This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Structured Massive Access for Scalable Cell-Free Massive MIMO Systems

Shuaifei Chen, , Jiayi Zhang, , Emil Björnson, , Jing Zhang, and Bo Ai S. Chen, J. Zhang and J. Zhang are with the School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China. (e-mail: jiayizhang@bjtu.edu.cn).E. Björnson is with the Department of Electrical Engineering (ISY), Linköping University, SE- 58183 Linköping, Sweden. (e-mail: emil.bjornson@liu.se).B. Ai is with State Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University, Beijing 100044, China. (e-mail: boai@bjtu.edu.cn).
Abstract

How to meet the demand for increasing number of users, higher data rates, and stringent quality-of-service (QoS) in the beyond fifth-generation (B5G) networks? Cell-free massive multiple-input multiple-output (MIMO) is considered as a promising solution, in which many wireless access points cooperate to jointly serve the users by exploiting coherent signal processing. However, there are still many unsolved practical issues in cell-free massive MIMO systems, whereof scalable massive access implementation is one of the most vital. In this paper, we propose a new framework for structured massive access in cell-free massive MIMO systems, which comprises one initial access algorithm, a partial large-scale fading decoding (P-LSFD) strategy, two pilot assignment schemes, and one fractional power control policy. New closed-form spectral efficiency (SE) expressions with maximum ratio (MR) combining are derived. The simulation results show that our proposed framework provides high SE when using local partial minimum mean-square error (LP-MMSE) and MR combining. Specifically, the proposed initial access algorithm and pilot assignment schemes outperform their corresponding benchmarks, P-LSFD achieves scalability with a negligible performance loss compared to the conventional optimal large-scale fading decoding (LSFD), and scalable fractional power control provides a controllable trade-off between user fairness and the average SE.

Index Terms:
Beyond 5G network, cell-free massive MIMO, massive access, AP selection, pilot assignment, user-centric network.

I Introduction

Cellular massive multiple-input multiple-output (MIMO) is recognized as a component of the fifth-generation (5G) networks [1, 2, 3, 4, 5]. Looking into the future, beyond 5G networks are expected to handle a significantly larger number of accessing users and deliver high data rates, while providing a more uniform quality-of-service (QoS) throughout the entire network [6]. These goals can be potentially be achieved by cell-free massive MIMO [7, 8, 9, 10], which inherits several virtues from cellular massive MIMO (in particularly favorable propagation) while being capable of reaching the beyond 5G requirements.

The basic idea of cell-free massive MIMO is to deploy a large number of access points (APs), which are arbitrarily distributed in the coverage area and connected to a central processing unit (CPU). Under the coordination and computational assistance from the CPU, the APs jointly serve all user equipments (UEs) on the same time-frequency resource by coherent joint transmission and reception [11, 12, 13]. Hence, cell-free massive MIMO can be viewed as a structured approach to massive access. Firstly, its macro-diversity can greatly improve the coverage probability compared to cellular technology [7, 8, 12]. Secondly, interference is managed by letting a user-centric subset of the APs serve each user [14, 15, 16]. These two features allow cell-free massive MIMO to accommodate more UEs than cellular networks, where inter-cell interference and pilot shortage are the limiting factors.

Channel state information (CSI) is essential in multiple antenna systems, both cellular and cell-free [17]. It is usually acquired through pilot transmission between the UEs and APs. The pilot resources are limited due to the natural channel variations in time and frequency domain, thus pilots must be reused between UEs in cell-free massive MIMO [7, 8, 9], leading to the so-called pilot contamination. This phenomenon both reduces the channel estimation quality, which makes coherent transmission less effective, and makes it harder to reject interference between pilot-sharing UEs [17]. To limit these negative effects, a proper pilot assignment is critical in cell-free massive MIMO networks, particularly in a massive access scenario when the number of UEs KK is roughly the same as the number of APs LL.

While the benefits of cell-free massive MIMO over cellular massive MIMO are well established, it will be very challenging to achieve a practically feasible implementation architecture. The first steps toward a scalable implementation are taken in [15, 16], where the authors declare that a cell-free massive MIMO network is required to guarantee the complexity and resource requirements of signal processing to be finite for each AP as KK\to\infty. Although an algorithm for joint initial access, pilot assignment, and power control in cell-free massive MIMO networks have been proposed in [16], it was not designed for massive access scenario with LKL\approx K and won’t perform well in this case. Hence, the main objective of this paper is to design a framework for structured massive access in scalable cell-free massive MIMO networks, including initial access, data decoding, pilot assignment, and power control. The imperfect CSI, spectral efficiency (SE), user density, and fairness among the UEs are also taken into account.

I-A Related Works

There is a large body of research on massive access in cellular massive MIMO [18, 19, 20, 21, 22, 23, 24, 25]. According to the user density in the network, massive access can be divided into structured access and random access. When the number of pilots is smaller than the number of UEs, but not dramatically like in Internet of Things (IoT) networks [26], structured access where each user is allocated a dedicated pilot resource is preferable [18]. In contrast, random access might outperform structured access in highly crowded scenarios. Structured access has been considered in [19, 20]. Specifically, the authors in [19] proposed a beam division multiple access to simultaneously serve multiple UEs via different beams in a multiuser massive MIMO network. From the perspective of array signal processing, the authors in [20] treated the multiuser massive MIMO as a type of non-orthogonal angle division multiple access to simultaneously serve multiple UEs. On the other hand, in [21], the authors improved the random access performance by averaging the pilot contamination across the transmission slots. In [22], the authors viewed the contaminated pilot signals as a graph code and analytically optimized performance by performing iterative belief propagation. The authors in [23] proposed a non-Bayesian algorithm to detect the activity of a large number of UEs for massive unsourced random access. Since the cell-free massive MIMO is widely used in indoor and hotspots scenarios, we focus on improving the structured access methods by suppressing the pilot contamination.

Cell-free massive MIMO was proposed in [7, 8], but builds on the heritage of coordinated multipoint [17, Sec. 7.4.3]. Four different ways to divide the signal processing between the APs and CPU are considered in [12]. The most promising distributed implementation uses minimum mean-squared-error (MMSE) combining along with large-scale fading decoding (LSFD) [27]. While all APs initially served all UEs, the user-centric approach has later become the leading way to achieve a practically implementable architecture [14, 15, 16, 28]. Several pilot assignment methods have been considered in the literature [9], including random assignment and brute-force optimization. A greedy algorithm was considered in [7] but it focused on limiting the coherent interference, which might not be the dominant part of pilot contamination and is also not scalable. Additionally, pilot assignment schemes based on tabu-search and K-means clustering were provided in [29] and [30], respectively. The former is also not scalable, while we will look into ways to improve the K-means approach in this paper. It was shown in [16] that pilot assignment can be made scalable by providing each accessing UE with the least bad pilot, but no optimization was carried out and the method is only evaluated for LKL\gg K for which pilot assignment is fairly easy.

I-B Main Contributions

In this paper, we design a structured massive access uplink framework for scalable cell-free massive MIMO systems. Our main contributions are given as follows.

  1. 1.

    We propose a scalable partial LSFD (P-LSFD) strategy for multi-antenna APs, which achieves roughly the same performance comparing to the optimal alternative.

  2. 2.

    We propose a scalable algorithm based on a competitive mechanism which enables a large number of UEs to access the network and select the appropriate APs for service.

  3. 3.

    We propose two pilot assignment schemes for structured massive access, namely User-Group scheme and interference-based K-means (IB-KM) scheme. Both of them are designed to suppress the mutual interference from the pilot sharing among UEs by partitioning the UEs in a proper manner, and shown to outperform the benchmarks.

  4. 4.

    We propose a scalable fractional power control policy where a suitable tradeoff between fairness and average SE can be found by adjusting a parameter.

  5. 5.

    We derive two novel closed-form SE expressions with maximum ratio (MR) combining, whereof one is suitable for arbitrarily fixed pilot assignment schemes and the other is dedicated to the random pilot switching scheme.

I-C Paper Outline and Notations

The remainder of this paper is organized as follows. Section II introduces the system model for scalable cell-free massive MIMO. The proposed P-LSFD strategy and its closed-form SE expression with MR combining are also provided in this section. Section III proposes a scalable algorithm for massive UEs to accessing the network and selecting APs for service. Another closed-form SE expression with MR combining and random pilot switching is provided in Section IV, and two novel pilot assignment schemes are proposed. The performance of the proposed structured massive access framework is numerically evaluated in Section VI. Finally, the major conclusions and implications are drawn in Section VII.

Boldface lowercase letters, 𝐱\bf x, denote column vectors and boldface uppercase letters, 𝐗\bf X, denote matrices. 𝐗ij{\bf X}_{ij} and 𝐗j{{\bf{X}}_{\cdot j}} denote the entry (i,j)\left({i,j}\right) and the jjth column of matrix 𝐗\bf X, respectively. The superscripts T, , and H denote transpose, conjugate, and conjugate transpose, respectively. The n×nn\times n identity matrix is 𝐈n{\bf I}_{n}. We use =Δ\buildrel\Delta\over{=} for definitions and diag(𝐀1,,𝐀n){\rm{diag}}\left({{\bf A}_{1},\ldots,{\bf A}_{n}}\right) for a block-diagonal matrix with the square matrices 𝐀1,,𝐀n{{\bf A}_{1},\ldots,{\bf A}_{n}} on the diagonal. The multi-variate circularly symmetric complex Gaussian distribution with correlation matrix 𝐑\bf R is denoted 𝒩(𝟎,𝐑){\cal N}_{\mathbb{C}}\left({{\bf 0},{\bf R}}\right). The expected value of 𝐱\bf x is denoted as 𝔼{𝐱}{\mathbb{E}}\left\{{\bf x}\right\}. We denote by 𝐱2{\left\|{\bf x}\right\|}_{2} the Euclidean norm of 𝐱\bf x. We use |𝒜|\left|{\cal A}\right| and 𝒜(n){\cal A}\left(n\right) to denote the cardinality and the nnth element of the set 𝒜\cal A, respectively.

II System Setup

Refer to caption
Figure 1: A user-centric cell-free massive MIMO network, where each UE is served by as subset of APs.

We consider a cell-free massive MIMO system consisting of KK single-antenna UEs and LL APs equipped with NN antennas. As illustrated in Fig. 1, all APs are connected to a CPU in an arbitrary fashion. We assume that the fronthaul connections are error-free since the focus of this paper is not on fronthaul provisioning. The channel between AP ll and UE kk is denoted as 𝐡klN{{\bf{h}}_{kl}}\in{{\mathbb{C}}^{N}}. The standard block fading model is considered [17], where 𝐡kl{\bf{h}}_{kl} is constant in time-frequency blocks of τc\tau_{c} channel uses. In each block, an independent realization from a correlated Rayleigh fading distribution is drawn as 𝐡kl𝒩(𝟎,𝐑kl){\bf{h}}_{kl}\sim{\cal{N}}_{\mathbb{C}}\left({{\bf{0}},{\bf{R}}_{kl}}\right), where 𝐑kl{\bf{R}}_{kl} is the spatial correlation matrix describing the spatial property of the channel, and βkl=Δtr(𝐑kl)/N{\beta_{kl}}\buildrel\Delta\over{=}{\rm{tr}}\left({{{\bf{R}}_{kl}}}\right)/N is the large-scale fading coefficient that describes pathloss and shadowing. The fading channels of different links are independently distributed. We assume that deterministic information is known to the system; in particular, the spatial correlation matrices {𝐑kl{\bf R}_{kl}} are available at the APs and the geographic locations of the APs is available at the CPU.

In order to achieve scalability in the system, we define a set of block-diagonal matrices 𝐃k=diag(𝐃k1,,𝐃kL){\bf D}_{k}={\rm{diag}}\left({{\bf D}_{k1},\ldots,{\bf D}_{kL}}\right), for k=1,,Kk=1,\ldots,K, where 𝐃klN×N{\bf D}_{kl}\in{\mathbb{C}}^{N\times N} is a diagonal matrix determining the antenna configuration at AP ll for UE kk. More precisely, the nnth diagonal entry of 𝐃kl{\bf D}_{kl} is 11 if the nnth antenna of AP ll is allowed to transmit to and decode signals from UE kk and 0 otherwise. Moreover, we define a matrix 𝐀L×K{\bf A}\in{\mathbb{R}}^{L\times K} specifying the AP selection between UEs and APs, where the entry 𝐀kl=1{\bf A}_{kl}=1 if tr(𝐃kl)>0{\rm{tr}}\left({{{\bf{D}}_{kl}}}\right)>0 and 0 otherwise. For the conciseness of mathematical descriptions, we denote by k={l:𝐀kl=1,l{1,,L}}{\cal M}_{k}=\left\{{l:{\bf A}_{kl}=1,l\in\left\{{1,\ldots,L}\right\}}\right\} the subset of APs serving UE kk, and 𝒟l={k:𝐀kl=1,k{1,,K}}{\cal D}_{l}=\left\{{k:{\bf A}_{kl}=1,k\in\left\{{1,\ldots,K}\right\}}\right\} the subset of UEs served by AP ll.

For the uplink transmission, we have τp\tau_{p} channel uses dedicated to pilots and the rest τcτp\tau_{c}-\tau_{p} channel uses for payload data. The two phases are described below. Notice that the results of this paper are not limited in the systems operating in time-division duplex (TDD), but also apply to frequency-division duplex (FDD) mode, since the uplink works the same procedure in both duplex modes.

II-A Pilot Transmission and Channel Estimation

We assume there are τp\tau_{p} mutually orthogonal τp\tau_{p}-length pilot signals ϕ1,,ϕτp{{\boldsymbol{\phi}}_{1}},\ldots,{{\boldsymbol{\phi}}_{\tau_{p}}} satisfying ϕt2=τp{\left\|{{{\boldsymbol{\phi}}_{t}}}\right\|^{2}}=\tau_{p}, with τp\tau_{p} being a constant independent of KK. Every UE is assigned to a pilot when it accesses the network. We consider a massive access scenario with a large number of UEs, in the sense that K>τpK>\tau_{p}. Hence, several UEs share the same pilot and these are referred to as pilot-sharing UEs. We denote by tk{1,,τp}t_{k}\in\left\{{1,\ldots,\tau_{p}}\right\} the index of the pilot assigned to UE kk, and 𝒮k{{\cal S}_{k}} the set of pilot-sharing UEs of UE kk, including UE kk itself. When the UEs in 𝒮k{\cal{S}}_{k} transmit pilot ϕtk{{\boldsymbol{\phi}}_{t_{k}}}, AP ll receives the pilot signal 𝐲tklpN{\bf{y}}_{t_{k}l}^{\rm{p}}\in{{\mathbb{C}}^{N}} as [17, Sec. 3]

𝐲tklp=i𝒮kτppi𝐡il+𝐧tkl,{\bf{y}}_{{t_{k}}l}^{\rm{p}}=\sum\limits_{i\in{{\cal S}_{k}}}{\sqrt{{\tau_{p}}{p_{i}}}{{\bf{h}}_{il}}}+{{\bf{n}}_{{t_{k}}l}}, (1)

where pip_{i} denotes the pilot transmit power of UE ii and 𝐧tkl𝒩(𝟎,σ2𝐈N){{\bf{n}}_{{t_{k}}l}}\sim{{\cal N}_{\mathbb{C}}}\left({{\bf{0}},{\sigma^{2}}{{\bf{I}}_{N}}}\right) is the thermal noise. The MMSE estimate of 𝐡kl{\bf h}_{kl} for k𝒮kk\in{\cal S}_{k} is given by [17, Sec. 3]

𝐡^kl=τppk𝐑kl𝚿tkl1𝐲tklp,{{{\bf{\hat{h}}}}_{kl}}=\sqrt{{\tau_{p}}{p_{k}}}{{\bf{R}}_{kl}}{\bf{\Psi}}_{{t_{k}}l}^{-1}{\bf{y}}_{{t_{k}}l}^{\rm{p}}, (2)

where

𝚿tkl=𝔼{𝐲tklp(𝐲tklp)H}=i𝒮kτppi𝐑il+σ2𝐈N{{\bf{\Psi}}_{{t_{k}}l}}={\mathbb{E}}\left\{{{\bf{y}}_{{t_{k}}l}^{\rm{p}}{{\left({{\bf{y}}_{{t_{k}}l}^{\rm{p}}}\right)}^{\rm{H}}}}\right\}=\sum\limits_{i\in{{\cal S}_{k}}}{{\tau_{p}}{p_{i}}{{\bf{R}}_{il}}}+{\sigma^{2}}{{\bf{I}}_{N}} (3)

is the correlation matrix of (1). The estimate 𝐡^kl{\hat{\bf h}}_{kl} and estimation error 𝐡~kl=𝐡kl𝐡^kl{\tilde{\bf h}}_{kl}={{\bf h}}_{kl}-{\hat{\bf h}}_{kl} are independent vectors distributed as 𝐡^kl𝒩(𝟎,𝐁kl){\hat{\bf h}}_{kl}\sim{\cal N}_{\mathbb{C}}\left({{\bf 0},{\bf B}_{kl}}\right) and 𝐡~kl𝒩(𝟎,𝐂kl){\tilde{\bf h}}_{kl}\sim{\cal N}_{\mathbb{C}}\left({{\bf 0},{\bf C}_{kl}}\right), where

𝐁kl=𝔼{𝐡^kl𝐡^klH}=τppk𝐑kl𝚿tkl1𝐑kl,{\bf B}_{kl}={\mathbb{E}}\left\{{{\hat{\bf h}}_{kl}{\hat{\bf h}}^{\rm H}_{kl}}\right\}={\tau_{p}}{p_{k}}{{\bf{R}}_{kl}}{\bf{\Psi}}_{{t_{k}}l}^{-1}{{\bf{R}}_{kl}}, (4)
𝐂kl=𝔼{𝐡~kl𝐡~klH}=𝐑kl𝐁kl.{\bf C}_{kl}={\mathbb{E}}\left\{{{\tilde{\bf h}}_{kl}{\tilde{\bf h}}^{\rm H}_{kl}}\right\}={{\bf{R}}_{kl}}-{{\bf{B}}_{kl}}. (5)

Note that (1) indicates that sharing pilot ϕtk{\boldsymbol{\phi}}_{t_{k}} among the UEs in 𝒮k{\cal S}_{k} generates mutual interference, and consequently degrades the system performance, which is the so-called pilot contamination.

II-B Uplink Data Transmission

During the uplink data transmission, AP ll receives the signal 𝐲lN{\bf y}_{l}\in{\mathbb{C}}^{N} from all UEs, as

𝐲l=i=1K𝐡ilsi+𝐧l,{\bf{y}}_{l}=\sum\limits_{i=1}^{K}{{{\bf{h}}_{il}}{s_{i}}}+{{\bf{n}}_{l}}, (6)

where si𝒩(0,pi)s_{i}\sim{\cal N}_{\mathbb{C}}\left({0,p_{i}}\right) is the signal transmitted from UE ii with power pip_{i} and 𝐧l𝒩(𝟎,σ2𝐈N){{\bf{n}}_{l}}\sim{{\cal N}_{\mathbb{C}}}\left({{\bf{0}},{\sigma^{2}}{{\bf{I}}_{N}}}\right) is the independent receiver noise.

For the large-scale network deployment, we prefer to offload most of the computational tasks to the APs to avoid overloading the CPU. More specifically, every AP preprocesses its signal by computing local estimates of the data and then passes them to the CPU for final decoding, which is the so-called LSFD. Although all APs can physically receive the signal from all UEs, only the APs in the set k{\cal M}_{k} take part in the signal detection for UE kk due to the AP selection. We denote by 𝐚klN{\bf a}_{kl}\in{\mathbb{C}}^{N} the combining vector selected by AP ll for UE kk, where k𝒟lk\in{\cal D}_{l}. Then, the local estimate of sks_{k} is given by

s~kl=𝐚klH𝐃kl𝐲l=𝐚klH𝐃kl𝐡klsk+𝐚klH𝐃kli=1,ikK𝐡ilsi+𝐚klH𝐃kl𝐧l.{{\tilde{s}}_{kl}}={\bf{a}}_{kl}^{\rm{H}}{{\bf{D}}_{kl}}{\bf{y}}_{l}={\bf{a}}_{kl}^{\rm{H}}{{\bf{D}}_{kl}}{{\bf{h}}_{kl}}{s_{k}}+{\bf{a}}_{kl}^{\rm{H}}{{\bf{D}}_{kl}}\sum\limits_{i=1,\;i\neq k}^{K}{{{\bf{h}}_{il}}{s_{i}}}+{\bf{a}}_{kl}^{\rm{H}}{{\bf{D}}_{kl}}{{\bf{n}}_{l}}. (7)

Any combining vector can be adopted in the above expression. MR combining with 𝐚klMR=𝐡^kl{\bf a}^{\rm{MR}}_{kl}={\hat{\bf h}}_{kl} was considered in [27], while [16] has recently advocated for using the local partial MMSE (LP-MMSE) combining

𝐚klLPMMSE=pk(i𝒟lpi(𝐡^il𝐡^ilH+𝐂il)+σ2𝐈N)1𝐡^kl.{\bf{a}}_{kl}^{{\rm{LP-MMSE}}}={p_{k}}\left({\sum\limits_{i\in{{\cal D}_{l}}}{{p_{i}}\left({{{{\bf{\hat{h}}}}_{il}}{\bf{\hat{h}}}_{il}^{\rm{H}}+{{\bf{C}}_{il}}}\right)}+{\sigma^{2}}{{\bf{I}}_{N}}}\right)^{-1}{{{\bf{\hat{h}}}}_{kl}}. (8)

Then the local estimates {s~kl}\left\{{{{\tilde{s}}_{kl}}}\right\} are sent to the CPU, where they are linearly combined by using the weights {wkl}\left\{{{{w}_{kl}}}\right\} to obtain s^k=l=1Lwkls~kl{{\hat{s}}_{k}}=\sum\limits_{l=1}^{L}{w_{kl}^{*}{{\tilde{s}}_{kl}}}, which is eventually used to decode sks_{k}. From (7), we have the final estimate of sks_{k}, as

s^k=𝐚kH𝐖kH𝐃k𝐡ksk+i=1,ikK𝐚kH𝐖kH𝐃k𝐡isi+𝐚kH𝐖kH𝐃k𝐧,{{\hat{s}}_{k}}={\bf{a}}_{k}^{\rm{H}}{\bf{W}}_{k}^{\rm{H}}{{\bf{D}}_{k}}{{\bf{h}}_{k}}{s_{k}}+\sum\limits_{i=1,\;i\neq k}^{K}{{\bf{a}}_{k}^{\rm{H}}{\bf{W}}_{k}^{\rm{H}}{{\bf{D}}_{k}}{{\bf{h}}_{i}}{s_{i}}}+{\bf{a}}_{k}^{\rm{H}}{\bf{W}}_{k}^{\rm{H}}{{\bf{D}}_{k}}{\bf{n}}, (9)

where 𝐖k=diag(wk1𝐈N,,wkL𝐈N)(LN)×(LN){{\bf{W}}_{k}}={\rm{diag}}\left({{w_{k1}}{{\bf{I}}_{N}},\ldots,{w_{kL}}{{\bf{I}}_{N}}}\right)\in{{\mathbb{C}}^{\left({LN}\right)\times\left({LN}\right)}}.

Since the CPU does not have the knowledge of channel estimates, we utilize the so-called use-and-then-forget (UatF) bound [17, Th. 4.4] to obtain the achievable SE.

Lemma 1.

The achievable SE for UE kk of cell-free massive MIMO is

SEk=(1τpτc)log2(1+SINRk),{\rm{SE}}_{k}=\left({1-\frac{{{\tau_{p}}}}{{{\tau_{c}}}}}\right){\log_{2}}\left({1+{\rm{SINR}}_{k}}\right), (10)

where SINRk{\rm{SINR}}_{k} is given by

SINRk\displaystyle{\rm{SINR}}_{k} =pk|𝔼{𝐚kH𝐖kH𝐃k𝐡k}|2i=1Kpi𝔼{|𝐚kH𝐖kH𝐃k𝐡i|2}𝐄ik(2)pk|𝔼{𝐚kH𝐖kH𝐃k𝐡k}|2|𝐄k(1)|2+σ2𝔼{𝐃k𝐖kH𝐚k2}𝐄k(3)\displaystyle=\frac{{{p_{k}}{{\left|{{\mathbb{E}}\left\{{{\bf{a}}_{k}^{\rm{H}}{\bf{W}}_{k}^{\rm{H}}{{\bf{D}}_{k}}{{\bf{h}}_{k}}}\right\}}\right|}^{2}}}}{{\sum\limits_{i=1}^{K}{{p_{i}}\underbrace{{\mathbb{E}}\left\{{{{\left|{{\bf{a}}_{k}^{\rm{H}}{\bf{W}}_{k}^{\rm{H}}{{\bf{D}}_{k}}{{\bf{h}}_{i}}}\right|}^{2}}}\right\}}_{{\rm{\bf E}}_{ik}^{\left(2\right)}}}-{p_{k}}\underbrace{{{\left|{{\mathbb{E}}\left\{{{\bf{a}}_{k}^{\rm{H}}{\bf{W}}_{k}^{\rm{H}}{{\bf{D}}_{k}}{{\bf{h}}_{k}}}\right\}}\right|}^{2}}}_{{{\left|{{\rm{\bf E}}_{k}^{\left(1\right)}}\right|}^{2}}}+{\sigma^{2}}\underbrace{{\mathbb{E}}\left\{{{{\left\|{{{\bf{D}}_{k}}{\bf{W}}_{k}^{\rm{H}}{{\bf{a}}_{k}}}\right\|}^{2}}}\right\}}_{{\rm{\bf E}}_{k}^{\left(3\right)}}}}
=pk|𝐰kH𝐯k|2𝐰kH(i=1Kpi𝚲ki(1)pk𝐯k𝐯kH+σ2𝚲k(2))𝐰k,\displaystyle=\frac{{{p_{k}}{{\left|{{\bf{w}}_{k}^{\rm{H}}{{\bf{v}}_{k}}}\right|}^{2}}}}{{{\bf{w}}_{k}^{\rm{H}}\left({\sum\limits_{i=1}^{K}{{p_{i}}{\bf{\Lambda}}_{ki}^{\left(1\right)}}-{p_{k}}{{\bf{v}}_{k}}{\bf{v}}_{k}^{\rm{H}}+{\sigma^{2}}{\bf{\Lambda}}_{k}^{\left(2\right)}}\right){{\bf{w}}_{k}}}}, (11)

where

𝐰k=[wkl,,wkL]T,{{\bf{w}}_{k}}={\left[{{w_{kl}},\ldots,{w_{kL}}}\right]^{\rm{T}}}, (12)
𝐯k=[𝔼{𝐚k1H𝐃k1𝐡k1},,𝔼{𝐚kLH𝐃kL𝐡kL}]T,{{\bf{v}}_{k}}={\left[{{\mathbb{E}}\left\{{{\bf{a}}_{k1}^{\rm{H}}{{\bf{D}}_{k1}}{{\bf{h}}_{k1}}}\right\},\ldots,{\mathbb{E}}\left\{{{\bf{a}}_{kL}^{\rm{H}}{{\bf{D}}_{kL}}{{\bf{h}}_{kL}}}\right\}}\right]^{\rm{T}}}, (13)
𝚲ki(1)=[𝔼{𝐚klH𝐃kl𝐡il𝐡ijH𝐃kj𝐚kj}:l,j=1,,L],{\bf{\Lambda}}_{ki}^{\left(1\right)}=\left[{\mathbb{E}}{\left\{{{\bf{a}}_{kl}^{\rm{H}}{{\bf{D}}_{kl}}{{\bf{h}}_{il}}{\bf{h}}_{ij}^{\rm{H}}{{\bf{D}}_{kj}}{{\bf{a}}_{kj}}}\right\}:l,j=1,\ldots,L}\right], (14)
𝚲k(2)=diag(𝔼{𝐃k1𝐚k12},,𝔼{𝐃kL𝐚kL2}),{\bf{\Lambda}}_{k}^{\left(2\right)}\!=\!{\rm{diag}}\left({{\mathbb{E}}\left\{{{{\left\|{{{\bf{D}}_{k1}}{{\bf{a}}_{k1}}}\right\|}^{2}}}\right\},\ldots,{\mathbb{E}}\left\{{{{\left\|{{{\bf{D}}_{kL}}{{\bf{a}}_{kL}}}\right\|}^{2}}}\right\}}\right), (15)

and the expectations are with respect to all sources of randomness.

Proof:

It follows the similar approach as in [17, The. 4.4], but for the received signal in (9). ∎

The structure of (1) is a generalized Rayleigh quotient with respect to 𝐰k{\bf w}_{k}. As a consequence, the maximum value of SINRk\rm{SINR}_{k} is achieved as [17, Lem. B.10]

SINRk=pk𝐯kH(i=1Kpi𝚲ki(1)pk𝐯k𝐯kH+σ2𝚲k(2))1𝐯k,{\rm{SINR}}_{k}={p_{k}}{\bf{v}}_{k}^{\rm{H}}{\left({\sum\limits_{i=1}^{K}{{p_{i}}{\bf{\Lambda}}_{ki}^{\left(1\right)}}-{p_{k}}{{\bf{v}}_{k}}{\bf{v}}_{k}^{\rm{H}}+{\sigma^{2}}{\bf{\Lambda}}_{k}^{\left(2\right)}}\right)^{-1}}{{\bf{v}}_{k}}, (16)

with the optimal LSFD weight

𝐰kLSFD=(i=1Kpi𝚲ki(1)+σ2𝚲k(2))1𝐯k.{{\bf{w}}^{\rm{LSFD}}_{k}}={\left({\sum\limits_{i=1}^{K}{{p_{i}}{\bf{\Lambda}}_{ki}^{\left(1\right)}}+{\sigma^{2}}{\bf{\Lambda}}_{k}^{\left(2\right)}}\right)^{-1}}{{\bf{v}}_{k}}. (17)
TABLE I: Fronthaul load related to the statistical parameters and the computational complexity of the weighting vector.
Scheme Fronthaul load (complex scalars) Computational complexity
LSFD K|k|+(|k|2K2+K|k|)/2K\left|{{{\cal M}_{k}}}\right|{\rm{+}}\left({{{\left|{{{\cal M}_{k}}}\right|}^{2}}{K^{2}}{\rm{+}}K\left|{{{\cal M}_{k}}}\right|}\right)/2 (|k|2+|k|2)K+|k|3|k|3+|k|2\left({\frac{{{{\left|{{{\cal M}_{k}}}\right|}^{2}}+\left|{{{\cal M}_{k}}}\right|}}{2}}\right)K+\frac{{{{\left|{{{\cal M}_{k}}}\right|}^{3}}-\left|{{{\cal M}_{k}}}\right|}}{3}+{\left|{{{\cal M}_{k}}}\right|^{2}}
P-LSFD |𝒫k||k|+(|k|2|𝒫k|2+|𝒫k||k|)/2\left|{{{\cal P}_{k}}}\right|\left|{{{\cal M}_{k}}}\right|{\rm{+}}\left({{{\left|{{{\cal M}_{k}}}\right|}^{2}}{{\left|{{{\cal P}_{k}}}\right|}^{2}}{\rm{+}}\left|{{{\cal P}_{k}}}\right|\left|{{{\cal M}_{k}}}\right|}\right)/2{\rm{}} (|k|2+|k|2)|𝒫k|+|k|3|k|3+|k|2\left({\frac{{{{\left|{{{\cal M}_{k}}}\right|}^{2}}+\left|{{{\cal M}_{k}}}\right|}}{2}}\right)\left|{{{\cal P}_{k}}}\right|+\frac{{{{\left|{{{\cal M}_{k}}}\right|}^{3}}-\left|{{{\cal M}_{k}}}\right|}}{3}+{\left|{{{\cal M}_{k}}}\right|^{2}}

The fronthaul load required to gather all the statistical matrices for computing the LSFD vector in (17) and the related computational complexity are summarized in Table I. Clearly, they grow very fast with the size of the network, making the implementation of the optimal LSFD unscalable.

To achieve the implementation, we propose to use the alternative P-LSFD vector as

𝐰kPLSFD=(i𝒫kpi𝚲ki(1)+σ2𝚲k(2))1𝐯k,{\bf{w}}_{k}^{{\rm{P-LSFD}}}={\left({\sum\limits_{i\in{{\cal P}_{k}}}{{p_{i}}{\bf{\Lambda}}_{ki}^{\left(1\right)}}+{\sigma^{2}}{\bf{\Lambda}}_{k}^{\left(2\right)}}\right)^{-1}}{{\bf{v}}_{k}}, (18)

where 𝒫k={i:𝐀kl𝐀il0,l{1,,L}}{{\cal P}_{k}}=\left\{{i:{{\bf{A}}_{kl}}{{\bf{A}}_{il}}\neq 0,l\in\left\{{1,\ldots,L}\right\}}\right\} is the index set of the UEs which are served by partially the same APs as UE kk. Only those UEs in 𝒫k{{\cal P}_{k}} might cause substantial interference to UE kk. Note that |𝒫k|(τp1)|k|+1\left|{{\cal P}_{k}}\right|\leq\left({{\tau_{p}-1}}\right)\left|{{\cal M}_{k}}\right|+1, where the upper bound is achieved in the unlikely case that all the APs in k{\cal M}_{k} serve UE kk but otherwise serve entirely different sets of UEs. Importantly, the upper bound is independent of KK. The fronthaul load related to the statistical parameters and the total number of complex multiplications required by P-LSFD is given in Table I. It is important to note that the proposed P-LSFD is a scalable strategy whose complexity does not grow with KK.

The expectations in (1) cannot be computed in closed-form when using LP-MMSE, but can be easily computed using Monte-Carlo simulations. Similar to [17, Cor. 4.5], we can obtain the following closed-form expression as a simple baseline when using MR combining.

Lemma 2.

If MR combining with 𝐚klMR=𝐡^kl{\bf a}^{\rm{MR}}_{kl}={\hat{\bf h}}_{kl} is used, the expectations in (1) become

𝐄k(1)=𝐰kH𝐮kk,{{\rm{\bf E}}_{k}^{\left(1\right)}}={\bf{w}}_{k}^{\rm{H}}{{\bf{u}}_{kk}}, (19)
𝐄k(3)=𝐰kH𝛀k(2)𝐰k,{{\rm{\bf E}}_{k}^{\left(3\right)}}={\bf{w}}_{k}^{\rm{H}}{\bf{\Omega}}_{k}^{\left(2\right)}{{\bf{w}}_{k}}, (20)

and

𝐄ik(2)=𝐰kH𝛀ki(1)𝐰k+{pipk𝐰kH𝐮ki𝐮kiH𝐰kifi𝒮k,0otherwise,{{\rm{\bf E}}_{ik}^{\left(2\right)}}={\bf{w}}_{k}^{\rm{H}}{\bf{\Omega}}_{ki}^{\left(1\right)}{{\bf{w}}_{k}}+{\begin{cases}{\frac{{{p_{i}}}}{{{p_{k}}}}{\bf{w}}_{k}^{\rm{H}}{{\bf{u}}_{ki}}{\bf{u}}_{ki}^{\rm{H}}{{\bf{w}}_{k}}}&{{\rm{if}}\;i\in{{\cal S}_{k}}},\\ 0&{{\rm{otherwise}}},\end{cases}} (21)

where

𝐮ki=[tr(𝐃k1𝐁k1𝐑k11𝐑i1),,tr(𝐃kL𝐁kL𝐑kL1𝐑iL)]T,{{\bf{u}}_{ki}}={\left[{{\rm{tr}}\left({{{\bf{D}}_{k1}}{{\bf{B}}_{k1}}{\bf{R}}_{k1}^{-1}{{\bf{R}}_{i1}}}\right),\cdots,{\rm{tr}}\left({{{\bf{D}}_{kL}}{{\bf{B}}_{kL}}{\bf{R}}_{kL}^{-1}{{\bf{R}}_{iL}}}\right)}\right]^{\rm{T}}}, (22)
𝛀ki(1)=diag{tr(𝐃k1𝐁k1𝐑i1),,tr(𝐃kL𝐁kL𝐑iL)},{\bf{\Omega}}_{ki}^{\left(1\right)}={\rm{diag}}\left\{{{\rm{tr}}\left({{{\bf{D}}_{k1}}{{\bf{B}}_{k1}}{{\bf{R}}_{i1}}}\right),\ldots,{\rm{tr}}\left({{{\bf{D}}_{kL}}{{\bf{B}}_{kL}}{{\bf{R}}_{iL}}}\right)}\right\}, (23)

and

𝛀k(2)=diag{tr(𝐃kl𝐁kl),,tr(𝐃kl𝐁kl)}.{\bf{\Omega}}_{k}^{\left(2\right)}={\rm{diag}}\left\{{{\rm{tr}}\left({{{\bf{D}}_{kl}}{{\bf{B}}_{kl}}}\right),\cdots,{\rm{tr}}\left({{{\bf{D}}_{kl}}{{\bf{B}}_{kl}}}\right)}\right\}. (24)
Proof:

It follows the similar approach as in [17, Cor. 4.5], but for the received signal in (9). ∎

III Initial Access and AP Selection

When UE kk accesses the network, it selects its serving APs, i.e., the APs in k{\cal M}_{k}. However, it cannot make this choice entirely freely since each AP only supports a limited number of UEs [16]. More precisely, each AP can only manage τp\tau_{p} UEs, to avoid strong pilot contamination. Therefore, we adopt the following key assumption from [16].

Assumption 1.

Each AP serves at most one UE per pilot and uses all its NN antennas to serve these UEs.

The above assumption implies that |𝒟l|τp\left|{{\cal D}_{l}}\right|\leq\tau_{p} and

𝐃kl={𝐈Nifk𝒟l𝟎Notherwise,{\bf D}_{kl}=\begin{cases}{\bf I}_{N}&{\rm{if}}\ k\in{\cal D}_{l}\\ {\bf 0}_{N}&\rm{otherwise}\end{cases}, (25)

for l=1,,L{l=1,\ldots,L}.

In order to satisfy Assumption 1 and guarantee every UE at least has one serving AP, we develop an algorithm based on a competitive mechanism. The main idea is that UE kk needs to compete for AP ll with τp\tau_{p} UEs that might already be served by AP ll. We denote by kk^{*} the index of the UE with the smallest large-scale fading coefficient in {k}𝒟l{\left\{{k}\right\}\cup{\cal D}_{l}}. UE kk succeeds if kkk\neq k^{*}. Then UE kk^{*} puts ll into its blacklist k{1,,L}{\cal B}_{k^{*}}\subset\left\{{1,\ldots,L}\right\}, which means AP ll is no longer available for UE kk^{*}. This is reasonable since the UEs that have won the competition have better channel conditions than UE kk^{*}, and thus UE kk^{*} cannot win any competition regarding AP ll. Moreover, if |k|\left|{\cal B}_{k^{*}}\right| reaches L1L-1, which means UE k{k^{*}} has lost every competition it participated in, then UE k{k^{*}} is added into the list UE¯{{\cal L}_{\overline{{\rm{UE}}}}} and assigned to the only AP that is left; consequently, UE k{k^{*}} no longer needs to participate in another competition. UE¯{{\cal L}_{\overline{{\rm{UE}}}}} prevents the UEs in weak channel conditions from being abandoned. We denote by UE{\cal L}_{\rm{UE}} the list in ascending order, which comprises the indices of the UEs which have not finished their AP selections yet. The algorithm initiates with UE={1,,K}{\cal L}_{\rm{UE}}=\left\{1,\ldots,K\right\}, UE¯={\cal L}_{\overline{\rm{UE}}}=\emptyset, {k=:k=1,,K}\left\{{\cal M}_{k}=\emptyset:k=1,\ldots,K\right\}, and {k=:k=1,,K}\left\{{\cal B}_{k}=\emptyset:k=1,\ldots,K\right\}.

Our proposed AP selection algorithm operates through the following steps.

  1. 1.

    UE k=UE(1)k={\cal L}_{\rm{UE}}\left({1}\right) measures its large-scale fading coefficients with the APs in AP,k{\cal L}_{{\rm{AP}},{k}}, where AP,k={1,,L}/{kk}{\cal L}_{{\rm{AP}},{k}}=\left\{1,\ldots,L\right\}/\left\{{{{{\cal M}_{k}}}\cup{{{\cal B}_{k}}}}\right\} is the list comprising the indices of the APs which are available for UE kk.

  2. 2.

    UE kk finds the AP

    l=argmaxjAP,kβkjl=\arg{\max_{j\in{{\cal L}_{{\rm{AP}},{k}}}}}{\beta_{kj}} (26)

    If |𝒟l|<τp\left|{\cal D}_{l}\right|<\tau_{p}, UE kk takes AP ll as its serving AP by k{l}{\cal M}_{k}\cup\left\{{l}\right\}, and repeats Step 2) to seek for more APs; otherwise, a competition is needed, which is elaborated in Step 3).

  3. 3.

    A competition occurs when UE kk attempts to select AP ll while AP ll already has τp\tau_{p} UEs in 𝒟l{\cal D}_{l}. The principle is that AP ll gives priority to the UEs in stronger channel conditions. Therefore, AP ll finds the “weakest” UE

    k=argmini{k}𝒟l/UE¯βil.k^{*}=\arg{\min_{i\in{\left\{{k}\right\}\cup{\cal D}_{l}/{\cal L}_{\overline{\rm{UE}}}}}}{\beta_{il}}. (27)

    If k=kk^{*}=k, UE kk puts ll into k{\cal B}_{k}; otherwise, UE kk succeeds UE kk^{*} in 𝒟l{\cal D}_{l}, and UE kk^{*} puts ll into k{\cal B}_{k^{*}}. After the competition, UE kk goes back to Step 2) for another available AP, until AP,k={\cal L}_{{\rm{AP}},k}=\emptyset or kUE¯k\in{\cal L}_{\overline{\rm{UE}}}. In the case of kUE¯k\in{\cal L}_{\overline{\rm{UE}}}, UE kk selects whatever AP left in AP,k{\cal L}_{{\rm{AP}},k}. If the only AP ll^{\prime} left in AP,k{\cal L}_{{\rm{AP}},k} already has τp\tau_{p} UEs in 𝒟l{\cal D}_{l^{\prime}}, then AP ll^{\prime} turns to serve UE kk instead of UE

    k=argmini𝒟l/UE¯βil.k^{\prime}=\arg{\min_{i\in{{\cal D}_{{{l^{\prime}}}}}/{{\cal L}_{\overline{{\rm{UE}}}}}}}{\beta_{il}}. (28)

    By then, UE kk finishes its AP selection and is moved from UE{\cal L}_{\rm{UE}} by UE/{k}{\cal L}_{\rm{UE}}/\left\{k\right\}.

  4. 4.

    Go back to Step 1) for the next UE, until UE={\cal L}_{\rm{UE}}=\emptyset.

Based on the results of the AP selection, we construct the matrix 𝐀{\bf A}. The pseudo code of this algorithm is given in Algorithm 1.

1
Input: {βkl}\left\{{\beta}_{kl}\right\}, UE{\cal L}_{\rm{UE}}, UE¯{{\cal L}_{\overline{{\rm{UE}}}}}, {k}\left\{{\cal M}_{k}\right\}, {k}\left\{{\cal B}_{k}\right\}, {𝒟l}\left\{{\cal D}_{l}\right\}
2
Output: {k}\left\{{\cal M}_{k}\right\}
3
4for kUEk\in{\cal L}_{\rm{UE}} do
5       repeat
6             AP,k{1,,L}/{kk}{\cal L}_{{\rm{AP}},k}\leftarrow\left\{1,\ldots,L\right\}/\left\{{{{{\cal M}_{k}}}\cup{{{\cal B}_{k}}}}\right\};
7             if AP,k={\cal L}_{{\rm{AP}},k}=\emptyset then
8                   break;
9                  
10            else
11                   if kUE¯k\in{{\cal L}_{\overline{{\rm{UE}}}}} then
12                         k{l}=AP,k{\cal M}_{k}\leftarrow\left\{l^{\prime}\right\}={\cal L}_{{\rm{AP}},k};
13                         if |𝒟l|=τp\left|{\cal D}_{l^{\prime}}\right|=\tau_{p} then
14                               k=argmini𝒟l/UE¯βilk^{\prime}=\arg{\min_{i\in{\cal D}_{l^{\prime}}/{\cal L}_{\overline{\rm{UE}}}}}{\beta_{il}};
15                               kk/{l}{\cal M}_{k^{\prime}}\leftarrow{\cal M}_{k^{\prime}}/\left\{{l^{\prime}}\right\};
16                              
17                        break;
18                        
19                  else
20                         l=argmaxjAP,kβkjl=\arg{\max_{j\in{{\cal L}_{{\rm{AP}},k}}}}{\beta_{kj}};
21                         kk{l}{\cal M}_{k}\leftarrow{\cal M}_{k}\cup\left\{{l}\right\};
22                         if |𝒟l|>τp\left|{\cal D}_{l}\right|>\tau_{p} then
23                               k=argmini𝒟l/UE¯βilk^{*}=\arg{\min_{i\in{{\cal D}_{l}/{\cal L}_{\overline{\rm{UE}}}}}}{\beta_{il}};
24                               kk{l}{\cal B}_{k^{*}}\leftarrow{\cal B}_{k^{*}}\cup\left\{{l}\right\};
25                               if |k|=L1\left|{{\cal B}_{k^{*}}}\right|=L-1 then
26                                     UE¯UE¯{k}{{\cal L}_{\overline{{\rm{UE}}}}}\leftarrow{{\cal L}_{\overline{{\rm{UE}}}}}\cup\left\{{k^{*}}\right\};
27                                    
28                              kk/{l}{\cal M}_{k^{*}}\leftarrow{\cal M}_{k^{*}}/\left\{{l}\right\};
29                              
30                        
31                  
32            
33      until break;
34final;
Algorithm 1 Initial Access and AP Selection.

IV Pilot Assignment

A proper pilot assignment improves the system performance by suppressing the pilot contamination, particularly, in the massive access scenario. In this section, we derive a novel closed-form SE expression when random pilot switching is applied. Meanwhile, we elaborate the drawback of random pilot assignment, and propose two novel pilot assignment schemes dedicating to suppressing the pilot contamination.

IV-A Random Pilot Assignment and Random Pilot Switching

When the random pilot assignment scheme is applied, every UE in the network is assigned a pilot at random from τp\tau_{p} orthogonal pilots and uses it in all blocks. Random pilot switching is another approach to assign pilots, in which each UE does not pick one pilot at random, but switches between pilots in a random fashion over blocks to average over the pilot contamination [31]. When random pilot switching is applied, the pilot-sharing UEs for UE kk will vary. We use a binary random variable

χik={1ifi𝒮k,0otherwise,i=1,,K{\chi_{ik}}={\begin{cases}1&{{\rm{if}}\;i\in{{\cal S}_{k}}},\\ 0&{{\rm{otherwise}}},\end{cases}}\quad i=1,\ldots,K (29)

instead of 𝒫k{\cal P}_{k} to indicate whether a UE ii is a pilot-sharing UE of UE kk or not, since it is easier to define the statistics of χik{\chi_{ik}} than 𝒫k{\cal P}_{k}. The probability of χik=1{\chi_{ik}}=1 is 1τp\frac{1}{{{\tau_{p}}}} and 11τp1-\frac{1}{{{\tau_{p}}}} otherwise. With this notation, the despreaded pilot signal received at AP ll in (1) can be rewritten as

𝐲tklp=τppk𝐡kl+i=1,ikKχikτppi𝐡il+𝐧tkl.{\bf{y}}_{{t_{k}}l}^{\rm{p}}=\sqrt{{\tau_{p}}{p_{k}}}{{\bf{h}}_{kl}}+\sum\limits_{i=1,\;i\neq k}^{K}{{\chi_{ik}}\sqrt{{\tau_{p}}{p_{i}}}{{\bf{h}}_{il}}}+{{\bf{n}}_{{t_{k}}l}}. (30)

As a consequence, we have

𝚿tkl=𝔼{𝐡}{𝐲tklp(𝐲tklp)H}=τppk𝐑kl+i=1,ikKχikτppi𝐑il+σ2𝐈N,{{\bf{\Psi}}_{{t_{k}}l}}={\mathbb{E}}_{\left\{{\bf h}\right\}}\left\{{{\bf{y}}_{{t_{k}}l}^{\rm{p}}{{\left({{\bf{y}}_{{t_{k}}l}^{\rm{p}}}\right)}^{\rm{H}}}}\right\}={\tau_{p}}{p_{k}}{{\bf{R}}_{kl}}+\sum\limits_{i=1,\;i\neq k}^{K}{{\chi_{ik}}{\tau_{p}}{p_{i}}{{\bf{R}}_{il}}}+{\sigma^{2}}{{\bf{I}}_{N}}, (31)

where 𝔼{𝐡}{}{\mathbb{E}}_{\left\{{\bf h}\right\}}\left\{\cdot\right\} denotes the expectation with respect to the channel and noise realizations. Since no randomness appears in χkk=1\chi_{kk}=1, we rewrite the SINR expression in (1) as

SINRk=pk|𝐄k(1)|2i=1,ikKpi𝐄ki(2)+pk𝐄kk(2)pk|𝐄k(1)|2+σ2𝐄k(3){\rm{SINR}}_{k}=\frac{{{p_{k}}{{\left|{{\rm{\bf E}}_{k}^{\left(1\right)}}\right|}^{2}}}}{{\sum\limits_{i=1,i\neq k}^{K}{{p_{i}}{\rm{\bf E}}_{ki}^{\left(2\right)}}+{p_{k}}{\rm{\bf E}}_{kk}^{\left(2\right)}-{p_{k}}{{\left|{{\rm{\bf E}}_{k}^{\left(1\right)}}\right|}^{2}}+{\sigma^{2}}{\rm{\bf E}}_{k}^{\left(3\right)}}} (32)

for the following derivation. A closed-form expression of SINR when using MR combining and random pilot switching is obtained as follows.

Corollary 1.

If MR combining with 𝐚klMR=𝐁kl1𝐡^kl{\bf a}^{\rm{MR}}_{kl}={\bf{B}}_{kl}^{{\rm{-}}1}{{{\bf{\hat{h}}}}_{kl}} is used, the expectations in (32) become

𝐄k(1)=𝐰kH𝐮¯kk,{{\rm{\bf E}}_{k}^{\left(1\right)}}={\bf{w}}_{k}^{\rm{H}}{{{\bf{\bar{u}}}}_{kk}}, (33)
𝐄k(3)=𝐰kH𝛀¯k(2)𝐰k,{\rm{\bf E}}_{k}^{\left(3\right)}={\bf{w}}_{k}^{\rm{H}}{\bf{\bar{\Omega}}}_{k}^{\left(2\right)}{{\bf{w}}_{k}}, (34)
𝐄kk(2)=𝐰kH(𝛀¯kk(1)+𝐮¯kk𝐮¯kkH)𝐰k,{\rm{\bf E}}_{kk}^{\left(2\right)}={\bf{w}}_{k}^{\rm{H}}\left({{\bf{\bar{\Omega}}}_{kk}^{\left(1\right)}+{{{\bf{\bar{u}}}}_{kk}}{\bf{\bar{u}}}_{kk}^{\rm{H}}}\right){{\bf{w}}_{k}}, (35)

and

𝐄ik(2)=𝐰kH(𝛀¯ki(1)+piτppk𝐮¯ki𝐮¯kiH)𝐰k,ik,{\rm{\bf E}}_{ik}^{\left(2\right)}={\bf{w}}_{k}^{\rm{H}}\left({{\bf{\bar{\Omega}}}_{ki}^{\left(1\right)}+\frac{{{p_{i}}}}{{{\tau_{p}}{p_{k}}}}{{{\bf{\bar{u}}}}_{ki}}{\bf{\bar{u}}}_{ki}^{\rm{H}}}\right){{\bf{w}}_{k}},i\neq k, (36)

where

𝐮¯ki=[tr(𝐃k1𝐑i1𝐑k11),,tr(𝐃kL𝐑iL𝐑kL1)]T,{{{\bf{\bar{u}}}}_{ki}}={\left[{{\rm{tr}}\left({{{\bf{D}}_{k1}}{{\bf{R}}_{i1}}{\bf{R}}_{k1}^{-1}}\right),\ldots,{\rm{tr}}\left({{{\bf{D}}_{kL}}{{\bf{R}}_{iL}}{\bf{R}}_{kL}^{-1}}\right)}\right]^{\rm{T}}}, (37)
𝛀¯ki(1)=diag{tr(𝐃kl𝐁¯kl1𝐑il),,tr(𝐃kl𝐁¯kl1𝐑il)},{\bf{\bar{\Omega}}}_{ki}^{\left(1\right)}={\rm{diag}}\left\{{{\rm{tr}}\left({{{\bf{D}}_{kl}}{\bf{\bar{B}}}_{kl}^{-1}{{\bf{R}}_{il}}}\right),\ldots,{\rm{tr}}\left({{{\bf{D}}_{kl}}{\bf{\bar{B}}}_{kl}^{-1}{{\bf{R}}_{il}}}\right)}\right\}, (38)
𝛀¯k(2)=diag{tr(𝐃k1𝐁¯k11),,tr(𝐃kL𝐁¯kL1)},{\bf{\bar{\Omega}}}_{k}^{\left(2\right)}={\rm{diag}}\left\{{{\rm{tr}}\left({{{\bf{D}}_{k1}}{\bf{\bar{B}}}_{k1}^{-1}}\right),\ldots,{\rm{tr}}\left({{{\bf{D}}_{kL}}{\bf{\bar{B}}}_{kL}^{-1}}\right)}\right\}, (39)

and

𝐁¯kl1\displaystyle{\bf{\bar{B}}}_{kl}^{-1} =𝔼{χ}{𝐁kl1}=1τppk𝐑kl1(i=1,ikK𝔼{χ}{χik}τppi𝐑il+τppk𝐑kl+σ2𝐈N)𝐑kl1\displaystyle={{\mathbb{E}}_{\left\{\chi\right\}}}\left\{{{\bf{B}}_{kl}^{-1}}\right\}=\frac{1}{{{\tau_{p}}{p_{k}}}}{\bf{R}}_{kl}^{-1}\left({\sum\limits_{i=1,\;i\neq k}^{K}{{{\mathbb{E}}_{\left\{\chi\right\}}}\left\{{{\chi_{ik}}}\right\}{\tau_{p}}{p_{i}}{{\bf{R}}_{il}}}+{\tau_{p}}{p_{k}}{{\bf{R}}_{kl}}+{\sigma^{2}}{{\bf{I}}_{N}}}\right){\bf{R}}_{kl}^{-1}
=1τppk𝐑kl1(τppk𝐑kl+i=1,ikKpi𝐑il+σ2𝐈N)𝐑kl1,\displaystyle=\frac{1}{{{\tau_{p}}{p_{k}}}}{\bf{R}}_{kl}^{-1}\left({{\tau_{p}}{p_{k}}{{\bf{R}}_{kl}}+\sum\limits_{i=1,\;i\neq k}^{K}{{p_{i}}{{\bf{R}}_{il}}}+{\sigma^{2}}{{\bf{I}}_{N}}}\right){\bf{R}}_{kl}^{-1}, (40)

with the fact that 𝔼{χik}=1τp{\mathbb{E}}\left\{{{\chi_{ik}}}\right\}=\frac{1}{{{\tau_{p}}}}, iki\neq k, where 𝔼{χ}{}{\mathbb{E}}_{\left\{{{\chi}}\right\}}\left\{\cdot\right\} denotes the expectation with respect to χ{{\chi}}.

Proof:

The proof follows the similar approach as in [32, Appe. D], but the derivation is performed by first computing the expectations with respect to 𝐡\bf h, then computing the expectations with respect to χ\chi. ∎

Note that the normalization of 𝐡^kl{{{\bf{\hat{h}}}}_{kl}} with 𝐁kl1{\bf{B}}_{kl}^{{\rm{-}}1} in Corollary 1 makes the expected channel gain equal to 𝐰kH𝐮¯kk{\bf{w}}_{k}^{\rm{H}}{{{\bf{\bar{u}}}}_{kk}} as in (33), and thereby enables us to derive the closed-form expressions in Corollary 1.

We treat the closed-form SE expression obtained in Corollary 1 as a “worst” case, since all UEs in the network are possibly suffering from strong pilot contamination in random pilot switch. Therefore, we mainly consider the random pilot assignment, which is widely considered in previous works, as a benchmark. The reason is that two UEs that are close to each other will occasionally share the same pilot and then create strong mutual interference. This can be avoided by a structured pilot assignment.

IV-B Interference-Based K-Means Pilot Assignment Scheme

A K-means-type pilot assignment scheme was proposed in [30] and we call it geography-based K-means (GB-KM) pilot assignment since the geographic location of the UEs is utilized. Inspired by this scheme, we propose another K-means-type pilot assignment scheme where instead the distances between all UEs and APs are considered. Note that no extra processing is needed for this distance information since it is intermediate when the APs and CPU obtain {𝐑kl}\left\{{\bf R}_{kl}\right\}. Since this scheme aims to suppress the interference generated by the pilot-sharing UEs, we refer it to as IB-KM pilot assignment scheme. Before we elaborate the scheme, we first make the following key assumption.

Assumption 2.

The level to the inter-user interference generated by UE ii and UE kk is indicated by

Disik=diag(𝐝i)𝐀idiag(𝐝k)𝐀k22,{\rm{Dis}}_{ik}=\left\|{{\rm{diag}}\left({{\bf{d}}_{i}}\right){{\bf A}_{\cdot i}}-{\rm{diag}}\left({{\bf{d}}_{k}}\right){{\bf A}_{\cdot k}}}\right\|_{2}^{2}, (41)

where 𝐝i=[di1,,diL]T{{\bf{d}}_{i}}={\left[{{d_{i1}},\ldots,{d_{iL}}}\right]^{\rm{T}}} and 𝐀i{{\bf A}_{\cdot i}} denote the distance and serving relationship between UE ii and all APs. The smaller values of Disik{\rm{Dis}}_{ik} indicate the stronger inter-user interference could be generated if UE ii and UE kk share the same pilot.

Refer to caption
Figure 2: An example of Assumption 2. (a) UE 11: 𝐝1=[75,50,70,45]T{\bf{d}}_{1}=\left[75,50,70,45\right]^{\rm T}, 𝐀1=[0,1,0,1]T{\bf{A}}_{\cdot 1}=\left[0,1,0,1\right]^{\rm T}; (b) UE 22: 𝐝2=[45,60,55,65]T{\bf{d}}_{2}=\left[45,60,55,65\right]^{\rm T}, 𝐀2=[1,0,1,0]T{\bf{A}}_{\cdot 2}=\left[1,0,1,0\right]^{\rm T}; (c) UE 33: 𝐝3=[65,60,55,50]T{\bf{d}}_{3}=\left[65,60,55,50\right]^{\rm T}, 𝐀3=[0,1,1,1]T{\bf{A}}_{\cdot 3}=\left[0,1,1,1\right]^{\rm T}.

The rationale behind Assumption 2 is that the inter-user interference occurs when the pilot-sharing UEs communicate with the same AP. The strength of the interference depends on the signal power of the pilot-sharing UEs, which is mainly determined by the distances between the pilot-sharing UEs and the same AP when the channel distribution and the transmit power are roughly the same. A simple example with 33 UEs and 44 APs is provided in Fig. 2 to explain Assumption 2. The distances between UE kk and its serving APs (i.e., diag(𝐝k)𝐀k{\rm{diag}}\left({{\bf{d}}_{k}}\right){{\bf A}_{\cdot k}}) are marked with “Serving” in Fig. 2. In the example, we can see that UE 22 and UE 33 are located in the similar positions but served by different subsets of APs (2={1,3}{\cal M}_{2}=\left\{1,3\right\} and 3={2,3,4}{\cal M}_{3}=\left\{2,3,4\right\}). When comparing the cases of these 33 UEs in Fig. 2, we can conclude that UE 11 and UE 22 will generate less inter-user interference if they share the same pilot than UE 11 and UE 33. The reason is that UE 11 and UE 22 are served by disjoint subsets of APs while UE 11 and UE 33 have a common serving AP, i.e., AP 33. Then we back to (41) and find that Dis12=9150>Dis13=315{\rm{Dis}}_{12}=9150>{\rm{Dis}}_{13}=315, since Disik{\rm{Dis}}_{ik} indicates the difference between service quality of UE ii and UE kk from the APs of their corresponding i{\cal M}_{i} and k{\cal M}_{k}.

Based on Assumption 2, the basic idea of the IB-KM pilot assignment scheme is that the KK UEs are separated into K/τp\left\lceil{K/{\tau_{p}}}\right\rceil disjoint clusters centering on K/τp\left\lceil{K/{\tau_{p}}}\right\rceil centroids, whose minimum Dis{\rm{Dis}} with each other is as large as possible. When the APs are deployed, the location of these centroids can be trained with a large number of points randomly locating in the coverage area ,which could be generated by the MATLAB function “rand[30]. Every such cluster comprises at most τp\tau_{p} UEs, which have the smallest values of the Dis{\rm{Dis}} with the corresponding centroid. UEs in the same cluster are assigned mutually orthogonal pilots, as shown in Fig. 3. The algorithm initiates with {𝒞m=:m=1,,K/τp}\left\{{\cal C}_{m}=\emptyset:m=1,\ldots,\left\lceil{K/{\tau_{p}}}\right\rceil\right\} and ε=0.001\varepsilon=0.001. Note that the distance between APs and UEs {𝐝k}\left\{{{{\bf{d}}_{k}}}\right\} is generated when the spatial correlation matrices {𝐑kl}\{{\bf R}_{kl}\} are generated, which depends on the simulation setup.

Refer to caption
Figure 3: A cell-free massive MIMO network with K-means pilot assignment, where 99 UEs are separated into 22 clusters center on 22 centroids. 55 pilots are reused in each clusters.

Our proposed IB-KM pilot assignment scheme operates through the following steps.

  1. 1.

    Arbitrarily generate KpK_{\rm p} points and K/τp\left\lceil{K/{\tau_{p}}}\right\rceil centroids in the coverage area, where KpK_{\rm p} is a large number. Each point and centroid measures its distance with all APs, generates distance vector 𝐝p=[dp1,,dpL]T{{\bf{d}}^{\prime}_{p}}={\left[{{{d}^{\prime}_{p1}},\ldots,{{d}^{\prime}_{pL}}}\right]^{\rm{T}}}, p=1,,Kpp=1,\ldots,{K_{\rm{p}}} and 𝝁m=[μm1,,μmL]T{{\boldsymbol{\mu}}_{m}}={\left[{{\mu_{m1}},\ldots,{\mu_{mL}}}\right]^{\rm{T}}}, m=1,,K/τpm=1,\ldots,\left\lceil{K/{\tau_{p}}}\right\rceil, respectively.

  2. 2.

    Each point selects the centroid

    m=argmin1mK/τp𝐝p𝝁m22,p=1,,Kp,m^{*}=\arg{\min_{1\leq m\leq\left\lceil{K/{\tau_{p}}}\right\rceil}}{\left\|{{{\bf{d}}^{\prime}_{p}}-{{\boldsymbol{\mu}}_{m}}}\right\|^{2}_{2}},\ p=1,\ldots,K_{\rm p}, (42)

    and join the corresponding cluster 𝒞m{\cal C}_{m^{*}}.

  3. 3.

    Each centroid updates its distance vector as

    𝝁m=1|𝒞m|p𝒞m𝐝p,m=1,,K/τp,{{\boldsymbol{\mu}}^{\prime}_{m}}=\frac{1}{{\left|{{{\cal C}_{m}}}\right|}}\sum\limits_{{p}\in{{\cal C}_{m}}}{{{\bf{d}}^{\prime}_{p}}},\ m=1,\ldots,\left\lceil{K/{\tau_{p}}}\right\rceil, (43)

    and go back to step 1), until

    max1mK/τp𝝁m𝝁m22<ε,{\max_{1\leq m\leq\left\lceil{K/{\tau_{p}}}\right\rceil}}{\left\|{{{\boldsymbol{\mu}}^{\prime}_{m}}-{{\boldsymbol{\mu}}_{m}}}\right\|^{2}_{2}}<\varepsilon, (44)

    where ε\varepsilon is a small number.

  4. 4.

    Each UE generates its distance vector 𝐝i=[di1,,diL]T{{\bf{d}}_{i}}={\left[{{d_{i1}},\ldots,{d_{iL}}}\right]^{\rm{T}}}, i=1,,Ki=1,\ldots,{K}.

  5. 5.

    Each UE selects the centroid

    m=argmin1mK/τpdiag(𝐝i)𝐀i𝝁m22,i=1,,K,m^{*}=\arg{\min_{1\leq m\leq\left\lceil{K/{\tau_{p}}}\right\rceil}}{\left\|{{\rm{diag}}\left({{\bf{d}}_{i}}\right){{\bf A}_{\cdot i}}-{{\boldsymbol{\mu}}_{m}}}\right\|^{2}_{2}},\ i=1,\ldots,K, (45)

    and join in the corresponding cluster 𝒞m{\cal C}_{m^{*}}. A competition mechanism similar to the one in Algorithm 1 could be applied if a generic centroid mm is selected by more than τp\tau_{p} UEs. Or more succinctly, each cluster chooses τp\tau_{p} UEs with the smallest values of Dis\rm{Dis} with the corresponding centroid in sequence, until all UEs are allocated into K/τp\left\lceil{K/{\tau_{p}}}\right\rceil disjoint clusters; a UE only can be chosen by one cluster.

  6. 6.

    Find a cluster with τp\tau_{p} UEs and arbitrarily assign the UEs τp\tau_{p} mutually orthogonal pilots. Without loss of generality, we assume |𝒞1|=τp\left|{\cal C}_{1}\right|=\tau_{p} and assign the UEs in 𝒞1{\cal C}_{1} pilots {ϕ1,,ϕτp}\left\{{{\boldsymbol{\phi}}_{1}},\ldots,{{\boldsymbol{\phi}}_{\tau_{p}}}\right\}.

  7. 7.

    Each UE in 𝒞1{\cal C}_{1} finds UE

    i=argmaxi𝒞mdiag(𝐝i)𝐀idiag(𝐝k)𝐀k22,k𝒞1,i^{*}=\arg{\max_{i\in{\cal C}_{m}}}{\left\|{{\rm{diag}}\left({{\bf{d}}_{i}}\right){{\bf A}_{\cdot i}}-{\rm{diag}}\left({{\bf{d}}_{k}}\right){{\bf A}_{\cdot k}}}\right\|^{2}_{2}},\ k\in{\cal C}_{1}, (46)

    in 𝒞m{\cal C}_{m}, m=2,,K/τpm=2,\ldots,\left\lceil{K/{\tau_{p}}}\right\rceil, and shares pilot with this UE. If a UE ii^{*} in 𝒞m{\cal C}_{m} is selected by multiple UEs in 𝒞1{\cal C}_{1}, then only the UE, whose value of Dis\rm{Dis} with UE ii^{*} is the largest, shares pilot with UE ii^{*}; the rest UEs find another UE based on (46), until each UE in the network are assigned a pilot.

The pseudo code of this algorithm is given Algorithm 2.

1
Input: {𝐝k}\left\{{{{\bf{d}}_{k}}}\right\}, {𝐝p}\left\{{{{\bf{d}}^{\prime}_{p}}}\right\}, {𝝁m}\left\{{{{\boldsymbol{\mu}}^{\prime}_{m}}}\right\}, {𝒞m}\left\{{\cal C}_{m}\right\}, ε\varepsilon
2
Output: {ϕk}\left\{{{\boldsymbol{\phi}}_{k}}\right\}
3
4repeat
5       𝝁m𝝁m,m=1,,K/τp{{\boldsymbol{\mu}}_{m}}\leftarrow{{\boldsymbol{\mu}}^{\prime}_{m}},\;m=1,\ldots,\left\lceil{K/{\tau_{p}}}\right\rceil;
6       for  1pKp1\leq p\leq K_{\rm p} do
7             m=argminm𝐝p𝝁m22m^{*}=\arg{\min_{m}}{\left\|{{{\bf{d}}^{\prime}_{p}}-{{\boldsymbol{\mu}}_{m}}}\right\|^{2}_{2}};
8             𝒞m𝒞m{p}{{\cal C}_{m^{*}}}\leftarrow{{\cal C}_{m^{*}}}\cup\left\{p\right\};
9            
10      for  1mK/τp1\leq m\leq\left\lceil{K/{\tau_{p}}}\right\rceil do
11             𝝁m1|𝒞m|p𝒞m𝐝p{{\boldsymbol{\mu}}^{\prime}_{m}}\leftarrow\frac{1}{{\left|{{{\cal C}_{m}}}\right|}}\sum\limits_{{p}\in{{\cal C}_{m}}}{{{\bf{d}}^{\prime}_{p}}};
12            
13      
14until maxm𝛍m𝛍m22<ε\max_{m}{\left\|{{{\boldsymbol{\mu}}^{\prime}_{m}}-{{\boldsymbol{\mu}}_{m}}}\right\|^{2}_{2}}<\varepsilon.;
15𝝁m𝝁m,m=1,,K/τp{{\boldsymbol{\mu}}_{m}}\leftarrow{{\boldsymbol{\mu}}^{\prime}_{m}},\;m=1,\ldots,\left\lceil{K/{\tau_{p}}}\right\rceil;
16 𝒞m,m=1,,K/τp{\cal C}_{m}\leftarrow\emptyset,\;m=1,\ldots,\left\lceil{K/{\tau_{p}}}\right\rceil;
17 UE{1,,K}{\cal L}_{\rm{UE}}\leftarrow\left\{1,\ldots,K\right\};
18 for  1mK/τp1\leq m\leq\left\lceil{K/{\tau_{p}}}\right\rceil do
19       𝒞m=argsortkUEdiag(𝐝k)𝐀k𝝁m22{\cal C}_{m}=\arg{\rm{sort}}_{k\in{\cal L}_{\rm{UE}}}{\left\|{{\rm{diag}}\left({{\bf{d}}_{k}}\right){{\bf A}_{\cdot k}}-{{\boldsymbol{\mu}}_{m}}}\right\|^{2}_{2}};
20       /* =argsorti𝒮xi{\cal I}=\arg{\rm{sort}}_{i\in{\cal S}}{x_{i}} denotes the index set of the entries in {xi:i𝒮}\left\{x_{i}:i\in{\cal S}\right\}, which are sorted in ascending order. */
21       𝒞m𝒞m|1,,τp{\cal C}_{m}\leftarrow{\left.{\cal C}_{m}\right|_{1,\ldots,\tau_{p}}};
22       UEUE/𝒞m{\cal L}_{\rm{UE}}\leftarrow{\cal L}_{\rm{UE}}/{\cal C}_{m};
23      
24{ϕk:k𝒞1}{ϕ1,,ϕτp}\left\{{{\boldsymbol{\phi}}_{k}}:k\in{\cal C}_{1}\right\}\leftarrow\left\{{{\boldsymbol{\phi}}_{1}},\ldots,{{\boldsymbol{\phi}}_{\tau_{p}}}\right\};
25 for  2mK/τp2\leq m\leq\left\lceil{K/{\tau_{p}}}\right\rceil do
26       𝒞1𝒞1{\cal C}^{\prime}_{1}\leftarrow{\cal C}_{1};
27       𝒞m𝒞m{\cal C}^{\prime}_{m}\leftarrow{{\cal C}}_{m};
28       repeat
29             i:i𝒞m{{{\cal L}_{i}}}\leftarrow\emptyset:i\in{\cal C}^{\prime}_{m};
30             for  k𝒞1k\in{\cal C}^{\prime}_{1} do
31                   i=argmaxi𝒞mDisiki^{*}=\arg{\max_{i\in{\cal C}^{\prime}_{m}}}{\rm{Dis}}_{ik};
32                   ii{k}{{{\cal L}_{i^{*}}}}\leftarrow{{{\cal L}_{{i^{*}}}}}\cup\left\{k\right\};
33                  
34            for  (i𝒞m)(|i|0)\left(i\in{\cal C}^{\prime}_{m}\right)\cap\left({{{\left|{\cal L}_{i}\right|}}\neq 0}\right) do
35                   if |i|=1\left|{{{\cal L}_{i}}}\right|=1 then
36                         ϕiϕi{{\boldsymbol{\phi}}_{i}}\leftarrow{{\boldsymbol{\phi}}_{{\cal L}_{i}}};
37                         𝒞1𝒞1/i{\cal C}^{\prime}_{1}\leftarrow{\cal C}^{\prime}_{1}/{{\cal L}_{i}};
38                        
39                  else if |i|>1\left|{{{\cal L}_{i}}}\right|>1 then
40                         k=argmaxkiDisikk^{*}=\arg{\max_{k^{\prime}\in{\cal L}_{i}}}{\rm{Dis}}_{ik^{\prime}};
41                         ϕiϕk{{\boldsymbol{\phi}}_{i}}\leftarrow{{\boldsymbol{\phi}}_{k^{*}}};
42                         𝒞1𝒞1/{k}{\cal C}^{\prime}_{1}\leftarrow{\cal C}^{\prime}_{1}/\left\{k^{*}\right\};
43                        
44                  𝒞m𝒞m/{i}{\cal C}^{\prime}_{m}\leftarrow{\cal C}^{\prime}_{m}/\left\{i\right\};
45                  
46            
47      until 𝒞m={\cal C}^{\prime}_{m}=\emptyset.;
final;
Algorithm 2 IB-KM Pilot Assignment.

One way to view the K-means-type pilot assignment method is that it dynamically divides the network into subareas, defined by the centroids, where each pilot is only used once. From this perspective, the network is divided into cells but we stress that the rest of the processing in the network is performed in cell-free manner. Although the IB-KM pilot assignment scheme separates the UE clusters as far as possible, it operates in the cluster level, or the centroid level. There is still a risk that several cluster-edge UEs served by similar subsets of APs share the same pilot, like UEs sharing Pilot 3 in Fig. 3. In order to further suppress the pilot contamination, we need to separate the UEs sharing the same pilot as far as possible directly at the UE level, which could not be achieved by the above K-means-type pilot assignment scheme since it is centroid-centric. To solve this issue, we propose the following pilot assignment scheme in a user-centric manner.

IV-C User-Group Pilot Assignment Scheme

The User-Group pilot assignment aims to assign mutually orthogonal pilots to the UEs served by similar subsets of APs. The key difference from the IB-KM pilot assignment is that the User-Group pilot assignment finds the UEs having the minimum intersections of i{\cal M}_{i}, (1iK1\leq i\leq K), then put them into the same group, and assign this group an orthogonal pilot, as shown in Fig. 4.

Refer to caption
Figure 4: A cell-free massive MIMO network with User-Group pilot assignment, where 99 UEs are separated into 55 groups. UEs in the same group share the same pilot.

This is reasonable since as we can see in (1), pilot contamination occurs when several UEs that share the same pilot are communicating with the same AP. In other words, based on the proposed AP selection procedure in Section III, the fewer common serving APs the UEs have, the less pilot contamination would be caused if these UEs share the same pilot. Based on point, our proposed User-Group pilot assignment scheme operates through the following steps.

  1. 1.

    The CPU collects the AP selection results {k}\left\{{{{\cal M}_{k}}}\right\} achieved in Section III and structures a matrix 𝐒L×K{\bf S}\in{\mathbb{R}}^{L\times K}, which only keeps the strongest serving relationships between APs and UEs indicated in {𝐀kl}\left\{{\bf A}_{kl}\right\}. Matrix 𝐒{\bf S} is constructed by first sorting the large-scale fading coefficient {βij}\left\{{\beta}_{ij}\right\} whose indices (i,j)\left(i,j\right) with 𝐀ij=1{\bf A}_{ij}=1, in descending order, as

    𝒜¯={βij:𝐀ij=1}.\bar{\cal A}=\left\{{{{\beta}_{ij}}:{\bf A}_{ij}=1}\right\}. (47)

    Then, we keep the first δ|𝒜¯|\left\lceil{\delta\left|{\bar{\cal A}}\right|}\right\rceil βij{\beta}_{ij}s as 𝒜~\tilde{\cal A}, where 0<δ10<\delta\leq 1 is a predetermined threshold determining how many serving relationships will be kept in the matrix 𝐒\bf S, which affects the number of the groups. Finally, the matrix 𝐒{\bf S} is constructed as

    𝐒ij={1ifβij𝒜~0otherwise{{\bf{S}}_{ij}}={\begin{cases}1&{{\rm{if}}\;{\beta_{ij}}\in\tilde{\cal A}}\\ 0&{{\rm{otherwise}}}\end{cases}} (48)
    Refer to caption
    Figure 5: An example of User-Group pilot assignment consisting of 55 UEs and 99 APs. (a) Matrix 𝐒\bf S: AP-UE serving relationship; (b) Matrix 𝐓\bf T: UE-UE interference relationship; (c) Matrix 𝐆\bf G: UE-UE grouping relationship.
  2. 2.

    In order to reveal the inter-user interference relationship among KK UEs, a matrix 𝐓K×K{\bf T}\in{\mathbb{R}}^{K\times K} is structured as

    𝐓=𝐒T𝐒.{\bf T}={\bf S}^{\rm T}{\bf S}. (49)

    The zero-valued entries 𝐓ik{\bf T}_{ik} of the matrix 𝐓{\bf T} indicates that UE kk and UE ii are served by fewest common APs, i.e., ki={{{\cal M^{\prime}}_{k}}\cap{{\cal M^{\prime}}_{i}}=\emptyset}, where k{{\cal M^{\prime}}_{k}} is the set with the nonzero entries in the kkth column of 𝐒{\bf S}. In other words, if UE kk wants to form a group to share a pilot, UE ii could be a potential member. Note that kk{\cal M^{\prime}}_{k}\subset{\cal M}_{k} is only used for user-grouping. Moreover, 𝐓{\bf T} is a symmetric matrix, thus we only focus on the entries above the main diagonal.

  3. 3.

    A matrix 𝐆(K1)×(K1){\bf G}\in{\mathbb{R}}^{(K-1)\times(K-1)} is structured for the following grouping procedure, where the entries in each row of 𝐆{\bf G} are the column indices of the zero entries in the corresponding row of 𝐓{\bf T}, in ascending order. For better elaboration, we present a simple example in Fig. 5, which consists of 55 UEs and 99 APs. It can be observed that the nonzero entries in the first row of matrix 𝐆\bf G are {3,4,5}\left\{3,4,5\right\}, which are the column indices in the first row of matrix 𝐓\bf T.

  4. 4.

    We denote by UE{1,,K}{\cal L}_{\rm{UE}}\subset\left\{{1,\ldots,K}\right\} the set of indices belonging to the UEs which are available to be selected as members of a group. When a UE is forming a group or has been selected as member of another UE, the index of this UE is removed from UE{\cal L}_{\rm{UE}}.

    We denote by 𝒢mk{1,,K}{\cal G}_{m_{k}}\subset\left\{{1,\ldots,K}\right\} the set of indices belonging to the UEs which are the members of the mmth group, which is formed by UE kk. 𝒢mk{\cal G}_{m_{k}} should satisfy

    ij=,i,j𝒢mk.{{\cal M^{\prime}}_{i}}\cap{{\cal M^{\prime}}_{j}}=\emptyset,\;\forall i,j\in{{\cal G}_{m_{k}}}. (50)

    By denoting the set of the nonzero entries in the kkth row of matrix 𝐆{\bf G} as k{\cal R}_{k}, the equivalent constraint in (50) can be depicted as if (i,jk)(ji)(i,j\in{\cal R}_{k})\cap(j\notin{\cal R}_{i}), then j𝒢mkj\notin{\cal G}_{m_{k}}.

    Note that the last UE, i.e., UE KK needs to be dealt with as a special case since the diagonal entries of matrix 𝐓\bf T are always positive. If UE KK is not selected by any group until the end of the grouping procedure, it forms a group by its own. The algorithm initiates with UE={1,,K}{\cal L}_{\rm{UE}}=\left\{1,\ldots,K\right\} and {𝒢m=}\left\{{\cal G}_{m}=\emptyset\right\}, where |{𝒢m}|K\left|\left\{{\cal G}_{m}\right\}\right|\leq K.

TABLE II: Reference initial value of δ\delta used in bisection method (K=40K=40).
τp=4\tau_{p}=4 τp=6\tau_{p}=6 τp=8\tau_{p}=8 τp=10\tau_{p}=10
L=121L=121 0.240.24 0.270.27 0.300.30 0.320.32
L=196L=196 0.210.21 0.230.23 0.250.25 0.270.27

The grouping procedure separates the KK UEs into MM disjoint groups for a given threshold δ\delta, thus we need to adjust δ\delta to achieve M=τpM=\tau_{p}. Bisection method could be applied on δ\delta to obtain the desired M=τpM=\tau_{p} dynamically, since |k|\left|{\cal M}_{k}\right|, k=1,,Kk=1,\ldots,K reduces (i.e., the circle in Fig. 4 shrinks) as the threshold δ\delta reduces, which increase the chance of ik=,i,k{1,,K}{\cal M^{\prime}}_{i}\cap{\cal M^{\prime}}_{k}=\emptyset,\forall i,k\in\left\{{1,\ldots,K}\right\}. We give some reference initial value of δ\delta used in bisection method with several setups in Table II. The pseudo code of this algorithm is Algorithm 3.

IV-D Online Complexity Analysis

The random pilot assignment operates over KK UEs where each UE randomly chooses a pilot, hence, the corresponding complexity is 𝒪(K)\mathcal{O}(K). IB-KM operates in two steps, i.e., locating K/τp\left\lceil{K/{\tau_{p}}}\right\rceil centroids and assigning KK UEs to these clusters. Since the locations of the centroids are determined by the geographic locations of the APs, which is a-priori known at the CPU, the first step of IB-KM could be finished offline before the transmission commences, and can therefore be neglected when counting the online complexity. The complexity of IB-KM depends on the second step, in which each UE selects its centroid based on the distances between it and all K/τp\left\lceil{K/{\tau_{p}}}\right\rceil centroids. Each UE in 𝒞1{\cal C}_{1} finds one unique UE from each of the other K/τp1\left\lceil{K/{\tau_{p}}}\right\rceil-1 clusters to share its pilot. Therefore, the complexity of the IB-KM becomes 𝒪(K2/τp+τp2(K/τp1))\mathcal{O}\left(K^{2}/\tau_{p}+\tau_{p}^{2}\left(\left\lceil{K/{\tau_{p}}}\right\rceil-1\right)\right). User-Group requires computation of the matrices 𝐒\bf S, 𝐓\bf T, and 𝐆\bf G. Note that only the entries above the main diagonal of matrix 𝐓\bf T are exploited to construct the matrix 𝐆\bf G. Therefore, the complexity of User-Group becomes 𝒪(KL+K2L+K/2)\mathcal{O}\left(KL+K^{2}L+K/2\right). For the considered massive access cell-free massive MIMO system, the number of pilots is far smaller than the number of APs and UEs, i.e., LKτpL\approx K\gg\tau_{p} is satisfied. Thus, the IB-KM scheme has a much more attractive complexity scaling than the User-Group scheme.

1
Input: {k}\left\{{\cal R}_{k}\right\}, UE{\cal{L}}_{\rm{UE}}, {𝒢m}\left\{{\cal G}_{m}\right\}, τp\tau_{p}, δ\delta, δmin\delta_{\rm{min}}, δmax\delta_{\rm{max}}
2
Output: {𝒢m:m{1,,K}}\left\{{{{\cal G}_{m}}:m\in\left\{1,\ldots,K\right\}}\right\}
3
4repeat
5       1{\mathcal{F}}\leftarrow 1;
6       m0m\leftarrow 0;
7       repeat
8             mm+1m\leftarrow m+1;
9             iUE(1)i^{*}\leftarrow{\cal L}_{\rm{UE}}\left(1\right);
10             if i=Ki^{*}=K then
11                   𝒢m{K}{\mathcal{G}}_{m}\leftarrow\left\{{K}\right\};
12                   0{\mathcal{F}}\leftarrow 0;
13                  
14            𝒢m{i}{\mathcal{G}}_{m}\leftarrow\left\{{i^{*}}\right\};
15             UEUE/{i}{{\cal L}_{{\rm{UE}}}}\leftarrow{{\cal L}_{{\rm{UE}}}}/\left\{{{i^{*}}}\right\};
16             kk/{i},kUE{{\cal R}_{k}}\leftarrow{{\cal R}_{k}}/\left\{{i^{*}}\right\},\forall k\in{{\cal L}_{{\rm{UE}}}};
17             repeat
18                   ji(1)j^{*}\leftarrow{\cal R}_{i^{*}}\left(1\right);
19                   if j=Kj^{*}=K then
20                         0{\mathcal{F}}\leftarrow 0;
21                        
22                  𝒢m𝒢m{j}{\mathcal{G}}_{m}\leftarrow{\mathcal{G}}_{m}\cup\left\{{j^{*}}\right\};
23                   iij{\cal R}_{i^{*}}\leftarrow{\cal R}_{i^{*}}\cap{\cal R}_{j^{*}};
24                   UEUE/{j}{{\cal L}_{{\rm{UE}}}}\leftarrow{{\cal L}_{{\rm{UE}}}}/\left\{{{j^{*}}}\right\};
25                   kk/{j},kUE{{\cal R}_{k}}\leftarrow{{\cal R}_{k}}/\left\{{j^{*}}\right\},\forall k\in{{\cal L}_{{\rm{UE}}}};
26                  
27            until i={\cal{R}}_{i^{*}}=\emptyset;
28      until UE={\cal{L}}_{\rm{UE}}=\emptyset;
29      if =1{\mathcal{F}}=1 then
30             mm+1m\leftarrow m+1;
31             𝒢m{K}{\mathcal{G}}_{m}\leftarrow\left\{{K}\right\};
32            
33      MmM\leftarrow m;
34       if M=τpM=\tau_{p} then
35             for 1mM1\leq m\leq M do
36                   ϕkϕm,k𝒢m{{\boldsymbol{\phi}}_{k}}\leftarrow{{\boldsymbol{\phi}}_{m}},k\in{\cal G}_{m};
37                  
38            break;
39            
40      else if G<τpG<\tau_{p} then
41             δminδ\delta_{\rm{min}}\leftarrow\delta;
42            
43      else
44             δmaxδ\delta_{\rm{max}}\leftarrow\delta;
45            
46      δ(δmin+δmax)/2\delta\leftarrow\left({\delta_{\rm{min}}+\delta_{\rm{max}}}\right)/2;
47      
48until break;
final;
Algorithm 3 User-Group Pilot Assignment Algorithm.

V Scalable Fractional Power Control

In practical implementations, a power control policy with scalability and low complexity is needed. Inspired by [33], we propose a scalable fractional power control policy for data transmission, which locally minimizes the variance of the large-scale signal-interference ration (SIR), i.e.,

SIRk=pk(lkβkl)2i=1,ikKpilkβklβil.{\rm SIR}_{k}=\frac{{{p_{k}}{{\left({\sum\limits_{l\in{{\cal M}_{k}}}{{\beta_{kl}}}}\right)}^{2}}}}{{\sum\limits_{i=1,i\neq k}^{K}{{p_{i}}\sum\limits_{l\in{{\cal M}_{k}}}{{\beta_{kl}}}{\beta_{il}}}}}. (51)

Note that (51) is derived from [33, Eq. (18)], where the local-average desired signal power only consists of the large-scale fading coefficients of the APs selected by UE kk.

Lemma 3.

The data transmission power pkp_{k} for UE kk is

pk=η(lkβkl)θp¯,{p_{k}}=\frac{\eta}{{{{\left({\sum\limits_{l\in{{\cal M}_{k}}}{{\beta_{kl}}}}\right)}^{\theta}}}}\bar{p}, (52)

where the scaling η\eta is given by

η=min1iK(liβil)θ,\eta={\min_{1\leq i\leq K}}{\left({\sum\limits_{l\in{{\cal M}_{i}}}{{\beta_{il}}}}\right)^{\theta}}, (53)

and the parameter θ[0,1]\theta\in\left[{0,1}\right] indicates the extent to which the range of the received powers is compressed. Smaller values of θ\theta favor the average SIR and larger values of θ\theta promote more fairness.

Proof:

It follows the similar approach as in [33, App. A], but for the local-average desired signal power as lkβkl{\sum\limits_{l\in{{\cal M}_{k}}}{{\beta_{kl}}}}. ∎

VI Numerical evaluation

In this section, we evaluate the proposed massive access framework and validate the closed-form SE expressions provided in Lemma 2. We consider a setup with L=100L=100 APs and where KK UEs are independently and uniformly distributed in a 0.5 km×0.50.5\textrm{ km}\times 0.5 km square coverage area. The APs could be deployed on a square grid or randomly; all APs are equipped with half-wavelength-spaced uniform linear arrays with N=4N=4 antennas. We apply the wrap-around technique to approximate an infinitely large network with 16001600 antennas/km2.

We apply the access and AP selection algorithm proposed in Section III when the UEs access the network. Pilots are assigned according to the pilot assignment schemes described in Section IV. The 3GPP Urban Microcell model in [34, Tab. B.1.2.1-1] is used to compute the large-scale propagation conditions, such as pathloss and shadow fading. Beyond that, we adopt the same system setup parameters as in [12], where the maximum UE transmit power is p¯=100\bar{p}=100 mW, the bandwidth is 2020 MHz, and the coherence blocks contain τc=200\tau_{c}=200 channel uses, which could be achieved by 22 ms coherence time and 100100 kHz coherence bandwidth (there are many possible combinations). Unless specified, τp=10\tau_{p}=10 channel uses are utilized for uplink pilots and the remainder is used for downlink data. Each UE transmits the pilot signal with full power pk=p¯p_{k}=\bar{p}, and exploits the power control during the uplink data transmission. In the figures, we use “User-Group”, “IB-KM”, “GB-KM”, “Random”, “Switch”, and “Scalable” to denote the User-Group pilot assignment, IB-KM pilot assignment, GB-KM pilot assignment, random pilot assignment, random pilot switch, and the initial access and pilot assignment scheme proposed in [16], respectively.

Refer to caption
Figure 6: 95%-likely SE with different combinations of initial access algorithms, pilot assignment schemes, and numbers of UEs (LP-MMSE combining, P-LSFD, θ=1\theta=1).

In order to evaluate the performance of our proposed scalable initial access algorithm, we first consider a benchmark algorithm where each AP serves the τp\tau_{p} UEs with the strongest channel conditions. To mimic a practical scenario, we consider the random deployment of APs in this comparison. Fig. 6 compares the proposed initial access algorithm and benchmark algorithm in 95%-likely SE with K=40K=40 and K=60K=60 UEs. The first observation is that the proposed initial access algorithm outperforms the benchmark algorithm, for all the four considered pilot assignment schemes and in both setups (K=40K=40 and K=60K=60). The reason is that the competition mechanism in the proposed initial access algorithm allows each UE to be served by as many APs as possible, at the precondition of satisfying Assumption 1. When comparing Fig. 6(a) and Fig. 6(b), we notice that the advantage of the proposed competition mechanism gets less prominent when the number of UEs gets larger, and each UE can only get limited service for both cases due to the high UE density. When the APs are deployed on a square grid, the advantage of the competition mechanism compared with the benchmark becomes limited; however, the sum SE of the network is improved by the reduction of the low-rate UEs. Therefore, we apply the grid deployment for the APs in the following numerical results.

Refer to caption
Figure 7: SE per UE with different combinations of pilot assignment schemes and numbers of UEs (LP-MMSE combining, P-LSFD, θ=1\theta=1).

Fig. 7 depicts the cumulative distribution function (CDF) of the SE per UE when the LP-MMSE combining and the proposed P-LSFD in (18) are applied. We compare the proposed User-Group pilot assignment scheme and IB-KM pilot assignment scheme with three benchmarks, which are the GB-KM pilot assignment, random pilot assignment, and the scheme proposed in [16], respectively. In both setups (k=50k=50 and K=100K=100), It can be observed from Fig. 7(a) that the User-Group and IB-KM schemes achieve better performance than the benchmarks except the Scalable scheme, which provides better performance than IB-KM scheme while falls behind User-Group scheme. More specifically, Fig. 7(b) shows that compared with GB-KM, User-Group achieves 14.2%14.2\% and 22.4%22.4\% improvement in 95%-likely SE for the cases of K=50K=50 and K=100K=100, respectively; IB-KM achieves 5.1%5.1\% and 5.9%5.9\% improvement in 95%-likely SE in these two setups, respectively. Moreover, compared with Scalable, User-Group achieves 2.3%2.3\% and 8.1%8.1\% improvement in 95%-likely SE in these two setups, respectively. When comparing the two setups, we observe that the large density of UEs benefits the improvement of the proposed User-Group and IB-KM schemes. The reason behind this is the User-Group and IB-KM schemes are dedicated to suppressing the inter-user interference, which is much stronger in a massive access scenario.

Refer to caption
Figure 8: 95%-likely SE with different combinations of data decoding strategies and numbers of UEs (LP-MMSE combining, User-Group pilot assignment, θ=1\theta=1).

The performance of the proposed P-LSFD is evaluated through Fig. 8. Since we focus on the performance loss of P-LSFD comparing with LSFD, we consider the 95%-likely SE of the User-Group scheme with LP-MMSE combining for the setups of K=30,40,50,60K=30,40,50,60 UEs, respectively. Among these four setups, we notice that the P-LSFD achieves roughly the same 95%-likely SE. The performance loss of P-LSFD compared to LSFD increases as the number of UEs increases, due to the fact that each AP can only serve a maximum of number of UEs, thus an increasing number of UEs leads to fewer serving APs per UE. However, the largest performance loss in this comparison is only 1.8%1.8\% when K=60K=60, which implies that the scalability on P-LSFD can be achieved with a negligible performance loss.

Refer to caption
Figure 9: Fairness and average SE with different combinations of pilot assignment schemes and power control parameters, (LP-MMSE combining, P-LSFD, K=50K=50).

Fig. 9 illustrates the proposed scalable fractional power control policy in fairness and average SE for the setup of K=50K=50, respectively. Note that the scalable fractional power control policy comprises the so-called equal power allocation by letting θ=0\theta=0. Furthermore, the fairness is measured by the difference between the maximum and minimum values of the SE, i.e., SEmaxSEmin{\rm{SE}}_{\rm{max}}-{\rm{SE}}_{\rm{min}}. It can be observed from Fig. 7(a) that larger values of θ\theta promotes more fairness among the UEs. Since for one UE, the disadvantage in the large-scale fading coefficients between its serving APs will be compensated with the transmission power. According to (52), the larger the value of θ\theta is, the lager the compensation is. Another observation is that SEmaxSEmin{\rm{SE}}_{\rm{max}}-{\rm{SE}}_{\rm{min}} is insensitive with respect to the number of UEs. Moreover, Fig. 7(b) shows that smaller values of θ\theta improves the average SE since the transmission power of each UE in the network approaches to the maximum power p¯\bar{p} as θ0\theta\to 0. It is clear to see that the average SE decreases as the number of UEs increases, because the strong inter-user interference caused by the high density of UEs accessing the network with limited pilots. When comparing the four pilot assignment schemes, it is clear that the proposed User-Group and IB-KM schemes outperform the GB-KM and random methods in both terms of UEs fairness and average SE.

Refer to caption
Figure 10: SE per UE with different combinations of pilot assignment schemes and numbers of UEs (MR combining, P-LSFD, θ=0\theta=0).
Refer to caption
Figure 11: 95%-likely SE with different combinations of pilot assignment schemes and numbers of pilots (MR combining, P-LSFD, K=50K=50, θ=0\theta=0).

Since we have demonstrated the proposed scalable P-LSFD strategy, fractional power control policy, and pilot assignment schemes perform well with LP-MMSE combining, the following results focus on the performance with MR combining, the impact of the number of the pilots, and the tightness of the closed-form SE expression provided in Lemma 2, which are marked with “(User-Group*)” in Fig. 10. The curve “Switch” is plotted based on the analytical results obtained from Corollary 1. The first observation is that the performance gap between the random pilot switching and other pilot assignment schemes is large. The reason is that the strong mutual interference only occasionally occurs when two pilot-sharing UEs are close to each other, when the random pilot assignment is used; however, in random pilot switching, all UEs are subject to strong pilot contamination part of the time. Each UE switches its pilot sequence randomly over blocks and consequently nearby UEs are possibly sharing the same pilots. It is significant that the analytical results from Lemma 2 achieve remarkable tightness compared with the simulation results. Compared with Fig. 7, it can be observed that LP-MMSE combining achieves much better SE performance than the one of MR combining due to the advanced signal processing. Moreover, Fig. 11 demonstrates the impact of the number of pilots, in which we can observe the improved user fairness and the 95%-likely SE with more pilot resources, i.e., in the setup of τp=25\tau_{p}=25. Since the bottleneck of the performance improvement is the strong pilot contamination caused by the pilot resource limitation, every UE in the system could obtain better service when this limitation is alleviated.

VII Conclusion

When scalability is considered in the uplink of cell-free massive MIMO systems, structured massive access provides a new opportunity to achieve higher SE to more users. The bottleneck of structured massive access, i.e., the pilot contamination caused by pilot sharing, was much relieved by the proposed scalable initial access algorithm, User-Group, and IB-KM pilot assignment schemes in our framework. The SE with LP-MMSE and MR combining was considered to evaluate this framework, where the user density and fairness among UEs were taken into account. Two new closed-form SE expressions with MR combining were derived. Although the analysis focused on the uplink, similar results could be expected in the downlink due to the channel reciprocity. Since the proposed schemes make use of the geometry, they can also be applied in cases with multi-antenna UEs, but the exact details are left for future work. They can also be applied in a wider class of fading distributions than Rayleigh fading.

The simulation results show that our proposed framework performs well compared to the state-of-the-art. Specifically, our proposed initial access algorithm enables each UE to be served by as many APs as possible at the precondition of scalability. Compared with the optimal LSFD, the 95%-likely SE reduces as the user density increases when using the proposed P-LSFD, but it is marginal (1.7% when K=60K=60) and thus an acceptable price of scalability. By actively suppressing the inter-user interference, the proposed User-Group and IB-KM pilot schemes offer 22.4%22.4\% and 5.9%5.9\% improvement in 95%-likely SE, compared to GB-KM scheme (K=100K=100), respectively; User-Group scheme offers 8.1%8.1\% improvement in 95%-likely SE compared to Scalable scheme (K=100K=100). Moreover, the User-Group algorithm is performed in a user-centric manner, which makes it capable of offering higher SE performance than IB-KM, especially when the scenario gets dense. Finally, the proposed scalable fractional power control provides the trade-off of the fairness among the users and the average SE.

This paper provides a feasible solution for structured massive access in cell-free massive MIMO systems. Although we focus on the SE performance with user density and fairness into account, it is straightforward to generalize the framework to also study other important factors, such as energy efficiency, hardware impairment, limited fronthaul capacity, etc.

References

  • [1] T. L. Marzetta, “Noncooperative cellular wireless with unlimited numbers of base station antennas,” IEEE Trans. Wireless Commun., vol. 9, no. 11, pp. 3590–3600, Nov. 2010.
  • [2] E. G. Larsson, O. Edfors, F. Tufvesson, and T. L. Marzetta, “Massive MIMO for next generation wireless systems,” IEEE Commun. Mag., vol. 52, no. 2, pp. 186–195, Feb. 2014.
  • [3] V. W. Wong, Key technologies for 5G wireless systems.   Cambridge university press, 2017.
  • [4] J. G. Andrews, S. Buzzi, W. Choi, S. V. Hanly, A. Lozano, A. C. Soong, and J. C. Zhang, “What will 5G be?” IEEE J. Sel. Areas Commun., vol. 32, no. 6, pp. 1065–1082, Jun. 2014.
  • [5] S. Parkvall, E. Dahlman, A. Furuskar, and M. Frenne, “NR: The new 5G radio access technology,” IEEE Commun. Standards Mag., vol. 1, no. 4, pp. 24–30, Apr. 2017.
  • [6] J. Zhang, E. Björnson, M. Matthaiou, D. W. K. Ng, H. Yang, and D. J. Love, “Prospective multiple antenna technologies for beyond 5G,” IEEE J. Sel. Areas Commun., to appear, 2020.
  • [7] H. Q. Ngo, A. Ashikhmin, H. Yang, E. G. Larsson, and T. L. Marzetta, “Cell-free massive MIMO versus small cells,” IEEE Trans. Wireless Commun., vol. 16, no. 3, pp. 1834–1850, Mar. 2017.
  • [8] E. Nayebi, A. Ashikhmin, T. L. Marzetta, H. Yang, and B. D. Rao, “Precoding and power optimization in cell-free massive MIMO systems,” IEEE Trans. Wireless Commun., vol. 16, no. 7, pp. 4445–4459, Jul. 2017.
  • [9] G. Interdonato, E. Björnson, H. Q. Ngo, P. Frenger, and E. G. Larsson, “Ubiquitous cell-free massive MIMO communications,” EURASIP J. Wireless Commun. Netw., vol. 2019, no. 1, p. 197, Jan. 2019.
  • [10] J. Zhang, S. Chen, Y. Lin, J. Zheng, B. Ai, and L. Hanzo, “Cell-free massive MIMO: A new next-generation paradigm,” IEEE Access, vol. 7, pp. 99 878–99 888, Jul. 2019.
  • [11] H. Q. Ngo, L.-N. Tran, T. Q. Duong, M. Matthaiou, and E. G. Larsson, “On the total energy efficiency of cell-free massive MIMO,” IEEE Trans. Green Commun. Netw., vol. 2, no. 1, pp. 25–39, Jan. 2017.
  • [12] E. Björnson and L. Sanguinetti, “Making cell-free massive MIMO competitive with MMSE processing and centralized implementation,” IEEE Trans. Wireless Commun., vol. 19, no. 1, pp. 77–90, Jan. 2019.
  • [13] J. Zhang, Y. Wei, E. Björnson, Y. Han, and S. Jin, “Performance analysis and power control of cell-free massive MIMO systems with hardware impairments,” IEEE Access, vol. 6, pp. 55 302–55 314, Sep. 2018.
  • [14] S. Buzzi and C. D’Andrea, “Cell-free massive MIMO: User-centric approach,” IEEE Wireless Commun. Lett., vol. 6, no. 6, pp. 706–709, Dec. 2017.
  • [15] G. Interdonato, P. Frenger, and E. G. Larsson, “Scalability aspects of cell-free massive mimo,” in Proc. IEEE ICC, 2019, pp. 1–6.
  • [16] E. Björnson and L. Sanguinetti, “Scalable cell-free massive MIMO systems,” IEEE Trans. Commun., to appear, 2020.
  • [17] E. Björnson, J. Hoydis, L. Sanguinetti et al., “Massive MIMO networks: Spectral, energy, and hardware efficiency,” Foundations and Trends® in Signal Processing, vol. 11, no. 3-4, pp. 154–655, 2017.
  • [18] E. De Carvalho, E. Bjornson, J. H. Sorensen, P. Popovski, and E. G. Larsson, “Random access protocols for massive MIMO,” IEEE Commun. Mag., vol. 55, no. 5, pp. 216–222, May 2017.
  • [19] C. Sun, X. Gao, S. Jin, M. Matthaiou, Z. Ding, and C. Xiao, “Beam division multiple access transmission for massive MIMO communications,” IEEE Trans. Commun., vol. 63, no. 6, pp. 2170–2184, Jun. 2015.
  • [20] H. Lin, F. Gao, S. Jin, and G. Y. Li, “A new view of multi-user hybrid massive MIMO: Non-orthogonal angle division multiple access,” IEEE J. Sel. Areas Commun., vol. 35, no. 10, pp. 2268–2280, Oct. 2017.
  • [21] E. De Carvalho, E. Björnson, J. H. Sørensen, E. G. Larsson, and P. Popovski, “Random pilot and data access in massive MIMO for machine-type communications,” IEEE Trans. Wireless Commun., vol. 16, no. 12, pp. 7703–7717, Dec. 2017.
  • [22] J. H. Sørensen, E. De Carvalho, Č. Stefanovic, and P. Popovski, “Coded pilot random access for massive MIMO systems,” IEEE Trans. Wireless Commun., vol. 17, no. 12, pp. 8035–8046, Dec. 2018.
  • [23] A. Fengler, G. Caire, P. Jung, and S. Haghighatshoar, “Massive MIMO unsourced random access,” CoRR, vol. abs/1901.00828, 2019. [Online]. Available: https://arxiv.org/abs/1901.00828.
  • [24] X. Chen, Z. Zhang, C. Zhong, R. Jia, and D. W. K. Ng, “Fully non-orthogonal communication for massive access,” IEEE Trans. Commun., vol. 66, no. 4, pp. 1717–1731, Apr. 2018.
  • [25] X. Shao, X. Chen, and R. Jia, “A dimension reduction-based joint activity detection and channel estimation algorithm for massive access,” IEEE Trans. Signal Process., vol. 68, pp. 420–435, 2020.
  • [26] X. Wang, A. Ashikhmin, and X. Wang, “Wirelessly powered cell-free IoT: Analysis and optimization,” IEEE Internet Things J., to appear, 2020.
  • [27] E. Nayebi, A. Ashikhmin, T. L. Marzetta, and B. D. Rao, “Performance of cell-free massive MIMO systems with MMSE and LSFD receivers,” in Proc. IEEE 50th Asilomar Conf. Signals, Syst. Comput., 2016, pp. 203–207.
  • [28] F. Rezaei, A. R. Heidarpour, C. Tellambura, and A. Tadaion, “Underlaid spectrum sharing for cell-free massive MIMO-NOMA,” IEEE Commun. Lett., vol. 24, no. 4, pp. 907–911, 2020.
  • [29] H. Liu, J. Zhang, X. Zhang, A. Kurniawan, T. Juhana, and B. Ai, “Tabu-search based pilot assignment for cell-free massive mimo systems,” IEEE Trans. Veh. Tech., vol. 69, no. 2, pp. 2286–2290, 2020.
  • [30] M. Attarifar, A. Abbasfar, and A. Lozano, “Random vs structured pilot assignment in cell-free massive MIMO wireless networks,” in Proc. IEEE ICC Workshops, 2018, pp. 1–6.
  • [31] E. Björnson, L. Sanguinetti, and M. Kountouris, “Deploying dense networks for maximal energy efficiency: Small cells meet massive mimo,” IEEE J. Sel. Areas Commun., vol. 34, no. 4, pp. 832–847, Apr. 2016.
  • [32] Ö. Özdogan, E. Björnson, and J. Zhang, “Performance of cell-free massive MIMO with rician fading and phase shifts,” IEEE Trans. Wireless Commun., vol. 18, no. 11, pp. 5299–5315, Nov. 2019.
  • [33] R. Nikbakht and A. Lozano, “Uplink fractional power control for cell-free wireless networks,” in Proc. IEEE ICC, 2019, pp. 1–5.
  • [34] 3GPP, “Further advancements for E-UTRA physical layer aspects (release 9),” 3GPP TS 36.814, Mar. 2017.