Mohamed Marey1, Hala Mostafa2. 1. Smart Systems Engineering Laboratory, College of Engineering, Prince Sultan University, Riyadh 11586, Saudi Arabia. 2. Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia.
Abstract
Modulation awareness and cooperative transmissions have individually received a significant amount of research in the scholarly literature. However, a limited number of works are principally concerned with the combination of the two topics, and they are restricted to frequency-flat wireless channels. In this study, we propose a new modulation awareness method applicable to dual-hop amplify-and-forward cooperative broadcasts. The suggested method is built on the creation of theoretical representations of cross-correlation functions of the received signals. We conceptually prove that a family of modulation types generates spikes for certain cross-correlation functions, while others do not. We create a numerous layer hypothesis evaluation for the purpose of making judgments centered on this attribute. The suggested method has a number of benefits, such as the ability to operate on both frequency-flat and frequency-selective channels, as well as the absence of the necessity of channel awareness or noise power. Computer simulations analyze the performance of the proposed method, which delivers adequate awareness performance in a variety of operational scenarios.
Modulation awareness and cooperative transmissions have individually received a significant amount of research in the scholarly literature. However, a limited number of works are principally concerned with the combination of the two topics, and they are restricted to frequency-flat wireless channels. In this study, we propose a new modulation awareness method applicable to dual-hop amplify-and-forward cooperative broadcasts. The suggested method is built on the creation of theoretical representations of cross-correlation functions of the received signals. We conceptually prove that a family of modulation types generates spikes for certain cross-correlation functions, while others do not. We create a numerous layer hypothesis evaluation for the purpose of making judgments centered on this attribute. The suggested method has a number of benefits, such as the ability to operate on both frequency-flat and frequency-selective channels, as well as the absence of the necessity of channel awareness or noise power. Computer simulations analyze the performance of the proposed method, which delivers adequate awareness performance in a variety of operational scenarios.
Automatic modulation awareness (AMA) was initially inspired by its implementation in military scenarios [1,2,3]. Electronic warfare and threat analysis are two examples of military uses that require the recognition of signal modulations in order to identify adversary transmitting units, to prepare jamming signals and to recover the intercepted signal. In addition, the adoption of modulation as an additional layer of protection makes it impossible for receivers to decipher a message unless they are aware of the specific modulation being used. The word “automatic” is employed in contrast to the first deployment of modulation classification, when signals were manually handled by skilled engineers using signal monitoring and processing instruments.The majority of modulation classifiers developed over the previous three decades have been developed with the use of automated devices. This task has been given numerous terminologies in the literature, including automatic modulation classification, recognition, identification and awareness, all of which pertain to the same goal of knowing the modulation type at the receiver. It will be referred to as AMA throughout this work. Adaptive modulation is a method used by existing smart transceivers to improve the spectral efficiency and reliability by changing the modulation size while maintaining the same symbol rate (e.g., [4,5,6]). The basic principle is that the transmitter chooses, from a pool of possible modulations, the one that best accomplishes the required quality of service given the observed signal-to-noise ratio (SNR).Herein lies the significance of AMA algorithms at receivers, since they have to know the kind of modulations used in order to decode the supplied data. Adaptive modulation is adopted in a number of current wireless technologies, such as cellular systems, microwave transmissions, satellites and wireless local area networks [7,8]. The likelihood-based (LB) and feature-based (FB) approaches are the most often used in the field of AMA [9,10]. In general, LB techniques tackle AMA issues using probability theories and hypothesis models. Even though LB AMA techniques reach the highest level of precision, they are computationally intensive and may be prohibitively costly in reality. To compensate for this limitation, FB AMA techniques exploit signal characteristics, such as higher order statistics and cyclostationarity to discriminate between modulation types [11,12,13,14].Similarly, cooperative communications have sparked substantial attention in research and industry because of their superior performance characteristics such as system capacity and transmission range, including the simplicity with which they may be implemented [15,16,17,18]. The fundamental notion is driven by the fact that, in a wireless context, the signal sent by a source to a destination is also heard by other endpoints, which are frequently known as relays. The signals captured by the relays are recycled and sent to their destination. The destination subsequently integrates the messages from the source and the relays, resulting in spatial variety by leveraging numerous reception of the same data at different stations and transmission channels.Extensive work has been made in information theoretic analysis of various cooperative systems to estimate feasible rates, capacity limitations and the diversity-multiplexing trade-off as well as data detection and channel estimation (e.g., [19,20,21,22,23,24]). Despite the importance of these findings, more work must be done before they can be put into practice. One of the primary concerns with cooperative systems is determining how to perform AMA in the context of multiple transmissions of the source and relays. Only two studies, to the best of our knowledge, have tackled the AMA issue for cooperative systems [10,25]. Nevertheless, they are restricted to frequency-flat fading channels and the decode-and-forward (DF) approach in their communication protocols.The most important contributions and discoveries made by this research are described in the following aspects.We develop a new AMA method for amplify-and-forward (AF) dual-hop cooperative systems over frequency-selective fading channels. Although adaptive modulation has been widely investigated in the literature (e.g., [26,27,28,29]), no work has been dedicated to performing modulation awareness for these systems over wireless selective channels. This confirms the novelty of this work. It is important to highlight the fact that AF cooperative systems are superior to DF cooperative systems in terms of capacity and processing.This study makes use of the temporal redundancy present in the structure of received signals to create correlation functions that include spikes for one set of modulations but not for others.With the assistance of this attribute, a multiple-layer AMA technique is constructed on the notion of false-alarms.The proposed algorithm has the following advantages.The suggested method does not require any information about the channel coefficients or the strength of the noise.The suggested method runs over any kind of wireless channels including frequency-flat and frequency-selective channels.The suggested method provides a simplified processing requirement.The suggested method does not required any pilot symbols to start the awareness process. This makes it appropriate for use in both military and civilian contexts.The rest of this work is as follows. Section 2 describes the system model. Section 3 and Section 4 cover the cross-correlation functions for different modulation types as well as the method under consideration. Section 5 presents the results of the simulations. Section 6 contains the final conclusions.
2. System Model
We consider a three-terminal cooperative system as shown in Figure 1, where the source S has data for the delivery to the destination D with the aid of the relay R. To simplify the mathematical notations and analytical expressions, we assume that all nodes have a single antenna element. We leave the implementation of multiple antennas at each node to future development. The relay implements an AF protocol and runs in a half-duplex configuration that it transmits and receives at two distinct times [24].
Figure 1
The three-terminal cooperative system under consideration.
At both the relay and the destination, we expect the additive white Gaussian noise (AWGN) variance to be . We denote as a frame of transmission comprising K data symbols. Here, each data symbol is picked at random from a specific signal constellation . The source selects from a pool of candidates for each transmission frame to match the quality of service and capacity demands. A frame transmission will normally take place over two distinct stages.During the first phase of the process, the frame is sent via two distinct connections in order to reach both the relay and the final destination. We call and the channel impulse responses between S and R and between R and D, respectively. Here, L is the number of channel taps. We express the kth received samples at the relay, , and the destination, , analytically as
and
where and are the noise samples at the relay and destination, respectively. Here, we underline that both situations of direct connection presence and absence are extensively discussed in the literature (e.g., [19,20,21,22,23,24,25] and references therein). We focus on the existence of direct link in this investigation.Phase two of transmission entails re-sending the processed the signal that was received by the AF relay. Accordingly, the input signal at the node D is written as
where C is the scaling factor, and it is provided in the following formWe set C to ensure that the output power of the AF relay and the source are identical. Plugging (1) into (3), we obtain
where is the kth noise sample and it incorporates both and contributions asThe objective of this research is to devise a method for determining the allotted modulation type by utilizing the features extracted from the signals and , .
3. Cross-Correlation Functions for Different Modulation Schemes
In this part, the cross-correlation functions for several modulation schemes are analyzed in an effort to pinpoint distinctive traits that may be utilized to identify these schemes. Across the whole of the exploration, we are going to operate on the following presumptions.We employ the widely held premise in the literature that data symbols are unrelated to each other [30,31]. We write
where is a random variable’s statistical expectation, is the function of Kronecker delta, and BPSK refers to a binary phase shift keying modulation. Furthermore, we compose
for all potential values of pertain to the configuration choices of PSK and QAM. Here, M is the modulation order, and * denotes the complex conjugate operator. We suppose that the transmit power is one without sacrificing generality.The information symbols have no relationship with the noise values:The noise values are unrelated to one another:The parameters of the channel are initialized at random, and they remain constant throughout the frame.We describe the following correlation functions:
andWe develop the following expressions with the assistance of Table 1 and the aformentioned assumptions.
and
Table 1
Higher order expectations for different modulation schemes with unit power.
BPSK
QPSK
8-PSK
16-PSK
16-QAM
64 − QAM
Eu2(k)
1
0
0
0
0
0
Eu4(k)
1
1
0
0
−0.68
−0.619
Eu8(k)
1
1
1
0
2.2
1.91
Eu6(k)u*2(k)
1
1
0
0
0
0
Figure 2, Figure 3, Figure 4 and Figure 5 illustrate snapshots of the magnitudes of the previous functions for different modulation schemes at SNR = 15 dB. We observed that each correlation function displays spikes for one modulation scheme but no spikes for the other modulation scheme. The spikes are placed around the diagonal, , and their amplitudes are controlled by the channel coefficients. This is consistent with the mathematical findings presented in the prior discussions. For the sake of presentation, we selected a multipath channel with five taps.
Figure 2
for BPSK and QPSK modulations.
Figure 3
for 16 − QAM and 16 − PSK modulations.
Figure 4
for 8 − PSK and 16 − PSK modulations.
Figure 5
for QPSK and 64 − QAM modulations.
However, the mathematical developments revealed that the suggested method is generic in the sense that it is applicable to any wireless channel that is of any length. In addition, the proposed method does not require any prior knowledge of the channel’s length or statistics as explained in the following section. The remaining simulation settings are stated in Section 5. Figure 6 provides a high-level overview of the structure of a cross-correlation function when spikes are present. In reality, the restricted monitoring interval allows nonzero spikes to appear where there should be zeros. However, after a lengthy time of observation, they are statistically insignificant.
Figure 6
The architecture of a cross-correlation function when there are spikes.
4. Proposed Method
The suggested method takes use of the existence of spikes in the previously described cross-correlation functions for modulation awareness. For the sake of demonstration, we take a look at the set of modulation schemes {QPSK, 16 − PSK, 64 − QAM}. When has spiked, the set of {QPSK, 64 − QAM} is said to possess; otherwise, the 16 − PSK modulation scheme is selected. Finally, we examine the spikes of to distinguish between 64 − QAM and QPSK; if they exist, QPSK is reported present; otherwise, 64 − QAM is accepted.For spike detection, the accompanying fundamental considerations must be addressed.In reality, the observation duration is constrained, which prompts the question of how to calculate the cross-correction functions.Given the preceding fact, an estimating error of , , outcomes a non-zero level when should remain zero. This has a negative impact on the conclusion of whether or not statistical peaks of exist. Due to this, judgment criteria have to be established in situations where a non-ideal predictor is present, even if previous information of the estimate error statistics is not available.It is also assumed that channel information and noise power are unknown. This assumption constitutes an extra obstacle in the way of successfully completing the spike detection task.To determine the most probable assigned modulation scheme, we offer a spike-detection method bound by the chance of false alarm while dealing with the aforementioned constraints. The fundamental concept is to calculate a test statistic and establish a barrier. If the test statistic exceeds the barrier, the method asserts that spikes exist; otherwise, no spikes are discovered. The explanation that follows gives a more explicit mathematical analysis of the suggested method.Let us examine a number of successive samples, K, from each of the two vectors and , . When spikes appear in a correlation function, they tend to cluster around the diagonal, as demonstrated in Figure 2, Figure 3, Figure 4, Figure 5 and Figure 6. The test statistic is defined as
whereThere are two hypotheses to investigate in the spike detection challenge:
where and are the hypotheses related to whether or not a spike exists. Here, S represents the spike’s amplitude and e denotes the impact of the AWGN and estimate error due to the usage of a restricted number of samples.Using hypothesis and the assumption that e is a Rayleigh random variable, with mean and cumulative distribution function (CDF) supplied byThe method’s primary idea is to create a barrier , and the spike is stated to appear if ; alternatively, there would be no spike. Our aim is to achieve a given level of false alarm probability , which is described as the possibility of incorrectly reporting the presence of a spike. As a consequence, one may writeBy using (16) into (17), we obtainIt is transparent from (18) that, in order to obtain , the amount of must be known. We compute by calculating observations of and as
where is defined in (14). Considering that B is a Rayleigh random variable with a mean of , the computed level can beThe computational complexity of the suggested AMA method is analysed by counting the number of necessary floating point operations (fops) [32,33]. The multiplication of two complex numbers takes six fops, while their addition only requires two fops. A complex number’s modulus involves three fops. Based on the proceeding analysis, the number of fops required at each node is approximately expressed as . Available technology appears to be sufficient for the algorithm’s practical execution. For a numerical example, we assume that K = 1000 with a processor of 10 Terafops per second, the processing time is 18 microsecond, which is feasible for real-world applications.
5. Simulation Results
Computer simulations have been conducted in order to evaluate how well the proposed method works. The settings of the system are as follows, unless otherwise specified: the number of symbols that are transmitted in each frame is equal to K = 10,000, and the likelihood of a false alert is set at . In each of the wireless links, the discrete time channel impulse response was constructed using channel coefficients. The channel impulse responses have power delay profiles with exponential decay as [30,34]
where , , . is computed in order to account for the effect of path-loss on the awareness performance as
where refers to the path-loss exponent, is the distance between terminals h and j, and nodes S and D are separated by a distance denoted by . For the purposes of the simulations, we set , , and . It is critical to remember that all distances have been calibrated to . The probability of proper awareness, , is employed as a quality criterion for the proposed method, where is one of modulation options.There are four different sets of modulation forms that are looked at as follows. , , , and . It is important to note that the proposed method is general in the sense that it can be applied to any number of modulation schemes as long as there are correlation functions that show spikes for some modulation schemes but not for others. There are a total of one thousand Monte Carlo attempts. It is worth noting that we only use the cross-correlation functions that are needed for the modulation of interest.The function is employed for the set ; the functions and are used for the set ; the functions and are used for the set ; and the functions , and are utilized for the set . For example, the AMA for was performed in the following manner. The proposed statistical test on the function distinguishes BPSK modulation from other modulation techniques. The presence of BPSK is marked by the appearance of spikes, while the lack of spikes indicates the presence of other modulation schemes.Then, using the proposed statistical test on the function , we distinguish the 8 − PSK modulation scheme from the QPSK and 64 − QAM schemes. The absence of spikes indicates 8 − PSK modulation systems, but the presence of spikes indicates QPSK or 64 − QAM modulation schemes. Finally, we apply the proposed statistical test on the function to classify between the QPSK and 64 − QAM modulation schemes. In this case, the loss of spikes implies the 64 − QAM modulation scheme, but the presence of spikes shows the QPSK modulation scheme.Figure 7, Figure 8, Figure 9 and Figure 10 depict the awareness performance for the modulation groups , , and , respectively, as a function of SNR. The results indicate that the awareness performance of QPSK, 8 − PSK, 16 − PSK and 8 − PSK shown in Figure 7, Figure 8, Figure 9 and Figure 10, respectively, are not impacted in any way by the SNR values. This is as a result of the fact that their performance is determined by the probability of a false alarm, which was planned to be 0.01. On the other hand, the other modulation choices exhibit significant improvements in performance as the SNR value rises. This is due to the fact that as the SNR levels are increased, the spike detection performance is strengthened.
Figure 7
for the modulation group of .
Figure 8
for the modulation group of .
Figure 9
for the modulation group of .
Figure 10
for the modulation group of .
Figure 11 and Figure 12 show the impact of on the awareness performance for the modulation set . As SNR improves, the findings show that the awareness performance dependency on correctly detecting the BPSK modulation scheme on diminishes. The justification for this is that, when SNR is larger, the influence of the noise contribution becomes less noticeable, and the performance is determined mostly by the estimate error that arises from using a limited observation time. As the observation time approaches infinity, this error disappears. In principle, reducing leads to a decrease in the barrier value, which increases the BPSK modulation scheme’s efficiency as indicated in Figure 13. The distinction of the QPSK modulation scheme, on the other hand, is the inverse. As a result, is intended to accomplish a performance compromise for BPSK and QPSK awareness.
Figure 11
for the modulation group of .
Figure 12
for the modulation group of .
Figure 13
PDF of the Rayleigh RV, e.
Table 2 illustrates the confusion matrices for the modulation set at different values of the number of symbols that are transmitted in a frame, N. When N is increased from 2000 to 10,000, there is a discernible rise in the level of performance associated with awareness. On the other hand, there is no significant improvement in performance beyond N = 10,000. This represents the fact that the impact of the estimating error becomes less significant as the number of observations increases.
Table 2
Confusion matrices at different number of received symbols, K, at SNR = 15 dB.
K = 2000
K = 6000
BPSK
QPSK
8-PSK
64 − QAM
BPSK
QPSK
8-PSK
64 − QAM
BPSK
0.652
0.213
0.056
0.079
BPSK
0.852
0.113
0.026
0.079
QPSK
0.21
0.585
0.156
0.049
QPSK
0.184
0.721
0.056
0.039
8-PSK
0.058
0.28
0.551
0.111
8-PSK
0.038
0.225
0.721
0.016
64 − QAM
0.017
0.013
0.04
0.93
64 − QAM
0.01
0.01
0.02
0.96
K = 10,000
K = 12,000
BPSK
QPSK
8-PSK
64 − QAM
BPSK
QPSK
8-PSK
64 − QAM
BPSK
0.99
0.007
0.002
0.001
BPSK
1
0
0
0
QPSK
0.009
0.980
0.003
0.008
QPSK
0.001
0.999
0
0
8-PSK
0.007
0.002
0.983
0.008
8-PSK
0
0.002
0.996
0.002
64 − QAM
0.009
0.002
0.002
0.987
64 − QAM
0.002
0.003
0.004
0.991
For comparative purposes, Figure 14 depicts the awareness performance obtained by the proposed method in addition to that obtained by the technique described in [10,25] for the modulation set . The findings reveal that the proposed method significantly outperforms the methods described in [10,25], which are unable to deliver a suitable awareness performance even at high SNR levels. This is because the approaches described in [10,25] are based on a DF relaying scheme in which the relay re-transmits the received frame if it is correctly decoded. Here, we recall that the DF relaying system may fail to decode the received frame at the relay due to channel circumstances, which has a detrimental impact on modulation awareness performance. Furthermore, the method presented in [25] demonstrates a performance with poor awareness due to the absence of a training preamble.
Figure 14
Awareness performance comparison with the modulation set . Dashed lines represent the proposed method, sold lines are used for the method of [10], and dot-dashed are used for the method of [25]. Star, square, hexagram, and circle markers refer to 8-PSK, BPSK, 64 − QAM, and QPSK modulations, respectively.
6. Conclusions
The topic of modulation awareness for amplify-and-forward dual-hop cooperative systems over frequency-selective channels was explored in this work. A variety of cross-correlation functions between the received signals were given to create the groundwork for the suggested method. Mathematical proofs and simulation results for specific modulations revealed fixed location spikes in a number of cross-correlation functions; however, no such spikes were detected for the other kinds of modulation. This discovery was used to guide the awareness process through a tree-based method utilizing the false-alarm criterion for spike detection. The outcomes showed that good awareness performance was revealed in a range of functional circumstances. These fantastic results were produced with no prior knowledge of the channel status information or noise power.