 Research
 Open access
 Published:
Distributed rankingbased resource allocation for sporadic M2M communication
EURASIP Journal on Wireless Communications and Networking volume 2022, Article number: 83 (2022)
Abstract
This work proposes a novel scheme for distributed rankingbased and contentionfree resource allocation in largescale machinetomachine (M2M) communication networks. We partition a network of N devices into disjoint clusters based on service type, and assign to each cluster a clusterspecific signature for active cluster members to indicate their active status. The devices in each cluster are totally ordered in some a prioriknown manner, which gives rise to an active ranking of active cluster members. In order to tackle complexity issues in largescale M2M networks with a massive number of devices, we propose a distributed resource allocation scheme using the framework of compressed sensing (CS), which mainly consists of three phases: (i) In a fullduplex acquisition phase, the devices transmit their clusterspecific signatures simultaneously and the network activation pattern is collected in a distributed manner. (ii) The base station detects the active clusters and the number of active devices per cluster using block sketching, and allocates resources to each active cluster accordingly. (iii) Each active device determines its active ranking in the cluster and accesses a specific resource according to the ranking position. By exploiting the sparsity in the activation pattern of the M2M devices, the proposed scheme is formulated as a CS support recovery problem for a particular binary blocksparse signal \(x\in {\mathbb{B}}^N\) – with block sparsity \(K_{B}\) and inblock sparsity \(K_{I}\) over block size d. Our analysis shows that the proposed scheme efficiently reduces the signature length to \(\mathcal {O}(\max \{K_{B}\log N, K_{B}K_{I}\log d\})\) and achieves less computational complexity of \(\mathcal {O}(dK_{I}^{2}+\frac{N}{d}\log N)\) compared with standard CS algorithms. Moreover, numerical results suggest strong robustness of the proposed scheme under noisy conditions.
1 Introduction
Towards the next generation of mobile and wireless networks, machineto machine (M2M) communications [3] is envisioned to play a significant role that forms the basis for the future Internet of Things (IoT). It is anticipated that the number of M2M devices connected to a single cellular base station (BS) may exceed 5 million by the year 2030 [4]. In such a massive connectivity scenario, conventional random access and resource allocation schemes [5] are not sufficient to handle the massive amount of communication requests from the M2M devices, thereby posing significant challenges in the design and operation of the wireless networks.
For largescale networks such as M2M communication networks, distributed resource allocation schemes are highly desired in order to alleviate the scaling issues due to massive connectivity [6]. In distributed schemes, each device decides semiautonomously on which resources to access the channel, which results in a significant reduction of signaling overhead for coordination and information exchange between the devices and the BS. Moreover, considering the limited computing capability of the M2M devices [7], there is a strong need for lowcomplexity solutions that require relatively low computing power.
Apart from the massive number of devices, a key feature of the M2M traffic is that the device activity patterns are typically sporadic [8] so that at any given time instant each device has a low probability of being active. This results in a certain level of sparsity in the device activity. To this end, compressed sensing (CS) [9,10,11,12] is identified as an ideal framework in such scenarios since it provides tools for efficient reconstruction of highdimensional signals with a sparse representation. Moreover, it is often observed that the messages sent by the M2M devices are strongly correlated, e.g., due to proximity, the same service type, and etc [7]. Therefore, it is in particular beneficial to partition a given set of all devices into a number of clusters such that similar requests can be handled jointly. Given this clusterlike behavior and the sparse nature of the M2M traffic, the activation pattern of the devices can be modeled as a blocksparse signal with an additional inblock structure [13] in CSbased applications.
The main objective of this study is to seek for an efficient resource allocation scheme to mitigate serious scaling problems resulting from massive connectivity, by exploiting the specific sparsity feature in the device activity. A special attention is attached to low overhead communication with enhanced spectral efficiency and reduced computational complexity. Towards this end, we propose a threephase resource allocation scheme, where we use a distributed approach to reduce the communication overhead and a sketching algorithm to lower the computing load.
1.1 Related works
Conventional cellular networks are designed based on the scheduling of active users to orthogonal time or frequency resources. The excessive control overhead incurred by the massive number of sporadically active M2M devices, however, renders such kind of resource allocation schemes unrealistic. As an alternative, contentionbased schemes, such as slotted ALOHA [14], have been proposed to deal with this issue. However, the main drawback of these schemes is the lack of deterministic performance guarantees, and in particular the performance deteriorates significantly under massive connectivity settings. In addition, the authors of [15] also raised concerns of energy efficiency in largescale M2M networks, where systems with less computational complexity and lower power consumption are particularly desired for lowcost M2M devices with limited operational capability.
Taking sparsity in the activity pattern into account, access schemes using CS also receive a great deal of attention in recent years. To the best of our knowledge, the authors of [16] were the first to propose the idea of CSbased multiuser detection. They introduced a smart adaptive algorithm that switches between a CSbased reconstruction algorithm and a classical detection method depending on the sparsity level of the signals being detected. Reference [17] proposed greedy CS algorithms to facilitate a joint detection of device activity and transmitted data. The idea was further extended in [18] to include multicarrier access schemes and to provide higher spectral efficiency and more flexibility of such schemes. Furthermore, schemes for distributed compressed sensing were also widely studied (e.g. in [19]) to take advantage of both inter and intrasignal correlations by jointly reconstructing signals that have been compressed independently. The concept of distributed compressed sensing has been applied by the authors of [20] to facilitate device detection in M2M communications, which shows significant performance gains expressed in terms of robustness.
However, none of the works mentioned above has exploited the particular clusterlike behavior of M2M devices, thereby ignoring the block sparsity structure in the activation pattern. In addition, greedy algorithms such as orthogonal matching pursuit (OMP) [21] are widely used in detection schemes owing to their low computational complexity. However, in many wireless applications including that considered in this study, even this reduced complexity is a bottleneck due to strictly limited computing resources on the M2M devices. Therefore, we employ a sketching algorithm in our proposed approach to further offload the computation burden incurred by massive M2M communications.
1.2 Main contribution
In this work, we present and analyze a novel distributed scheme for device detection and contentionfree resource allocation in largescale M2M communication networks. We partition the M2M devices into disjoint clusters in advance based on service type, and assign to each device a clusterspecific signature that active devices use for their initial access. In this paper, we use the following definition of an active cluster.
Definition 1
(Active cluster) We say that a cluster is active if there is at least one active device in this cluster.
The devices in each cluster are totally ordered according to some given criterion such as service priority. In other words, the set of devices in each cluster is a totally ordered set \({\mathcal {S}}\) so that if \(a,b\in {\mathcal {S}}, a\ne b\) and \(a\le b\), then \(a<b\). This order is a priori known at all cluster members and gives rise to what we call active ranking that determines the order within each cluster in which the active devices access the set of assigned resource blocks, i.e., an active device that is the ith element in the active ranking accesses the ith resource block.
Definition 2
(Active ranking) The active ranking associated with each active cluster is the totally ordered subset induced by the active devices in a cluster.
Motivated by the CS principle, the proposed scheme mainly consists of three phases:

Phase (i) Signal acquisition The active devices transmit simultaneously preequalized individual signatures, each of which indicates the membership to a particular cluster. Exploiting fullduplex transceivers,^{Footnote 1} all the devices and the BS obtain their individual measurements, which are the superposition of the transmitted signatures from the active devices.

Phase (ii) Detection at BS The BS detects the active clusters, the number of active devices in each cluster, and also the collision pattern in the received measurements. Then it broadcasts the detected information to the devices and assigns a sufficient amount of resources to each active cluster accordingly.

Phase (iii) Detection at devices Each active device detects the active ranking of its cluster, and then accesses the corresponding resource assigned by the BS based on its ranking position.
We study a particular signature design for the devices in each cluster to facilitate the detection process of phase (ii) at the BS side and that of phase (iii) at the device side. Moreover, based on the CountSketch procedure [23, 24], we develop a novel block sketching algorithm to perform phase (ii) and to bring down computational complexity induced by massive connectivity. Phase (iii) is performed using a conventional greedy algorithm such as OMP [21] except that we use feedback information from the BS to enhance robustness and to further reduce complexity. Furthermore, with the distributed rankingbased resource allocation scheme, each active device accesses autonomously a pool of resource blocks assigned by the BS in a contentionfree manner without further control signaling, thus the communication overhead is significantly reduced. We show via theoretical analysis that the proposed scheme achieves a better scaling with increasing network size both in terms of communication overhead and computational complexity when compared with classical CSbased approaches. Moreover, the simulation results reveal a significantly enhanced robustness of the proposed scheme in the presence of Gaussian noise and inaccurate channel estimations.
1.3 Organization of the paper
The remainder of this paper is organized as follows. Section 2 introduces a mathematical model for the proposed scheme. In Sect. 3, we present the detection algorithms in detail. Section 4 is devoted to theoretical analysis of the proposed scheme, while Sect. 5 evaluates the performance with numerical simulation results. Finally, Sect. 6 concludes the paper with some final remarks.
1.4 Notational remarks
Throughout this work, matrices and vectors are denoted by uppercase and lowercase letters, respectively. The superscript \((\cdot )^T\) represents the transpose of a matrix or a vector, and \((\cdot )^H\) indicates the Hermitian transpose. \(A\circ B\) denotes the Hadamard product of matrices A and B. The field of binary, real and complex numbers are denoted by \({\mathbb {B}}\), \({\mathbb {R}}\) and \({\mathbb {C}}\). The cardinality of a set is given by \(\cdot \), and the \(\ell _{2}\)norm is given by \(\cdot \). Furthermore, \({\mathcal {O}}\) denotes “bigO” according to Knuth’s notation. Unless otherwise stated, all logarithms are assumed to be to base 2.
2 Methods
In this section, we introduce the underlying system model and formulate the problem which is addressed in this paper.
2.1 Transmitter side
We consider an M2M network consisting of N devices, which are partitioned into L clusters of equal size d according to the service type.^{Footnote 2} The members of each cluster are known both at the BS and at all devices, which can be achieved via device registration to the network. We assume that the devices have sporadic transmissions, which implies that at a given time instant, only a relatively small number of devices from a few clusters are activated to access the channel. Therefore, we define a twofold sparsity pattern to model the active status of the devices:

Block sparsity \(K_{B}\) The maximum number of active clusters at any time.

Inblock sparsity \(K_{I}\) The maximum number of active devices in an active cluster.
Therefore, the total number of active devices in the network is \(K\le K_{B}K_{I}\). On the other hand, due to the sparselyactivated devices, we have \(K\le K_{B}K_{I}\ll N={\mathrm {Ld}}\).
We use a Ksparse binary sequence (or vector) \(x\in {\mathbb {B}}^N\) to model the activation pattern of the devices in the network, where entry “1” indicates that the corresponding device is active while an inactive device results in “0”. Furthermore, we use \(x_{\ell }\in {\mathbb {B}}^d,\ell \in \{1,\cdots ,L\}\) to denote the subsequence (or subvector) of x corresponding to cluster \(\ell\). In addition, the block support, denoted as \({\mathcal {S}}_{B}\), is defined to be the set of indices of the active clusters: \({\mathcal {S}}_{B}=\{\ell \in \{1,\cdots ,L\}:x_{\ell }_{0}\ne 0\}\). Similarly, the inblock support, denoted as \({\mathcal {S}}_{I,\ell }\), indicates the set of indices of the active devices in cluster \(\ell\): \({\mathcal {S}}_{I,\ell }=\{j\in \{1,\cdots ,d\}:x_{\ell ,j}=1\}\). By definition, we have \({\mathcal {S}}_{B}\le K_{B}\) and \({\mathcal {S}}_{I,\ell }\le K_{I}\) for all \(\ell \in \{1,\cdots ,L\}\). Thus, the activation pattern of the devices x is modeled as a sparse signal with block sparsity \(K_{B}\) and inblock sparsity \(K_{I}\), and we call signals of such a sparsity pattern \((K_{B}, K_{I})\) blocksparse.
Due to the sparsity in x, we use the CS theory [9,10,11] to reconstruct x based on measurements performed by the BS and the devices in the network. We use \(A\in {\mathbb {R}}^{M\times N}\) to denote the measurement matrix whose exact structure is defined later in Sect. 3.1. Each column of A, say column i denoted by \(a_{i}, i\in \{1,\cdots ,N\}\), corresponds to the unique signature sent by device i if it is active, whereas \(A_{,\ell }\in {\mathbb {R}}^{M\times d}\) denotes a submatrix of A corresponding to the signatures sent by the devices from the \(\ell\)th cluster.
2.2 Receiver side
Due to the superposition property of the wireless channel, each receiver observes a noisy superposition of signatures transmitted by the active devices. We assume that all frames are received synchronously at the aggregation node. In practical systems this can be ensured e.g. by a synchronization signal from the BS. Alternatively, the requirement for precise synchronization can be mitigated by using schemes such as that considered in [25] which is robust to the lack of synchronization and requires only a coarse synchronization. To this end, the received signal at the BS \(y\in {\mathbb {C}}^M\) is a noisy linear combination of the transmitted signatures given by
where \(H_{B}\in {\mathbb {C}}^{M\times N}\) is the channel matrix, and \(\epsilon _{B}\in {\mathbb {C}}^M\) denotes the additive noise which is assumed to be zeromean with independent components of variance \(\sigma _{B}^{2}\). The Hadamard product is used here to model the effective channel when applied with advanced technologies such as frequency hopping [26], which is introduced in detail in Sect. 3.2.
In addition, the active devices also perform their own local measurements during the acquisition phase. The received signal \(y_{D}\in {\mathbb {C}}^M\) observed by a particular device at some given time instant is obtained as
where \(H_{D}\) is an \({M\times N}\) matrix representing the wireless channels between the devices, and \(\epsilon _{D}\in {\mathbb {C}}^M\) is the vector of independent noise components with zero mean and variance \(\sigma _{D}^{2}\).
Furthermore, we make the following assumption on channel knowledge:
Assumption 1
Each device has the channel state information to the BS.
In current systems [5], the channel information can be obtained with pilotsignals from the network with no extra cost. Alternatively, it can also be possibly obtained via statistical channel knowledge [27], locationbased estimation [28], channel reciprocity [29] or longterm observation [30]. We point out that the entries of \(H_{B}\) and \(H_{D}\) are in general not physical channels but rather effective channels that depend on the underlying transmission scheme. For instance, the effective channels of the energydetection based scheme in [25] is related to channel power gains, which are much easier to acquire than complexvalued channel coefficients.
2.3 Problem formulation
Figure 1 illustrates the transmission scenario and the problem of interest in this work. As a result of concurrent transmissions of the active devices, the BS observes a noisy superposition of the transmitted signatures given by (1), while the received signal at the devices is as in (2). Hereafter, we apply CS related techniques to reconstruct the (\(K_{B},K_{I}\)) blocksparse signal x with y at the BS and \(y_{D}\) at the devices. To be specific, the BS performs block support recovery to obtain an accurate estimation of the block support \(\tilde{{\mathcal {S}}}_{B}\) and the cardinality of the inblock support \(\tilde{{\mathcal {S}}}_{I,\ell }\) for each \(\ell \in \{1,\cdots ,L\}\). Subsequently, each active device from cluster \(\ell\) performs inblock support recovery to estimate the inblock support \(\tilde{{\mathcal {S}}}_{I,\ell }\) using the received signal \(y_{D}\) in (2) and side information broadcast by the BS.
In a typical massive connectivity scenario as in M2M communications, we need to find proper solutions of high efficiency and low computational complexity to the following problems.

Problem 1 Block support recovery at the BS with \({\mathbb {P}}\left( \tilde{{\mathcal {S}}}_{B}={\mathcal {S}}_{B}, \forall _{\ell \in \{1,\cdots ,L\}}\tilde{{\mathcal {S}}}_{I,\ell }={\mathcal {S}}_{I,\ell } \right) \ge 1\delta\), where \(\delta\) is a target error bound.

Problem 2 Inblock support recovery at the active devices in cluster \(\ell\) with \({\mathbb {P}}\left( \tilde{{\mathcal {S}}}_{I,\ell }={\mathcal {S}}_{I,\ell }\right) \ge 1\delta\).^{Footnote 3}
3 Distributed rankingbased resource allocation
In this section, we present our algorithm design to tackle the target problems. In particular, this includes the structured signature model and the decoding procedures at the BS as well as at the devices, respectively.
3.1 Structured random signature model
The measurement matrix \(A\in {\mathbb {R}}^{M\times N}\) we design here is a structured random matrix, which is an extension of those utilized by the CountSketch procedure proposed in [23, 24]. These matrices are desired as they in general facilitate low computational complexity. We denote by \({\mathcal {A}}(R,T,L,d,\alpha )\) a particular distribution over matrices with RT rows and Ld columns, which is specified below, and we assume that the measurement matrix A is drawn from this distribution, i.e., \(A\sim {\mathcal {A}}(R,T,L,d,\alpha )\) with \(M={\mathrm {RT}}, N={\mathrm {Ld}}\).
As illustrated in Fig. 2, the measurement matrix A is composed of the vertical concatenation of T individual random matrices that we denote by \(A_{t,}\in {\mathbb {R}}^{R\times N}\) for \(t\in \{1,\cdots ,T\}\), where \(A_{t,}\) consists of the horizontal concatenation of L submatrices \(A_{t,\ell }\in {\mathbb {R}}^{R\times d}\) for \(\ell \in \{1,\cdots ,L\}\). Each \(A_{t,\ell }\) is a sparse matrix containing exactly d nonzero components – located on the same row and with the same value. The index of the row with nonzero elements is chosen uniformly at random from the set \(\{1,2,\cdots ,R\}\), and the nonzero components take either the value \(+\alpha\) or \(\alpha\) with probability 1/2. For a given realization of \(A_{t,\ell }\), let \(q_{t,\ell }\in \{1,\cdots ,R\}\) denote the index of the row of \(A_{t,\ell }\) with nonzero entries, and \(s_{t,\ell }\in \{\alpha ,+\alpha \}\) be the corresponding value of the nonzero components in \(A_{t,\ell }\). As each signature transmitted by the devices is the corresponding column of A, it is therefore a sparse sequence of length M with sparsity level T.
3.2 Block support recovery at BS
The objective of the decoding procedure at the BS is to obtain an accurate estimation of the block support \({\mathcal {S}}_B\) and the cardinality of the inblock support \({\mathcal {S}}_{I,\ell }\) for each active cluster \(\ell \in \{1,\cdots ,L\}\) (see Problem 1 in Sect. 2.3).
The signal y received by the BS at some given time instant is given by (1). Since the channel state information \(H_{B}\) is assumed to be available at the devices, the active devices can perform a channel inversion before transmitting the signatures to indicate their active state. Particular variants of (generalized) inverses of the channel matrix may be taken at the transmitter side. For example, \(H_{B}\) can be inverted by simply taking the reciprocal of the nonzero elements whose magnitude is above certain threshold \(\theta\), which is given by
In this case devices with weak links due to the nearfar behavior may stay offline and avoid excessively large transmit power and strong interference to other nodes. Then the obtained measurements at the BS are given as
In this paper, for the sake of simplicity we develop a fast block sketching algorithm based on the CountSketch procedure proposed in [23, 24] to realize the decoding process at the BS. To be more precise, we use \(y_{t}\in {\mathbb {R}}^R\) to denote the subvector of y corresponding to the observations obtained via submatrix \(A_{t,}\). So, we have
Given \(y_{t}\) for each \(t\in \{1,\cdots ,T\}\), we form the signal estimate \({\tilde{x}}_{t}\in {\mathbb {R}}^N\) by indexing and scaling the entries of the corresponding observations \(y_{t}\) such that
where each \(A_{t,}\) consists of the horizontal concatenation of L submatrices \(A_{t,\ell }\) for \(\ell \in \{1,\cdots ,L\}\). Further recall that each matrix \(A_{t,\ell }\) is a sparse matrix containing d nonzero components located on the same row \(q_{t,\ell }\in \{1,\cdots ,R\}\) and all the nonzero components have the same value \(s_{t,\ell }\in \{\alpha , +\alpha \}\). As a result, the ith entry \({\tilde{x}}_{t,i}\) of \({\tilde{x}}_{t}\) for the \(\ell\)th block can be written as
where \(y_{t,\ell }=\left( y_{t}\right) _{q_{t,\ell }}\). We use \(a_{q_{t,\ell },i}\) to denote the entry in the \(q_{t,\ell }\)th row and ith column of \(A_{t,}\), then we have
Since \(y_{t,\ell }\) is dominated by the nonzero entries on the \(q_{t,\ell }\)th row of \(A_{t,}\), we denote by \({\mathcal {S}}_{t,\ell }\) a set of indices of the clusters which have nonzero components on the same row as block \(\ell\), i.e., \({\mathcal {S}}_{t,\ell }=\{j=\{1,\cdots ,L\}:q_{t,j}=q_{t,\ell }\}\). Then \(y_{t,\ell }\) is given by
where (a) follows from the structure of \(A_{t,\ell }\) with equal nonzero elements on the same row, (b) is due to \(x_{i}\in \{0,1\}\), and (c) holds since \({\mathcal {S}}_{I,k}=0\) if \(k\notin {\mathcal {S}}_{B}\).
Putting \(y_{t,\ell }\) in (9) into (7) yields
where \(\Delta _{t,\ell }\) is the interference term from other active blocks, and \(\Xi _{t,\ell }\) is the noise term with zero mean and variance \(\gamma ^2\).
To mitigate the interference \(\Delta _{t,\ell }\) from other blocks, we consider a blockwise estimate \({\bar{x}}_{\ell }\) for each \(\ell \in \{1,2,\cdots ,L\}\) given by
Notice that, instead of the mean, the estimate \({\bar{x}}_{\ell }\) for block \(\ell\) is equal to the median of \({\tilde{x}}_{t,i}\) over \({\mathcal {O}}(Td)\) samples. The rationale behind this approach is to make the estimates more robust against outliers, since large value elements in the data stream may spoil some subsets of the estimate if the mean is computed.
We show later in Sect. 4.1 that by taking the median value blockwisely among all individual estimations as in (11), each estimate \({\bar{x}}_{\ell }\) for the \(\ell\)th block corresponds to \({{\mathcal {S}}}_{I,\ell }\) with high probability (w.h.p.), and the cardinality of the inblock support set \({{\mathcal {S}}}_{I,\ell }\) is obtained as
Therefore, since \({{\mathcal {S}}}_{I,\ell }\) indicates the number of active devices in cluster \(\ell \in \{1,2,\cdots ,L\}\), those clusters with \({{\mathcal {S}}}_{I,\ell }>0\) are marked as “active” by the BS. For brevity, we assume that each device needs one resource block for transmission. Therefore, the number of resource blocks assigned by the BS to cluster \(\ell \in \{1,2,\cdots ,L\}\) equals to \({\mathcal {S}}_{I,\ell }\).
In addition, for a given \(x_{i}\) from an active block \(\ell \in {\mathcal {S}}_{B}\), if an individual estimate \({\tilde{x}}_{t,i}\) in (7) is much larger than the blockwise estimate \({\bar{x}}_{\ell }\) in (11), i.e., \({\tilde{x}}_{t,i}\gg {\bar{x}}_{\ell }\), then we can conclude that the corresponding measurement might suffer strong interference from the other active clusters. That is, for a given \(x_{i}\) from block \(\ell\) and a particular \(t\in \{1,\cdots ,T\}\), the interference term \(\Delta _{t,\ell }\) in (10) is nonzero. In such a case, we mark the measurement as “collided” for cluster \(\ell\) and keep its index \(q_{t,\ell }\) in the collision pattern vector \(Q_{\ell }\) for the corresponding cluster.
The above approach provides the BS with an accurate estimate of \({\mathcal {S}}_{B}\) and \({\mathcal {S}}_{I,\ell }\), and therefore it solves Problem 1. The detailed proof of the performance guarantee will be given in Sect. 4.1. In addition, it provides the collision patterns \(Q_{\ell }\) in the measurements for \(\ell \in \{1,2,\cdots ,L\}\). The BS broadcasts these information to the devices and assigns to each cluster, say cluster \(\ell \in \{1,2,\cdots ,L\}\), \({\mathcal {S}}_{I,\ell }\) resource blocks to accommodate all active devices in this cluster.
3.3 Inblock support recovery at devices
During the signal acquisition phase, each active device also collects its own measurements, which are linear combinations of the transmitted signatures from other active devices. In this section, we address Problem 2 in Sect. 2.3. The objective is to develop a scheme that enables each active device in cluster \(\ell \in \{1,\cdots ,L\}\) to reliably estimate the inblock support \({\mathcal {S}}_{I,\ell }\) with low computational complexity, based on its local measurements and the feedback from the BS as side information.
Given the measurement matrix A under the random structured model in Sect. 3.1 and the prechannel correction in (4), the measurement \(y_{D}\) collected at an active device is given by
According to the specific structure of A, the corresponding submatrix \(A_{,\ell }\) for cluster \(\ell \in \{1,\cdots ,L\}\) has only T rows with nonzero components. The indices of these rows are collected in the set \(D_{\ell }\). Furthermore, with the feedback information from the BS on the collision pattern \(Q_{\ell }\) for cluster \(\ell\) indicating those collided measurements to be discarded, we form an index set \(U_{\ell }=D_{\ell }\cap {\bar{Q}}_{\ell }\). Therefore, in order to perform the inblock support recovery of \(x_{\ell }\) at any device from cluster \(\ell\), we simply need to focus on \(y_{D,\ell }\) – a vector composed of the entries of \(y_{D}\) corresponding to \(U_{\ell }\). We denote \({\tilde{A}}_{D,\ell }\) as a \(U_{\ell }\times d\) submatrix of \({\tilde{A}}\) with vertical concatenation of rows corresponding to \(U_{\ell }\) and columns for block \(\ell\). Therefore, we have
As introduced in Sect. 2.2, we use technologies such as frequency hopping [26] for the transmission where symbols are transmitted hopping over multiple subcarriers. Since the channels between the devices over different subcarriers are assumed to be i.i.d., we can conclude that \({\tilde{A}}_{D,\ell }\) has independent columns and rowblocks (e.g., to be i.i.d Subgaussian). Therefore, some classic CS decoding algorithms can be applied to perform the inblock support recovery. We argue in favor of the greedy algorithms such as OMP [21] due to their low complexity, which is particularly attractive to M2Mbased applications where limited computational capability as well as energy consumption at the devices are important design criteria.
An example of the modification on OMP for inblock support recovery is summarized in Algorithm 1, where the modified steps are marked in boldface. By exploiting the broadcast information on the cardinality of the inblock support \({\mathcal {S}}_{I,\ell }\) for cluster \(\ell\), the stopping criteria for implementing the greedy algorithms can be set by limiting the number of iterations to \({\mathcal {S}}_{I,\ell }\), thereby leading to further reduced computational complexity. This is merely an illustrative example assuming that channel knowledge is available at the devices. However, this assumption can be further relaxed by using approximate message passing (AMP) algorithms as in [31].
To this end, Problem 2 is explicitly resolved. In Sect. 4.2, we prove conditions under which the inblock support \({\mathcal {S}}_{I,\ell }\) can be accurately reconstructed at the devices in cluster \(\ell\). Thus, the activation pattern \(x_{\ell }\) of the \(\ell\)th cluster can be precisely reconstructed and detected by the active devices. Thereafter, each active device is able to learn the active ranking in its cluster and accesses the corresponding resource blocks assigned by the BS.
4 Theoretical performance analysis
This section provides a sufficient condition for the performance guarantees of our proposed scheme. In particular, we come with the following theorem.
Theorem 1
Suppose that the activation pattern of the devices is modeled as a \((K_{B}, K_{I})\) blocksparse signal \(x\in {\mathbb {B}}^N\) over block size d, and the signatures transmitted by the devices are modeled as a measurement matrix \(A\in {\mathbb {R}}^{M\times N}\) following the structure designed in Sect. 3.1. By applying the block sketching algorithm in Sect. 3.2 for decoding at the BS and the modified OMP in Sect. 3.3 for decoding at the devices, x can be reliably reconstructed by the proposed scheme with computational complexity of \({\mathcal {O}}(dK_{I}^{2}+\frac{N}{d}\log N)\) if the length of the transmitted signatures
A rigorous proof of Theorem 1 will be presented in the following, considering both the block support recovery at the BS and inblock support recovery at the devices, respectively. And we also show that it achieves a better scaling when compared with classical CSbased approaches both in terms of communication overhead and computational complexity.
4.1 Block support recovery at BS
First, we analyze the recovery guarantee for the individual estimate \({\tilde{x}}_{t,i}\) in (7).
Lemma 1
Suppose that \(x\in {\mathbb {B}}^N\) is a \((K_{B}, K_{I})\) blocksparse signal over block size d, and \(A\in {\mathbb {R}}^{M\times N}\) is randomly drawn from \({\mathcal {A}}(R,T,L,d,\alpha )\). Given \(y\in {\mathbb {R}}^M\) in (4) and the estimate \({\tilde{x}}_{t,i}\) in (7) for a particular entry \(x_{i}\) from block \(\ell \in \{1,\cdots ,L\}\) and a given \(t\in \{1,\cdots ,T\}\), let \(\Gamma \left( {\tilde{x}}_{t,i}\right) :=\{{\tilde{x}}_{t,i}\alpha ^2{\mathcal {S}}_{I,\ell }\le 3\gamma \}\), where \(\gamma ^2\) is the variance of the noise term \(\Xi _{t,\ell }\) in (10). The probability of \(\Gamma ({\tilde{x}}_{t,i})\) is lower bounded by
Proof
According to (10), for a particular estimate \({\tilde{x}}_{t,i}\) of \(x_{i}\) in block \(\ell\) with \(t\in \{1,\cdots ,T\}\), \(\Gamma ({\tilde{x}}_{t,i})\) holds w.h.p. if the corresponding interference term \(\Delta _{t,\ell }=0\), since the noise term \(\epsilon _{t,\ell }\) is randomly drawn from a Gaussian ensemble with zero mean and variance \(\gamma ^2\) [32]. A sufficient (but not necessary) condition for \(\Delta _{t,\ell }=0\) to hold is that the set \({\mathcal {S}}_{B}\cap {\mathcal {S}}_{t,\ell }\backslash \{\ell \}=\emptyset\), where \({\mathcal {S}}_{t,\ell }=\{j=\{1,\cdots ,L\}:q_{t,j}=q_{t,\ell }\}\). This implies that \(q_{t,\ell }\) is distinct from \(q_{t,{\bar{\ell }}}\) for all \({\bar{\ell }}\in {\mathcal {S}}_{B}\backslash \{\ell \}\). Therefore, we have
where (a) follows since the index of rows with nonzero entries \(q_{t,\ell }\) are drawn i.i.d. uniformly at random for each \(\ell \in \{1,\cdots ,L\}\) and \({\mathcal {S}}_{B}=K_{B}\), and the inequality in (b) follows from the Bernoulli’s inequality [33]. \(\square\)
Then we look into the recovery guarantee for the block estimate \({\bar{x}}_{\ell }\) in (11) obtained via the median operator.
Lemma 2
Suppose that \(x\in {\mathbb {B}}^N\) is a (\(K_{B}, K_{I}\)) blocksparse signal over block size d, and \(A\in {\mathbb {R}}^{M\times N}\) is randomly drawn from \({\mathcal {A}}(R,T,L,d,\alpha )\). Given \(y\in {\mathbb {R}}^M\) in (4) and the block estimate \({\bar{x}}_{\ell }\) in (11) for a particular block \(\ell \in \{1,\cdots ,L\}\), let \(\Gamma ({\bar{x}}_{\ell }):=\{{\bar{x}}_{\ell }\alpha ^2{\mathcal {S}}_{I,\ell }\le 3\gamma \}\), where \(\gamma ^2\) is the variance of the noise term \(\Xi _{t,\ell }\) in (10). The probability of \(\Gamma ({\bar{x}}_{\ell })\) is lower bounded by
if \(R={\mathcal {O}}(K_{B})\) and \(T={\mathcal {O}}\left( \log \frac{N}{\delta }\right)\), where \(0<\delta <1\) is an arbitrary target error bound.
Proof
As in (11), the block estimate \({\bar{x}}_{\ell }\) is obtained by taking the median of the individual estimate \({\tilde{x}}_{t,i}\) over \({\mathcal {O}}(Td)\) samples for a given \(\ell \in \{1,\cdots ,L\}\). Suppose at least \(\frac{Td}{2}\) estimates \({\tilde{x}}_{t,i}\) fulfills the \(\Gamma\) condition of Lemma 1, then \(\Gamma ({\bar{x}}_{\ell })\) in Lemma 2 will follow affirmatively. We analyze in the following where \(\Gamma ({\tilde{x}}_{t,i})\) holds for at least \(\frac{Td}{2}\) individual estimates.
Let \(X_{1},\cdots ,X_{Td}\) be independent (0,1) Bernoulli random variables where \(X_{t}, 1\le t\le Td\) indicates whether the corresponding estimate \({\tilde{x}}_{t,i}\) of \(x_{i}\) satisfies the \(\Gamma\) condition of Lemma 1. As proved in Lemma 1, the probability of each \(X_{t}\) being equal to 1 is \(p\ge 1\frac{K_{B}1}{R}\). Then the probability that the number of simultaneous occurrence of the events \(\{X_{t}=1\}\) exceeds Td/2 is given by [32]
A lower bound on this probability can be calculated using Chernoff’s inequality [34] to obtain
The minimum bound can be easily found as achieved by \(p=1/2\). By setting a lower threshold \(\theta \in (\frac{1}{2}, 1)\) to the probability p, we have \(p\ge 1\frac{K_{B}1}{R}\ge \theta\) from which it follows that
^{Footnote 4} Furthermore, (22) also implies that the lower bound of the probability scales as \(1e^{{\mathcal {O}}(Td)}\). By taking \(T=\log \left( \frac{Ld}{\delta }\right) ={\mathcal {O}}\left( \log \frac{N}{\delta }\right)\) into (22) proves Lemma 2. \(\square\)
Given the proof of Lemma 2, the overall performance guarantee for the block support recovery at the BS follows inherently.
Lemma 3
Suppose that \(x\in {\mathbb {B}}^N\) is a \((K_{B}, K_{I})\) blocksparse signal over block size d, and \(A\in {\mathbb {R}}^{M\times N}\) is randomly drawn from \({\mathcal {A}}(R,T,L,d,\alpha )\). Given \(y\in {\mathbb {R}}^M\) in (4) and the block estimate \({\bar{x}}_{\ell }\) in (11) for block \(\ell \in \{1,\cdots ,L\}\), the probability that \(\Gamma ({\bar{x}}_{\ell })\) in Lemma 2 satisfies for all blocks \(\ell \in \{1,\cdots ,L\}\) is lower bounded by
if \(R={\mathcal {O}}(K_{B})\) and \(T={\mathcal {O}}\left( \log \frac{N}{\delta }\right)\), where \(0<\delta <1\) is an arbitrary target error bound.
Proof
Since the block estimate \({\bar{x}}_{\ell }\) for each block is i.i.d., the probability that \(\Gamma ({\bar{x}}_{\ell })\) in Lemma 2 holds for all \(\ell \in \{1,\cdots ,L\}\) is obtained as
where the second inequality follows from Bernoulli’s inequality [33] since \(\delta /L\ll 1\). \(\square\)
Proposition 1
The computational complexity for reliable block support recovery at the BS is of \({\mathcal {O}}(\frac{N}{d}\log N)\).
Proof
According to (7), for a particular entry \(x_{i}\) of x from block \(\ell \in \{1,\cdots ,L\}\) and a given \(t\in \{1,\cdots ,T\}\), the calculation of its corresponding estimate \({\tilde{x}}_{t,i}\) only involves a single multiplication. Thereafter, the blockwise estimate \({\bar{x}}_{\ell }\) in (11) is obtained as the median of \({\tilde{x}}_{t,i}\) over \({\mathcal {O}}(Td)\) samples. The computational complexity for finding the median of an unsorted array with N elements is of \({\mathcal {O}}(N)\) by using the medianofmedians algorithm [35]. Moreover, since the submatrix \(A_{t,\ell }\) in (6) has same nonzero entries on the same row, the calculation cost for the blockwise estimate \({\bar{x}}_{\ell }\) can be further reduced to T times multiplication and \({\mathcal {O}}(T)\) operations to find the median, resulting in the computational complexity of \({\mathcal {O}}(T)\). To obtain the blockwise estimate \({\bar{x}}_{\ell }\) for all L blocks and by taking \(T={\mathcal {O}}(\log N)\) in Lemma 3, the overall computational complexity for reliable block support recovery at the BS is of \({\mathcal {O}}(TL)={\mathcal {O}}(\frac{N}{d}\log N)\). \(\square\)
Remark If the cluster size d scales linearly with the increasing network size N, i.e., \(d={\mathcal {O}}(N)\), the term \(\frac{N}{d}\) turns to be an arbitrary constant value. Thus, the algorithm achieves sublinear complexity of \({\mathcal {O}}(\log N)\) that scales significantly better than conventional approaches.
In short, the above analysis shows that by choosing R and T large enough, i.e., \(R={\mathcal {O}}(K_{B})\) and \(T={\mathcal {O}}(\log N)\) (for a total of \(M={\mathcal {O}}(K_{B}\log N)\) measurements), a reliable block support recovery at the BS can be guaranteed w.h.p. and the computational complexity is of \({\mathcal {O}}(\frac{N}{d}\log N)\).
4.2 Inblock support recovery at devices
Lemma 4
Suppose that \(x\in {\mathbb {B}}^N\) is a (\(K_{B}, K_{I}\)) blocksparse signal over block size d, and \(A\in {\mathbb {R}}^{M\times N}\) is randomly drawn from \({\mathcal {A}}(R,T,L,d,\alpha )\). Given \(y_{D}\in {\mathbb {R}}^M\) in (13) and by applying the algorithm in Sect. 3.3, \(x_{\ell }\) for block \(\ell \in \{1,2,\cdots ,L\}\) can be reliably recovered with computational complexity of \({\mathcal {O}}(dK_{I}^{2})\) if \(R={\mathcal {O}}(K_{B})\) and \(T={\mathcal {O}}(K_{I}\log d)\).
Proof
As shown in (14), the effective measurements that can be used to perform the inblock support recovery of \(x_{\ell }\) for a given \(\ell \in \{1,\cdots ,L\}\) comprise only the entries of \(y_{D}\) indexed by \(D_{\ell }\backslash Q_{\ell }\), where \(D_{\ell }\) is the index set of rows with nonzero components in \(A_{,\ell }\), and \(Q_{\ell }\) is the set of collided measurements feedback by the BS. By Lemma 1 and by the fact that the individual estimates are independent, it follows that the overall number of effective measurements \(T_{I}\) for the inblock support recovery of an active cluster \(\ell \in {\mathcal {S}}_{B}\) can be estimated as
To elaborate the inblock support recovery at a device using Algorithm 1, for simplicity we assume that \({\tilde{A}}_{D,\ell }\) in (14) is realvalued and the system is noisefree. However, the scheme can be easily extended to complex settings and noisy cases as in [36]. Since \({\tilde{A}}_{D,\ell }\) has independent columns and rowblocks, it follows the columnindependent model [37, p. 49] for Subgaussian matrices. Herein \({\tilde{A}}_{D,\ell }\) can be decomposed as \({\tilde{A}}_{D,\ell }=\Phi Q\) and we have \(y_{D,\ell }=\Phi Qx_{\ell } = \Phi {\tilde{x}}_{\ell }\), where \(\Phi\) is the columnnormalized matrix of \({\tilde{A}}_{D,\ell }\) and Q is a diagonal matrix with each diagonal entry to be the original norm of the corresponding column. Furthermore, [38] provides a sufficient condition on the measurement matrix for uniform and robust sparse signal recovery, which is the wellknown Restricted isometry property (RIP). Moreover, according to [37], random matrices with i.i.d. Subgaussian entries and normalized columns have optimal RIP, therefore \(\Phi\) follows the RIP condition and is admissible for reliable sparse signal recovery. It has been further investigated in [39] that a Ksparse signal of dimension N can be uniformly reconstructed using OMP with an admissible measurement matrix if its dimension lies in the regime \({\mathcal {O}}(K\log N)\). While the activation pattern \({\tilde{x}}_{\ell }\) to be reconstructed for cluster \(\ell\) is of dimension d and sparsity level \(K_{I}\), the support can be recovered w.h.p. if the number of effective measurements \(T_{I}\) satisfies
Recall that \(1\frac{K_{B}1}{R}\ge \theta , \theta \in (\frac{1}{2}, 1)\) should be satisfied for the block support recovery procedure at the BS with \(R={\mathcal {O}}(K_{B})\), then we have \(T={\mathcal {O}}(\frac{1}{\theta }K_{I}\log d)={\mathcal {O}}(K_{I}\log d)\) since \(\theta\) is a given constant.
It is further verified in [40] that the computational complexity is of \({\mathcal {O}}(NK^2)\) for sparse signal recovery via OMP. Thus, since the signal to be reconstructed for inblock support recovery at a device is of dimension d and sparsity level \(K_{I}\), \({\mathcal {O}}(dK_{I}^{2})\) operations are sufficient for decoding with the modified OMP algorithm. \(\square\)
4.3 Proof of Theorem 1
For a given realization of the measurement matrix, Lemma 3 guarantees that \(R={\mathcal {O}}(K_{B})\) and \(T={\mathcal {O}}(\log N)\) are sufficient for reliable block support recovery at the BS, while Lemma 4 shows that \(R={\mathcal {O}}(K_{B})\) and \(T={\mathcal {O}}(K_{I}\log d)\) measurements are required for the inblock support recovery at the devices. Taking the maximum value of both cases yields a sufficient condition on the required number of measurements
Furthermore, since the algorithms for block support recovery at the BS requires \({\mathcal {O}}(\frac{N}{d}\log N)\) operations and the inblock support recovery at the device side requires \({\mathcal {O}}(dK_{I}^{2})\) operations, the overall computational complexity is of \({\mathcal {O}}(dK_{I}^{2}+\frac{N}{d}\log N)\) for a successful detection process.
Remark If the signal is treated as a conventional Ksparse vector (where \(K=K_{B}K_{I}\)) as in [11] without exploiting knowledge of the blocksparse structure, a sufficient condition for reliable signal recovery using OMP would be \(M={\mathcal {O}}(K\log N)={\mathcal {O}}(K_{B}K_{I}\log N)\) with computational complexity is of \({\mathcal {O}}(NK^2)\). As M is the length of the unique signature transmitted by an active device, it is also an indication of the signal acquisition time or the communication overhead. Since \(d\ll N\) and \(K_{I}\ll K\), we can see that from the scaling point of view, both the communication cost and the computational complexity are significantly reduced by the proposed scheme.
5 Results and discussion
We conduct numerical experiments to verify the performance of the proposed distributed device detection and resource allocation scheme. Mapped into our mathematical model, the target problem is to reconstruct a Ksparse binary vector of length N from M distributed measurements obtained via the measurement matrix \(A\in {\mathbb {R}}^{M\times N}\) which is randomly drawn from \({\mathcal {A}}(R,T,L,d,\alpha )\) introduced in Sect. 3.1. We compare the performance of the proposed scheme to conventional CSbased approaches, among which we take the classic greedy algorithm OMP with random Gaussian measurements as the baseline. We assume for the baseline that the signal to be reconstructed is treated as a conventional Ksparse vector, and centralized decoding is performed without exploiting knowledge of the blocksparse structure.
In our simulations, we take the number of devices N in the network within the range \([10^3, 10^6]\) and they are partitioned into clusters with equal size \(d=100\). The sparsity level of the signal is set to be \(K=20\), with block sparsity \(K_{B}=4\) and inblock sparsity \(K_{I}=5\), respectively. For each plot we average over 1000 pairs of realizations of the measurement matrix and the blocksparse signal.
Figure 3a and b give an intuitive comparison between the proposed scheme and standard OMP with Gaussian measurements for reliable signal recovery, in terms of both the length of signatures transmitted by the active devices and the number of operations conducted by the algorithms. It can be seen that the proposed scheme requires a significantly reduced signature length and computational complexity, especially when the number of devices in the network becomes excessively large. As the signature length also implies the signal acquisition time or communication overhead in distributed systems, the proposed scheme leads to a drastically reduced communication cost.
Figure 4a depicts the detection success probability as a function of the signature length for the proposed scheme and the baseline, while taking the network size \(N=10^4\). The performance is evaluated for the noisefree case. We can see that the proposed scheme significantly outperforms standard OMP, where less measurements are required by the proposed scheme to achieve the same detection success probability as the baseline. Figure 4b further extends the evaluation to noisy settings as well as with imperfect channel knowledge. The performance for the noisy case is evaluated by setting the signaltonoise ratio (SNR) to 5 dB in the simulations. In addition, since the channel estimation error can be treated as a component that contributes as an additional source of distortion independent of noise [41], it is modeled as an additive noise term in the measurement matrix with the same variance as the white Gaussian noise. We can see that the proposed scheme achieves significantly higher detection success probability than the baseline under noisy conditions. The performance gain mainly comes from the reliable detection of inblock support cardinality of the active clusters using the sketching algorithm, which sets an appropriate stopping criteria for Algorithm 1 and minimizes the occurrence of false alarms in the detection. Therefore, the proposed scheme shows strong robustness in the presence of noise and imperfect channel knowledge.
We also compare performance of the proposed scheme with two classical random access schemes, namely the LTE RA procedure [5] and the conventional clusterbased approach [42] where a cluster head aggregates messages/requests for the rest of the devices in the cluster and initiates the RA procedure on behalf of the cluster members. We set the number of measurements M to be 839 bits in the simulation—same as the length of ZadoffChu sequence [5] used for the LTE RA procedure, thus the three schemes are running with the same signature length. The sparsity level \(K=K_{B}K_{I}\) is set within the range between 10 and 100.
Figure 5a depicts the detection probability by the three schemes as a function of the number of active devices in the network (i.e., the sparsity level), and Fig. 5b plots the averaged access delay performance of the three schemes. It can be easily observed that the proposed scheme significantly outperforms the LTE RA procedure both in terms of higher detection success probability and reduced access delay, thus achieving much better scalability with the increasing network size and leading to more robustness in the detection process. Moreover, when compared with the clusterbased approach, the proposed scheme also achieves better detection performance if the sparsity level is sufficiently large (\(\le\) 70). Meanwhile, since the proposed distributed scheme is able to avoid the excessive communication and coordination between the devices as well as to the infrastructure as required by the clusterbased approach, the signaling overhead is substantially reduced and thus leading to significantly decreased access latency.
However, there are still some limitations on the proposed approach, especially on the requirement of perfect synchronization during the acquisition phase and priori knowledge of the channel state by the M2M devices. Further extensions to relax these limitations will be investigated in future work.
6 Conclusion
This work utilizes the framework of CS for detection of the network activation pattern to facilitate distributed resource allocation in largescale M2M communication networks. The particular blocksparsity in the activation pattern of the M2M devices is exploited, thus mapping the objective into a support recovery problem for a particular blocksparse signal—with additional inblock structure—in CS based applications. The detection techniques are mainly based on sketching and greedy algorithms, which inherit the virtues of low computational complexity. Furthermore, by applying the distributed rankingbased resource allocation scheme, each active device decides autonomously on which resource to access the channel in a contentionfree manner without further coordination, thus excessive control overhead is avoided. It has been verified via theoretical analysis that a (\(K_{B},K_{I}\)) blocksparse binary signal \(x\in {\mathbb {B}}^N\) over block size d can be reliably reconstructed using the proposed scheme with \({\mathcal {O}}(\max \{K_{B}\log N, K_{B}K_{I}\log d\})\) measurements and computational complexity of \({\mathcal {O}}(dK_{I}^{2}+\frac{N}{d}\log N)\), which achieves a better scaling compared with conventional CS based approaches. Furthermore, the simulation results also reveal the strong robustness of the proposed scheme under noisy conditions and with imperfect channel knowledge.
Availability of data and materials
Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.
Notes
The authors in [22] highlighted benefits of the full duplex wireless and rendered its feasibility for implementation in future IoT systems.
The scheme can be easily extended to unequalsized clusters. We only use clusters of equal size for simplicity.
For simplicity we use the same target error bound \(\delta\) for Problem 1 and 2.
An alternative way of proving this bound is by considering that \(p\ge \left( 1\frac{1}{R}\right) ^{K_{B}1}\ge \theta\) which follows from the derivation in (19). In this case, we obtain again \(R\ge \frac{1}{1\theta ^{\frac{1}{K_{B}1}}}\approx \frac{1}{\frac{1}{K_{B}1}\ln \theta }=\frac{K_{B}1}{\ln \theta }={\mathcal {O}}(K_{B})\), where the approximation follows from the limits of exponential functions since \(0\approx \frac{1}{K_{B}1}\ll 1\).
Abbreviations
 M2M:

Machinetomachine
 CS:

Compressed sensing
 IoT:

Internet of Things
 BS:

Base station
 OMP:

Orthogonal matching pursuit
 AMP:

Appropriate message passing
 RIP:

Restricted Isometry property
 SNR:

Signaltonoise ratio
References
Y. Chang, P. Jung, C. Zhou, S. Stanczak, Block compressed sensing based distributed device detection and resource allocation for M2M communications. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). (2016)
Y. Chang, P. Jung, C. Zhou, S. Stanczak, Block compressed sensing based distributed device detection for M2M communications. arXiv:1609.05080 [cs.IT], (2017)
D. Boswarthick, O. Elloumi, O. Hersent, M2M Communications: A System Approach (John Wiley & Sons Ltd, Hoboken, 2012)
H.S. Dhillon, H. Huang, H. Viswanathan, Widearea wireless communication challenges for the Internet of Things. IEEE Commun. Mag. 55(2), 168–174 (2017)
S. Sesia, I. Toufik, M. Baker, LTEThe UMTS Long Term Evolution, From Theory to Practice, 2nd edn. (John Wiley & Sons Ltd, Hoboken, 2011)
D.A. Schmidt, C. Shi, R.A. Berry, M.L. Honig, W. Utschick, Distributed resource allocation schemes. IEEE Signal Process. Mag. 26, 53–63 (2009)
T. Taleb, A. Kunz, Machine type communications in 3GPP networks: potential, challenges and solutions. IEEE Commun. Mag. 50, 178–184 (2012)
M. Dohler, D. Boswarthick, J. A. Zarate, Machinetomachine in smart grids and smart cities. IEEE Global Telecommunications Conference (GLOBECOM) Workshops, (2012)
E. Candes, J. Romberg, T. Tao, Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans. Inf. Theory 52, 489–509 (2006)
E. Candes, M. Wakin, An introduction to compressive sampling. IEEE Signal Process. Mag. 25, 21–30 (2008)
D. Donoho, Compressed sensing. IEEE Trans. Inf. Theory 52, 1289–1306 (2006)
G. Wunder, H. Boche, T. Strohmer, P. Jung, Sparse signal processing concepts for efficient 5G system design. IEEE Access 3, 195–208 (2015)
Y.C. Eldar, P. Kuppinger, H. Bölcskei, Compressed sensing of blocksparse signals: uncertainty relations and efficient recovery. IEEE Trans. Signal Process. 58, 3042–3054 (2010)
M. Berioli, G. Cocco, G. Liva, A. Munari, Modern random access protocols. Found. Trends Netw. 10(4), 317–446 (2016)
X. Liu, X. Zhang, Rate and energy efficiency improvements for 5Gbased IoT with simultaneous transfer. IEEE Internet Things J. 6(4), 5971–5980 (2019)
B. Shim, B. Song, Multiuser detection via compressive sensing. IEEE Commun. Lett. 16, 9725–974 (2012)
C. Bockelmann, H.F. Schepker, A. Dekorsy, Compressive sensing based multiuser detection for machinetomachine communication. Eur. Trans. Telecommun. 24, 1–12 (2013)
F. Monsees, M. Woltering, C. Bockelmann, A. Dekorsy, Compressive sensing multiuser detection for multicarrier systems in sporadic machine type communications. IEEE Vehicular Technology Conference (VTC), pp. 15, (2015)
H. Yin, J. Li, Y. Chai, S.X. Yang, A survey on distributed compressed sensing: theory and applications. Front. Comput. Sci. 8, 893–904 (2014)
T. Wimalajeewa, P. K. Varshney, Robust detection of random events with spatially correlated data in wireless sensor networks via distributed compressive sensing. IEEE International Workshop on Computational Advances in MultiSensor Adaptive Processing (CAMSAP), (2017)
J.A. Tropp, A.C. Gilbert, Signal recovery from random measurements via orthogonal matching pursuit. IEEE Trans. Inf. Theory 53, 4655–4666 (2007)
S. Wu, H. Guo, J. Xu, S. Zhu, H. Wang, Inband full duplex wireless communications and networking for IoT devices: progress, challenges and opportunities (Elsevier, Amsterdam, 2017). https://doi.org/10.1016/j.future.2017.10.018
M. Charikar, K. Chen, M. FarachColton, Finding frequent items in data streams. in Proceedings of the 29th International Colloquium on Automata, Languages and Programming, (2002)
J. Haupt, R. Baraniuk, Robust support recovery using sparse compressive sensing matrices. in Proceedings of the 45th Annual Conference on Information Sciences and Systems, (2011)
M. Goldenbaum, S. Stanczak, Robust analog function computation via wireless multipleaccess channels. IEEE Trans. Commun. 61(9), 3863–3877 (2013)
Z. Kostić, I. Marić, X. Wang, Fundamentals of dynamic frequency hopping in cellular systems. IEEE J. Sel. Areas Commun. 19(11), 2254–2266 (2001)
Z. Zheng, C. Zhu, B. Jiang, W. Zhong, X. Gao, Statistical channel state information acquisition for massive MIMO communications, in2015 Conference on Wireless Communications and Signal Processing (WCSP), (2015)
Z. Wang, C. Qian, L. Dai, J. Chen, C. Sun, S. Chen, Locationbased channel estimation and pilot assignment for massive MIMO systems. IEEE International Conference on Communication Workshop (ICCW), (2015)
F. Kaltenberger, H. Jiang, M. Guillaud, R. Knopp, Reletive channel reciprocity calibration in MIMO/TDD systems. 2010 Future Network & Mobile Summit, pp. 110, (2010)
M. Stege, T. Ruprich, M. Bronzel, G. Fettweis, Channel estimation using longterm spatial channel characteristics, in International Symposium on Wireless Personal Multimedia Communications (WPMC), (2001)
L. Liu, W. Yu, Massive connectivity with massive MIMO–part I: device activity detection and channel estimation. IEEE Trans. Signal Process. 66(11), 2933–2946 (2018)
O. Knill, Probability Theory and Stochastic Processes with Applications, 2nd edn. (Overseas Press, New Delhi, 2009)
A.E. Taylor, L’Hospital’s rule. Am. Math. Mon. 59, 20–24 (1952)
H. Chernoff, A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations. Ann. Math. Stat. 23, 493–507 (1952)
C.E. Leiserson, T.H. Cormen, C. Stein, R. Rivest, Introduction to Algorithms, 3rd edn. (MIT Press, UK, 2009)
R. Fan, Q. Wan, Y. Liu, H. Chen, X. Zhang, Complex orthogonal matching pursuit and its exact recovery conditions. (2012) arXiv:1206.2197 [cs.IT]
R. Vershynin, Introduction to the nonasymptotic analysis of random matrices. Compressed Sensing, Theory and Applications. pp. 210268, Cambridge University Press, (2012)
E. Candes, T. Tao, Decoding by linear programming. IEEE Trans. Inf. Theory 51(12), 4203–4215 (2005)
T. Zhang, Sparse recovery with orthogonal matching pursuit under RIP. IEEE Trans. Inf. Theory 57(9), 6215–6221 (2011)
J. Wen, Z. Zhou, J. Wang, X. Tang, Q. Mo, A sharp condition for exact support recovery of sparse signals with orthogonal matching pursuit. 2016 IEEE International Symposium on Information Theory, (2016)
J. C. Ikuno, S. Pendl, M. Simko, M. Rupp, Accurate SINR estimation model for system level simulation of LTE networks. 2012 IEEE International Conference on Communications (ICC2012), (2012)
K. R. Jung, A. Park, S. Lee, Machinetypecommunication (MTC) device grouping algorithm for congestion avoidance of MTC oriented LTE network. Communications in Computer and Information Science, (2010)
Funding
This work was partially supported by the DFG in the context of grants JU 2795/2 &3 and STA 864/81.
Author information
Authors and Affiliations
Contributions
YC contributed to the development of ideas, conducted both theoretical and numerical analysis, and was a major contributor in writing the manuscript. PJ performed the design of the study and provided solid support in the theoretical analysis as well as simulation modeling. CZ participated in the concept design. SS helped draft the manuscript and was responsible for proofreading this work. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare that they have no competing interests.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Chang, Y., Jung, P., Zhou, C. et al. Distributed rankingbased resource allocation for sporadic M2M communication. J Wireless Com Network 2022, 83 (2022). https://doi.org/10.1186/s13638022021440
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s13638022021440