Next Article in Journal
New Perspectives in Nonintrusive Sleep Monitoring for Neurodegenerative Diseases—A Narrative Review
Next Article in Special Issue
High-Performance QC-LDPC Code Co-Processing Approach and VLSI Architecture for Wi-Fi 6
Previous Article in Journal
Reconstructing Quantum States from Sparse Measurements
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Tensor-Based Approach to Blind Despreading of Long-Code Multiuser DSSS Signals

School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Electronics 2023, 12(5), 1097; https://doi.org/10.3390/electronics12051097
Submission received: 7 January 2023 / Revised: 17 February 2023 / Accepted: 20 February 2023 / Published: 22 February 2023
(This article belongs to the Special Issue Advanced Digital Signal Processing for Future Digital Communications)

Abstract

:
In this paper, a tensor-based approach to blind despreading of long-code multiuser DSSS signals is proposed. We aim to generalize the tensor-based methods originally developed for blind separation of short-code multiuser DSSS signals to long-code cases. Firstly, we model the intercepted long-code multiuser DSSS signals with an antenna-array receiver as a three-order tensor with missing values, and then, the blind separation problem can be formulated as a canonical or parallel factor (CANDECOMP/PARAFAC) decomposition problem of the missing-data tensor, which can be solved using optimum methods. Secondly, a constrained Cramér–Rao Bound (CRB) is also derived to provide a performance benchmark for the proposed approach. Simulation results verify the feasibility of our proposed approach in the case of low signal-to-noise (SNR) conditions.

1. Introduction

Direct sequence spread spectrum (DSSS) signals which multiply low-rate data signals by high-rate pseudo-noise (PN) sequences to expand bandwidth and reduce power spectral density (PSD) have been widely used in recent decades for secure communication due to their low probability of intercept (LPI) and anti-jamming characteristics [1,2]. Now, it is further used in radar, satellite communications, mobile communications, speed and distance measurement, navigation and tracking, and many other fields [3,4,5,6]. The combination of DSSS signals and other modulation techniques, such as Multi-carrier DSSS and M-ary DSSS, can further enhance communication performance [7,8,9].
For non-cooperative applications such as spectrum monitoring and cognitive radio, the PN sequence and other parameters are typically unknown to the non-cooperative receiver. The non-cooperative receiver has to deal with the intercepted signals in a blind manner. This brings great challenges to the detection and parameter estimation of the signals. Blind parameter estimation for DSSS signals has been extensively studied in the past decades. When the receiver is equipped with a single antenna element, many second-order statistics-based blind estimation techniques have been proposed for short-code DSSS systems [10,11,12,13,14,15] and long-code systems [16,17,18,19,20]. With the development of multilinear algebra, a recent trend for blind separation of multiuser DSSS signals is to exploit the tensor-based methods, where a tensor rather than a matrix represents the intercepted multiuser DSSS signals. A remarkable feature of tensor-based approaches is that they have the significant advantages of recovering the information-bearing signals of interest without requiring knowledge of spreading waveforms, DOA, array calibration information, or statistical independence. The intercepted multiuser DSSS signals can be naturally modeled as a third-order tensor, so that the blind separation problem can be solved with the canonical or parallel factor (CANDECOMP/PARAFAC) decomposition method.
There have been many studies using tensor-based techniques to estimate the DSSS signals. In [21], a blind parallel factor (PARAFAC) receiver has been proposed based on the tensor model. Such a receiver resorts to the identifiability of low-rank tensor decomposition and is able to separate the information of each user uniquely. For asynchronous uplink DSSS signals under a multipath environment in which inter-symbol interference (ISI) exists, a low-rank tensor decomposition can also be used for signal estimation [22]. In [23], a Bayesian blind identification algorithm was proposed for CDMA system with multiple antennas at the receiver. It uses the Markov chain Monte Carlo (MCMC) method to improve the performance of PARAFAC. In [24], the ISI was taken into consideration with the tensor model, and the blind separation was performed based on a Rank-(1,L,L) term decomposition. In addition, the authors of [24] derived the Cramér–Rao bound as a theoretical lower bound for performance evaluation.
The aforementioned tensor-based methods are specially developed for blind separation of short-code multiuser DSSS signals and cannot be adopted directly for long-code signals, because the spreading waveform period is a non-integer time of the symbol duration, which makes the signal model much more complicated [19]. In this paper, we are going to exploit the missing tensor model for representing the long-code multiuser DSSS signals. With such representation, the combination of the standard canonical or parallel factor (CANDECOMP/PARAFAC) and alternating least squares (ALS) algorithm is used to separate the information of each user uniquely.
This paper provides the following main contributions:
-
We exploit the missing-data tensor model to represent the long-code multiuser DSSS signals, which provides a new idea for developing tensor-based blind separation methods to estimate parameters of long-code multiuser DSSS signals. Then, we reformulate the blind separation problem into the CANDECOMP/PARAFAC decomposition problem for a missing tensor and discuss the identifiability of decomposition under this missing tensor model.
-
We derive the constrained CRB, which can be applied as a meaningful benchmark to asses the performance of blind separation techniques. Simulation results verify the feasibility of the proposed approach, and show that the estimated performance is close to the constrained CRB.
The rest of the paper is organized as follows. In the next section, the long-code multiuser signals received by multiple antennas are modeled in the discrete-time framework, whereas in Section 3, we introduce the basic concept of a tensor and model the long-code multiuser DSSS signal as missing tensor model, and then propose our blind despreading algorithm. In Section 4, we discuss the discriminability conditions for the general tensor model and the missing tensor model, providing theoretical feasibility for the algorithm proposed in Section 3. In Section 5, a constrained CRB is derived to provide a performance benchmark for the proposed approach. Some illustrative simulation results are presented in Section 6 and Section 7 is the conclusion.

2. Background

2.1. Notation

In this paper, scalars, column vectors, matrices, and tensors are denoted by lowercase (e.g., a), boldface lowercase (e.g., a ), boldface uppercase (e.g., A ), and calligraphic uppercase letters (e.g., A ), respectively. The vector a i represents the ith column of matrix A . The operations A , A denote the transpose and the Moore–Penrose pseudo-inverse, respectively. The symbols ∘, ⊗, *, ⊙, · , · , · , Tr ( · ) , E · and mod ( n , L ) represent outer product, Kronecker product, Hadamard (element-wise) product, Khatri–Rao product, ceiling function, floor function, Frobenius norm, trace, expectation, and the modulo n of L, respectively.

2.2. Problem Formulation

Consider an intercepted long-code multiuser DSSS signal with R users received by an array of I antennas. The received signals of each antenna are matched filtered and sampled to obtain N sampling points. The intercepted baseband long-code multiuser DSSS signals for n-th sample (for 0 n N 1 ) from the i-th (for 1 i I ) antenna can be represented as [19]
y i ( n ) = r = 1 R A i , r m ¯ = 0 M ¯ 1 b r ( m ¯ ) q ( n m ¯ G ) m = 0 M 1 c r ( n m L ) + v i ( n )
where A i , r is the signal gain of the ith antenna receiving user r, v i ( n ) is the Gaussian noise with variance σ 2 , q ( · ) is the rectangular function with length G (i.e., q ( n ) = 1 when 0 n G 1 and q ( n ) = 0 otherwise), and thus, G can be used to represent the symbol duration of the binary phase-shift keying (BPSK) symbol sequence b r = [ b r ( 0 ) , , b r ( M ¯ 1 ) ] , i.e., b r { 1 , 1 } M ¯ . The spreading waveform c r = [ c r ( 0 ) , , c r ( L 1 ) ] with period L > G is the convolution of spreading sequence { c r ( l ) } l = 0 L 1 and channel response g ( n ) , i.e., c r ( n ) = l = 0 L 1 c r ( l ) g ( n l ) . M ¯ = N / G and M = N / L are the number of symbols and the number of repetitions of the spreading waveform, respectively. R denotes the number of users.
Similar to [21,25], the signal model denoted via (1) only considers the case without inter-symbol-interference (ISI). We assume that the signals have been synchronized at the symbol level. In this paper, the radio L / G is generally not an integer [17,18,19]. Moreover, the number of users R, the period of the spreading waveform L, and the spreading gain G are assumed to be known or have been estimated. Please notice that such an assumption is reasonable due to the fact that the parameters R, G, and L can be obtained with some well-known operations [26,27,28]. Let C = [ c 1 , , c R ] , B = [ b 1 , , b R ] and A = [ a 1 , , a R ] denote spreading waveforms, symbols, and antenna gain matrix, respectively. With the aforementioned consideration, this paper aims to joint estimation of these three parameters.

3. Proposed Approach

In this section, we construct a missing tensor model for long-code multiuser DSSS signals and reformulate the blind separation problem as the CANDECOMP/PARAFAC decomposition problem for the missing tensor. Then, an approach based on single imputation (SI) combined with alternating least squares (ALS) is proposed to estimate the spreading waveform C and symbol sequence B .

3.1. Tensor Preliminaries

A tensor is an array of data consisting of three or more indexes. In this paper, we consider the third-order tensor which is defined as X F I × J × K and indexed by i , j , k with elements X ( i , j , k ) , where F is the number field used to denote either the real field R or complex field C . For the given factor matrix A = [ a 1 , , a F ] F I × F , B = [ b 1 , , b F ] F J × F , C = [ c 1 , , c F ] F K × F , any tensor can be realized as a sum of three-way outer products
X = f = 1 F a f b f c f
This is the polyadic decomposition (PD) of the third-order tensor. Similar to the rank of a matrix, we can define the tensor rank as the smallest F needed to synthesize X . Then, F is called tensor rank and this kind of decomposition is known as classic canonical polyadic decomposition (CPD) or parallel factor analysis (PARAFAC). A tensor model of rank 3 is shown in Figure 1. Note that the multiuser DSSS signals can be naturally modeled using a third-order tensor, with the spreading sequence, symbol sequence, and antenna gain making up each factor matrix. A third-order tensor can be fully represented by its factor matrix and we use the notation X = A , B , C to represent the tensor. The motivation to use a tensor is that the CPD is essentially unique under mild conditions. This will be illustrated in subsequent sections.
Our problem is usually to estimate A , B , C from observed data X . Using the least squares criterion, the problem can be expressed as
min A , B , C | | X f = 1 F a f b f c f | | 2
Alternating least squares (ALS) is a commonly used algorithm to compute approximate low-rank models of tensor data. To achieve this, we need to transform the tensor into a matrix. For example, fixing the third subscript k of the tensor, iterating through the data of the other subscripts yields a matrix X ( : , : , k ) . It can be expressed as
X ( : , : , k ) = AD k ( C ) B
where D k ( C ) = D i a g ( C ( k , : ) ) is a diagonal matrix formed by C ( k , : ) . By parallel stacking of the vectorized matrix X ( : , : , k ) , we can get
X 3 = v e c ( X ( : , : , 1 ) ) , , v e c ( X ( : , : , K ) )
For a more concise form of expression, we use
X 3 = ( B A ) C
Similarly, by fixing other subscripts, we can obtain the matrix of other two transformations
X 2 = ( C A ) B
and
X 1 = ( C B ) A ,
respectively.
By fixing two of three factor matrices, the iterative process of ALS can be expressed as
A arg min A | | X 1 ( C B ) A | | 2
B arg min B | | X 2 ( C A ) B | | 2
C arg min C | | C 1 ( C B ) A | | 2
By updating A , B , C at each step, when the iterative process converges, we get the estimation of the factor matrix.

3.2. Missing Tensor Model

Let y i = [ y i ( 0 ) , , y i ( N 1 ) ] represent the sample vector of received signals from the i-th antenna, which is further detailed as
y i = r = 1 R A i , r ( b r 1 G ) ( 1 M c r ) + v i
where v i = [ v i ( 0 ) , , v i ( N 1 ) ] , 1 G , and 1 M denote the vectors of ones having a length of G and M, respectively. Then, the missing tensor model for blind separation is constructed via the following steps:
-
Divide the signal y i received by the i-th ( i = 1 , , I ) antenna into M ¯ sub-vectors of length G, each sub-vector corresponds to a fragment spreading waveform;
-
Define a matrix with size L × M ¯ where each column represents a transmitted symbol; then, the m ¯ -th symbol occupies ( mod ( n , L ) + 1 ) to ( mod ( n , L ) + 1 ) + G rows if ( mod ( n , L ) + 1 ) + G L ; otherwise, it occupies the ( mod ( n , L ) + 1 ) to L and 1 to ( mod ( n , L ) + 1 ) + G L rows;
-
All received signals from I antennas are stacked in a similar way to construct a partially missing tensor Y . Define an incomplete tensor W . For 0 n N 1 and 1 i I , the ( mod ( n , L ) + 1 ) -th raw and ( n / G + 1 ) -th column element of the i-th slice of W is 1, and other elements are missing entries denoted by zeros for simplicity.
The process of constructing the missing tensor model is depicted in Figure 2. Then, we have the tensor Y of the received signal as
Y = S * W + V
where S can be seen as an equivalent short-code signal with the same spreading waveforms, symbols, and antenna gains as long-code cases (1). As it can be seen in [21], S admits an essentially unique CANDECOMP/PARAFAC decomposition
S = r = 1 R c r b r a r = r = 1 R C ( l , r ) B ( m ¯ , r ) A ( i , r ) , l 1 , , L m ¯ 1 , , M ¯ i 1 , , I .
Similar to [29], we use the notation S = C , B , A to represent the relationship S = r = 1 R c r b r a r . According to (10) and (11), the blind separation of long-code multiuser DSSS signals can be reformulated as computing the estimated tensor S ^ = [ [ C ^ , B ^ , A ^ ] ] with the following optimization problem
[ C ^ , B ^ , A ^ ] = arg min C , B , A Y C , B , A W 2

3.3. Solution

In this subsection, we present an ALS-SI-based algorithm [30] to solve the optimization problem defined by (12). To be more specific, let us start with the standard alternating least squares for the short-code multiuser DSSS model, i.e., the original observation tensor Y is complete, and the elements of W are all equal to one. By iterative steps, it can be shown that
C ( s ) = Y 1 ( ( B ( s 1 ) A ( s 1 ) ) )
B ( s ) = Y 2 ( ( A ( s 1 ) C ( s ) ) )
A ( s ) = Y 3 ( ( B ( s ) C ( s ) ) )
where s denotes the number of iterations, the initial values are A 0 and B 0 . Y n is the matrix transformed by Y as described in the previous section (for n = 1 , 2 , 3 ).
We can define the following error function
L ( C , B , A ) = Y 1 C ( B A ) 2
If the value of L ( C , B , A ) decreases with iteration to a given value ϵ (the convergence condition), the algorithm then converges; otherwise, it continues to the next iteration until the maximum number of iterations is reached.
Considering long-code cases, i.e., Y is a part missing tensor, the ALS algorithm above cannot be used directly in the case of missing data, and some adjustments need to be made. Equations (13a) and (13b) are applied, instead of the mode-n unfolding Y n (recall that n = 1 , 2 , 3 ), to a complete matrix Y ˜ n defined as
Y ˜ n = Y n W n + Y n ( s ) ( 1 W n )
where Y n ( s ) is the mode-n unfolding of tensor Y ( s ) computed by
Y ( s ) = C ( s 1 ) , B ( s 1 ) , A ( s 1 )
at the s-th iteration, 1 is a matrix with all elements of 1 and the same dimension as Y n , and W n is the mode-n unfolding of the tensor W . Y ˜ n contains no missing entries, and thus, the standard CANDECOMP/PARAFAC-ALS algorithm is allowed to estimate the model parameters. It should also be pointed out that in order to avoid the convergence to local optima, the multiple initialization strategy can be adopted.

4. Identifiability of Decomposition

The most significant advantage of the low-rank decomposition of third-order tensors in comparison to the low-rank decomposition of matrices is the unique decomposition of tensors under mild conditions, whereas the decomposition of matrices is never essentially unique due to the unitary ambiguity between matrices.
Given a tensor X of rank F, its CPD is essentially unique if the rank-1 terms of F in its decomposition are unique. If X = A , B , C , then essential uniqueness as we mentioned before means that A , B , C are unique up to a common permutation and scaling/counter-scaling of columns, meaning that if X = [ [ A ^ , B ^ , C ^ ] ] , then there exist a permutation matrix Π and diagonal scaling matrices Λ 1 , Λ 2 , Λ 3 such that
A ^ = A Π Λ 1 , B ^ = B Π Λ 2 , C ^ = C Π Λ 3 , Λ 1 Λ 2 Λ 3 = I
For ordinary tensor decomposition, the following theorem is used to ensure tensor identifiability.
Theorem 1. 
Given X = A , B , C , with A : I × F , B : J × F , C : K × F , if k A + k B + k C 2 F + 2 , then r a n k ( X ) = F and the decomposition of X is essentially unique [29].
Note that the Kruskal rank k A , k B , k C of factor matrices is the largest integer k making any k columns of the matrix linearly independent. In addition, the generic of version of Kruskal’s condition also ensures the uniqueness of tensor decomposition and can be expressed as
min ( I , F ) + min ( J , F ) + min K , F 2 F + 2
For the missing tensor model, it is equivalent to sampling the complete tensor. For long-code signals as described before, it is equivalent to partially sampling the short-code signals to construct the missing data model. A sampling pattern is defined as a subset of rows S r d 1 , , I and columns S c d 1 , , J for which every point X ( i , j , k ) , i S r , j S c , k 1 , , K belongs to the pattern. Generally, this sampling pattern requires the following conditions to be met
S r ( d ) , S c ( d ) 2
d = 1 D S r ( d ) = 1 , , I , d = 1 D S c ( d ) = 1 , , J
d S c ( d ) S c ( d ) S r ( d ) S r ( d ) , d 1 , , D
where d 1 , , D , d 1 , , D d , D is the number of sampling pattern. After sampling, we get D sub-tensors
Y d = X S r ( d ) , S c ( d ) , :
Finally, the generic identifiability of this sampling pattern is established in the following theorem.
Theorem 2. 
Let X F I × J × K be the original tensor signal with CPD X = A , B , C of rank F. Assume that A , B , and C are drawn from some joint absolutely continuous distribution with respect to the Lebesgue measure in F ( I + J + K ) F , and that A , B , C satisfy the equations in (18). Then, X ^ ( i , j , k ) = f = 1 F A ( i , f ) B ( j , f ) C ( k , f ) recovers the ground-truth X almost surely if [31]:
2 m i n d log 2 I d + log 2 J d , log 2 J d + log 2 K , log 2 I d + log 2 K 4 F
For the DSSS signal model, I d is the spreading gain and J d is the number of information source sequence, K is the number of antenna. Generally, I d , J d are much larger than K and the number of users F. I d = I d , J d = J d for each sampling pattern; thus, we get
2 log 2 I d + log 2 K 4 F
or
2 log 2 J d + log 2 K 4 F
For example, let I d = G = 30 , K = 4 . We only need to ensure that the number of users F 16 to satisfy the identification condition.

5. The Constrained Cramér–Rao Bound

Suppose the transmitted symbols are independent and identically distributed (i.i.d) and uncorrelated between each user, the noise is zero-mean Gaussian with a standard deviation equal to σ . Stacking the received signal vectors from all I antennas as a long vector y = [ y 1 , , y I ] , then, we have
y = i = 1 I r = 1 R e i ( A i , r ( b r 1 G ) ( 1 M c r ) ) + v
where v = [ v 1 , , v I ] , e i denotes the i-th unit coordinate vector. Define the unknown parameter vector:
θ = ( c 1 , , c R , b 1 , , b R , a 1 , , a R ) .
Based on (21), the log-likelihood function L can be written as
L = c 1 2 σ 2 y i = 1 I r = 1 R e i ( A i , r ( b r 1 G ) ( 1 M c r ) ) 2
with c = d e f N I 2 ln ( 2 π σ 2 ) . The Fisher Information Matrix (FIM) associated with the estimates of these parameters is given by
J ( θ ) i , j = E 2 L ( θ ) θ i θ j ,
where θ i denotes the i-th element of vector θ . Because y is subject to Gaussian distribution, i.e., y N ( μ , R ) , (24) can be given by [32]
[ J ( θ ) ] i , j = 1 2 Tr R 1 R θ i R 1 R θ j + μ θ i R 1 μ θ j ,
in which μ = i = 1 I r = 1 R e i ( A i , r ( b r 1 G ) ( 1 M c r ) ) and R = σ 2 I . Taking the partial derivatives of μ with respect to c r ( l ) , b r ( m ¯ ) , and a r ( i ) , we obtain
μ c r ( l ) = i = 1 I e i [ A i , r ( b r 1 G ) ( 1 M e l ) ] ,
μ b r ( m ¯ ) = i = 1 I e i [ A i , r ( e m ¯ 1 G ) ( 1 M c r ) ] ,
μ a r ( i ) = e i [ ( b r 1 G ) ( 1 M c r ) ] .
A delicate point in the derivation of the CRB is the inherent permutation and scale ambiguity of tensor decomposition, which may cause the FIM to be singular. As a result, the CRB, defined as the inverse of the FIM, has no analytical solution. To obtain a meaningful lower bound, we impose constraints on the parameters and get a constrained CRB [33,34]. Assume that the entries on the first row of C , B , and A are known, i.e.,
f 1 ( θ ) = C ^ 1 , r C 1 , r = 0 f R + r ( θ ) = B ^ 1 , r B 1 , r = 0 f 2 R + r ( θ ) = A ^ 1 , r A 1 , r = 0
for r = 1 , 2 , , R , where · ^ denotes the estimate of unknown parameters. Although considering the entries on the first row of C , B , and A to be known is less appealing in a blind setting, and the extra information makes CRB somewhat harder to reach. However, it is worth noting that this method of adding constraints is intended to resolve the FIM singularity and ultimately to provide a performance assessment of the estimated parameters. Define the constrained vector
f ( θ ) = [ f 1 ( θ ) , f 2 ( θ ) , , f 3 R ( θ ) ]
and the Jacobian matrix of the constrained vector f ( θ ) as D θ f ( θ ) , i.e.,
D θ f ( θ ) U = 0 , U U = I .
Then, the constrained CRB of θ ^ is given by
C R B θ ^ = d i a g ( U ( U J ( θ ) U ) U )
where diag ( · ) returns the column vector of the main diagonal elements of matrix. In particular, the CRB b denotes the average constrained CRB of the estimated symbols b m ¯ , r , 1 m ¯ M ¯ , 1 r R is given by
CRB b = 1 R M ¯ C R B θ ^ [ R L + 1 : R ( L + M ¯ ) ] .
where a [ m : n ] represents the vector made up by m-th to n-th element of a . To assess the performance of our proposed approach, a lower bound on the bit error rate (BER) is more meaningful than a lower bound on the variance of the estimated symbols due to the finite set property of the symbols. Assuming that the estimation errors of the symbols can be modeled as a zero-mean Gaussian random variable with variance equal to CRB b , the corresponding probability of error after detection for BPSK signals can be expressed as [24]:
P e CRB = 1 2 e r f c ( 1 2 CRB b ) ,
where e r f c ( · ) is the complementary error function.

6. Simulation Results

In this section, we assess the performance of proposed algorithm via simulation experiments. We compare the BER against the corresponding lower BER bound of the constrained CRB provided by (32). Our results are obtained from 1000 independent Monte Carlo trials, wherein for each Monte Carlo run, the antenna gains and the spreading waveforms are redrawn from an i.i.d. real Gaussian generator with zero mean and unit variance. Note that the spreading waveform can actually be represented as the convolution of the spread spectrum sequence and channel response, and the effects of transmit and multipath should be considered in the response. The focus of this paper is on the joint estimation of each user spreading waveform and message sequence. It is possible to disregard the details of specific channels, so it is reasonable to represent the spreading waveform with a Gaussian random sequence. The noise is zero-mean white (in all dimensions) Gaussian, with variance σ 2 for all antennas. The observed tensor is given by Y o b s = Y + V , where Y is the noise-free missing tensor and V is the noise tensor. The SNR at the input of the receiver is defined as follows:
SNR = 10 log 10 ( Y 2 / V 2 ) dB .
In an independent experiment, the estimation of the spread spectrum waveform is shown in Figure 3, where the length of the spreading sequence L = 63 , the spreading gain G = 30 , the number of users R = 2 , the number of symbols M = 100 , the symbols are modulated using BPSK, the antenna number I = 2 , and the signal-to-noise ratio S N R = 5 dB. From Figure 3, we can observe that the estimated accuracy of the spread spectrum waveform is different for each user. This is due to the randomly generated user waveform amplitude, which causes the SNR to be different between each user, so users with small SNR will have larger spreading waveform estimation errors. For a practical communication scenario, this case corresponds to a multiuser uplink, where signal synchronization at the receiver side results in superimposed user waveforms of different amplitudes. We use the normalized mean squared error (NMSE) to measure the estimated error of spreading waveforms. NMSE is defined as follows:
N M S E C = C C ^ 2 C 2
By varying the number of antennas, spreading gain, number of users, and number of symbols, we obtain the curve of the NMSE of the spreading waveform estimation and the BER of the message sequence variation with the SNR. The experimental results are shown as follows.
As discussed earlier, the different SNR between each user can lead to variations in the spreading waveform estimation errors. Therefore, a large difference in SNR between users will inevitably occur in the Monte Carlo simulation process. These outlier points with large differences from the mean value are removed in our experiments. From the simulation results, it can be seen that the estimation error decreases as the number of antennas increases. This is due to the gain from multiple antenna diversity, as shown in Figure 4. We also note from Figure 5 that with a fixed length of the spreading sequence, the estimation error decreases as the spreading gain increases. This can be explained in two ways: for long-code DSSS signals, the increase of spreading gain results in a lower missing rate of segmented signals, which leads to a better estimation of the spreading waveform; also, the increase of spreading gain makes the BER of the message sequence lower, which is consistent with the typical spread spectrum communication system. As the number of users increases, the estimation error increases due to the inter-user interference, as shown in Figure 6. Therefore, in practical communication scenarios, we expect to use more antennas to reduce the losses caused by inter-user interference, as shown in Figure 7. Increasing the number of symbols will also result in lower estimation errors, but at high SNR, this gain will be less pronounced after a certain number of symbols is reached, as shown in Figure 8.
Finally, to verify the effectiveness of our algorithm, we compare the BER with the lower bound of the theoretical BER. As shown in Figure 9, the BER of the estimated message sequence is close to the lower bound of the theoretical BER. It shows that our algorithm has good blind despreading performance at low SNR.

7. Conclusions

We have presented a novel approach to blind separation of long-code multiuser DSSS signals. The proposed approach exploits the structure of long-code signals and reformulates the blind separation into the CANDECOMP/PARAFAC decomposition problem for a missing tensor. The constrained CRB is also derived to demonstrate the feasibility of our approach. Simulation results show that the proposed algorithm can estimate the spread spectrum waveform accurately and has good blind despreading performance at low SNR. They also verify the feasibility of the proposed algorithm and show that the estimated performance is close to the constrained CRB.

Author Contributions

Conceptualization, H.Z.; formal analysis, L.L., T.L., H.Z. and S.D.; investigation, L.L., T.L., H.Z. and S.D.; methodology, T.L. and H.Z.; project administration, H.Z.; software, L.L. and T.L.; supervision, H.Z. and L.G.; validation, L.L. and T.L.; writing—original draft, L.L., T.L. and H.Z.; writing—review and editing, L.G. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China under grant no. 61971103.

Acknowledgments

The authors thank the anonymous reviewers and editor whose valuable comments and suggestions have improved the quality of this paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Pickholtz, R.; Schilling, D.; Milstein, L. Theory of spread-spectrum communications—A tutorial. IEEE Trans. Commun. 1982, 30, 855–884. [Google Scholar] [CrossRef] [Green Version]
  2. Krisshna, P.A.; Aswini, B.; Nair, S.S.; Gopika, P.A.; Narayanan, G. Implementation of spread spectrum modulation schemes for secure communications. In Proceedings of the International Conference on Intelligent Computing and Control Systems (ICCS), Madurai, India, 15–17 May 2019; pp. 1397–1401. [Google Scholar]
  3. Bellili, A.M.F.; Affes, S.; Ghrayeb, A. Maximum likelihood time delay estimation from single and multi-carrier DSSS multipath MIMO transmissions for future 5G networks. IEEE Trans. Wirel. Commun. 2017, 16, 4851–4865. [Google Scholar]
  4. Neinavaie, M.; Khalife, J.; Kassas, Z.M. Blind Doppler tracking and beacon detection for opportunistic navigation with LEO satellite signals. In Proceedings of the IEEE Aerospace Conference (50100), Big Sky, MT, USA, 6–13 March 2021; pp. 1–8. [Google Scholar]
  5. Khalife, J.; Shamaei, K.; Kassas, Z.M. Navigation with cellular CDMA signals—Part I: Signal modeling and software-defined receiver design. IEEE Trans. Signal Process. 2018, 66, 2191–2203. [Google Scholar] [CrossRef] [Green Version]
  6. Toru, I.; Yasuda, Y.; Sato, S.; Izumi, S.; Kawaguchi, H. Millimeter-precision ultrasonic DSSS positioning technique with geometric triangle constraint. IEEE Sens. J. 2022, 22, 16202–16211. [Google Scholar] [CrossRef]
  7. Hara, S.; Prasad, R. Overview of multicarrier CDMA. IEEE Commun. Mag. 1997, 35, 126–133. [Google Scholar] [CrossRef]
  8. Haque, M.N.; Shil, M.K. Performance perusal of multiuser MC-CDMA system for Nakagami-m, Rayleigh and Rician fading channel with spreading codes. In Proceedings of the IEEE 9th International Conference on Information, Communication and Networks (ICICN), Xi’an, China, 19–22 August 2021; pp. 1–8. [Google Scholar]
  9. Pursley, M.B.; Royster, T.C. High-rate direct-sequence spread spectrum with error-control coding. IEEE Trans. Commun. 2006, 54, 1693–1702. [Google Scholar] [CrossRef]
  10. Bouder, C.; Azou, S.; Burel, G. Performance analysis of a spreading sequence estimator for spread spectrum transmissions. J. Frankl. Inst. Eng. Appl. Math. 2004, 341, 595–614. [Google Scholar] [CrossRef]
  11. Tsatsanis, M.K.; Giannakis, G.B. Blind estimation of direct sequence spread spectrum signals in multipath. IEEE Trans. Signal Process. 1997, 45, 1241–1252. [Google Scholar] [CrossRef]
  12. Mehboodi, S.; Jamshidi, A.; Farhang, M. Spreading sequence estimation algorithms based on ML detector in DSSS communication systems. IET Signal Process. 2018, 12, 802–809. [Google Scholar] [CrossRef]
  13. Sarcheshmeh, H.M.; Bizaki, H.K.; Alizadeh, S. PN sequence blind estimation in multiuser DS-CDMA systems with multipath channels based on successive subspace scheme. Int. J. Commun. Syst. 2018, 31, e3591. [Google Scholar] [CrossRef]
  14. Qiu, Z.; Peng, H.; Li, T. A blind despreading and demodulation method for QPSK-DSSS signal with unknown carrier offset based on matrix subspace analysis. IEEE Access 2019, 7, 125700–125710. [Google Scholar] [CrossRef]
  15. Choi, H.; Moon, H. Blind estimation of spreading sequence and data bits in direct-sequence spread spectrum communication systems. IEEE Access 2020, 8, 148066–148074. [Google Scholar] [CrossRef]
  16. Liu, Q.; Li, T.; Xu, M. Joint blind estimation of PN codes and channels for long-code DSSS signals in multiple paths at low SNR. In Proceedings of the 2020 IEEE 20th International Conference on Communication Technology (ICCT), Nanning, China, 28–31 October 2020; pp. 1266–1270. [Google Scholar]
  17. Liang, J.-H.; Wang, X.; Wang, F.-H.; Huang, Z.-T. Blind spreading sequence estimation algorithm for long-code DS-CDMA signals in asynchronous multi-user systems. IET Signal Process. 2017, 11, 704–710. [Google Scholar] [CrossRef]
  18. Zhang, H.G.; Gan, L.; Liao, H.S.; Wei, P.; Li, L. Estimating spreading waveform of long-code direct sequence spread spectrum signals at a low signal-to-noise ratio. IET Signal Process. 2012, 6, 358–363. [Google Scholar] [CrossRef]
  19. Zhang, H.; Wei, P.; Mou, Q. A semidefinite relaxation approach to blind despreading of long-code DS-SS signal with carrier frequency offset. IEEE Signal Process. Lett. 2013, 20, 705–708. [Google Scholar] [CrossRef]
  20. Qiang, X.; Zhang, T. Estimation of spreading code in non-periodic long-code DSSS signal. In Proceedings of the Sixth International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 25–27 March 2021; pp. 162–165. [Google Scholar]
  21. Sidiropoulos, N.D.; Giannakis, G.B.; Bro, R. Blind PARAFAC receivers for DS-CDMA systems. IEEE Trans. Signal Process. 2000, 48, 810–823. [Google Scholar] [CrossRef]
  22. Sidiropoulos, N.D.; Dimic, G.Z. Blind multiuser detection in W-CDMA systems with large delay spread. IEEE Signal Process. Lett. 2001, 8, 87–89. [Google Scholar] [CrossRef]
  23. de Baynast, A.; Aazhang, B.; Declerq, D.; Lathauwer, L.D. Bayesian blind PARAFAC receivers for DS-CDMA systems. IEEE Workshop Stat. Signal Process. 2003, 2003, 323–326. [Google Scholar]
  24. Lathauwer, L.D.; de Baynast, A. Blind deconvolution of DS-CDMA signals by means of decomposition in Rank-(1,L,L) terms. IEEE Trans. Signal Process. 2008, 56, 1562–1571. [Google Scholar] [CrossRef]
  25. Lathauwer, L.D.; Castaing, J. Tensor-based techniques for the blind separation of DS-CDMA signals. Signal Process. 2007, 87, 322–336. [Google Scholar] [CrossRef]
  26. Huang, Z.-T.; Liang, J.-H.; Wang, X. Estimating symbol duration of long-code direct sequence spread spectrum signals at a low signal-to-noise ratio. Wirel. Pers. Commun. 2020, 114, 1887–1904. [Google Scholar] [CrossRef]
  27. Sheng, S.; Yang, W.; Hou, Y. An improved power spectrum reprocessing method for DS-SS signal on spreading code period estimation. In Proceedings of the 2nd IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), Xi’an, China, 25–27 May 2018; pp. 774–779. [Google Scholar]
  28. Mou, Q.; Wei, P.; Tai, H.-M. Invariant detection for QPSK DS-SS signals. In Proceedings of the MILCOM 2009 IEEE Military Communications Conference, Boston, MA, USA, 18–21 October 2009; pp. 1–6. [Google Scholar]
  29. Sidiropoulos, N.D.; Lathauwer, L.D.; Fu, X.; Huang, K.; Papalexakis, E.E.; Faloutsos, C. Tensor decomposition for signal processing and machine learning. IEEE Trans. Signal Process. 2017, 65, 3551–3582. [Google Scholar] [CrossRef]
  30. Tomasi, G.; Bro, R. PARAFAC and missing values. Chemom. Intell. Lab. Syst. 2005, 75, 163–180. [Google Scholar] [CrossRef]
  31. Kanatsoulis, C.I.; Fu, X.; Sidiropoulos, N.D.; Akçakaya, M. Tensor completion from regular sub-Nyquist samples. IEEE Trans. Signal Process. 2020, 68, 1–16. [Google Scholar] [CrossRef] [Green Version]
  32. Kay, S.M. Fundamentals of Statistical Signal Processing; Prentice Hall PTR: Hoboken, NJ, USA, 1993. [Google Scholar]
  33. de Carvalho, E.; Cioffi, J.; Slock, D. Cramér-Rao bounds for blind multichannel estimation. In Proceedings of the 2000 IEEE Global Telecommunications Conference, Kuala Lumpur, Malaysia, 4–8 December 2000; pp. 1036–1040. [Google Scholar]
  34. Stoica, P.; Ng, B.C. On the Cramér-Rao bound under parametric constraints. IEEE Signal Process. Lett. 1998, 5, 177–179. [Google Scholar] [CrossRef]
Figure 1. Illustration of a rank 3 tensor.
Figure 1. Illustration of a rank 3 tensor.
Electronics 12 01097 g001
Figure 2. Illustration of the missing tensor model for long-code multiuser DSSS signals.
Figure 2. Illustration of the missing tensor model for long-code multiuser DSSS signals.
Electronics 12 01097 g002
Figure 3. Estimation of spreading waveforms.
Figure 3. Estimation of spreading waveforms.
Electronics 12 01097 g003
Figure 4. NMSE of estimated spreading waveform and BER of information sequence ( L = 63 , G = 30 , R = 3 , M = 100 ).
Figure 4. NMSE of estimated spreading waveform and BER of information sequence ( L = 63 , G = 30 , R = 3 , M = 100 ).
Electronics 12 01097 g004
Figure 5. NMSE of estimated spreading waveform and BER of information sequence ( I = 2 , L = 63 , R = 3 , M = 100 ).
Figure 5. NMSE of estimated spreading waveform and BER of information sequence ( I = 2 , L = 63 , R = 3 , M = 100 ).
Electronics 12 01097 g005
Figure 6. NMSE of estimated spreading waveform and BER of information sequence ( I = 2 , L = 63 , G = 30 , M = 100 ).
Figure 6. NMSE of estimated spreading waveform and BER of information sequence ( I = 2 , L = 63 , G = 30 , M = 100 ).
Electronics 12 01097 g006
Figure 7. NMSE of estimated spreading waveform and BER of information sequence ( L = 63 , G = 30 , M = 100 , S N R = 5 dB).
Figure 7. NMSE of estimated spreading waveform and BER of information sequence ( L = 63 , G = 30 , M = 100 , S N R = 5 dB).
Electronics 12 01097 g007
Figure 8. NMSE of estimated spreading waveform and BER of information sequence ( I = 2 , L = 63 , G = 30 , R = 3 ).
Figure 8. NMSE of estimated spreading waveform and BER of information sequence ( I = 2 , L = 63 , G = 30 , R = 3 ).
Electronics 12 01097 g008
Figure 9. Comparison of BER and CRB ( L = 63 , G = 30 , R = 3 , M = 100 ).
Figure 9. Comparison of BER and CRB ( L = 63 , G = 30 , R = 3 , M = 100 ).
Electronics 12 01097 g009
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, L.; Liang, T.; Zhang, H.; Du, S.; Gao, L. A Tensor-Based Approach to Blind Despreading of Long-Code Multiuser DSSS Signals. Electronics 2023, 12, 1097. https://doi.org/10.3390/electronics12051097

AMA Style

Li L, Liang T, Zhang H, Du S, Gao L. A Tensor-Based Approach to Blind Despreading of Long-Code Multiuser DSSS Signals. Electronics. 2023; 12(5):1097. https://doi.org/10.3390/electronics12051097

Chicago/Turabian Style

Li, Liangliang, Tao Liang, Huaguo Zhang, Songmao Du, and Lin Gao. 2023. "A Tensor-Based Approach to Blind Despreading of Long-Code Multiuser DSSS Signals" Electronics 12, no. 5: 1097. https://doi.org/10.3390/electronics12051097

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop