Iterative Joint Detection of Kalman Filter and Channel Decoder for Sensor-to-Controller Link in Wireless Networked Control Systems
Abstract
In this letter, we propose an iterative joint detection algorithm of Kalman filter (KF) and channel decoder for the sensor-to-controller link of wireless networked control systems, which utilizes the prior information of control system to improve control and communication performance. In this algorithm, we first use the KF to estimate the probability density of the control system outputs and calculate the prior probability of received signals to assist decoder. Then, the possible outputs of the control system are traversed to update the prior probability in order to implement iterative detection. The simulation results show that the prior information and the iterative structure can reduce the block error rate performance of communications while improving the root mean square error performance of controls.
Index Terms:
Iterative joint detection, Kalman filter, channel decoder, wireless networked control systems, LDPC codes.I Introduction
Wireless networked control systems (WNCSs) are control systems with the components, i.e., controllers, sensors and actuators, distributed and connected via wireless communication channels, where transmission error tightly relates to the control stability and performance [1, 2]. Kalman filter (KF) plays a fundamental role in estimating system states when transmission error occurs [3]. The major researches of KF model the wireless channels as independent and identically distributed (i.i.d.) Bernoulli processes [4, 5, 6] or Markov processes [7, 8, 9] to reduce the influence of transmission error on control performance.
From the view of communication, channel codes can effectively reduce transmission errors[10] and a simple on-off error control coding scheme can improve the control quality [11]. To ensure a wide range of application scenarios, channel codes are generally designed assuming that the transmitted bits obey uniform distribution and no prior information is considered. To improve the control and communication performance with the prior information of control system, [12] proposes a maximum a posteriori (MAP) receiver for each element of system states with cyclic redundancy check (CRC) codes, and exhibits potential in optimizing the block error rate (BLER) performance of communications and the root mean square error (RMSE) performance of controls with the prior information. However, the prior information directly calculated by the system states cannot be used in channel decoding.
To utilize the prior information for channel decoding, we propose an iterative joint detection algorithm in this letter, which exchanges the prior information of quantized bits and the decoding probabilities of outputs between KF and channel decoder. In the algorithm, we first use the KF to estimate the probability density of the predicted system states. Then, the probability density is transformed into the prior logarithmic likelihood ratios (LLRs) of quantized bits to assist decoder and obtain the decoded probabilities of outputs. Finally, the possible outputs are traversed to update the prior LLRs of quantized bits in order to implement iterative detection. The simulation results show that the prior information and the iterative structure can reduce the BLER performance of communications while improving the RMSE performance of controls, which shows the advantage of the joint design of controls and communications.
Notation Conventions: In this letter, the lowercase letters, e.g., , are used to denote scalars. The bold lowercase letters, e.g., , are used to denote vectors. Notation denotes the -th element of . The sets are denoted by calligraphic characters, e.g., , and the notation denotes the cardinality of . The bold capital letters, e.g., , are used to denote matrices. Throughout this paper, means an all-zero vector. represents the real number field. denotes the set .
II System Model
The considered system structure of WNCSs in this letter is shown in Fig. 1, which consists of control layer and communication layer.
II-A Control Layer

We consider a discrete linear time-invariant system as
(1) | ||||
(2) |
where , and are the state vector, the input vector and the output vector at time index , respectively. , and are the known system parameter matrices with appropriate dimensions. and are Gaussian noises with zero means and covariance matrices and , respectively.
Each element of is quantized by a -bit uniform quantizer with the quantization range . Defining as the midpoint of quantized interval , as the index of quantized interval with , and , and as the binary representation of with the most and the least significant bits and , the -length quantized vector and the -bit vector are and , respectively. is sent to the communication layer.
After the iterative joint detection, the estimation of is obtained and KF is used to estimate the system states and the covariance matrix in Algorithm 1 with the inputs , , and , where if the decoded bits pass CRC, and otherwise. Then, controller uses and the reference state vector to calculate the input vector as
(3) |
where is the controller gain matrix.
II-B Communication Layer
In the communication layer, the outer code is an CRC code, the inner code is an channel code and the code rate is . is encoded into the CRC code by and is encoded into the codeword by , where and are the generator matrices of the CRC code and the channel code, respectively. Each coded bit is modulated into the transmitted signal by binary phase shift keying (BPSK), i.e., . The received vector is , where is i.i.d. additive white Gaussian noise (AWGN) with zero mean and variance . After BPSK demodulator, is transformed into the received LLR vector with
(4) |
Then, we send to the iterative joint detection.
III Iterative Joint Detection
The structure of iterative joint detection is also provided in Fig. 1, which consists of KF and channel decoder. The prior LLR vector is sent from the KF to the channel decoder and the decoded LLR vector is sent oppositely, where
(5) | ||||
(6) |
The channel decoding algorithm, such as the belief propagation (BP) decoding of LDPC code [10], is abstracted as a function , where
(7) |
The proposed detection algorithm iteratively update by utilizing the prior information of to improve the control and communication performance, which is divided into the three steps as follows.
Step 1: Initializing . We first use the KF to predict the system states and the covariance matrix as
(8) |
Then, the predicted sensor output is and the corresponding covariance matrix is . Thus, obeys Gaussian distribution with mean and covariance matrix , i.e.,
(9) |

Since is transformed into and by quantizer, the probability of quantized bit , , , is
(10) |
where
(11) | |||
(12) |
where and is the -th element of the diagonal of . (11) can be easily obtained by (9). For (12), since is decided by quantizing directly, we have . An example of with is provided in Fig. 2. In Fig. 2, , , changes from to or from to every quantized interval.
Then, we use to represent the -th element in . There is a mapping between and , i.e.,
(13) |
Thus, can be calculated by (10) and the prior LLR of is
(14) |
Given , the -th row and the -th column element of and , we have and the prior LLR of is
(15) |
Step 2: Decoding . is calculated by (7), where is decided by (4) and is initialized by step 1 and updated by step 3. Then, the decoded LLR vector is obtained by , the estimation of is decided by and is recovered from . If is , the state vector and the input vector are calculated by Algorithm 1 and (3), respectively. If is , we use and KF to update in step 3 to implement iterative detection.
When continuous decoding errors occur, the estimated probability density of is away from the real value, which further deteriorates the control and communication performance. To avoid the error propagation, if the maximum iteration number is reached and is , a conventional channel decoding is used, since is related to the i.i.d. AWGN and received signals.
Step 3: Updating . We have the probability . Given the set of the midpoint , the probability of given is
(16) | ||||
Given , the estimated system states and the covariance matrix are
(17) |
The estimated sensor output is and the corresponding covariance matrix is . Thus, given obeys Gaussian distribution with mean and covariance matrix , i.e.,
(18) |
The probability of quantized bit is
(19) | ||||
where is set as by (16). The calculation processes of and are similar to (11) and (12), respectively. With (19), we calculate by (14) and update by (15) to implement iterative detection in step 2. To reduce the complexity, we traverse quantized bits with the least , , and use the results to decide with normalization and calculate (19).
The whole process of the proposed iterative joint detection algorithm is summarized in Algorithm 2. In Algorithm 2, we first initialize with (15) and calculate by (7). Then, channel decoding is used as . If is , we assume the decoded results are correct and estimate and by KF directly. If is , we use and to update in order to implement iterative detection until the maximum number of iteration is reached. When is reached and is , a conventional channel decoding is used to avoid error propagation.
IV Complexity and Time Step Analysis
The complexity of the proposed iterative joint detection is shown in TABLE I. The complexity of step 1 is , where the complexity of KF is and the complexity of calculating the probability of quantized bits is when lookup table is used for integrals. Given the decoding complexity , the complexity of step 2 is . For step 3, the complexity is . Hence, the complexity of the iterative joint detection is .
Though the iterative joint detection has high complexity, it can be implemented in parallel for real-time systems. The main time steps are shown in TABLE I. Assume and are the time steps of KF and decoding, respectively. For step 1, since the time step of calculating the probability of one quantized bit is and bits can be calculated in parallel, the time step of step 1 is . The time step of step 2 is . Then, since the time step of (16) is and the results can be calculated in parallel, the time step of step 3 is . Thus, the time step of the iterative joint detection is , which can satisfy the latency constraint of real-time systems with small .
Step | Complexity | Main Time Step |
1 | ||
2 | ||
3 | ||
Total | ||
V Simulation Results
For control layer, a rotary inverted pendulum with , is employed as the plant. The system parameter matrices , and , the controller gain matrix and the reference state vector are identical to those in [12]. and are diagonal matrices with the diagonal elements and , respectively. The sampling interval is ms, the simulation time is s and the number of simulation runs is . Once the pendulum falls, the simulation run is terminated. The performance of control layer is evaluated by the RMSE of the state vector against the ideal control case. For communication layer, 16-bit CRC code [13] and LDPC code [14] are used. The traversed bit number is 4. The iteration number of BP decoding is 50.
Fig. 3 provides the BLER performance of iterative joint detection with and different system disturbances. In Fig. 3, as and decrease, the calculated prior probability is more accurate to improve the BLER performance of the iterative joint detection and [12]. Then, the BLER performance of [14] is same under different system disturbances, since the prior probability is not used in the BP decoding. Specifically, the iterative joint detection with and has about dB and dB performance gain at BLER compared with [14] and [12], respectively. Hence, the prior information obtained from the system model can improve the BLER performance of communication layer.
Fig. 4 provides the RMSE performance of the iterative joint detection with and different system disturbances. In Fig. 4, we observe that the RMSE with different system disturbances is reduced and converged as the SNR increases. Then, the converged SNR of the iterative joint detection is less than those of [12] and [14]. Specifically, the performance gap between the iterative joint detection and [14] is about dB with and at RMSE . Thus, the iterative joint detection can enhance the BLER performance of communications while improving the RMSE performance of controls, which shows the advantage of the joint design of controls and communications with prior information.
Fig. 5 shows the BLER performance of the iterative joint detection with , and different . In Fig. 5, we observe that as increases, the BLER performance is improved and converged. The performance gap between and is about dB at BLER . Thus, updating the prior information can further improve the BLER performance of the iterative joint detection.



VI Conclusion
In this letter, an iterative joint detection algorithm of KF and channel decoder is proposed by utilizing the prior information of control system to improve the control and communication performance. In the algorithm, the prior information is initialized by KF and updated by traversing the possible outputs of control system in order to implement iterative detection. The simulation results show that the prior information and the iterative structure can improve the control and communication performance.
References
- [1] L. Zhang, H. Gao, and O. Kaynak, “Network-induced constraints in networked control systems—a survey,” IEEE Transactions on Industrial Informatics, vol. 9, no. 1, pp. 403–416, 2013.
- [2] P. Park, S. Coleri Ergen, C. Fischione, C. Lu, and K. H. Johansson, “Wireless network design for control systems: A survey,” IEEE Communications Surveys & Tutorials, vol. 20, no. 2, pp. 978–1013, 2018.
- [3] L. Schenato, B. Sinopoli, M. Franceschetti, K. Poolla, and S. S. Sastry, “Foundations of control and estimation over lossy networks,” Proceedings of the IEEE, vol. 95, no. 1, pp. 163–187, 2007.
- [4] B. Sinopoli, L. Schenato, M. Franceschetti, K. Poolla, M. Jordan, and S. Sastry, “Kalman filtering with intermittent observations,” in 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475), vol. 1, 2003, pp. 701–708 Vol.1.
- [5] X. Liu and A. Goldsmith, “Kalman filtering with partial observation losses,” in 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601), vol. 4, 2004, pp. 4180–4186 Vol.4.
- [6] L. Shi, M. Epstein, and R. M. Murray, “Kalman filtering over a packet-dropping network: A probabilistic perspective,” IEEE Transactions on Automatic Control, vol. 55, no. 3, pp. 594–604, 2010.
- [7] M. Huang and S. Dey, “Stability of kalman filtering with Markovian packet losses,” Automatica, vol. 43, no. 4, pp. 598–607, 2007.
- [8] Y. Mo and B. Sinopoli, “Kalman filtering with intermittent observations: Tail distribution and critical value,” IEEE Transactions on Automatic Control, vol. 57, no. 3, pp. 677–689, 2012.
- [9] D. E. Quevedo, A. Ahlen, and K. H. Johansson, “State estimation over sensor networks with correlated wireless fading channels,” IEEE Transactions on Automatic Control, vol. 58, no. 3, pp. 581–593, 2013.
- [10] S. Lin and D. J. Costello, Error Control Coding (2nd ed.). PrenticeHall, Inc., 2004.
- [11] S. Hattori, K. Kobayashi, H. Okada, and M. Katayama, “On-off error control coding scheme for minimizing tracking error in wireless feedback control systems,” IEEE Transactions on Industrial Informatics, vol. 11, no. 6, pp. 1411–1421, 2015.
- [12] K. Kobayashi, H. Okada, and M. Katayama, “A cross-layer optimized receiver design for wireless feedback control systems,” IEEE Transactions on Communications, vol. 66, no. 1, pp. 320–329, 2018.
- [13] 3 Generation Partnership Project (3GPP), “Multiplexing and channel coding,” Tech. Rep. 3GPP TS 38.212 V15.0.0, Sophia Antipolis Cedex, France, 2017.
- [14] D. MacKay, “Good error-correcting codes based on very sparse matrices,” IEEE Transactions on Information Theory, vol. 45, no. 2, pp. 399–431, 1999. http://www.inference.org.uk/mackay/CodesFiles.html.