Low Complexity Adaptive Detection of Short CPM Bursts for Internet of Things in 6G

With the standardization and commercialization of 5G, research on 6G technology has begun. In this paper, a new low-complexity soft-input–soft-output (SISO) adaptive detection algorithm for short CPM bursts is proposed for low-power, massive Internet of Things (IoT) connectivity in 6G. First, a time-invariant trellis is constructed on the basis of truncation in order to reduce the number of states. Then, adaptive channel estimators, recursive least squares (RLS), or least mean squares (LMS), are assigned to each hypothetical sequence by using the recursive structure of the trellis, and per-survivor processing (PSP) is used to improve the quality of channel estimation and reduce the number of searching paths. Then, the RLS adaptive symbol detector (RLS-ASD) and LMS adaptive symbol detector (LMS-ASD) could be acquired. Compared to using a least-squares estimator, the RLS-ASD avoids matrix inversion for the computation of branch metrics, while the LMS-ASD further reduces the steps in the RLS-ASD at the cost of performance. Lastly, a soft information iteration process is used to further improve performance via turbo equalization. Simulation results and analysis show that the RLS-ASD improves performance by about 1 dB compared to the state-of-the-art approach in time-variant environments while keeping a similar complexity. In addition, the LMS-ASD could further significantly reduce complexity with a power loss of approximately 1 dB. Thus, a flexible choice of detectors can achieve a trade-off of performance and complexity.


Background and Motivation
Globally, 5G networks have been deployed since 2020, and some key capacities are being standardized but do not meet the communication demands for 2030 and beyond. Researchers have begun to focus on 6G wireless communication networks to meet future requirements [1]. The IoT has recently drawn substantial interest due to its great potential for several applications in 6G wireless networks [2][3][4]. With the mass deployment of wireless sensors, it is difficult work to replace batteries or provide connections to the power grid due to random and complex environments. In these scenarios, the energy efficiency and cost of sensors are critical problems to be solved [5]. Future heterogeneous IoT integrated 6G networks would embrace active and passive devices in providing various services with diverse resources.
A backscatter communication technique [5][6][7][8] is proposed for passive devices that can harvest energy from the environment, providing the possibility to realize low power consumption and high-efficiency data transmission. In active devices with radio-frequency links, continuous phase modulation (CPM) is a good candidate for the communication of high power efficiency in uplinks [9][10][11]. Continuous phase modulation (CPM) provides a feasible transmission scheme for power-and bandwidth-limited wireless communication because of its high spectral efficiency and power efficiency [12]. Moreover, its constant complex envelope is robust to the nonlinearities caused by power amplifiers (PAs), which further improves power efficiency [13].
However, compared to linear modulations, CPM transmission over frequency-selective channels is a challenging task because of nonlinearity [11]. Poor physical-layer waveforms worsen the performance of the communication system, and even the superior power efficiency brought by PA can be undone because of the high complexity in the receiver [9]. Therefore, this paper focuses on the design of equalizers for IoT devices that employ low data rates and short CPM burst transmissions. In practical communications, the receiver does not have perfect channel state information, which must be estimated.
Optimal coherent detection can be approximately achieved by inserting a sufficient number of pilot symbols. In [14], a universal data-aided method was proposed by inserting periodically data-dependent symbols for CPM in flat Rayleigh fading channels. The channel response was generated by a mean squared error front-end filter and interpolation filter, which was input to a coherent CPM demodulator using the Viterbi algorithm. In fast-fading flat channels, the authors in [15] provided a data-aided channel estimation algorithm with local B-splines, and the results demonstrated an excellent trade-off between bit error rate performance and complexity. In [16], the authors derived a maximal posterior symbol detector for CPM over a double-selected channel via the PAM decomposition of the CPM. Data-aided initial channel estimation was achieved by using the pilot symbol, and the quality of the channel estimation was iteratively improved with turbo estimation. To further reduce complexity, a suboptimal equalizer based on a linear minimal mean-square error equalization was achieved at a cost of 2 dB. However, the data-aided method could drastically increase the overhead-to-payload ratio in short bursts because of additional training bits. Similarly, the addition of a cyclic prefix or unique words in low-complexity frequency-domain equalization (FDE) for CPM [17][18][19][20][21] could create the same problem. Thus, pilot-or FDE-based methods are not feasible schemes for short CPM bursts.
To solve this problem, blind channel equalization in the time domain is an effective alternative to avoid increasing the overhead-to-payload ratio. The authors in [22] used the Tong-Xu-Kailath algorithm to CPM and extracted the second-order statistics of the signal for channel estimation. The eigenvector method was used to identify the channel from a fourth-order cross-cumulant matrix under the GSM channel in [23]; to track the time-variant channel, the turbo-estimation approach was used to improve the quality of the channel estimates. However, the exact calculation of statistics requires a sufficient number of symbols to restrain the error due to noise, and the channel estimates obtained in short bursts are not reliable.
Other blind equalization can be achieved by the CPM-channel trellis. The joint trellis can be built from CPM and channel memory, which can be represented by a finite state machine (FSM). In [24][25][26][27], the FSM was described with a hidden Markov model (HMM). Thus, the channel response could be regarded as the unknown parameter in the HMM, which could be estimated with the expectation-maximization/Baum-Welch algorithm. However, HMM-based equalization techniques are suitable for time-variant channels. Thus, the idea that data-aided estimation could be embedded into the structure of the joint trellis [28,29]. A forward/backward adaptive soft-in soft-out (FAFB-SISO) algorithm [29] based on a full-state trellis was derived for linear modulation, which was optimal. Then, a forward adaptive SISO (FA-SISO) algorithm [30] that considered the channel correlation in only one direction was proposed for MSK; the author in [31] proposed various reduced-state A-SISO (RS-A-SISO) algorithms for reducing complexity.
Recently, a new noncoherent symbol-by-symbol detection algorithm of short quaternary CPM burst [9] was proposed as a better approach than the conventional one when short bursts are transmitted with only a few training bits. However, a major drawback of the detector is its high complexity because of matrix inversion for the calculation of branch metrics. In this paper, we propose a symbol-by-symbol detector with low complexity for short CPM bursts in IoT communication systems.

•
The symbol detector is proposed on the basis of the trellis. To reduce the number of states and tackle a memory that linearly grows with time, a simplified trellis was constructed on the basis of the truncation of the memory. • On the basis of the simplified trellis, the channel response is acquired by embedding the adaptive channel estimator, RLS or LMS algorithm, in the calculation of the trellis branch metric. The channel estimation is updated iteratively by using the recursiveness of the trellis, which can avoid matrix inversion when the LS estimator is used to calculate metrics and reduce complexity. • In processing the trellis search, the BCJR algorithm was applied with per-survivor processing (PSP) in the forward direction, which could iteratively ensure the accuracy of channel estimation for each state. • Lastly, a link-level simulation platform of the communication system was established to evaluate the performance of different symbol detectors.

Paper Outline
The rest of this paper is organized as follows. Section 2 provides the representation of CPM signals transmitted over fading channels and a communication system. Next, in Section 3, the new low-complexity symbol detector and the turbo scheme are introduced and are described in Section 4. The performance of the proposed symbol detector was evaluated and analyzed on the basis of the link-level simulation platform in Section 4. Lastly, the paper is concluded in Section 5.

CPM Representation
Before discussing the communication system model, we give the representation of a CPM signal. Let a a a n = [a 0 , a 1 , . . . , a n ] T be the vector containing independent and identically distributed (iid) symbols, where elements a i belong to the M-ary alphabet defined by a i ∈ {±1, ±3, . . . , ±(M − 1)}. The equivalent baseband representation x(t, a a a n ) of the transmitted M-ary CPM signal is written as follows: x(t, a a a n ) = E s T exp(jφ φ φ(t, a a a n )), 0 ≤ t ≤ nT.
where T represents the symbol duration, and E s is the symbol energy. The informationbearing phase is defined as φ φ φ(t, a a a n ) = 2πh ∑ n i=0 a i q(t − iT), where h is the modulation index. q(t) = t 0 g(τ)dτ is the phase pulse, such that q(t) = 1/2 for t ≤ L cpm T, where L cpm is the memory length of the CPM. If L cpm = 1, we speak of a full-response CPM, and if L cpm ≥ 1, a partial-response CPM is obtained.
The CPM signal is transmitted through a fading channel, and distorted by additive white Gaussian noise (AWGN). In complex baseband representation, the received continuous-time signal is given by where * is the convolutional operator. A discrete-time representation of the received signal is needed for digital signal processing. Then, choosing a sampling period T s , such that T s = T/ε, where ε is the number of samples per symbol. We use notation Then, the kth sample of y(t) by fractionally spaced sampling every T s in Equation (2) is where T s is the channel resolution, and l is the length of the channel in terms of T s . To obtain the matrix form for Equation (3), we give column vectors x x x n , y y y n , v v v n comprising the observables of x(t, a a a n ), y(t), v(t) from symbol time 0 up to time n. Therefore, the discrete-time representation of the received signal, CPM, and noise can be written as y y y n = [y 0 , y 1 , y 2 . . . , Thus, the ith path of the CPM signal can be defined as where 0 i is a row vector containing i zeros elements. All paths of the CPM signals were merged together and could be rewritten as The channel response is h h h = [h 0 , h 1 , . . . , h l−1 ] T and the discrete-time representation of the received signal in the form of matrix can be written as

Serially Concatenated CPM System in Fading Channels
To derive the SISO symbol-by-symbol detector for CPM, we considered a serially concatenated CPM (SCCPM) setup for our system, as shown in Figure 1. When the CPM detector is SISO, CPM with channel coding could improve performance with a turbo equalization scheme in the form of SCCPM, where the decoder and detector exchange extrinsic information in terms of log-likelihood ratios (LLRs).   In the transmitter, a block of message bits m is encoded with a channel coder and permuted with an interleaver to randomize the order of the code bits. Subsequently, specific training bits are appended to the codeword in the training insertion block, helping the receiver in locking fast and reliably. An M-ary gray mapper was considered to obtain a symbol sequence by the obtained burst (in bits). Then, short CPM bursts are generated by a continuous phase encoder (CPE) and a memoryless modulator (MM) and transmitted over the channel. The channel was completely specified by linear distortions, represented by impulse response h(t, τ) and noise variance σ 2 v that was assumed to be known at the detector.
On the receiver side, the discrete-time representation of the received signal is obtained by oversampling the output of the band selection filter. Then, given a priori LLRs L A,CPM (set zero at first iteration) from the decoder to detector, the latter uses the received signal and a priori symbol probabilities P A,CPM updated by L A,CPM to calculate the posterior probability P CPM of transmitted symbol a n . Three steps are required from the P CPM to the a priori LLRs L A,De , which is fed to the decoder.
First, the symbol probability is converted into codeword probability by the demapper, and then converted into the form of LLRs L CPM . Subsequently, extrinsic information L E,CPM is computed by subtracting L A,CPM , also called intrinsic information, from L CPM . In turbo equalization, feeding back intrinsic information encounters problems of positive feedback, which leads to convergence to a suboptimal solution far from the globally optimal solution. Lastly, extrinsic information LLRs on the coded bits L E,CPM are deinterleaved to obtain a priori LLRs for decoder L A,De . Just like subtracting intrinsic information, the interleaver is included in the iteration process to further disperse the direct feedback effect. These LLRs in the decoder are mapped again and similarly fed back to the detector. The process is repeated for a given maximal number of iterations or until convergence. Next, the detailed processing of the CPM detector is given.

Transition/Branch Metric
Bayes' theorem shows that the posterior probability density function (pdf) of transmitted symbol vector a n is given by: The optimal estimated symbol sequence can be obtained by maximizing Equation (7). In the receiver, received signal y n is perfectly known and does not affect the maximization of Equation (7), which can be regarded to be a constant. Similarly, there is no prior information on the channel for the receiver, exerting no influence on the maximization problem. Therefore, the posterior pdf can be expressed as follows: f (a n , h|y n ) ∼ f (y n |a n , h) f (a n ), (8) where f (a n ) = N ∏ i=0 a i are the priori, which can be calculated with the extrinsic log-likelihood ratios (LLRs) from channel decoder. In standard equalization, i.e., with no iteration, f (a n ) are discrete uniform priors. The conditional pdf of y n conditioned on the a n , h is written as Logarithm likelihood function Equation (12) can be simplified by taking the logarithm, which is in the following form: When the knowledge of the channel state information (CSI) is perfect, the most likely symbol sequenceâ ML can be found with the maximization of Equation (10).
However, the channel response is unknown and can be estimated with the known transmission sequence denoted as h est = f [y n , a n ]. Then, the branch metric of input symbol a n at the nth time slot is written as follows: γ n (a n ) = F[a n , y n , h est ]. (12) where h est is the channel response estimated by the hypothetical transmit sequence and the received sequence before time n. Using the data-aided idea, suboptimal sequential maximal likelihood estimation can be achieved through a Viterbi-like algorithm [28]. However, in this paper, we focus on the derivation of the symbol-by-symbol detector rather than the sequence detector.

Derivation of SISO Symbol Detection
Given the branch metric, before deriving the symbol detector, an appropriate trellis needs to be constructed. On the one hand, when the metric depends on all the previous input symbols before the nth symbol, the memory grows linearly with sequence length [29], and a tree is built as shown in Figure 2, each node of which represents a sequence path. To construct a time-invariant trellis, the truncation of the tree memory can be used to force a fixed number of states in the trellis. On the other hand, when memory length l is constant, the complexity of the trellis search is proportional to number of branches M l , which becomes intractable for large memory l and/or constellation size M. To reduce complexity, a simplified trellis with a reduced number of states can be built by truncating the memory. Therefore, the following derivation of the SISO symbol detector was implemented on the basis of the truncation of the trellis. First, the symbol sequence can be divided into input symbols, trellis states at time n, and symbols obtained with PSP, which is defined as a n = [a n , σ n , P(σ n )], where σ n = [a n−1 , a n−2 , . . . , a n−L ], is the state of the trellis after truncation, L is the truncation length, and P(σ n ) is the survivor sequence of arrival state σ n written as P(σ n ) = [a n−L−1 , a n−L−2 , . . . , a 1 , a 0 ].
Taking binary CPM with truncation length L = 2 as an example, the truncated trellis is shown in Figure 2, where the state of trellis is σ n = [a n−1 , a n−2 ] and the branch metric defined by Equation (12). We used the BCJR algorithm to achieve symbol-by-symbol CPM detection. There were M branches from nth time slot to each state at (n + 1)th time slot, and each branch was bundled with a channel response depending on all the symbols up to the nth symbol. Then, the appropriate channel response could be selected for the next state σ n+1 by applying PSP in the forward recursion of BCJR, PSP-BCJR. The description of the PSP-BCJR algorithm for the symbol detection of CPM is given below.
In the forward recursion, channel estimation at states σ n can be defined as follows: h(σ n ) = g(r n , σ n , P(σ n )). (15) The channel response is calculated from the symbol sequence arriving at state σ n , and the received sequence and g(·) imply the dependence of the channel response on the received and transmitted sequences, representing the estimation method. The state is transferred from σ n to σ n+1 after entering symbol a n . The computation of the branch metrics is determined with input symbol a n , state σ n and its survivor sequences P(σ n ), and received signal y n : γ(σ n , σ n+1 ) = F{σ n → σ n+1 , g[y n , a n , σ n , P(σ n )]}. (16) According to the branch metric, the forward recursion (initially zero) is written as follows: where P n (σ n+1 | σ n ) is the probability that the state of termination σ n+1 is transferred from σ n , which is the prior probability of input symbols a n . The prior probability was assumed to be uniform discrete values that could be updated by the extrinsic probabilities fed back from the decoder after every turbo iteration. As shown in Figure 3, PSP is used in forward recursion to simplify searching, and survivor sequences P(σ n+1 ) and survivor channel estimation h(σ n+1 ) of σ n+1 can be selected according tô After completing the forward recursion, backward recursion is similarly calculated: Lastly, a posteriori probabilities for symbol a n = u are the summation over all recursions with the same input u. P(a n = u) = ∑ u:σ n →σ n+1 β f n (σ n ) exp(γ(σ n , σ n+1 ))β b n+1 (σ n+1 )P n (σ n+1 | σ n ). (20) where u : σ n → σ n+1 represent all transitions induced by input u. In practice, for feasibility and numerical stability, BCJR can be realized in the log domain called Log-MAP. Therefore, in subsequent simulations, the CPM detector was implemented in the log domain. More information and details can be found in [32]. Summarizing Equations (15)- (20), each branch is assigned a channel estimator at time n, which can track the variations of the channel while estimating the symbol by alternating between symbol and channel estimation. In [9], the unknown channel in Equation (13) is replaced with maximal likelihood (ML) estimation, and a suboptimal sequence metric is derived as follows.
Γ ML (a n ) = 1 σ 2 w y H n X(a n )h ML (a n ) = 1 σ 2 v r H n X(a n ) X H (a n )X(a n ) −1 X H (a n )y n = 1 σ 2 v y H n X(a n )X + (a n )y n .
In order to derive the symbol detector, an incremental metric is used as the branch metric: ∆ n (a n ) = Γ n (a n ) − Γ n−1 (a n−1 ) = 1 σ 2 y n X(a n )h ML (a n ) − 1 σ 2 y H n−1 X(a n )h ML (a n−1 ) (22) which is the implementation of F(·) in Equation (12). In fact, the authors in [9] assigned an ML estimator to each state that could be regarded as an instance of the symbol-symbol detector derived in this paper. Since the noise was white and Gaussian, the ML estimator was equivalent to the least-squares (LS) estimator, and the metric in [9] is noncoherent. Therefore, the detector is denoted as the least-squares noncoherent symbol detector (LS-NSD). However, a major drawback of the LS-NSD is its high complexity in the computation of branch metrics caused by matrix inversion in LS estimation. To simplify the calculation of the branch metric, some ingenious channel estimation methods can be considered to take place of the LS estimator. In the process of trellis search, the update of channel estimation has recursiveness, and the forward recursion can be seen as a constant input of new data. It is easy to associate RLS and LMS [33] as a fast algorithm for LS estimation that can be used to process real-time data, which is highly convertible with the forward recursion in trellis search. To simplify the calculation of the branch metric, RLS or LMS can be applied in the channel estimation of each branch to avoid matrix inversion. In addition, both algorithms can identify the characteristics of the dynamic system in real time, allowing for the more accurate tracking of channel variations in a dynamic channel environment.
RLS requires the initial values of the channel response and the P, which can be initialized by the training sequence. However, under the constraint of blind equalization, it is assumed that the LS-NSD is still used to calculate the channel response for the first t time slots, and the RLS estimator is used after the (t + 1)th time slots. The P is initialised by (X(a t ) H X(a t )) −1 at the time t.
The gain vector at the kth moment (in terms of sample interval): Updating the inverse of the correlation matrix P at the (k + 1)th moment: Then, calculating the channel response: are fractionally spaced signal samples during channel length l. To further reduce complexity, the channel estimator for the branch metric can use the LMS algorithm:ĥ where β is the step size chosen to be a suitable constant in LMS. To ensure the convergence of the algorithm, the range of the step satisfies where tr[R] is the trace of the autocorrelation matrix of x(t k ). In the case of a time-variant channel, normalized least mean squares (NLMS) can be used to improve tracking channel variations, and the step size is written as follows: where γ is a constant selected to prevent underflow.
Since the channel estimation methods are adaptive, the two symbol detectors proposed in this paper are denoted as the RLS adaptive symbol detector (RLS-ASD) and the LMS/NLMS adaptive symbol detector (LMS/NLMS-ASD). Table 1 shows a detailed comparison of the complexity of RLS-ASD, LMS-ASD, and NLMS-ASD, and detection in [9] via floating-point operations (FLOP). The analysis of the computational effort of the different detectors is shown in Appendix A.

Simulation Setup and Parameters
For the evaluation of the proposed blind turbo equalization, the parameters are summarized in Table 2, and the burst structure is shown in Figure 4. CPM with M = 4, L = 2 − RC, h = 1/2 was taken as an example for the experiment and simulation. CPM signals of each burst were sent over 4-tap equal power Rayleigh fading channels. In the first case, the single burst structure is shown in Figure 4a, with the training sequence using only a small number of bits to lock quickly and reliably for the receiver rather than for channel estimation in the conventional one. A time-invariant channel is usedthroughout a burst when the relative velocity of the transmitter and receiver is not very high, and the channel in any two different bursts is independent. In the second case, we considered a time-variant channel. The data bits were coded and divided into multiple subsequences as shown in Figure 4b, where each block of 20 code bits with a training sequence was transmitted as a short burst on a different channel.

Uncoded CPM: Single Burst and Time-Invariant Channel
In a single short burst, as shown in Figure 4a, the channel is assumed to be constant during a single burst and independent of each other. The uncoded performance of the different detectors in a time-invariant fading channel is shown in Figure 5. 'Tran.' curves represent the performance of the training-based method as the benchmark to beat. In a short burst, it is difficult for a few training data to provide an accurate estimation, resulting in poor performance. The LS-NSD curve is the performance of the symbol detector proposed as the baseline in [9], which served as the baseline of performance. In RLS-ASD, because of the time-invariant channel, RLS with forgetting factor λ = 1 was applied to channel estimation in the branch metric. The performance of the RLS-ASD with 1 was roughly similar to that of LS-NSD, but with lower complexity.
Compared to LS-NSD and RLS-ASD, the LMS-based ASD had much lower complexity and practical feasibility, but its performance was strongly influenced by the step size. The LMS-ASD with fixed step sizes of κ = 0.1, 0.5, 1.0, 1.5, 2.0 was selected according to Equation (30). BER curves show that the LMS-ASD with a greater κ achieved better BER performance than that of the smaller one in low E b /N 0 , but reached an error floor at high E b /N 0 . The results show that no error floor was observed for the LMS-ASD with κ = 0.1, while there is a significant loss of performance at low E b /N 0 .

Coded CPM: Multiple Burst and Time-Variant Channel
At a low Doppler spread with f d T = 0.002, the BER performance of various symbol detectors for coded CPM is demonstrated in Figure 6. The performance of the four detectors without iteration is given in Figure 6a. The performance of the RLS-ASD with λ = 0.99 was roughly similar to that of LS-NSD, but with lower complexity. BER curves show that the LMS-ASD achieved poorer BER performance than that of the NLMS-ASD since it utilized a fixed step size to achieve faster convergence, but ignored the steadystate misadjustment error. Therefore, NLMS-ASD had both faster convergence speed and a smaller misadjustment error. As the parameter a in Equation (31) was reduced, the performance of the NLS-ASD gradually improved, coming closer to that of RLS-ASD and LS-NSD.
After the third iteration, the comparison of the BER curves using various symbol detectors is shown in Figure 6. The curve of LS-ASD reached an error floor, while the BER of RLS-ASD had an obvious downward trend along with E b /N 0 . The performance of NLMS-ASD did not always increase with the decrease in parameter alpha, and the best performance was achieved with a = 0.2.
The comparisons of LS-NSD, NLMS-ASD, and RLS-ASD are shown for the third iteration in Figure 7 for f d T = 0.01. At a high Doppler spread, LS-NSD could achieve slightly better performance than that of the one at a low Doppler spread since it obtained more gain from the diversity of the different channels with fast time variation. At the same time, as the Doppler spread increased, a smaller forgetting factor in RLS-ASD could achieve faster convergence. Then, NLMS-ASD with a = 0.2 could achieve similar performance to that of LS-NSD. However, its complexity was lower than that of the LS-ASD or RLS-ASD. Thus, the NLMS-ASD with appropriate parameters could achieve an excellent trade-off between complexity and performance. Table 3. Parameter of the coded and interleaver schemes; see also Table 2. [5,7] Table 3.  Table 3.

Scheme Outer Code Interleaver Length Iterations
Lastly, we consider the performance of various symbol detectors when different channel codes and interleavers are employed. The BER after three iterations at f d T = 0.01 for the coded modulation schemes given in Tables 2 and 3 is shown in Figure 8. Compared with the benchmark of Scheme A, the performance could be improved with the convolutional codes with a larger number of states in Scheme B, especially for RLS-ASD. However, the longer interleaving length in Scheme C did not significantly improve performance, which may have been due to the smaller frame length of the signal.  Tables 2 and 3.

Conclusions
The paper proposed a class of symbol-by-symbol detectors based on the BCJR algorithm. The channel estimator was embedded in the forward recursion of the BCJR algorithm, and we illustrated the LS-NSD in [9] as an instance of the proposed detector. First, the performance of RLS-ASD and LMS -ASD with different step sizes was compared for a single CPM burst without coding and a time-invariant channel, using LS-NSD as a benchmark. RLS-ASD with λ = 1 achieved similar performance to that of LS-NSD because RLS is a fast implementation of LS. LMS-ASD approached the benchmark as the step size decreased while reducing the FLOP number by about half.
In the second case, we considered multiple bursts with time-variant channels in the form of SCCPM. LS-NSD showed an error floor with different degrees at different maximal normalized Doppler spreads, while RLS-ASD achieved a performance improvement of 1 dB, which showed no or a light error floor. NLMS-ASD with appropriate parameters reduced the required number of FLOP by 45% at the expense of 1 dB power. Lastly, the performance of different code and interleave schemes are observed. Convolutional codes with a larger number of states could achieve more performance gains, most notably with RLS-ASD, while a larger interleaving depth could reduce performance.
For the short-burst CPM, in the case of time-invariant channels, the choice of different detectors could achieve a flexible trade-off between complexity and performance when the LS-NSD was a benchmark. In the case of time-variant channels, the proposed detector was more robust to time-variant environments than LS-NSD was. Furthermore, the limited computing capacity in IoT nodes motivates exploring other methods for reduced-complexity detection, which further reduces the amount of calculation. In addition, research on the influence of synchronization on our proposed method is practically significant, since perfect synchronization was assumed in the front end of our article. The mentioned open points are left for future research on the CPM receiver.
Moreover, in the future, 6G wireless networks would not be limited to only terrestrial communication, but would also be supplemented by nonterrestrial communication, especially the application of UAVs. In UAV-aided IoT communication systems, UAVs can provide more opportunities for line-of-sight paths and improved coverage range due to their flexible deployment and controlled mobility. In addition, a physical-layer innovation technique, intelligent reflective surfaces (IRS) [34][35][36], can reconfigure a wireless propagation environment by intelligently reflecting signals from the transmitter to the receiver, which can improve the performance of networks but remains unexplored. The design of the receiver with the assistance of UAVs and IRSs is a natural future research topic. The mentioned open points are left for future research on the CPM receiver.
As future work, there are three prospective directions: (1) searching for another method of reduced-complexity detection to further achieve a balance between complexity and performance; (2) studying the synchronization techniques of CPM, and analyzing the interplay between detection and synchronization; (3) exploring the design of CPM receivers with the assistance of UAVs and IRSs.
Finally, the total number of operations needed by the differernt detector can be obtained