, we know that codeword detection is convergent. The SE fixed point of detector is derived in Appendix A. For the convergence of codeword stitching, because the initial class labels of the next round of classification are assigned by the final updated values of current round, the classification result of the next round must be better than that of the current round. After several rounds of classification, class labels will not change. This indicates that the classification result reaches a steady state and thereby the convergence of the proposed codeword stitching is guaranteed.
Then, let us state the complexity of the proposed decoding algorithm. On the one hand, the computational complexity of codeword detection in each iteration can be expressed as , which is dominated by matrix multiplication and matrix inverse in LMMSE estimation, norm operation in MMSE estimation and matrix-vector multiplication in parameter estimation. If codebook C has special structures, such as Hadamard or Discrete Fourier Transformation (DFT) matrix, the computational complexity will be reduced to . On the other hand, the computational complexity of codeword stitching in each round depends on the calculation and comparison of posterior probability, that is . Combined with the fact presented in simulation that the algorithm converges within 15 iterations, we can draw a conclusion that the proposed Bayesian joint decoding algorithm has a relatively low complexity by exploiting the codebook with a particular structure.
IV-B Error Probability of Decoding
To characterize the effectiveness of the proposed decoding algorithm, we focus on the error probability of decoding based on Assumption. In the following, error probability of codeword detection and codeword stitching will be derived respectively.
IV-B1 Bayesian codeword detection
Define the average detection error probability as
(42) |
where denotes the overall codeword activity probability. and are the misdetection probability and the false alarm probability of the -th codeword, respectively, with and representing the estimated and actual activity indicator of the -th codeword. As mentioned above, the value of decision threshold determines the probabilities of misdetection and false alarm. Hence, we obtain these two error probabilities according to their definitions and the expression of hard threshold.
Recall that the input Gaussian observation of non-linear estimator at -th iteration , due to and ,the random variable
(43) |
follows the distribution with degree of freedom [32]. In the non-linear estimator, the posterior codeword activity probability can be rewritten as
(44) |
Intuitively, whether approaches or depends on the relative magnitude of and . Based on this observation, the codeword activity decision is set as
(45) |
where threshold . Then, the probabilities of misdetection and false alarm can be computed as
(46) | ||||
and
(47) | ||||
where and . is the CDF of distribution with degree of freedom. The Gamma function, the lower and upper incomplete Gamma functions are respectively denoted as
(48) | ||||
Therefore, the average detection error probability is
(49) |
with and .
It is found that and in Bayesian codeword detection have the following relationship
(50) |
where . Due to , it can be seen that based on the monotone increasing CDF of distribution. Hence, we can balance the misdetection probability and the false alarm probability by adjusting the threshold.
IV-B2 Bayesian codeword stitching
At the receiver, we adopt a Bayesian classification approach to realize the codeword stitching. In what follows, from the perspective of classification error rate (CER), we prove that the proposed Bayesian classification approach is optimal.
For any classification rule, when determining data belongs to class , the CER for a single class is defined as the probability that does not belong to , i.e., . It can be observed that the CER now depends solely on the prior probability of class , which can still be reduced. In this case, by considering the effect of observation on classification decisions, the total CER for a class space with classes and data points in each class can be represented as
(51) |
where is the CER for data in the -th class. Intuitively, when the sample data is grouped into the class that maximizes , the total classification correct rate for the class space can reach its maximum
(52) |
This is equivalent to maximizing the Bayesian posterior probability . Therfore, it can be proved that the proposed Bayesian classification achieves the minimum CER, i.e.,
(53) |
Note that the class conditional probability in Bayesian codeword stitching only needs the relatively magnitude to be used to pick out the maximum, and it doesn’t matter if the value is greater than . While the class conditional probability should be normalized when calculating the theoretical CER here.
After codeword detection, the codeword splicer receives a correct alternative codeword with probability and a wrong alternative codeword with probability . Then, the final error probability of Bayesian joint decoding can be cast as
(54) | ||||
This means that false alarm of inactive codewords and wrong stitching of detected active codewords cause errors of Bayesian joint decoding333As an overall performance index of unsourced random access, is defined from the perspective of “codeword” and equivalent to the sum of the traditionally used probability of misdetection and the probability of false-alarm of per-user message, which are defined from the perspective of “message”.. However, it is difficult to observe the effects of key system parameters on decoding performance and draw some deterministic conclusions from this expression directly. Therefore, asymptotic analysis will be performed below to help us understand the theoretical performance.
IV-C Asymptotic Analysis
In this part, to facilitate the performance analysis of error probability of Bayesian joint decoding, some key parameters in extreme cases will be considered according to the characteristics of massive unsourced random access. For convenience, we first introduce the following lemmas.
Lemma 1
Assume that with a fixed ratio and C is a right unitarily invariant matrix, the iterative performance of Bayesian codeword detection can be tracked by the following state evolution: Starting with and ,
(55) | ||||
(56) |
where
(57) | ||||
(58) |
with being the MMSE estimation in the non-linear estimator . Please see our previous work [28] for proof.
Lemma 2
Based on Lemma 1 and , the fixed point of in the above state evolution will converge to
(59) |
Please refer to Appendix A for proof. In the following analysis, in each expression is replaced by the convergent value .
IV-C1 The influence of the number of BS antennas on Bayesian joint decoding
Considering that the BS of 6G wireless networks is equipped with a very large antenna array, this analysis reveals the influence of the number of BS antennas on the error probability of Bayesian joint decoding in the extreme case.
For and , the expressions of and can be scaled in and expanded to [33]
(60) |
and
(61) |
where the complementary error function
(62) |
and , . Then, we have
(63) |
and
(64) |
Thus, the average detection error probability
(65) |
From another point of view, due to the fact that
(66) |
when and when always hold. In other words, the codeword activity decision will be always right when is large enough. So goes to zero.
For Bayesian codeword stitching, means that the number of attribute of data to be classified tends to infinity, which will cause CER to increase. However, goes to zero faster than goes up, so that the final decoding error probability still shows a downward trend as . On the other hand, as analyzed in Section IV-A, large indicates high complexity. Hence, it is necessary to choose an appropriate to balance the error probability and complexity of decoding.
Additionally, it is interestingly found that due to channel hardening in the scenario with a large-scale antenna array [34], Bayesian classification in codeword stitching will be degenerated to random classification. In this case, the final error probability of Bayesian joint decoding when can be simplified to
(67) |
which demonstrates its performance saturation value. Note that this performance constraint is affected by the Rayleigh fading channel model-based Bayesian classifier, and we can use preprocessing techniques such as dimension reduction or machine learning methods such as support vector machine to improve the performance of the channel features-based codeword concatenation.
IV-C2 The influence of the transmit power on Bayesian joint decoding
Similarly, it is helpful to examine the decoding performance with a sufficiently high transmit power, which will imply an upper bound on performance regardless of transmit costs.
When transmit power , combined with , we have
(68) |
and
(69) |
Therefore,
(70) |
and
(71) |
That is, the average detection error probability
(72) |
Yet, it is hard to obtain a closed-form expression of final error probability of decoding due to the CER in an uncertain form when . In the simulations, the above theoretical results will be verified.
V Numerical Results
In this part, we conduct extensive simulations to evaluate the effectiveness of the proposed Bayesian joint decoding-based massive uncoupled unsourced random access scheme. Unless extra specified, the main simulation parameters are set as: , , , bits, bits, , and . In addition, the codebook matrix C is obtained by randomly selected rows of an -point DFT matrix. Thereby, . The noise power is assumed to be and the signal-to-noise ratio (SNR) is defined as . For convenience, set the minimum receive SNR be . The path loss model of the uplink channel for UE is [32]. is the distance between UE and the BS, and it is randomly distributed in km.
We first observe the convergence of the proposed algorithm with different numbers of active UEs. As shown in Fig. 2, the mean normalized MSE (NMSE) of the proposed codeword detection, i.e., , which is presented by three solid lines, converges within 15 iterations with precision for all three cases. Additionally, the convergence of class labels, i.e., the convergence of the proposed codeword stitching, which is presented by the dotted line, can also be guaranteed within 15 iterations with precision . These facts all imply the low complexity of the proposed Bayesian joint decoder.
Fig. LABEL:sim1 examines the impact of SNR and the accuracy of on the performance of the proposed Bayesian joint decoding algorithm. In Fig. LABEL:sim1, the blue bars represent the error probabilities of (the estimated is larger or smaller than the true ) under different SNR levels. The red solid line indicates the scenario where is assumed to be perfectly estimated. This line solely reflects the influence of SNR on the final error probability. On the other hand, the red dashed line represents the situation where the BS cannot accurately determine active codewords in each sub-slot after the proposed Bayesian codeword detection. This line demonstrates the combined effect of both SNR and the estimation error of on the algorithm’s performance. Intuitively, as the SNR increases, the gap between the two red lines gradually narrows, and they almost coincide when the SNR exceeds 10 dB. This is because, at low SNR levels, the accuracy of estimated is relatively poor, which makes the proposed codeword stitching not work well. When the SNR surpasses a certain threshold, the estimation error of the number of active devices becomes negligible in its impact on the performance of the proposed Bayesian joint decoding algorithm. Therefore, under favorable conditions, it is reasonable to assume that is accurately estimated.
Fig. 4 compares the final error probability of the proposed Algorithm 1-based uncoupled unsourced random access scheme with different unsourced random access schemes versus the number of BS antennas. For comparison, we conduct the following schemes.
(i) Coupled unsourced random access with MMV-AMP codeword detection used and tree code stitching used in [16] (written as “MMV-AMP + Tree” in the legend). To ensure the same length of message bits, the message is divided into sub-blocks of length bits with parity check in sub-blocks occupying bits. For fairness, the same EM parameter estimation as in this paper is employed.
(ii) Coupled unsourced random access with energy codeword detection (ECD) and tree code stitching (written as “ECD + Tree” in the legend). For codeword detection, compute the codeword energy by correlating the received signal with each column in codebook and obtain the indices corresponding to largest values. For tree code stitching, the parameter settings are the same as scheme (i).
(iii) Uncoupled unsourced random access with MMV-OAMP codeword detection in this paper and K-means stitching adopted in [20, 21] (written as “MMV-OAMP + K-means” in the legend). The parameters are set the same as this paper.
Intuitively, the error probabilities of all the schemes decrease monotonically as the number of BS antennas increases due to the array gains and the proposed scheme with OAMP detector and Bayesian splicer has lower error probability. Furthermore, from the perspective of spectral efficiency (SE) per user per channel use, the SE of the proposed scheme and scheme (iii) can be calculated as bits/user/channel-use. Since extra parity check bits introduced in (i) and (ii) occupy some positions, their SE are given by . However, the coupled transmission schemes possess their own advantages. They do not exhibit the error floor effect that arises from channel features-based codeword stitching and have the potential to accommodate a larger number of active devices. For the proposed scheme and scheme (iii), which have the same SE, it can be seen that when the 3D antenna deployment of the original solution in [21] is missing, that is, the additional angle domain information is unavailable, the proposed Bayesian classifier outperforms the K-means method with a small number of antennas. This proves the fact that Bayesian classification has the smallest CER. Additionally, from the perspective of computational complexity, the complexity of each scheme can be given by
(i) [16],
(ii) [16],
(iii) [21],
where the complexity of tree decode and is the length of parity check in -th sub-block [9].
Obviously, the proposed algorihtm with complexity of has lower complexity.
In a nutshell, these facts indicate the feasibility and effectiveness of the proposed algorithm in some scenarios where the receiver requires low computational cost.
Then, we show the impact of SNR on the proposed algorithm for different numbers of BS antennas. In Fig. 5, it is seen that the final error probability of Bayesian joint decoding decreases as SNR increases in all cases. Moreover, the decoding performance can be enhanced by adding BS antennas due to the increasing array gains. When the error probability , only is needed for while is acquired for . Thus, it is likely to reduce the transmission costs of device terminals by deploying more antennas at the BS.
Next, we check the asymptotic analysis with the number of BS antennas in the extreme case. It can be observed from Fig. 6 that no matter it is error probability of codeword detection or the final error probability , the simulation data obtained from the experiments are basically consistent with the theoretical value calculated from the analysis expression. Specifically, the error probability of codeword detection approaches to zero when the number of BS antennas is sufficiently large, and the final error probability tends to the order of magnitude of . To explain, since the channel hardening associated with the large number of antennas, the error of Bayesian classification method which employs channel information for codeword stitching tends to be constant in such cases, so that the final error probability decreases with the increment of at the beginning and tends to saturate when is large enough.
Finally, Fig. 7 confirms the codeword detection performance when the transmit cost is not a concern. Intuitively, the curves of theoretical and simulated error probability of codeword detection also almost overlap and both of them tend to zero with increment of SNR. When the SNR is large enough, some simulation results are always equal to , such as for , for , and thus cannot be represented in the figure. Meanwhile, it can be found that detection performance improves naturally as the number of active UEs decreases due to less interference.
In summary, the proposed Bayesian joint decoding algorithm has a promising potential of improving the performance of uncoupled unsourced random access in 6G wireless networks.
VI Conclusion
This paper proposed a high-efficiency massive uncoupled unsourced random access scheme for 6G wireless networks without requiring extra parity check bits. A low-complexity Bayesian joint decoding algorithm was designed to implement codeword detection and stitching based on channel statistical information. Both theoretical analysis and numerical simulations confirmed that the proposed algorithm had low complexity and good performance. Moreover, asymptotic analysis showed that the error probability of codeword detection tended to zero as the number of BS antennas and the transmit power increased.
Appendix A Derivation of Lemma 2
Based on (55) and (56), the state evolution with DFT matrix C in Bayesian codeword detection can be simplified as below
(73) | ||||
(74) |
where
(75) |
Thus, we have
(76) |
Substituting the above equation into the state evolution, the recursive expression can be rewritten as
(77) |
Then, we define the function
(78) |
The derivative of with respect to is
(79) |
Due to
(80) |
, that is , is needed to be satisfied to guarantee , i.e., the monotonicity of . Consequently, the fixed point of state evolution is unique. Next, from (77), we have
(81) |
and it can be further transformed to
(82) |
Finally, substituting this upper bound of into , we have (A) at the top of the next page.
(83) |
Therefore, it has been proved that the fixed point of state evolution is .
References
- [1] X. Chen, D. W. K. Ng, W. Yu, E. G. Larsson, N. Al-Dhahir, and R. Schober, “Massive access for 5G and beyond,” IEEE J. Sel. Areas Commun., vol. 39, no. 3, pp. 615-637, Mar. 2021.
- [2] X. Chen, Massive Access for Cellular Internet of Things Theory and Technique, Germany: Springer, 2019.
- [3] Z. Gao, M. Ke, Y. Mei, L. Qiao, S. Chen, D. W. K. Ng, H. V. Poor, “Compressive sensing-based grant-free massive access for 6G massive communication,” IEEE Internet of Things J., vol. 11, no. 5, pp. 7411-7435, Mar. 2024.
- [4] L. Liu, E. G. Larsson, W. Yu, P. Popovski, C. Stefanovic, and E. de Carvalho, “Sparse signal processing for grant-free massive connectivity: A future paradigm for random access protocols in the Internet of Things,” IEEE Signal Process. Mag., vol. 35, no. 5, pp. 88-99, Sep. 2018.
- [5] Z. Zhang, X. Wang, Y. Zhang, and Y. Chen, “Grant-free rateless multiple access: A novel massive access scheme for internet of things,” IEEE Commun. Lett., vol. 20, no. 10, pp. 2019-2022, Oct. 2016.
- [6] K. Senel and E. G. Larsson, “Grant-free massive MTC-enabled massive MIMO: A compressive sensing approach,” IEEE Trans. Commun., vol. 66, no. 12, pp. 6164-6175, Dec. 2018.
- [7] M. Ke, Z. Gao, Y. Wu, X. Gao, and R. Schober, “Compressive sensing-based adaptive active user detection and channel estimation: Massive access meets massive MIMO,” IEEE Trans. Signal Process., vol. 68, pp. 764-779, 2020.
- [8] Y. Polyanskiy, “A perspective on massive random access,” in Proc. IEEE International Symposium on Information Theory (ISIT), pp. 2523-2527, Aug. 2017.
- [9] V. K. Amalladinne, J. Chamberland, and K. R. Narayanan, “A coupled compressive sensing scheme for unsourced multiple access,” in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 6628-6632, Sep. 2018.
- [10] V. K. Amalladinne, A. K. Pradhan, C. Rush, J. Chamberland, and K. R. Narayanan, “On approximate message passing for unsourced access with coded compressed sensing,” in Proc. IEEE International Symposium on Information Theory (ISIT), Aug. 2020.
- [11] Y. Wu, X. Gao, S. Zhou, W. Yang, Y. Polyanskiy, and G. Caire, “Massive access for future wireless communication system,” IEEE Wireless Commun., vol. 27, no. 4, pp. 148-156, Apr. 2020.
- [12] A. K. Pradhan, V. K. Amalladinne, K. R. Narayanan, and J. Chamberland, “Polar coding and random spreading for unsourced multiple access,” in Proc. IEEE International Conference on Communications (ICC), Jul. 2020.
- [13] F. Tian, X. Chen, L. Liu, and D. W. K. Ng, “Massive unsourced random access over rician fading channels: Design, analysis, and optimization,” IEEE Internet Things J., vol. 9, no. 18, pp. 17675-17688, Sep. 2022.
- [14] A. Fengler, G. Caire, P. Jung, and S. Haghighatshoar, “Massive MIMO unsourced random access,” arXiv:1901.00828, 2019.
- [15] A. Fengler, P. Jung, and G. Caire, “SPARCs for unsourced random access,” IEEE Trans. Info. Theory, vol. 67, no. 10, pp.6894-6915, Oct. 2021.
- [16] A. Fengler, S. Haghighatshoar, P. Jung, and G. Caire, “Non-Bayesian activity detection, large-scale fading coefficient estimation, and unsourced random access with a massive MIMO receiver,” IEEE Trans. Info. Theory, vol. 67, no. 5, pp. 2925-2951, Mar. 2021.
- [17] J. Che, Z. Zhang, Z. Yang, X. Chen, C. Zhong, and D. W. K. Ng, “Unsourced random massive access with beam-space tree decoding,” IEEE J. Sel. Areas Commun., vol. 40, no.4, pp. 1146-1161, Apr. 2022.
- [18] V. K. Amalladinne, A. K. Pradhan, C. Rush, and J. Chamberland, “Unsourced random access with coded compressed sensing: Integrating AMP and belief propagation,” IEEE Trans. Info. Theory, vol. 68, no. 4, pp. 2384-2409, Apr. 2022.
- [19] A. K. Pradhan, V. Amalladinne, A. Vem, K. R. Narayanan, and J-F. Chamberland, “Sparse IDMA: A joint graph-based coding scheme for unsourced random access,” IEEE Trans. Commun., vol. 70, no. 11, pp. 7124-7133, Nov. 2022.
- [20] V. Shyianov, F. Bellili, A. Mezghani, and E. Hossain, “Massive unsourced random access based on uncoupled compressive sensing: Another blessing of massive MIMO,” IEEE J. Sel. Areas Commun., vol. 39, no. 3, pp. 820-834, Aug. 2020.
- [21] X. Xie, Y. Wu, J. An, J. Gao, W. Zhang, C. Xing, K-K. Wong, and C. Xiao, “Massive unsourced random access: exploiting angular domain sparsity,” IEEE Trans. Commun., vol. 70, no. 4, pp. 2480-2498, Apr. 2022.
- [22] T. Li, Y. Wu, M. Zheng, W. Zhang, C. Xing, J. An, X. Xia, and C. Xiao, “Joint device detection, channel estimation, and data decoding with collision resolution for MIMO massive unsourced random access,” IEEE J. Sel. Areas Commun., vol. 40, no. 5, pp. 1535-1555, May 2022.
- [23] J. Ziniel and P. Schniter, “Efficient high-dimensional inference in the multiple measurement vector problem,” IEEE Trans. Signal Process., vol. 61, no. 2, pp. 340-354, Jan. 2013.
- [24] J. Ma and L. **, “Orthogonal AMP,” IEEE Access, vol. 5, pp. 2020-2033, 2017.
- [25] S. Rangan, P. Schniter, and A. K. Fletcher, “Vector approximate message passing,” IEEE Trans. Info. Theory, vol. 65, no. 10, pp. 6664-6684, Oct. 2019.
- [26] Y. Cheng, L. Liu, and L. **, “Orthogonal AMP for massive access in channels with spatial and temporal correlations,” IEEE J. Sel. Areas Commun., vol. 39, no. 3, pp. 726-740, Mar. 2021.
- [27] J. P. Vila and P. Schniter, “Expectation-maximization Gaussian-mixture approximate message passing,” IEEE Trans. Signal Process., vol. 61, no. 19, pp. 4658-4672, Oct. 2013.
- [28] F. Tian, L. Liu, and X. Chen, “Generalized memory approximate message passing for generalized linear model,” IEEE Trans. Signal Process., vol. 70, pp. 6404-6418, 2022.
- [29] S. M. Kay, Fundamentals of Statistical Signal Processing: Estimation Theory. Englewood Cliffs, NJ: Prentice-Hall, 1993.
- [30] A. H. Jahromi and M. Taheri, “A non-parametric mixture of Gaussian naive Bayes classifiers based on local independent features,” in Proc. 2017 Artificial Intelligence and Signal Processing Conference (AISP), Mar. 2018.
- [31] M. Ontivero-Ortega, A. Lage-Castellanos, G. Valente, R. Goebel, and M. Valdes-Sosa, “Fast Gaussian Naive Bayes for searchlight classification analysis,” NeuroImage, vol. 163, pp. 471-479, Dec. 2017.
- [32] L. Liu and W. Yu, “Massive connectivity with massive MIMO-Part 1: Device activity detection and channel estimation,” IEEE Trans. Signal Process., vol. 66, no. 11, pp. 2933-2946, Jun. 2018.
- [33] W. Gautschi, “The incomplete Gamma functions since Tricomi,” Atti dei Convegni Linci, no. 1998, pp. 203-237, 2011.
- [34] H. Q. Ngo, E. G. Larsson, and T. L. Marzetta, “Energy and spectral efficiency of very large multiuser MIMO systems,” IEEE Trans. Commun., vol. 61, no. 4, pp. 1436-1449, Apr. 2013.
- [35] M. Gkagkos, K. R. Narayanan, J.-F. Chamberland, and C. N. Georghiades, “FASURA: A scheme for quasi-static fading unsourced random access channels,” IEEE Trans. Commun., vol. 71, no. 11, pp. 6391-6401, Nov. 2023.
- [36] M. Ke, Z. Gao, M. Zhou, D. Zheng, D. W. K. Ng, and H. V. Poor, “Next-generation URLLC with massive devices: A unified semi-blind detection framework for sourced and unsourced random access,” IEEE J. Sel. Areas Commun., vol. 41, no. 7, pp. 2223-2244, Jul. 2023.