1. Introduction
Recently, ultra-low-end Internet of Things (IoT) applications have been gaining great attention in areas such as smart home automation, industrial process automation, remote manufacturing, unmanned aerial system, and intelligent transportation systems [1,2,3,4]. To satisfy the requirements of IoT, many low-power wide-area (LPWA) techniques working in licensed frequency bands were developed [5,6,7]. Among various LPWA standards, narrowband IoT (NB-IoT) is the most popular technique due to its ability to have massive connections as it is inherited from long-term evolution (LTE). Thus, one of the key challenging concerns of NB-IoT is the low cost of implementation, deployment, and maintenance because they can be cheap, widely dispersed, and even disposable [8,9]. Moreover, similar to LTE, every device must be synchronized with an enhanced base station (eNodeB) to connect the network. Typically, user equipment (UE) needs to continuously obtain timing information and search for physical cell ID (PCID) at power-up [10,11,12]. The process of performing network synchronization and identifying any available eNodeB by a NB-IoT UE is termed as the initial cell search. To assist such a task, the UE needs to detect two specific signals broadcasted from the eNodeB: narrowband primary synchronization signal (NPSS) and narrowband secondary synchronization signal (NSSS).
In order to reliably maintain a connection between UE and serving eNodeB, the NB-IoT device has to perform a series of tasks of finding the symbol timing offset (STO) and estimating the carrier frequency offset (CFO) in a pre-discrete Fourier transform (DFT) stage. To perform these tasks, autocorrelation and cross-correlation have been proved to be an efficient solution [11,12,13]. Once time and frequency uncertainties have been resolved by exploiting the NPSS, a cyclic prefix (CP) can be removed, and the NB-IoT UE performs a DFT to convert the CP-removed signal to the frequency domain. In a post-DFT step, the NB-IoT device attempts to detect the PCID and radio frame number (RFN) by observing multiple NSSS preambles. If the NB-IoT device fails to identify the NSSS, it has to fully scan the available frequency band, significantly increasing power consumption [11].
Most NB-IoT UEs are usually implemented with less expensive crystal oscillators resulting in CFO of as much as 20 ppm [12]. Therefore, there exist non-negligible time and frequency offsets between the NB-IoT UE and the network, and such uncertainties may cause difficulty in establishing an initial connection. Despite the large uncertainties, an NB-IoT UE needs to be able to a perform reliable cell search at a very low signal-to-noise ratio (SNR). Recently, a significant number of detection methods have been developed to identify the NSSS [12,13,14,15,16,17,18,19,20]. An exhaustive maximum likelihood (ML) method proposed in [12] attains optimal detection performance at the expense of the computational burden. By exploiting the property that the complementary Walsh sequences composing the NSSS are binary-modulated, several simplifications have been suggested in [13,14,15]. However, the simplified methods no longer take advantage of NSSS properties in spite of decreasing the computational burden. By using inherent features of an NSSS sequence, the authors of [16,17,18] proposed suboptimal alternatives to significantly reduce the complexity without relying on a priori knowledge of the channel. Since such non-coherent methods are originally developed assuming flat-fading conditions, the detection performance is severely degraded in the presence of the frequency selectivity. A differential correlation strategy can be used to remove the effects of the channel fading [19]. However, the differential detection approach developed in the LTE system is not directly applied to the NB-IoT system due to the loss of the autocorrelation property of the NSSS. In [20], a DFT-based coherent NSSS detector has been developed, which is based on algorithms for fast computations of DFTs to perform the cross-correlation, thereby reducing the complexity of the NSSS detector. However, when considering other computational complexities together to estimate the channel, the DFT-based detection method is too computationally expensive since NB-IoT needs to compare 4032 potential NSSS candidates. Therefore, the NB-IoT device has to provide a complexity-effective and robust NSSS detection method that guarantees battery lifetimes greater than 10 years for low data-rate IoT applications.
This paper proposes an effective coherent joint PCID and RFN detection scheme in the cellular NB-IoT system. The basic idea is to decouple the joint search space of the NSSS detection into a small number of hypotheses, which contributes to reducing the processing burden. To do so, the symmetric conjugate property of the NSSS sequence is explored. To validate the effectiveness of the proposed NSSS detection method, the probability of erroneous detection (PED) is analytically computed. The numerical analysis is verified by simulation results and proven to be very accurate. Simulations demonstrate that the proposed coherent detection method obtains the PCID and RFN with reduced computational complexity while achieving almost a similar performance to the existing coherent detection method. If an average estimation is adopted to improve detection performance of NB-IoT UEs in a poor coverage area, the proposed coherent detector requires only half the complexity of the conventional coherent detector to maintain a target error rate at the cost of a slight increase in the processing delay.
The remaining part of this paper is structured as follows. The related work in NSSS detection is reviewed in Section 2. Section 3 presents the signal model and synchronization signal in the cellular NB-IoT system. In Section 4, we propose an improved coherent NSSS detection method and the PED of the proposed detection method is numerically derived. Section 5 presents the comprehensive simulation result to assess the usefulness of the proposed NSSS detection method. The paper is concluded in Section 6.
Notations: The operators and are used to represent the expected value and rounding-down operation of the enclosed variable, respectively. The superscripts , , and represent the complex conjugation, real part, and imaginary part of a complex variable X, respectively. The magnitude and argument of a complex number X are denoted by and , respectively, leading to . The notation means that G is the real-valued normal distribution with mean and variance . Finally, is the hyperbolic cosine function, is the Q-function, is the zeroth-order modified Bessel function of the first kind, and is the modulus operation that returns the integer remainder of . Table 1 summarizes the variables used in the paper.
2. Related Works
The NSSS detection method can be categorized into two major groups: non-coherent approach and coherent approach. The former has been considered as an effective approach to detect the NSSS without resorting to the channel information in flat-fading condition [12,13,14,15,16,17,18]. Full-search-based ML strategy developed in [12] gives an optimal solution at the cost of implementation burden because all the possible realizations of Zadoff–Chu (ZC) and Hadamard–Walsh sequences have to be compared to the received NSSS observation. In particular, the NB-IoT receiver needs to hypothesize 4032 possible candidates of the NSSS sequence to simultaneously detect both PCID and RFN, which enforces high computational complexity in the initial cell search procedure. To tackle this challenge, reduced-complexity solutions have been proposed exploiting the feature that some components of NSSS sequences can be implemented without multiplication operation [13,14,15]. By using inherent properties of the NSSS sequence, these methods give suboptimal solutions with a remarkable reduction in computational burden when compared to an optimal full-search-based ML method. Based on the property that complementary Walsh sequences are binary-modulated and ZC sequences are repeated in the frequency domain, the works in [13,14] significantly save the computational burden in the NSSS detection. To decouple the joint detection task of the PCID and RFN, a sequential detection method without fully performing hypothesis testing on NSSS candidates was proposed in [15]. Despite reducing their complexity, such cross-correlation-based approaches no longer take advantage of NSSS properties to perform the NSSS detection, inevitably leading to considerable performance degradation. In spite of the investigation in [13,14,15], such suboptimal detectors would still become impractical since their structural complexity is proportional to the number of hypothesis testing. Authors in [16,17,18] developed near-ML but low complexity NSSS detection methods. In [16], a near-ML method was presented using autocorrelation of the NSSS instead of cross-correlation. This approach is based on the symmetric property of the ZC sequence, which leads to a reduced-complexity NSSS detector. In [17], the NSSS detection is performed by detecting the ZC and Hadamard–Walsh sequences in two steps, which contributes to decreasing the arithmetic operation. However, such an advantage is obtained at the price of a slight degradation in detection accuracy. Another simplification was proposed in [18], which is based on an NSSS subcarrier grouping algorithm to detect the NSSS with reduced computational burden. Compared to ML detection, this alternative solution greatly reduces the computational complexity without sacrificing detection capability at the expense of slightly increased processing latency. Since such non-coherent methods in [16,17,18] are originally developed to achieve near-ML performance in a flat-fading condition, they do not overcome the effect of the frequency-selective fading of the channel despite reducing the computational complexity. To cope with the effect of the channel fading distortion, a differential correlation-based non-coherent approach and channel-estimation-based coherent approach can be used [19,20]. The authors of [19] proposed a differential correlation-based joint detection of synchronization signals in the LTE system, and suboptimal performance is achieved with reduced complexity in a decoupled manner. Unfortunately, this detection method is not directly applicable to the NB-IoT system due to poor autocorrelation characteristics of the NSSS sequence. In [20], a DFT-based NSSS detection approach was proposed for both situations where the channel is unknown and has to be estimated. In the case of the flat-fading channel, this method can be designed using DFT operations with a comparable complexity to the approach in [14]. On the other hand, applying this coherent detection approach to combat frequency-selective fading requires a significant increase in the complexity of channel estimation, as this task has to be performed for 4032 possible hypotheses. Accordingly, NSSS detection plays a key role in the initial synchronization procedure of NB-IoT because the NSSS is associated with both PCID and RFN.
3. System Description
3.1. Signal Model
For an orthogonal frequency division multiplexing (OFDM) system using N equi-spaced subcarriers, a complex data symbol inserted on the k-th subcarrier of the l-th symbol is represented by . An OFDM symbol is generated by performing N-point inverse DFT (IDFT) to produce N complex time-domain samples. To maintain inter-symbol orthogonality and remove inter-carrier interference (ICI), a CP is appended to each symbol before transmitting duration sec such that an effective OFDM symbol of duration is created, where denotes the sampling time period at the transmitter, is the length of CP, and is the minimum subcarrier spacing. Therefore, the time-domain sample of the OFDM symbol during the l-th symbol period is given as
(1)
The transmitted signal is subject to multipath fading and additive noise pollution introduced by the channel. After passing through a multipath fading channel, the radio frequency signal with central carrier frequency is down-converted to an OFDM baseband with an oscillator frequency . Then, the time-domain sampled signal at a rate of can be obtained as
(2)
where , , denotes the discrete-time impulse response of the channel with L resolvable multipaths, denotes the relative delay of the p-th path, denotes the zero-mean additive white Gaussian noise (AWGN) with variance , is the normalized CFO, and denotes the initial STO. Since any fractional STO is incorporated into , can be treated to be integer-valued.Based on the received signal , the NB-IoT device tries to find a coarse STO estimate and CFO estimate , which have to be removed from in the time domain [13,14]. Even after these initial ambiguities have been removed, residual CFO and residual STO possibly remain. Based on the estimates in the pre-DFT step, the CP is extracted from the received signal, and a DFT process is performed. Afterward, the DFT output at the k-th subcarrier of the l-th symbol can be written as [21,22]
(3)
where , denotes the channel frequency response with variance , denotes the ICI component with variance , and denotes an identically distributed circularly symmetric complex Gaussian random process with variance . For practical values of , is negligible compared to the noise power, and thus, the ICI component can be neglected during the post-DFT step [21].3.2. Synchronization Signal
In the NB-IoT downlink, each frame is 10 ms in length in the time domain and consists of 10 subframes. A subframe is divided into 2 slots each, including 7 OFDM symbols. There are two kinds of dedicated signals such as narrowband reference signals (NRS) and synchronization signals in NB-IoT. The NRS is dedicated to channel estimation, whereas the synchronization signals that include the NPSS and the NSSS are mainly used to perform an initial cell search. For this purpose, the NPSS is periodically transmitted in subframe 5 in every 10 ms frame, whereas the NSSS is transmitted in subframe 9 in frames with 20 ms periodicity. After the power is turned on, the NB-IoT UE performs the time and frequency estimation procedure by synchronizing to NPSS. Since the NPSS is common in every subframe for all eNodeBs, the NB-IoT UE needs to search for only one NPSS sequence. On the other hand, the NSSS is dedicated to performing full downlink synchronization by detecting the PCID and acquiring the timing information within an 80 ms block.
Both NPSS and NSSS sequences are generated from the frequency-domain ZC sequences [23]. The NPSS is formulated to be robust to the presence of a large CFO and is derived from length-11 ZC sequence of root index 5, thus taking the form
(4)
where is the binary cover code. In every fifth subframe, is located in the last 11 consecutive OFDM symbols, each of which consists of 12 subcarriers. Each of 11 OFDM symbols in an NPSS subframe carries a copy of the base sequence based on . Therefore, NB-IoT supports 504 unique PCIDs indicated by NSSS, which can be transmitted in every even-numbered frame. The NSSS is derived by element-wise multiplication between a ZC sequence and a Hadamard–Walsh sequence. Specifically, the NSSS is scrambled with a frame-dependent sequence code and takes the form(5)
where denotes the length of the NSSS sequence, , denotes the PCID, , , , is decided by the RFN , and is based on length-128 Hadamard–Walsh sequences with the first four components cyclically suffixed to form a length-132 sequence [7].To simplify the notation, is grouped into 11 equally-sized successive blocks, which are sequentially allocated to 11 OFDM symbols. Accordingly, the transmission bandwidth of the NPSS and NSSS is only one resource block (RB) consisting of 12 subcarriers. Based on this notation, the l-th symbol at the k-th subcarrier is symbolized as for and . Mapping from to is performed in increasing order of first the index k and then the index l. Let , and be sequences generated from , and , respectively. For the purpose of brevity, let the NSSS be composed of three concatenated sequences so that
(6)
where , , and .4. Proposed Joint Detection Scheme
In this section, a complexity-efficient NSSS detector in the NB-IoT communication system is presented. For this aim, the joint detection task of the PCID and RFN is decoupled in a sequential manner. Based on the sequential detection strategy, a low-complexity NSSS detector is designed, and the detection performance of the proposed scheme is evaluated in terms of the PED.
4.1. Detection Algorithm
To focus on the NSSS detection, suppose the channel is constant during one subframe, which is suitable for the situation where the NB-IoT device moves at low speed. Within one subframe, the estimated channel at the k-th subcarrier can be given as
(7)
where , denotes the full set of the NSSS subcarrier index, denotes the hypothesized number for deciding the RFN in which the NSSS is transmitted, denotes the hypothesized number for n, is the hypothesized number for u, denotes the hypothesized number for w, and denotes the number of OFDM blocks in a radio frame. The average estimate over one subframe can improve estimation accuracy by mitigating the effect of noise on the estimated channel.Once the channel fading has been compensated using (7), we obtain the objective function given by
(8)
where . Due to the use of the estimated channel, the proposed NSSS detection method falls into the category of a coherent approach. For convenience, we hereafter omit the notation in and , assuming perfect channel knowledge. When hypothesized numbers exactly match corresponding actual numbers, i.e., , substituting (3) into (8) gives(9)
In this case, when , (7) takes the form
(10)
which is further derived as(11)
where for sufficiently small values of . It is worthy of mentioning that the phase rotation due to and is incorporated into the estimated channel (11), and can thus be compensated from (9).Since the choice of d and produces ZC sequences, which are complex-conjugates of each other so that , the real part of (8) is in the form
(12)
where is defined as(13)
and . It should be noted from (12) that the uncertainty related with two ZC root indices d and is only the sign in the second component of the right-hand side (RHS). Thus, the objective functions for d and can be derived from combinations of identical observation. Using this property, the objective function with reduced search space is formulated as(14)
where denotes the hypothesized number for and the quantity that is a function of ZC root index d is eliminated by taking the absolute value of the second term of the RHS in (12).We focus on the case where in all subsequent derivations. However, the effect of channel estimation error on the system performance will be evaluated in the simulations. By substituting to (14), takes the expression
(15)
with(16)
where and notation stands for the corresponding term-wise pair. Under hypothesis that the NSSS signal is correctly detected, i.e., , it follows that . Based on this observation, is given by(17)
Under hypothesis that , it follows that are random sequences since is treated as a random complex number in a downlink shared channel or a downlink control channel. Therefore, a central limit theorem invokes that in (15) is zero-mean Gaussian distributed. Similarly, this distribution also applies to the quantity . Hence, is treated as a folded normal random variable under hypothesis .
The proposed NSSS detector comprises two steps. Specifically, a joint detection of the PCID and RFN can be decoupled into two sequential detection tasks for each parameter. In the first step, the estimates of are obtained by finding a global maximum of over
(18)
A close look at (18) indicates that the search space of can be reduced by half since , which allows a decrease in the computational burden of the proposed NSSS detection scheme. In this step, the estimate of the RFN can be obtained from combining and , and it is tentatively decided that the NSSS with ZC root index or was transmitted from the eNodeB. Based on the estimates , the NB-IoT UE attempts to determine which NSSS was actually transmitted during the second step. To end this, the NB-IoT UE performs the task given by
(19)
where is the possible candidate for w that is tentatively selected from the first step. Due to only two hypothesized numbers of w, (19) is equivalently formulated by(20)
Using (12), the decision statistic can be rewritten as
(21)
which is based on the second term of the RHS in (12). Then, the decision rule of (20) is equivalently represented as(22)
which does not involve additional complexity since it has been already computed in (14) and it can be performed only by checking the sign of . Based on this observation, w is estimated by or according to the decision rule (22). As a result, the estimate of v can be given by after obtaining and from (18) and (22), respectively.4.2. Detection Performance
We derive the PED as a performance measure assuming a flat-fading channel. Under hypothesis , conditioned on , it can be effortlessly seen that the decision variable with and . Thus, it is observed that has a folded normal probability density function (PDF) denoted as
(23)
where and . For , we can safely say that with and . Denote the PDF of under hypothesis as . On the other hand, with in the case of hypothesis . Accordingly, under hypothesis obeys a skew normal distribution with PDF and cumulative distribution function written, respectively, as [24](24)
and(25)
In the first stage, we write the PED of (18) as . Using a folded normal and a skew normal distributions under hypothesis and hypothesis , respectively, conditioned on is obtained as
(26)
with(27)
and(28)
where denotes the SNR. The detail of the derivation of (26) is provided in Appendix A.In the second step, denote the PED of (19) by . Similarly, under hypothesis , while under hypothesis . Thus, is given in an identical form to (A2) with 4030 replaced by 1, which has a closed-form solution
(29)
To obtain unconditional probability expression, one averages over the distribution of expressed as , leading to . As a consequence, the proposed method erroneously detects the NSSS with a probability of .
5. Simulation Results and Discussions
This section provides analysis and simulation results to demonstrate the performance of the coherent NSSS detection algorithm in the NB-IoT system. Matlab software was used as a simulation platform to verify the proposed algorithm.
5.1. Simulation Environment
Let us consider the NB-IoT system with a system bandwidth of 180 kHz and 15 kHz minimum subcarrier spacing at the 900 MHz band. In the following, the DFT size is equal to , and the CP size is equal to . The 128-point DFT includes 12 NSSS subcarriers and 58 guard-band subcarriers. The sampling time period is s, and the length of the NSSS sequence is . Table 2 shows the system parameters used in the simulation. Based on the simulation parameters, the processing frequency is 1.92 MHz, and a 128-point DFT transforms the time-domain signals into frequency-domain signals [25]. For simulation, we consider two representative channels such as Pedestrian and Vehicular models to verify the capability of the presented NSSS detectors [26]. Since most of the NB-IoT terminals move slowly, we assume that a maximum Doppler frequency is equal to 1 Hz for the Pedestrian channel model [14,25]. On the other hand, the Doppler frequency of 55 Hz is considered in the Vehicular channel, which corresponds to a maximum mobile speed of 60 km/h [27]. For multipath channels, the magnitude of each tap is Rayleigh distributed and the Doppler power spectrum for each tap is characterized by a classical Jakes model. Table 3 shows the channel profile used for simulation. As for residual CFO and STO, we set , and is uniformly generated from . Simulations have been conducted over radio frames for independent channel realizations.
5.2. Benchmark Method
For comparison, we introduce three conventional NSSS detectors. The first one is a low-complexity PCID and RFN detection (LPRD) scheme developed in [14], which is based on the non-coherent objective function
(30)
In the LRPD method, are detected by maximizing over hypothesized numbers , and this method has been proposed assuming a frequency-flat fading channel. Under hypothesis , follows a Rician distribution with mean and variance , while follows a Rayleigh distribution with variance in the case of hypothesis . Identically, the PED of the LPRD method can be obtained as
(31)
The second benchmark benchmark is a sequential PCID and RFN detection (SPRD) scheme, which decouples the detection of and [17]. Based on the observation that for and , the PCID and RFN are detected by searching for maximum of two objective functions, respectively
(32)
and(33)
where and denote the possible combinations of and , respectively [17]. Consequently, are estimated by maximizing subject to , while and are obtained by finding the maximum argument of and , respectively, leading to . The last benchmark is a DFT-based PCID and RFN detection (DPRD) scheme proposed in [20]. Denoting the channel coefficient as , the estimate of is obtained by(34)
Based on the estimated channel (34) and the objective function (8) with replaced by , the DPRD method obtains the estimates of the PCID and RFN by maximizing over . Assuming a perfectly known channel, it follows that under hypothesis and under hypothesis . In this case, the PED of the DPRD method can be expressed as
(35)
5.3. Complexity Evaluation
In order to have a fair comparison with benchmark systems, it is assumed that produces 16 combined complementary sequences, which only have values of or [14], and thus, any extra complexity is not required because these sequences are processed only by sign inversions. Moreover, suppose one complex multiplication (CM) is equivalent to six real multiplications (RMs) [28].
We first compute the arithmetic complexity of the LPRD method. Let us denote as the number of average estimates. Since is conjugate symmetric with respect to the origin, requires CMs and the number of hypotheses requiring CM operation is 252. Applying -times average estimation, the LPRD method obtains the PCID and RFN with CMs. Next, we compute the number of CMs used in the SPRD method. Since the SPRD method does not involve any CM for the NSSS subcarriers that meet the formulation , and are processed with and CMs for each hypothesis, respectively. Applying all hypotheses and -times average estimation, CMs are required to sequentially complete the SPRD. As mentioned earlier, the DPRD method is based on both the observations (8) and (34). For each hypothesis, (34) requires CMs for computing the quantity and CMs for implementing the argument operation , while RMs are used for (8) since some quantities have been already evaluated in (34). The number of hypotheses requiring CM operation is 252 for computing the quantity , 4032 for implementing , and 4032 for (8). This leads to a total complexity of CMs, which corresponds to the complexity of the DRPD method that can combat frequency-selective fading. As reported in [20], the DPRD approach can be processed utilizing DFT operations with almost equal complexity as the LPRD approach if the channel is considered to be frequency-flat.
Finally, we assess the computational load of the proposed method. For each hypothesis, (7) and (14) require CMs and RMs, respectively. Similar to the DPRD, (7) has to be hypothesized for 252 combinations, while (14) is hypothesized for only 2016 possible candidates. Considering all hypotheses associated with (18), CMs and RMs are required in the first stage. Recalling from (22) that (19) can be implemented without any CM in the second stage, the overall number of CMs is equal to .
5.4. Performance Evaluation
In Figure 1, the PED of the benchmark and proposed NSSS detection schemes is plotted as a function of SNR in the AWGN and flat-fading channel models. To focus on evaluating the analysis derived in Section 4.2, it is assumed that and the channel is perfectly estimated. The first observation from this figure is that analytical results completely agree with simulation results for both AWGN and flat-fading channels. As expected, an average over multiple NSSS observations can be used to reduce noise impact on the final estimate. It can be clearly seen that the DPRD method outperforms the LPRD method regardless of the channel model and , while the PED of the proposed detector is slightly better than that of the DPRD method. In the case of the coherent approaches such as the DPRD and proposed methods, it is observed that the performance gain due to the average estimate is more significant compared to the LPRD method. However, imperfect channel estimation degrades the detection performance of the coherent methods, which will be discussed below.
In Figure 2, the PED of the benchmark and proposed NSSS detection algorithms is plotted versus SNR in the PedA and PedB channel models. For the average estimate, we set in the following. From the observations in Figure 2, the channel estimation error mainly degrades the detection performance for the coherent detection approaches if ignoring the AWGN. If the channel is perfectly known, the performance of coherent detection methods is better than that of non-coherent LPRD and SPRD methods regardless of the channel models. However, using the estimated channel degrades the detection ability of the coherent detection schemes due to the channel estimation error in the PedA channel. Therefore, accurate channel estimation is essential for the DPRD and proposed methods to robustly detect the NSSS. Both coherent approaches differ in the method of estimating the channel, as described in (7) and (34), which leads to a performance difference. As predicted, the PED of non-coherent methods is not affected by the knowledge of the channel. In the PedB channel, an irreducible error floor can be observed for non-coherent approaches as the SNR increases, which is eventually the dominant performance degrading factor for the LPRD and SPRD methods. This phenomenon is mainly explained by the fact that the LPRD and SPRD schemes do not combat the frequency-selective fading because they are originally developed assuming flat-fading conditions. Since a maximum delay spread of s in the PedA channel is less than the sampling time interval of s, it can be considered to be a flat-fading channel.
Figure 3 displays the PED of the benchmark and proposed NSSS detection methods versus SNR in the VehA and VehB channel models. We adopt the same simulation setting as in Figure 2, except for a sufficiently larger delay spread with respect to the pedestrian channel. It is seen from Figure 3 that the proposed method outperforms the LPRD method with the increase in SNR, while it shows similar behavior to the DPRD method. When compared to the PED in the PedA channel, the coherent detection methods have improved performance regardless of the channel models. On the contrary, non-coherent detection methods exhibit irreducible error floor due to increased frequency selectivity of the channel. These observations show the robustness of the proposed detection method under various channel fading conditions. Such a gain is a consequence of the multipath diversity that becomes more outstanding in the vehicular channel due to a larger delay spread in comparison with the pedestrian channel. Conversely, the effect of the multipath diversity is diminished in the case of the VehB channel, even though the VehB channel experiences more frequency-selective fading than the VehA channel. This is basically due to the fact that the maximum delay spread of s in the VehB channel exceeds the CP duration of s, thus incurring both the inter-symbol interference and ICI.
Figure 4 shows the PED performance of the NSSS detectors when dB and dB. To quantify the performance gap between the detection methods, denote the number of averaged radio frames required to achieve a target error probability of 10% as . In the case of the VehA channel, is for the LPRD, DPRD, and proposed methods when NB-IoT UEs are in a poor coverage condition of dB. However, the performance gap between the LPRD and proposed approaches becomes larger as increases, with the latter showing a better performance when compared to the former. In light of the same value of , the complexity of the proposed scheme is reduced by 57.7% and increases 2.5 times compared to that of the DPRD and LPRD methods, respectively. Generally, power consumption is proportional to the number of floating point operations (flops) used to design the NSSS detectors [29]. Therefore, it can be expected that a reduced number of flops of the proposed NSSS detector enhances the power consumption efficiency if other system parameters determining power consumption are the same. As discussed earlier, the non-coherent detection method outperforms the coherent detection method in the PedA channel so that for the LPRD, for the SPRD, and for the proposed method. More interestingly, the average effect is marginal in the PedA channel regardless of detection approaches, which is caused by the flat fading condition, while the average effect becomes larger in the frequency-selective channel, similar to the VehA channel. By applying the proposed detection strategy to the NB-IoT system, the arithmetic complexity of the initial synchronization receiver can be decreased, and it substantially reduces power consumption, ultimately extending the battery life of NB-IoT UEs.
6. Conclusions
In this study, we have proposed a low-complexity coherent NSSS detection scheme in the cellular NB-IoT system. To alleviate the computational load associated with the conventional coherent detection method, the search space of NSSS hypothesis testing is reduced by decoupling the detection of the PCID and RFN. Simulation results were provided not only to show the correctness of numerical analysis but also to validate the improved performance of the proposed coherent NSSS detection scheme. It has been shown that the theoretical and simulation results are in excellent agreement. Moreover, we have compared the proposed NSSS detection method with the conventional NSSS detection methods in terms of the computational complexity and detection performance. From simulation results, it has been verified that the proposed solution not only attains nearly the same performance as the existing NSSS detection method but also significantly reduces the computational complexity. To achieve a target error rate of 10% in the Pedestrian channel model, it has been shown that the number of CMs of the proposed method is reduced by more than 50% in a poor coverage area compared to the DPRD method. Furthermore, it has been summarized that the presented NSSS detection methods use fewer radio frames to attain a target detection rate and the effect of the average estimate becomes more pronounced in the vehicular channel model.
Conceptualization, Y.-H.Y. and Y.-A.J.; methodology, Y.-H.Y. and Y.-A.J.; software, Y.-A.J.; writing—original draft preparation, Y.-H.Y. and Y.-A.J.; writing—review and editing, Y.-H.Y., Y.-A.J., S.-H.L. and I.H.; visualization, Y.-H.Y., Y.-A.J. and I.H.; supervision, Y.-H.Y. All authors have read and agreed to the published version of the manuscript.
Not applicable.
Not applicable.
Not applicable.
The authors declare no conflict of interest.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Figure 1. PED of the NSSS detectors in the AWGN and flat-fading channels: (a) [Forumla omitted. See PDF.] (b) [Forumla omitted. See PDF.].
Figure 2. Performance comparison of the benchmark and proposed methods in the pedestrian channel models: (a) perfect channel (b) estimated channel.
Figure 3. Performance comparison of the benchmark and proposed methods versus SNR in the vehicular channel models: (a) perfect channel (b) estimated channel.
Figure 4. Performance comparison of the benchmark and proposed methods versus [Forumla omitted. See PDF.]: (a) [Forumla omitted. See PDF.] dB (b) [Forumla omitted. See PDF.] dB.
Main variables used in this paper.
Notation | Description |
---|---|
|
Complex conjugation of a complex number x |
|
Magnitude of a complex number x |
|
Argument of a complex number x |
|
Real part of a complex variable x |
|
Imaginary part of a complex variable x |
|
Rounding-down operation of variable x |
|
Expected value of variable x |
|
Estimate of variable x |
|
Modulus operation which returns the integer remainder of |
|
(CFO, residual CFO) |
|
(STO, residual STO) |
|
(PCID, RFN) |
m | Index for deciding the RFN in which the NSSS is transmitted |
n | Cell specific parameter given by |
u | Cyclic shift given by |
w | Root sequence given by |
|
Hypothesized number for |
|
Hadamard–Walsh sequence derived from |
|
Sequence derived from |
|
Zadoff–Chu sequence derived from |
|
NSSS sequence derived from |
|
Set of NSSS subcarrier index |
Simulation parameters.
Parameters | Values |
---|---|
Carrier frequency | 900 MHz |
Transmission bandwidth | 180 kHz |
DFT size |
|
Number of CP samples |
|
Number of samples in one OFDM symbol |
|
Sampling time period | |
Subcarrier spacing | |
Length of NSSS sequence |
|
Channel models.
Channel Model | Maximum Delay Spread |
---|---|
Pedestrian A (PedA) | |
Pedestrian B (PedB) | |
Vehicular A (VehA) | |
Vehicular B (VehB) |
Appendix A. Derivation of PED
The conditional PED on
After substituting (
To obtain a closed-form expression of (
We can effortlessly find from [
From (
References
1. 3GPP, TR 45.820, V13.1.0, Cellular System Support for Ultra-Low Complexity and Low Throughput Internet of Things (CIoT). 2015; Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2719 (accessed on 18 August 2022).
2. Dangana, M.; Ansari, S.; Abbasi, Q.H.; Hussain, S.; Imran, M.A. Suitability of NB-IoT for indoor industrial environment: A survey and insights. Sensors; 2021; 21, 5284. [DOI: https://dx.doi.org/10.3390/s21165284] [PubMed: https://www.ncbi.nlm.nih.gov/pubmed/34450725]
3. Haider, S.K.; Nauman, A.; Jamshed, M.A.; Jiang, A.; Batool, S.; Kim, S.W. Internet of drones: Routing algorithms, techniques and challenges. Mathematics; 2022; 10, 1488. [DOI: https://dx.doi.org/10.3390/math10091488]
4. Chen, X.; Zhao, T.; Sun, Q.; Hu, Q.; Xu, M. Cell-free massive MIMO with energy-efficient downlink operation in industrial IoT. Mathematics; 2022; 10, 1687. [DOI: https://dx.doi.org/10.3390/math10101687]
5. 3GPP, TR 36.888, Study on Provision of Low-Cost Machine-Type Communications (MTC) User Equipments (UEs) Based on LTE. 2013; Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2578 (accessed on 18 August 2022).
6. Almuhaya, M.A.M.; Jabbar, W.A.; Sulaiman, N.; Abdulmalek, S. A Survey on LoRaWAN technology: Recent trends, opportunities, simulation tools and future directions. Electronics; 2022; 11, 164. [DOI: https://dx.doi.org/10.3390/electronics11010164]
7. 3GPP, 3GPP TS 36.211, Physical Channels and Modulation (Release 14); Tech. Rep. 2017; Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2425 (accessed on 18 August 2022).
8. Lujan, E.; Zuloaga Mellino, J.A.; Otero, A.D.; Vega, L.R.; Galarza, C.G.; Mocskos, E.E. Extreme coverage in 5G narrowband IoT: A LUT-based strategy to optimize shared channels. IEEE Internet Things J.; 2020; 7, pp. 2129-2136. [DOI: https://dx.doi.org/10.1109/JIOT.2019.2959552]
9. Aghazadeh Ayoubi, R.; Spagnolini, U. Performance of dense wireless networks in 5G and beyond using stochastic geometry. Mathematics; 2022; 10, 1156. [DOI: https://dx.doi.org/10.3390/math10071156]
10. Chang, K.; Lee, S. Robust OFDM-based synchronization against very high fractional CFO and time-varying fading. IEEE Syst. J.; 2020; 14, pp. 4047-4058. [DOI: https://dx.doi.org/10.1109/JSYST.2020.2964816]
11. Yang, W.; Hua, M.; Zhang, J.; Xia, T.; Zou, J.; Jiang, C.; Wang, M. Enhanced system acquisition for NB-IoT. IEEE Access; 2017; 5, pp. 13179-13191. [DOI: https://dx.doi.org/10.1109/ACCESS.2017.2724601]
12. Intel Corporation. Synchronization and Cell Search in NB-IoT: Performance Evaluation; 3GPP TSG RAN WG1, Tech. Rep. R1-161898 Intel Corporation: Santa Clara, CA, USA, 2016.
13. Ali, A.; Hamouda, W. On the cell search and initial synchronization for NB-IoT LTE systems. IEEE Commun. Lett.; 2017; 21, pp. 1843-1846. [DOI: https://dx.doi.org/10.1109/LCOMM.2017.2700864]
14. Li, Y.; Chen, S.; Ye, W.; Lin, F. A joint low-power cell search and frequency tracking scheme in NB-IoT systems for green Internet of Things. Sensors; 2018; 18, 3274. [DOI: https://dx.doi.org/10.3390/s18103274]
15. You, Y.H. Reduced complexity detection of narrowband secondary synchronization signal for NB-IoT communication systems. Symmetry; 2020; 8, 1342. [DOI: https://dx.doi.org/10.3390/sym12081342]
16. Savaux, V.; Kanj, M. Low-complexity sub-optimal cell ID estimation in NB-IoT system. IET Commun.; 2020; 14, pp. 3699-3706. [DOI: https://dx.doi.org/10.1049/iet-com.2019.0996]
17. You, Y.H.; Jung, Y.A.; Choi, S.C.; Hwang, I. Complexity effective sequential detection of synchronization signal for cellular narrowband IoT communication systems. IEEE Internet Things J.; 2021; 8, pp. 2900-2909. [DOI: https://dx.doi.org/10.1109/JIOT.2020.3021101]
18. You, Y.H.; Jung, Y.A.; Lee, S.H.; Song, H.G.; Song, H.K. Balanced-offset joint acquisition of physical cell identity and radio frame number for NB-IoT communication systems. IEEE Internet Things J.; 2022; 11, pp. 8669-8680. [DOI: https://dx.doi.org/10.1109/JIOT.2021.3119037]
19. Jung, Y.A.; Shin, D.; You, Y.H. A computationally efficient joint cell search and frequency synchronization scheme for LTE machine-type communications. Symmetry; 2019; 11, 1394. [DOI: https://dx.doi.org/10.3390/sym11111394]
20. Savaux, V. DFT-based low-complexity optimal cell ID estimation in NB-IoT. EURASIP J. Adv. Signal Process.; 2020; 2020, 14. [DOI: https://dx.doi.org/10.1186/s13634-020-00677-4]
21. Rotem, A.; Dabora, R. A novel low-complexity estimation of sampling and carrier frequency offsets in OFDM communications. IEEE Access; 2020; 8, pp. 194978-194991. [DOI: https://dx.doi.org/10.1109/ACCESS.2020.3032748]
22. You, Y.H.; Lee, S.; Lee, K. Effective time, frequency, and sidelink synchronization for cellular device-to-device communications. IEEE Syst. J.; 2021; 15, pp. 2938-2947. [DOI: https://dx.doi.org/10.1109/JSYST.2020.3003001]
23. Popovic, B.M. Generalized chirp-like polyphase sequences with optimum correlation properties. IEEE Trans. Inf. Theory; 1992; 30, pp. 769-777. [DOI: https://dx.doi.org/10.1109/18.144727]
24. Arellano-Vallea, R.B.; Genton, M.G. On fundamental skew distributions. J. Multivariate Anal.; 2005; 96, pp. 93-116. [DOI: https://dx.doi.org/10.1016/j.jmva.2004.10.002]
25. Jewel, M.K.H.; Zakariyya, R.S.; Lin, F. On channel estimation in LTE-based downlink narrowband Internet of Things systems. Electronics; 2021; 10, 1246. [DOI: https://dx.doi.org/10.3390/electronics10111246]
26. International Telecommunication Union. Guidelines for Evaluation of Radio Transmission Technologies for IMT-2000; ITU-R M. 1225-97 International Telecommunication Union: Geneva, Switzerland, 1997.
27. Holfeld, B.; Wieruch, D.; Wirth, T.; Thiele, L.; Ashraf, S.A.; Huschke, J.; Aktas, I.; Ansari, J. Wireless communication for factory automation: An opportunity for LTE and 5G systems. IEEE Commun. Mag.; 2016; 54, pp. 36-43. [DOI: https://dx.doi.org/10.1109/MCOM.2016.7497764]
28. Golub, G.H.; Loan, C.F.V. Matrix Computations; 4th ed. The Johns Hopkins University Press: Baltimore, MD, USA, 2013.
29. Xiao, Z.; Zhao, J.; Liu, T.; Geng, L.; Zhang, F.; Tong, J. On the energy efficiency of massive MIMO systems with low-resolution ADCs and lattice reduction aided detectors. Symmetry; 2020; 12, 406. [DOI: https://dx.doi.org/10.3390/sym12030406]
30. Bao, V.N.; Tuyen, L.P.; Tue, H.H. A survey on approximations of one-dimensional Gaussian Q-function. J. Electron. Commun.; 2015; 5, pp. 1-14. [DOI: https://dx.doi.org/10.21553/rev-jec.92]
31. Gradshteyn, I.S.; Ryzhik, I.M. Table of Integrals, Series, and Products; Academic Press: Cambridge, MA, USA, 2014.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
Narrowband Internet of Things (NB-IoT) is one of the low-power wide-area network technologies that aim to support enormous connection, deep coverage, low power consumption, and low cost. Therefore, low cost of implementation and maintenance is one of the key challenges of NB-IoT terminals. This paper presents a low-complexity formulation for narrowband secondary synchronization signal (NSSS) detection in the NB-IoT system, supported by a coherent algorithm that requires a priori knowledge of the channel. By exploiting a symmetric conjugate feature of the NSSS sequence, a joint physical cell ID and radio frame number detection method with low complexity is proposed for coherent detection. The probability of erroneous detection of the presented NSSS detection method is computed, and the analytical model is verified by means of simulation. Numerical experiments will demonstrate that the proposed detection scheme remarkably reduces the computational complexity with almost the same detection ability compared to the existing detection scheme.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details
1 Department of Computer Engineering and Convergence Engineering for Intelligent Drone, Sejong University, Seoul 05006, Korea
2 ICT Convergence Research Division, Intelligent Device Research Center, Gumi Electronics & Information Technology Research Institute (GERI), Gumi 39171, Korea
3 Department of Electronic Engineering, Chonnam National University, Yongbong-ro, Buk-gu, Gwangju 61186, Korea; Department of ICT Convergence System Engineering, Chonnam National University, Yongbong-ro, Buk-gu, Gwangju 61186, Korea