Next Article in Journal
Impact of Manufacturing Variability and Washing on Embroidery Textile Sensors
Next Article in Special Issue
Robust Iterative Distributed Minimum Total MSE Algorithm for Secure Communications in the Internet of Things Using Relays
Previous Article in Journal
Multi-Functional Soft Strain Sensors for Wearable Physiological Monitoring
Previous Article in Special Issue
Resource Allocation in the Cognitive Radio Network-Aided Internet of Things for the Cyber-Physical-Social System: An Efficient Jaya Algorithm
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Combined Channel Estimation with Interference Suppression in CPSS

1
School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, China
2
Datang Linktech Infosystem Co., Ltd, Beijing 100191, China
3
Industry Department, China Electronics Technology Group Corporation, Beijing 100846, China
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(11), 3823; https://doi.org/10.3390/s18113823
Submission received: 23 August 2018 / Revised: 4 November 2018 / Accepted: 5 November 2018 / Published: 8 November 2018
(This article belongs to the Special Issue Exploiting the IoT within Cyber Physical Social System)

Abstract

:
With social characteristics integrated into cyber-physical systems (CPS), the wireless channel has been a complex electromagnetic environment due to the subjectivity of human behaviour. For the low-power and resource-constrained nodes in cyber-physical-social systems (CPSS), minimum research is available focusing on conquering the issues of computational complexity, external interference and transmission fading simultaneously. This study aims to explore channel estimation with interference suppression based on machine learning. A novel channel estimation scheme is proposed, which combined interference suppression in channel impulse response (CIR) of frequency domain with K-means algorithm and noise cancellation in CIR of time domain with K-nearest neighbor (KNN) algorithm into an integrated process. Complexity analysis and simulation results showed that the proposed scheme has relatively lower complexity and the performance is proven better than traditional schemes, which meets the requirements of CPSS in complex electromagnetic environments.

1. Introduction

The cyber-physical system (CPS) was coined to describe the mapping, interaction and collaboration between computational and physical resources [1]. With the tight junction between human behaviour and CPS, social characteristics integrated into CPS, which is called a cyber-physical-social system (CPSS) [2]. CPSS indicates the integration of cyber interactions, physical perceptions and social connections. Due to the subjectivity of human behaviour, the wireless channel has been a complex electromagnetic environment of mixed radio signals between human-to-human and human-to-object [3]. Under the wireless connectivity of all things, the signal types are diverse, and not only the ambient noise is increased, but also the mutual interference will appear. Especially in the connection in multimedia interaction, the signal has a broad bandwidth which is easily interrupted. It leads to short communication distance, low transmission rate and even information coverage hole in electromagnetic interference [4]. There is an interesting example: when you enter a WiFi coverage room with a Bluetooth headset, the transmission rate of WiFi will decrease because of the interference by Bluetooth [5].
Channel estimation is used for the recognition of fading characteristics in communication channel. For broadband communication, channel estimation is often realized by inserting training sequences of signals in time domain and frequency domain. The transform domain signal processing theory has achieved a good compromise between performance and complexity for channel estimation, which can then be applied in broadband communication [6]. Studies by Edford proposed to cancel the noise in the channel impulse response (CIR). of time domain, which was transformed by least square (LS) channel estimation in frequency domain [7]. Studies by Minn took two times of samples than that in the largest multipath delay, while the other samples in CIR were set to zero and treated as noise [8]. Studies by Fukuhara proposed taking the samples in the largest multipath delay in CIR. The other samples in CIR are set to zero which are treated as noise [9]. Studies by Fan presented the leakage of CIR in the practical Orthogonal Frequency Division Multiplexing (OFDM) systems, the noise existed during signal multipath delay, the frequency domain window was used to reduce the leakage of CIR, and the noise of CIR was detected by threshold [10]. With the development of machine learning in recent years, Fan and Ma have put forward discriminant analysis, clustering analysis in CIR. Through the machine learning of the distance between the samples in CIR, the clustering of noise and the distinction of signal taps in time domain were realized [11,12].
There are two typical strategies for anti-interference. One is to pre-process before transmitting, such as transmission power allocation, spectrum sharing or reusing [13,14,15]. Pre-processing is used to avoid the intended interference signal. The other strategy for anti-interference is to suppress or cancel interference by recognition of the receiving signal feature. Interference suppression or cancellation aims at uncertain interference signal. The technologies of time domain prediction, code-aided and transform domain for interference suppression are summarized in [16]. The algorithm based on time domain prediction takes advantage of the pseudo-randomness of spread spectrum signal, which has a slow convergence rate. In addition, the code-aided algorithm is based on a pseudo-random sequence with high computational complexity. The transform domain interference suppression is simple in implementation and available in application, which can fulfill the demand of CPSS for energy efficient [17].
Due to the interference in suppression and channel estimation aimed at different objects, the technologies evolved through relatively independent roadmap. While the channel estimation and interference suppression are implemented separately, the computational complexity is linear stacking in the signal detection, which increases the processing delay and the cost of hardware. Although there is some research named joint interference suppression and channel estimation, the technical relevance of conquering the two issues is not remarkable [18,19,20]. For the low-power and resource-constrained nodes in CPSS, few of the existing approaches can sufficiently conquer the issues of computational complexity, narrowband interference (NBI) and transmission fading simultaneously [21]. Inspired by the machine learning technology for channel estimation, the study aims to integrate interference suppression into channel estimation based on machine learning.
The rest of this manuscript is organized as follows: Section 2 presents the signal model in complex electromagnetic environment. Section 3 proposes the scheme of channel estimation with interference suppression. Section 4 describes the complexity analysis as well as the simulation results. Section 5 presents the application of the proposed scheme. The conclusions and future work are presented in Section 6.

2. Signal Model

NBI is partial band jamming, which consists of a simple unmodulated carrier [22]. Figure 1a is a frequency domain monopulse, which refers to single tone jamming. The mathematical model of single tone jamming is:
J ( k I , l ) = A 0 δ ( k I k 0 , l ) .
Figure 1b refers to multitone jamming, which is a set of single tones. The mathematical model of multitone jamming is:
J ( k I , l ) = 1 K i = 1 K A i δ ( k i k 0 , l ) ,
where K is the number of interfered subcarrier.
Thereby, the signal with interference at the receiver can be written as:
Y ( k , l ) = H ( k , l ) X ( k , l ) + J ( k I , l ) + W ( k , l ) ,
where H ( k , l ) is the CIR in frequency domain. J ( k I , l ) refers to the interference with k I subcarriers jamming. W ( k , l ) is additive white Gaussian noise (AWGN). X ( k , l ) is a training sequence based on Zadoff–Chu (ZC) sequence, the modulus of which is 1. The Flourier transformation of ZC sequence is still a ZC sequence.
To estimate CIR H ( k , l ) more accurately, J ( k I , l ) and W ( k , l ) in Equation (3) should be exactly eliminated.

3. Channel Estimation with Interference Suppression

3.1. Interference Suppression in CIR

We perform LS estimation to Equation (3), and the CIR of frequency domain is denoted as H ^ L S ( 1 ) ( k , l )
H ^ L S ( 1 ) ( k , l ) = Y ( k , l ) X ( k , l ) = H ( k , l ) + J ( k I , l ) X ( k , l ) + W ( k , l ) X ( k , l ) .
It can be seen from Equation (4) that there are three categories of signals in the lth symbol in kth carrier: CIR, interference and noise. The existence of interference is uncertain, and the signal feature is unknown. System performance will be deteriorated with the interference incorrectly cancelled as AWGN [23]. It is necessary to detect and suppress the interference before noise cancellation.
Usually, NBI is added to partial subcarriers by high-powered signals. Thus, the receive signal power of the subcarriers that are interfered with will be higher than the others. As in CIR, the modulus of the interfered subcarriers will be higher than the others. On the basis of the feature, we introduced machine learning techniques into interference cluster. Because the interference does not necessarily exist in CIR, we proposed using the clustering of interfered subcarriers based on the global K-means algorithm [24]. The main thought of the K-means algorithm is to start from the data to be measured, first randomly generate K clusters, and then calculate the similarity between the data to be measured and the cluster center, and continuously update both the cluster center and the cluster in the iterative calculation until the convergence of the cluster center point is completed. For interference clustering, the set of subcarriers with no interference is denoted as cluster C 1 , and the set of interfered subcarriers is denoted as cluster C 2 . Therefore, interference detection is equal to the cluster of samples in CIR.
The steps of K-means interference clustering are as follows:
Step 1. The data to be measured is denoted as m i and m i { | H ^ L S ( 1 ) ( k , l ) | } , i = 1 , 2 , , N . The cluster center of C 1 is defined as the mean of m i , which is denoted as m t :
m t = 1 N i = 1 N m i .
Step 2. Euclidean distance is used to measure the similarity between m t and m i . The calculation formula is given as Equation (6):
d i , t = m i m t .
Step 3. The cluster center of C 2 is denoted as m s , which represents the data of the longest distance from m t in Equation (6). The distance between m s and m i is calculated as Equation (7):
d i , s = m i m s .
Step 4. m i will be classified by the distance calculated in Equations (6) and (7):
m i C 1 if   d i , t < d i , s , m i C 2 if   d i , t d i , s .
Step 5. The cluster center m s will be updated as the cluster C 2 was updated. Step 3 and Step 4 will be repeated until all data to be measured are classified. The calculation formula of m s updating is given as Equation (9):
m s = 1 Q i C 2 m i ,
where Q is denoted as the number of samples in C 2 .
According to the interference cluster scheme, the modulus of samples in C 2 are bigger than those in C 1 . The power of a few subcarriers is singularly high for Q N . It is fair to hypothesize that the corresponding subcarriers have been interfered with. When Q is not much less than N, the corresponding subcarriers are not interfered with or the interference is not significant to the subcarriers. Nevertheless, the subcarriers may be subject to non-narrowband interference and it is not the scope of this study.
It is necessary to suppress interference for Q N . The simplest way to suppress interference on a subcarrier is zero force, which means to set the samples on the interfered subcarriers in CIR to zero. However, the zero members will also participate in data demodulation and output error soft bits, which will have the adverse effect to channel decoding and degrade the overall system performance. On the other hand, the channel estimation will be deteriorated by setting the samples on the interfered subcarriers to zero in CIR.
The CIR in interfered subcarriers can not reflect the fading characteristics of the subcarriers. It is assumed that the channel is stationary for a continuous spectrum transmission. Thereby, the difference between CIR in the interfered subcarriers and the adjacent subcarriers will be small. Hence, we propose to suppress interference by linear interpolation of the CIR of frequency domain. The interpolation algorithm is presented as Equation (10):
H ( k I , l ) = ( 1 b a + b ) H ^ L S ( 1 ) ( k I a , l ) + b a + b H ^ L S ( 1 ) ( k I + b , l ) ,
where a is the normal carrier at the left of the interfered subcarriers, and b is the normal carrier at the right of the interfered subcarriers. Both a, b will be at the left/right of the interfered subcarriers, which are at the far right/far left.
Through linear interpolation on the interfered subcarriers, J ( k I , l ) in Equation (4) will be cancelled, and it will be rewritten as Equation (11):
H ^ L S ( 2 ) ( k , l ) = H ( k , l ) + W ( k , l ) X ( k , l ) .
It must be noted that linear interpolation on the interfered subcarriers is to improve the accuracy of channel estimation, which can not restore original data on interfered subcarriers.
The K-means algorithm can achieve the local optimization in unsupervised learning [25]. On the premise of NBI, the K-means algorithm will be an effective scheme for interference detection. However, even if the signal component is misjudged as interference, the line interpolation over adjacent subcarriers will not have a serious negative impact on CIR.

3.2. Noise Cancellation in CIR

The noise term in Equation (11) can be cancelled in the CIR of time domain. To enhance resolution of the CIR of time domain, M = 2 N points Inverse Fast Fourier Transform (IFFT) is applied to H ^ L S ( 2 ) ( k , l ) , so we have Equation (12):
h ^ L S ( 2 ) ( m , l ) = h ( m , l ) + 1 M k = 1 M 1 W ( k , l ) X ( k , l ) e j 2 π k m M .
Because the IFFT of W ( k , l ) is also approximately Gaussian, the noise of the time domain can be denoted as w ( m , l ) . Equation (12) can be rewritten as:
h ^ L S ( 2 ) ( m , l ) = h ( k , l ) + w ( m , l ) .
Because the envelop feature of h ^ L S ( 2 ) ( m , l ) is known to the receiver, h ( k , l ) and w ( m , l ) can be classified by the machine learning mechanism. We proposed the classification of CIR and noise based on the K-nearest neighbor (KNN) algorithm [26]. The mean thought of KNN is to set up a training sample for each category, and then find out K-nearest neighbors which have the greatest similarity with the data to be measured from all the training sample sets. The data to be measured will be classified into the category that is the majority of its neighbors.
According to the envelop feature of h ^ L S ( 2 ) ( m , l ) , which can be decomposed into two sets theoretically, one of the sets is denoted as S ˜ , which represents the set of modulus of signal components. Because of the leakage of CIR, S ˜ exists at the beginning and end of h ^ L S ( 2 ) ( m , l ) :
S ˜ = { | h ^ L S ( 2 ) ( m , l ) | | 0 m 2 M C P } { | h ^ L S ( 2 ) ( m , l ) | | M M C P m M } ,
where the maximum multipath delay is denoted as M C P .
The other set is denoted as W ˜ , which represents the set of modulus of noise components:
W ˜ = { | h ^ L S ( 2 ) ( m , l ) | | 2 M C P < m < M M C P } .
For the noise components in S ˜ realistically, we set up the training samples of signal component by the largest P samples in S ˜ . The initial set of training samples of signal component is denoted as G 1 :
G 1 = { u i | ( u 1 u 2 u P 1 u P ) u i S ˜ } , μ ^ 1 = 1 P m = 1 P u m , σ ^ 1 = 1 P 1 m = 1 P | u m μ ^ 1 | 2 ,
where μ ^ 1 and σ ^ 1 are the mean and variance of the elements in G 1 .
According to the principle of 3 σ in Gaussian distribution, the modulus of noise samples less than σ was a big probability. For there are signal components in W ˜ realistically, we set up the noise training samples with modulus less than σ in W ˜ . The initial set of training samples of noise component is denoted as G 2 :
G 2 = { v i | ( σ < v i < σ ) v i W ˜ } , μ ^ 2 = 1 Q m = 1 Q v m , σ ^ 2 = 1 q 1 m = 1 Q | v m μ ^ 2 | 2 ,
where σ is the variance of the elements in W ˜ , μ ^ 2 and σ ^ 2 are the mean and variance of the elements in G 2 .
It can be seen from Equations (16) and (17) that the statistical properties of G 1 and G 2 are different. We should calculate the similarity by the standardized Euclidean distance, in order to eliminate the error by the distribution difference of samples.
The data to be measured is denoted as q m { | h ^ L S ( 2 ) ( m , l ) | } , m = 1 , 2 , , M . The steps of KNN classification are as follows.
Step 1. Calculate the standardized Euclidean distance between q m and all the samples in G 1 and G 2 . D m is the set of all the calculation results:
d 2 ( q m , v i ) = ( q m v i ) 2 σ ^ 2 2 , d 2 ( q m , u j ) = ( q m u j ) 2 σ ^ 1 2 , D m = { d 2 ( q m , v i ) } { d 2 ( q m , u j ) } .
Step 2. Sort D m according to ascending order and find out the first k elements. T m N N is a set of first k elements, which mean that the k nearest neighbor of q m , and q m will be classified by majority vote in T m N N :
G ( q m ) = arg max G r t k T m N N δ [ G r = G ( t k ) ] ,
where:
G ( q m ) represents the classification of the training samples t k ,
δ [ G r = G ( t k ) ] is Kronecker Delta function,
r { 1 , 2 } represents the two classifications as G 1 and G 2 .
Step 3. Update G 1 or G 2 according to G ( q m ) , and update the corresponding mean and variance.
Reiterate the three steps until all the samples in h ^ L S ( 2 ) ( m , l ) have been classified. Then, we set all the samples to zero in G 2 for noise cancellation. Finally, we obtain the channel estimation as:
h ^ L S ( 3 ) ( m , l ) = h ( k , l ) .
Signal components and noise components are independent of CIR in the time domain. The classifying error of KNN in two categories is presented in [27]:
R N N ρ k ( R N N ) ρ k 1 ( R N N ) ρ 2 ( R N N ) ρ 1 ( R N N ) = 2 R N N ( 1 R N N ) ,
where R N N is Bayes probability of error, and k is the number of nearest neighbors.
It can be seen from Equation (21) that noise cancellation with the KNN algorithm will be close to the Bayes probability of error when the nearest neighbors k is big enough.
We have achieved interference suppression in the CIR of frequency domain by the K-means algorithm and noise cancellation in the CIR of time domain by the KNN algorithm. Although the original data on the interfered subcarriers can not be restored by the accurate channel estimation, the original data on the interfered subcarriers could be partially restored by channel decoding. Soft bits demodulated from interfered subcarriers should be identified in channel decoder in order to reduce the weight of these soft bits.
The complete process of channel estimation with interference suppression is described in Figure 2. Steps in the red box are key contents of the process.

4. Complexity Analysis and Performance Simulation

In this section, we will evaluate the computational complexity and performance of the proposed channel estimation with traditional channel estimation. For easy description, the proposed channel estimation scheme is abbreviated as Discrete Fourier transform-KNN (DFT-KNN). One of the comparative schemes is the frequency domain windowed scheme, which is a typical scheme of traditional transform domain channel estimation, and abbreviated as DFT-WF [10]. The other comparative scheme is a discriminant analysis scheme, which is one of the earliest channel estimation schemes based on machine learning techniques, and abbreviated as DFT-DA [11].

4.1. Complexity Analysis

We evaluate the computational complexity of DFT-KNN with others by multiply-accumulate (MAC) and multiply-add (MA) times. The computation of the algorithms modules are shown in Table 1, where core operator represents data width in parallel computing.
According to the process shown in Figure 2, the amount of computation of DFT-KNN is 2641.92 MMAC (million MAC). There are two times of FFT transformation, one time LS estimation, one time noise cancellation by widowing in DFT-WF, and the amount of computation of DFT-WF is 2396.16 MMAC. There are two times of FFT transformation, one time LS estimation, one time noise cancellation by Mahalanobis distance in DFT-DA, and the amount of computation of DFT-WF is 2519.04 MMAC.
The sum of computation of interference detection and interference suppression in DFT-KNN is less than 125 MMAC. DFT-KNN achieves interference suppression with amazing low computation load. The computational complexity of DFT-KNN than that of DFT-WF increased by 12.7%, and the computational complexity of DFT-KNN than that of DFT-DA increased by 3.7%.
The current processors can provide 100 GMAC (giga MAC) computing power, such as ZYNQ, C66x, in which DFT-KNN can be easily implemented [28]. Therefore, the algorithm is useful for node equipment in CPSS.

4.2. Simulation Results

We evaluate the performance of DFT-KNN with others by simulation comparison. The communication system parameters of simulation are shown in Table 2, and the channel parameters are shown in Table 3. To compare the performance of channel estimation objectively, the receiver is assumed to be synchronized accurately.

4.2.1. Performance without Interference

Mean square errors (MSE) of the channel estimation schemes are shown in Figure 3. The performance increases obviously by noise cancellation in LS channel estimation. The MSE of DFT-WF outperforms LS over 4 dB. The MSE of DFT-DA and DFT-KNN outperform LS by 9 dB more or less.
In fact, all of these channel estimation schemes find the noise components by the modulus of the CIR of time domain. According to the envelop feature of CIR being known to the receiver, the signal and noise components are completely independent, and DFT-KNN that is based on a supervised learning algorithm can achieve Bayes minimum error. The frequency domain window has improved resolution of CIR of the time domain, but a lot of extra noise will be introduced to CIR by a filtering window function. It makes the performance gap of MSE between DFT-WF and DFT-KNN 5 dB more or less. DFT-DA is based on the Gaussian distribution of signal and noise components in CIR, but the signal and noise components obey the Rician distribution in the simulation, which makes the performance gap of MSE between DFT-DA and DFT-KNN by 0.5 dB more or less.
The system bit error rate (BER) based on different channel estimation schemes are shown in Figure 4. Because of the performance difference in channel estimation schemes, the BER of DFT-WF outperforms LS close to 2 dB, the BER of DFT-DA outperforms LS by 2.5 dB more or less, the BER of DFT-KNN outperforms LS by 3 dB more or less. DFT-KNN has the best performance in the simulation.

4.2.2. Performance under Interference

Table 4 describes the simulation scenes under different combinations of interference styles, jamming signal ratio (JSR) and interference suppression method.
The system BER in different interference suppression schemes are shown in Figure 5. BER has a floor effect with nothing to do about the interference in the system. All of the transform domain channel estimation algorithms may have such a problem, including DFT-DA and DFT-WF. Linear interpolation on the interfered subcarriers outperforms zero force by 0.5 dB. Meanwhile, a BER performance loss of scene 4 which has JSR = 10 dB is within 1 dB compared to scene 1 that has no interference. It can be proved that DFT-KNN tends to be more effective in complex electromagnetic environments.
The system BER in different interference styles is shown in Figure 6. Although the interference power of a single subcarrier in multitone jamming is lower than that of single tone jamming, the interfered subcarriers will lead to a series of inaccurate soft bits, which will degrade the performance of the channel decoder. Hence, BER in multitone jamming is lower than that of single tone jamming. Even with the JSR up to 15 dB, BER performance loss of scene 6 is within 2 dB compared to scene 1 that has no interference. DFT-KNN is proven robust in complex electromagnetic environments.

5. Method Application

As an important component in CPSS, data serve as a carrier system connecting cyberspace, physical world and artificial world. Depending on the communication network, data in both the physical and artificial world are transmitted to cyberspace, which are analyzed and calculated in the cyberspace. The analytic results and decision making then give feedback to the physical and artificial world through the communication network. Thus, the stability and reliability of the communication network is the prerequisite for efficient CPSS operation.
When applied in telemedicine, based on various wearable device sensors, CPSS can continuously monitor physiological vital signs and transmit them for remote diagnosis. Interference in communication may cause distortion of data [29]. When proper data cannot be received by the control center in time, the quality of health monitoring is affected which may further lead to misdiagnosis and failure to provide timely treatment to the patients [30]. In CPSS-based intelligent transportation systems, the position of mobile phones and vehicles can be used to analyze the dynamic changes of traffic conditions, so as to carry out traffic flow control and traffic guidance. Similar applications require human beings, vehicles and roadsides to be connected via universal and ubiquitous networks enabled by wireless communications, such that they can act cooperatively. The coexistence and cooperation of the wireless communications give rise to interference coordination and resource allocation problems [31].
Due to the diversity of communication systems in CPSS, frequency spectrum coordination is becoming increasingly difficult. That interference suppression provides an alternative option for anti-interference.
We have applied the proposed scheme to an intelligent connected vehicle (ICV). As shown in Figure 7, the ICV established the connection with the cloud center through the public mobile communication network, such as 3 G, 4 G, 5 G, and established the connection with roadside and human through short-range communications such as RFID, bluetooth, and the connection with other vehicles via broadband self-organization networks (SON). Based on these communication systems, the resources on the clouds, roadsides and vehicles have been integrated seamlessly. By jointly considering the information from physical, social, and cyberspace, safety and optimal driving experience could be effectively realized.
There are multiple wireless communication systems in such a small vehicle, and the wireless channel will be a complex electromagnetic environment of mixed radio signals. In our experimental ICV, RFID and SON happened to be in the same frequency spectrum (Figure 8). The mutual interference would appear when the two communication systems work simultaneously. In actual assessment, the loss rate of transmission in vehicle-to-vehicle reached 15% without interference suppression. After applying the proposed scheme in SON, which combined interference suppression in channel estimation, the loss rate of transmission in vehicle-to-vehicle showed no significant changes regardless of whether RFID is working concurrently or not.

6. Conclusions and Future Work

This study proposed a novel channel estimation with interference suppression, which used machine learning to meet the requirements of CPSS in complex electromagnetic environments.
The K-means algorithm was used for interference detection in CIR of frequency domain, and suppressed the interference with linear interpolation of interfered subcarriers. The KNN algorithm was used for noise cancellation in the CIR of time domain, which is close to Bayes probability of error. Both K-means in CIR of frequency domain and KNN in CIR of time domain have relatively lower complexity in channel estimation, which are compliant for nodes in CPSS. Using extensive simulations, the performance of the proposed scheme is proven superior to the traditional scheme. The proposed scheme is proven to work effectively in an interference scene and the negative effects of transmission in interference are under control.
Our future work will focus on the implementation and optimization of the scheme, hopefully helping to improve the transmission stability and reliability in CPSS.

Author Contributions

Formal analysis, X.L.; Resources, X.L.; Software, H.W.; Writing—Original Draft, H.W.; Writing—Review and Editing, X.L.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Song, H.; Rawat, D.; Jeschke, S.; Brecher, C. Cyber-Physical Systems: Foundations, Principles and Applications; Morgan Kaufmann: Boston, MA, USA, 2016; ISBN 978-0-12-803801-7. [Google Scholar]
  2. Ning, H.; Liu, H.; Ma, J.; Yang, L.T.; Huang, R. Cyber-physical-social-thinking hyperspace based science and technology. Future Gener. Comput. Syst. 2015, 56, 504–522. [Google Scholar] [CrossRef]
  3. Jiang, P.; Winkley, J.; Zhao, C.; Munnoch, R.; Min, G.; Yang, L.T. An Intelligent Information Forwarder for Healthcare Big Data Systems with Distributed Wearable Sensors. IEEE Syst. J. 2016, 3, 1147–1159. [Google Scholar] [CrossRef]
  4. Yi, L.; Deng, X.; Zou, Z.; Ding, D.; Yang, L.T. Confident Information Coverage Hole Detection in Sensor Networks for Uranium Tailing Monitoring. Elsevier J. Parallel Distrib. Comput. 2018, 118, 57–66. [Google Scholar] [CrossRef]
  5. Naik, V.K.; Liu, C.; Yang, L.T.; Wagner, J. Online resource matching for heterogeneous grid environments. In Proceedings of the IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2005), Cardiff, UK, 9–12 May 2005; pp. 607–614. [Google Scholar]
  6. Deng, X.; Yang, L.T.; Yi, L.; Wang, M.; Zhu, Z. Detecting Confident Information Coverage Holes in Industrial Internet of Things: An Energy-Efficient Perspective. IEEE Commun. Mag. 2018, 9, 68–73. [Google Scholar] [CrossRef]
  7. Edfors, O.; Sandell, M.; Van De Beek, J.J.; Wilson, S.K.; Borjesson, P.O. Analysis of DFT-Based Channel Estimators for OFDM. Wirel. Pers. Commun. 2000, 1, 55–70. [Google Scholar] [CrossRef]
  8. Minn, H.; Dong, I.K.; Bhargava, V.K. A reduced complexity channel estimation for OFDM systems with transmit diversity in mobile wireless channels. IEEE Trans. Commun. 2002, 5, 799–807. [Google Scholar] [CrossRef]
  9. Fukuhara, T.; Yuan, H.; Takeuchi, Y.; Takeuchi, Y. A novel channel estimation method for OFDM transmission technique under fast time-variant fading channel. In Proceedings of the IEEE Semiannual Vehicular Technology Conference (VTC 2003), Jeju, Korea, 22–25 April 2003; pp. 2343–2347. [Google Scholar]
  10. Fan, R.; Mu, F.; Su, M. DFT-based pilot-symbol-aided channel estimation in OFDM systems. J. Nanjing Univers. Posts Telecommun. 2015, 2, 79–83. [Google Scholar]
  11. Fan, T.; Yang, S.; Wu, H.; Wang, D. Two Novel Channel Estimation for OFDM Systems by Time-Domain Cluster Discriminant Analysis Based on Parametric Channel Modeling. Wirel. Pers. Commun. 2013, 2, 349–360. [Google Scholar] [CrossRef]
  12. Ma, X.; Fan, T.; Du, Y. An Improved DFT-Based Channel Estimation Algorithm for OFDM System on Time-Varying Multipath Fading Channels. Adv. Mater. Res. 2014, 989–994, 3786–3789. [Google Scholar] [CrossRef]
  13. Zhu, C.; Wang, H.; Liu, X.; Yang, L.T.; Leung, V.C.M. A Novel Sensory Data Processing Framework to Integrate Sensor Networks With Mobile Cloud. IEEE Syst. J. 2016, 3, 1125–1136. [Google Scholar] [CrossRef]
  14. Du, Q.; Song, H.; Xu, Q.; Ren, P.; Sun, L. Interference-controlled D2D routing aided by knowledge extraction at cellular infrastructure towards ubiquitous CPS. Pers. Ubiquitous Comput. 2015, 7, 1033–1043. [Google Scholar] [CrossRef]
  15. Zhu, J.; Song, Y.; Jiang, D.; Song, H. A New Deep-Q-Learning-Based Transmission Scheduling Mechanism for the Cognitive Internet of Things. IEEE Internet Things J. 2018, 4, 2375–2385. [Google Scholar] [CrossRef]
  16. Liu, F.; Zhao, H.; Quan, X.; Liu, Y.; Tang, Y. Eigen Domain Interference Rejection Combining Algorithm for MIMO Systems. IEEE Commun. Lett. 2016, 5, 850–853. [Google Scholar] [CrossRef]
  17. Deng, X.; Tang, Z.; Yang, L.T.; Lin, M.; Wang, B. Confident Information Coverage Hole Healing in Hybrid Industrial Wireless Sensor Networks. IEEE Trans. Ind. Inform. 2018, 5, 2220–2229. [Google Scholar] [CrossRef]
  18. Hadaschik, N.; Zakia, I.; Ascheid, G.; Meyr, H. Joint Narrowband Interference Detection and Channel Estimation for Wideband OFDM. In Proceedings of the European Wireless Conference 2007, Paris, France, 1–4 April 2007. [Google Scholar]
  19. Islam, S.M.R.; Iqbal, A.; Kwak, K.S. Joint Channel Estimation and Interference Suppressions for MB-OFDM UWB Systems. In Proceedings of the 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), Chengdu, China, 23–25 September 2010. [Google Scholar]
  20. Zhang, L.; Ijaz, A.; Xiao, P.; Tafazolli, R. Channel Equalization and Interference Analysis for Uplink Narrowband Internet of Things (NB-IoT). IEEE Commun. Lett. 2017, 10, 2206–2209. [Google Scholar] [CrossRef]
  21. Yi, L.; Deng, X.; Wang, M.; Ding, D.; Wang, Y. Localized Confident Information Coverage Hole Detection in Internet of Things for Radioactive Pollution Monitoring. IEEE Access 2017, 5, 18665–18674. [Google Scholar] [CrossRef]
  22. Al-Tous, H.; Barhumi, I.; Al-Dhahir, N. Narrow-Band Interference Mitigation Using Compressive Sensing for AF-OFDM Systems. IEEE Trans. Veh. Technol. 2017, 9, 2741–2748. [Google Scholar] [CrossRef]
  23. Deng, X.; Tang, Z.; Yi, L.; Yang, L.T. Healing Multi-modal Confident Information Coverage Holes in NB-IoT-Enabled Networks. IEEE Internet Things J. 2018, 3, 1463–1473. [Google Scholar] [CrossRef]
  24. Likas, A.; Vlassis, N.; Verbeek, J.J. The global k-means clustering algorithm. Pattern Recogn. 2003, 2, 451–461. [Google Scholar] [CrossRef]
  25. Arora, P.; Deepali, D.; Varshney, S. Analysis of K-Means and K-Medoids Algorithm For Big Data. Procedia Comput. Sci. 2016, 78, 507–512. [Google Scholar] [CrossRef]
  26. Keller, J.M.; Gray, M.R.; Givens, J.A. A fuzzy K-nearest neighbor algorithm. IEEE Trans. Syst. Man Cybern. 2012, 4, 580–585. [Google Scholar] [CrossRef]
  27. Chaudhuri, K.; Dasgupta, S. Rates of Convergence for Nearest Neighbor Classification. Adv. Neural Inf. Process. Syst. 2014, 4, 3437–3445. [Google Scholar]
  28. Dorazio, C.J.; Choo, K.K.R.; Yang, L.T. Data Exfiltration from Internet of Things Devices: iOS Devices as Case Studies. IEEE Internet Things J. 2017, 2, 524–535. [Google Scholar] [CrossRef]
  29. Dhar, S.K.; Bhunia, S.S.; Mukherjee, N. Interference Aware Scheduling of Sensors in IoT Enabled Health-Care Monitoring System. In Proceedings of the 2014 Fourth International Conference of Emerging Applications of Information Technology, Kolkata, India, 19–21 December 2014; pp. 152–157. [Google Scholar]
  30. Zhang, Z.; Wang, H.; Wang, C.; Fang, H. Interference Mitigation for Cyber-Physical Wireless Body Area Network System Using Social Networks. IEEE Trans. Emerg. Top. Comput. 2013, 1, 121–132. [Google Scholar] [CrossRef] [PubMed]
  31. Cheng, X.; Yang, L.; Shen, X. D2D for Intelligent Transportation Systems: A Feasibility Study. IEEE Trans. Intell. Transp. Syst. 2015, 4, 1784–1793. [Google Scholar] [CrossRef]
Figure 1. Power spectrum of NBI. (a) single tone jamming; (b) multitone jamming.
Figure 1. Power spectrum of NBI. (a) single tone jamming; (b) multitone jamming.
Sensors 18 03823 g001
Figure 2. The integrated process of channel estimation with interference suppression.
Figure 2. The integrated process of channel estimation with interference suppression.
Sensors 18 03823 g002
Figure 3. MSE of the channel estimation schemes.
Figure 3. MSE of the channel estimation schemes.
Sensors 18 03823 g003
Figure 4. BER based on different channel estimation schemes.
Figure 4. BER based on different channel estimation schemes.
Sensors 18 03823 g004
Figure 5. BER in different interference suppression schemes.
Figure 5. BER in different interference suppression schemes.
Sensors 18 03823 g005
Figure 6. BER in different interference styles.
Figure 6. BER in different interference styles.
Sensors 18 03823 g006
Figure 7. Communication systems in ICV.
Figure 7. Communication systems in ICV.
Sensors 18 03823 g007
Figure 8. Spectrum division of the communication systems in ICV.
Figure 8. Spectrum division of the communication systems in ICV.
Sensors 18 03823 g008
Table 1. Computation of algorithm modules.
Table 1. Computation of algorithm modules.
Algorithm ModulesBasis of AlgorithmCore OperatorComputation
FFT transformationRadix-416b × 16b MAC1013.76 M
LS estimationLeast square16b × 16b MA122.88 M
Interference detectionK-means16b × 16b MAC122.88 M
Interference suppressionLinear interpolation16b × 16b MAnegligible
noise cancellation 1KNN16b × 16b MAC368.64 M
noise cancellation 2Windowing16b × 16b MAC245.76 M
noise cancellation 3Mahalanobis distance16b × 16b MA368.64 M
Table 2. Transmission parameters.
Table 2. Transmission parameters.
ParametersSpecifications
Carrier frequency400 MHz–700 MHz
Modulation type16 QAM a
Transmission rate23.56 Mbps
Subcarrier number1024
Subcarrier spacing15 kHz
Channel codesTurbo
a QAM, Quadrature Amplitude Modulation.
Table 3. Channel parameters.
Table 3. Channel parameters.
Tap NumberAverage Power (dB)Relative Delay (ns)
0−30
10200
2−2600
3−61600
4−82400
5−105000
Table 4. Simulation scenes with different interference styles.
Table 4. Simulation scenes with different interference styles.
Simulation SceneInterference StyleJSRInterference Suppression Method
Scene 1No interference
Scene 2Single toneJSR = 10 dBWith nothing done
Scene 3Single toneJSR = 10 dBZero force
Scene 4Single toneJSR = 10 dBLinear interpolation
Scene 5multitone with 10 subcarriersJSR = 10 dBLinear interpolation
Scene 6multitone with 10 subcarriersJSR = 15 dBLinear interpolation

Share and Cite

MDPI and ACS Style

Lai, X.; Wang, H. Combined Channel Estimation with Interference Suppression in CPSS. Sensors 2018, 18, 3823. https://doi.org/10.3390/s18113823

AMA Style

Lai X, Wang H. Combined Channel Estimation with Interference Suppression in CPSS. Sensors. 2018; 18(11):3823. https://doi.org/10.3390/s18113823

Chicago/Turabian Style

Lai, Xiaoyang, and Huan Wang. 2018. "Combined Channel Estimation with Interference Suppression in CPSS" Sensors 18, no. 11: 3823. https://doi.org/10.3390/s18113823

APA Style

Lai, X., & Wang, H. (2018). Combined Channel Estimation with Interference Suppression in CPSS. Sensors, 18(11), 3823. https://doi.org/10.3390/s18113823

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop