Next Article in Journal
Gradient-Based Time-Extended Potential Field Method for Real-Time Path Planning in Infrastructure-Based Cooperative Driving Systems
Previous Article in Journal
U-ResNet, a Novel Network Fusion Method for Image Classification and Segmentation
Previous Article in Special Issue
Deep Reinforcement Learning-Based Routing Method for Low Earth Orbit Mega-Constellation Satellite Networks with Service Function Constraints
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Random Access Preamble Design for 6G Satellite–Terrestrial Integrated Communication Systems

1
The College of Information Science and Technology & Artificial Intelligence, Nanjing Forestry University, Nanjing 210037, China
2
The School of Low-Altitude Equipment and Intelligent Control, Guangzhou Maritime University, Guangzhou 510725, China
*
Author to whom correspondence should be addressed.
Sensors 2025, 25(17), 5602; https://doi.org/10.3390/s25175602
Submission received: 8 August 2025 / Revised: 2 September 2025 / Accepted: 4 September 2025 / Published: 8 September 2025
(This article belongs to the Special Issue 5G/6G Networks for Wireless Communication and IoT)

Abstract

Satellite–terrestrial integrated communication systems (STICSs) are envisioned to provide ubiquitous, seamless connectivity in next-generation (6G) wireless communication networks for massive-scale Internet of Things (IoT) deployments. This global coverage extends beyond densely populated areas to remote regions (e.g., polar zones, open oceans, deserts) and disaster-prone areas, supporting diverse IoT applications, including remote sensing, smart cities, intelligent agriculture/forestry, environmental monitoring, and emergency reporting. Random access signals, which constitute the initial transmission from access IoT devices to base station for unscheduled transmissions or network entry in terrestrial networks (TNs), encounter significant challenges in STICSs due to inherent satellite characteristics: wide coverage, large-scale access, substantial round-trip delay, and high carrier frequency offset (CFO). Consequently, conventional TN preamble designs based on Zadoff–Chu (ZC) sequences, as used in 4G LTE and 5G NR systems, are unsuitable for direct deployment in 6G STICSs. This paper first analyzes the challenges in adapting terrestrial designs to STICSs. It then proposes a CFO-resistant preamble design specifically tailored for STICSs and details its detection procedure. Furthermore, a dedicated root set selection algorithm for the proposed preambles is presented, generating an expanded pool of random access signals to meet the demands of increasing IoT device access. The developed analytical framework provides a foundation for performance analysis of random access signals in 6G STICSs.

1. Introduction

By 2029, the number of devices within the Internet of Things (IoT) networks is projected to reach 29 billion [1]. These devices range from low-cost environmental sensors to sophisticated instruments such as smartphones and robots [2]. They serve diverse applications critical to modern infrastructure and environmental stewardship, including remote sensing, smart cities, smart grids, intelligent transportation systems, agricultural and forestry monitoring, environmental surveillance and emergency reporting [1,3,4,5]. Seamless connectivity is paramount for facilitating data collection, exchange, and processing between these geographically dispersed IoT devices and users, thereby enabling intelligent decision-making systems across these domains [1,4,5,6]. Through the integration of sensing and communication (ISAC) capabilities, supported by technologies such as intelligent reflecting surfaces (IRS), along with the deep integration of artificial intelligence into the network architectures [7,8], the envisioned next-generation (6G) networks are expected to further amplify these demands. This progression will intensify the need for robust connectivity solutions to support massive and ubiquitous IoT deployments.
However, conventional terrestrial cellular communication networks, primarily designed for person-to-person communication in populated areas, struggle to provide ubiquitous coverage due to environmental and economic constraints. Consequently, regions with poor or unavailable terrestrial coverage, such as oceans, forests, polar areas, and remote sensing operation sites, remain underserved for IoT deployments [9,10,11,12,13]. Non-Terrestrial Networks (NTNs), comprising satellites and high-altitude platforms, are seen as a feasible solution to supplement terrestrial IoT networks and achieve ubiquitous coverage in 6G wireless communication systems. They are envisioned to provide essential communication backhaul for geographically dispersed IoT assets, particularly remote sensors and trackers [9,10,11,12]. The ongoing deployment of remote sensing constellations in China and globally further intensifies the demand for robust and scalable communication solutions for data transmission [14]. Significant satellite deployment efforts are underway, with the low Earth orbit (LEO) satellite market expected to grow to $12.51 billion by 2027 at a 24.2% compound annual growth rate (CAGR) [1]. Compared with geostationary Earth orbit (GEO) and medium Earth orbit (MEO) satellite communication systems, LEO satellite systems operate at a significantly lower orbital altitude. This results in substantially shorter propagation delays (typically 4–10 ms versus approximately 500 ms for GEO systems [15]), lower production and launch costs [16], and lower path loss. The decreased path loss contributes to an improved link budget relative to GEO or MEO systems, thereby reducing energy consumption for both devices in the uplink and satellite transmitters in the downlink. These characteristics make LEO constellations the preferred platform for satellite–terrestrial integrated communication systems (STICSs), as reflected in the broader literature [10,12,17], and constitute the main focus of this paper.
In terrestrial cellular systems, the random access (RA) procedure establishes uplink synchronization, identifies users, and resolves unscheduled data transmission. This process is initiated when an access device transmits an RA preamble on the physical random access channel (PRACH). Upon preamble detection, the base station identifies the preamble index within the assigned preamble pool and measures the round-trip propagation delay (sum of downlink and uplink delays). The preamble index is further utilized to confirm the unique identity of the detecting device, while the round-trip delay (RTD) adjusts subsequent uplink transmission timing on the physical uplink shared channel (PUSCH), ensuring time-aligned signals at the base station receiver. Current 4G Long Term Evolution (LTE) and 5G New Radio (NR) systems employ Zadoff–Chu (ZC) sequence-based CDMA preambles spread over dedicated PRACH resources in time and frequency [18,19].
However, adapting this TN preamble design to NTNs, particularly satellite communication systems, presents significant challenges due to unique propagation characteristics. The extended communication distance in satellite communication systems induces severe path loss, which degrades the received signal-to-noise ratio (SNR) and consequently impairs detection performance critical for IoT devices in remote scenarios. Furthermore, the RTD in satellite communication systems often exceeds the preamble duration used in TN, invalidating cyclic-shift-based device differentiation. Substantial Doppler shifts caused by rapid relative motion between the satellite and the access devices disrupt subcarrier orthogonality, leading to energy attenuation and leakage [20,21,22]. Additionally, the vast coverage areas of satellites necessitate support for a substantially larger pool of RA preambles than the terrestrial limit of 64 per PRACH resource defined in LTE/NR standards. This requirement is particularly critical to accommodate large-scale deployments of IoT devices accessing the network simultaneously over wide geographic areas.
To ensure compatibility with terrestrial RA signaling, extensive research has focused on designing preamble sequences for satellite communication systems, often leveraging the ZC sequence-based framework. Several studies [23,24,25,26] propose constructing long preamble sequences by concatenating multiple ZC sequences with different roots in the time domain. However, a larger subcarrier spacing (SCS) is required in [23,24] to help increase the system sensitivity to carrier frequency offset (CFO). Moreover, the significant propagation delay and path loss inherent in satellite channels are not fully addressed in [25,26]. Other designs concatenate a single-root ZC sequence with different cyclic shifts [27], but this also requires a larger SCS to ensure the maximum CFO does not exceed half the SCS for robustness. Furthermore, some studies integrate ZC sequences with other sequence types. For example, ref. [9] proposes a long preamble structure formed by cascading several short ZC sequences in the time domain, which are subsequently scrambled using a BPSK-modulated m-sequence. Similarly, ref. [28] introduces a novel PRACH format where part of repeated ZC sequences is scrambled using a BPSK-Golden sequence. Crucially, most of these studies [9,23,24,25,26,27] focus on designing only a single preamble. As highlighted in [28,29], the wide satellite coverage area and the increased scale of simultaneous RA attempts necessitate the availability of a significantly larger pool of preambles. Therefore, it is essential to develop a comprehensive preamble set comprising more preambles. In this context, analyzing the cross-correlation properties among these signals becomes crucial to ensure reliable detection and minimize multi-user interference.
Additionally, to simplify integrating 5G NR’s PRACH into NTN scenarios, several works assume that Global Navigation Satellite System (GNSS) functionality is embedded within each IoT device [9,12,30,31,32]. This enables devices to utilize GNSS-derived location and satellite ephemeris data for mobility management, compensating for Doppler effects and the large delays. The authors also previously proposed a pool of 128 random access preambles for satellite communication, assuming GNSS compensation for Doppler frequency shift and common RTD [32]. However, neglecting CFO is impractical. As indicated in [21,23], while the common Doppler shift and RTD relative to a reference point can be calculated and eliminated by the satellite, the device-specific RTD and, critically, device-specific CFO require specific treatment in NTN RA preamble design. These device-specific impairments may not be readily acquirable due to environmental factors or limitations in IoT device capability and configuration (e.g., oscillator instability). Therefore, in this paper, device-specific CFO and delay are incorporated into the preamble design, while common Doppler shift and RTD are assumed to be pre-compensated via GNSS. Accordingly, it is essential to develop a preamble pool that: (1) adheres to satellite communication requirements (e.g., wide coverage, large-scale access), (2) accounts for user-specific delay and frequency offsets, and (3) maintains compatibility with TN preamble designs.
Motivated by these critical requirements for enabling massive IoT connectivity, this paper introduces a pool of RA preamble signals optimized for LEO-based STICSs. Section 2 reviews the RA design in current TN and discusses the approach proposed in [32] for LEO-based STICSs. While the design in [32] satisfies several requirements, it fails to address device-specific CFO. Section 3 analyzes the impact of CFO on the approach presented in [32]. Section 4 proposes a CFO-resistant preamble design, upgraded from the design in [32], and details the corresponding detection procedure. Section 5 presents a dedicated root set selection algorithm. Section 6 provides simulation results demonstrating the proposed signal’s robustness against CFO. Section 7 concludes the paper.

2. Related Work

Figure 1a illustrates the time-domain structure of the random access preamble signal in 4G LTE and 5G NR systems. Since the preamble transmission timing is derived from the downlink synchronization signals, the arrival time of the preamble at the base station includes a round-trip propagation delay (i.e., downlink plus uplink). Therefore, unlike the cyclic prefix (CP) in a normal orthogonal frequency division multiplexing (OFDM) symbol, which is primarily designed to address multipath delay spread, the CP of the random access preamble is extended to be sufficiently long to accommodate not only the channel delay spread but also the maximum round-trip propagation delay. This enables detection of the random access signal from a device without prior knowledge of its exact arrival timing. The guard time (GT) is introduced to prevent the random access signal from overlapping with the subsequent data symbol due to propagation delays. Since the following symbol contains uplink data transmissions from other devices, such overlap would cause interference and impair decoding performance.
A ZC sequence is used to generate the preamble sequence. It is defined as
ZC μ = ZC μ n = e j π μ n n + 1 N ZC , n = 0 , 1 , , N ZC 1
when the sequence length N ZC is odd, or as
ZC μ = ZC μ n = e j π μ n 2 N ZC , n = 0 , 1 , , N ZC 1
when N ZC is even. The root μ 1 , 2 , , N ZC 1 must be coprime with the length N ZC . ZC sequences sharing the same root index but having different cyclic shifts are orthogonal, i.e.,
1 N ZC n = 0 N ZC 1 ZC μ n + m 1 ZC μ * n + m 2 = δ m 1 m 2 , m 1 , m 2 = 0 , 1 , , N ZC 1
Consequently, ZC sequences with the same root but distinct cyclic shifts are used to distinguish different random access preamble sequences. Sequences derived from distinct roots are introduced only when the number of available valid cyclic shifts for a single root is insufficient to support the required number of random access opportunities.
Figure 1b illustrates the structure of the proposed preamble in [32], which retains the CP-sequence-GT framework for compatibility with TNs while incorporating optimizations tailored for satellite communication systems. Specifically, the CP and GT durations are optimized to accommodate the maximum differential round-trip delay, assuming pre-compensation of CFO and common round-trip delay RTD across devices within the satellite beam coverage. In contrast to TN system designs, which rely on cyclic shifts to differentiate random access signals, this approach refrains from cyclic shift multiplexing. This decision arises because the maximum differential RTD in satellite systems exceeds the typical preamble duration of TN systems, rendering cyclic shifts ineffective for signal separation. To mitigate the significant path loss induced by long-haul satellite transmissions, the preamble sequence duration is extended to enhance signal energy. The specific duration is systematically determined by balancing key tradeoffs, including communication coverage requirements, TN compatibility constraints, and the maximum differential RTD [32].
The preamble sequence proposed in [32] concatenates K repetitions of a short ZC sequence, ZC s n , n = 0 , 1 , , N ZC 1 , and scrambles the result with a long ZC sequence ZC r n , n = 0 , 1 , , N 1 . This preamble sequence is mathematically defined as
X s , r = x s , r n = ZC s n ZC r n , n = 0 , 1 , , N 1
where N = K N ZC . Here, s and r denote the roots of the short and long ZC sequences, respectively. Distinct long ZC sequences with different roots r are assigned to different preamble sequences.
The deigned sequence exhibits ideal auto-correlation property, i.e.,
C r , r m = 1 N n = 0 N 1 x s , r n x s , r * n m = δ m , m = 0 , 1 , , N 1
provided gcd r + s K , N = 1 . Here, the function gcd r + s K , N denotes the greatest common divisor of r + s K and N . The cross-correlation between distinct random access sequence X s , r and X s , o is
C r , o m = 1 N n = 0 N 1 x s , r n x s , o * n m = g N δ d                           N   and   u v   are   even , or   N   is   odd , g N δ d g 2                               N   is   even   and   u v   is   odd ,
where g gcd r o , N , u N g , v r o g .
To minimize the cross-correlation coefficient, it is necessary to reduce the value of g as much as possible. In [32], roots are carefully selected to satisfy g K and a pool of 128 random access signals are provided. Consequently, the upper bound on the cross-correlation magnitude is bounded by
C r , o m g N K K N ZC = 1 N ZC

3. Analyses of Frequency Offset Effect

The proposed design in [32] addresses most key requirements for satellite communication systems, including doubling the number of random access signals per PRACH resource compared to terrestrial LTE/NR systems, accounting for device-specific differential RTD, ensuring compatibility with terrestrial preamble architectures, and supporting broader coverage. However, it omits device-specific CFO considerations. Now, we will analyze the impact of CFO on this design, laying the foundation for developing CFO-resistant upgrades.
A device that wants to access the network randomly selects a preamble from the pool, for instance, a preamble P composed of a CP of length N CP and a sequence X s , r of length N . This signal propagates through the channel with gain h and is received by the satellite receiver with a frequency offset Δ f relative to the device. For mathematical tractability, the conventional block fading model is employed in the subsequent analysis, where the channel is assumed to remain constant throughout the transmission period.
At the satellite receiver, this preamble signal is sampled as
y n = h p n τ e j 2 π n Δ f N ZC Δ f sc + ω n = h p n τ e j 2 π N n ε + ω n , n = 0 , 1 , , N + N CP 1 ,
where τ denotes the device-specific differential arrival delay, ε K Δ f Δ f sc represents the normalized frequency offset, Δ f sc is the subcarrier spacing of the PRACH resource, and ω n C N 0 , σ 2 is the complex-valued Gaussian noise with zero-mean and variance σ 2 . For subsequent analyses, we define ρ h 2 σ 2 as the received sample signal-to-noise ratio (SNR).
The receiver discards the first N CP samples and retain only the last N samples from y . This results in y , which is defined as
y n y n + N CP = h x s , r n τ e j 2 π N ε n + w n ,   n = 0 ,   1 , ,   N 1
where the constant phase e j 2 π N ε N CP is incorporated into h for notational simplification, and w n ω n + N CP .
The correlation between the received sequence and X s , r at hypothesis timing m is
G ( m , ε ) = 1 N n = 0 N 1 y n x s , r n m = h C r , r ( m , ε ) + ϖ m
where ϖ m = 1 N n = 0 N 1 w n x s , r n m C N 0 , σ 2 N ,
C r , r m , ε 1 N n = 0 N 1 x s , r n τ e j 2 π n ε N x s , r n m = 1 N e j π r + s K m 2 τ 2 s K m τ + ε r + K s m τ N 1 N sin π ε r + K s m τ sin π ε r + K s m τ N .
In the presence of a frequency offset ε , the absolute value of this correlation is
C r , r m , ε = 1 N sin π ε r + K s m τ sin π ε r + K s m τ N
Express ε = ε i + ε f , where ε i and ε f ( 0.5 , 0.5 ] denote the integer and the parts, respectively. For integer ε (i.e., ε f = 0 or ε = ε i ),
C r , r m , ε = δ m ε i r + K s 1 + τ mod N
This indicates that the integer ε i induces a cyclic shift in the peak correlation value. Specifically, it displaces the peak from m = τ to
m = ε i r + K s 1 + τ mod N
This phenomenon obfuscates the precise disentanglement of τ and ε i from the observed peak position. Here, a 1 denotes an integer within the range 1 , N 1 and satisfies a 1 a mod N = 1 .
For a non-integer ε (i.e., ε f 0 ), it can be easily verified that 0 < C r , r m m , ε C r , r m = m , ε < 1 . This demonstrates that fractional ε not only attenuates the peak correlation amplitude at m = m but also results in energy leakage across all the other cyclic shifts, complicating reliable peak detection and parameter estimation.
Figure 2 illustrates the correlation coefficient C r , r m , ε under various frequency offsets. The simulated parameters are s = 1 , r = 5 , K = 8 , N ZC = 839 , N = K N ZC = 6712 , and τ = 2000 . Here, N ZC = 839 aligns with the length configuration used for terrestrial RACH in both 4G LTE and 5G NR, ensuring backward compatibility. Since r + K s 1 = 1549 , the maximum correlation value is located at m = m = ε i 1549 + 2000 mod N . For an integer ε , e.g., ε = ε i = 1 , the correlation achieves the maximum value of one at m = m = 3549 , i.e., C r , r 3549 , 1 = 1 , while it remains zero at all the other cyclic shifts, i.e., C r , r m 3549 , 1 = 0 . For a non-integer ε , e.g., ε = 0.7 , where ε i = 1 and ε f = 0.3 , the maximum value decreases, e.g., C r , r 3549 , 0.7 = 0.858 < 1 . Furthermore, the correlation value at other cyclic shifts becomes no longer zero, i.e., C r , r m 3549 , 0.7 > 0 , which is referred to as energy leakage. Herein, energy leakage indicates the presence of non-zero correlation at cyclic shifts different from m = m .
As observed in Figure 2, for 0.5 < ε f < 0 , the majority of the leaked energy is located at
m = ε i 1 r + K s 1 + τ mod N = m r + K s 1 mod N
Conversely, for 0 < ε f 0.5 , the largest leaked energy shifts to
m = ε i + 1 r + K s 1 + τ mod N = m + r + K s 1 mod N
In summary, when 0 < ε f < 0.5 , the following inequality holds:
0 < C r , r m m , m , ε < C r , r m , ε < C r , r m , ε < 1
A special case occurs when ε f = 0.5 , at which the maximum correlation value is minimized. Simultaneously, the correlation value at m equals that m = m , as described by
0 < C r , r m m , m , ε i + 0.5 < C r , r m , ε i + 0.5 = C r , r m , ε i + 0.5 = 0.637
For example, with ε = 0.5 (i.e., ε i = 0 ), the maximum correlation occurs at both m = m = 2000 and m = m = 3549 , i.e., C r , r 2000 , 0.5 = C r , r 3549 , 0.5 = 0.637 . At this point, the leaked energy attains its maximum value of approximately 0.637. In all other cases, the maximum leaked energy remains below 0.637.
Figure 3 illustrates the average cross-correlation coefficient E C r , o m , ε of the proposed random access signals in [32] under varying CFOs. Here, C r , o m , ε denotes the cross-correlation between sequence X s , r and X s , o with CFO ε , i.e.,
C r , o m , ε = 1 N n = 0 N 1 x s , r n τ e j 2 π n ε N x s , o n m
The parameters for Figure 3 employs s = 1 , r = 5 , K = 8 , N ZC = 839 , and N = K N ZC = 6712 . Roots r and o (designed to be distinct) are from Table 4 in [32] to differentiate random access sequences. Results demonstrate that the proposed sequences maintain low cross-correlation performance, exhibiting robustness against CFO effects.

4. Upgraded CFO-Resistant Random Access Sequence Design and Detection

Section 3 analyzed the frequency offset effect on the preamble designed in [32] for satellite systems. Two primary conclusions are drawn: First, the integer CFO component ε i shifts the correlation peak position to m = m . Second, the fractional CFO component ε f attenuates the peak magnitude at m = m below 1 and causes energy leakage to other cyclic shifts, with the dominant leakage occurring at m = m . To ensure reliable detection performance, including timing estimation for uplink transmission, a CFO-resistant preamble design and its detection procedure are proposed.

4.1. Upgraded Random Access Sequence Design

The preamble design in [32] is now modified to adapt to device-specific differential frequency offsets. Since both τ and ε i in (14) are unknown, deriving these parameters requires two independent linear equations. A straightforward solution is to generate a second equation analogous to (14).
Consequently, a pair of sequences from [32], denoted as X s , r 1 and X s , r 2 , are combined to form a new random access sequence X :
x n = 1 2 x s , r 1 n + x s , r 2 n = 1 2 ZC s n ZC r 1 n + ZC s n ZC r 2 n
The received sequence is then expressed as
y ( n ) = h x n τ e j 2 π n ε N + w ( n ) = h 2 x s , r 1 n τ + x s , r 2 n τ e j 2 π N ε n + w n ,   n = 0 ,   1 , ,   N 1 .
At the receiver, correlations are performed between y ( n ) and each reference sequence X s , r 1 and X s , r 2 , i.e.,
G 1 ( m , ε ) = 1 N n = 0 N 1 y n τ x s , r 1 n m = h 2 C r 1 , r 1 m , ε + C r 2 , r 1 m , ε + ϖ r 1 m
and
G 2 ( m , ε ) = 1 N n = 0 N 1 y n τ x s , r 2 n m = h 2 C r 2 , r 2 m , ε + C r 1 , r 2 m , ε + ϖ r 2 m
where C r 2 , r 1 m , ε = 1 N n = 0 N 1 x s , r 2 n τ e j 2 π n ε N x s , r 1 n m , ϖ r 1 m C N 0 , σ 2 N , C r 1 , r 2 m , ε = 1 N n = 0 N 1 x s , r 1 n τ e j 2 π n ε N x s , r 2 n m , ϖ r 2 m C N 0 , σ 2 N .

4.2. Upgraded Random Access Sequence Detection Mechanism

The complex outputs G 1 ( m , ε ) and G 2 ( m , ε ) are converted to magnitude-squared metrics, defined as η 1 m , ε G 1 ( m , ε ) 2 and η 2 m , ε G 2 ( m , ε ) 2 . This conversion removes phase information, retaining only magnitude for detection.
The baseline detection metric is defined as
λ ε = η 1 q 1 , ε + η 2 q 2 , ε
where
q 1 = arg max m 0 , N 1 η 1 m , ε , q 2 = arg max m 0 , N 1 η 2 m , ε
In the presence of an integer ε , it follows that q 1 = m 1 = ε i r 1 + K s 1 + τ mod N and q 2 = m 2 = ε i r 2 + K s 1 + τ mod N under noiseless conditions. As demonstrated in Figure 2 and Figure 3, cross-correlation values are significantly lower than the peak auto-correlation and are negligible compared to the dominate peak auto-correlation. Optimal detection is achieved in this case because C r , r m , ε i = 1 and C r , r m m , ε i = 0 . Consequently, an integer CFO introduces no detection loss but results in a timing offset.
For non-integer CFO ( ε f 0 ), peak attenuation ( C r , r m = m , ε ε i < 1 ) and energy leakage ( C r , r m m , ε ε i > 0 ) degrades detection performance. To mitigate this, the dominate leakage energy at m = m can be incorporated into a revised detection metric:
λ ε = η 1 q 1 , ε + η 1 v 1 , ε + η 2 q 2 , ε + η 2 v 2 , ε
where leakage positions v 1 and v 2 correspond to secondary maxima excluding primary peaks, formally defined as
v 1 = arg max m 0 , N 1 m q 1 η 1 m , ε , v 2 = arg max m 0 , N 1 m q 2 η 2 m , ε
Ignoring noise, the positions v 1 , v 2 are
v 1 = m 1 = m 1 r 1 + K s 1 mod N , v 2 = m 2 = m 2 r 2 + K s 1 mod N
for 0.5 < ε f < 0 . Otherwise, i.e., 0 < ε f 0.5 ,
v 1 = m 1 = m 1 + r 1 + K s 1 mod N , v 2 = m 2 = m 2 + r 2 + K s 1 mod N
Sequence X is declared detected if λ ε > T , where the threshold T is set to maintain a reasonably false alarm rate, e.g., 0.1 % [32].

4.3. Timing Estimation in the Presence of CFO

The preamble indicates device presence and enables uplink timing estimation (differential round-trip propagation delay) at the satellite receiver. This section details timing estimation post-detection.

4.3.1. Integer CFO Case ( ε f = 0 )

When ε f = 0 (ignoring noise), C r , r m m , ε = ε i = 0 . Thus, m does not exist due to the absence of energy leakage. In this case, the time offset τ must therefore be estimated solely from the peak correlation positions m 1 and m 2 . However, the modulo operation in m as shown in (14) prevents the direct extraction of τ and ε . Define Δ m ε i as
Δ m ε i m 1 m 2 mod N = ε i Δ r 1 , r 2 mod N
where Δ r 1 , r 2 r 1 + K s 1 r 2 + K s 1 is a constant. It is apparent that Δ m ε i depends solely on ε i , not τ . If a one-to-one mapping exists between ε i and Δ m ε i , then τ can be obtained from
τ = m ε i r + K s 1 mod N
provided ε i is uniquely determined by Δ m ε i .
This mapping requires all elements in set Q r 1 , r 2 to be unique. The set Q r 1 , r 2 is defined as
Q r 1 , r 2 Q r 1 , r 2 n , 0 n L 1 = n ζ Δ r 1 , r 2 mod N , 0 n L 1
where ζ is the maximum integer CFO ( ζ ε i ζ ), L = 2 ζ + 1 is the number of elements in set Q r 1 , r 2 . Element uniqueness is equivalent to the requirement that
Δ n Δ r 1 , r 2 mod N 0
for 1 Δ n L 1 .
In this case, timing estimation can be performed in three steps. First, obtain q 1 and q 2 from (25) and compute Δ q q 1 q 2 mod N . Second, find index n of Δ q in set Q r 1 , r 2 such that Q r 1 , r 2 n = Δ q . Then, the integer CFO can be determined as ε i = n ζ . Third, estimate τ via (31).

4.3.2. Non-Integer CFO Case ( ε f 0 )

For non-integer CFO where 0 < ε f < 0.5 , the aforementioned method remains effective because the cyclic shift m = m consistently retains the peak correlation in this case. However, when ε f = 0.5 , the correlation strengths at positions m and m become equal, C r , r m , ε = ε i + 0.5 = C r , r m , ε = ε i + 0.5 , rendering the two positions indistinguishable. Consequently, q in (25) (and v in (29)) could correspond to either m and m , invalidating the prior timing method. A robust method is therefore required for ε f 0 , including ε f = 0.5 .
Consider the characteristics of m 1 and m 2 . It is observed that
m 1 m 2 mod N = ε i 1 Δ r 1 , r 2 mod N , 0.5 < ε f < 0 ε i + 1 Δ r 1 , r 2 mod N , 0 < ε f 0.5 = Δ m ε i 1 , 0.5 < ε f < 0 , Δ m ε i + 1 , 0 < ε f 0.5 .
Assuming (33) holds, the differential leakage positions also exhibit distinct mappings for different ε i . It can be seen that m 1 m 2 mod N corresponds to Δ m ε i 1 for 0.5 < ε f < 0 and to Δ m ε i + 1 for 0 < ε f 0.5 . Timing estimation can proceed analogously using these mapped values, i.e.,
τ ^ = m ε i 1 r + K s 1 mod N , 0.5 < ε f < 0 , m ε i + 1 r + K s 1 mod N , 0 < ε f 0.5 .
Define the set V r 1 , r 2 to include all the possible m 1 m 2 mod N . Thus,
V r 1 , r 2 m 1 m 2 mod N = V r 1 , r 2 1 , 0.5 < ε f < 0 V r 1 , r 2 2 , 0 < ε f 0.5 = Δ m ε i 1 , ζ ε i ζ , 0.5 < ε f < 0 Δ m ε i + 1 mod N , ζ ε i ζ , 0 < ε f 0.5 = Q r 1 , r 2 n 1 , 0 n L 1 , 0.5 < ε f < 0 , Q r 1 , r 2 n + 1 , 0 n L 1 , 0 < ε f 0.5 .
Define the composite set Q V r 1 , r 2 as the union of the fundamental position difference set Q r 1 , r 2 and leakage-induced position difference sets V r 1 , r 2 1 and V r 1 , r 2 2 , i.e.,
Q V r 1 , r 2 Q r 1 , r 2 V r 1 , r 2 1 V r 1 , r 2 2 = n ζ 1 Δ r 1 , r 2 mod N , 0 n L + 1
This set contains all possible values from both the peak position differences m 1 m 2 mod N and the leakage position differences m 1 m 2 mod N .
Given that the CFO ε is inherently unknown at the satellite receiver, a uniform timing estimation procedure must operate independently of whether the primary peak positions m 1 , m 2 or secondary leakage components m 1 , m 2 are utilized, provided the uniqueness condition for elements in Q V r 1 , r 2 holds. This leads to:
Proposition 1. 
To enable uniform timing estimation using either the primary peak positions  m 1 , m 2  or secondary leakage positions  m 1 , m 2 , the roots  r 1 , r 2  of the proposed random access sequence  X  in (20) must satisfy  Q V r 1 , r 2 n 1 Q V r 1 , r 2 n 2  for all distinct index pairs  n 1 ,  n 2 0 , L + 1  ( n 1 n 2 ).
Meanwhile, the cross-differences m 1 m 2 mod N and m 1 m 2 mod N must not interfere with timing estimation. Define sets A r 1 , r 2 and B r 1 , r 2 as
A r 1 , r 2 m 1 m 2 mod N = ε i Δ r 1 , r 2 + r 2 + K s 1 mod N , ζ ε i ζ , 0.5 < ε f < 0 ε i Δ r 1 , r 2 r 2 + K s 1 mod N , ζ ε i ζ , 0 < ε f 0.5 A r 1 , r 2 1 , 0.5 < ε f < 0 , A r 1 , r 2 2 , 0 < ε f 0.5 ,
B r 1 , r 2 m 1 m 2 mod N = ε i Δ r 1 , r 2 r 1 + K s 1 mod N , ζ ε i ζ , 0.5 < ε f < 0 ε i Δ r 1 , r 2 + r 1 + K s 1 mod N , ζ ε i ζ , 0 < ε f 0.5 B r 1 , r 2 1 , 0.5 < ε f < 0 , B r 1 , r 2 2 , 0 < ε f 0.5 .
Thus, we have:
Proposition 2. 
To avoid interference from these cross-differences, it requires that  Q V r 1 , r 2 A B r 1 , r 2 = , where  A B r 1 , r 2 = A r 1 , r 2 1 A r 1 , r 2 2 B r 1 , r 2 1 B r 1 , r 2 2 .
Consequently, a uniform timing estimation procedure can be performed, as summarized subsequently.

4.3.3. Robust Timing Estimation Procedure

At the satellite receiver, the detection of a potential random access sequence X initiates with cyclic shift correlation operation between the received sequence and the paired reference sequences X s , r 1 and X s , r 2 . This processing yields peak positions q 1 , q 2 (c.f. (25)) and leakage positions v 1 , v 2 (c.f. (27)). Sequence X is declared detected when the composite detection metric satisfies λ ε > T .
Following successful detection, timing estimation proceeds using the identified positions q 1 , v 1 , q 2 , and v 2 . Position sets E r 1 , r 2 and F r 1 , r 2 are defined as
E r 1 , r 2 = q 1 , v 1 , q 1 , v 1 , F r 1 , r 2 = q 2 , v 2 , v 2 , q 2
where element duplication facilitates subsequent element-wise operations. The difference set is computed as
Z r 1 , r 2 = E r 1 , r 2 F r 1 , r 2 mod N = q 1 q 2 mod N , v 1 v 2 mod N , q 1 v 2 mod N , v 1 q 2 mod N .
Under ideal noiseless conditions and ignoring permutation order, the elements of set Z r 1 , r 2 correspond to m 1 m 2 mod N , m 1 m 2 mod N , m 1 m 2 mod N , and m 1 m 2 mod N . This means at least one element Z r 1 , r 2 i satisfies Z r 1 , r 2 i Q V r 1 , r 2 for i 0 , 3 irrespective of integer or non-integer CFO. It enables implementation of a unified timing estimation procedure without CFO knowledge prerequisites.
The receiver performs index mapping by comparing Z r 1 , r 2 i to the predefined set Q V r 1 , r 2 , identifying the specific index n ( 0 n L + 1 ) such that Q V r 1 , r 2 n = Z r 1 , r 2 i . The device-specific differential delay is subsequently estimated as
τ ^ = E r 1 , r 2 i n ζ 1 r 1 + K s 1 mod N
Note that noise may cause Z r 1 , r 2 Q V r 1 , r 2 = , indicating timing estimation failure.
The complete detection and estimation framework is illustrated in Algorithm 1. Successful random access requires simultaneous satisfaction of two conditions: (1) detection threshold exceedance ( λ ε > T ), and (2) accurate delay estimation ( τ ^ = τ ).
Algorithm 1 The detection and timing estimation algorithm for random access sequence X
Input: received signal y , random access sequence X , threshold T , maximum integer CFO ζ
Output: detection indicator d , estimated timing τ ^
1: Calculate q 1 and q 2 using (25), v 1 and v 2 using (27), and λ ε using (26).
2: if  λ ε < T  then  d = 0 , τ ^ =
3: else
4:       calculate Q V r 1 , r 2 using (37), Z r 1 , r 2 using (41)
5:         if  Z r 1 , r 2 Q V r 1 , r 2 =  then  d = 0 , τ ^ =
6:         else
7:                d = 1
8:                for i = 0 to 3 do
9:                      if  Z r 1 , r 2 i Q V r 1 , r 2  then
10:                          identify index n ( 0 n L + 1 ) where Q V r 1 , r 2 n = Z r 1 , r 2 i ,
11:                          and calculate τ ^ using (42)
12:                          break
13:                    end if
14:              end for
15:       end if
16: end if

5. Root Selection Algorithm

Root sequence selection criteria for optimal performance are derived in this section. The requirements for selecting roots s , r 1 , and r 2 to construct a random access sequence X = 1 2 X s , r 1 + X s , r 2 are established, where r 1 = R root 1 i and r 2 = R root 2 i , with R root = R root 1 R root 2 defining the unified root set. Here, i 1 , I is the index of the random access sequence in the pool, I denotes the maximum number of random access preamble sequences required per beam coverage. Six critical conditions govern the root selection process. First, the root s of the short ZC sequence, with s 1 , N ZC 1 , must be relatively prime to its length N Z C . Second, the root r of the long ZC sequence, with r 1 , N 1 and r R root , must be relatively prime to its sequence length N . Both Requirements 1 and 2 are mandated by the definition of the ZC sequence. Third, the expression r + s K must be relatively prime to N for all r R root to optimize the auto-correlation of the sequence X s , r . Fourth, for any distinct pair r , o R root with r > o , the greatest common divisor g = GCD r o , N must satisfy g K , as referenced in Equation (7), to minimize the cross-correlation. Fifth, for a pair of roots r 1 and r 2 intended for sequence construction, Q V r 1 , r 2 n must be distinct for all n 1 , n 2 0 , L + 1 with n 1 n 2 , i.e., Q V r 1 , r 2 n 1 Q V r 1 , r 2 n 2 , as derived in Proposition 1. Finally, the pair r 1 , r 2 must satisfy Q V r 1 , r 2 A B r 1 , r 2 = , as specified in Proposition 2. The final two requirements are used to guarantee the timing estimation performance in the presence of CFO.
The systematic selection algorithm for R root 1 and R root 2 is illustrated in Algorithm 2. To simplify implementation, the short ZC root s can be fixed at s = 1 , inherently fulfilling Requirement 1. The algorithm iteratively evaluates all roots r r 1 , N 1 in ascending order, admitting candidates to R root 1 or R root 2 only upon satisfying Requirements 2–6. An intermediate variable g 1 , K is employed to constrain the upper bound of g , thereby minimizing the cross-correlation.
Algorithm 2 Root selection algorithm in the presence of CFO
Initialization: N, K, I, s = 1, R root 1 1 : I = , R root 2 1 : I = 0 , R root 1 : 2 I = , g = 1 , r = 1, i = 1, j = 1
1: While  i 2 I  do
2:       if  r N  then  g = g + 1 , r = 1, i = 1, j = 1, R root 1 1 : I = , R root 2 1 : I = 0 , R root 1 : 2 I =
3:       else
4:            if gcd r , N 1 or gcd r + s K , N 1  then r = r + 1
5:            else
6:                    if i=1 then R root 1 j = r , j = j + 1, R root i = r , i = i + 1, r = r + 1
7:                     else
8:                            if there exists μ R root such that gcd N , r μ > g  then r = r + 1
9:                            else
10:                                    r 2 = r , index = 0
11:                                   for k = 1 to j-1 do
12:                                         if  R root 2 k = 0  then
13:                                          r 1 = R root 1 k
14:                                                 if Q V r 1 , r 2 n 1 Q V r 1 , r 2 n 2 for all n 1 n 2 ( n 1 , n 2 0 , L + 1 ),
15:                                                 and Q V r 1 , r 2 A B r 1 , r 2 =  then
16:                                                          R root 2 k = r , R root i = r , i = i + 1, r = r + 1, index = 1
17:                                                         break
18:                                                 end if
19:                                         end if
20:                                   end for
21:                                   if index = 0 and j I  then
22:                                    R root 1 j = r , j = j + 1, R root i = r , i = i + 1, r = r + 1
23:                                   end if
24:                          end if
25:                  end if
26:          end if
27:     end if
28: end while

6. Simulation Results

This section presents the detection performance evaluated through numerical simulations. The detection of random access sequences is conducted using Algorithm 1, with the common Doppler shift and round-trip delay (RTD) assumed to be calculated and eliminated by the satellite. Consequently, only the device-specific RTD and CFO require consideration. In the simulated scenario, an access device moves at 350 km/h at a carrier frequency of 2 GHz, resulting in a device-specific Doppler frequency of 648 Hz. Since the frequency synthesizer is synchronized to the downlink synchronization channel, the Doppler effect is thus doubled at the uplink receiver, resulting in a frequency offset of 1296 Hz. The frequency synthesizer error, typically within 0.1 ppm or 200 Hz at 2 GHz [32], contributes to a total frequency offset of 1496 Hz at the receiver. Consequently, the normalized CFO ε falls within the range K Δ f Δ f sc , K Δ f Δ f sc = 9.57 , 9.57 , where the subcarrier spacing Δ f sc = 1250 Hz and K = 8 [32]. The maximum integer frequency offset ζ is 10, i.e., 10 ε i 10 .
The root pairs r 1 , r 2 (with r 1 R root 1 , r 2 R root 2 ) used to generate the random access sequences are derived according to Algorithm 2, as detailed in Table 1 and Table 2. Table 1 corresponds to scenarios requiring a maximum of I = 64 random access preamble sequences per beam coverage, while Table 2 addresses I = 128 . Here, the length of the short ZC sequence N Z C is set to 839 to maintain compatibility with the TN random access sequence design [32], resulting in N = K N Z C = 6712 .
During each random access opportunity, the transmitted preamble sequence is randomly selected from a sequence set with I sequences. The actual arrival time is assumed to be randomly (uniformly) distributed. The detection threshold is set to maintain an average false alarm rate of 0.1%. Successful detection is defined as the correct identification of both the presence of the transmitted sequences and their actual arrival timings; otherwise, the detection is considered a failure. As shown in Figure 4, the detection performance in the presence of an integer frequency offset is identical to that without any frequency offset, indicating that integer frequency offsets have no detrimental impact on performance.
Figure 5 demonstrates the detection performance for random access sequences under various non-integer frequency offsets. It is observed that frequency offsets with identical absolute fractional components ( ε f ) exhibit equivalent detection performance. For instance, the performance curves for ε = 0.1 , ε = 0.9 , and ε = 0.1 (all with ε f = 0.1 ) match perfectly. Similarly, offsets such as ε = 0.3 , ε = 0.7 , and ε = 0.3 yield identical results, as shown in Figure 5. The detection performance gradually degrades as ε f increases (where 0 ε f 0.5 ), with the worst performance occurring at ε f = 0.5 . Compared to ε f = 0 , there is a limited performance loss of approximately 2.6 dB in the worst-case scenario (i.e., ε f = 0.5 ) to maintain a detection error rate of 1%. The loss will be around 2 dB when ε f is uniformly distributed in the range of 0.5 , 0.5 .
To extend coverage, the length N of the proposed sequence can be increased. Figure 6 presents the detection performance for K = 16 and N = K N Z C = 13,424 . Results demonstrate a performance improvement of approximately 2.8 dB over K = 8 within the same normalized CFO range, e.g., ε 9.57 , 9.57 . Furthermore, the performance curves for ε 0.5 , 0.5 and ε 9.57 , 9.57 exhibit close alignment for K = 8. Similarly, for K = 16 , the curves for ε 9.57 , 9.57 and ε 19.14 , 19.14 align closely. These results validate the CFO resilience of the proposed random access signal.
.

7. Conclusions

This paper proposes a novel design of a random access signal pool to address the scalability challenge in satellite–terrestrial integrated communication systems, where supporting massive connectivity within a single beam is critically required. The proposed solution ensures compatibility with terrestrial network designs while accommodating satellite-specific impairments including wide coverage, large propagation delays and nonignorable device-specific CFO. Key mathematical properties of the sequence roots were analytically derived to enable precise timing estimation under satellite-specific scenario. The accompanying low-complexity detection and timing estimation procedure leverages these properties for robust detection performance. Crucially, the proposed sequences exhibit CFO resilience: integer CFO causes no performance degradation, while fractional CFO induces a maximum loss of merely 2.6 dB in detection probability. Furthermore, an analytical framework was established to guide the practical selection of roots for constructing a large pool of sequences meeting system capacity demands. This framework provides a foundation for designing scalable, interference-resistant preambles tailored to grant-free random access in future satellite systems. The presented signal pool design and analytical results offer a significant reference for preamble standardization and system optimization in next-generation satellite–terrestrial integrated networks, advancing their feasibility and performance.

Author Contributions

Conceptualization, M.H., Z.W. and Z.X.; methodology, M.H., Z.W. and Z.X.; software, Z.W., C.Z. and Z.X.; validation, M.H. and Z.W.; formal analysis, M.H., Z.W. and C.Z.; investigation, M.H. and Z.X.; resources, M.H.; data curation, Z.W. and C.Z.; writing—original draft preparation, Z.W., C.Z. and Z.X.; writing—review and editing, M.H.; visualization, M.H. and Z.W.; supervision, M.H.; project administration, M.H., X.L. and W.Z.; funding acquisition, M.H. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (NSFC), grant number 61801225.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Le, T.T.T.; Hassan, N.U.; Chen, X.; Alouini, M.-S.; Han, Z.; Yuen, C. A Survey on Random Access Protocols in Direct-Access LEO Satellite-Based IoT Communication. IEEE Commun. Surv. Tutor. 2025, 27, 426–462. [Google Scholar] [CrossRef]
  2. Vaezi, M.; Azari, A.; Khosravirad, S.R.; Shirvanimoghaddam, M.; Azari, M.M.; Chasaki, D.; Popovski, P. Cellular, Wide-Area, and Non-Terrestrial IoT: A Survey on 5G Advances and the Road Toward 6G. IEEE Commun. Surv. Tutor. 2022, 24, 1117–1174. [Google Scholar] [CrossRef]
  3. Ding, R.-X.; Xu, Y.-H.; Yu, G.; Zhou, W.; Zhou, D. Swin Transformer with Spatial and Local Context Augmentation for Enhanced Semantic Segmentation of Remote Sensing Images. IEEE Open J. Signal Process. 2025, 6, 608–620. [Google Scholar] [CrossRef]
  4. Le, T.T.T. A Hybrid Random Access Approach for RIS-Aided Direct Satellite Networks. In Proceedings of the 2025 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 11–14 January 2025; pp. 1–5. [Google Scholar] [CrossRef]
  5. Suo, L.; Ma, H.; Jiao, W.; Liu, X. Job-Deadline-Guarantee-Based Joint Flow Scheduling and Routing Scheme in Data Center Networks. Sensors 2024, 24, 216. [Google Scholar] [CrossRef] [PubMed]
  6. Ding, Z.; Jiao, W.; Xu, C. Two-Phase Efficient Channel Estimation for Passive Double-RIS Assisted MIMO Systems. IEEE Signal Process. Lett. 2024, 31, 1660–1664. [Google Scholar] [CrossRef]
  7. Liu, W.; Jiao, W.; Zhang, X.; Qi, C. Joint Beamforming and Reflection Design for Maximizing Energy Efficiency of RIS-assisted ISAC Systems. IEEE Trans. Wireless Commun. 2025. [Google Scholar] [CrossRef]
  8. Ma, Z.; Zhang, R.; Ai, B.; Lian, Z.; Zeng, L.; Niyato, D.; Peng, Y. Deep Reinforcement Learning for Energy Efficiency Maximization in RSMA-IRS-Assisted ISAC System. IEEE Trans. Veh. Technol. 2025. [Google Scholar] [CrossRef]
  9. Liu, H.; Jiang, J.; Huang, Y.; Cao, T.; Ji, T.; Yu, H.; Wang, W.; Ding, R. Beam Domain Random Access for NB-IoT Integrated LEO Satellite Communications. IEEE Internet Things J. 2025, 12, 13907–13921. [Google Scholar] [CrossRef]
  10. Centenaro, M.; Costa, C.E.; Granelli, F.; Sacchi, C.; Vangelista, L. A Survey on Technologies, Standards and Open Challenges in Satellite IoT. IEEE Commun. Surv. Tutor. 2021, 23, 1693–1720. [Google Scholar] [CrossRef]
  11. Wu, W.; Wang, W. Preamble Structure and Timing Advance Method for Satellite IoT. IEEE Wirel. Commun. Lett. 2024, 13, 1088–1092. [Google Scholar] [CrossRef]
  12. Amatetti, C.; Alsenwi, M.; Chougrani, H.; Vanelli-Coralli, A.; Palattella, M.R. A Novel Twofold Approach to Enhance NB-IoT MAC Procedure in NTN. IEEE J. Sel. Areas Commun. 2024, 42, 1453–1464. [Google Scholar] [CrossRef]
  13. Li, X.; Suo, L.; Jiao, W.; Liu, X.; Liu, Y. Cooperative Overbooking-Based Resource Allocation and Application Placement in UAV-Mounted Edge Computing for Internet of Forestry Things. Drones 2025, 9, 22. [Google Scholar] [CrossRef]
  14. Zhang, B.; Wu, Y.; Zhao, B.; Chanussot, J.; Hong, D.; Yao, J.; Gao, L. Progress and Challenges in Intelligent Remote Sensing Satellite Systems. IEEE J. Sel. Top. Appl. Earth Observ. Remote Sens. 2022, 15, 1814–1822. [Google Scholar] [CrossRef]
  15. Yang, T.; Jiao, J.; Wu, S.; Lu, R.; Zhang, Q. Grant Free Age-Optimal Random Access Protocol for Satellite-Based Internet of Things. IEEE Trans. Commun. 2022, 70, 3947–3961. [Google Scholar] [CrossRef]
  16. Kim, Y.J.; Choi, S.; Cho, Y.S. New Random Access Preamble Design Technique for Non-Terrestrial Networks with High Doppler Shift. IEEE Trans. Veh. Technol. 2025, 74, 11579–11584. [Google Scholar] [CrossRef]
  17. Tello-Oquendo, L.; Ahmed, F.; Lin, C.-H.; Lin, S.-C.; Lee, M. Enabling LEO Satellite Vertical Handover for Massive 6G IoT Random Access. In Proceedings of the 2024 IEEE International Conference on Communications (ICC), Denver, CO, USA, 9–13 June 2024; pp. 4293–4298. [Google Scholar] [CrossRef]
  18. TS 36.211; Evolved Universal Terrestrial Radio Access (E-UTRA); Physical Channels and Modulation. 3rd Generation Partnership Project: Valbonne, France, 2025.
  19. TS 38.211; NR; Physical Channels and Modulation. 3rd Generation Partnership Project: Valbonne, France, 2025.
  20. He, W.; Jiang, Y.; Zhao, L. Random Access Preamble Design and Detection for Mobile Satellite Communication Systems. In Proceedings of the 2024 IEEE/CIC International Conference on Communications in China (ICCC), Hangzhou, China, 7–9 August 2024; pp. 1163–1168. [Google Scholar] [CrossRef]
  21. Chen, Y.; Huang, S.; Jiang, M. Preamble Design and Detection Based on Sequence Selection Pattern for Random Access in Non-Terrestrial Networks. IEEE Commun. Lett. 2024, 28, 2357–2361. [Google Scholar] [CrossRef]
  22. Hua, M.; Zhang, T. Random access sequence set design in wireless cellular communication networks. Phys. Commun. 2023, 56, 101953. [Google Scholar] [CrossRef]
  23. Sun, T.; Zhen, L.; Lu, G.; Yu, K. Random Access Preamble Design and Detection for 5G Remote Health via Satellite Communications. In Proceedings of the 2020 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), Seoul, Republic of the Korea, 6–9 April 2020; pp. 1–6. [Google Scholar] [CrossRef]
  24. Zhen, L.; Sun, T.; Lu, G.; Yu, K.; Ding, R. Preamble Design and Detection for 5G Enabled Satellite Random Access. IEEE Access 2020, 8, 49873–49884. [Google Scholar] [CrossRef]
  25. Khan, T.A.; Lin, X. Random Access Preamble Design for 3GPP Non-terrestrial Networks. In Proceedings of the 2021 IEEE Globecom Workshops (GC Wkshps), Madrid, Spain, 7–11 December 2021; pp. 1–5. [Google Scholar] [CrossRef]
  26. Li, S.; Chen, H.-M. Design of Large Doppler Shift Mitigation in NTN Scenarios Through a Paired Index Based PRACH Transmission Scheme. In Proceedings of the 2025 IEEE Wireless Communications and Networking Conference (WCNC), Milan, Italy, 24–27 March 2025; pp. 1–6. [Google Scholar] [CrossRef]
  27. Caus, M.; Shaat, M. PRACH Signal Design and Detection for LEO Satellite Systems with Imperfect UE Positioning. In Proceedings of the 2024 27th International Workshop on Smart Antennas (WSA), Dresden, Germany, 17–19 March 2024; pp. 1–8. [Google Scholar] [CrossRef]
  28. Song, Y.; Yin, L.; Liu, Y.; Yang, H. Design of A Novel NTN PRACH Format Combining Zadoff-Chu and Golden Sequences. In Proceedings of the 2024 IEEE Wireless Communications and Networking Conference (WCNC), Dubai, United Arab Emirates, 21–24 April 2024; pp. 1–6. [Google Scholar] [CrossRef]
  29. Wang, Y.; Jiang, Y.; Zhao, L. Preamble Design for LEO Satellite Communication System. In Proceedings of the 2023 28th Asia Pacific Conference on Communications (APCC), Sydney, Australia, 19–22 November 2023; pp. 42–47. [Google Scholar] [CrossRef]
  30. Wang, S.; Xue, G.; Zhang, Z.; Guo, Q. Performance Evaluation of Dual Strategies for Enhancing NB-IoT Access in NTN. In Proceedings of the 2025 IEEE Wireless Communications and Networking Conference (WCNC), Milan, Italy, 24–27 March 2025; pp. 1–6. [Google Scholar] [CrossRef]
  31. Jeong, J.; Hong, D. Two-Stage Preamble Detector for LEO Satellite-Based NTN IoT Random Access. IEEE Trans. Veh. Technol. 2023, 72, 14443–14455. [Google Scholar] [CrossRef]
  32. Hua, M.; Xu, Z. Physical random access signal design for 5G mobile satellite communication systems. Phys. Commun. 2022, 55, 101908. [Google Scholar] [CrossRef]
Figure 1. Illustration of random access signal structure. (a) Random access scenarios in TN (a1) and time-domain preamble signal structure in NR system (a2). (b) Random access scenarios in satellite communication systems (b1) and proposed preamble sequence structure adapted from [32] (b2).
Figure 1. Illustration of random access signal structure. (a) Random access scenarios in TN (a1) and time-domain preamble signal structure in NR system (a2). (b) Random access scenarios in satellite communication systems (b1) and proposed preamble sequence structure adapted from [32] (b2).
Sensors 25 05602 g001
Figure 2. Illustration of C r , r m , ε under various frequency offsets, where s = 1 , r = 5 , K = 8 , N ZC = 839 , and τ = 2000 .
Figure 2. Illustration of C r , r m , ε under various frequency offsets, where s = 1 , r = 5 , K = 8 , N ZC = 839 , and τ = 2000 .
Sensors 25 05602 g002
Figure 3. Illustration of E C r , o m , ε under various frequency offsets, where s = 1 , K = 8 , N ZC = 839 , τ = 2000 .
Figure 3. Illustration of E C r , o m , ε under various frequency offsets, where s = 1 , K = 8 , N ZC = 839 , τ = 2000 .
Sensors 25 05602 g003
Figure 4. Detection error rate under various integer CFOs with K = 8 and N = K N Z C = 6712 .
Figure 4. Detection error rate under various integer CFOs with K = 8 and N = K N Z C = 6712 .
Sensors 25 05602 g004
Figure 5. Detection error rate under various non-integer CFOs with K = 8 and N = K N Z C = 6712 . The absolute fractional parts of these CFOs ( ε f ) range from 0 to 0.5. Specifically, different CFOs can correspond to the same ε f , such as ε = 0.1 , ε = 0.9 , and ε = 0.1 .
Figure 5. Detection error rate under various non-integer CFOs with K = 8 and N = K N Z C = 6712 . The absolute fractional parts of these CFOs ( ε f ) range from 0 to 0.5. Specifically, different CFOs can correspond to the same ε f , such as ε = 0.1 , ε = 0.9 , and ε = 0.1 .
Sensors 25 05602 g005
Figure 6. Detection error rate for random access with different length N = K N Z C .
Figure 6. Detection error rate for random access with different length N = K N Z C .
Sensors 25 05602 g006
Table 1. Root set selection results when I = 64 .
Table 1. Root set selection results when I = 64 .
RootResults
R root 1 1,5,9,13,17,21,25,29,33,37,41,45,49,53,57,61,65,69,73,77,81,85,89,93,97,101,105,109,
113,117,121,125,129,133,137,141,145,149,153,157,161,165,169,173,177,181,185,189,
193,197,201,205,209,213,217,221,225,229,233,237,241,245,249,253
R root 2 3,7,11,15,19,23,27,31,35,39,43,47,51,55,59,63,67,71,75,79,83,87,91,95,99,103,107,111,
115,119,123,127,131,135,139,143,147,151,155,159,163,167,171,175,179,183,187,191,
195,199,203,207,211,215,219,223,227,231,235,239,243,247,251,255
Table 2. Root set selection results when I = 128 .
Table 2. Root set selection results when I = 128 .
RootResults
R root 1 1,5,9,13,17,21,25,29,33,37,41,45,49,53,57,61,65,69,73,77,81,85,89,93,97,101,105,109,113,
117,121,125,129,133,137,141,145,149,153,157,161,165,169,173,177,181,185,189,193,197,
201,205,209,213,217,221,225,229,233,237,241,245,249,253,257,261,265,269,273,277,281,
285,289,293,297,301,305,309,313,317,321,325,329,333,337,341,345,349,353,357,361,365,
369,373,377,381,385,389,393,397,401,405,409,413,417,421,425,429,433,437,441,445,449,
453,457,461,465,469,473,477,481,485,489,493,497,501,505,509
R root 2 3,7,11,15,19,23,27,31,35,39,43,47,51,55,59,63,67,71,75,79,83,87,91,95,99,103,107,111,115,
119,123,127,131,135,139,143,147,151,155,159,163,167,171,175,179,183,187,191,195,199,
203,207,211,215,219,223,227,231,235,239,243,247,251,255,259,263,267,271,275,279,283,
287,291,295,299,303,307,311,315,319,323,327,331,335,339,343,347,351,355,359,363,367,
371,375,379,383,387,391,395,399,403,407,411,415,419,423,427,431,435,439,443,447,451,
455,459,463,467,471,475,479,483,487,491,495,499,503,507,511
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Hua, M.; Wu, Z.; Zhang, C.; Xu, Z.; Liu, X.; Zhou, W. Random Access Preamble Design for 6G Satellite–Terrestrial Integrated Communication Systems. Sensors 2025, 25, 5602. https://doi.org/10.3390/s25175602

AMA Style

Hua M, Wu Z, Zhang C, Xu Z, Liu X, Zhou W. Random Access Preamble Design for 6G Satellite–Terrestrial Integrated Communication Systems. Sensors. 2025; 25(17):5602. https://doi.org/10.3390/s25175602

Chicago/Turabian Style

Hua, Min, Zhongqiu Wu, Cong Zhang, Zeyang Xu, Xiaoming Liu, and Wen Zhou. 2025. "Random Access Preamble Design for 6G Satellite–Terrestrial Integrated Communication Systems" Sensors 25, no. 17: 5602. https://doi.org/10.3390/s25175602

APA Style

Hua, M., Wu, Z., Zhang, C., Xu, Z., Liu, X., & Zhou, W. (2025). Random Access Preamble Design for 6G Satellite–Terrestrial Integrated Communication Systems. Sensors, 25(17), 5602. https://doi.org/10.3390/s25175602

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop