1. Introduction
The Internet of Things (IoT) is envisioned as a promising technology, where highly connected users can share information and coordinate decisions [
1]. It has led to revolutionary applications in transportation, smart healthcare, environmental monitoring, smart homes and other scenarios [
2]. However, as the number of users connected to the IoT rapidly increases, hyperconnectivity, low latency, high energy efficiency (EE) and spectral efficiency (SE) become new challenges to solve [
3]. Cell-free massive multiple-input multiple-output (MIMO) has been proposed in [
4] and can meet these requirements. By deploying many access points (APs) in a geographic coverage area and connecting them to a central processing unit (CPU), cell-free massive MIMO can accommodate more users due to coverage probability improvement and interference management [
5]. Since the boundaries have disappeared, cell-free massive MIMO can offer much more uniform connectivity, huge energy efficiency and spectral efficiency [
6,
7,
8].
Channel state information (CSI) is important for cell-free massive MIMO systems [
9]. However, pilot resources need to be reused among users due to the limitation of coherence duration time, which can lead to the so-called pilot contamination [
10]. This phenomenon will significantly reduce channel estimation accuracy and degrade system performance [
11]. There are some strategies that have been proposed to limit these negative effects, such as a pilot-precoding-based scheme [
12], a channel-estimation-based scheme [
13] and a pilot-assignment-based scheme [
14]. Although those pilot contamination suppression schemes have achieved certain effects, there is still room for improvement to achieve higher performance of the system, especially in massive access scenarios.
Based on the user density in the network, massive access can be divided into random access and structured access [
15]. In [
16], random access is classified into two types: contention-based and contention-free. Contention-based random access allows each accessing user to pick a preamble at random from a predefined set and then transmit it to the APs. This method performs well in highly crowded scenarios [
17]. In contrast, contention-free random access assigns a dedicated preamble to each user. Therefore, it can eliminate access delays. In [
18], the authors improved the random access performance by using the strongest-user collision resolution (SUCR), where only the users with the strongest channel gains are allowed to access the network. In [
19], the authors viewed a set of contaminated pilot signals as a graph code on which iterative belief propagation could be performed. This makes it possible to reduce pilot contamination. In [
20], the system performance was improved by the averaging of the pilot collision events across the transmission slots for random access. However, if two users in close proximity of each other use the same pilot sequence, the random access usually causes strong pilot contamination and then deteriorates the performance of channel estimation.
A proper pilot assignment can also suppress pilot contamination effects and thus improve the system’s performance in the massive access scenario. Structured access allocates a dedicated pilot resource to every user [
21]; thus, contention-free random access can be regarded as a special type of structured access. Structured access is preferable in scenarios where the number of pilots is smaller than the number of users, except in extremely crowded scenarios, similar to the IoT networks [
22]. The reason is that the strong pilot contamination might significantly reduce the system’s performance in extremely crowded scenarios. In [
15], a structured access framework that focuses on improving pilot assignment schemes was proposed to suppress pilot contamination. A greedy pilot assignment was proposed in [
4] that iteratively refines the pilot assignment for the lowest downlink rate user. The authors in [
15] proposed a user-group pilot assignment that aims to assign mutually orthogonal pilots to the users served by similar subsets of APs. A K-means-type pilot assignment was proposed in [
23] that aimed at maximizing the minimum distance among the pilot sharing users. In [
24], a weighted graph was constructed to represent the relationship between the potential strength of pilot contamination between users, which can mitigate pilot contamination by assigning different pilots to connected users with a large weight in a greedy way. The authors of [
25] introduced a fractional pilot reuse scheme, where a fraction of users within each cell reuse the same pilot subset across the whole system, while the rest are allocated orthogonal subsets depending on a reuse parameter. However, since all users are allowed to access the network, the pilot assignment method will be less effective due to the limited resources in the crowded scenario.
To reduce inter-user interference, we propose a left-null-space-based massive access method that takes advantage of the resources in the space domain. The idea of reducing interference based on null space has been widely used in the past, especially for the purpose of spatial multiplexing. In [
26], a partial nulling scheme was adopted to obtain diversity gains by utilizing degrees of freedom. In addition, Ref. [
27] proposed a null-space expansion scheme to mitigate inter-user interference by exploiting the excess degrees of freedom to extend the null-space dimension, which are provided by the massive base station (BS) antenna array. However, most works only focus on the downlink transmission. Specifically, with the given channel matrix, the existing works designed the precoder based on the null space of the channel matrix to mitigate interference. They usually do not consider the channel estimation problem. In this paper, we consider the uplink transmission and focus on the access problem. We need to obtain accurate channel estimation in the case of multi-user interference, which is different from existing null-space-based work. The proposed method includes three stages. In the first initial orthogonal access stage, the users with the strongest channel large-scale fading coefficients are selected for orthogonal access to the network, where the number of these users is the same as that of the pilot sequences. In the second left-null-space-based opportunistic access stage, the users who fall in the left null space of the users in the first stage are selected to access the network. In the last stage, we detect the data of all accessed users. The simulation results demonstrate that, compared with the existing massive access methods, the proposed massive access method can achieve much higher spectral efficiency, especially in crowded scenarios.
The remainder of this paper is organized as follows.
Section 2 develops a cell-free massive MIMO IoT system model.
Section 3 introduces two traditional massive access methods.
Section 4 presents the proposed method, which includes three stages: initial orthogonal access, left-null-space-based opportunistic access and data detection of all accessed users. The performance of three methods is numerically evaluated in
Section 5. Finally, the major conclusions and implications are drawn in
Section 6.
Notations: The superscripts , denote transpose and conjugate transpose, respectively; represents the left null space of a matrix ; stands for the identity matrix; denotes the multivariate circularly symmetric complex Gaussian distribution with zero mean and variance ; and {} denote the Euclidean norm and the expected value of , respectively.
2. System Model
Cell-free massive MIMO was proposed in [
4] and can offer a high coverage probability. According to the varying degrees of cooperation between the APs and the CPU, there are four levels of receiver cooperation for cell-free massive MIMO, which can be called Level 4, Level 3, Level 2 and Level 1. Level 4 is a fully centralized network where all APs forward the signals to the CPU without any processing, and all channel estimation and data detection are performed at the CPU. Level 3 relies on the large-scale fading decoding (LSFD) strategy, where every AP locally estimates the channels, obtains the local estimates of the data and then passes them to the CPU for final decoding. Level 2 is a direct simplification of Level 3; the only difference between the two levels is the data detection at the CPU, where Level 2 simply takes the average of the local estimates and Level 3 uses an optimized weighting coefficient vector to maximize the SE. Level 1 is a small-cell network where all the channel estimates and data detection are performed locally at the APs. In this case, there is nothing to exchange between the CPU and the APs. The performances of the aforementioned four levels of receiver cooperation are analyzed and compared in [
28], where it is shown that Level 4 can achieve the highest SE. Therefore, in this paper, we focus on Level 4.
Consider a cell-free massive MIMO system consisting of
L APs equipped with
N antennas. The APs are connected to a CPU via a backhaul network [
4], as illustrated in
Figure 1. The users waiting for connection to the system are equipped with a single antenna. All
L APs directly send the received pilot sequences and data signals to the CPU without processing, and the CPU performs channel estimation and data detection.
The received
nth vector at the CPU,
, can be expressed as
where
K is the number of accessed users,
denotes the transmit power of the user
k,
denotes the
nth symbol transmitted by the user
k,
is the complex Gaussian noise vector with zero mean and covariance matrix
,
denotes the channel vector between the user
k and all APs,
is the channel vector between the user
k and the AP
l, which is given by
denotes the large-scale fading coefficient that depends on the location and the propagation environment, and
represents the small-scale fading coefficient vector. We assume that
is constant in a time block of
channel uses [
11], where
channel uses are specifically for pilots and the remaining
channel uses are for payload data.
After collecting
J consecutive received vectors, we can obtain
where
,
and
.
3. Traditional Massive Access Methods
Assume that there are
mutually orthogonal
-length pilot sequences
with
, where
. Consider a highly crowded scenario where the total number of the users
U is much larger than the number of available pilot sequences
. Since different users have to reuse the same pilot sequence, how to reduce interference and improve the system’s performance becomes very important. Ref. [
23] proposed a K-means-clustering-based pilot assignment method for cell-free massive MIMO systems, which can reduce the effect of the pilot contamination. In this method, the CPU first generates
centroids through the K-means clustering algorithm, which can be performed offline. Specifically,
points and
centroids are first arbitrarily generated in the coverage area, where
. Then, each point is assigned to its nearest centroid. After that, the centroid positions are updated by averaging the points belonging to the respective clusters. Next, all
points are reassigned to the new centroids. The above assignment is repeated, and the steps are updated until
stable clusters are formed. Each cluster has a centroid and comprises at most
users. After the centroids are determined, all
U users access the network in sequence, where each user finds its closest centroid and joins the corresponding cluster. For any user, if the closest centroid has been selected by other
users, then it tries to join the next closest centroid, and repeats this procedure until it succeeds in joining a cluster. After all users find their clusters,
orthogonal pilot sequences are arbitrarily assigned to the users in the same cluster.
Different from the method where all users are allowed to access the system in [
23], another massive access method is based on user selection. That is, according to the users’ channel conditions, such as large-scale fading coefficients, the CPU selects
K users from
U users to access the system [
18]. More specifically, let
denote the average large-scale fading coefficient from the user
k to all APs, where
.
K users with the largest
are allowed to access the network. In order to avoid strong interference among the users with good channel conditions, one can assign
pilot sequences to the
users with the best channel conditions and arbitrarily assign the pilot sequences to the remaining
users.
After pilot assignment for the accessed users, the CPU performs channel estimation for each user based on the received pilot sequences. Since the number of accessed users
K is more than
, the same pilot sequence may be assigned to several users. Let
represent the set of users sharing the same pilot sequence with user
k, including user
k itself. According to (3), during the training phase, the received pilot matrix at the CPU can be obtained as
where
is the index of the pilot sequence assigned to the user
k.
Given (4), the least square (LS) estimate of
can be obtained as
where
. The third equation follows from the facts that
and
for
. Note that the second term
in the third equation may cause so-called
and degrade the system performance. Here we only consider LS channel estimator because it has low complexity and requires no prior statistical information [
29].
Given
, the achievable spectral efficiency of the user
k can be calculated by [
28]
where the signal-to-interference-and-noise ratio (SINR) is given by
and
is the combining vector for the user
k. Any received combining vector
can be adopted in (7). For example, one can let
, i.e., use the simplest maximum ratio (MR) combination.
4. The Proposed Massive Access Method
In this section, we propose a null-space-based massive access method for cell-free massive MIMO systems that can significantly reduce interference between users. Similar to [
18], we consider a crowded system with
U users and finally select
K users to access the system. The proposed massive access method consists of three stages, which are summarized as follows.
Stage 1: Initial orthogonal access
- (1)
Step 1: Select users from all users and allow them to access the system.
- (2)
Step 2: Allocate orthogonal pilot sequences to the accessed users and estimate their channel vectors.
Stage 2: Left-null-space-based opportunistic access
- (1)
Step 1: Compute the accessed users’ left null space according to the results of the channel estimation in Stage 1 and obtain the bases of the left null space.
- (2)
Step 2: Based on the left null space, select users from the remaining users to access the network.
- (3)
Step 3: Estimate the channel of the new selected users.
Stage 3: Detect the data of all K-accessed users.
Figure 2 is a flow diagram of the proposed method. In the proposed method,
users in the first stage can access the system without interference, and
users in the second stage can access the system with less interference. The data of all
K users are detected in the last stage. More details about the three stages are given in
Section 4.1,
Section 4.2 and
Section 4.3, respectively.
4.1. Stage 1: Initial Orthogonal Access
In this stage, the CPU allows
users to access the system according to the number of pilot sequences
. Different schemes can be adopted to select these users. For example, the simplest way is to randomly select
users from all users. However, such a random selection scheme cannot guarantee the performance of the channel estimation because it may select some users with poor channel conditions. In order to ensure the accuracy of the channel estimation, we adopt the similar user selection method described in
Section 3. That is, we select
users based on the strongest channel large-scale fading coefficients and then allocate
orthogonal pilot sequences to them.
Due to the orthogonality of the pilot sequences, according to (5), the channel estimation of the user
k can be given by
where
. It can be seen that there is no interference between the users. Furthermore, since all the selected users have good channel conditions, the accuracy of the channel estimation can be guaranteed.
4.2. Stage 2: Left-Null-Space-Based Opportunistic Access
To exploit the resources in the spatial domain, we propose an algorithm based on the orthogonal property of the left null space. By taking advantage of the orthogonality between different bases of the left null space, the CPU can distinguish different users in the spatial domain even though they share the same pilot sequence. This is equivalent to adding an additional spatial domain dimension to the original time and frequency domain dimensions, which can significantly reduce the pilot contamination effect.
In this stage, all the remaining
users first randomly choose their pilot sequence from the predefined set and then transmit them to the APs. After all of the APs forward the received signals to the CPU, the received pilot matrix at the CPU,
, can be obtained as
where
is the set of users sharing the same pilot sequence
m and
.
To select
users with the least interference from the whole
users, the CPU then correlates the received signal with the normalized pilot sequence
to obtain
, which is given by
where
. By doing so, users are divided into
groups, where each group of users shares the same pilot sequence.
After that, the CPU computes the left null space
according to the channel estimations obtained in Stage 1, where
. QR factorization can be used to obtain
, i.e., the right
column of the Q matrix after QR factorization is
. Let
denote the
nth column of the
and define
, where
.
represents the base of the left null space. Different bases are orthogonal to they are all orthogonal to
. each other and Given
, the CPU next searches for the users who fall in the left null space. Specifically, the CPU computes the following projection as
If the energy of
is greater than a certain threshold
, i.e.,
where
, we consider that there is a user in the left null space. Here we assume that there is at most one user whose channel vector matches the base
. Once (12) happens, the CPU puts this user, whose index is denoted by
, into the list
, where
denotes the set of index values of the users that are allowed to access the system. Note that by adjusting the threshold
, the CPU can control the number of accessed users in Stage 2.
When (12) occurs, (11) can be further written as
because
when users are in different subspaces. Let
be the projection of the true channel of the user
, i.e.,
Then, the LS estimate of
can be obtained as
Based on the above algorithm, the CPU can find the users who are in the left null space of the accessed users in Stage 1. Allowing these users access into the system can greatly reduce inter-user interference. Here, we assume
users successfully accessed the system in the end. The proposed left-null-space-based access algorithm is summarized in Algorithm 1.
Algorithm 1: Left-Null-Space-Based Access |
- 1
The remaining users randomly transmit the pilot sequence to the APs. - 2
Given the received pilot matrix , the CPU obtains by using (10), where . - 3
Given , compute by, e.g., QR factorization. Obtain and then , where . Set . - 4
for 1 do - 5
for 1 do - 6
Obtain according to (11). - 7
Calculate the energy of , i.e., . - 8
if then - 9
Put user into the list . - 10
end - 11
end - 12
end - 13
|
In summary, the proposed massive access method has the following advantages. Firstly, the users accessed in Stage 1 use the orthogonal pilot sequences to access the system; hence, they have no interference and accurate channel estimation. Secondly, due to the orthogonality between and , users in Stage 2 will cause less interference to users in Stage 1. Finally, since the users accessed in Stage 2 are selected according to the bases and different bases are orthogonal to each other, the pilot contamination effect caused by pilot-sharing users will be significantly reduced in Stage 2. A similar method is to add a space-domain dimension, where users are able to share the same pilot with no interference. By doing so, the number of accessed users can be greatly increased with less interference.
4.3. Stage 3: Detect the Data of All K-Accessed Users
According to (8) and (15), the estimation of the channel for all accessed users can be obtained. Finally, the CPU can detect the data of all users based on the estimated channel.
For users accessed in Stage 1, we use the SINR expression in (7) to calculate the achievable SE, where the MR combining with is used for data detection and is given by (8).
To detect the data of the users accessed in Stage 2, the CPU needs to project the received signal
into the subspace first. The received signal of the user
after projection can be obtained as
where
is the set of the users whose channels match the same base
and
. The second equation follows the fact that
when
. This implies that users in the same group will not cause any interference, that interference only happens between inter-group users and that there are at most
elements in
.
Since can be viewed as the equivalent channel of user , we replace with and use MR combination i.e., in (7) to obtain the effective SINR.
5. Numerical Results
In this section, we evaluate the uplink performance of our proposed massive access method. We consider a setup with
U users who are independently and uniformly distributed at random within a square size of 1 km × 1 km and finally select
K users from them to access the system.
L = 100 APs are deployed randomly within the square coverage area, and all APs are equipped with half-wavelength-spaced uniform linear arrays with
N = 4 antennas. We assume that all APs are deployed in urban environments with high user loads, roughly 10 m above the ground. The 3GPP Urban Microcell model in Tab. B.1.2.1-1 [
30] with a 2 GHz carrier frequency is used to generate the large-scale propagation conditions, such as pathloss and shadow fading.
where
is the distance between the user
k and AP
l and
is the shadow fading. We present the key simulation parameters in
Table 1.
In the simulations, we use “Strongest Users method” [
18] and “K-Means method” [
23] to denote the methods described in
Section 3 and compare them with the proposed method.
Figure 3 compares the two user selection schemes we proposed in Stage 1 under
K = 40 and
U = 100. For the sake of description, we use “Random-Stage 1” and “Strongest-Stage 1” to denote the random selection scheme and the strongest channel large-scale fading coefficients user selection scheme, respectively.
Figure 3a shows the cumulative distribution function (CDF) of the SE per user when using an LS estimator and MR combining. As expected, the Strongest-Stage 1 outperforms the Random-Stage 1, where the Strongest-Stage 1 curve is totally on the right of the Random-Stage 1 curve. At the 90% likely SE points, the SE of the the Strongest-Stage 1 and the Random-Stage 1 are 3.91 and 1.87, respectively.
Figure 3b shows that the average SE of the Strongest-Stage 1 and the Random-Stage 1 are 4.74 and 3.17, which is consistent with
Figure 3a. Since the first scheme ensures the quality of the channel estimation, it can guarantee the accuracy of the obtained left null space. Hence, the strongest channel large-scale fading coefficients user selection scheme performs much better than the random selection scheme, and we use it as the default initial user access scheme in Stage 1 for the following simulation.
Figure 4 shows the comparison of the three massive access methods, where we let
,
and use an LS channel estimator and MR combining. It can be seen from
Figure 4a that the proposed method outperforms the other two. For example, at the 90% likely SE points, the SEs of the proposed method, the Strongest Users method and the K-Means method are 3.91, 0.99 and 0.69, respectively. This means that the proposed method can achieve a higher SE than the other two methods for most users.
Figure 4b shows the average SE of the proposed method, Strongest Users method and K-Means method, they are 4.74, 1.38 and 0.98, respectively.
Figure 5 shows the average SE performance of the three methods under different
K. We let the number of accessed users in Stage 2 be about one-third of the total users, i.e.,
. It can be seen from
Figure 5 that the proposed method has a gentle descent and is always above the other two methods, which means that the performance of the proposed method outperforms the other two methods. When
, the average SEs of the proposed method, the Strongest Users method and the K-Means method are 4.27, 1.08 and 0.77, respectively. Note that the average SE is a decreasing function regardless of any massive access methods in the vast majority of intervals. The reason is that the larger number of users can cause stronger inter-user interference, which leads to a rapid reduction in the average SE.
Figure 6 depicts the CDF of the sum SE over different massive access methods under
and
. The result shows that the proposed massive access method outperforms the other two methods, which is echoed by the results in
Figure 4. The reason is that the users in our proposed massive access method are less influenced by interference, so it can improve the sum SE compared with the other two methods.
Figure 7 shows the sum SE comparison of the three methods under different
K. The setting of
U is the same as that in the simulations in
Figure 5. When
, the sum SE of the proposed method, the Strongest Users method and the K-Means method are 189.77, 55.03 and 39.02, respectively. For the K-Means method, it is clear that the sum SE slowly decreases when the number of access users
K increases. The Strongest Users method has the same distribution as the K-Means method, but it can achieve a higher sum SE. Compared with the other two methods, the proposed method has much better performance since the curve of the proposed method is an increasing function of
K. The reason is that the traditional massive access methods are greatly affected by interference; the more users connected to the system, the more obvious this phenomenon is. Since the proposed massive access method can alleviate the impact of multi-user interference through the left-null-space-based access algorithm, the sum SE can be increased in crowded scenarios.