 Research
 Open access
 Published:
On the interference arising from random spatial fields of interferers utilizing multiple subcarriers
EURASIP Journal on Wireless Communications and Networking volumeÂ 2022, ArticleÂ number:Â 27 (2022)
Abstract
Effective symbol detection, channel estimation and decoding of channel codes require an accurate characterization of the noise probability distribution. In many systems, notably the internet of things, noise is largely in the form of interference, arising from a massive number of simultaneous transmissions from uncoordinated devices. Obtaining the probability distribution of the interference is a challenging problem due to the use of nonorthogonal multiple access schemes over several subcarriers (leading to multivariate statistical models) and the heavytailed nature of the interference due to the random locations of devices. In this paper, we derive a novel tractable characterization of the interference probability distribution based on an application of Sklarâ€™s theorem to develop a combination of \(\alpha\)stable and tcopula dependence models. We demonstrate that this formulation produces an accurate statistical modeling framework that admits efficient parameter estimation methods. As an illustration of the utility of our models, we develop a simpletoimplement nonlinear receiver when a binary signal is transmitted over all subcarriers by the desired transmitter, which is effective in a range of scenarios and can significantly outperform existing approaches.
1 Introduction
With the increasing scale of wireless network deployments for the internet of things (IoT), an ongoing question is how to ensure that these networks meet reliability and latency requirements. A difficulty in network design is that interference from a large number of devices, even if they operate at low power levels, can significantly degrade the performance of other nearby wireless communication networks.
A key reason for such performance degradation is the uncoordinated nature of devices, which typically requires interference to be treated as noise. The lack of coordination arises both in where devices are located and when they transmit. As a consequence, point process models for device locations have played an important role in characterizing the interference. A number of different models have been introduced in wireless communications, both in the IoT and cellular settings. These include homogeneous Poisson point processes [1,2,3,4,5], cluster [6], hardcore [7], nonhomogeneous Poisson [8] and determinantal [9] processes.
However, this existing work has largely focused on networklevel criteria such as outage and coverage probabilities. On the other hand, another critical issue is the design of detection and coding schemes, which rely on a good characterization of the noise and interference probability distributions for the amplitude and phase, rather than just for the instantaneous received power. This issue of the interference probability distribution arising from devices located according to point processes has been addressed only for narrowband transmissions with a single carrier.
Due to the widespread use of OFDM in IoT systems, such as in NBIoT [10], an important question is how to characterize the interference amplitude and phase distribution when multiple subcarriers are utilized. In particular, the interference is multivariate, forming a random vector arising from the signals observed on each subcarrier. This introduces new questions as devices may access multiple subcarriers simultaneously, leading to nontrivial statistical dependence between the interference on different subcarriers. As for the case of narrowband transmissions using a single carrier, addressing this question is important to improve the design of symbol detection rules and channel coding schemes.
In this paper, we characterize the interference amplitude and phase statistics arising from spatial point processes where uncoordinated interferers randomly select the subcarriers they utilize. We consider homogeneous Poisson point processes (HPPPs) and certain families of Poisson cluster and MatÃ©rn hardcore type II processes, which are able to model attraction and repulsion useful to account for physical considerations (e.g., the presence of roads or buildings) or protocols such as CSMA [7]. Models incorporating random selections of subcarriers are well suited to wireless networks for the Internet of Things (IoT) exploiting the NBIoT protocol [11], where interference must be treated as noise by the intended receiver; that is, advanced multiuser detection methods are not available due to the absence of pilot symbols. In particular, since Release 13 of the 3GPP LTE standard [10], NBIoT allows each device to transmit on up to 12 subcarriers in the NPUSCH [10]. As these subcarriers are selected randomly by each device, the signal observed by a desired receiver exhibits complex statistical dependence between each subcarrier. The scenario is also relevant when a largescale network exploiting SCMA with coding in both time and frequency [12].
In realistic models of interfering networks, the location and fading associated with each interferer are not known by the desired receiver. As a consequence, there is an increase in the uncertainty of the received signal. Theoretical (see, e.g., [13,14,15,16]) and recent experimental [17,18,19] evidence strongly suggests that the resulting interference should therefore be modeled by heavytailed distributions; that is, the probability of large interference is much higher than predictions from Gaussian models would suggest.
With an accurate interference model in hand, it is then feasible to improve receiver design. For example, symbol detection relies on knowledge of the interference statistics through tests based on the likelihood ratio of the received signal given each possible transmitted symbol [20, 21]. Accurate interference models are also necessary for channel estimation and decoding of channel codes [22].
1.1 Related work
Since the initial work on interference arising from Poisson point process models, it has been known that the inphase or quadrature baseband interference signal on a single subcarrier has \(\alpha\)stable statistics, assuming an infinite network and zero guardzone radii [13,14,15,16]. For finite networks and nonzero guardzone radii, the Middleton distribution arises [6]. It has also been shown that, again for a single subcarrier, the interference from a PoissonPoisson cluster process also admits Middleton interference statistics [6]. There has been further work establishing that Poisson point processes can well approximate a range of other point process models (e.g. via Ripleyâ€™s Kfunction [23] or the mean interference [24, 25]). The dependence over time of the interference has also been studied in [26], which characterizes the first and second moments in MatÃ©rn point processes with MatÃ©rn thinning, and in [27], which characterizes the joint distribution of the interference over time in HPPPs.
A key property of \(\alpha\)stable or Middleton statistics is their heavytailed nature, where for instance \(\alpha\)stable models have infinite variance (except when \(\alpha = 2\)) and may exhibit infinite mean depending on the tail index \(\alpha \in (0,2)\). While no real system will admit received signals with infinite variance (due to the presence of guard zones or near field propagation), \(\alpha\)stable models capture the slow decay of the tails for the interference probability density function arising in real measurements [17,18,19]. Due to the fact that \(\alpha\)stable models enjoy wellstudied parameterizations and relative tractability, they are often preferred to other heavytailed models and provide superior modeling capability when compared to classical Gaussian models when heavy tails are present. Evidence for this tractability is apparent in existing work, which derives useful expressions for the probability of error [15], optimal linear combining strategies [20, 21], power control [28], channel capacity [29] and optimal input distributions [30].
Nevertheless, the interference statistics for wireless networks exploiting multiple subcarriers in the uplink have not been characterized. This contrasts with the large body of work focusing on networklevel metrics, particularly for cellular systems (see, e.g., [1]). The difficulty in analyzing the interference statisticsâ€”which are now multivariate due to the presence of multiple subcarriersâ€”arises due to the complex statistical dependence between the interference on each subcarrier.
On the other hand, multivariate statistical models with \(\alpha\)stable marginals^{Footnote 1} (i.e., \(\alpha\)stable interference on each subcarrier) have been treated in general within the statistics literature [31]. A key tool is the notion of a copula, which has also been sparingly used in signal processing (see, e.g., [32, 33]); albeit not in the context of interference modeling with the exception of [34, 35], which did not consider a specific source of interference and focused on the general impact of nonlinear dependence (i.e., beyond correlation) via numerical simulation. However, it is not straightforward to directly apply copula techniques to interference modeling. Indeed, a specific copula model must be selected in order to ensure an adequate tradeoff between accuracy and tractability. In particular, sufficiently lowcomplexity parameter estimation techniques are required.
1.2 Main contributions
A full characterization of the interference statistics has two components: (i) an analytically tractable statistical model; and (ii) lowcomplexity algorithms in order to perform parameter estimation. With such a characterization, detection algorithms with improved performance can then be developed.
In this paper, we address these challenges and make the following main contributions^{Footnote 2}:

1.
When interferers randomly select a subset of subcarriers, motivated by NBIoT networks, we rigorously establish convergence in distribution of interference induced by families of Poisson cluster processes and MatÃ©rn hardcore type II processesâ€”defined precisely in Sect.Â 3â€”to interference induced by a HPPP. This provides a unifying framework to analyze interference from certain general families of point processes via HPPP.

2.
For interferer locations governed by HPPP, we derive exact statistics for the multivariate interference arising from multiple subcarriers when all devices transmit on the same subcarriers. When devices randomly select the subcarriers that they use, we propose a model consisting of \(\alpha\)stable marginals and a tcopula function (a specific family of copula models) to capture the heavytailed nature of the interference and dependence between distinct subcarriers.

3.
Exploiting the structure of the interference, we derive a lowcomplexity estimator for the multivariate interference model parameters. We show via simulations that the performance of our lowcomplexity estimator is in good agreement with the standard maximum likelihood estimator for general multivariate models described by tcopula function and \(\alpha\)stable marginals.

4.
Via Monte Carlo simulations, we verify that our model is a good approximation in terms of the KullbackLeibler divergence (KL divergence) for the true statistics of the interference. This is true even for nonPoisson point processes that arise from realistic network parameters.

5.
To verify the utility of our model, we study the probability of error for binary detection in the presence of multivariate interference arising from a Poisson spatial field of interferers. We show that by exploiting our model, the probability of error can be significantly reduced compared with existing approaches in the literature, which either assume Gaussian models, or independent \(\alpha\)stable interference on each subcarrier well as inphase and quadrature components.
The remainder of this paper is organized as follows: Sect.Â 2 describes the system model. SectionÂ 3 characterizes the multivariate impulsive interference when interferers are located according to a HPPP, a doubly Poisson cluster process or a MatÃ©rn hardcore process of type II. SectionÂ 4 proposes a lowcomplexity parameter estimation method tailored to the interference model. SectionÂ 5 verifies the models and the proposed estimation method. SectionÂ 6 studies the impact of multivariate impulsive interference on receiver design. SectionÂ 7 concludes the paper.
1.3 Notation
Vectors are denoted by bold lowercase letters and random vectors by bold uppercase letters, respectively (e.g., \({\mathbf{x}}\), \({\mathbf{X}}\)). We denote the distribution of a random vector \({\mathbf{X}}\) by \(P_{{\mathbf{X}}}\). If \({\mathbf{X}},{\mathbf{Y}}\) are two random vectors equal in distribution, then we write \({\mathbf{X}} \overset{d}{=} {\mathbf{Y}}\).
Let \({\mathbf{X}}\) and \({\mathbf{Y}}\) be continuous random vectors on \({\mathbb {R}}^d\) with distributions \(P_{{\mathbf{X}}}\) and \(P_{{\mathbf{Y}}}\), respectively. The density of \({\mathbf{X}}\) is denoted by \(p_{\mathbf{X}}\) and the density of \({\mathbf{Y}}\) by \(p_{\mathbf{Y}}\). Then, the KL divergence between \({\mathbf{X}}\) and \({\mathbf{Y}}\) is defined by
Let \(f:{\mathbb {R}} \rightarrow {\mathbb {R}}\) and \(g:{\mathbb {R}} \rightarrow {\mathbb {R}}\). We use the Landau notation where \(f(x) = o(g(x))\) if \(\lim _{x\rightarrow \infty } \frac{f(x)}{g(x)} = 0\).
2 System model
2.1 Spatial location
Consider a network of devices located according to a general point process, denoted by \(\Phi\). These devices form interferers for a desired receiver located at the origin associated with a single desired transmitter. We focus on three models for \(\Phi\) (precise definitions can be found in [37]):

1.
HPPP with intensity \(\lambda\) devices per m\(^2\);

2.
Doubly Poisson cluster process: the parent point process is a HPPP with intensity \(\lambda _p\) devices per m\(^2\), and each daughter process, centered on its parentâ€™s position, is also a HPPP with intensity \(\lambda _d\) devices per m\(^2\) restricted to a disc of radius \(r_c\). Points from the parent HPPP are included.^{Footnote 3} Hence, the average number of points in each cluster is \(c = \lambda _d \pi r_c^2 + 1\) devices.

3.
MatÃ©rn hardcore process of type II: the underlying HPPP is with intensity \(\lambda _p\) devices per m\(^2\), and the hardcore distance is \(r_h\).
These three point processes are representative of a large family of processes. In the first case, the HPPP exhibits uniform behavior in the sense that conditioned on the number of points in a region, each point is uniformly and independently distributed in the region. On the other hand, the doubly Poisson cluster process exhibits attraction, while the MatÃ©rn hardcore process of type II exhibits repulsion. We remark that these models can capture device clustering due to human activity as well as the activity of devices under both duty cycle constraints and, in the case of the MatÃ©rn hardcore process, CSMAtype protocols [7].
In each case, the intensityâ€”e.g., \(\lambda\) in the case of the HPPPâ€”corresponds to the intensity of active devices with data to transmit. In 5G, a common target is one device per m\(^2\); however, the density of active devices with a given protocol, in a given time frame and spectrum band, may be significantly lower. We will often set \(\lambda \in [0.001,0.01]\) devices per m\(^2\).
We assume that the radius of the network, \(r_{\max }\), is finite and that there is a guard zone; i.e., a minimum distance between the receiver and the closest interferer, \(r_{\min }\) (see Fig.Â 1). This assumption is introduced due to the fact that interferers cannot be arbitrarily close to the receiver (e.g., due to the fact a receiver has nonzero area), and interferers cannot be arbitrarily far away in realistic models.
Restricting \(\Phi\) to this annulus yields a new point process, which is denoted by
2.2 Channel access
Motivated by the NBIoT protocol, we assume that the desired transmitter and all interferers utilize OFDM with the same symbol period. In particular, the desired transmitter communicates using NK subcarriers to an already associated desired receiver. On the other hand, the interferers randomly access a subset of the NK subcarriers for their transmissions.
We assume that the subcarriers that each interferer can access are grouped into K distinct blocks of N subcarriers, known as a minimum size block (msB). That is, if an interfering device selects a msB, denoted by \(B_u = \{b_{u,1},\ldots ,b_{u,N}\}\) where \(b_{u,i}\) is the ith subcarrier of the msB \(B_u\), then all of the N subcarriers in \(B_u\) are utilized. The complete set of all subcarriers is denoted by \({\mathcal {B}} = \cup _{u = 1}^K B_u\).
The decision of an interferer of which subcarriers are utilized is made individually without coordination with any other device in the network. In particular, the interferer randomly selects each msB independently with probability p. The probability p is dependent on the needs of the transmitting device; i.e., the higher the required rate, the larger the value of p. The effect of p is to introduce sporadic transmissions in the frequency domain, analogous to existing work in the time domain [38]. In this paper, we assume that p is constant for all interfering devices.
The interference at the desired receiver on a given msB \(B_u\) is the sum of all interference from each interfering device that accesses \(B_u\). An illustration is provided in Fig.Â 2 with \(K = 5\) msBs with \(N = 2\) subcarriers in each msB. We also note that our setup corresponds to a wide range of protocols. For example, in many currently implemented LPWAN protocols, grouping of subcarriers is not yet available. In this case, each msB consists of a single subcarrier; i.e., \(N = 1\). On the other hand, in the NBIoT standard for uplink transmissions (NPUSCH) [10], each msB can contain up to \(N = 12\) subcarriers with a \(15~\text{kHz}\) spacing, which can also be captured within our model.
2.3 Interference signal
Consider a subcarrier \(b_{u,i}\) associated with the msB \(B_{u}\). Under a powerlaw path loss model, the interference observed by the receiver at the origin on this subcarrier is given by
where \(r_j\) is the distance from device j to the origin, \(\eta > 2\) is the pathloss exponent, \(h_{j,b_{u,i}}\) is the fading coefficient for device j on subcarrier \(b_{u,i}\), and \(x_{j,b_{u,i}}\) is the baseband emission. Implicit in (4) is the assumption that the desired receiver has a symbol period consistent with the interferers in order to guarantee orthogonality of the subcarrier signals. While we do not pursue relaxing this assumption in this paper, we note that mismatched sampling in the desired link for singlecarrier systems with \(\alpha\)stable noise has been investigated in [39].
After stacking the interference on each subcarrier for each msB, the resulting interference random vector is given by
The study of the interference random vector \({\mathbf{Z}}\) is the focus of this paper. It is known that under the assumptions in this section, each pair \((\text{Re}(Z_{b_{u,i}}),\text{Im}(Z_{b_{u,i}}))\) has a logcharacteristic function given in [6, Eq. (13)]. However, this representation is analytically intractable and not amenable to the study of the random vector \({\mathbf{Z}}\) in (5). As such, we investigate alternative approximations of the marginal distributions in the following section.
3 Multivariate interference statistics
In this section, we develop statistical models for the interference amplitude and phase statistics when multiple subcarriers are utilized. That is, we introduce approximate probability distributions for the random vector in (5). Our models are based on the assumption that device locations are governed by a HPPP, which induce \(\alpha\)stable models that we overview in AppendixÂ A. We also show that similar approximations can also be applied to certain nonPoisson point processes.
3.1 Interference characterization
We now derive a general and tractable approximate characterization for the multivariate interference \({\mathbf{Z}}\) in (5) induced by HPPPs. The main difficulty in obtaining a tractable characterization of the interference is the complex statistical dependence structure of \({\mathbf{Z}}\). There are two issues, elaborated on further in the sequel, that must be addressed:

(i)
The inphase and quadrature interference for a single subcarrier (i.e., a single element of \({\mathbf{Z}}\)) induced by a HPPP is heavytailed; namely symmetric \(\alpha\)stable with infinite variance. As a consequence, the dependence cannot be adequately described via the correlation, as in Gaussian models.

(ii)
Under the assumptions in this paper, the joint distribution of the interference for a single subcarrier induced by a HPPP is isotropic subGaussian \(\alpha\)stable [40]. Moreover, partial overlaps in the subcarriers used by each device induce an even more complicated dependence structure. As such, a full characterization of the joint probability density function for \({\mathbf{Z}}\) is in general intractable.
To address the issues (i)(ii), a general technique developed in statisticsâ€”albeit only sparingly used in signal processingâ€”is to decouple the characterization of the individual elements (marginal laws) of the random vector \({\mathbf{Z}}\) from the dependence structure. This general approach can be understood by considering the joint distribution function of a continuous random vector in \({\mathbb {R}}^n\), say \({\mathbf{X}} = [X_1,\ldots ,X_n]^T\). By Sklarâ€™s theorem [31], this approach can be rigorously justified as the joint distribution of \({\mathbf{X}}\) can always be uniquely written in the form
where \(C:[0,1]^n \rightarrow [0,1]\) is called a copula function, and \(F_i,~i=1,\ldots ,n\) are the marginal distribution functions. When both the joint and marginal distributions admit density functions (as is the case in the interference models considered in this paper), the joint probability density function has the form
That is, the joint probability density function decomposes into the product of the marginal densities and another density function \(c:[0,1]^n \rightarrow {\mathbb {R}}_{+}\), which captures dependence between the different components of \({\mathbf{X}}\) and is scalefree.
To apply the copula approach, we first require characterization of the individual elements of \({\mathbf{Z}}\). For interference induced by a HPPP defined on \({\mathbb {R}}^2\), we exploit the following result obtained in [6, 13,14,15] (given in this form in [40]).
Theorem 1
Consider the interference on subcarrier \(b_{u,i}\) in msB \(B_u\) induced by a HPPP with intensity \(\lambda\), denoted by \(Z_{b_{u,i}}\) in (4). Suppose that \(h_{j,b_{u,i}}x_{j,b_{u,i}}\) in (4) is an isotropic complex random variable and
with \(\eta > 2\). Then, \(Z_{b_{u,i}}\) in (4) converges almost surely to an isotropic \(4/\eta\)stable random variable. Moreover, the scale parameters of real and imaginary components are equal, given by
where
Remark 1
The parameters of the interference distribution given in TheoremÂ 1 depend on physical variables, including the device intensity \(\lambda\), the service rate p, the pathloss exponent \(\eta\).
By TheoremsÂ 3 andÂ 4, the result in TheoremÂ 1 also forms a good approximation of the marginal distributions for interference induced by doubly Poisson cluster processes and MatÃ©rn hardcore processes of type II defined on \({\mathbb {R}}^2\). For a sufficiently small guard zone and sufficiently large network radii, \(r_{\min }\) and \(r_{\max }\) respectively, it is also known for interference induced by a HPPP restricted to the annulus \(\Gamma (r_{\min },r_{\max })\), TheoremÂ 1 is a good approximation for the marginal interference distribution [6]. We further investigate the impact of the restriction to an annulus in Sect.Â 5.
The next step is to select an appropriate copula function C. There are two aspects of the copula model to consider: accuracy and tractability. As we will show in Sect.Â 5, tcopula models form a good approximation of the dependence structure of \({\mathbf{Z}}\) for a wide range of network parameters. Such tcopula models also admit very lowcomplexity parameter estimation algorithms, which will be developed in Sect.Â 4. Finally, tcopula models are simple to simulate exactly via scale mixture decompositions, which provides a useful tool in evaluating performance (as carried out in Sect.Â 6).
To describe the tcopula model, let \(F_{\nu }\) be the distribution of the univariate tdistribution, given by
parameterized by the degree of freedom \(\nu \in {\mathbb {R}}^+\). Moreover, the joint distribution \(F_{\nu ,\Sigma }\) of a ndimensional multivariate tdistribution is given by
parameterized by the degree of freedom \(\nu \in {\mathbb {R}}_{\ge 0}\) and the \(n\times n\) correlation matrix \(\Sigma\).
The tcopula is then defined as
That is, the tcopula captures the dependence structure of a multivariate tdistribution without necessarily having tdistributed marginals; i.e., a metat distribution [41, 42]. In particular, (13) can be used in (6) to construct multivariate distributions with the symmetric \(\alpha\)stable marginals obtained in TheoremÂ 1. This provides a basis to tractably model the interference random vectors arising from the system model in Sect.Â 2.
We highlight that the tcopula \(\alpha\)stable model resolves the issues (i)â€“(ii) at the beginning of this subsection. With respect to (i), the heavytailed nature of the interference is captured by the use of symmetric \(\alpha\)stable marginals, motivated by TheoremÂ 1. Moreover, the complex dependence structure resulting in issue (ii) is captured through the tcopula parameters \(v,\Sigma\), which can be efficiently estimated. As such, there is not a significant increase in the complexity of the model compared with Gaussian models, as instead of covariance there are the parameters of the symmetric \(\alpha\)stable marginals and \(\nu ,\Sigma\).
3.2 Multivariate interference characterization with p = 1
Before establishing lowcomplexity parameter estimation algorithms and verifying the approximate tcopula model, we derive the exact multivariate interference distribution induced by a HPPP for a single msB or when \(p = 1\) (recall from Sect.Â 2 that p is the activity probability) in Rayleigh fading. This result will aid verification of the tcopula model in this regime and provide insight into symbol detection rules in Sect.Â 6.
To this end, let \({\mathbf{Z}}_{B_u}\) denote the interference on all subcarriers for a given msB \(B_u\) induced by a HPPP on \({\mathbb {R}}^2\); that is,
The following theorem provides a characterization of the interference random vector \({\mathbf{Z}}_{B_u}\). Recall that if a device transmits on a subcarrier within a msB \(B_u\), then it transmits on all subcarriers in \(B_u\) so that the set of interferers remains unchanged on all subcarriers. In this special case, the interference random vector in (14) can be characterized exactly as shown in the following theorem.
Theorem 2
Let \(j \in \Phi _{B_u}\) be a point of a HPPP on \({\mathbb {R}}^2\) with intensity \(\lambda\). Suppose that \(h_{j,b_{u,i}} \sim {{\mathcal {C}}}{{\mathcal {N}}}(0,1)\) (Rayleigh fading), \(\text{Re}(x_{j,b_{u,i}}) \sim \text{Unif}(\{+1,1\})\), \(\text{Im}(x_{j,b_{u,i}}) \sim \text{Unif}(\{+1,1\})\), and that the conditions in TheoremÂ 1hold. Then, the interference random vector \({\mathbf{Z}}_{B_u}\) follows the subGaussian \(\alpha\)stable distribution with an underlying Gaussian vector having i.i.d. \({\mathcal {N}}(0,\sigma _{{\mathbf{Z}}_{B_u}}^2)\) components, \(\alpha = 4/\eta\) and parameter
where \(\gamma _{{\mathbf{Z}}_{B_u}} = \frac{1}{\sqrt{2}}\sigma _{{\mathbf{Z}}_{B_u}}\) and \(C_{{4}/{\eta }}\) is given in (10). Furthermore, suppose \(p = 1\). Then, the interference random vector \({\mathbf{Z}}\) in (5) is also subGaussian \(\alpha\)stable with an underlying Gaussian vector having i.i.d. \({\mathcal {N}}(0,\sigma _{{\mathbf{Z}}_B}^2)\) components, \(\alpha = 4/\eta\).
Proof
See AppendixÂ B. \(\square\)
Remark 2
As for TheoremÂ 1, the parameters of the interference distribution given in TheoremÂ 2 depend on physical variables, including the device intensity \(\lambda\), the service rate p, the pathloss exponent \(\eta\).
We point out that the subGaussian \(\alpha\)stable random vectors arising in TheoremÂ 2 are isotropic, and lie in the family of elliptical distributions [43]. As tcopula models also yield elliptical distributions, it follows that the tcopula model should be a good approximation of the multivariate interference distribution when \(p \approx 1\). We validate this observation in Sect.Â 5.
3.3 NonPoisson models
So far in this section, we have assumed that device locations are governed by a HPPP. A natural question is whether similar models are also accurate for nonPoisson point processes. To this end, consider the families of doubly Poisson cluster processes (as defined in Sect.Â 2) and MatÃ©rn hardcore type II processes. As these processes are constructed from HPPP, it would suggest that for sufficiently small values of the intensity of the daughter process for doubly Poisson cluster processes or the hardcore distance for the MatÃ©rn hardcore type II processes, the induced interference may be approximated by the interference induced by a HPPP.
We establish that such an approximation indeed holds in the sense of convergence in distribution. In other words, the distribution of the interference induced by these more general families of point processes and the distribution of the interference induced by a HPPP have a small LÃ©vyâ€“Prokhorov metric [44]. This result is given in the following theorems.
Theorem 3
Let \(\Phi ^{\lambda _d,\lambda _p,r_c}_{\Gamma (r_{\min },r_{\max })}\) be a doubly Poisson cluster process with parameters \(\lambda _d,\lambda _p,r_c\). Suppose that for all subcarriers \(b_{u,i}\) the random variables \(h_{j,b_{u,i}}x_{j,b_{u,i}}\) defined in (4) satisfy the condition that \(\text{supp}(h_{j,b_{u,i}}x_{j,b_{u,i}})\) is compact. Then, the induced interference random vector in (5) converges in distribution to the interference random vector induced by a HPPP restricted to \(\Gamma (r_{\min },r_{\max })\) as \(\lambda _d \rightarrow 0\).
Proof
See AppendixÂ C. \(\square\)
Theorem 4
Let \(\Phi ^{r_h,\lambda _p}_{\Gamma (r_{\min },r_{\max })}\) be a MatÃ©rn hardcore process of type II with parameters \(r_h,\lambda _p\). Suppose that for all subcarriers \(b_{u,i}\) the random variables \(h_{j,b_{u,i}}x_{j,b_{u,i}}\) defined in (4) satisfy the condition that \(\text{supp}(h_{j,b_{u,i}}x_{j,b_{u,i}})\) is compact. Then, the induced interference random vector in (5) converges in distribution to the interference random vector induced by a HPPP restricted to \(\Gamma (r_{\min },r_{\max })\) as \(r_h \rightarrow 0\).
Proof
See AppendixÂ C. \(\square\)
TheoremsÂ 3 andÂ 4 implies that for sufficiently small \(\lambda _d,r_h\) as well as a wide range of fading and baseband emission models, both the doubly Poisson cluster process and the MatÃ©rn hardcore type II process induce interference that can be well approximated by that of a HPPP in the sense that the resulting interference distribution is close in the sense of the topology of weak convergence or, equivalently, the LÃ©vyProkhorov metric.
This suggests that models developed for interference arising from a HPPP will also be useful for doubly Poisson cluster and MatÃ©rn hardcore type II processes when \(\lambda _d,r_h\) are sufficiently small. Further discussion on the quality of this approximation will be presented via the numerical study in Sect.Â 5.
4 Parameter estimation for multivariate interference
The utility of the model proposed in Sect.Â 3 depends heavily on whether lowcomplexity parameter estimation algorithms are available. In general, particularly in high dimensions, maximum likelihood estimation for tcopula models is computationally demanding [45].
In this section, we propose a new lowcomplexity algorithm to estimate parameters for the tcopula interference model. Our algorithm tailors a general estimation method for copula models, known as inference from the margins [46], to the specific model derived in Sect.Â 3. In the remainder of this section, we first overview the inference from the margins method for general tcopula models. We then detail our proposed lowcomplexity parameter estimation method exploiting the structure of the interference model.
4.1 Copula parameter estimation
A standard approach for parameter estimation in tcopula models, known as inference from the margins, proceeds as follows [46, 47]. Consider a ddimensional random vector \({\mathbf{X}} = [X_1,\ldots ,X_d]^T\) on \({\mathbb {R}}^d\) governed by a tcopula with parameters \(\nu ,\Sigma\). According to [48], the elements of \(\Sigma\) can be obtained via Kendallâ€™s \(\tau\) rank correlation, denoted as \(\rho _{\tau }\). Let \({\mathbf{X}}_i = [X_{i,1},\ldots ,X_{i,d}]^T,~i = 1,\ldots ,n\) be n independent samples of \({\mathbf{X}}\). A natural estimator for \(\Sigma\) is then given by [45]:
where
In general, there are no guarantees that \({\hat{\Sigma }}\) is positive definite, nevertheless, it is possible to apply adjustment techniques [49] to ensure positive definiteness. Having estimated \(\Sigma\), the standard approach then obtains the degree of freedom \(\nu\) via maximum likelihood estimation given \(\Sigma\) [45].
An alternative method for estimating the degree of freedom also exists based on the tail dependence. In particular, consider a bivariate random vector \((X_1, X_2)\) with marginal distributions \(F_1, F_2\), respectively. Then, the (upper) tail dependence \(\lambda _{{\mathbf{X}}}\) is defined by
In the case that \((X_1,X_2)\) is governed by a tcopula, [45, Proposition 1] provides a link between the tail dependence and the degree of freedom \(\nu\). For a random vector \({\mathbf{X}}\), if the tail dependence is known to be constant amongst each pair of elements in \({\mathbf{X}}\) and the offdiagonal elements of \(\Sigma\) are a constant value \(\rho\), then the degree of freedom \(\nu\) can be obtained from the tail dependence \(\lambda _{{\mathbf{X}}}\) via [45]
where \(F_{\nu +1}\) is defined in (11) with degree of freedom \(\nu +1\).
4.2 A lowcomplexity estimation procedure
We now develop a new parameter estimation algorithm for the tcopula interference model. Our approach is based on inference from the margins, where we require estimates of the tail dependence \(\lambda _{{\mathbf{Z}}}\) to obtain the degree of freedom \(\nu\), and the correlation matrix \(\Sigma\). In particular, we derive the following approximationâ€”detailed in AppendixÂ Dâ€”for the tail dependence, \(\lambda _{\tilde{{\mathbf{Z}}}}\), and the correlation matrix \(\Sigma\):
where \(Z_{1,1} = \text{Re}(h_{1,1}x_{1,1})\).
Our interference parameter estimation algorithm is given in AlgorithmÂ 1. The first step is to estimate the exponent and scale parameter of the symmetric \(\alpha\)stable marginals motivated by TheoremÂ 1, which can be achieved using standard methods (see, e.g., [50] under the assumption of independent observations of the interference random vector \({\mathbf{Z}}\). Assuming that the lifetime of device transmissions is not long (as is typical in NBIoT networks), these samples can be collected from nearly consecutive frames.
Lines 24 in AlgorithmÂ 1 are concerned with estimation of the tcopula parameters \(\nu\) and \(\Sigma\). Indeed, these steps only require the computation in (20) when the fading statistics and pathloss exponent are known. This contrasts with the estimation of general tcopula models (i.e., without the structure of the interference random vector \({\mathbf{Z}}\)), where a large number of samples are required. A detailed numerical study of the quality of the approximation is carried out in the following section.
5 Results and discussion: model verification
In this section, we compare the interference models developed in Sect.Â 3 with the interference arising from the scenarios detailed in Sect.Â 2 based on the KL divergence, which can be viewed as a distance between two probability distributions. The KL divergence therefore provides additional insights into the statistics of the interference, particularly when multiple subcarriers experience large amplitude interference. In each scenario, we assume that that the baseband emission of each interferer is uniformly distributed on \(\{1,+1\}\) with Rayleigh fading, as in TheoremÂ 2.
5.1 Interference on a single subcarrier
We first verify that an \(\alpha\)stable model is accurate for HPPPs with nonzero guard zones. Consider the HPPP \(\Phi _{\Gamma (r_{\min },500)}\) with pathloss exponent \(\eta = 5\) and intensity \(\lambda = 0.001\) devices per m\(^2\). FigureÂ 3 plots the impact of varying \(r_{\min }\) on the KL divergence between the simulated interference and three different models for a single subcarrier: the \(\alpha\)stable model that assumes no guard zone (theoretical stable); an \(\alpha\)stable model with parameters estimated from a set of simulated data; and a fitted Gaussian model.
Observe that for a very small \(r_{\min }\), the theoretical model exhibits a good fit while for \(r_{min}>15\) m, the Gaussian model is a good fit. Moreover, the symmetric \(\alpha\)stable model with an estimated exponent \({\hat{\alpha }}\) obtained using the method in [50], yields a low KL divergence, while the others do not. As shown in Fig.Â 4, the parameter \({\hat{\alpha }}\) increases from approximately \(4/\eta =0.8\) to nearly 2 as \(r_{\min }\) ranges from 0.5 m to 50 m. As such, \(\alpha\)stable models with estimated exponent \({\hat{\alpha }}\) are robust to changes in \(r_{\min }\)â€”implying that the techniques in this paper hold rather generallyâ€”with the qualification that the best choice of \(\alpha\) may be larger than \(4/\eta\) as predicted by TheoremÂ 1.
5.2 Interference random vector model
We now turn to our model for the interference random vector developed in Sect.Â 3.2. We numerically investigate^{Footnote 4} the behavior of our proposed models by evaluating the KL divergence between the interference arising from the scenario in Sect.Â 2 and our models in Sect.Â 3. That is, we estimate \(D_{KL}(PQ)\) where P is the distribution corresponding to the system model in Sect.Â 2 and Q is the distribution arising from our models. The interference random vector has in general a high dimension (2KN dimensions for K msBs and N subcarriers in each msB as detailed in Sect.Â 2). As such, even the numerical evaluation is nontrivial, and we use the knearest neighbor method implemented in the MATLAB package [52] for the computation of the KL divergence.
All figures are generated using a simulated data set with 80,Â 000 samples. Due to the high dimension of the interference random vector, the knearest neighbor method can output very small negative values [53]. In the figures, these negative values are rounded to zero.
In the following numerical results, we compare five models all with \(\alpha\)stable marginal distributions motivated by TheoremÂ 2 in Figs.Â 5,Â 6 andÂ 7:

1
The tcopula \(\alpha\)stable model detailed in Sect.Â 3.2 with three different parameter estimation algorithms: a) via maximum likelihood estimation; b) via AlgorithmÂ 1 with \(\alpha = 4/\eta\); c) via the lowcomplexity estimation procedure for tcopula parameters as AlgorithmÂ 1 while using the estimated \({\hat{\alpha }}\) in (20).

2
The independent subGaussian \(\alpha\)stable model consisting of independent 2Ndimensional subGaussian \(\alpha\)stable random vectors. In this model, the 2KNdimensional random interference vector \({\mathbf{Z}}\) is decomposed into K 2Ndimensional random vectors (corresponding to the real and imaginary parts of the N subcarriers on each msB). Each 2Ndimensional random vector is subGaussian \(\alpha\)stable (see DefinitionÂ 2) and independent of each of the other \(K1\) Ndimensional random vectors. This model is exact when interfering devices only transmit on a single subcarrier, the guardzone radius \(r_{\min } = 0\), and the network radius \(r_{\max } \rightarrow \infty\).

3
The 2KN subGaussian \(\alpha\)stable model consisting of a 2KNdimensional subGaussian \(\alpha\)stable random vector. This model corresponds to the scenario where all devices transmit on every msB in \({\mathcal {B}}\); i.e., \(p=1\) (see TheoremÂ 2).
In the following, we set \(K = 4\) msBs and \(N = 2\) subcarriers in each msB, \(r_{\min }=0\), \(r_{\max }=\infty\), \(\eta =3\), \(h_{j,b_i} \sim {{\mathcal {C}}}{{\mathcal {N}}}(0,1)\), and \(x_{j,b_{u,i}}\) is uniformly drawn from \(\{1,1\}\), \(\forall j, b_{u,i}\).
5.2.1 HPPP
FigureÂ 5 plots the KL divergence between the simulated data set based on the setup in Sect.Â 2 and the five proposed interference models. We also set \(\lambda =0.001\) devices per m\(^2\). Observe that the 2KN subGaussian \(\alpha\)stable model is in good agreement with the simulated data set as \(p \rightarrow 1\). This is consistent with the characterization in TheoremÂ 2 as when \(p \rightarrow 1\) all devices transmit on all subcarriers with high probability. On the other hand as p decreases, the 2KN subGaussian \(\alpha\)stable model is a poor fit since it cannot capture dependence between interference on different blocks of subcarriers.
FigureÂ 5 also shows that the tcopula model is a good fit for a much larger range of p than the 2KN subGaussian \(\alpha\)stable model. As such, it is a good choice for moderately to heavily loaded IoT networks. However, for small p the tcopula model is not satisfactory.
In the lightly loaded scenario where \(p \rightarrow 0\), each device transmits on more than one msB with a very low probability. By the independent thinning theorem for HPPP, it then follows that the interference on each msB is approximately independent. As a consequence, the independent subGaussian \(\alpha\)stable model is a good choice in the lightly loaded scenario. This observation is verified in Fig.Â 5, where the KL divergence for this model is nearly zero for small values of p.
5.2.2 Doubly Poisson cluster process
FigureÂ 6 plots the KL divergence for each of the proposed models for locations governed by a doubly Poisson cluster process. The parameters are given in Table 1.
Observe that the tcopula model has a very similar behavior qualitatively consistent with the HPPP case in Fig.Â 5. This is again consistent with TheoremÂ 3 and also shows that \(\lambda _d = 10/(\pi r_c^2)\) is sufficiently small. However, the lowcomplexity estimation algorithm in AlgorithmÂ 1 has reduced performance. This is due to the implicit assumption in the estimation procedure that the void probability is that of a HPPP (see AppendixÂ D for details of the approximation).
5.2.3 MatÃ©rn hardcore process of type II
FigureÂ 7 plots the KL divergence for each of the proposed models for locations governed by a MatÃ©rn hardcore process of type II. The parameters are given in Table 1.
Observe that the five models have the same performance in terms of KL divergence as under the HPPP. This is consistent with TheoremÂ 3. Moreover, \(r_h = 20~\text{m}\) in Fig.Â 7 is clearly sufficiently small.
We also note that unlike the doubly Poisson cluster process, the distribution of the closest interferer can also be approximated by (45) [54, Lemma 1]. This provides an explanation for why the lowcomplexity estimation procedure in AlgorithmÂ 1 yields an estimate that well approximates the maximum likelihood estimate.
6 Receiver design
In this section, we study the impact of the dependence structure on receiver performance using our tractable interference models. We assume that a transmitter seeks to send a binary symbol \(x \in \{+1,1\}\) in the presence of interference arising from one of the scenarios detailed in Sect.Â 2, with \(N = 2\). Given a symbol x, the receiver observes an output \({\mathbf{y}} \in {\mathbb {R}}^{2NK}\) defined by
where \(A = \sqrt{P} r^{\eta /2}\) is the combination of path loss and transmitted signal, P is the transmitted signal power, \({\mathbf{g}} \in {\mathbb {R}}^{2NK}\) corresponds to channel fading after stacking the real and imaginary components of the NK subcarriers and \({\mathbf{z}} \in {\mathbb {R}}^{2NK}\) is the interference obtained again by stacking the real and imaginary components of the NK subcarriers, as detailed in Sect.Â 2. Each subcarrier experiences i.i.d Rayleigh fading; i.e., \({\mathbf{g}} = [g_1, \cdots , g_{2NK}]\), where \(g_i \sim {\mathcal {N}}(0,1)\) is i.i.d. We also assume that \({\mathbf{g}}\) for the desired link is known to the receiver, which is the common scenario where channel estimation is performed.
Given the observation \({\mathbf{y}}\) and equally likely symbols x, the probability of error is minimized by the likelihood ratio test
where \(f(\cdot x,{\mathbf{g}})\) is the probability density function of the received signal given that the symbol x is transmitted and the fading is \({\mathbf{g}}\). As such, different receivers are obtained under the different models introduced in Sect.Â 3. We therefore consider the following receivers:

1
Based on the tcopula \(\alpha\)stable model detailed in Sect.Â 3.2.

2
Maximum Ratio Combining (MRC) receiver, which is optimal for Gaussian and subGaussian \(\alpha\)stable models [55].

3
Based on the independent \(\alpha\)stable model [20, 21], where all components of \({\mathbf{Z}}\) in (5) are assumed to be independent.
To evaluate the different models in terms of the probability of error, we study the impact of the service rate (or access probability) p. Recall that the service rate is the key parameter which controls the dependence between interference on different subcarriers. In our study, we considered the following parameters: \(\eta = 3\); \(h_{j,b_{u,i}} \sim {{\mathcal {C}}}{{\mathcal {N}}}(0,1)\); \(\lambda = 0.001~\text{devices}/m^2\); \(x_{j,b_{u,i}}\) is uniformly drawn from \(\{1,1\}\) \(\forall i,j\); \(K = 4\); and \(N = 2\);
In Fig. 8, the probability of error under each of the different receivers is shown with \(A = 0.01\), that is, \(P = 10(4+\eta \log r) ~~\text{( dB)}\) , e.g., \(r=30 ~ \text{m}\), \(P = 4.3 ~ \text{dB}\), based on 200,Â 000 Monte Carlo iterations. We first observe that when \(p \rightarrow 1\), the MRC receiver outperforms other receivers due to the fact that it is optimal [55]. However, there is a negligible performance improvement over the tcopula \(\alpha\)stable receiver.
As p decreases, the MRC receiver has poor performance. On the other hand, the tcopula \(\alpha\)stable receiver outperforms receivers tailored to independent \(\alpha\)stable noise [20, 21]. This suggests that the tcopula \(\alpha\)stable receiver is a tractable means of obtaining improved performance for a wide range of network parameters.
7 Conclusions
Motivated by the challenge of multivariate interference in largescale IoT networks exploiting NBIoT, we have developed statistical models based on device locations modeled by HPPPs, and copula theory. By evaluating the models in terms of the KL divergence and the probability of error when a desired link exploits a nonlinear receiver, we have obtained significant improvements compared to standard approaches which assume independent observations on each subcarrier. Due to the tractability of the models, it is also feasible to rapidly simulate and estimate parameters in order to improve system design.
Availability of data and materials
N/A.
Notes
We note that a multivariate model with \(\alpha\)stable marginals is not necessarily a multivariate \(\alpha\)stable model, as discussed in the sequel.
The work in this paper was presented in part in the IEEE International Conference on Communications (ICC) 2019 [36].
Estimation of the \(\alpha\)stable marginal parameters is carried out using [51].
There exist also subGaussian \(\alpha\)stable random variables that allow for more general dependence structure [57], but they are not necessary for the purposes of this paper.
When the interference forms a real vector, this argument can be made rigorous [59].
Abbreviations
 IoT:

Internet of things
 NBIoT:

Narrowband internet of things
 HPPP:

Homogeneous Poisson point process
 MRC:

Maximum ratio combining
 CSMA:

Channel sense multiple access
 NPUSCH:

Narrowband physical uplink shared channel
 SCMA:

Sparse code multiple access
 KL divergence:

Kullbackâ€“Leibler divergence
 OFDM:

Orthogonal frequency division multiplexing
 LPWAN:

Low power wide area networks
 msB:

Minimum size block
References
J.G. Andrews, F. Baccelli, R.K. Ganti, A tractable approach to coverage and rate in cellular networks. IEEE Trans. Commun. 59(11), 3122â€“3134 (2011)
H. ElSawy, E. Hossain, M. Haenggi, Stochastic geometry for modeling, analysis, and design of multitier and cognitive cellular wireless networks: a survey. IEEE Commun. Surv. Tutor. 15(3), 996â€“1019 (2013)
T. Bai, R.W. Heath, Analyzing uplink SINR and rate in massive MIMO systems using stochastic geometry. IEEE Trans. Commun. 64(11), 4592â€“4606 (2016)
H. ElSawy, A. SultanSalem, M.S. Alouini, M.Z. Win, Modeling and analysis of cellular networks using stochastic geometry: a tutorial. IEEE Commun. Surv. Tutor. 19(1), 167â€“203 (2017)
M. Haenggi, R.K. Ganti, Interference in large wireless networks. Found. Trends Netw. 3(2), 127â€“248 (2009)
K. Gulati, B.L. Evans, J.G. Andrews, K.R. Tinsley, Statistics of cochannel interference in a field of Poissonâ€“Poisson clustered interferers. IEEE Trans. Signal Process. 58(12), 6207â€“6222 (2010)
F. Baccelli, B. Blaszczyszyn, P. Muhlethaler, An aloha protocol for multihop mobile wireless networks. IEEE Trans. Inf. Theory 52(2), 421â€“436 (2006)
M. Di Renzo, S. Wang, X. Xi, Inhomogeneous double thinningâ€”modeling and analysis of cellular networks by using inhomogeneous Poisson point processes. IEEE Trans. Wirel. Commun. 17(8), 5162â€“5182 (2018)
N. Deng, W. Zhou, M. Haenggi, The Ginibre point process as a model for wireless networks with repulsion. IEEE Trans. Wirel. Commun. 14(1), 107â€“121 (2015)
3GPP TR 21.915 version 15.0.0 Release 15. https://www.etsi.org/deliver/etsi_tr/121900_121999/121915/15.00.00_60/tr_121915v150000p.pdf
A. Hoglund et al., Overview of 3GPP release 14 enhanced NBIoT. IEEE Netw. 31(6), 16â€“22 (2017)
H. Nikopour, H. Baligh, Sparse code multiple access, in: IEEE International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC) (2013)
E.S. Sousa, Performance of a spread spectrum packet radio network link in a Poisson field of interferers. IEEE Trans. Inf. Theory 38(6), 1743â€“1754 (1992)
J. Ilow, D. Hatzinakos, Analytic alphastable noise modeling in a Poisson field of interfers or scatterers. IEEE Trans. Signal Process. 46(6), 1601â€“1611 (1998)
P.C. Pinto, M.Z. Win, Communication in a Poisson field of interfererspart I: interference distribution and error probability. IEEE Trans. Wirel. Commun. 9(7), 2176â€“2186 (2010)
P.C. Pinto, M.Z. Win, Communication in a Poisson field of interfererspart II: channel capacity and interference spectrum. IEEE Trans. Wirel. Commun. 9(7), 2187â€“2195 (2010)
M. Lauridsen, B. Vejlgaard, I. KovÃ¡cs, H.C. Nguyen, P.E. Mogensen, Interference measurements in the European \(868\) MHz ISM band with focus on LoRa and SigFox, in IEEE Wireless Communications and Networking Conference (WCNC) (2017)
B. Vejlgaard, M. Lauridsen, H. Nguyen, I.Z. KovÃ¡cs, P. Mogensen, M. Sorensen, Interference impact on coverage and capacity for low power wide area IoT networks, in 2017 IEEE Wireless Communications and Networking Conference (WCNC) (IEEE, 2017), p. 1â€“6
L. Clavier, T. Pedersen, I. Rodriguez, M. Lauridsen, M. Egan, Experimental evidence for heavy tailed interference in the IoT. IEEE Commun. Lett. 25(3), 692â€“695 (2021)
S. Niranjayan, N.C. Beaulieu, The BER optimal linear rake receiver for signal detection in symmetric alphastable noise. IEEE Trans. Commun. 57(12), 3585â€“3588 (2009)
S. Niranjayan, N.C. Beaulieu, BER optimal linear combiner for signal detection in symmetric alphastable noise: small values of alpha. IEEE Trans. Wirel. Commun. 9(3), 886â€“890 (2010)
G. Wu, L. Clavier, Decoding metric study for turbo codes in very impulsive environment. IEEE Commun. Lett. 16(2), 256â€“258 (2011)
J. Riihijarvi, P. Mahonen, Modeling spatial structure of wireless communication networks, in IEEE Conference on Computer Communications Workshops (2010)
B. Cho, K. Koufos, R. Jantti, Bounding the mean interference in MatÃ©rn type II hardcore wireless networks. IEEE Wirel. Commun. Lett. 2(5), 563â€“566 (2013)
M. Haenggi, Mean interference in hardcore wireless networks. IEEE Commun. Lett. 15(8), 792â€“794 (2011)
U. Schiler, J. Schmidt, C. Bettstetter, On interference dynamics in MatÃ©rn networks. IEEE Trans. Mob. Comput. 19(7), 1677â€“1688 (2020)
X. Yang, A.P. Petropulu, Cochannel interference modeling and analysis in a Poisson field of interferers in wireless communications. IEEE Trans. Signal Process. 51(1), 64â€“76 (2003)
M. Freitas, M. Egan, L. Clavier, A. Savard, J.M. Gorce, Power control in parallel symmetric \(\alpha\)stable noise channels, in IEEE International Workshop on Signal Processing Advances in Wireless Communications (2018)
M. de Freitas, M. Egan, L. Clavier, G.W. Peters, N. Azzaoui, Capacity bounds for additive symmetric alphastable noise channels. IEEE Trans. Inf. Theory 63(8), 5115â€“5123 (2017)
J. Fahs, I. AbouFaycal, On properties of the support of capacityachieving distributions for additive noise channel models with input cost constraints. IEEE Trans. Inf. Theory 64(2), 1178â€“1198 (2018)
R. Nelson, An Introduction to Copulas (Springer, New York, 1999)
J. Kitchen, W. Moran, Copula techniques in wireless communications. ANZIAM J. 51, 526â€“540 (2010)
M.H. Gholizadeh, H. Amindavar, J.A. Ritcey, On the capacity of MIMO correlated Nakagamim fading channels using copula. EURASIP J. Wirel. Commun. Netw. 1, 1â€“11 (2015)
X. Yan, L. Clavier, G.W. Peters, N. Azzaoui, F. Septier, I. Nevat, Skewt copula for dependence modelling of impulsive (alphastable) interference, in IEEE International Conference on Communications (ICC) (2015)
E. Soret, L. Clavier, G.W. Peters, I. Nevat, SIMO communication with impulsive and dependent interferenceâ€”the Copula receiver, in Actes du XXVIÃ¨me Colloque GRETSI (2017)
C. Zheng, M. Egan, L. Clavier, G.W. Peters, J.M. Gorce, Copulabased interference models for iot wireless networks, in ICC 20192019 IEEE International Conference on Communications (ICC) (IEEE, 2019), p. 1â€“6
M. Haenggi, Stochastic Geometry for Wireless Networks (Cambridge University Press, New York, 2013)
Y. Zhong, G. Mao, X. Ge, F.C. Zheng, Spatiotemporal modeling for massive and sporadic access. IEEE J. Select. Areas Commun. 39(3), 638â€“651 (2021)
A. Mahmood, M. Chitre, M.A. Armand, PSK communication with passband additive symmetric \(\alpha\)stable noise. IEEE Trans. Commun. 60(10), 2990â€“3000 (2012)
M. Egan, L. Clavier, C. Zheng, M. de Freitas, J.M. Gorce, Dynamic interference for uplink SCMA in largescale wireless networks without coordination. EURASIP J. Wirel. Commun. Netw. 1, 1â€“14 (2018)
H.B. Fang, K.T. Fang, S. Kotz, The metaelliptical distributions with given marginals. J. Multivar. Anal. 82(1), 1â€“16 (2002)
A.A. Balkema, P. Embrechts, N. Nolde, Meta densities and the shape of their sample clouds. J. Multivar. Anal. 101(7), 1738â€“1754 (2010)
J.P. Nolan, Multivariate elliptically contoured stable distributions: theory and estimation. Comput. Stat. 28(5), 2067â€“2089 (2013)
P. Billingsley, Convergence of Probability Measures (Wiley, New York, 1999)
S. Demarta, A.J. McNeil, The \(t\)copula and related copulas. Int. Stat. Rev. 73(1), 111â€“129 (2005)
H. Joe, J. Xu, The estimation method of inference functions for margins for multivariate models. Technical Report 166, Department of Statistics, University of British Columbia (1996)
M. Cruz, G.W. Peters, P.V. Shevchenko, Fundamental Aspects of Operational Risk and Insurance Analytics: A Handbook of Operational Risk (Wiley, Hoboken, 2015)
F. Lindskog, A. Mcneil, U. Schmock, Kendallâ€™s tau for elliptical distributions, in Credit Risk (PhysicaVerlag HD, Heidelberg, 2003), p. 149â€“156
P. Rousseeuw, G. Molenberghs, Transformation of non positive definite semidefinite correlation matrices. Commun. Stat. Theory Methods 22, 965â€“984 (1993)
J.H. McCulloch, Simple consistent estimators of stable distribution parameters. Commun. Stat. Simul. Comput. 15(4), 1109â€“1136 (1986)
M. Veillette, AlphaStable distributions in MATLAB. http://math.bu.edu/people/mveillet/html/alphastablepub.html
Z. SzabÃ³, Information theoretical estimators toolbox. J. Mach. Learn. Res. 15, 283â€“287 (2014)
Q. Wang, S.R. Kulkarni, S. VerdÃº, A nearestneighbor approach to estimating divergence between continuous random vectors, in 2006 IEEE International Symposium on Information Theory (IEEE, 2006), p. 242â€“246
A.M. Ibrahim, T. ElBatt, A. ElKeyi, Coverage probability analysis for wireless networks using repulsive point processes, in 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) (IEEE, 2013), p. 1002â€“1007
C. Zheng, M. Egan, T. Pedersen, J.M. Gorce, Linear combining in dependent \(\alpha\)stable interference, in Proceedings of IEEE International Conference on Communications (ICC) (2020)
C.L. Nikias, M. Shao, Signal Processing with Alphastable Distributions and Applications (Wiley, New York, 1995)
G. Samorodnitsky, M.S. Taqqu, Stable NonGaussian Random Processes (CRC Press, New York, 1994)
R.F. Serfozo, Point processes, in Handbooks in Operations Research and Management Science, vol. 2, 1st edn., ed. by D.P. Heyman, M.J. Sobel (Elsevier Science Publishers B.V., NorthHolland, 1990), pp. 1â€“93
M. Egan, Dependence testing via extremes for regularly varying models, in IEEE International Symposium on Information Theory (ISIT) (2021)
Funding
This work has been (partly) funded by the French National Agency for Research (ANR) under grant ANR16CE250001  ARBURST. It has also been supported by IRCICA, USR CNRS 3380, Lille, France and the COST Action CA15104 IRACON.
Author information
Authors and Affiliations
Contributions
CZ, ME, LC, GWP and JG all contributed to formulation of the research problem, mathematical analysis, numerical simulations, and writing of the paper. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare that they have no competing interests.
Ethics approval and consent to participate
N/A.
Consent for publication
N/A.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendices
Appendix A: \(\alpha\)stable model preliminaries
1.1 Univariate \(\alpha\)stable models
The \(\alpha\)stable random variables have heavytailed probability density functions, which have been widely used to model impulsive signals [56, 57]. The probability density function of an \(\alpha\)stable random variable is described by four parameters: the characteristic exponent \(0 < \alpha \le 2\); the scale parameter \(\gamma \in {\mathbb {R}}_+\); the skew parameter \(\beta \in [1,1]\); and the shift parameter \(\delta \in {\mathbb {R}}\). As such, a common notation for an \(\alpha\)stable random variable X is \(X \sim S_{\alpha }(\gamma ,\beta ,\delta )\). In the case \(\beta = \delta = 0\), X is said to be a symmetric \(\alpha\)stable (S\(\alpha\)S) random variable.
In general, \(\alpha\)stable random variables do not have closedform probability density functions. Instead, they are usually represented by their characteristic function, given by [57, Eq. 1.1.6]
Let \(X \sim S_{\alpha }(\gamma ,\beta ,\delta )\) be an \(\alpha\)stable random variable. A fundamental property of X is the behavior of its probability density function \(p_X(x)\) as \(x \rightarrow \infty\) [57, Theorem 1.2.15]
Theorem 5
Let \(X \sim S_{\alpha }(\sigma , \beta , \delta )\) with \(0< \alpha <2\), then
where \(C_{\alpha }\) is defined in (10).
In the case that X is symmetric \(\alpha\)stable, then \(\beta = \delta = 0\) and
An alternative characterization of symmetric \(\alpha\)stable random variables is the LePage series [57Theorem 1.4.2]. In particular, let \((\Gamma _i)\) denote the arrival times of a Poisson process with intensity 1. Let \((W_i)\) be a sequence of symmetric, independent and identically distributed random variables satisfying
Then,
A key property of the series in (27) following from [57, Page 26], is given as follows.
Property 1
Let \(X \sim S_{\alpha }(\gamma ,\beta ,\delta )\) and \(\Gamma _1^{\frac{1}{\alpha }}W_1\) be the first term of the Lepage series in (27). Then,
1.2 SubGaussian \(\alpha\)stable random vectors
The notion of an \(\alpha\)stable random vector is defined as follows.
Definition 1
A random vector \({\mathbf{X}}\) in \({\mathbb {R}}^d\) is symmetric \(\alpha\)stable if for every \(A,B > 0\), there exists a \(C > 0\) such that
where \({\mathbf{X}}^{(1)},{\mathbf{X}}^{(2)}\) are independent copies of \({\mathbf{X}}\).
We note that each element in \({\mathbf{X}}\) is an \(\alpha\)stable random variable if \({\mathbf{X}}\) is an \(\alpha\)stable vector, but not all random vectors with symmetric \(\alpha\)stable marginals form symmetric \(\alpha\)stable random vectors.
A particular class of \(\alpha\)stable random vectors is an instance of the subGaussian \(\alpha\)stable random vectors^{Footnote 5}, defined as follows.
Definition 2
Any vector \({\mathbf{X}}\) distributed as \({\mathbf{X}} = (A^{1/2}G_1,\ldots ,A^{1/2}G_d)\), where
and \({\mathbf{G}} = [G_1,\ldots ,G_d]^T \sim {\mathcal {N}}({\mathbf{0}},\sigma ^2{\mathbf{I}})\) is called an isotropic subGaussian \(\alpha\)stable random vector in \({\mathbb {R}}^d\) with underlying Gaussian vector \({\mathbf{G}}\). Note that the marginals are symmetric \(\alpha\)stable with scale parameter \(\gamma = \frac{1}{\sqrt{2}}\sigma\).
SubGaussian \(\alpha\)stable random vectors also play an important role in studying complex \(\alpha\)stable random variables; that is, a random variable with \(\alpha\)stable distributed real and imaginary components. In particular, the generalization of symmetric \(\alpha\)stable random variables to the complex case is known as the class of isotropic \(\alpha\)stable random variables, defined as follows.
Definition 3
Let \(Z_1\), \(Z_2\) be two symmetric \(\alpha\)stable random variables. The complex \(\alpha\)stable random variable \(Z = Z_1 + iZ_2\) is isotropic if it satisfies the condition
The following proposition [57, Corollary 2.6.4] highlights the link between isotropic \(\alpha\)stable random variables and subGaussian \(\alpha\)stable random vectors.
Proposition 1
Let \(0< \alpha < 2\). A complex \(\alpha\)stable random variable \(Z = Z_1 + iZ_2\) is isotropic if and only if there are two independent and identically distributed zeromean Gaussian random variables \(G_1,G_2\) with variance \(\sigma ^2\) and a random variable \(A \sim S_{\alpha /2}((\cos (\pi \alpha /4))^{2/\alpha },1,0)\) independent of \((G_1,G_2)^T\) such that \((Z_1,Z_2)^T = A^{1/2}(G_1,G_2)^T\). That is, \((Z_1,Z_2)^T\) is a subGaussian \(\alpha\)stable random vector.
Appendix B: Proof of TheoremÂ 2
By TheoremÂ 1, the elements of \({\mathbf{Z}}_{B_u}\) are \(4/\eta\)stable random variables with parameter \(\sigma _{{\mathbf{Z}}_{B_u}}\). Consider the first and second components of \({\mathbf{Z}}_{B_u}\), corresponding to the real and imaginary parts of the interference on the first subcarrier associated to msB \(B_u\). These elements can be written as
Assume that \(h_{j,b_{u,1}} \sim {{\mathcal {C}}}{{\mathcal {N}}}(0,1)\), \(\text{Re}(x_{j,b_{u,1}}) \sim \text{Unif}(\{+1,1\})\), and \(\text{Im}(x_{j,b_{u,1}}) \sim \text{Unif}(\{+1,1\})\). Consider the random vector \({\mathbf{Z}}_{B_u}^l\), corresponding to the contribution of device \(l \in \Phi _{B_u}\) on each subcarrier associated to msB \(B_u\). This can be written as
where \(\odot\) is the Hadamard (elementwise) product. Since \(h_{i,b_{u,j}} \sim {{\mathcal {C}}}{{\mathcal {N}}}(0,1)\), it follows that \({\mathbf{f}} \odot \text{Re}({\mathbf{x}}_l)\) and \({\mathbf{g}} \odot \text{Im}({\mathbf{x}}_l)\) are Gaussian random vectors with independent components with the same variance. It then follows that for any orthogonal matrix \({\mathbf{U}}\) in the set of real orthogonal matrices \({\mathcal {O}}(2N)\) of dimension \(2N \times 2N\),
This in turn implies that \({\mathbf{U}}{\mathbf{Z}}_{B_u}^l \overset{d}{=} {\mathbf{Z}}_{B_u}^l\) and hence \({\mathbf{U}}{\mathbf{Z}}_{B_u} \overset{d}{=} {\mathbf{Z}}_{B_u}\), where \({\mathbf{U}} \in {\mathcal {O}}(2N)\).
To complete the proof, we apply the following lemma which is a straightforward generalization of [57, Theorem 2.6.3].
Lemma 1
Let \({\mathcal {O}}(d)\) be the set of \(d \times d\) real orthogonal matrices and \({\mathbf{U}} \in {\mathcal {O}}(d)\). Let \({\mathbf{Z}}\) be an \(\alpha\)stable random vector on \({\mathbb {R}}^{d}\). Then, \({\mathbf{Z}} \overset{d}{=} {\mathbf{U}}{\mathbf{Z}}\) if and only if \({\mathbf{Z}}\) is a subGaussian \(\alpha\)stable random vector with an underlying Gaussian vector having i.i.d. \({\mathcal {N}}(0,\sigma ^2)\) components.
Appendix C: Proof of TheoremsÂ 3 andÂ 4
In this appendix, we prove TheoremsÂ 3 andÂ 4. Both proofs follow a similar argument based on the following preliminaries.
1.1 Preliminaries
Let \(N_1,N_2,\ldots\) be point processes with parameters \(\kappa _1, \kappa _2, \ldots\) on \({\mathbb {R}}^2\) (for background point processes used in this appendix, see [58]). Then, the sequence \((N_n)_{n = 1}^{\infty }\) converges in distribution to a point process N with parameter \(\kappa _{\infty }\) on \({\mathbb {R}}^2\); i.e., \(N_n \overset{d}{\rightarrow } N\) if and only if \({\mathbb {E}}[h(N_n)] \rightarrow {\mathbb {E}}[h(N)]\) for every bounded continuous function h on the space \({\mathcal {N}}\) of all counting measures on \({\mathbb {R}}^2\). Let \({\mathcal {B}}_N = \{B \in {\mathcal {B}}: N(\partial B) = 0~a.s.\}\) and \({\mathcal {C}}_c^+\) be the set of all continuous functions \(f:{\mathbb {R}}^2 \rightarrow {\mathbb {R}}_+\) with compact support. Convergence in distribution is characterized in the following theorem, which will provide the link between convergence in distribution of a point process and the convergence of the interference distribution it induces.
Theorem 6
(Theorem 6.1, [58]) The following statements are equivalent:

(i)
\(N_n \overset{d}{\rightarrow } N\).

(ii)
\(\int _{{\mathbb {R}}^2} f(x) N_n(\text{d}x) \overset{d}{\rightarrow } \int _{{\mathbb {R}}^2} f(x)N(\text{d}x)\) for all \(f \in {\mathcal {C}}_c^+\).
In particular, consider the interference random vector in (5). The real or imaginary component of the interference on a single subcarrier can be written in the form
where \(\Phi ^{\kappa _n}_{\Gamma (r_{\min },r_{\max })}\) is the point process inducing the interference and \(w_j\) represents the real or imaginary part of a term \(h_{j,b_{u,i}}x_{j,b_{u,i}}\) in (4). Under the hypotheses of TheoremÂ 3, each \(w_j\) has compact support. Let \(f({\mathbf{x}},w) = w\Vert {\mathbf{x}}\Vert ^{\eta /2}\) which is bounded and continuous since \(\Phi ^{\kappa _n}_{\Gamma (r_{\min },r_{\max })}\) and each \(w_j\) lie in compact sets. As such, we immediately obtain convergence of distribution for \({\mathbf{Z}}^{\kappa _n}\) as \(n\rightarrow \infty\) if (i) in TheoremÂ 6holds.
To establish (i) in TheoremÂ 6 holds, we require the following result.
Theorem 7
([58, Theorem 6.2]) Suppose N is simple and
Then, \(N_n \overset{d}{\rightarrow } N\) if and only if
A sufficient condition for (37) to hold is given by
where \({\mathcal {I}}_N\) is the set of all intervals in \({\mathcal {B}}_N\).
In order to apply TheoremÂ 7, we note that the point process inducing the interference in (5) can be viewed as an independently marked point process with points in \({\mathbb {R}}^2\) and marks in \({\mathbb {C}}^{KN}\), where KN is the total number of subcarriers. As \(\Phi ^{\kappa _n}_{\Gamma (r_{\min },r_{\max })}\) is simple, the resulting marked process is simple as well.
1.2 Proof of TheoremÂ 3
We now establish that (38) holds, which will complete the proof. For the doubly Poisson cluster process, we have for all \(I \in {\mathcal {B}}_{\Phi ^{\kappa _n}_{\Gamma (r_{\min },r_{\max })}}\),
where \(\kappa _n\) denotes the density of daughter point process \(\lambda _d\), where \(\lim _{n \rightarrow \infty } \kappa _n=\kappa _{\infty }=0\), and \(\Phi ^{\kappa _n}_{d,j}\) is the daughter point process corresponding to the jth point in \(\Phi ^{\kappa _{\infty }}_{\Gamma (r_{\min },r_{\max })}\) which is the parent HPPP. Therefore by (38), we only need to show that
Since each \(\Phi ^{\kappa _n}_{d,j}\) is a HPPP restricted to a particular region, it follows that the number of points in each I does not exceed that of the unrestricted HPPP. Since the expected number of points for a HPPP tends to zero as the intensity tends to zero, it follows that (40) holds.
1.3 Proof of TheoremÂ 4
For the MatÃ©rn hardcore process of type II, (38) holds immediately since \(\Phi ^{\kappa _n}_{\Gamma (r_{\min },r_{\max })}\) is a thinned version of \(\Phi ^{\kappa _{\infty }}_{\Gamma (r_{\min },r_{\max })}\), where \(\kappa _n\) denotes the hardcore distance \(r_h\) and \(\lim _{n \rightarrow \infty } \kappa _n=\kappa _{\infty }=0\).
Appendix D: Derivation of (20)
In this appendix, we derive the approximation for the tail dependence and the correlation matrix in (20). To proceed, we first note that the tail dependence is not the same for each pair of elements in \({\mathbf{Z}}\). This is due to the fact that for a given msB \(B_u\), the random vector is subGaussian \(\alpha\)stable. This implies that for any pair of elements in \({\mathbf{Z}}_{B_u}\), the tail dependence is given by [45]
On the other hand, the tail dependence between pairs from different msBs in \({\mathbf{Z}}\) depends on the service rate p. For example, as \(p \rightarrow 0\), elements of \({\mathbf{Z}}\) from different msBs are approximately independent. This means that the tail dependence for these pairs, denoted by \(\lambda _{\tilde{{\mathbf{Z}}}}\), is approximately zero.
For \(K > 1\), there are significantly more pairs of subcarriers with tail dependence \(\lambda _{\tilde{{\mathbf{Z}}}}\) than \(\lambda _{{\mathbf{Z}}_{B_u}}\). For this reason, we will base our estimate of the degree of freedom \(\nu\) on \(\lambda _{\tilde{{\mathbf{Z}}}}\) and verify that this approximation is accurate for sufficiently large p in Sect.Â 5.
The first step is then to obtain an approximation of the tail dependence \(\lambda _{\tilde{{\mathbf{Z}}}}\). By definition,
where \(Z_{j,l} = \text{Re}(h_{j,l} x_{j,l})\), \(l = 1, \cdots , K\). By PropertyÂ 1 in AppendixÂ A and (10) in TheoremÂ 1, for \(l \in \{1,2\}\), as \(x \rightarrow \infty\)
Moreover, the dependence is also strongest between elements of \({\mathbf{Z}}\) that have the same closest interferer distance, implied by PropertyÂ 1. For \(p \approx 1\), this suggests the approximation^{Footnote 6},
Since \(r_1\) is the closest point in a HPPP, we have
This yields,
Applying the change of variables, \(z = F^{1}(u)r^{\frac{\eta }{2}}\) and combining with (42) and (43), then yields (20).
To derive an estimate of \(\Sigma\), we recall that for \(p = 1\), the interference random vector \({\mathbf{Z}}\) approximately forms an isotropic subGaussian \(\alpha\)stable random vector (by TheoremÂ 2). In this case, \(\Sigma\) is the identity matrix as the underlying Gaussian random vector is isotropic. To obtain an approximation of \(\Sigma\) for \(p \approx 1\), we therefore base our estimate on the case \(p = 1\).
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Zheng, C., Egan, M., Clavier, L. et al. On the interference arising from random spatial fields of interferers utilizing multiple subcarriers. J Wireless Com Network 2022, 27 (2022). https://doi.org/10.1186/s1363802202110w
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s1363802202110w