Next Article in Journal
Molecularly Imprinted Sol-Gel-Based QCM Sensor Arrays for the Detection and Recognition of Volatile Aldehydes
Next Article in Special Issue
Coalition Game-Based Secure and Effective Clustering Communication in Vehicular Cyber-Physical System (VCPS)
Previous Article in Journal
A Robust Random Forest-Based Approach for Heart Rate Monitoring Using Photoplethysmography Signal Contaminated by Intense Motion Artifacts
Previous Article in Special Issue
An Auction-Based Spectrum Leasing Mechanism for Mobile Macro-Femtocell Networks of IoT
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Differential Characteristics Based Iterative Multiuser Detection for Wireless Sensor Networks

1
School of Astronautics, Harbin Institute of Technology, Harbin 150001, China
2
China Academy of Space Technology, Beijing 100089, China
3
School of Electronics and Information Engineering, Harbin Institute of Technology, Harbin 150001, China
*
Author to whom correspondence should be addressed.
Sensors 2017, 17(2), 388; https://doi.org/10.3390/s17020388
Submission received: 2 December 2016 / Revised: 4 February 2017 / Accepted: 9 February 2017 / Published: 16 February 2017

Abstract

:
High throughput, low latency and reliable communication has always been a hot topic for wireless sensor networks (WSNs) in various applications. Multiuser detection is widely used to suppress the bad effect of multiple access interference in WSNs. In this paper, a novel multiuser detection method based on differential characteristics is proposed to suppress multiple access interference. The proposed iterative receive method consists of three stages. Firstly, a differential characteristics function is presented based on the optimal multiuser detection decision function; then on the basis of differential characteristics, a preliminary threshold detection is utilized to find the potential wrongly received bits; after that an error bit corrector is employed to correct the wrong bits. In order to further lower the bit error ratio (BER), the differential characteristics calculation, threshold detection and error bit correction process described above are iteratively executed. Simulation results show that after only a few iterations the proposed multiuser detection method can achieve satisfactory BER performance. Besides, BER and near far resistance performance are much better than traditional suboptimal multiuser detection methods. Furthermore, the proposed iterative multiuser detection method also has a large system capacity.

1. Introduction

Wireless sensor network (WSN) is a special kind of ad-hoc network which can be applied in military, home industrial and other monitoring scenarios [1]. High throughput and low latency sensor networks ubiquitously provide connections around us. Most wireless sensor networks focus on narrowband physical layers such as IEEE 802.15.4 on 2.4 GHz. However, ultra-wideband (UWB) technology provides high data transmission rates, strong multipath resolution and high interference resistance ability which is more suitable for communication links or WSNs in specific scenarios such as multimedia transmission, dense multipath scenarios and high reliability communication.
In recent years, WSN based on UWB has been explored in various scenarios including wireless monitoring sensor networks in underground mine tunnels [2], smart buildings [3], marine engine telemetry sensor networks [4], aircraft sensor networks [5] and wireless body sensor networks [6]. For star topology wireless sensor networks based on UWB, direct sequence UWB (DS-UWB) is a suitable technology to provide reliable multiple access for each sensor node. In a sense, the multiple access scheme of DS-UWB is similar to code division multiple access (CDMA) systems, as both of them use pseudorandom codes to distinguish different users. For such a DS-UWB system, the multiple access interference and noise are serious limiting conditions for improving its bit error ratio (BER) performance.
Multiuser detection is an effective method to eliminate the bad effect of multiple access interference. The optimal multiuser detection (OMUD) method was first proposed by Verdu in 1986 [7]. With a bank of matched filters followed by a maximum likelihood sequence estimator, optimal multiuser detection achieves optimal BER and near-far effect resistance performances. However, optimal multiuser detection has a computational complexity that grows exponentially with the number of users. This feature makes optimal multiuser detection impractical to implement in actual communication systems.
Consequently, many studies have been performed on suboptimal multiuser to obtain less complexity and good BER performance. Of them, linear multiuser detection has been widely studied as low-complexity integrated mathematical analysis [8,9]. Matched filter (MF), decorrelating (DEC) and minimum mean square error (MMSE) are three representative linear multiuser detection methods. Linear multiuser detectors form the output based on various linear filters. In recent years, considerable attention has been focused on blind multiuser detection, which requires the prior knowledge of only the signature sequence and timing of the desired user [10,11,12,13,14,15,16]. In [13], a novel subspace tracking algorithm by orthonormalizing the eigenvectors using an approximation of Gram-Schmidt procedure was applied to blind multiuser detection. This scheme demonstrates the performance improvement for non-stationary cellular CDMA environment. Besides, suboptimal multiuser detection algorithms based on SINR Lower Bound [17], box-constrained deregularization [18], compressive sensing [19], restricted search space [20], decision-level data fusion technologies [21] and opportunistic multiuser detection [22,23] were analyzed in recent years. As for coded DS-UWB systems, iterative multiuser detection methods were also widely analyzed. Usually these suboptimal multiuser detection algorithms seek tradeoff between computation complexity and BER performance. On the basis of the Turbo decoding algorithm, various iterative multiuser detection algorithm were proposed [24,25,26,27]. Reference [26] proposed an iterative multiuser detector for overloaded LDPC coded CDMA systems. This receiver consists of a combination of matched filters in the first stage and a linear MMSE detector and an interference cancellation scheme in the successive stages. In this way, the receiver achieved better BER performance than Turbo coded systems.
In this paper, an iterative multiuser detection algorithm based on differential characteristics is proposed for DS-UWB systems. On the basis of optimal multiuser detection, differential characteristics are derived to map the received bit sequence in to a one-dimensional feature space, So that the wrongly received bits are easy to distinguish. Then threshold detection is utilized to get a preliminary detection of the potential wrongly received bit because the optimal threshold is difficult to compute. After that an error bit correct procedure is employed to correct the mistakes in the previous preliminary threshold detection. The above described differential characteristics calculation, preliminary threshold detection and error bit correction procedures are iterated to achieve better EBR performance. Simulation results demonstrate performance improvement compared to traditional suboptimal multiuser detection methods.
The reminder of this paper is organized as follows: Section 2 introduces the system model DS-UWB system and several typical multiuser detection algorithms. In Section 3, the proposed multiuser detection method is described in detail. Simulations and discussions are given in Section 4. Conclusions are in Section 5.

2. Several Multiuser Detection Methods for DS-UWB Systems

Suppose K users transmit signals simultaneously in a DS-UWB system. In this binary phase shift key (BPSK) modulated DS-UWB system, the received signal can be expressed as:
r ( t ) = k = 1 K E k S k ( t ) d k + n ( t ) 0 n T
where Ek denotes the bit energy of the kth user; Sk(t) denotes the unit-energy signature waveform which is constructed by the pseudo random sequences of the kth user; d k { + 1 , 1 } denotes the bit value of kth user; n(t) denotes the noise with power spectral density N0, and T denotes the bit interval.
After a bank of matched filters, the output of kth user sampled at T is achieved by the following expression:
y k = 0 T r ( t ) S k ( t ) d t = E k d k + j = 1 j k K E j ρ j k d j + n k
where the self-correlation of user k is normalized to 1, i.e., ρ k k = 0 T S k ( t ) S k ( t ) d t = 1 , the cross correlation of user j and k is ρ j k = 0 T S j ( t ) S k ( t ) d t , and the noise at the output of kth user is n k = 0 T S k ( t ) n ( t ) d t . In principle, it is assumed that ρ i i ρ i j ,   i j .
The matched filter outputs of the K users can be written in vector form as:
y = [ y 1 y 2 y K ] T = R A d + n
where R is the correlation matrix of the signature waveforms, i.e., R i j = ρ i j , A = diag [ E 1 E 2 E K ] , d = [ d 1 d 2 d K ] , and n is the K × 1 zero-mean additive white Gaussian noise vector.
The symbol decisions after matched filters are given by:
b = sgn ( y )
As is shown in (2), each element of b is interfered by other K-1 elements of d due to R i j 0 ( when i j ) . Thus various multiuser detection algorithms were proposed to eliminate the bad effect of multiple access interference.
On the basis of matched filter, optimal multiuser detection takes advantages of maximum likelihood sequence estimation algorithm. The likelihood function can be expressed as:
p ( y | b ) = exp ( 1 2 ( y R A b ) T ( σ 2 R ) 1 ( y R A b ) ( 2 π ) K / 2 σ | R | 1 / 2 )
where |R| denotes the determinant of R. the maximum likelihood symbol decisions can be written as:
b OMD = arg max b { 2 b T A y b T A R A b }
The above maximization problem is a combinatorial optimization problem which is known to be NP-hard: its computational complexity increases exponentially with the number of user in a WSN. This O(2K) implementation complexity required by optimal multiuser detection makes it impractical for real system. Consequently, various low complexity multiuser detection algorithms are proposed to achieve the tradeoff problem between computational complexity and BER performance. Optimal multiuser detection represents, however, a basis for comparison for other suboptimal detectors.
Linear multiuser detection is an important class of low complexity multiuser detection algorithms. Linear multiuser detectors form the output blinear based on various linear filters. The output of linear multiuser detectors follows the following expressions:
b l i n e a r = sgn ( M y )
For decorrelating multiuser detection we can get:
M = R 1
For the minimum mean square error (MMSE) multiuser detection we obtain:
M = A 1 ( R + σ 2 A 2 ) 1
For decorrelating a multiuser detector the output is interference free, but the background noise is enhanced by the transformation R−1, while MMSE detection balances the desire to completely eliminate the multiple access interference with the desire of avoiding the background noise enhancement.

3. Multiuser Detection Based on Differential Characteristics

The main idea of the proposed multiuser detection method is to iteratively find the error bits from the received signals and correct them. The block diagram of the proposed iterative multiuser detection algorithm is shown below in Figure 1. Firstly, the differential characteristics are calculated and the outputs of matched filters are mapped in to a one dimension space due to optimal multiuser detection is a multi-dimensional optimization problem; then a primary threshold classification is conducted to find the potential incorrectly received bits; after that an error bit corrector is employed to correct the wrong bits. The three stage process above is iterative executed to further lower the BER.

3.1. Differential Characteristics Calculation

On the basis of the decision function of optimal multiuser detection, let:
F ( b ) = 1 2 b T A R A b b T A y = 1 2 i = 1 K j = 1 K A i A j ρ i j b i b j i = 1 K b i A i y i
From (10), it is clear that function F(b) is a quadratic form of vector b, which means this is a non-linear equation with the order of two. And it is not easy to solve the minimum of F(b) and the corresponding value of b. In addition, the function F(b) embraces cross-component bibj (i, j = 1, 2,…, K, ij), and we can’t judge a bit independently by F(b). Hence, it is not appropriate for function F(b) to be the characteristic function.
In this case, it is better to calculate the derivative of function F(b) to decrease the order of characteristic function. Calculating the partial derivation of (10), we get:
F b = A R A b A y
By expanding (11), we get the Kth-order linear equations given as follows:
{ F b 1 = j = 1 K A 1 A j ρ 1 j b j A 1 y 1 F b 2 = j = 1 K A 2 A j ρ 2 j b j A 2 y 2 ... F b K = j = 1 K A K A j ρ K j b j A K y K
Because F(b) is a discrete equation, we cannot just setting the partial derivative described above equal to 0 and get the stationary point of F(b). Let L ( b i ) = j = 1 K A i A j ρ i j b j A i y i , i = 1, 2, …, K. Substituting the candidate sequence b into (12) (Results of conventional suboptimal multiuser detectors can be employed as the candidate sequence b. In this paper, the output of matched filter as shown in (4) is employed.), there will be two situations as discussed below:
1. No wrong bit in b
Based on the theory of extreme value, if multiple access interference is the only interference resource without AWGN and the elements in b are all correct, the result of (12) strictly equals 0. Substituting (3) into L(bk), we can see that:
L ( b k ) = A k n k ~ N ( 0 , A i 2 N 0 2 / 2 ) k = 1 , 2 , , K
Apparently, L(bk) is a zero-mean Gaussian random variable.
2. Wrong bit exists in b
Suppose bi (i =1, 2,…, K) is the wrongly received bit (in other words, −bi is the correct bit), the other bits are correct. Substituting it to the ith equation of (12), we get:
L ( b i ) = j = 1 j i K A i A j ρ i j b j A i y i + A i 2 ρ i i b i = j = 1 j i K A i A j ρ i j b j A i y i + A i 2 ρ i i ( b i ) + 2 A i 2 ρ i i b i = 2 A i 2 N c b i A i n i
As for k which is not equal to i, we get:
L ( b k ) = 2 A i A k ρ i k b i A k n k k = 1 , 2 , , K     k i .
From the above, we can get:
L ( b i ) ~ N ( 2 A i 2 b i , A i 2 N 0 2 )
L ( b k ) ~ N ( 2 A i A k ρ i k b k , A k 2 N 0 2 ) k = 1 , 2 , , K     k i
According to (16) and (17), we can see when the ith bit of b is wrong, then we get |L(bi)| >> |L(bk)|, k = 1, 2, …, K, ki with a large probability. Therefore, the function L(b) can obviously differentiate the wrong bits and the right bits through the absolute value of it. In addition, L(b) is a Kth-order linear equations which can get the result of L(b) without complex computations. In conclusion, it is appropriate to set |L(b)| as the differential characteristics function in the multiuser detection algorithm.
Here is an example of the proposed differential characteristics function |L(b)| with a condition of 10 users, 6 dB of receiver’s output signal-to-noise ratio (SNR), spread spectrum gain Nc = 63, which is shown in Figure 2.
According to Figure 2, it is clear that most of the wrong bits and the right ones have a significant difference in the feature space mapped by |L(b)| among the 200 tested bits, so it is accessible to map b into a one-dimension feature space |L(b)| to preliminarily identify the wrongly received bits.

3.2. Preliminary Threshold Detection

As is described in the above Section 3.1, it is feasible to distinguish the wrongly received bits by threshold detection. Set two statuses H0 and H1, H0 represents the status where candidate bit bk is correct, and H1 represents the status where candidate bit bk is wrong. Let Zk = |L(bk)|, according to ρ i k ρ i k ,   i k , we can see that the probability density functions of Zk in H0 and H1 are given as follows:
H 0 : f Z k ( y ) = { 0 y 0 2 A π N 0 exp [ y 2 A 2 N 0 ] y > 0
H 1 : f Z k ( y ) = { 0 y 0 1 A π N 0 { exp [ ( y 2 A 2 ) 2 A 2 N 0 ] + exp [ ( y + 2 A 2 ) 2 A 2 N 0 ] } y > 0
The curves of the probability density functions in the two status are depicted in Figure 3. The red dashed line shows the optimal threshold.
Set a as the judgment threshold. If Zk > a, verdict bk is the wrong bit; or else, verdict bk is the correct bit. The probability of detection is given as
P ( Z k > a | H 1 ) = 1 2 [ e r f c ( a 2 A 2 A N 0 ) + e r f c ( a + 2 A 2 A N 0 ) ]
The probability of false alarm is given as
P ( Z k > a | H 0 ) = e r f c ( a A N 0 )
Set Pe as the average BER of candidate bits, according to Equations (19) and (20), the BER after threshold detection equals:
P e , o u t ( a ) = 1 2 P e [ e r f c ( 2 A 2 a A N 0 ) + e r f c ( 2 A 2 + a A N 0 ) ] + ( 1 P e ) e r f c ( a A N 0 )
Therefore we can adjust the value of the threshold to minimize the value of Pe,out, the value of a, which corresponds to the minimum, is called the optimal threshold. However, the optimal threshold is relevant to many factors, including SNR and the BER of the candidate bit set. Hence, it’s difficult to set an accurate threshold to obtain the best judgment in different situations.
Therefore, a suboptimal threshold is selected to get the preliminary wrong bit recognition. From (19) we can see that when y > 0, the second term of f z k ( y ) is approximately equal to zero, especially at high SNR, i.e., noise power spectral density N0 is small compared to A, so the second term of f z k ( y ) can be ignored. For this approximation, according to (18) and (19) the solution of the following equation can be regarded as the best threshold:
2 A π N 0 exp ( y 2 A 2 N 0 ) = 1 A π N 0 exp ( ( y 2 A 2 ) 2 A 2 N 0 ) , y > 0
Solving this equation we can get:
y ^ = A 2 + ln ( 2 ) 2 N 0 A 2 + 0.3466 N 0
From the above discussion, the calculation of threshold described in (24) needs accurate estimation of noise power spectral density N0. Because A 2 is larger than N0 in actual communication system when SNR > 0 (in dB), thus the second term in (24) can be ignored. In this paper we take A i 2 as the detection threshold of the ith received bit. Furthermore, lower threshold results in higher detection probability, at the cost of higher false alarm probability. Then the next stage, error bit correction, will be utilized to reduce the false alarm probability.

3.3. Error Bit Correction

In Section 3.2 we recognize the wrong bits only by the absolute value of L(b), which sometimes may regard some correct bits as wrong bits and decrease the BER performance of the system. Section 3.2 cannot get the optimal threshold, therefore further processing method need to be taken to lower BER.
As analyzed in Section 3.1, when the ith bit of b is wrong, from (16) and (17) we get:
L ( b i ) ~ N ( 2 A i 2 b i , A i 2 N 0 2 )
L ( b k ) ~ N ( 2 A i A k ρ i k b k , A k 2 N 0 2 ) k = 1 , 2 , , K     k i
Let f(x) and g(x) be the probability density function of |L(bi)| and |L(bk)|, respectively. We can get that:
f ( x ) = { 0 x 0 1 A i π N 0 { exp [ ( x 2 A i 2 ) 2 A i 2 N 0 ] + exp [ ( x + 2 A i 2 ) 2 A i 2 N 0 ] } x > 0
g ( x ) = { 0 x 0 1 A k π N 0 { exp [ ( x 2 A i A k ρ i k ) 2 A k 2 N 0 ] + exp [ ( x + 2 A i A k ρ i k ) 2 A k 2 N 0 ] } x > 0
Similar as (23), let f(x) = g(x), we can get the optimal threshold x0. And we can get the probability that |L(bi)| >> |L(bk)|:
P ( | L ( b i ) | > | L ( b k ) | ) = x 0 + [ f ( x ) g ( x ) ] d x
However, from (27) and (28) we find that the optimal x0 is not easy to calculate. Besides, the integral in (29) is hard to calculate even when we get the accurate value of x0. As is known 1 >> ρ i j ,   ( i j ) , the probability density function curves of |L(bi)| and |L(bk)| is shown in Figure 4.
From (29) and Figure 4 we can conclude that |L(bi)| >> |L(bk)|, k = 1, 2,…, K, ki with a large probability. Thus the bits which are recognized as wrongly received in Section 3.2 can be further detected. When the ith received bit bi is judged as wrongly received bit in Section 3.2, we can calculate |L(−bi)|. If |L(−bi)| > |L(bi)|,we conclude that the value of ith bit is bi, else we conclude that the value of ith bit is −bi.
After the above three stage process procedure, there may still exists wrongly judged bits. Thus the differential characteristics calculation, threshold detection and error bit correction process are iterated as shown in Figure 1 to further lower the BER.
Now we discuss the computational complexity of the proposed multiuser detection algorithm. From (11) and (12), we can conclude that the computational complexity of differential characteristics function |L(b)| is linear to number of users K. The second stage is threshold detection, in which only K comparisons are needed. The third stage recalculates the differential characteristics function for those potential wrongly received bits, so this computational complexity of this stage is much lower than the first stage, especially at high SNR. For this proposed iterative receiver, the total computational complexity is then linear to nK, where n is the number of iterations and K is the number of users.

4. Simulation Results and Discussions

In this section we demonstrate the simulation results for star topology UWB based wireless sensor network. In this network each sensor node communicate with the sink node with a specific pseudo random sequence, i.e., the network employ the DS-UWB multiple access strategy. The performance of five multiuser detection strategies are presented here, including matched filter (MF), decorrlating detector (DEC), minimum mean square error (MMSE), optimal detector (OMUD) and the proposed iterative detector based on differential characteristics.
During the simulation in this section the signal is transmitted over 3–6 GHz and the chip transmission rate is 2 GHz. Two types of channel are simulated in this section, one is the AWGN channel, the other is a multipath channel, the IEEE 802.15.4a channel (without loss of generality, IEEE 802.15.4a CM1 channel is studied for simulation). For the AWGN channel the signal is received with simple matched filter, while for the multipath IEEE 82.15.4a channel we choose the selective RAKE (S-RAKE) receiver. The S-RAKE receiver chooses 16 branches and uses the maximum ratio combining (MRC) rule. Our main object in this section is to check the BER performance of the proposed iterative multiuser detector based on differential characteristics. Monte Carlo simulations are utilized to examine the proposed iterative multiuser detection algorithm in this section. Major simulation parameters employed in this section are listed in Table 1.

4.1. Number of Iterations

First we assume that there exist 50 users simultaneously in a WSN. For balanced Gold sequence with length 127, the cross correlation value ρ i j can be −0.134, −0.008, and 0.118. At the receiver, assume that all the 50 users have the same power. In Figure 5, the receiver employ the proposed iterative multiuser detection algorithm is demonstrated for the first five iterations. The optimal multiuser detector (OMUD) performance is also shown.
It can be seen in Figure 5 that after four iterations, the BER performance improves little when the iteration continues both for the AWGN and IEEE 802.15.4a CM1 channel. Besides, as a suboptimal multiuser detection algorithm, the proposed iterative multiuser detection algorithm does not converge toward the OMUD performance in this 50 user system. However, we can see that the performance gap between OMUD and the proposed multiuser detector is small after five iterations. For the IEEE 82.15.4a CM1 channel, we can see that there exists a distinct performance loss compare to the AWGN channel. It is mainly because that the S-RAKE receiver does not gather all the paths which results in energy loss.

4.2. BER Performances of Different Eb/N0

In this subsection, we consider the 20 and 50 user conditions. The number of iterations for the proposed multiuser detection algorithm is 5. The performance of MF, DEC, MMSE and OMUD are compared.
Assuming all users have the same power at the receiver, simulation results are illustrated in Figure 6. From the figure it is clear that the BER performance of the proposed iterative multiuser detection method is superior compared with MF, DEC, and MMSE. In 20 user conditions, it even coincides with OMUD. In 50 user conditions, there still exists a considerable gap between the proposed multiuser detection algorithm and OMUD. Besides, it can be seen that for the AWGN channel and the multipath IEEE 802.15.4a channel we can get similar results.

4.3. Near-Far Effect Resistance Performance Comparison

In this simulation, these tested multiuser detection algorithm is under the imperfect power control assumption, i.e., the power is not equal at the receiver for each user. Assume a 50 user condition; Eb/N0 of the first user is 6 dB, while Eb/N0 of the remaining 49 users changes from 0 dB to 10 dB simultaneously. For the proposed multiuser detection algorithm, 5 iterations are employed. The result is shown in Figure 7.
As shown in Figure 7, for both channels we get similar near-far effect resistance results. In this 50 user system when the SNR of interference user is larger than 4 dB, the BER performance is better than MF, DEC and MMSE; when the SNR of interference user increases up to 10 dB, the BER performance even coincides with OMUD. Besides, the performance of OMUD and DEC remain unchanged when the power of interference users change. While MF and MMSE suffers performance degradation when the power of interference users get stronger. For the proposed multiuser detector, the weak users actually benefit from the strong interference whereas the strong users suffer performance loss from the weak interference. This phenomenon was also observed in other multiuser detection algorithms based on interference cancellation [28,29].

4.4. User Capacity Performance Comparison

The BER performance curves of these multiuser detection algorithms with different number of users are explored here. In this simulation, Eb/N0 of all users is 6 dB. Five iterations are simulated for the proposed iterative multiuser detection algorithm. The simulation result is shown in Figure 8.
From Figure 8 we can see that as user number increases, the BER performance of MF, DEC, MMSE and the proposed receiver falls, while the BER performance of the proposed iterative multiuser detection method is much better than MF, DEC, and MMSE when user number ranges from 10 to 50. When user number is smaller than 20, it even coincides with OMUD.

5. Conclusions

In this paper, an iterative multiuser detection algorithm based on differential characteristics for DS-UWB systems is explored. In this three stage receiver, the differential characteristics function is calculated; then threshold detection is utilized to get a preliminary classification; the third stage is to further correct the error bits. The above three stage process procedure is iterated to further lower BER. The computational complexity of the proposed receiver is linear to nK, where n is the number of iterations and K is the number of users. Simulation results illustrates that the proposed iterative multiuser detection algorithm convergences after only a few iterations. Furthermore, the BER performance, near-far resistance performance and user capacity performance are superior compared with MF, DEC, and MMSE.

Acknowledgments

The work in this paper is supported by National Natural Science Foundation of China (No. 61571167, No. 61471142 and No. 61102084).

Author Contributions

Xiaoguang Chen proposed the idea and wrote the paper; Xu Jiang did the simulation; Zhilu Wu and Shufeng Zhuang revised the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Aseri, T.C. Comparison of routing protocols in wireless sensor network using mobile sink—A survey. In Proceedings of the 2014 Recent Advances in Engineering and Computational Sciences (RAECS), Chandigarh, India, 6–8 March 2014; pp. 1–4.
  2. El-Nasr, M.A.; Shaban, H. Low-power and reliable communications for UWB-based wireless monitoring sensor networks in underground mine tunnels. Int. J. Distrib. Sens. Netw. 2015, 2015, 48. [Google Scholar] [CrossRef]
  3. Botteron, C.; Briand, D.; Mishra, B.; Tasselli, G.; Janphuang, P.; Haug, F.-J.; Skrivervik, A.; Lockhart, R.; Robert, C.; de Rooij, N.F.; et al. A low-cost UWB sensor node powered by a piezoelectric harvester or solar cells. Sens. Actuators 2016, A239, 127–136. [Google Scholar] [CrossRef]
  4. Slottke, E.; Kuhn, M.; Wittneben, A.; Luecken, H.; Cartalemi, C. UWB marine engine telemetry sensor networks enabling reliable low-complexity communication. In Proceedings of the 2015 IEEE 82nd Vehicular Technology Conference, Boston, MA, USA, 6–9 September 2015.
  5. Neuhold, D.; Schmidt, J.F.; Bettstetter, C.; Klaue, J.; Schupke, D. Experiments with UWB aircraft sensor networks. In Proceedings of the 2016 IEEE Conference on Computer Communications Workshops, San Francisco, CA, USA, 10–15 April 2016.
  6. Wang, L.; Heng, C.H.; Lian, Y. A sub-GHz mostly digital impulse radio UWB transceiver for wireless body sensor networks. IEEE J. Emerg. Sel. Top. Circuits Syst. 2014, 3, 344–353. [Google Scholar] [CrossRef]
  7. Verdu, S. Minimum probability of error for asynchronous Gaussian multiple-access channels. IEEE Trans. Inf. Theory 1986, 32, 85–96. [Google Scholar] [CrossRef]
  8. Li, J.Y.; Gang, W.; Chen, F.J. On minimum-BER linear multiuser detection for DS-CDMA channels. IEEE Trans. Signal Process. 2007, 55, 1053–1103. [Google Scholar] [CrossRef]
  9. Steiner, A.; Lupu, V.; Katz, U.; Shamai, S. The spectral efficiency of successive cancellation with linear multiuser detection for randomly spread CDMA. IEEE Trans. Signal Process. 2012, 58, 2850–2873. [Google Scholar] [CrossRef]
  10. Hu, L.; Zhou, X.Y.; Zhang, L.W. Blind multiuser detection based on Tikhonov regularization. IEEE Commun. Lett. 2011, 15, 482–484. [Google Scholar]
  11. Muhammad, Z.; Ding, Z. Blind multiuser detection for synchronous high rate space-time block coded transmission. IEEE Trans. Wirel. Commun. 2011, 10, 2171–2185. [Google Scholar] [CrossRef]
  12. Saberali, S.M.; Amindavar, H. Low-complexity ad-hoc non-linearities for blind multiuser detection of long-code code-division multiple access signals and asymptotic performance evaluation. IET Commun. 2014, 8, 1527–1533. [Google Scholar] [CrossRef]
  13. Ali, I.; Kim, D.N.; Song, Y.J.; Azeemi, N.Z. A novel subspace tracking algorithm and its application to blind multiuser detection in cellular CDMA systems. J. Commun. Netw. 2010, 12, 216–221. [Google Scholar] [CrossRef]
  14. He, F.; Gunawan, E.; Guan, Y.L.; Zheng, L.H. Improved two-stage CMA-based blind receivers for joint equalisation and multiuser detection. IET Commun. 2012, 6, 1131–1136. [Google Scholar] [CrossRef]
  15. Stuwart, S.L.; Selvi, S.T. Precoder based collaborative blind multiuser detection of CDMA signals. Wirel. Pers. Commun. 2015, 83, 135–148. [Google Scholar] [CrossRef]
  16. Albataineh, Z.; Salem, F. Robust blind multiuser detection algorithm using fourth-order cumulant matrices. Circ. Syst. Signal Process. 2015, 34, 2577–2595. [Google Scholar] [CrossRef]
  17. Seo, B. SINR lower bound based multiuser detector for uplink MC-CDMA systems with residual frequency offset. IEEE Commun. Lett. 2012, 16, 1612–1615. [Google Scholar] [CrossRef]
  18. Quan, Z.; Liu, J. Efficient multiuser detector based on box-constrained deregularization and its FPGA design. J. Syst. Eng. Electron. 2012, 23, 179–187. [Google Scholar] [CrossRef]
  19. Shim, B.; Song, B. Multiuser detection via compressing sensing. IEEE Commun. Lett. 2012, 16, 972–974. [Google Scholar] [CrossRef]
  20. Zahedi, A.; Rajamand, S.; Jafari, S.; Rajati, M.R. A novel multiuser detector based on restricted search space and depth-first search method in DS/CDMA communication system. Wirel. Pers. Commun. 2015, 82, 1531–1545. [Google Scholar] [CrossRef]
  21. Gu, Y.B.; Yang, M.L.; Shi, Z.G.; Wu, Z.L. The applications of decision-level data fusion technologies in the field of multiuser detection for DS-UWB systems. Sensors 2015, 15, 24771–24790. [Google Scholar] [CrossRef] [PubMed]
  22. Zhang, R.; Cioffi, J.M. Iterative spectrum shaping with opportunistic multiuser detection. IEEE Trans. Commun. 2012, 60, 1680–1691. [Google Scholar] [CrossRef]
  23. Zhang, R.; Cioffi, J.M. Exploiting opportunistic multiuser detection decentralized multiuser MIMO systems. IEEE Trans. Wirel. Commun. 2011, 10, 2474–2485. [Google Scholar] [CrossRef]
  24. Mimura, K.; Okada, M. Generating functional analysis for iterative CDMA multiuser detectors. IEEE Trans. Inf. Theory 2014, 60, 3645–3670. [Google Scholar] [CrossRef]
  25. Takeuchi, K.; Tanaka, T.; Kawabata, T. Performance improvement of iterative multiuser detection for large sparsely spread CDMA systems by spatial coupling. IIEEE Trans. Inf. Theory 2015, 61, 1768–1794. [Google Scholar] [CrossRef]
  26. Azmi, P.; Zand, T.S. An iterative multiuser detector for overloaded LDPC coded CDMA systems. Wirel. Pers. Commun. 2012, 66, 41–56. [Google Scholar] [CrossRef]
  27. Lu, H.Y. Iterative multiuser detectors for spatial-frequency-time-domain spread multi-carrier DS-CDMA systems. IEEE. Trans. Veh. Technol. 2011, 60, 1640–1650. [Google Scholar] [CrossRef]
  28. Varanasi, M.K.; Aazhang, B. Near-optimum detection in synchronous code-division multiple access systems. IEEE Trans. Commun. 1991, 39, 725–736. [Google Scholar] [CrossRef]
  29. Wang, X.D.; Poor, H.V. Iterative (Turbo) soft interference cancellation and decoding for coded CDMA. IEEE Trans. Commun. 1999, 47, 1046–1061. [Google Scholar] [CrossRef]
Figure 1. Diagram of the proposed multiuser detection algorithm.
Figure 1. Diagram of the proposed multiuser detection algorithm.
Sensors 17 00388 g001
Figure 2. The value of differential characteristics function |L(bk)|.
Figure 2. The value of differential characteristics function |L(bk)|.
Sensors 17 00388 g002
Figure 3. The probability density functions of two statuses.
Figure 3. The probability density functions of two statuses.
Sensors 17 00388 g003
Figure 4. The probability density function curves of |L(bi)| and |L(bk)|.
Figure 4. The probability density function curves of |L(bi)| and |L(bk)|.
Sensors 17 00388 g004
Figure 5. The BER performance with different number of iterations (50 users). (a) AWGN; (b) IEEE 802.15.4a CM1.
Figure 5. The BER performance with different number of iterations (50 users). (a) AWGN; (b) IEEE 802.15.4a CM1.
Sensors 17 00388 g005
Figure 6. The BER performance with different Eb/N0. (a) AWGN, 20 users; (b) AWGN, 50 users; (c) IEEE 802.15.4a CM1, 50 users.
Figure 6. The BER performance with different Eb/N0. (a) AWGN, 20 users; (b) AWGN, 50 users; (c) IEEE 802.15.4a CM1, 50 users.
Sensors 17 00388 g006
Figure 7. The near-far effect resistance performance (50 users). (a) AWGN; (b) IEEE 802.15.4a CM1.
Figure 7. The near-far effect resistance performance (50 users). (a) AWGN; (b) IEEE 802.15.4a CM1.
Sensors 17 00388 g007
Figure 8. The BER performance with different number of users. (a) AWGN; (b) IEEE 802.15.4a CM1.
Figure 8. The BER performance with different number of users. (a) AWGN; (b) IEEE 802.15.4a CM1.
Sensors 17 00388 g008
Table 1. Simulation parameters.
Table 1. Simulation parameters.
SystemDS-UWB
Modulation modeBPSK
Pseudo random sequences (PRS)Balanced Gold sequences
Length of PRS127
Number of tested bits50,000,000
Communication channelAWGN

Share and Cite

MDPI and ACS Style

Chen, X.; Jiang, X.; Wu, Z.; Zhuang, S. Differential Characteristics Based Iterative Multiuser Detection for Wireless Sensor Networks. Sensors 2017, 17, 388. https://doi.org/10.3390/s17020388

AMA Style

Chen X, Jiang X, Wu Z, Zhuang S. Differential Characteristics Based Iterative Multiuser Detection for Wireless Sensor Networks. Sensors. 2017; 17(2):388. https://doi.org/10.3390/s17020388

Chicago/Turabian Style

Chen, Xiaoguang, Xu Jiang, Zhilu Wu, and Shufeng Zhuang. 2017. "Differential Characteristics Based Iterative Multiuser Detection for Wireless Sensor Networks" Sensors 17, no. 2: 388. https://doi.org/10.3390/s17020388

APA Style

Chen, X., Jiang, X., Wu, Z., & Zhuang, S. (2017). Differential Characteristics Based Iterative Multiuser Detection for Wireless Sensor Networks. Sensors, 17(2), 388. https://doi.org/10.3390/s17020388

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop