Next Article in Journal
Correction: Mohamed et al. Gusts Encountered by Flying Vehicles in Proximity to Buildings. Drones 2023, 7, 22
Previous Article in Journal
Joint Beamforming and Phase Shift Design for Hybrid IRS and UAV-Aided Directional Modulation Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Drone-Aided Networking with Massive Connectivity and High Spectral Efficiency Enabled

1
School of Software, Northwestern Polytechnical University, Xi’an 710072, China
2
School of Microelectronics, Northwestern Polytechnical University, Xi’an 710072, China
*
Authors to whom correspondence should be addressed.
Drones 2023, 7(6), 363; https://doi.org/10.3390/drones7060363
Submission received: 16 May 2023 / Revised: 26 May 2023 / Accepted: 28 May 2023 / Published: 30 May 2023
(This article belongs to the Section Drone Communications)

Abstract

:
Drone-aided networking is considered a potential candidate for internet of things (IoT) networking in 5G and beyond, where drones are deployed to serve a large number of devices simultaneously for data collection, surveillance, remote sensing, etc. However, challenges arise due to massive connectivity requests as well as limited power budgets. To this end, this paper focuses on the design of drone-aided IoT networking, where a drone access point serves a large number of devices for efficient data transmission, collection, and remote sensing. Constant envelope signaling such as minimum shift keying (MSK) family is considered to avoid potential significant power inefficiency due to nonlinear distortion. To this end, code-domain non-orthogonal multiple access (NOMA) is developed and analyzed in terms of achievable sum spectral efficiency. Further, power allocation is derived based on the aforementioned analysis and is demonstrated to offer significantly improved performance in terms of sum spectral efficiency and user load. Simulation results confirm the feasibility of the proposed design and shows that the designed system can attain the promised performance using either simple convolutional code or complex polar code. The proposed system can be used in scenarios such as deep space communications, where MSK family signaling is adopted as well.

1. Introduction

The fifth generation (5G) and beyond is expected to significantly improve the spectral efficiency while supporting billions of devices globally in the near future [1]. This is envisioned as the massive machine type communications (mMTC), a typical internet of things (IoT) scenario that has emerged in smart homes, industrial automation, integrated IoTs, etc. [2], where drone-aided IoT (DIoT) netwoking has recently proved to be a promising technique [3]. However, challenges to deploy DIoT have arisen [4,5]. One such problem is to enable ultra-dense IoT networking based on minimum shift-keying (MSK) signaling, which is widely adopted in IoT standards including IEEE 802.15 series and drone data-link standard [2,6].
One of the prominent enablers is nonorthogonal multiple access (NOMA), where users (devices) are differenated using a signature in power domain or code domain [7]. The choice of signatures gives birth to a variants of renowned NOMAs. For example, in [8,9], the authors demonstrated the optimality of using simple forward error corrections (FECs) such as convolutional codes alone as the signature and suggested dedicating the whole redundancy to coding gain for maximum interference mitigation. However, this gain is harvested using maximum-likelihood detection (MLD), which has prohibitively high costs in practice. Fortunately, the complexity is successfully reduced if interference cancellation applies [10,11]. These results inspired the development of diverse code domain NOMAs for large scale systems, where the signature is typically a concatenation of high rate FEC and repetition (REP) coding (or spreading equivalently) [12]. Though it provides no coding gain, REP is considered indispensable for effective multiuser interference (MUI) mitigation and high user loads [13]. However, such benefits are collected at the expense of extremely low spectral efficiency (SE) of each individual, which is identified as the coding-spreading dilemma in NOMAs that potentially undermines the application of NOMA in 5G and beyond [7,14]. Some recent proposals addressed this issue by designing REP-free schemes [15,16]. Though the individual SE is improved, not to mention the non-scalability of the designs, the user load is reduced drastically. The coding–spreading tradeoff deserves further treatment.
Another issues arises as IoT evolves to integrate arial platforms to offer seamless coverage globally [7]. In such a system, low power consumption is desirable since the platforms have very limited access to sustainable power supplies, such as sensors, drones, satellites etc. [17]. Therefore, standards concerning low power IoT networking favor continuous phase modulation (CPM) over conventional schemes such as phase shift keying (PSK) for improved power efficiency [18,19,20]. As a special case of CPM, minimum shift keying (MSK) has been recognized as one of the major waveforms for low power IoT networking [21,22]. The development of MSK-based NOMA gained extensive attention in the context of frequency division multiple access (FDMA) [23,24,25,26]. As the term FDMA implies, users are allocated to different frequency bands separated by frequency-spacing. Therefore, it comes as no surprise that the MUI rapidly becomes irremediable as the frequency spacing approaches zero, i.e., multi channels collapse to a single channel even when the user load barely exceeds two [23]. In this sense, FDMA-CPM can hardly be employed in mMTC.
Though it appears that MSK-based massive IoT networking has not been well established yet, we notice that NOMA and FDMA-CPM are complementary, i.e., the former offers high user load but experiences low individual SE while the latter is exactly the contrary. It is natural to wonder about the possibility of designing a NOMA scheme that has the advantages while avoiding the shortcomings. This motivates the development of nonorthogonal coded modulation (NCM), a potentially massive connectivity enabler for MSK-based low power IoT networking. Some of the research, along with their research focus and limitations, are shown in Table 1.
As can be seen from the discussion presented later, the motivation is well fulfilled. More appealingly, the proposed NCM outperforms NOMA and FDMA-CPM due to the following properties:
  • High SE. The proposed NCM offers sum SE and individual SE up to 15 bits/s/Hz and 0.5 bits/s/Hz, respectively, while the gap to multiple access channel (MAC) capacity is narrowed down to 2 dB in all cases considered.
  • Low latency. Low latency is naturally obtained due to the high code rate and is further enhanced using low complexity FECs such as ( 7 , 5 ) 8 -CC or ( 2 , 1 ) -REP to keep the processing delay as short as possible.
  • Scalability. The proposed design criteria are put forward in terms of signal shaping, consisting of ideal power allocation (IPA) and phase spacing technique (PST), that is proven to offer near-capacity performance irrespective of the varying user load K.
Though the proposed NCM is exemplified using CC and MSK, the results show that the design can be applied to linear block FECs such as polar code [27] and partial response signaling such as Gaussian MSK (GMSK). It did not came to our attention that similar schemes have been previously addressed. The rest of this paper consists of five sections. In Section 2, we present the system model of NCM. In Section 3, we derive the iterative receiver. In Section 4, we present IPA and PST. In Section 5, we present numerical results, and Section 6, concludes the paper.

2. Nonorthogonal Coded Modulation

In Figure 1a, two typical DoT networks are demonstrated where a drone is used to collect data or perform remote sensing in smart cities and agriculture based on massively deployed sensors and devices. The equivalent parameterized model is presented in Figure 1b.

2.1. Introduction to NCM

Without loss of generality, the whole process is exemplified using the k-th user as depicted in Figure 1b. On the transmitter side, the L-bits long information b k = b k ( l ) { 0 , 1 } 1 × L is first encoded by a FEC of rate R = L / N , producing an N-bits long codeword c k = c k ( n ) { 0 , 1 } 1 × N . Then, c k passes through an interleaver Π k , generating the sequence c k = c k ( n ) { 0 , 1 } 1 × N fed to MSK modulation. The resultant MSK signal x k n t is expressed as
x k n t = E k T exp [ j ψ ( t , c k ( n ) ) + j θ k ] .
where E k is the energy per transmitted symbol, θ k is the phase offset, T is the symbol duration, and t ( n T , ( n + 1 ) T ] . The collection of all possible x k n ( t ) is defined as the alphabet X k .
The information-bearing phase ψ ( t , c k ( n ) ) admits a titled-phase expression as [28]
ψ ( t , c k ( n ) ) = 2 π h i = 1 n 1 c k ( i ) + 4 π h c k ( n ) q ( t ) mod 2 π
where h = 0.5 and q ( τ ) = ( t n T ) / 2 T . Just as indicated in (2), ψ ( t , c k ( n ) ) is partial response, as is x k n t . MSK modulation is thus well described by a trellis T , whose state-space is S { s s = 2 π h i = 0 n 1 c k ( i ) mod 2 π } . As should be noticed, s S takes only two possible values: 0 and π .
It is worth mentioning that the interleaving and signal shaping—the shaded blocks in Figure 1b—are combined jointly to facilitate the user separation at the receiver side. In this paper, we are more concerned with the shaping technique, while the interleavers are randomly generated with no special design.

2.2. Multiple Access Channel

Assuming user load K, the received signal reads
r n ( t ) = x k n ( t ) + m = 1 , m k K x m n ( t ) + ν n ( t ) Interference plus noise : η k n ( t )
where ν n ( t ) is additive white Gaussian noise (AWGN) with N 0 / 2 being the double-sided power spectral density (PSD) and i = 1 , i k K x i ( t ) is the multiuser interference experienced by the k-th user. They jointly constitute the interference-plus-noise η k n ( t ) . With the aid of orthogonal decomposition obtained from principal component analysis (PCA) [28], an equivalent discrete expression is obtained
r n = x k n + η k n
where r n = r n ( 1 ) , , r n ( d ) , x k n = x k n ( 1 ) , , x k n ( d ) , and η k n = η k n ( 1 ) , , η k n ( d ) are vectors in C d .
Based on the Gaussian assumption (GA) [29], η k n is interpreted as an AWGN independent of x k n , where the mean and variance, respectively, are easily calculated as
μ η = E η k n = E ( m k x m n )
Σ η = Var η k n = Var ( m k x m n ) + N 0 I
where E ( ν n ) = 0 is used. The achievable sum SE ε * is obtained by solving the following formula [29]
4 ε * 1 2 ε * = E b N 0
where E b is the energy per information bit. It turns out that ε * is identical to the single user system and increases linearly in the high signal to noise ratio (SNR) region as
lim E b N 0 ε * 10 log 10 E b N 0 = log 2 10 20 bits / s / Hz per dB .
That being said, the sum SE increases by 0.166 bits/s/Hz asymptotically if E b / N 0 increases by 1 dB.

3. LMMSE Aided Interference Cancellation

The achievability of ε * depends on the effective mitigation of MUI at the receiver that can be implemented by coupling LMMSE and successive interference cancellation (SIC) [29,30]. This method is adopted as well in this paper and the LMMSE-SIC receiver is developed in this section accordingly.

3.1. LMMSE Interference Suppression

As shown in Figure 1b, the received signal r n is filtered to obtain an interference-surpassed estimation x ˜ k n : = E x k n r n expressed as [10,30]
x ˜ k n = E ( x k n ) + β k n [ r n E ( r n ) ]
where the LMMSE coefficient β k n is expressed as
β k n : = Cov x k n , r n Var 1 r n
where
Cov x k n , r n = Var ( x k n )
Var r n = k = 1 K Var ( x k n ) + N 0 I
is due to GA.
The refined signal is x ˜ k n CN ( μ n , Σ n ) per definition, where the mean μ n and variance Σ n , respectively, are
μ n = β k n E ( x k n )
Σ n = β kn [ N 0 I + m k Var ( x m n ) ] β k n H
As perceived, the calculations above are intricate due to the involved matrix operations. Thanks to PCA and GA, the calculations are made element-wise, as
μ k n ( i ) = Var ( x k n ( i ) ) E ( x k n ( i ) ) N 0 + k = 1 K Var ( x k n ( i ) )
Σ n ( i ) = Var 2 ( x k n ( i ) ) [ N 0 + m k Var ( x m n ( i ) ) ] [ N 0 + k = 1 K Var ( x k n ( i ) ) ] 2
where i = 1 , , d . The component mean E ( x k n ( i ) ) and variance Var ( x k n ( i ) ) needed are fed from MSK demodulation, which is addressed latter.
Using this estimation, the resultant mean squared error (MSE) is expressed as [30]
Tr { Var x k n Var x k n Var 1 r n Var x k n }
and the minimum squared error (MSE) becomes negligible if reliable a priori information I x m i regarding x m n is accessible. The details are presented below in Lemma 1.
Lemma 1. 
MSE admits an element-wise expression and approaches 0 as I x m i 1 .
Proof of Lemma 1. 
See the Appendix A. □

3.2. Iterative Demodulation and Decoding

From the perspective of coding theory, the concatenation of FEC and MSK forms a serially concatenated coded modulation system [31], where MSK demodulation and decoding modules are both a posteriori probability (APP) decoders [32]. Hence, iterative demodulation and decoding are used to generate I x m i for near perfect IC.
Again, we take the k-th user as an example. The MSK demodulator, i.e., inner decoder, is a four-port module that performs over the trellis defined in Section 2.1. It accepts x ˜ k and the a priori log-likelihood ratios (LLRs) L a i ( k , n ) and outputs the extrinsic LLRs L e i and L x i regarding c k and x k , respectively [31,32].
More specifically, L e i ( k , n ) concerning c k ( n ) is calculated as
L e i ( k , n ) : = ln Pr ( c k ( n ) = 1 x ˜ , L a i \ L a i ( k , n ) ) Pr ( c k ( n ) = 0 x ˜ , L a i \ L a i ( k , n ) ) = ln c k ( n ) = 1 α n 1 ( s ) γ x n ( s , s ) β n + 1 ( s ) c k ( n ) = 0 α n 1 ( s ) γ x n ( s , s ) β n + 1 ( s )
where γ x n ( s , s ) is the probability of state transition from s to s driven by c k n . It is calculated using x ˜ k n alone as
γ x n ( s , s ) = 1 π d det ( Σ n ) exp ( x ˜ k n μ n ) H Σ n 1 ( x ˜ k n μ ) = 1 π d det ( Σ n ) exp [ i = 1 d x ˜ k n ( i ) μ ( i ) 2 λ n i ]
where μ n and Σ n are defined in (13) and (14), respectively. The second line is obtained since Σ n is diagonal, and whose i-th eigenvalue is λ n i as presented in Appendix A.
Similarly, the LLR L x i ( k , n , i ) regarding x k n is calculated in parallel to L e i ( k , n ) as
L x i ( k , n , i ) : = ln Pr ( x k n = s k i x ˜ \ x ˜ k n , L a i ) Pr ( x k n = s k 1 x ˜ \ x ˜ k n , L a i ) = ln s k i α n 1 ( s ) γ c n ( s , s ) β n + 1 ( s ) s k 1 α n 1 ( s ) γ c n ( s , s ) β n + 1 ( s )
where s k 1 X k is specified for LLR normalization and γ c n ( s , s ) is calculated using L a i ( k , n ) alone as
γ c n ( s , s ) = exp [ u k ( n ) L a i ( k , n ) 2 ] u k ( n ) = 2 c k ( n ) 1
where a dummy variable u k ( n ) is used to simplify the expression.
The quantities α n 1 ( s ) and β n ( s ) are obtained through the forward and backward recursions, respectively, as
α n ( s ) = s s α n 1 ( s ) γ n ( s , s )
β n ( s ) = s s β n + 1 ( s ) γ n ( s , s )
where γ n ( s , s ) : = γ c n ( s , s ) γ x n ( s , s ) , which indicates the probability of state transition s s using information from the channel and outer decoder jointly. Once L e i ( k , n ) is obtained, it is fed to the outer decoder, i.e., FEC decoder, to obtain the a priori LLRs of outer code L a o = Π k 1 ( L e i ) .
The FEC decoder is still a four-port APP decoder, except it only receives a priori information from the MSK demodulator. If the FEC is CC, the whole process is essentially identical to MSK demodulation. With a slight abuse of trellis notation, the extrinsic LLR regarding c k ( n ) is calculated as
L e o ( k , n ) = ln b k ( l ) = 1 α l 1 ( s ) γ l ( s , s ) β l + 1 ( s ) b k ( l ) = 0 α l 1 ( s ) γ l ( s , s ) β l + 1 ( s )
where the forward and backward recursions are calculated as
α l ( s ) = s s α l 1 ( s ) γ l ( s , s )
β l ( s ) = s s β l + 1 ( s ) γ l ( s , s )
and γ l ( s , s ) is defined as
γ l ( s , s ) = n c \ n u k ( n ) tanh ( L a o ( k , n ) 2 ) u k ( n c ) = 2 c k ( n c ) 1
where n c indexes all the coded bits, except for c k ( n ) .
For REP, the extrinsic LLR is simply
L e o ( k , n ) = n r \ n L a o ( k , n )
where n r indexes all the coded bits, except for c k ( n ) . L e o ( k , n ) is then sent to MSK demodulation to serve as the a priori LLRs L a i = Π k ( L e o ) .
The exchange of L e i and L e o iterates for i t e r max -times to obtain reliable extrinsic LLRs and finally output the mean and variance regarding x k n as
E ( x k n ) = 0 , L x i = 0 s k i X k s k i · exp ( L x i ( k , n , i ) ) i exp ( L x i ( k , n , i ) ) , otherwise
Var ( x k n ) = s k 1 [ s k 1 ] H , L x i = 0 s k 1 [ s k 1 ] H E ( x k n ) 2 , otherwise
where E ( x k n ) x k n and Var ( x k n ) 0 if reliable L x i is accessible.
In fact, reliable L x i is obtained even without resorting to advanced FECs. In NCM, two simple FECs are considered: CC and REP. The complexity of the whole process can be roughly estimated from the number of branches processed in each symbol interval, which are eight, four, and two for CCs, REPs and MSK, respectively. Then, the complexity is expressed with respect to the number of transmitted information bits N R within each block as
CC - NCM : O [ i t e r max · ( 8 + 4 ) / R ]
REP - NCM : O [ i t e r max · ( 2 + 4 ) / R ]
It is seen that CC-NCM is twice as complicated as REP-NCM. However, the high complexity is well paid off, seeing the fact that CC-NCM offers extra gains, as shown in Table 2. The results are a straightforward application of the theory in [31,32].
However, the feasibility of CC-NCM is questionable since it was repeatedly observed that strong coded modulations offer low user load in contrast to weak coded modultions such as REP-NCM [13,16]. To solve this issue, signal shaping is proposed.

4. Signal Shaping: Design and Performance Analysis

It is seen that MSK demodulation plays an important role in NCM since it is the intermediate block feeding extrinsic information to both the LMMSE filter and the FEC decoder. Therefore, the signal shaping is developed starting with simple error performance analysis of the MSK demodulation. Assuming sequence x k is transmitted, an error occurs if a different sequence x k is favored. Using the definitions in (9) and (19), the decision variable Γ is expressed as
Γ = Γ 1 + ln n = 1 N exp { ( x ˜ k n μ n ) H Σ n 1 ( x ˜ k n μ n ) } n = 1 N exp { ( x ˜ k n μ n ) H Σ n 1 ( x ˜ k n μ n ) } = Γ 1 + n = 1 N i = 1 d 2 Re { β k n ( i ) 2 [ ( x k n ( i ) x k n ( i ) ) ] H μ n ( i ) } λ n i Γ 2 + n = 1 N i = 1 d 2 Re { β k n ( i ) 2 [ ( x k n ( i ) x k n ( i ) ) ] H [ η k n ( i ) E ( η k n ( i ) ) ] } λ n i Γ 3
where x ˜ is the LMMSE estimation of x k and Γ 1 is the priori LLRs fed from the k-th FEC decoder. The decision variable Γ is decomposed into three components: Γ 1 , Γ 2 , and Γ 3 , where the performance is dominated by Γ 3 since the first two are barely affected by MUI. Here, Γ 3 is termed the effective MUI and is interpreted as a disturbance to the decision variable that is quantified through the normalized variance Var ¯ ( Γ 3 ) = Var ( Γ 3 ) / N · E k , which leads to the development of ideal power allocation (IPA) and phase spacing technique (PST) in sequel.

4.1. Ideal Power Allocation (IPA)

Lemma 2 
(IPA and I x m i ). Without using PST, Var ¯ ( Γ 3 ) is expressed as
Var ¯ ( Γ 3 ) = n = 1 N 2 m k p ^ m 2 E m N m k E m
where p ^ m is the error probability of the m-th user. Var ¯ ( Γ 3 ) thus virtually behaves no differently, no matter the power allocation scheme, if I x m i is not available.
Proof of Lemma 2. 
See Appendix B. □
A typical situation I x m i = 0 happens when the SIC is just launched. This is the worst case that bottlenecks the performance. However, we do observe that Var ¯ ( Γ 3 ) decreases as p ^ m reduces, which motivates the IPA elaborated in the following explanation.
Assuming the target individual SE is ε , then for the k-th user, the required minimum SNR using an ideal coded modulation is
SNR k = 2 2 ε 1 2 ε
where SNR k = 1 given ε = 0.5 . It is observed that no power allocation scheme can fulfill (35) for K users simultaneously. However, assuming that SIC perfectly estimates the first ( k 1 ) users and recalling the GA, the k-th user only experiences MUI coming from the ( k + 1 ) -th to K-th users, and SNR k is thus expressed as
SNR k = E k m = k + 1 K E m
where N 0 is neglected. A feasible power allocation is setting δ E k / E k + 1 for k = 1 , 2 , , K 1 , where the optimal ratio is δ * = 2 . As long as the SIC cancels MUI in sequence successfully, (35) always holds, and p ^ m 0 enables gradually reduced Var ¯ ( Γ 3 ) as expected.
With regard to NCM, FECs are required to have R = 0.6 to offer individual SE of 0.5 bits/s/Hz since the bandwidth of MSK is 1.2. Hence, FECs in Table 2 are periodically punctured to obtain R = 0.6 . We term this as the match of R to IPA. As such, a simple observation is that the total power increases by 3 dB as the sum SE increases by 0.5 bits/s/Hz whenever the user load K increases by one, i.e.,
R B · 3 dB = 0.166 bits / s / Hz per dB
which is well aligned to the prediction in (8). Seeing this, we say that this operation is asymptotically optimal as K .
There are two cases that deserve further exposition, namely optimal R * with suboptimal δ and optimal δ * with suboptimal R, which both incur performance loss in terms of SNR. As to the former, we only need to consider under-power and over-power in general, where δ < δ * and δ > δ * , respectively. It is readily perceived that the under-power system cannot achieve the target SE as indicated in (35), while the over-power system ( δ , K * ) fulfills (35) but incurs SNR penalty in contrast to ( δ * , K * ) . This penalty is expressed as
10 log 10 ( 1 δ K * 1 δ * K * 1 δ * 1 δ ) dB
where δ , δ * 1 . The case with δ = 1 is equivalent to equal power allocation (EPA) that will be discussed soon.
As to the latter, SNR penalty is expressed as
10 log 10 ( 1 δ * K 1 δ * K * ) dB
where K K * to make sure ( K * , R * ) and ( K , R ) to offer the same sum SE.

4.2. Phase-Spacing Technique (PST)

The IPA bypasses the reduction of Var ¯ ( Γ 3 ) , which is now formally addressed by PST. PST was previously adopted in [22] and is proved to increase spectral efficiency significantly. In NCM, we are interested in the following simple generation of θ k
θ k = ( k 1 ) · Δ θ , 1 k K .
An exhaustive search of the optimal Δ θ was previously presented in [23,26] which is not suitable for large scale systems. In this section, the optimal Δ θ is derived using the theory presented in [22], as stated in Lemma 3.
Lemma 3 
(Optimal phase spacing). Given phase-spacing Δ θ
Var ¯ ( Γ 3 ) = n = 1 N 4 m k p ^ m 2 E m [ cos 2 ( θ k m ) 2 + 2 sin 2 ( θ k m ) π 2 ] N m k E m
where p ^ m is the error probability of the m-th user and θ k m = θ k θ m . Using Δ θ = π / 2 offers 1.5 dB gain over the system using IPA alone.
Proof of Lemma 3. 
See Appendix B. □
Comments 1. 
Applying this approach, i.e., Δ θ = π / 2 and δ = 2 , to quadrature PSK (QPSK), the result shows that
Var ¯ ( Γ 3 ) = n = 1 N 4 m k p ^ m 2 E m [ cos 2 ( θ k m ) + sin 2 ( θ k m ) ] N m k E m
which simply suggests using PST in QPSK gains no reduction ultimately since cos 2 ( θ k m ) + sin 2 ( θ k m ) 1 . This interesting result implies that PST should be coupled with the eligible modulation format to deliver expected reduction of Var ¯ ( Γ 3 ) .
The discussion is exemplified in Figure 2, where Δ θ versus Var ¯ ( Γ 3 ) (in dB) are evaluated assuming I x m i = 0 . Three systems are considered: δ = 1 , δ = 2 , δ = 10 corresponding to EPA, IPA, and over-power systems, respectively. It is firstly noticed that Var ¯ ( Γ 3 ) = 3 dB in all three cases without PST ( Δ θ = 0 ), justifying the claim in Lemma 2. When PST applies, the strongest user obtains significant reduction in all three cases as shown in Figure 2a. This reduction is up to 2.6 dB in IPA and is at least 1.5 dB in EPA. As to the weakest user, the reduction is limited. As a matter of fact, EPA outperforms the other two systems with or without PST. This observation justifies the successive detection order k = 1 , 2 , , K . Nevertheless, average reduction can still be obtained as claimed in Lemma 3. From the perspective of iterative decoding, the reduction provides a good start to initiate the whole process that would relax the requirements regarding ideality of NCM.
The effective noise Var ¯ ( Γ 3 ) is also evaluated for small-scale systems. The results are presented in Figure 3 with K = 2 . It is observed that the performance remains invariable disregarding the increasing δ . This result suggests that in small-scale systems, PST alone can offer the same reduction of Var ¯ ( Γ 3 ) with or without IPA. This conclusion can also be derived from the definition of Var ¯ ( Γ 3 ) (41), which is solely determined by θ k m . Equivalently, we say that the proposed signal shaping technique consisting of IPA and PST offers asymptotically optimal performance when K .
Another concern is that the proposed signal shaping relies on phase spacing. It is thus natural to ponder the robustness of PST against phase misalignment. This situation is considered in Figure 4, where θ ^ k is a suboptimal replacement of θ k . When | θ ^ k - θ k | = 0 , there is no misalignment, and hence, Var ¯ ( Γ 3 ) reaches the lowest value. Otherwise, Var ¯ ( Γ 3 ) increases. However, the increment is limited to around 1 dB, suggesting that the misalignment does not lead to significant performance loss. This behavior holds disregarding the user load K, implying that robustness against phase alignment may be due to a number of situations such as phase noise, estimation error, etc.
Comments 2. 
The results imply that using IPA or PST alone can hardly deliver the best performance. They should be coupled together. However, this coupling does not pledge performance improvement unless the underlying waveform is properly chosen, just as the comment regarding QPSK. This observation is another reason for the term NCM.

5. Numerical Results

The previous discussion is exemplified in terms of bit error rate (BER) versus E b / N 0 , convergence behavior, and achievable SE. In this section, the blocklength N = 5000 in all cases unless stated otherwise. For better validation, some parameters are presented in Table 3.

5.1. Ideality of CC-NCM and REP-NCM

The discussion begins with examining the ideality since IPA presumes ideal coded modulation. The ideality of coded modulation is measured through BER and convergence behavior in terms of threshold [33].
Results concerning two-user systems are presented in Figure 5. It is seen that both CC-NCM and REP-NCM successfully load up to two users. The gap to the single-user system can be reduced to within 0.3 dB. However, the performance varies, as shown in Figure 5a. More specifically, in CC-NCM, the 0.3 dB gap is obtained using PST alone while the gap increases to 1.6 dB and 5.2 dB when using IPA + PST and IPA alone, respectively. A similar behavior is also observed in REP-NCM, as shown in Figure 5b. While IPA offers performance nearly identical to the single user system, IPA + PST is 1.5 dB away.
Though it is evident that IPA and PST are both effective in suppressing MUI, it appears that IPA + PST does not deliver the best performance. The reason is that IPA is developed presuming K ; therefore, IPA is not energy-efficient when K is small.
This gap is predictable using a method similar to (38), i.e., the gap of the two-user IPA + PST is approximately log 10 ( 1 + 2 ) / ( 1 + 1 ) = 1.8 dB, which justifies the 1.5 dB/ 1.6 dB gap. When comparing CC-NCM with REP-NCM, a gap of 2 dB is observed when IPA + PST applies.
This gap is explained in Figure 6, where the interleaving gains are detailed. The results confirm that REP-NCM does offer interleaving gain, as analyzed in Table 2. The performance obviously underperforms CC-REP since no coding gain is obtained. This result is also confirmed by the convergence threshold [33], which suggests that the threshold of REP-NCM is 2 dB higher than CC-NCM, just as the BER curves imply in Figure 5 and Figure 6. Therefore, we come to the conclusion that CC-NCM is more ideal than REP-NCM and is hence extensively discussed in the sequel.

5.2. Match R to IPA

It is pointed out in Section 4 that δ = 2 and R = 0.6 should be mutually matched to attain an individual SE of 0.5 bits/s/Hz. Otherwise, significant loss in terms of E b / N 0 will be incurred. This is exemplified by the CC-NCMs without (Figure 7a) or with puncturing (Figure 7b). The results are shown in Figure 7. When δ = 2 is used for both systems, the gap to MAC capacity is up to 13 dB without puncturing while the gap narrows down to 2 dB with puncturing. We see a 11 dB difference, which is well predicted by (39).
It is worth noticing that the parameters δ = 2 and Δ θ = π / 2 offer near-capacity performance irrespective of K varying from 1 to 24. The scalability of NCM is confirmed. This is a valuable property seeing that most existing NOMAs are configured on a case-by-case basis. The reason is that both IPA and PST are developed assuming K which guarantees the performance for large-scale systems.

5.3. Achievable Spectral Efficiency

The achievable spectral efficiency of the CC-NCM is examined when BER 10 5 in Figure 8a for both punctured ( R = 0.6 ) and unpunctured ( R = 0.5 ) systems. The user load K takes on 1, 6, 12, 24, and 30. It is readily observed that when R = 0.6 , NCM well approaches MAC capacity within 2 dB, confirming the observation in Figure 7b and demonstrating both the energy-efficiency and spectrally-efficiency of the proposed design. However, when R = 0.5 , a huge gap is observed. This gap is exactly due to the mismatch between R and IPA and is well predicted using (39), which is up to 15 dB when K = 30 . This gap keeps increasing as K .
Fortunately, such high SE can be obtained as well, even if the phase spacing Δ θ is configured suboptimially as predicted in Figure 2a and Figure 4, where Var ¯ ( Γ 3 ) remains almost constant when δ = 2 . This observation is confirmed in the simulated BERs shown in Figure 8b. Just as in Figure 8a, we consider a CC-based NCM of SE 15 bits/s/Hz ( K = 30 , R = 0.6 ). As expected, the best performance is obtained using Δ θ = 0.5 π while the performance degrades slightly when Δ θ = 0.25 π , 0.4 π , 0.75 π as predicted in Figure 4. More interestingly, the performance is essentially identical when Δ θ = 0.25 π and Δ θ = 0.75 π , which is also predicted in Figure 2a. These observations naturally lead to the conclusion that NCM is robust against phase errors due to inaccurate estimation, etc., that would be useful in practice.
Further, the proposed NCM can be easily applied to FECs and CPMs beyond CC and MSK. For example, polar code [27] and partial response CPM GMSK are considered in Figure 8c. Thanks to the shaping technique developed, both NCM1 and NCM2 can offer a user load K up to 30 achieving SE of up to 15 bits/s/Hz and 12.5 bits/s/Hz, respectively. It is readily observed that the proposed technique is versatile given linear block FEC or partial response signaling. However, we still recommend CC for reduced processing complexity since the primary concern is low power consumption.

5.4. Remarks

It is noticed that most existing NOMAs offer a normalized overloading factor Ω = K × R that barely exits 10, while NCM can easily reach 18 or perhaps even higher with capacity-approaching performance. Such performance does not require low-rate FECs, which significantly reduces complexity and latency. The numerical results justified our design successfully. However, it is necessary to rethink the idea behind this success since it recommends radically different guidelines. For example, the proposed design is derived from large-scale systems, but is also proven effective for small-scale systems. This is different from the current method, where the optimization starts with low user load and hopes that the resultant configuration will be extendable in large-scale systems—which turns out to not be true in most cases. Another observation is that high-rate strong codes (We emphasis that the code here does not refer to the FEC but the concatenation of FEC and MSK, since it forms a turbo-like coded modulation that is more ideal than FEC alone) are proven to be more useful and able to avoid the coding–spreading tradeoff. This choice is also different from most existing code domain NOMAs, where low-rate weak codes are preferred to strike a good tradeoff between coding and spreading gains [13,14].

6. Conclusions

This paper proposes a class of nonorthogonal multiple access scheme, i.e., NCM, for drone-aided IoT networking to potentially enable massive connectivity. The performance of NCM is analyzed in terms of effective multiuser interference, which leads to the discovery of asymptotically optimal power allocation, phase spacing, and rate selection. As a result, a user load K of up to 30 is achieved by the exemplified systems, which justifies our design for enabling massive connectivity using low power IoT. While we resort to routine technique power allocation to obtain such performance, it is further revealed that NCM requires a very high code rate (≤0.6) to enable improved user load. Such a mechanism is preferred even though high-rate coding was recognized to be incompetent for mitigating multiuser interference. Our discussion offers new insights into this recognition and proves that low-rate coding is not indispensable for mitigating severe interference in the context of coded modulation, which turns out to be a solution to avoid the coding–spreading tradeoff. This valuable property not only enables mMTC of low power IoT devices but also offers low latency, which both are desired in 5G and beyond.

Author Contributions

Conceptualization, L.B.; methodology, L.B.; software, L.H.; validation, L.H., Y.G. and Y.Y.; formal analysis, Y.G.; investigation, L.H.; resources, Y.Y.; data curation, L.B.; writing—original draft preparation, L.B.; writing—review and editing, L.B.; visualization, L.H.; supervision, Y.Y.; project administration, L.B.; funding acquisition, L.B. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Natural Science Foundation of China under Grant 61601346, and the Natural Science Basic Research Plan in Shaanxi Province of China under Grant 2018JQ6044, the Ministry of Industry and Information Technology of the People’s Republic of China under Grant 2021-0162-1-1, the Fundamental Research Funds for the Central Universities, Northwestern Polytechnical University, under Grant 31020180QD089, the Aeronautical Science Foundation of China under Grant 20200043053004 and 20200043053005.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
DIoTdrone-aided IoT
MSKminimum shift keying
GMSKGaussian MSK
PSKphase shift keying
CPMcontinuous phase modulation
SNRsignal to noise ratio
SEspectral efficiency
FECforward error correction
NCMnonorthogonal coded modulation
REPrepetition
CCconvolutional code
AWGNwhite Gaussian noise
PSDpower spectral density
PCAnonorthogonal coded modulation
GAGaussian assumption
SICinterference cancellation
MSEmean squared error
APPa posteriori probability
LLRlog-likelihood ratio
BERmean squared error

Appendix A

In this appendix, we present the proof of Lemma 1 and the results concerning (19). First comes the proof of Lemma 1. As can be seen the the major concern is Var ( x k n ) , which is explicitly expressed as
Var ( x k n ) = Var ( x k n ( 1 ) ) 0 0 Var ( x k n ( d ) )
where Cov ( x k n ( i ) , x k n ( j ) ) = 0 if i j due to the orthonormal expansion in PCA [28].
Therefore,
MSE = Tr { Var x k n Var x k n Var 1 r n Var x k n } = i = 1 d σ k n 2 ( i ) σ k n 4 ( i ) N 0 + σ k n 2 ( i ) + m k σ m n 2 ( i )
where σ k n 2 ( i ) = Var ( x k n ( i ) ) , k = 1 , 2 , , K .
Since MSE / Var ( x m n ( i ) ) > 0 , i.e., MSE reaches minimum when Var ( x m n ( i ) ) = 0 , which is made possible given reliable I x m i because
Var ( x m n ( i ) ) = E ( x m n ( i ) 2 ) E ( x m n ( i ) ) 2 P m ( i ) x m n ( i ) ( 1 p ^ m ) + x m n ( i ) p ^ m 2 P m ( i ) ( 1 ( 1 p ^ m ) 2 )
where E ( x m n ( i ) 2 ) = P m ( i ) , which denotes the power projected onto the i-th dimension; p ^ m is the average probability of error of the m-th user and x m n is a tentative decision rather than x m n . Given I x m , we have
p ^ m 1 2 erfc ( J 1 ( I x m ) 2 2 )
where the function J 1 ( · ) does not admit a closed-form expression in general but monotonically decreases with respect to I x m [33]. As a result, p ^ m 0 , and thus, Var ( x m n ) 0 when I x m 1 .
Now, MSE is expressed as
MSE = i = 1 d σ k n 2 ( i ) σ k n 2 ( i ) N 0 + σ k n 2 ( i ) I x m 1
Σ n = diag [ σ k n 4 ( i ) ( N 0 + m = 1 , m k K σ m n 2 ( i ) ) ( N 0 + k = 1 K σ k n 2 ( i ) ) 2 ]
It is identified that Σ n admits the eigendecomposition with λ n i : = σ k n 4 ( i ) ( N 0 + m = 1 , m k K σ m n 2 ( i ) ) ( N 0 + k = 1 K σ k n 2 ( i ) ) 2 being the i-th eigenvalue. The inverse Σ n 1 is simply
Σ n 1 = diag [ 1 λ n i ] , i = 1 , 2 , , d
where the i th eigenvalue of Σ n 1 is 1 / λ n i , which approaches 1 in high SNR region when σ m n 2 ( i ) 0 due to reliable I x m .

Appendix B

In the high SNR region, the AWGN is negligible, and hence [22],
Γ 3 = n = 1 N i = 1 d 2 Re { [ ( x k n ( i ) x k n ( i ) ) ] H [ η k n ( i ) E ( η k n ( i ) ) ] } σ m n 2 ( i ) n = 1 N 2 Re { ( n 1 ) T n T [ ( x k n ( t ) x k n ( t ) ) ] H [ η k n ( t ) E ( η k n ( t ) ) ] d t } m = 1 , m k K E m n = 1 N 2 Re { ( n 1 ) T n T [ ( x k n ( t ) x k n ( t ) ) ] H [ p ^ m η k n ( t ) ] d t } m = 1 , m k K E m
where E ( η k n ( t ) ) ( 1 p ^ m ) η k n ( t ) is used. Considering the fact that x k n H ( t ) η k n ( t ) and x k n H ( t ) η k n ( t ) are independent but identically distributed, we have
Var ( Γ 3 ) n = 1 N Var [ 2 Re { ( n 1 ) T n T [ ( x k n ( t ) x k n ( t ) ) ] H [ p ^ m η k n ( t ) ] d t } ] m k E m = n = 1 N 4 Var [ Re { ( n 1 ) T n T p ^ m x k n H ( t ) η k n ( t ) d t } ] m k E m = n = 1 N m k 4 p ^ m 2 Var [ Re { ( n 1 ) T n T x k n H ( t ) x m n ( t ) d t } ] m k E m = n = 1 N m k 4 p ^ m 2 Var [ ρ k m ( n ) ] m k E m
where we define ρ k m ( n ) = Re { ( n 1 ) T n T x k n H ( t ) x m n ( t ) d t } . Recall the expression of titled-phase (2), we define θ k m = θ k θ m , c k m ( n ) = c k ( n ) c m ( n ) and v k m = [ v k v m ] mod 2 π to obtain
ρ k m ( n ) = { E k E m cos ( v k m + θ k m ) , c k m ( n ) = 0 E k E m sin ( v k m + 0.5 π c k m ( n ) + θ k m ) sin ( v k m + θ k m ) 0.5 π c k m ( n ) , c k m ( n ) 0
Since v k m { 0 , π } and c k m ( n ) = ± 2 , a closed-form expression is obtained as
Var [ ρ k m ( n ) ] = E k E m [ cos 2 ( θ k m ) 2 + 2 sin 2 ( θ k m ) π 2 ]
and it reaches a minimum value Var [ ρ k m ( n ) ] = 2 E k E m / π 2 when θ k m = π / 2 , 3 π / 2 , . Otherwise, Var [ ρ k m ( n ) ] = E k E m / 2 when θ k m = 0 , π , .
For large-scale systems, the explicit calculation is intricate. Fortunately, there are two facts that can be used to reduce the complexity, namely, Var [ ρ k m ( n ) ] has a period π and two cases, i.e., θ k m = 0 , π / 2 , are needed when Δ θ = π / 2 according to (40). Therefore [22],
Var [ ρ k m ( n ) ] = 1 2 [ Var [ ρ k m ( n ) ] θ k m = π / 2 + Var [ ρ k m ( n ) ] θ k m = π ] = E k E m [ 1 4 + 1 π 2 ] ,
and thus,
Var ( Γ 3 ) n = 1 N 4 E k [ 1 4 + 1 π 2 ] m k p ^ m 2 E m m k E m .
Proof of Lemma 2 and Lemma 3. 
Since we define
Var ¯ ( Γ 3 ) : = Var ( Γ 3 ) N · E k
when Δ θ = 0 , it is expressed as
Var ¯ ( Γ 3 ) n = 1 N 2 m k p ^ m 2 E m N m k E m
where the following always holds: p ^ m 2 = 0.25 and Var ¯ ( Γ 3 ) = 0.5 (i.e., 3 dB) if I x m is not available, irrespective of the power allocation scheme as stated in Lemma 2. The performance loss over the system with Δ θ = π / 2 is
10 log 10 ( 0.5 0.25 + 1 / π 2 ) 1.5 dB
as stated in Lemma 3. □

References

  1. Zhang, Z.; Xiao, Y.; Ma, Z.; Xiao, M.; Ding, Z.; Lei, X.; Karagiannidis, G.K.; Fan, P. 6G Wireless Networks: Vision, Requirements, Architecture, and Key Technologies. IEEE Veh. Technol. Mag. 2019, 14, 28–41. [Google Scholar] [CrossRef]
  2. Promwongsa, N.; Ebrahimzadeh, A.; Naboulsi, D.; Kianpisheh, S.; Belqasmi, F.; Glitho, R.; Crespi, N.; Alfandi, O. A Comprehensive Survey of the Tactile Internet: State-of-the-art and Research Directions. IEEE Commun. Surv. Tuts. 2021, 23, 472–523. [Google Scholar] [CrossRef]
  3. Grieco, G.; Iacovelli, G.; Boccadoro, P.; Grieco, L.A. Internet of Drones Simulator: Design, Implementation, and Performance Evaluation. IEEE Internet Things J. 2023, 10, 1476–1498. [Google Scholar] [CrossRef]
  4. Michailidis, E.T.; Potirakis, S.M.; Kanatas, A.G. AI-Inspired Non-Terrestrial Networks for IIoT: Review on Enabling Technologies and Applications. IoT 2020, 1, 21–48. [Google Scholar] [CrossRef]
  5. Abro, G.E.M.; Zulkifli, S.A.B.M.; Masood, R.J.; Asirvadam, V.S.; Laouti, A. Comprehensive Review of UAV Detection, Security, and Communication Advancements to Prevent Threats. Drones 2022, 6, 284. [Google Scholar] [CrossRef]
  6. FAHLSTROM. Introduction To Uav Systems, 4th ed.; WILEY: New Delhi, India, 2016. [Google Scholar]
  7. Chen, X.; Ng, D.W.K.; Yu, W.; Larsson, E.G.; Al-Dhahir, N.; Schober, R. Massive Access for 5G and Beyond. IEEE J. Sel. Areas Commun. 2021, 39, 615–637. [Google Scholar] [CrossRef]
  8. Viterbi, A. Very low rate convolution codes for maximum theoretical performance of spread-spectrum multiple-access channels. IEEE Trans. Commun. 1990, 8, 641–649. [Google Scholar] [CrossRef]
  9. Frenger, P.; Orten, P.; Ottosson, T. Code-spread CDMA using maximum free distance low-rate convolutional codes. IEEE Trans. Commun. 2000, 48, 135–144. [Google Scholar] [CrossRef]
  10. Wang, X.; Poor, H. Iterative (turbo) soft interference cancellation and decoding for coded CDMA. IEEE Trans. Commun. 1999, 47, 1046–1061. [Google Scholar] [CrossRef]
  11. Brannstrom, F.; Aulin, T.; Rasmussen, L. Iterative detectors for trellis-code multiple-access. IEEE Trans. Commun. 2002, 50, 1478–1485. [Google Scholar] [CrossRef]
  12. Mohammadkarimi, M.; Raza, M.A.; Dobre, O.A. Signature-Based Nonorthogonal Massive Multiple Access for Future Wireless Networks: Uplink Massive Connectivity for Machine-Type Communications. IEEE Veh. Technol. Mag. 2018, 13, 40–50. [Google Scholar] [CrossRef]
  13. Schlegel, C.; Burnashev, M.V. The interplay between error control coding and iterative signal cancelation. IEEE Trans. Signal Process. 2017, 65, 3020–3031. [Google Scholar] [CrossRef]
  14. Zhang, R.; Hanzo, L. A Unified Treatment of Superposition Coding Aided Communications: Theory and practice. IEEE Commun. Surv. Tutor. 2011, 13, 503–520. [Google Scholar] [CrossRef]
  15. Liang, C.; Hu, Y.; Liu, L.; Yan, C.; Yuan, Y.; Ping, L. Interleave Division Multiple Access for High Overloading Applications. In Proceedings of the 2018 IEEE 10th International Symposium on Turbo Codes & Iterative Information Processing (ISTC), Hong Kong, China, 3–7 December 2018; pp. 1–5. [Google Scholar]
  16. Gao, N.; Xu, Y.; Huang, Y.; He, D.; Hong, H.; Chen, C.; Zhang, W. User-Load-Compatible Masking Schemes for Raptor-Like Protograph-Based LDPC Codes in Gaussian Multiple Access Channels. IEEE Trans. Veh. Technol. 2021, 70, 7652–7664. [Google Scholar] [CrossRef]
  17. Liu, J.; Shi, Y.; Fadlullah, Z.M.; Kato, N. Space-Air-Ground Integrated Network: A Survey. IEEE Commun. Surveys Tuts. 2018, 20, 2714–2741. [Google Scholar] [CrossRef]
  18. Anderson, J.; Aulin, T.; Sundberg, C.E. Digital Phase Modulation; Plenum Press: New York, NY, USA, 1986. [Google Scholar]
  19. Simon, M.K. Bandwidth-Efficient Digital Modulation with Application to Deep Space Communications; John Wiley & Sons: Hoboken, NJ, USA, 2005. [Google Scholar]
  20. Elmasry, G.F. Tactical Wireless Communications and Networks: Design Concepts and Challenges; John Wiley & Sons: Hoboken, NJ, USA, 2012. [Google Scholar]
  21. IEEE Std 802.15.4-2020; IEEE Standard for Low-Rate Wireless Networks. IEEE: Piscataway, NJ, USA, 2020.
  22. Bing, L.; Gu, Y.; Aulin, T.; Wang, J. Design of Auto-Configurable Random Access NOMA for URLLC Industrial IoT Networking. IEEE Trans. Ind. Inform. 2023. [Google Scholar] [CrossRef]
  23. Moqvist, P. Multiuser Serially Concatenated Continuous Phase Modulation. Ph.D. Thesis, Chalmers University of Technology, Goteborg, Sweden, 2004. [Google Scholar]
  24. Perotti, A.; Benedetto, S.; Remlein, P. Spectrally Efficient Multiuser Continuous-Phase Modulation Systems. In Proceedings of the 2010 IEEE International Conference on Communications, Cape Town, South Africa, 23–27 May 2010; pp. 1–5. [Google Scholar]
  25. Noels, N.; Moeneclaey, M. Iterative Multiuser Detection of Spectrally Efficient FDMA CPM. IEEE Trans. Signal Process. 2012, 60, 5254–5267. [Google Scholar] [CrossRef]
  26. Bing, L.; Aulin, T.; Bai, B.; Zhang, H. Design and Performance Analysis of Multiuser CPM With Single User Detection. IEEE Trans. Wireless Commun. 2016, 15, 4032–4044. [Google Scholar] [CrossRef]
  27. Arikan, E. Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels. IEEE Trans. Inf. Theory 2009, 55, 3051–3073. [Google Scholar] [CrossRef]
  28. Moqvist, P.; Aulin, T. Orthogonalization by principal components applied to CPM. IEEE Trans. Commun. 2003, 51, 1838–1845. [Google Scholar] [CrossRef]
  29. Verdu, S.; Shamai, S. Spectral efficiency of CDMA with random spreading. IEEE Trans. Inf. Theory 1999, 45, 622–640. [Google Scholar] [CrossRef]
  30. Tuchler, M.; Koetter, R.; Singer, A. Turbo equalization: Principles and new results. IEEE Trans. Commun. 2002, 50, 754–767. [Google Scholar] [CrossRef]
  31. Moqvist, P.; Aulin, T. Serially concatenated continuous phase modulation with iterative decoding. IEEE Trans. Commun. 2001, 49, 1901–1915. [Google Scholar] [CrossRef]
  32. Benedetto, S.; Divsalar, D.; Montorsi, G.; Pollara, F. Serial concatenation of interleaved codes: Performance analysis, design, and iterative decoding. IEEE Trans. Inf. Theory 1998, 44, 909–926. [Google Scholar] [CrossRef]
  33. Ten Brink, S. Convergence behavior of iteratively decoded parallel concatenated codes. IEEE Trans. Commun. 2001, 49, 1727–1737. [Google Scholar] [CrossRef]
Figure 1. (a) Drone-aided IoT networking. (b) Nonorthogonal coded modulation. DIoT scenarios and equivalent models.
Figure 1. (a) Drone-aided IoT networking. (b) Nonorthogonal coded modulation. DIoT scenarios and equivalent models.
Drones 07 00363 g001
Figure 2. (a) k = 1 . (b) k = 20 . Performance of a 20−user NCM system in the cases of EPA ( δ = 1 ), IPA ( δ = 2 ), and over-power ( δ = 10 ). Both the strongest ( k = 1 ) and the weakest ( k = 20 ) users are evaluated.
Figure 2. (a) k = 1 . (b) k = 20 . Performance of a 20−user NCM system in the cases of EPA ( δ = 1 ), IPA ( δ = 2 ), and over-power ( δ = 10 ). Both the strongest ( k = 1 ) and the weakest ( k = 20 ) users are evaluated.
Drones 07 00363 g002
Figure 3. Var ¯ ( Γ 3 ) vs. Δ θ .
Figure 3. Var ¯ ( Γ 3 ) vs. Δ θ .
Drones 07 00363 g003
Figure 4. Var ¯ ( Γ 3 ) vs. | θ ^ k - θ k | .
Figure 4. Var ¯ ( Γ 3 ) vs. | θ ^ k - θ k | .
Drones 07 00363 g004
Figure 5. (a) CC-NCM. (b) REP-NCM. Comparison of CC-NCM and REP-NCM when K = 2 and N = 5000 .
Figure 5. (a) CC-NCM. (b) REP-NCM. Comparison of CC-NCM and REP-NCM when K = 2 and N = 5000 .
Drones 07 00363 g005
Figure 6. (a) CC-NCM. (b) REP-NCM. Comparison of CC-NCM and REP-NCM in terms of interleaving gain and convergence threshold. They both employ IPA + PST and the vertical lines indicate the respective thresholds.
Figure 6. (a) CC-NCM. (b) REP-NCM. Comparison of CC-NCM and REP-NCM in terms of interleaving gain and convergence threshold. They both employ IPA + PST and the vertical lines indicate the respective thresholds.
Drones 07 00363 g006
Figure 7. (a) CC-NCM without puncturing. (b) CC-NCM with puncturing. Comparison of CC-NCM without or with puncturing. The MAC capacities are indicated by the vertical lines. N = 5000 .
Figure 7. (a) CC-NCM without puncturing. (b) CC-NCM with puncturing. Comparison of CC-NCM without or with puncturing. The MAC capacities are indicated by the vertical lines. N = 5000 .
Drones 07 00363 g007
Figure 8. (a) The achievable sum SE of CC-based NCMs with ( R = 0.6 ) or without ( R = 0.5 ) puncturing. (b) The BERs vs. Δ θ . The sum SE is 15 bits/s/Hz, (c) The BERs of polar and CC coded NCMs. The achievable sum SE of NCMs of different configurations.
Figure 8. (a) The achievable sum SE of CC-based NCMs with ( R = 0.6 ) or without ( R = 0.5 ) puncturing. (b) The BERs vs. Δ θ . The sum SE is 15 bits/s/Hz, (c) The BERs of polar and CC coded NCMs. The achievable sum SE of NCMs of different configurations.
Drones 07 00363 g008
Table 1. Related research.
Table 1. Related research.
ReferenceResearch FocusResearch Limitation
[8,9]Use simple FECs alone and suggest dedicating the whole redundancy to coding gain.The used MLD is prohibitively high in practice.
[12]Use the concatenation of high rate FEC and REP coding as the signature.Each individual has extremely low SE, i.e., the coding–spreading dilemma.
[15,16]Design REP-free schemes to address coding–spreading dilemma.The designs have non-scalability and the user load is reduced drastically.
[23,24,25,26]Employ FDMA-CPM.MUI rapidly becomes irremediable as the frequency spacing approaches 0.
Table 2. A comparison of CC-NCM and REP-NCM.
Table 2. A comparison of CC-NCM and REP-NCM.
Outer CodesInterleaving GainFree Distance d f 2 Coding Gain
( 7 , 5 ) 8 −364.78 dB
(2,1)−120.00 dB
Table 3. Simulation parameters.
Table 3. Simulation parameters.
ParameterDefinitionParameterDefinition
E k energy per transmitted symbol ε target individual SE
δ E k / E k + 1 θ k phase offset
Kuser loadRcode rate
Nblocklength E b / N 0 BER
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Bing, L.; Hu, L.; Gu, Y.; Yin, Y. Drone-Aided Networking with Massive Connectivity and High Spectral Efficiency Enabled. Drones 2023, 7, 363. https://doi.org/10.3390/drones7060363

AMA Style

Bing L, Hu L, Gu Y, Yin Y. Drone-Aided Networking with Massive Connectivity and High Spectral Efficiency Enabled. Drones. 2023; 7(6):363. https://doi.org/10.3390/drones7060363

Chicago/Turabian Style

Bing, Li, Lanke Hu, Yating Gu, and Yue Yin. 2023. "Drone-Aided Networking with Massive Connectivity and High Spectral Efficiency Enabled" Drones 7, no. 6: 363. https://doi.org/10.3390/drones7060363

Article Metrics

Back to TopTop