Next Article in Journal
Graph-Based Feature Weight Optimisation and Classification of Continuous Seismic Sensor Array Recordings
Next Article in Special Issue
Blind Detection of Broadband Signal Based on Weighted Bi-Directional Feature Pyramid Network
Previous Article in Journal
Managed Surge Controller: A Docking Algorithm for a Non-Holonomic AUV (Sparus II) in the Presence of Ocean Currents for a Funnel-Shaped Docking Station
Previous Article in Special Issue
rSEM: System-Entropy-Measure-Guided Routing Algorithm for Industrial Wireless Sensor Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Joint Intra/Inter-Slot Code Design for Unsourced Multiple Access in 6G Internet of Things

1
Key Laboratory of Universal Wireless Communications, Beijing University of Posts and Telecommunications, Beijing 100876, China
2
CICT Mobile Communication Technology Co., Ltd., Beijing 100190, China
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(1), 242; https://doi.org/10.3390/s23010242
Submission received: 30 September 2022 / Revised: 17 December 2022 / Accepted: 22 December 2022 / Published: 26 December 2022

Abstract

:
Unsourced multiple access (UMA) is the technology for massive, low-power, and uncoordinated Internet-of-Things in the 6G wireless system, improving connectivity and energy efficiency on guaranteed reliability. The multi-user coding scheme design is a critical problem for UMA. This paper proposes a UMA coding scheme based on the T-Fold IRSA (irregular repetition slotted Aloha) paradigm by using joint Intra/inter-slot code design and optimization. Our scheme adopts interleave-division multiple access (IDMA) to enhance the intra-slot coding gain and the low-complexity joint intra/inter-slot SIC (successive interference cancellation) decoder structure to recover multi-user payloads. Based on the error event decomposition and density evolution analysis, we build a joint intra/inter-slot coding parameter optimization algorithm to minimize the SNR (signal-to-noise ratio) requirement at an expected system packet loss rate. Numerical results indicate that the proposed scheme achieves energy efficiency gain by balancing the intra/inter-slot coding gain while maintaining relatively low implementation complexity.

1. Introduction

1.1. Background

Recently, academics and industry have proposed many prospects for the evolution of the IoT (Internet-of-Things) in the next generation [1]. In general, the 6G IoT system mainly faces the following three challenges: The rapid growth of connectivity [2], the guarantee of low latency under specific reliability [3], and the requirement of low power consumption and low implementation complexity [4].
Based on this, Polyanskiy proposed the concept of unsourced multiple access (UMA) in 2017 [5]. The UMA removes the coordination center in the network to reduce the transmission cost and latency of the frequent access of vast short packages, which is the major drawback of traditional schemes OMA (Orthogonal Multiple Access) [6], coordinated NOMA (Non-Orthogonal Multiple Access) [7], and grant-free access [8]. The uplink channel is always available to users, and the network works in the unsourced style, adapting to large-scale frequent connection requests. As a result, the system optimization criteria need to be changed from sum-rate to PUPE (Per-User Probability of Error), that is, to achieve the massive access ability under a specific average packet loss rate. The UMA’s achievability bound was given in [5], laying the foundation for research in this field.

1.2. Related Works

After that, many works emerged, exploring how to approach the performance bound through practical coding design under UMA [9,10]. These schemes are based on three basic paradigms: random spreading, T-Fold Aloha [11], and T-Fold IRSA (Irregular Repeated Slotted Aloha) [12].
The random spreading scheme regards the entire transmission frame as the available length of code chips for each user. The users’ data packets are superimposed after the symbol-level spreading. Representative works are the sparse IDMA (Interleave-Division Multiple Access) [13] based on LDPC (Low-Density Parity Check Code) and Polar-RS (Random Spreading) [14] and Polar-SS (Sparse Spreading) [15] based on polar codes. As such schemes occupy the entire frame to form a low-rate code, thereby obtaining the highest coding gain, which has a similar performance to that close to the boundary. However, at the same time, their high implementation complexity is also a problem that cannot be ignored.
T-Fold Aloha divides the transmission frame into slots with equal lengths. On each slot, a multi-access code is designed to control the error rate under multi-user superposition, ensuring a decodable threshold up to T. A classical realization is the concatenated code scheme [16], where the outer code guarantees the T-Fold feature, and the inner code treats noise. The compressed sensing (CS) encoder in CCS (Coded Compressed Sensing) [17] and SPARC (SParse Regression Code) [18] schemes plays the above two roles at the same time and has higher coding efficiency. However, the tree code also suffers an error propagation effect, and the CS coding gain is still limited in the region of high users.
T-Fold IRSA paradigm originated from the research on contention resolution Aloha [19] by G. Liva. Its design consists of two main aspects: the T-Fold intra-slot code and the packet-level inter-slot code. Cheng et al. proposed the SC-LDPC+IRSA scheme [20], spreading the SC-LDPC (Spatially Coupled-LDPC) packets by IRSA. Polar-IRSA [21] changed the SC-LDPC to the SCL decoded multi-user polar code with better performance under the short code length and achieved higher performance gain. In addition, [22] also gives a theoretical analysis of the IRSA framework based on the finite block length bound [23] and asymptotic analysis. Such schemes have performance advantages over T-Fold Aloha; under certain conditions, their performance is close to the high-complexity random spreading schemes. However, these schemes are based on the idealized asymptotic assumptions, the exploitation of intra-slot coding gain is limited, and there is still some room compared with the achievability bound.
In addition, some works also discuss the theoretical analysis [24] and coding scheme [25] design transferred from the AWGN channel to the Rayleigh block fading channel. Besides, MIMO (Multi-Input Multi-Output) transmission [26], channel estimation, activity detection [27], and their co-design [28] push the horizon from theory to practical deployment.

1.3. Contributions

Following the works under the T-Fold IRSA paradigm, we continue to investigate the trade-off between the intra-slot coding gain and the inter-slot diversity gain. Besides, with the premise of realization, we attempt to obtain improvement or balance in terms of performance and complexity. The main contributions of the proposed scheme are the following aspects:
  • Enhanced intra-slot coding structure. We apply the IDMA scheme with CS header to intra-slot code design. The user payload is split into two parts, encoded by IDMA and CS encoders separately, and combined as the intra-slot codeword. The CS part carries the user-specific interleaver pattern of the IDMA codeword, and the IDMA part is the multi-access code resolving the superposition interference.
  • Joint intra/inter-slot iterative decoder. Under the IRSA paradigm, the superimposed spreading pattern of intra-slot code packets is expanded as a compound inter-slot factor graph, recovered by combining the CS pilot decoding results among the slots. The ESE + BP decoder of the intra-slot IDMA code is the embedded operation on the slot nodes. The inter-slot SIC iteration is performed on the graph to eliminate the interference on the slot nodes, making the overload slot nodes decodable.
  • Joint intra/inter-slot coding parameter optimization. To minimize the required SNR under the given PUPE standard and a limited number of channel resources, we follow the idea of error event decomposition to build the framework of parameter optimization. The error caused by each coding module is modeled as a function of its coding parameter. Especially, the inter-slot degree distribution is analyzed by density evolution with finite-length realization and energy cost conditions. Then we integrate these error functions in a global optimization problem and design a heuristic bootstrap search algorithm to jointly optimize all these related parameters, including the intra-slot CS pilot length, the IDMA coding rate, and the inter-slot degree distribution.

1.4. Content Organization

This article organizes its content in the following way. Section 2 gives some basic concepts and universal notations to help clarify the whole framework. Section 3 focuses on the encoder’s design and the proposed scheme’s decoding algorithm. Next, Section 4 discusses the coding parameter optimization problem based on error analysis by decomposition and the unified joint optimization algorithm. Finally, by numerical simulation, Section 5 evaluates its energy efficiency and computational complexity under the optimized configuration.

2. Definitions and Notations

The core problem of UMA is to construct a coding scheme that allows K a unsourced active users to transmit length-B data payload for each on a fixed length- N t o t frame at a target PUPE and given SNR level. By definition [5], the PUPE can be expressed as:
ϵ = k = 1 K a P { w ^ k w k } ,
where k is the index of users and w ^ k is the decoded version of transmitted payload w . When ϵ , N t o t , and B are given, for each K a , there exists an optimal configuration for a coding scheme that makes the required SNR minimum, which is referred to as the SNR threshold. Thus, the energy efficiency of any UMA scheme can be characterized by the K a -SNR threshold curve.
Under the T-Fold IRSA paradigm, the entire frame of length N t o t is sliced into V slots with length N = N t o t / V for each. The degree distribution λ ( x ) determines the distribution of the repetition rate of the intra-slot coded packets for each user. Since the packets are randomly distributed on slots, the number of superimposed packets L v on slot v is also randomized. The multi-user interference increases with L v . T-Fold means that the intra-slot code guarantees that at most T t h users can be correctly decoded. Thus, T t h is the threshold for the T-Fold IRSA system.
Here are some notations for matrices and vectors. The upper-bold case A represents the matrix, and A i , j represents its element at the i-th row and the j-th column. The lower-bold case c represents the vector, and v i is the i-th element. The vectors are column vectors in default.

3. Joint Intra/Inter-Slot Coding Scheme

The structure of the proposed coding scheme is given in this section. In general, it is an intra/inter-slot nested structure, as Figure 1 shows.
The payload of each user w k is encoded by the intra-slot code to produce v k , and then randomly repeated β k times to form an inter-slot packet-level spreading pattern. On the receiver side, the slot-by-slot intra-slot decoding is integrated into the packet-level SIC iteration process on the inter-slot factor graph. The intra-slot codeword v k contains the IDMA codeword x k with a CS pilot s k indicating both the intra-slot interleaving pattern and the inter-slot spreading pattern. The inter-slot code is an IRSA structure enabling the SIC. Thus, the proposed scheme is introduced under the above framework.

3.1. Encoder

The intra-slot encoder is concatenated with the inter-slot encoder. The overall scheme of the encoder is depicted in Figure 2a. For each user k, the intra-slot coded packets are the non-zero ’chips’ of the inter-slot code. The intra-slot codeword consists of the CS pilot and the IDMA-coded part, each carrying part of the payload. Due to the unsourced feature, users must adopt a common codebook. Therefore, the CS pilot not only determines the user-specific configuration of the intra-slot code but also represents the structure of the inter-slot code, which are both randomized to deal with the multi-user interference.

3.1.1. Intra-Slot Encoding

The permutation pattern of each user should be known at the receiver side to enable the decoding process, by transmitting it as an encoded pilot attached ahead of the IDMA data coded part. Thus, we slice w l , the information payload of user l, into two parts: the pilot info sequence d l = [ w l , 1 , , w l , B s ] of length B s that carries both the permutation pattern and part of the user info, along with the data info sequence b l = [ w l , B s + 1 , , w l , B ] of length B c = B B s for IDMA encoder.
The function of the CS encoder is to map d l into pilot s l . The binary sequence d l is firstly converted to decimal τ l . Then τ l is through a bijective map to the column index of M s -by- N s sensing matrix A , usually configured as a normalized Gaussian random matrix. As the length of A is B s , the number of columns of A , N s 2 B s . A natural but effective mapping is to choose the τ l + 1 -th column of A as the length- N s pilot, i.e., s l = a τ l + 1 .
The data sequence b l is sent to a common rate- R L LDPC encoder identical among all users, generating codeword bit sequence u l with length B u = B c / R L . To introduce intra-slot coding diversity, u l is repeated R r times to produce a low rate codeword c l with length B c , where the repetition rate is also the same for all users. The next step is the user-specific interleaver. As mentioned before, the permutation pattern is determined by d l . The decimal τ l converted from d l is used to choose the τ -th pattern f τ l F in the common pattern set F . Through permutation function c l = f τ l c l , we get the interleaved bit sequence c l . According to constellation G , c l is modulated to IDMA codeword symbol sequence x l with length N c = B c / R L R r N m , where the size of the constellation is Q m = | G | , and the modulation order is N m = log 2 ( Q m ) . Especially, N c = B c / R L R r for BPSK (Binary Phase Shift Keying).
Finally, x l and s l are stitched together to form the whole packet of user l, i.e., v l = b l ; d l . After assembling, the length of v l is N = N s + N c . In general, the intra-slot encoder is common for every user. This not only keeps the simplicity of the encoding process but also ensures the common codebook requirement of unsourced settings. The ability of intra-slot code to distinguish superimposed user packets mainly comes from the compressed sensing pilot code and IDMA’s user-specific random interleaver, which are all dependent on the randomness of the pilot info slice d l . The whole structure of the intra-slot encoder is shown in Figure 2b.

3.1.2. Inter-Slot Irregular Spreading

The inter-slot encoding process is based on the intra-slot code, which adds irregular spreading diversity among different user packets by random scheduling, while the encoder remains the same structure shared by all users. Each user k determines the number of packet repeats β k based on the local random scheduler, making the distribution of beta P ( β k = i ) approaches the preset λ ( x ) . Under the IRSA scheme, λ ( x ) is the distribution polynomial of β k , written as:
λ ( x ) = i = 1 I max λ i x i = i = 1 I max P β k = i x i ,
where λ i is the probability of user node of degree-i on the packet superposition factor graph and satisfies the normalized constraint λ ( 1 ) = l = 1 I max λ i = 1 . Therefore, the random scheduler generates β k λ ( x ) and then creates a vector:
δ l = [ 1 , 1 , , 1 β k , 0 , 0 , , 0 V β k ] ,
which is then randomly permuted to ensure the 1-elements uniform, producing the β k -sparse irregular diversity mapping vector δ k . Let the intra-slot codeword v k take Kronecker product with spreading pattern δ k :
z k = v k δ k .
v k is sent to the slot where the element is one in δ k . When β = 1 the packet is not repeated, and when β > 1 the packet gains repetition diversity. Each user follows the above structure and superimposes their spread packets z k in the AWGN (Additive White Gaussian Noise) channel. The received signal y ¯ is:
y ¯ = k = 1 K a z k + n ,
where n is the Gaussian noise with variance σ 2 . Through this inter-slot encoding, the repeated user packets on different slots form a sparse spreading structure, providing packet-level diversity gain.

3.2. Joint Intra/Inter-Slot Decoder on Compound Factor Graph

Accordingly, the receiver follows the mirrored structure. The inter/intra-slot coding configurations are first recovered by pilot decoding, and then the intra-slot decoder is embedded as an operation on the slot nodes of the inter-slot SIC procedure. The receiver will be introduced in the following subsections under the above framework.

3.2.1. Intra-Slot Decoder

The iteration begins with the intra-slot packet decoding process. The received packet on each slot v can be sliced from the whole received signal y ¯ :
y v = [ y ¯ ( v 1 ) N + 1 , , y ¯ v N ] = l = 1 L v γ v , l + n ,
where L v is the number of superimposed user on slot v. According to the intra-slot encoding structure, y v can be further separated into two parts: the CS header y v s = [ γ v , 1 , , γ v , N s ] and the IDMA signal y v c = [ γ v , N s + 1 , , γ v , N ] . Since the IDMA decoding requires the interleaver pattern, the CS pilot is decoded first. y v s can be expanded by:
y v s = l = 1 L v s v , l + n = l = 1 L v a τ l + 1 + n = l = 1 L v A e τ l + 1 + n = A g v + n ,
where e τ l + 1 is an 1-sparse vector with all-zeros elements except for position τ l + 1 , and g v = l = 1 L v e τ l + 1 is an L-sparse vector, assuming no resource collision among users. By sending y v s to the support recovery algorithm [29], the column index set of A , as we modeled, the support set D ^ s , is searched out. Remap the elements in D ^ s back to decimals τ ^ l by aligning the τ ^ l 1 -th column to τ ^ l . Then convert the decimals τ ^ l to length- B s binary sequences d ^ l , which are the pilot info parts of user payloads. Besides, the interleaver patterns f τ ^ l are recovered by selecting the τ -th pattern f τ ^ l F .
After the recovery of f τ ^ l , the IDMA decoding can be started. Since the intra-slot repetition rates are the same among users, we can utilize a simple linear algorithm, the ESE + BP iterative structure [30], as depicted in Figure 3.
The ESE + BP iteration may continue for a specific number of times I max 1 , and then the final hard-decision output b ^ l at the BP decoder of each branch is stitched together with the corresponding pilot info part d ^ l , reconstructing the complete payload decoding result w ^ l .

3.2.2. Inter-Slot Decoder

To recover the superimposed multi-user packets on the overload slots, the inter-slot decoding performs SIC on the compound packet-level factor graph known by the reconstruction process. After the initial intra-slot decoding on all slots, the CS pilots should be recovered as pilot info d ^ v , while the corresponding IDMA parts b ^ v are not all successfully decoded, especially for those on the overload slots.
Using the CS pilots as pointers, the repetition relationship can be confirmed by comparing d ^ v , k in one slot with d ^ v 1 , k 1 on the others. According to Section 3.1.2, the number of unique pilots among all slots is the number of users K a . For user packet k, the indexes of the slots where a replica of it exists form a set:
U k = v 1 d ^ v , k = d ^ v 1 , k , v v 1 ,
where max | U v | = I max . We combine those sets U 1 , , U K a as adjacent matrix U , where the edge between user node k and slot node v is determined. Thus, the intra-slot packet spreading structure can be recovered as the compound factor graph in Figure 4. And The process of the inter-slot decoding described in Algorithm 1 is performed on this graph structure.
Algorithm 1 Inter-slot SIC decoding on the compound packet-level factor graph
  • Require: The received signal y v on each slot v, compressed sensing matrix A , interleaver set F , consteallation A , noise variance σ 2 , threshold T t h , maximum SIC iteration J.
  • Ensure:  Decoded payloads of all users w ^ k .
1:
Initialization: Perform the intra-slot decoding in Section 3.2.1 on each slot, and get the pilot info d ^ v , k , the IDMA decoding result b ^ v , k , and the superimposed number of users L v 1 = | D ^ v s | on each slot;
2:
Factor graph reconstruction: Compare all the CS pilots d ^ v , k , and combine the repetition relationship sets U l into adjacent matrix U by (8);
3:
while  j J   do
4:
   Update the slot nodes subsets V j + and V j by (9), and the user node subsets K j + , K j and K v + accordingly;
5:
   for all  v V  do
6:
     if  L v j K v + T t h  then
7:
       Forward message Passing (from user node l to slot node v );
8:
       Remap the user massages in the effective edge set b ^ k , k K v + to IDMA packets x k SIC ;
9:
       Peel off the known interference x k SIC as (11);
10:
      Backward Message Passing (from slot node v to user node k);
11:
      Intra-slot decoding: Perform the IDMA decoding part on slot v , get the recovered user information b ^ v , k ;
12:
      User node update: Add/Subtract the newly recovered user on slot v in K j + 1 + / K j + 1 ;
13:
      Update the slot counter L v j + 1 = L v j | K v + | .
14:
    else
15:
      SIC not startded, reserve the slot counter L v j + 1 = L v j .
16:
    end if
17:
  end for
18:
end while
At the j-th SIC iteration, according to the T-Fold IRSA model, the slot nodes set can be separated into two subsets by the given threshold T t h
v v L v j T t h = V + v v L v j > T t h = V
where the initial slot node degree L v 1 = | D ^ v s | . Also, the user nodes set has two subsets, the successfully decoded set K j + and the undecoded set K j . For each underload slot node v V + that satisfies the decodable condition, add its adjacent user node k into K j + . Based on this graph, the message passed from the user node to the slot node is the remapped decoded IDMA packet x k SIC . After the SIC peeling session, if the degree of an overload slot node can be reduced under the threshold T t h , this slot will be decodable, where its output message is the reliable decoded IDMA info parts w ^ k . Define the effective edge set of slot v as K v + = { k | U k , v = 1 , k K + } , then the decodable condition of overload slot v after the j-th SIC is:
L v j | K v + | T t h .
If this condition is satisfied, peel the known interference off on this slot:
y v SIC = y v k K v x k SIC .
Then send y v SIC to the intra-slot decoder in Section 3.2.1, where the reliable decoded message w ^ v , k can be recovered. Consequently, the user node subsets K j + and K j can be updated by the backward messages. Perform this process on each overload slot v V . As a result, | K j | will decrease after each iteration, for the underload slots are always helping the overload ones by message propagation on the factor graph. Under appropriate conditions, the SIC can converge to the required level.

4. Performance Analysis and Parameter Optimization

The goal of the coding parameter optimization problem of the proposed scheme is to minimize the SNR threshold under a given PUPE (in Section 2). However, due to the complicated intra/inter-slot encoding structure, the relationship between the coding parameters and the performance indicator is not explicit. Therefore, this section addresses the problem by error event decomposition [16]. By breaking the system-level PUPE down to module-level error rates, the error contribution of each module can be analyzed and correlated with their parameters and eventually form a system-level parameter optimization problem.

4.1. Error Rate Analysis by Decomposition

According to the decoder structure described in Section 3.2, the PUPE in (1) can be decomposed into four parts, as depicted in Figure 5.
Although, as described in Algorithm 1, the decoding structure consists of the compound intra/inter-slot iteration, it can nonetheless be regarded as a three-stage process when analyzing errors due to its successive style. The first stage is the CS pilot recovery, where the pilot resource collision d k 1 = d k 2 , k 1 k 2 occurs at the transmitter side and the support recovery error d ^ k d k at the receiver side. The pilot plays three significant roles: the first part of the user payload, the user-specific IDMA interleaver, and the pointer used to reconstruct the packet-level factor graph. Thus, the pilot error will cause not only packet loss of its user but also the chain effect spreading to the correlated packets of other users. The IDMA decoding error b ^ k b k and the remaining error after the intra-slot SIC process b ^ k SIC b k are both conditioned on the successfully recovered pilots. Then the modular errors are expressed as the functions of their corresponding coding parameters in (12).
P w l w ^ l = P d k 1 = d k 2 + P d ^ l d l + P b ^ k b k d ^ l = d l + P { b ^ k SIC b k d ^ k = d k } = ϵ 1 ( N s ) + ϵ 2 ( N s , B s ) + ϵ 3 ( R L , R r ) + ϵ 4 ( λ ( x ) )
The CS pilot parameters N s and B s are restricted by the collision and detection conditions. ϵ 1 is the resource collision avoiding condition in [16]. The length of the separated pilot info part from user payload B s should be large enough to provide non-collision patterns. As for ϵ 2 , the dimension of the sensing matrix is bounded by the Restricted Isometry Property (RIP) [31] condition. In other words, when T t h is fixed, large row dimension N s can reduce the ϵ 2 . Thus, we can conclude that N s T t h and B s T t h .
The IDMA block error rate ϵ 3 is the function ϵ 3 = P B c , R L , R r , L v , SNR . According to the classical analysis of IDMA, ϵ 3 is based on the single-user performance of the inner rate- R L FEC code and degrades with the gradually severe interference caused by the increase of the number of superimposed users L v . The SNR cost of ϵ 3 at a required level can be extracted on the performance curve of a given threshold T t h by simulation.

4.2. Inter-Slot Degree Distribution Analysis

As the SNR cost of the IDMA system increases with T t h , the SIC decoding on the compound factor graph of the inter-slot code can further reduce the threshold T t h to reach the same level of PUPE, resulting in the reduction of SNR threshold. Thus, degree distribution optimization aims to minimize T t h .
First, we start with an idealized asymptotic investigation. Previously the T-Fold IRSA was modeled as a factor graph, on which the user node degree distribution λ ( x ) determines the slot node degree distribution ρ ( x ) :
ρ ( x ) = i = r R max ρ r x r = r = 1 R max P L v = r x r ρ r = P Bino λ ( 1 ) K a , 1 / V = r
where Bino ( · ) denotes the binomial distribution. The probability of high-degree slot nodes increases with the average packet repetition rate λ ( 1 ) and decreases with more slots V, representing intensified superposition. Figure 6a gives an example of this rule.
Moreover, the convergence behavior of the SIC on the factor graph can be characterized by density evolution (DE), which is similar to the LDPC message passing procedure under the erasure channel [32]. At the t-th iteration, the erasure probability of the slot nodes is ϕ t and η t for the user nodes:
ϕ t η t = 1 r = 1 T t h ρ r + r > T ρ r i = 0 T t h 1 C r 1 i 1 η t r 1 i η t i η t + 1 ϕ t = λ ϕ t .
where x 0 = 1 at the beginning without a priori knowledge of user nodes, and ρ ( x ) can be derived from λ as in (13). Under appropriate λ ( x ) , the erasure probability of slot nodes ϕ t gradually descends with iteration. As λ ( ϕ t ) is a positive-coefficient polynomial function, η t + 1 ϕ t is monotonically increasing, indicating that η t also converges to 0 with descending ϕ t . Meanwhile, the higher the threshold T t h is, the higher the decodable probability of slot nodes r = 1 T t h ρ r is. Notice that the two-probability expression corresponds to the two message-passing procedures in Algorithm 1, respectively. Therefore, the SIC iteration can make as many overload user nodes decodable as possible. An example of the SIC procedure simulated by density evolution is depicted in Figure 6b. When V and λ ( x ) are fixed, the cost of carrying more users K a is the increase of threshold T t h to guarantee convergence under limited iterations, i.e., the rise of IDMA’s SNR requirement.
The tool to determine the convergence condition of density evolution iteration is its EXIT (EXtrinsic Information Transfer) chart [33]. Under given K a , V and T t h , plot the erasure probability curves ϕ 1 ( θ ) and η ( θ ) in (14) on one chart, and find a trajectory between those two curves starting from η ( 1 ) = 1 . If the trajectory reaches η ( 0 ) = 0 , this λ ( x ) enables the SIC iteration to converge, conversely not. Figure 6c,d shows a boundary condition case where the iteration tunnel is about to close for T t h . Since λ ( x ) ( x ) > 0 , η ( θ ) is always concave. Moreover, this effect becomes stronger when the weights of higher-order coefficients increase. However, it is not easy to explicitly express the boundary condition. We adopt the numerical method, differential evolution [34], to solve the implicit equation and search the range of suitable λ ( x ) :
λ * ( x ) { λ ( x ) ϕ 1 ( θ ) η ( θ ) > 0 , θ ( 0 , 1 ) } s . t . ϕ ( θ ) = 1 r = 1 T ρ r + r > T ρ r i = 0 T 1 C r 1 i ( 1 θ ) r 1 i θ i η ( θ ) = λ ( θ ) , λ i 0 , T N + ρ r = P Bino λ ( 1 ) K a , 1 / V = r
Then we move further to practical consideration. An important preassumption for density evolution analysis is that K a , V ensures the isotropy of distribution, while in practice, they are limited. It is challenging for the user-independent random schedulers to guarantee β k λ ( x ) when K a is relatively small, especially for the repetition times with low probability (high-order degrees). On the other hand, the finite length effect causes short cycles and trapping loops in the randomly formed factor graph. In some worse cases, the SIC iteration cannot start or converge. Although the effect of ϵ 3 can be ignored when considering boundary conditions, the remaining errors on the underload slot nodes may cause error propagation. Nonetheless, Λ * gives a basic scope, which just needs to be narrowed.
We use Monte-Carlo simulation to practically examine the effectiveness of candidates in Λ * . Under finite K a , V, and ϵ 3 , the post-iteration packet loss rate of user nodes obtained by simulation is the actual PUPE. Besides, the cost of the packet diversity gain is the additional energy spent on repeated packets. The SNR threshold after inter-slot encoding is:
E b / N 0 = ( E b / N 0 ) T t h λ ( 1 )
where ( E b / N 0 ) T t h is the SNR when ϵ 3 reaches an effective level under threshold T t h . After that, the trade-off of intra-slot encoding should also be considered.

4.3. Joint Parameter Optimization Algorithm

Integrating the analysis on the above modules, the complete parameter optimization procedure is proposed as Algorithm 2.
Algorithm 2 Joint optimization of coding parameters
  • Require: the legnth of user payload B, number of actove users K a , frame length N tot , and target PUPE ϵ .
  • Ensure: the length of CS pilot info part B s , length of CS pilot N s , LDPC code rate R L , intra-slot repetition rate R r , and inter-slot packet spreading distribution λ ( x ) .
1:
Initialization: Determine N s and B s by the CS decoding conditions, randomly chose rate configuration { R L , R c } , and calculate V;
2:
while  R > R min   do
3:
   for  T t h from T min to T max  do
4:
     Obtain ϵ 3 and ( E b / N 0 ) T t h by IDMA simulation;
5:
     Search the convergable range Λ * using density evolution by (15);
6:
     for  λ ( x ) from min λ ( 1 ) to max λ ( 1 )  do
7:
       Perform Monte-Carlo simulation to validate λ ( x ) under the residual error ϵ 3 ;
8:
       Output the post-SIC-iteration error rate ϵ 4 ;
9:
       if  ϵ 4 ϵ  then
10:
        Reserve λ ( x ) and break;
11:
      end if
12:
    end for
13:
  end for
14:
  if SNR threshold (16) increases then
15:
    Choose the { R L , R c } pair with higher total rate R, adjust V accordingly;
16:
  else
17:
    Lower the total rate R, adjust V accordingly.
18:
  end if
19:
end while
20:
Calculate the SNR threshold by (16) and output the optimal coding parameters.
Overall, we use a heuristic bootstrap method to jointly optimize the coding parameters analyzed above. The CS pilot configurations control ϵ 1 and ϵ 2 , basically determined by K a . To tackle the contradiction between intra-slot coding gain and inter-slot diversity gain, the IDMA rate R increases with iterations, while the inter-slot diversity decreases in each iteration. The initial rate R is randomly chosen, and then V can be determined. ( E b / N 0 ) T t h at ϵ 3 is extracted on simulation curves. The convergence condition is ensured by (15). Then the effectiveness of λ ( x ) with increasing energy cost is checked by simulation until it satisfies the post-SIC-iteration PUPE requirement. If the SNR threshold raises compared with the last iteration after optimization, R should be increased to enhance the inter-slot code. If not, lower R to reduce the multi-user interference.

5. Numerical Results

In this section, we evaluate the proposed scheme using numerical indexes of two aspects: the K a -SNR threshold curve representing energy efficiency and the FLOPf (FLoating-point Operations Per frame) comparison representing computational complexity.

5.1. Energy Efficiency Analysis

The SNR threshold, by definition, is the minimum required SNR that achieves a target PUPE under specific configurations. As described in Section 2, the K a -SNR curve is acquired under some fundamental constraints. Thus, we give the primary scenario configurations in Table 1.
These parameters are shared in the following simulations. To get the SNR threshold for each K a , we optimize the coding parameters by Algorithm 2 point-by-point. The results are displayed in Table 2. Under all the configurations, ϵ 1 < 10 3 and ϵ < 10 4 , so that the pilot error would not affect the subsequent decoders. Through adjustment, the intra-slot coding gain and inter-slot diversity gain are balanced, the sum of which reaches the optimal point.
It can be observed that the proportion of the two types of gains varies with K a . In the low K a region, the intra-slot coding gain is more effective against multi-user interference, and the cost of reducing V is affordable. However, when it comes to the high K a region, the main problem is to tackle the rise of threshold T t h by the inter-slot SIC. Meanwhile, the severe superposition of packets requires V to increase, so the inter-slot diversity gain dominates.
Next, we compare the proposed scheme with several existing representatives in Figure 7a. Based on the T-Fold Aloha scheme, the CCS-AMP [36] uses CS as the intra-slot encoder to resolve superposition and enhance the AMP algorithm. As introduced in Section 1, the CCS-AMP scheme is based on the T-Fold Aloha scheme, while SC-LDPC + SIC [20] and Polar-IRSA [21] are T-Fold IRSA. Sparse IDMA [13] and Polar-sparse spreading (Polar-SS) [15] are in the random spreading paradigm. Polar-IRSA achieves the best performance in the IRSA category with a better intra-slot code design. The excellent performance of polar codes in short length makes polar code base schemes stand out in low K a conditions where the intra-slot coding gain is critical. Our scheme occupies the middle position among the three for its repetition diversity in intra-slot IDMA code provides more coding gain than pure LDPC. The random spread spectrum schemes have the best performance of all paradigms, which can be decomposed into a cascaded structure on one frame-length long time slot. The sparse outer code can eliminate multi-user interference and provide a particular coding gain in the low K a region.
As K a increases, our scheme maintains the lowest slope and eventually achieves a performance advantage in the high K a region. This is mainly because we effectively control the increase of the threshold T t h by utilizing fine optimization of the intra-slot gain and the inter-slot gain. The outer code of the sparse spreading schemes tends to be rateless, and its sparsity and gain gradually diminish. Meanwhile, other IRSA schemes only exploiting packet-level diversity suffer the same problem, let alone the bit-level spreading outperforms the packet-level one.

5.2. Complexity Analysis

Based on the analytical framework proposed in [10], the FLOPf can represent the complexity of the decoder. For each encoding scheme, FLOPf can be expressed as a function of its coding parameters. We compare the proposed scheme with Polar-RS, Polar-IRSA, and CCS-eAMP, the expressions of which are listed in Appendix A. When comparing these schemes, it is insightful to investigate the complexity cost of the corresponding energy efficiency gain. Figure 7b shows the SNR level and the required FLOPf of each scheme when the number of users K a reaches 150.
Although our scheme’s and CCS-AMP’s performance are the same, the latter costs about ten times more FLOPf than the former. Meanwhile, sparse IDMA spends 100 times more complexity for 0.4dB energy gain, while for the polar-RS scheme, it is 10 6 for 0.8 dB. The intra-slot decoder is a linear iteration and converges after 3 to 5 iterations due to the high coding gain. Besides, the inter-slot iteration is restricted to 10 times by the joint degree distribution optimization. Therefore, our scheme achieves a better energy-complexity trade-off.

6. Conclusions

The proposed coding scheme achieves performance gain in the high K a region, benefitting from intra/inter-slot gain balance under jointly optimized parameters. Although it is not as good as existing solutions in the low K a region, it achieves a better trade-off between performance and complexity. The joint design of intra/inter-slot code exploits the potential of the T-Fold IRSA scheme more thoroughly. Thus, our scheme would be a prospective candidate for UMA design in next-generation IoT.
For future research, we can consider the fading scenario. Our scheme can easily be promoted to the block fading channel because of two inherent advantages: 1. Inserting the pilot at each slot means the channel response of each user at each slot can be independently estimated; 2. The intra-slot IDMA is a universal code. After optimizing it under the AWGN channel, its configuration can be directly applied to the fading scenario.

Author Contributions

Conceptualization, Y.L.; methodology, Y.L. and C.D.; software, Y.L.; validation, Y.L.; formal analysis, Y.L. and K.N.; investigation, Y.L. and C.D.; resources, S.S. and J.L.; data curation, Y.L., C.D. and S.S.; writing—original draft preparation, Y.L.; writing—review and editing, Y.L., C.D. and K.N.; visualization, Y.L.; supervision, C.D., K.N. and J.L.; project administration, S.S. and K.N.; funding acquisition, S.S. and K.N. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the Key Program of the National Natural Science Foundation of China (No. 92067202), the National Natural Science Foundation of China (No. 62071058), CICT Mobile Communication Technology Co., Ltd., and Beijing University of Posts and Telecommunications—China Mobile Research Institute Joint Innovation Center.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
UMAUnsourced Multiple Access
IoTInternet-of-Things
IRSAIrregular Repeated Slotted Aloha
OMAOrthogonal Multiple Access
NOMANon-Orthogonal Multiple Access
RACHRandom Access CHannel
PUPEPer-User Probability of Error
IDMAInterleave-Division Multiple Access
LDPCLow Density Parity Check Code
RSRandom Spreading
SSSparse Spreading
SCLSuccessive Cancellation List
SICSuccessive Interference Cancellation
BCHBose Ray-Chaudhuri and Hocquenghem
CSCompressed Sensing
CCSCoded Compressed Sensing
SPARCSParse Rgression Code
AMPApproximate Message Passing
SC-LDPCSpatially Coupled-LDPC
BPBelief Propagation
MIMOMulti-Input Multi-Output
ESEElementary Symbol Estimator
SNRSignal-to-Noise Ratio
OMPOrthogonal Match Pursuit
AWGNAdditive White Gaussian Noise
LLRLog-Likelihood Ratio
MUDMulti-User Detection
EXITEXtrinsic Information Transfer
FLOPfFLoating-point Operations Per frame

Appendix A. The Expressions of FLOPf

The expressions of computational complexity and their corresponding coding parameters are in Table A1. The detailed optimized parameters of the compared schemes can be found in their respective papers.
Table A1. FLOPf expressions of different coding schemes.
Table A1. FLOPf expressions of different coding schemes.
Coding SchemeRelated ParametersFLOPf
Our scheme N s CS pilot length; B s pilot info length; T t h threshold; N c length of IDMA codeword; Z c LDPC lifting size; I 1 maximum iteration of LDPC SPA decoder; n v number of variable nodes; n c number of parity check nodes; V number of slots; I 2 maximum iteration of ESE+SPA IDMA decoder; K a number of users; V number of slots
T t h ( 2 N s B s + B s 2 N s + N s 3 ) + 2 V T t h [ I 2 ( 12 N c + 3 Z c ( n c + n v ) 2 I 1 ) ] + K a N c
CCS-AMP [37] N s row size of CS (Compressed Sensing) matrix; 2 G column size of CS matrix; K a number of users; J number of sub-blocks; I max maximum iteration of CS AMP decoder
4 J I max K a N s ( 2 G + 1 ) + K a log 2 ( K a )
Sparse IDMA [13] N p row size of CS matrix for pilot coding; 2 G column size of CS matrix for pilot coding; K a number of users; R R = λ ( 1 ) average repetition rate; R L basic LDPC code rate; N c = n N p IDMA code length; N c = k B p IDMA information bit length; I 1 BP user layer iteration; I 2 BP channel layer iteration
4 N s K a ( 2 G + 1 ) + I 2 [ I 1 K a N c 2 ( ( R R + 1 ) / R L 1 ) 2 + ( K a R R N c / R L + n ) 2 ] 3
Polar-RS [14] 2 B s total number of spreading sequences; N s length of spreading sequences; N c length of information bits for polar coding; r length of CRC (Cyclic Redundancy Check) parity bits; B c polar code length; g length of segment in energy detector; I max maximum iteration of polar list decoder
2 n 2 g + B s B c / g + 2 N s 2 B s + K a ( N s 2 2 B s + 2 ( 3 B s ) + 2 N s 2 B s + I max B c log 2 ( B c ) + B c r )

References

  1. You, X.; Wang, C.X.; Huang, J.; Gao, X.; Zhang, Z.; Wang, M.; Huang, Y.; Zhang, C.; Jiang, Y.; Wang, J.; et al. Towards 6G wireless communication networks: Vision, enabling technologies, and new paradigm shifts. Sci. China Inf. Sci. 2021, 64, 110301. [Google Scholar] [CrossRef]
  2. Giordani, M.; Polese, M.; Mezzavilla, M.; Rangan, S.; Zorzi, M. Toward 6G Networks: Use Cases and Technologies. IEEE Commun. Mag. 2020, 58, 55–61. [Google Scholar] [CrossRef]
  3. Chen, S.; Hu, J.; Shi, Y.; Zhao, L.; Li, W. A Vision of C-V2X: Technologies, Field Testing, and Challenges With Chinese Development. IEEE Internet Things J. 2020, 7, 3872–3881. [Google Scholar] [CrossRef] [Green Version]
  4. Sarkar, S.; Debnath, A. Green IoT: Design Goals, Challenges and Energy Solutions. In Proceedings of the 2021 6th International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India, 8–10 July 2021; pp. 637–642. [Google Scholar] [CrossRef]
  5. Polyanskiy, Y. A perspective on massive random-access. In Proceedings of the IEEE International Symposium on Information Theory, Aachen, Germany, 25–30 June 2017; pp. 2523–2527. [Google Scholar] [CrossRef]
  6. Li, H.; Ru, G.; Kim, Y.; Liu, H. OFDMA capacity analysis in MIMO channels. IEEE Trans. Inf. Theory 2010, 56, 4438–4446. [Google Scholar] [CrossRef]
  7. Razavi, R.; Dianati, M.; Imran, M.A. Non-Orthogonal Multiple Access (NOMA) for future radio access. In 5G Mobile Communications; Springer: Cham, Switzerland, 2016; pp. 135–163. [Google Scholar] [CrossRef]
  8. Yuan, Y.; Wang, S.; Wu, Y.; Poor, H.V.; Ding, Z.; You, X.; Hanzo, L. NOMA for Next-Generation Massive IoT: Performance Potential and Technology Directions. IEEE Commun. Mag. 2021, 59, 115–121. [Google Scholar] [CrossRef]
  9. Wu, Y.; Gao, X.; Zhou, S.; Yang, W.; Polyanskiy, Y.; Caire, G. Massive Access for Future Wireless Communication Systems. IEEE Wirel. Commun. 2020, 27, 148–156. [Google Scholar] [CrossRef] [Green Version]
  10. Li, Y.; Dai, J.; Si, Z.; Niu, K.; Dong, C.; Lin, J.; Wang, S.; Yuan, Y. Unsourced multiple access for 6G massive machine type communications. China Commun. 2022, 19, 70–87. [Google Scholar] [CrossRef]
  11. Polonelli, T.; Brunelli, D.; Marzocchi, A.; Benini, L. Slotted aloha on lorawan-design, analysis, and deployment. Sensors 2019, 19, 838. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  12. Liva, G. A slotted ALOHA scheme based on bipartite graph optimization. In Proceedings of the 2010 International ITG Conference on Source and Channel Coding, SCC 2010, Siegen, Germany, 18–21 January 2010; pp. 1–6. [Google Scholar]
  13. Pradhan, A.K.; Amalladinne, V.K.; Vem, A.; Narayanan, K.R.; Chamberland, J. A Joint Graph Based Coding Scheme for the Unsourced Random Access Gaussian Channel. In Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019. [Google Scholar]
  14. Pradhan, A.K.; Amalladinne, V.K.; Narayanan, K.R.; Chamberland, J. Polar Coding and Random Spreading for Unsourced Multiple Access. In Proceedings of the ICC 2020—2020 IEEE International Conference on Communications (ICC), Virtual, 7–11 June 2020; pp. 1–6. [Google Scholar] [CrossRef]
  15. Zheng, M.; Wu, Y.; Zhang, W. Polar Coding and Sparse Spreading for Massive Unsourced Random Access. In Proceedings of the IEEE Vehicular Technology Conference, Virtual, 18 November–16 December 2020; pp. 1–4. [Google Scholar] [CrossRef]
  16. Ordentlich, O.; Polyanskiy, Y. Low complexity schemes for the random access Gaussian channel. In Proceedings of the IEEE International Symposium on Information Theory, Aachen, Germany, 25–30 June 2017; pp. 2528–2532. [Google Scholar] [CrossRef]
  17. Amalladinne, V.K.; Member, G.S.; Chamberland, J.f.; Member, S.; Narayanan, K.R. A Coded Compressed Sensing Scheme for Unsourced Multiple Access. IEEE Trans. Inf. Theory 2020, 66, 6509–6533. [Google Scholar] [CrossRef]
  18. Fengler, A.; Jung, P.; Caire, G. SPARCs and AMP for Unsourced Random Access. In Proceedings of the IEEE International Symposium on Information Theory, Paris, France, 7–12 July 2019; pp. 2843–2847. [Google Scholar] [CrossRef]
  19. Paolini, E.; Stefanović, Č.; Liva, G.; Popovski, P. Coded random access: Applying codes on graphs to design random access protocols. IEEE Commun. Mag. 2015, 53, 144–150. [Google Scholar] [CrossRef] [Green Version]
  20. Vem, A.; Narayanan, K.R.; Chamberland, J.F.; Cheng, J. A User-Independent Successive Interference Cancellation Based Coding Scheme for the Unsourced Random Access Gaussian Channel. IEEE Trans. Commun. 2019, 67, 8258–8272. [Google Scholar] [CrossRef]
  21. Marshakov, E.; Balitskiy, G.; Andreev, K.; Frolov, A. A polar code based unsourced random access for the gaussian MAC. In Proceedings of the 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall), Honolulu, HI, USA, 22–25 September 2019; pp. 1–5. [Google Scholar] [CrossRef]
  22. Glebov, A.; Matveev, N.; Andreev, K.; Frolov, A.; Turlikov, A. Achievability Bounds for T-Fold Irregular Repetition Slotted ALOHA Scheme in the Gaussian MAC. In Proceedings of the IEEE Wireless Communications and Networking Conference, WCNC, Marrakesh, Morocco, 15–18 April 2019; pp. 12–17. [Google Scholar] [CrossRef]
  23. Polyanskiy, Y.; Poor, H.V.; Verdú, S. Channel coding rate in the finite blocklength regime. IEEE Trans. Inf. Theory 2010, 56, 2307–2359. [Google Scholar] [CrossRef]
  24. Kowshik, S.S.; Polyanskiy, Y. Fundamental Limits of Many-User MAC With Finite Payloads and Fading. IEEE Trans. Inf. Theory 2021, 67, 5853–5884. [Google Scholar] [CrossRef]
  25. Kowshik, S.S.; Andreev, K.; Frolov, A.; Polyanskiy, Y. Energy efficient random access for the quasi-static fading MAC. In Proceedings of the IEEE International Symposium on Information Theory, Paris, France, 7–12 July 2019; pp. 2768–2772. [Google Scholar] [CrossRef]
  26. Li, T.; Wu, Y.; Zheng, M.; Wang, D.; Zhang, W. SPARC-LDPC Coding for MIMO Massive Unsourced Random Access. In Proceedings of the IEEE Globecom Workshops, Taipei, Taiwan, 7–11 December 2020; pp. 8–13. [Google Scholar]
  27. Wang, Q.; Liu, L.; Zhang, S.; Lau, F.C. On Massive IoT Connectivity with Temporally-Correlated User Activity. In Proceedings of the IEEE International Symposium on Information Theory, Melbourne, Australia, 12–20 July 2021; pp. 3020–3025. [Google Scholar] [CrossRef]
  28. Fengler, A.; Haghighatshoar, S.; Jung, P.; Caire, G. Non-Bayesian Activity Detection, Large-Scale Fading Coefficient Estimation, and Unsourced Random Access with a Massive MIMO Receiver. IEEE Trans. Inf. Theory 2021, 67, 2925–2951. [Google Scholar] [CrossRef]
  29. Koep, N.; Behboodi, A.; Mathar, R. An Introduction to Compressed Sensing. In Applied and Numerical Harmonic Analysis; Birkhäuser: Cham, Switzerland, 2019. [Google Scholar] [CrossRef]
  30. Xiong, X.; Hu, J.; Tian, L. A fast converging multi-user detection for IDMA based on time-reversal. In Proceedings of the 2007 6th International Conference on Information, Communications and Signal Processing, ICICS, Singapore, 10–13 December 2007. [Google Scholar] [CrossRef]
  31. Leinonen, M.; Codreanu, M.; Giannakis, G.B. Compressed Sensing with Applications in Wireless Networks; Now Foundations and Trends: Boston, MA, USA, 2019. [Google Scholar] [CrossRef]
  32. Richardson, T.; Urbanke, R. Modern Coding Theory; Cambridge University Press: Cambridge, UK, 2008. [Google Scholar] [CrossRef]
  33. Hagenauer, J. The exit chart—Introduction to extrinsic information transfer in iterative processing. In Proceedings of the 2004 12th European Signal Processing Conference, Vienna, Austria, 6–10 September 2004; pp. 1541–1548. [Google Scholar]
  34. Price, K.V. Differential evolution. In Handbook of Optimization; Springer: Berlin/Heidelberg, Germany, 2013; pp. 187–214. [Google Scholar]
  35. 3GPP. TS 138 212-V15. 2.0-5G; NR; Multiplexing and Channel Coding (3GPP TS 38.212 Version 15.2. 0 Release 15). Retrieved. 26 June 2022. Available online: https://www.etsi.org/deliver/etsi_ts/138200_138299/138212/15.02.00_60/ts_138212v150200p.pdf (accessed on 29 September 2022).
  36. Amalladinne, V.K.; Kumar Pradhan, A.; Rush, C.; Chamberland, J.F.; Narayanan, K.R. On Approximate Message Passing for Unsourced Access with Coded Compressed Sensing. In Proceedings of the 2020 IEEE International Symposium on Information Theory (ISIT), Los Angeles, CA, USA, 21–26 June 2020; pp. 2995–3000. [Google Scholar] [CrossRef]
  37. Calderbank, R.; Thompson, A. CHIRRUP: A practical algorithm for unsourced multiple access. Inf. Inference 2020, 9, 875–897. [Google Scholar] [CrossRef]
Figure 1. The overall system framework of the proposed scheme.
Figure 1. The overall system framework of the proposed scheme.
Sensors 23 00242 g001
Figure 2. (a) The overall structure of the encoder. (b) The Intra-slot encoder.
Figure 2. (a) The overall structure of the encoder. (b) The Intra-slot encoder.
Sensors 23 00242 g002
Figure 3. Intra-slot decoder structure at slot v.
Figure 3. Intra-slot decoder structure at slot v.
Sensors 23 00242 g003
Figure 4. An example for inter-slot factor graph reconstruction and SIC process, where K a = 3 and V = 4 .
Figure 4. An example for inter-slot factor graph reconstruction and SIC process, where K a = 3 and V = 4 .
Sensors 23 00242 g004
Figure 5. The system-level packet loss broken down into module-level error events, with the corresponding coding parameters and coding gains.
Figure 5. The system-level packet loss broken down into module-level error events, with the corresponding coding parameters and coding gains.
Sensors 23 00242 g005
Figure 6. Density evolution analysis of inter-slot code: (a) The degree distribution of slot nodes ρ ( x ) at λ ( x ) = 0.5 x 2 + 0.5 x and different users. (b) The density evolution procedure at λ ( x ) = 0.5 x 2 + 0.5 x , K a = 100 and V = 28 , when T t h < 3 it does not converge. (c) The density evolution EXIT chart at λ ( x ) = 0.23 x 2 + 0.77 x , K a = 150 , V = 28 and T t h = 3 . The tunnel is about to close, representing the boundary condition. (d) Corresponding density evolution iteration procedure at the same configuration with (c) but varying T t h , where T t h = 3 is just able to converge.
Figure 6. Density evolution analysis of inter-slot code: (a) The degree distribution of slot nodes ρ ( x ) at λ ( x ) = 0.5 x 2 + 0.5 x and different users. (b) The density evolution procedure at λ ( x ) = 0.5 x 2 + 0.5 x , K a = 100 and V = 28 , when T t h < 3 it does not converge. (c) The density evolution EXIT chart at λ ( x ) = 0.23 x 2 + 0.77 x , K a = 150 , V = 28 and T t h = 3 . The tunnel is about to close, representing the boundary condition. (d) Corresponding density evolution iteration procedure at the same configuration with (c) but varying T t h , where T t h = 3 is just able to converge.
Sensors 23 00242 g006
Figure 7. (a) Comparison of K a -SNR threshold curves of different coding schemes. N t o t = 30,000, B = 100 , PUPE = 0.1. (b) Performance and computational complexity comparison at N t o t = 30,000, B = 100 , K a = 150 , PUPE = 0.1.
Figure 7. (a) Comparison of K a -SNR threshold curves of different coding schemes. N t o t = 30,000, B = 100 , PUPE = 0.1. (b) Performance and computational complexity comparison at N t o t = 30,000, B = 100 , K a = 150 , PUPE = 0.1.
Sensors 23 00242 g007
Table 1. Primary scenario and configurations in numerical simulations.
Table 1. Primary scenario and configurations in numerical simulations.
ParametersConfigurations
Total frame length N t o t 30,000
User payload length B100
LDPC encoder5G NR BG2 [35]
Number of active users K a 50 to 300
IDMA modulationBPSK
CS pilot sensing matrixGaussian random matrix
PUPE requirement ϵ 0.1
Table 2. Optimized coding parameters of the proposed scheme.
Table 2. Optimized coding parameters of the proposed scheme.
ParametersOptimized Results
Number of active users  K a 50100150200250300
Pilot info length B s 111111111212
IDMA data info length B c 898989898888
CS pilot length N s 100100100100125125
LDPC rate R L 1/51/51/31/32/51/4
Intra-slot repetition rate R r 1/2
IDMA rate R0.10.10.1670.1670.20.25
Number of slots V282843434857
threshold T t h 233345
Optimized degree distribution 0.11 x 2 + 0.89 x 0.12 x 2 + 0.88 x 0.13 x 2 + 0.87 x 0.15 x 2 + 0.85 x 0.18 x 2 + 0.82 x 0.2 x 2 + 0.8 x
Average packet repetition rate1.111.121.131.151.181.20
SNR threshold2.752.893.233.914.114.79
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, Y.; Niu, K.; Dong, C.; Suo, S.; Lin, J. Joint Intra/Inter-Slot Code Design for Unsourced Multiple Access in 6G Internet of Things. Sensors 2023, 23, 242. https://doi.org/10.3390/s23010242

AMA Style

Li Y, Niu K, Dong C, Suo S, Lin J. Joint Intra/Inter-Slot Code Design for Unsourced Multiple Access in 6G Internet of Things. Sensors. 2023; 23(1):242. https://doi.org/10.3390/s23010242

Chicago/Turabian Style

Li, Yuanjie, Kai Niu, Chao Dong, Shiqiang Suo, and Jiaru Lin. 2023. "Joint Intra/Inter-Slot Code Design for Unsourced Multiple Access in 6G Internet of Things" Sensors 23, no. 1: 242. https://doi.org/10.3390/s23010242

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop