Muppirisetty, L. Srikar; Charalambous, Themistoklis ... · L. Srikar Muppirisetty and Henk...

14
This is an electronic reprint of the original article. This reprint may differ from the original in pagination and typographic detail. Powered by TCPDF (www.tcpdf.org) This material is protected by copyright and other intellectual property rights, and duplication or sale of all or part of any of the repository collections is not permitted, except that material may be duplicated by you for your research use or educational purposes in electronic or print form. You must obtain permission for any other use. Electronic or print copies may not be offered, whether for sale or otherwise to anyone who is not an authorised user. Muppirisetty, L. Srikar; Charalambous, Themistoklis; Karout, Johnny; Fodor, Gabor; Wymeersch, Henk Location-Aided Pilot Contamination Avoidance for Massive MIMO Systems Published in: IEEE Transactions on Wireless Communications DOI: 10.1109/TWC.2018.2800038 Published: 01/04/2018 Document Version Peer reviewed version Please cite the original version: Muppirisetty, L. S., Charalambous, T., Karout, J., Fodor, G., & Wymeersch, H. (2018). Location-Aided Pilot Contamination Avoidance for Massive MIMO Systems. IEEE Transactions on Wireless Communications, 17(4), 2662-2674. https://doi.org/10.1109/TWC.2018.2800038

Transcript of Muppirisetty, L. Srikar; Charalambous, Themistoklis ... · L. Srikar Muppirisetty and Henk...

Page 1: Muppirisetty, L. Srikar; Charalambous, Themistoklis ... · L. Srikar Muppirisetty and Henk Wymeersch are with the Department of Signals and Systems, Chalmers University of Technology,

This is an electronic reprint of the original article.This reprint may differ from the original in pagination and typographic detail.

Powered by TCPDF (www.tcpdf.org)

This material is protected by copyright and other intellectual property rights, and duplication or sale of all or part of any of the repository collections is not permitted, except that material may be duplicated by you for your research use or educational purposes in electronic or print form. You must obtain permission for any other use. Electronic or print copies may not be offered, whether for sale or otherwise to anyone who is not an authorised user.

Muppirisetty, L. Srikar; Charalambous, Themistoklis; Karout, Johnny; Fodor, Gabor;Wymeersch, HenkLocation-Aided Pilot Contamination Avoidance for Massive MIMO Systems

Published in:IEEE Transactions on Wireless Communications

DOI:10.1109/TWC.2018.2800038

Published: 01/04/2018

Document VersionPeer reviewed version

Please cite the original version:Muppirisetty, L. S., Charalambous, T., Karout, J., Fodor, G., & Wymeersch, H. (2018). Location-Aided PilotContamination Avoidance for Massive MIMO Systems. IEEE Transactions on Wireless Communications, 17(4),2662-2674. https://doi.org/10.1109/TWC.2018.2800038

Page 2: Muppirisetty, L. Srikar; Charalambous, Themistoklis ... · L. Srikar Muppirisetty and Henk Wymeersch are with the Department of Signals and Systems, Chalmers University of Technology,

1

Location-Aided Pilot Contamination Avoidance forMassive MIMO Systems

L. Srikar Muppirisetty, Themistoklis Charalambous, Member, IEEE, Johnny Karout, Senior Member, IEEE,Gábor Fodor, Senior Member, IEEE, and Henk Wymeersch, Member, IEEE

Abstract—ilot contamination, defined as the interference dur-ing the channel estimation process due to reusing the same pilotsequences in neighboring cells, can severely degrade the per-formance of massive multiple-input multiple-output systems.ilotcontamination, defined as the interference during the channelestimation process due to reusing the same pilot sequencesin neighboring cells, can severely degrade the performance ofmassive multiple-input multiple-output systems.P In this paper,we propose a location-based approach to mitigating the pilotcontamination problem for uplink multiple-input multiple-outputsystems. Our approach makes use of the approximate locations ofmobile devices to provide good estimates of the channel statisticsbetween the mobile devices and their corresponding base stations.Specifically, we aim at avoiding pilot contamination even whenthe number of base station antennas is not very large, and whenmultiple users from different cells, or even in the same cell,are assigned the same pilot sequence. First, we characterize adesired angular region of the target user at the serving basestation based on the number of base station antennas and thelocation of the target user, and make the observation that inthis region the interference is close to zero due to the spatialseparability. Second, based on this observation, we propose pilotcoordination methods for multi-user multi-cell scenarios to avoidpilot contamination. The numerical results indicate that theproposed pilot contamination avoidance schemes enhance thequality of the channel estimation and thereby improve the per-cell sum rate offered by target base stations.

Index Terms—Interference alignment, MIMO systems, pilotcontamination, location-aware communication.

I. INTRODUCTION

The use of very large antenna arrays at the base station(BS) is considered as a promising technology for 5G com-munications in order to cope with the increasing demand ofwireless services [2]. Such massive multiple-input multiple-output (MIMO) systems provide numerous advantages [3]–[8]: including (i) increasing the spectral efficiency by sup-porting a higher number of users per cell, (ii) improvingenergy efficiency by radiating focused beams towards users,and (iii) averaging out small scale fading resulting in thechannel hardening effect. Furthermore, under the assumption

L. Srikar Muppirisetty and Henk Wymeersch are with the Department ofSignals and Systems, Chalmers University of Technology, 41296 Gothenburg,Sweden, e-mail: srikar.muppirisetty, [email protected].

Themistoklis Charalambous is with the Department of Electrical Engi-neering and Automation, School of Electrical Engineering, Aalto University,Espoo, Finland email: [email protected].

Johnny Karout and Gábor Fodor are with Ericsson Research, Kista, 16480Stockholm, Sweden, email:johnny.karout, [email protected].

This research was supported, in part, by the European Research Council,under Grant No. 258418 (COOPNET). Part of this work was presented in [1].

of perfect channel estimation, massive MIMO provides asymp-totic orthogonality between vector channels of the target andinterfering users. However, performance of these systems isdegraded by the pilot contamination effect, i.e., interferenceduring uplink channel estimation due to reusing of the samepilot sequences.

Pilot sequences are a scarce resource due to the fact that thelength of pilot sequences (the number of symbols) is limited bythe coherence time and bandwidth of the wireless channel. Asa result, the number of separable users is limited by the numberof the available orthogonal pilot sequences [5], [6]. Therefore,in multi-cell massive MIMO systems, the pilot sequences mustbe reused, which leads to interference between identical pilotsequences from users in either neighboring cells or even thesame cell; this effect is known as pilot contamination [9]. Pilotcontamination is known to degrade the quality of channel stateinformation at the BS, which in turn degrades the performancein terms of the achieved spectral efficiency, beamforminggains, and cell-edge user throughput. Since pilot contaminationis an important phenomenon that degrades the performance ofmassive MIMO systems, we provide a detailed overview ofexisting works on this topic in the following subsection.

A. Related Works

Mitigation strategies for pilot contamination have been wellstudied in the literature. A comprehensive survey on pilotcontamination in massive MIMO systems is provided in [10].The existing pilot decontamination methods for time divisionduplex (TDD) MIMO systems are broadly grouped in to twocategories: pilot-based and subspace-based approaches.

In pilot-based approaches, each BS takes turns in sendingpilots in a non-overlapping fashion [11]–[15]. In these works,the frame structure is modified such that the pilots are trans-mitted in each cell in non-overlapping time slots [12], [13], orpilots are transmitted in consecutive phases in which each BSkeeps silent in one phase and repeatedly transmits in otherphases [14]. Alternatively, a combination of downlink anduplink scheduled training can be used [15].

Subspace-based approaches exploit second-order statisticsand utilize covariance-aided channel estimation [7], [16]–[25]. Second-order statistics of desired and interfering userchannels are exploited in [7], [16]–[18]. The works in [9],[16]–[18], [26] considered spatial correlated fading, whileearlier works assumed uncorrelated fading. The use of non-diagonal covariance matrices enables the identification ofspatially compatible users based on the spatial correlation

Page 3: Muppirisetty, L. Srikar; Charalambous, Themistoklis ... · L. Srikar Muppirisetty and Henk Wymeersch are with the Department of Signals and Systems, Chalmers University of Technology,

2

of the covariance matrices. A closed-form expression of thenon-asymptotic downlink rate exploiting the statistical secondorder channel covariance matrices information is provided in[24]. In [19], [20], [22], blind channel estimation with powerand power-controlled hand-off is studied with singular valuedecomposition of the received signal matrix. The assumptionthat coherence time is larger than the number of BS antennasis used in [19], [20], [22] and relaxed in [21]. Blind channelestimation using eigenvalue-decomposition is described in[23].

A game-theoretic approach to tackle pilot contaminationis studied in [27]. An iterative way of assigning users topilots is proposed such that in each iteration the minimumsignal-to-interference ratio is improved [28]. In [29], usersin each cell are grouped based on severity of pilot con-tamination and a fractional pilot reuse scheme is employed.Other approaches include, among others, greater-than-one pilotreuse schemes [7], [25], [29]–[34], and location-aided pilotallocation schemes [35]–[37]. In [35], a location-aided channelestimation method is described, wherein to mitigate the inter-cell interference where an FFT-based post-processing approachis employed after pilot-aided channel estimation. In [36], alocation-aware novel pilot assignment algorithm is proposedfor heterogeneous networks.The method ensures that users thatare assigned to the same pilot sequence have distinguishableangle-of-arrivals (AoAs) at the macro BSs, while maintaininga large distances for the interfering users to the correspondingsmall BSs. The work reported in [37] proposed a location-aware pilot assignment scheme for Rician channel models andexploited the location-dependent line-of-sight (LOS) channelcomponent during the pilot assignment procedure.

Recent insights about the impact of pilot contaminationsuggest that the capacity of massive MIMO systems increaseswithout bound as the number of antennas tend to infinity,even in the presence of pilot contamination, if proper pre-coding/combining are employed [38]. As it is pointed out inthat paper, this result does not imply that the negative effectsof pilot contamination disappear, since the resulting estimationerrors still degrade the performance. As our numerical resultsindeed show, the proposed pilot contamination avoidancescheme increases the sum rate of multicell systems.

B. Contributions

In this work, we build on [18], which focused on a greedypilot allocation for the asymptotic regime of infinite antennasat the BS, where pilot contamination is fully eliminated.Greedy approaches lead to performance degradation, as re-ported in [32], while pilot contamination does not vanish forthe practical finite antenna regime. Here, we address bothaspects and design explicitly for the finite-antenna regime,while targeting overall system performance by considering ajoint design across multiple cells for all users in the system.More specifically, the contributions of our paper are as follows:• Similar to our previous work [1], a location-aided ap-

proach is taken for pilot decontamination and we relatemean and the standard deviation of the AoA to a userlocation, rather than to a user’s channel.

• We then propose an approach with which, in the presenceof location information of the users, we can quantifythe effect of pilot contamination for BSs with a finitenumber of antennas. This result helps us predict how eachuser interferes with the rest of the users having identicalpilot sequences when BSs are equipped with MIMOantennas, and the number of antennas is not necessarilyapproaching infinity. This quantification reveals that fora considerable number of antennas, there is a range ofangles for which the pilot contamination is very small.

• Based on the above observation, we formulate pilotdecontamination as an integer quadratic programmingproblem that we are able to solve for all the BSs as a jointoptimization problem. In particular, we propose multi-cellmulti-user joint optimization problems such that it takesinto consideration during the pilot assignment the mutualinterference seen by the target users at their respectiveBSs.

• We propose a heuristic approach for assigning users toBSs to decrease the computational complexity of the pro-posed joint optimization schemes. The proposed heuristicalgorithm exploits both distance and AoA information ofthe users.

C. Outline

The rest of the paper is structured as follows. In SectionII, we introduce the system model comprising the networkmodel, the channel model, the received pilot signal and MMSEestimator. Section III addresses the problem of pilot decon-tamination for BSs with (not necessarily massive) MIMOantennas. In Section IV, we present optimal user assignmentand heuristic strategies for pilot contamination avoidanceunder various configurations, building on the theory developedin Section III. Section V demonstrates the performance ofthe proposed methods and we compare them with other userselection methods proposed in the literature. Finally, SectionVI draws conclusions and discusses possible future directions.

Notation

Throughout the paper, vectors are written in bold lowercase letters and matrices in bold upper case letters. Formatrix X, matrices XT and XH denote its transpose andhermitian, respectively. The i-th entry of vector x is denotedas [x]i. vec[X] denotes stacking all the elements of X in avector. U [S] denotes a uniform distribution over the intervalsdefined by the set S. A sequence of elements a1, a2, . . . iswritten in short as ajj . The positive operator is denoted as(x)+ = max(0, x). The Kronecker product of two matricesX1 and X2 is denoted as X1 ⊗X2. IM denotes the identitymatrix of size M ×M and ‖ · ‖2 denotes the Euclidean norm.The cardinality of a set A is denoted by |A|. The sets of realand complex numbers are denoted by R and C, respectively;the n-dimensional Euclidean and complex spaces are denotedby Rn and Cn, respectively.

Important angle symbols used in the paper are: [θmini , θmax

i ]represents the AoA support of user i, where θmin

i denotes theminimum AoA support angle and θmax

i denotes the maximum

Page 4: Muppirisetty, L. Srikar; Charalambous, Themistoklis ... · L. Srikar Muppirisetty and Henk Wymeersch are with the Department of Signals and Systems, Chalmers University of Technology,

3

AoA support angle. The mean AoA of user i is denoted byθµi . The AoA supports of the desired and interfering user afteraxis transformation are denoted by I(i)

i and I(i)j respectively.

The desired angular region of user i is given by [ψmini , ψmax

i ].

II. SYSTEM MODEL

A. Network model

We consider a two-dimensional scenario with cells, and eachcell is served by one BS equipped with M antennas. We denoteC as the set of all cells and where Kj the set of users in thej-th cell, j ∈ C. The set of neighboring cells to the j-th cellis denoted by Csur

j . Users, equipped with a single antenna, arelocated uniformly within the cells. The location of user i ∈ Kjis denoted by xij ∈ R2, while the location of the BS in thek-th cell is written as xk ∈ R2. We define P as the set ofavailable orthogonal pilots for allocation to users.

B. Channel Model

The uplink channel of user i from cell j to BS k is denotedby hijk ∈ CM . We note that the channel depends only on useri and BS k, but the use of the additional index j allows us todistinguish in which cell the users belong to. We consider thechannel as the superposition of a large number of paths [18],[26], [39]:

hijk =

√βijkB

B∑b=1

a(θ(b)ijk)α

(b)ijk, (1)

where βijk = α‖xij − xk‖−η2 , for path-loss exponent ηand a known1 constant α, a(θ

(b)ijk) ∈ CM is the antenna

steering vector corresponding to AoA θ(b)ijk ∈ [0, 2π), b is

the path index, and α(b)ijk is the random phase of the b-

th path. We restrict ourselves to uniform linear arrays with[a(θijk)]m = exp(−j2πmD cos(θijk)/λ), for the antennaspacing D and the signal wavelength λ. Under the assumptionof B → +∞ and i.i.d. AoAs with common probability densityp(θijk), application of the law of large numbers (center limittheorem) gives rise to hijk having a zero-mean Gaussiandistribution with covariance matrix

Rijk = E[hijk

(hijk)H

](2)

= βijk

∫ 2π

0

p(θijk)a(θijk)aH(θijk) dθijk. (3)

We further assume that p(θijk) corresponds to a uniform distri-bution with support [θmin

ijk , θmaxijk ], for some fixed θmin

ijk , θmaxijk ∈

[0, 2π], θminijk < θmax

ijk . Finally, we assume that a map existsin the BS, associating the user’s position to the support of theAoA distribution as well as the average received power (i.e.,βijk in the form of a radio map).Remark 1. In some scenarios, especially when the BS iselevated and seldom obstructed, propagation can be dominatedby scatterers in the vicinity of the users, giving rise a limitedAoA spread [26], [40]–[44], as assumed in this work. We note

1The constant α depends on cell-edge signal-to-noise ratio (SNR), asspecified in the numerical results.

that the assumption of a uniform AoA distribution can begenerated with the widely used ring model [18], [26], [39],[45], [46]. Such a ring model will be used for illustration andto exemplify the approach, but is not replied upon in thedevelopment of the method.

C. Received Pilot Signal and MMSE Channel Estimator

The target user i in cell k sends uplink transmission to BSk. Users from different cells have been assigned the same pilotsequence s of length τ . For notational convenience, we willassume that all the users indexed with i are also assigned thesame pilot sequence s. Later, in Section IV, we will presentvarious ways to assign users across cells to a given pilotsequence. The received M × τ pilot signal observed at BSk is written as

Yk = hikk sT +∑j∈C

hijk sT + N, (4)

where N ∈ CM×τ is spatially and temporally additive whiteGaussian noise (AWGN) with element-wise variance σ2 . In(4), hikk is the desired signal channel in the cell k and hijkare the channels of interfering users.

The MMSE estimate of the desired channel hikk by BS kis given by [18, Eq. (18)]

hikk = Rikk

(σ2IM + τ(Rikk +

∑j∈C

Rijk))−1

SHvec[Yk],

(5)where S = s ⊗ IM and Rijk ∈ CM×M is the covariancematrix of hijk.

III. PILOT DECONTAMINATION

In this section, we discuss pilot decontamination methodsunder massive and finite antenna array setting. For legibility,the extra subscripts k are dropped. We consider the scenarioof a given target user, say user i, with channel hi that hasarbitrary AoA distribution, but has a support [θmin

i , θmaxi ].

Our objective is to find an interfering user, say user j, inthe surrounding cells and assign it the same pilot sequenceas user i in such a way as to minimize interference duringchannel estimation for user i. These users have AoAs inthe ranges [θmin

j , θmaxj ]j with respect to (w.r.t.) target BS

for the corresponding channels hjj . It will turn out to beconvenient to make the target BS as origin and mean AoAθµi of user i w.r.t. to BS be the new zero-degree axis. Allother users are transformed according to the new coordinatesystem. In particular, we apply the axis transformation so thatθµi is the new zero-degrees axis. The corresponding modifiedAoA supports of the desired and interfering user after axistransformation are I(i)

i and I(i)j respectively. Furthermore, we

denote θ(i)i ∈ I

(i)i and θ

(i)j ∈ I

(i)j . The subscript denotes the

user index and the superscript indicates with respect to whichuser the axis transformation has been applied.

Page 5: Muppirisetty, L. Srikar; Charalambous, Themistoklis ... · L. Srikar Muppirisetty and Henk Wymeersch are with the Department of Signals and Systems, Chalmers University of Technology,

4

cos(φ)-1 -0.5 0 0.5 1

J(θ

(i)

i,φ)

0

0.5

1

(a)cos(φ)

-1 -0.5 0 0.5 1

J(θ

(i)

i,φ)

0

0.5

1

(b)cos(φ)

-1 -0.5 0 0.5 1

J(θ

(i)

i,φ)

0

0.5

1

(c)cos(φ)

-1 -0.5 0 0.5 1

J(θ

(i)

i,φ)

0

0.5

1

(d)

Fig. 1. The behavior J(θ(i)i φ) with cos(φ), for θ(i)i = 0, βi = 1, and for various antenna array lengths: (a) M = 2, (b) M = 3, (c) M = 4, (d) M = 5.The zeros cos(φ∗r)r are depicted with red asterisks (*).

A. Massive MIMO

Note that with the term “massive MIMO”, we also referto finite-dimensional antenna systems, similarly to most ofthe literature [5], [47], [48]. For a massive antenna arraysetting, it has been shown in [18, Theorem 1] that whenthe intervals I(i)

j j are strictly non-overlapping with I(i)i ,

i.e., I(i)j ∩ I

(i)i = ∅,∀j 6= i, then the channel estimate hi

tends to the interference free channel estimate hno-inti , i.e.,

the channel estimate of the desired channel in the presenceof no interfering pilot signals from other cells, obtainedby setting the interference terms to zero in (5), leading tohno-inti = Ri(σ

2IM + τRi)−1SHy, where y = Shi + vec[N]

is the received τ × 1 pilot signal vector at the BS underno interference from the other cell users. In fact, a sum-rate performance close to that of the interference-free channelestimation scenario is obtained for finite numbers of antennasand users. As the number of antennas goes to infinity, the pilotcontamination is completely eliminated and the channel esti-mate of the target user reaches the interference-free scenario.

B. Finite MIMO

Inspired by the approach in [18], we carry out the analysisthat is applicable for moderate and large number of antennasM . Our objective is to have a cost measure to the channelestimation quality of user i when user j is assigned the samepilot sequence.

1) Condition for limited interference: Let us consider thedesired user AoA after axis transformation is bounded byp(θ

(i)i ). We aim to determine for which AoAs a user j causes

only a small degradation to the channel estimation of useri. In Appendix A, we show the interference from user jwith normalized steering vector a(φ)/

√M is small when

aH(φ)Ria(φ)/M is small. Hence, users with steering vectorsa(φ) for which

a(φ)H

√M

Ria(φ)√M

=1

ME[∣∣∣√βia(φ)Ha(θ

(i)i )∣∣∣2] (6)

=1

M

∫J2(θ

(i)i , φ) p(θ

(i)i ) dθ

(i)i (7)

is small will lead to limited degradation during channelestimation of user i. We have introduced

J(θ(i)i , φ) = (8)√βi

∣∣∣∣∣M∑m=1

exp(2πj(m− 1)D

λ(cos(φ)− cos(θ

(i)i )))

∣∣∣∣∣=

√βi

∣∣∣1−exp

(2πjM D

λ (cos(φ)−cos(θ(i)i ))

)∣∣∣∣∣∣1−exp

(2πjDλ (cos(φ)−cos(θ

(i)i ))

)∣∣∣ , cos(φ) 6= cos(θ(i)i )

√βiM, otherwise.

(9)

Note that when M → ∞ and φ /∈ I(i)i , then

J2(θ(i)i , φ)/M → 0, as shown in [18], so that (7) also

vanishes. In contrast, for finite M , the shape of J2(θ(i)i , φ)/M

must be accounted for. We note that

a(φ)H

√M

Ria(φ)√M

≤ 1

M

∫maxθ

[J2(θ, φ)

]p(θ

(i)i ) dθ

(i)i

=maxθ J

2(θ, φ)

M,

so that users with AoA φ are preferred whenmax

θ(i)iJ2(θ

(i)i , φ) is small, or equivalently, when

maxθ(i)iJ(θ

(i)i , φ), is small. The region of φ for which

JDARi (φ) = max

θ(i)i

J(θ(i)i , φ)

is small is termed the desired angular region (DAR). To definethe DAR, we must understand the behavior of J(θ

(i)i , φ) as a

function of M .2) Characterization of J(θ

(i)i , φ): We characterize

J(θ(i)i , φ) through its minima and maxima. It can be easily

deduced that the minimum of J(θ(i)i , φ) is 0 and is attained

when the numerator becomes zero, i.e.,

exp(

2πjMD

λ(cos(φ)− cos(θ

(i)i ))

)= 1, (10)

which is equivalent to

cos(φ) = cos(θ(i)i ) +

MD, (11)

where z ∈ Z, such that cos(φ) ∈ [−1, 1] and φ /∈ I(i)i .

Fig. 1 depicts the behavior of J(θ(i)i , φ) when θ

(i)i = 0

Page 6: Muppirisetty, L. Srikar; Charalambous, Themistoklis ... · L. Srikar Muppirisetty and Henk Wymeersch are with the Department of Signals and Systems, Chalmers University of Technology,

5

and for various values of M , where J(θ(i)i , φ) is computed

numerically for all values of φ using (9). It can be observedthat the number of zeros of the function J(θ

(i)i , φ) depends on

the number of antennas and it is equal to M − 1.

cos(φ)

Cost

J(π − θδi , φ)

J(θδi , φ)

cos(ψmaxi ) cos(ψmin

i )

−1 −0.5 0 0.5 10

0.2

0.4

0.6

0.8

1

Fig. 2. The behavior of the cost functions J(θδi , φ) and J(π−θδi , φ) for thevalues of cos(φ) = [−1, 1], M = 6, θδi = π

8, and βi = 1. Red diamonds

and blue asterisks represent the zeros of the functions J(θδi , φ), J(π−θδi , φ),respectively. Purple squares denote ψmin

i and ψimax

.

To ensure limited impact of user j on user i, J(θ(i)i , φ)

should be small for all φ ∈ I(i)j and all θ(i)

i ∈ I(i)i . Hence,

we consider J(θ(i)i , φ) for θ(i)

i at the boundaries of I(i)i , i.e.,

θ(i)i = θδi and θ

(i)i = π − θδi , as shown in Fig. 2. We

observe that both J(θδi , φ) and J(π − θδi , φ) are small forcos(φ) ∈ [cos(ψi

min), cos(ψi

max)], where the values of ψi

min

and ψimax

are detailed in Appendix B and visualized in Fig. 2.

BS antennas

Anglein

degrees

θ(i),mini

DARi

ψmaxi

θ(i),maxi

ψmini

I(i)i

I(i)i

100 200 300 400 5000

20

40

60

80

100

120

140

160

180

Fig. 3. The relation between ψimin

to θ(i),mini and ψi

maxto θ(i),max

i withincreasing BS antennas for θδi = π

10. Asymptotically, when M →∞, ψi

min

converges to θ(i),mini and ψi

maxto θ(i),max

i . The shaded regions are: DARi(blue) and I(i)i (red).

cos(φ)

Cost

True

Approximation

cos(ψmini )cos(ψmax

i )

cos(θδi )cos(π − θδi )

−1 −0.5 0 0.5 10

0.2

0.4

0.6

0.8

1

Fig. 4. The comparison between true cost function JDARi (φ) and

the approximate cost function JApprxi (φ) for M = 10, θδi = π

8,

and βi = 1. The approximate cost function JApprxi (φ) is a piece

wise linear function connecting the following points (−1, 1), (cos(π −θδi ), 1), (cos(ψ

maxi ), 0), (cos(ψmin

i ), 0), (cos(θδi ), 1), (1, 1). The thin greylines represent the cost functions J(θ(i)i , φ),∀θ(i)i ∈ I

(i)i .

Therefore, when the AoA support I(i)j of the interfering user

j lies within the desired angular region (DARi) [ψmini , ψmax

i ]of the target user i then the interference is limited. Thisproperty is exploited to devise various coordinated pilot as-signment schemes in Section IV. As it is observed in Fig.1, the range of the DARi increases with BS antennas. Therelation between ψi

min, θ(i),min

i and ψimax

, θ(i),maxi with M

is depicted in Fig. 3. Asymptotically, when M →∞, we notethat limM→∞ ψi

min= θ

(i),mini = θδi and limM→∞ ψi

max=

θ(i),maxi = π − θδi . In [18], only for the case M → ∞, the

AoA condition that needs to be satisfied between interferingand target users is provided, while Fig. 3 complements thisfor finite M .

Remark 2. For AoA distributions that are not bounded, thedistribution can be bounded by truncating the support. ForAoA distributions that can be described by union of multipleuniform distributions, the approach can be generalized byintroducing multiple disjoint DARs.

3) Approximation of cost function: The function JDARi (φ)

is shown in Fig. 4 and can be approximated by a piecewiselinear function JApprx

i (φ) (See blue dotted line in Fig. 4):

JApprxi (φ) =

√βi× (12)

1, cos(φ) ≤ cos(π − θδi ),1− cos(φ)+cos(θδi )

cos(ψmaxi )+cos(θδi )

, − cos(θδi ) ≤ cos(φ) ≤ cos(ψmaxi ),

cos(φ)−cos(ψmini )

cos(θδi )−cos(ψmini )

, cos(ψmini ) ≤ cos(φ) ≤ cos(θδi ),

1, cos(φ) ≥ cos(θδi ),

0, elsewhere.

Based on the JApprx(φ), we define Jij as the interference costto the BS of user i experiences from another user j, which

Page 7: Muppirisetty, L. Srikar; Charalambous, Themistoklis ... · L. Srikar Muppirisetty and Henk Wymeersch are with the Department of Signals and Systems, Chalmers University of Technology,

6

basically assigns zero cost when I(i)j lies within the DARi of

user i. Outside the DARi, the cost grows linearly and saturatesto√βi at θ(i),min

i and θ(i),maxi .

4) Cost of pilot assignment: Based on the notion of theDAR and the function JApprx

i (φ), we can finally determinea cost to user i when user j is assigned the same pi-lot. In particular, for the interfering user j with I

(i)j =

[θ(i),minj , θ

(i),maxj ], θ

(i),minj < θ

(i),maxj , we can introduce

Jij = JApprxi (θ

(i),minj ) + JApprx

i (θ(i),maxj ).

The interference cost Jij is used in devising coordinated pilotassignment schemes described in Section IV.

IV. COORDINATED PILOT ASSIGNMENT SCHEMES

In this section, we describe four different user assignmentstrategies for pilot decontamination under various configura-tions based on the theory developed in Section III.

A. Multi-User Multi-Cell Optimization

For this scenario, the goal is to reuse the pilots among theusers in the best possible way such that each user has beenallocated a pilot. Let us collect the users from all the cellsin a set N = ∪j∈C Kj , where C denotes the set of all cellsand Kj the set of users in the j-th cell, j ∈ C. Recall that Pis the set of all available orthogonal pilot sequences. Let usintroduce the variable yip ∈ 0, 1, with yip = 1, if i-th useris activated on p-th pilot and 0 otherwise. The one-shot jointoptimization for user assignment for multi-user and multi-cellscenario can be written as a binary integer program (BIP):

minimize∑p∈P

∑i∈N

∑j 6=i

Uijyipyjp (13a)∑p∈P

yip ≥ 1, ∀i ∈ N (13b)

yip ∈ 0, 1, ∀i ∈ N , p ∈ P, (13c)

where

Uij =

Jij , i 6= j,

0, i = j,(14)

We note the following: (13a) gives preference to users wholie within the desired angular region of the target user; (13b)states each user must be active at least on one pilot; and (13c)imposes the binary integer requirements on the optimizationvariables. For each pilot, the optimization (13), looks for usersin each cell with users in every cell and then chooses a set ofusers such that when assigned the same pilot to them, they willhave minimum possible interference at their respective BSs.

The user assignment is performed based on the location fora target user, say i, accounting for the following cases:

(C1) The support of interfering signals AoA I(i)j ,∀j lies

completely inside the DARi of the target user;(C2) The support of interfering signal AoA I

(i)j ,∀j lies

partially inside the DARi of the target user; and(C3) The support of interfering signal AoA I

(i)j ,∀j lies

completely outside with the DARi of the target user.

The above optimization problem is always feasible. The prob-lem (13) gives preference to users that satisfy the case (C1),in which case the objective is zero. It might be possible thatthe user locations are such that (C1) cannot be satisfied. Thisis tackled in (13), as it implicitly considers the cases (C2) and(C3) in the formulation. For example, when I(i)

j does not liewithin DARi, then the objective function becomes positive.Therefore, to minimize the objective, the interfering users areselected in such a way that the maximal overlap with thedesired support of the target user is obtained.

The optimization (13) can be written as an integer quadraticconstraint optimization problem (IQCP) as

minimize yTQ y (15a)∑p∈P

yip ≥ 1,∀i ∈ N (15b)

yip ∈ 0, 1, ∀i ∈ N , p ∈ P, (15c)

where y = [y11, . . . , y|N |1, . . . , y1|P|, . . . , y|N ||P|], Q =I|P| ⊗U is a |N ||P| × |N ||P| block diagonal matrix whereU is the |N | × |N | utility matrix with entries

U =

U11 U12 · · · U1|N |U21 U22 · · · U2|N |

......

. . ....

U|N |1 U|N |2 · · · U|N ||N|

, (16)

where Uij is given in (14).Remark 3. The optimization problem (13) is formulated asan IQCP and it can be easily shown to be NP-hard. Morespecifically, quadratic problems (QPs) are known to be NP(see for example, [49]) and only the convex QP admits apolynomial time solution [50]. The standard QP problemwhere the constraints are linear, is NP-hard if matrix Q isindefinite [51]. In our case, the structure of matrix Q is non-symmetric, since in general Jij is not necessarily equal toJji, and hence it is indefinite. Also, in our case, the Booleanconstraints are nonconvex, since the IQCP can be written asa quadratic constrained quadratic programming (QCQP) inwhich yip(1− yip) = 0.

It should be also emphasized that the above optimizationproblem is dependent on the number of antennas at each BSvia Uij (see (14)). Furthermore, the optimization relies on thefact that BSs acquire location information of users, whichin turn incurs an overhead. Our assumption is that inter-BScommunication using, for example the X2 interface in LongTerm Evolution (LTE) systems, on the time scale of 100 mswould make such overhead for the inter-BS communicationtolerable in a real system.

The formulation of the optimization problem (15) is verygeneral and encompasses a multitude of possible scenarioseven when the users for assignment belong to the same cell asthat of the target user. In what follows, we show some variantsof interest of (15) in the subsequent sections.

B. Multi-User Multi-Cell Optimization with QoS Guarantees

For the sake of establishing QoS guarantees, we may wantto exclude the possibility of assigning users from the same cell

Page 8: Muppirisetty, L. Srikar; Charalambous, Themistoklis ... · L. Srikar Muppirisetty and Henk Wymeersch are with the Department of Signals and Systems, Chalmers University of Technology,

7

as that of the target user to the same pilot. This is achievedby changing (15b) to a constraint such that only one userfrom each cell is assigned per pilot; this is enforced in theoptimization problem via (17b). Note that if no user existsin a cell for a certain pilot, then for constraint (17b) to bevalid, without loss of generality, the constraint for that cell ata certain pilot is removed. Therefore, the IQCP formulation formulti-user and multi-cell optimization with QoS guarantees iswritten as

minimize yTQ y (17a)∑i∈Kj

yip = 1,∀j ∈ C, p ∈ P (17b)

yip ∈ 0, 1, ∀i ∈ N , p ∈ P. (17c)

C. Multi-User Single-Cell Optimization

In this scenario, our objective is to find for each user ina target cell one user from the neighboring cells and assignthem the same pilot sequence. For this scenario, the mutualinterference of the users at the respective BSs is ignored andonly the interference of the users observed at the target cellare required to be satisfied. This scenario finds applications tocases where priority is required to be given to a certain cell(for example, in case there is a special event that requireswireless communications to be robust) and in dense urbanareas where it is computationally very expensive to includeall the cells in the network and inevitably to run such a large-scale optimization in real time.

The set of users for this scenario are the users from thetarget cell and its neighboring cells. Let the set of users givenby M = Kq ∪ (∪i∈Csur

qKi), where Csur

q is the set of cellssurrounding cell q. The modified optimization is then writtenas

minimize yTQ y (18a)∑i∈Kj

yip = 1,∀j ∈ (q ∪ Csurq ), p ∈ P (18b)

yip ∈ 0, 1, ∀i ∈M, p ∈ P, (18c)

where Q = I|P| ⊗ U is an |M||P| × |M||P| block diagonalmatrix where U is the |M| × |M| dimension utility matrixwith entries

Uij =

Uij , if i ∈ Kq,0 , otherwise.

(19)

D. Smart Pilot Assignment [28]

In this subsection, a modified smart pilot assignment of[28] for user assignment is described. The uplink signal-to-interference ratio (SINR) of i-th user at k-th BS is computedbased on large scale fading coefficient as

SINRuik ≈

βikk∑j 6=k βijk

,

which is assumed to be known, e.g., based on the distances,or from a radio map. The algorithm from [28] considers atarget cell to be optimized, in the presence of already allocated

Algorithm 1 Smart pilot assignment.1) Initialize by randomly assigning users to pilots such that

every user in each cell is assigned to one pilot.2) Sort all the users according to their uplink SINR .3) Take the user with the worst overall uplink SINR (say

user i in cell k)a) find another user in cell k with best SINR to

possibly switch with, say ib) if after switching

i) the smallest SINR is not increased, then try tofind another user in cell k and go to step (b).If there are no other users available in cell k,STOP

ii) the smallest SINR is increased, do the switchand go to step 2

TABLE ISIMULATION PARAMETERS

Parameter Valueη 2.5λ 0.1 mσ2 0.001D λ/2

Parameter ValueR 1000 m

γSNR 20 dBB 50PBS 1W

pilot sequences in surrounding cells. Starting from a randomallocation in the target cell, the algorithm identifies the userwith minimum uplink SINR in the target cell and then tries toimprove its SINR by switching pilots with another user in thetarget cell. This process is repeated until convergence. As thisprocedure is not guaranteed to converge when multiple cellsare to be optimized simultaneously, we propose a modification,given in Algorithm 1.

E. Heuristic Algorithm

In this subsection, a heuristic algorithm is proposed todecrease the computational complexity of the proposed jointoptimization schemes. The proposed heuristic algorithm ex-ploits not only distance information but also AoA information.So, the algorithm assign users to pilots based on the cost(14). Recall Uij is the cost associated if i-th user and j-thuser are assigned to a pilot. The heuristic algorithm is similarin structure to Algorithm 1. The main difference is insteadof uplink SINR, the cost is used for user assignment. Theproposed heuristic algorithm is detailed in Algorithm 2. Toimprove the performance of the heuristic algorithm, once coulduse the initial user assignment obtained from Algorithm 1.

V. NUMERICAL RESULTS

In this section, we present numerical results to evaluate theproposed schemes described in Section IV.

A. Simulation Scenario

We consider hexagonal shaped cells and simulations areperformed with a multi-cell system scenario. The simulation

Page 9: Muppirisetty, L. Srikar; Charalambous, Themistoklis ... · L. Srikar Muppirisetty and Henk Wymeersch are with the Department of Signals and Systems, Chalmers University of Technology,

8

Algorithm 2 Heuristic algorithm1) Initialize by randomly assigning users to pilots such that

every user in each cell is assigned to one pilot.2) Sort all the users according to their cost functions. Note

that the cost function captures both distance and AoAinformation.

3) Take the user with the highest overall cost (say user iin cell k)

a) find another user in cell k with lowest cost topossibly switch with, say i

b) if after switchingi) the highest cost is not decreased, then try to

find another user in cell k and go to step (b).If there are no other users available in cell k,STOP

ii) the highest cost is reduced, do the switch andgo to step 2

parameters used to obtain the numerical results are given inTable I. For a cell radius R, we set α to

α[dB] = γSNR + 10 η log10(R) + 10 log10(σ2), (20)

where γSNR is the cell-edge SNR in dB and σ2 is the receivernoise power variance.We keep these parameters fixed forthe simulations unless otherwise specified. To generate theAoA distributions, we consider a model where propagationis dominated by a ring of scatterers around the user [26],[40]–[44]. As an approximation, we consider a disk of radiusrijk comprising many scatterers around the user i in cell j.This radius can be different for each user depending on theenvironment. In that case, p(θijk) corresponds to a distributionwith support [θmin

ijk , θmaxijk ], for some fixed θmin

ijk , θmaxijk ∈ [0, 2π],

θminijk < θmax

ijk . We can calculate θminijk = θµijk − θδijk,

θmaxijk = θµijk + θδijk , where

θµijk = arctan

([xij ]2 − [xk]2[xij ]1 − [xk]1

), (21)

θδijk = arcsin

(rijk

‖xij − xk‖2

). (22)

As mentioned previously, we assume that a map exists in thebase station, connecting the user’s position to the support ofthe AoA distribution as well as the average received power(i.e., βijk in the form of a radio map). From those maps, itis then possible to compute Rijk, needed to compute hikk in(5).

Remark 4. We consider a non-LOS scenario with B scatteringpaths. However, there might be cases where the scatterersare strong, causing large angular spreads, or cases where thelocation of users is not accurately known (i.e., the locationestimates have uncertainty). These aspects can be incorporatedinto the system by allowing a larger radius rijk, whichtranslates to a larger range of angles. More complex AoAdistributions can also be used by means of multiple scatteringrings.

BS antennas10 20 30 40 50

Chan

nel

estimationerrorin

dB

-45

-40

-35

-30

-25

-20

-15

-10

I(i)j = [159.3, 170.7]

I(i)j = [136.3, 147.7]

I(i)j = [124.3, 135.7]

I(i)j = [114.3, 125.7]

I(i)j = [84.3, 95.7]

Interference free

Fig. 5. Comparison of channel estimation error η versus BS antennas fordifferent AoA I

(i)j of single interfering user. The target user is placed in

d = 500 m and the interfering user is placed in d = 1000 m from the targetBS. The results are averaged over 1000 Monte-Carlo channel realizations.

B. Performance MetricsThree different performance metrics are considered to eval-

uate the proposed schemes with existing approaches.• Normalized mean squared error of channel estimation

(NMSE) of uplink channel estimate of user i at the k-thBS in k-th cell is denoted by ηik and is written as

ηik = E

‖hikk − hikk‖2F‖hikk‖2F

, (23)

where hikk and hikk are the desired and estimatedchannels of user i at the k-th BS in k-th cell and theexpectation is over many channel realizations.

• Cumulative distribution function of channel estima-tion errors: Let us define the NMSE errors indB as eikk = 10 log10(

‖hikk−hikk‖2F‖hikk‖2F

), eno-intikk =

10 log10(‖hno-intikk −hikk‖

2F

‖hikk‖2F), of the estimated channels with

and without interfering users respectively, hno-intikk is the

corresponding interference-free channel estimate. We fur-ther denote εikk = eikk − eno-int

ikk . The channel estimationerrors from all cells for each pilot p is collected in aset Ep = εikkLk=1. The cumulative distribution function(CDF) F (E) is calculated on Ep for every pilot based onseveral channel realizations.

• Downlink per-cell sum rate: Assuming maximum ratiotransmission, and the availability of perfect CSI at theuser terminal, an upper bound on the downlink SINR ofi-th user at j-th BS can be computed as

SINRij =

|hTijwij |2∑

k 6=i |hTijwkj |2 +

∑l 6=j∑Kk=1 |hT

ilwkl|2 + σ2nMKPBS

where wij =h∗ij

‖hij‖,∀i, j. The factor in the numerator

corresponds to received power, and the first and second

Page 10: Muppirisetty, L. Srikar; Charalambous, Themistoklis ... · L. Srikar Muppirisetty and Henk Wymeersch are with the Department of Signals and Systems, Chalmers University of Technology,

9

terms in the denominator capture the intra and inter cellinterference. The achievable downlink rate for the i-thuser in j-th BS is then can be calculated as Ωij =log2(1+SINRij), and the sum rate of all users in a cell isobtained Ωj =

∑Ki=1 Ωij . Finally the per-cell downlink

sum rate is given by Ω = (1/L)∑Lj=1 Ωj .

C. Results and Discussion

1) Impact of Different AoA Supports of an Interfering User:In Fig. 5, we show the impact of different ranges of AoAsupport I(i)

j of a single interfering user w.r.t. to DARi of thetarget user. Note that all the angles are after the axis trans-formation performed w.r.t. to the target user. We can calculateDARi, and for M = 10, it is obtained as [37.6, 142.4].

We varied I(i)j such that some are within DARi and some

are outside this range. When I(i)j lies within DARi then the

interference is low, and the channel estimation converges fastto the interference-free scenario; with M = 10 BS antennasthe channel estimation performance is similar to that of theinterference-free scenario. On the other hand, when I

(i)j is

outside the DARi, it can be observed that more BS antennasare needed to converge to the interference-free scenario. Forexample, when I(i)

j = [136.3147.7], then more than 50 BSantennas are required.

2) Two Cell Scenario: Single Cell Optimization: We nowlook into the pilot allocation in a single cell, given knownallocations in other cells. In particular, we consider a two-cellscenario with two users in each cell, rij is set to 50 m foreach user, and τ = 2 (see Fig. 6 (a)), where the users incell 2 have already been allocated pilots and we aim to reusethese pilots for the users in cell 1. We compare the proposedjoint optimization scheme (18) with greedy sequential userassignment [1], [18]. For this scenario, both the users fromcell 2 fall within the desired angular region of user 1 in cell1. However, for user 2 of cell 1, only user 1 of cell 2 ispermissible. In the greedy sequential scheme, user 1 of cell 1is assigned the same pilot as user 1 of cell 2, since it providedthe largest angular separation among the users in cell 2. Thenuser 2 of cell 1 has no choice but to be assigned the samepilot as user 2 in cell 2. In contrast, the joint optimizationconsiders compatibility of both users of cell 1. Therefore, itmatches user 1 of cell 1 with user 2 of cell 2 and user 2 ofcell 1 with user 1 of cell 2. The channel estimation error ηperformance for both schemes for the users in target cell (i.e.,cell 1) is shown in Fig. 6 (b). As expected, the performanceof pilot 2 with greedy assignment suffers as user 2 of cell 1is not compatible with user 2 of cell 2.

3) Two Cell Scenario: Multi-Cell Optimization: We nowextend the discussion for the scenario above to multi-usermulti-cell optimization (17). Now we can optimize the per-formance of both users in both cells. Therefore, the joint opti-mization during user assignment considers not only reducingthe interference seen by the target user but also how the targetuser is contributing interference to users in the neighboringcells. So, users in different cells are assigned the same pilot ifthe AoA support of a user in one cell lies within the desiredangular region of another user in another cell and vice-versa.

Consequently, the channel estimation performance of the targetusers at their respective BS is improved. This is seen in Fig. 7,where the performance of each user in each cell approachesthe interference-free condition.

When we increase the number of users per cell to 5 andset τ = 5, M = 64 and compare the joint assignment fromSection IV-B with the smart pilot algorithm [28] described inSection IV-D, and the proposed heuristic from Section IV-E,we obtain the results in Fig. 8. We have fixed the users’locations and the ring sizes rij (varying between 50 m and 100m among users), and vary the channel and noise realizationsto obtain a CDF of the channel estimation errors. This impliesthat the pilot assignments for each algorithms are fixed. It canbe observed that all the medthods have similar performancewhen M = 64 BS antennas. However, it was observed forwhen M = 20 the proposed heuristic performs similar to thatof joint optimization scheme, while the smart pilot schemeleads to worse performance for one of the pilots.

4) Seven Cell Scenario: Multi-Cell Optimization: In thissection, we will evaluate the CDF of the channel estimationerrors and the sum-rate for a seven-cell scenario, with with 5users per cell and a pilot length of τ = 5. Fig. 9 shows thataccording to the joint optimization method, there are two badpilots (i.e., a combination of users for which interference is un-avoidably high). For E < 10 dB, the heuristic outperforms thesmart pilot allocation, which has two bad pilots, compared toone for the heuristic. When the number of cells is increased, itbecomes even more difficult to reduce the pilot contaminationfor all the desired users in each cell per each pilot. The jointoptimization and heuristic approaches offer relatively betterperformance to smart pilot scheme.

In Fig. 10, the per-cell downlink sum rate (Ω) with increasein number of BS antennas is depicted for 7-cell scenario with5 users per cell. Furthermore, we also consider a random userassignment scheme, where in users are randomly assignedto pilots in each cell. For the random scheme, the averageover the best sum rate over 1000 random pilot assignments isconsidered. Also, we depict the sum rate offered in the case ofinterference free scenario. We can clearly observe that as thenumber of antennas is increased the per-cell downlink sumrate is also increased. The joint optimization scheme offersbetter sum rate compared to the other schemes. This is due tothe fact that it can better handle to avoid pilot contaminationby choosing optimal user allocation. For M = 64 BS antennasthe joint optimization scheme gives around 11% more rate incomparison to random user assignment scheme. Furthermore,as M increases the gap decreases between the sum rateoffered by joint optimization scheme and the interference freescenario.

The offered sum rate by various schemes with increasingnumber of users per cell is shown in Fig. 11. The downlinksum rate increases with increase in number of users for all theschemes, with a widening gap between the joint optimizationand the two competing methods.

Page 11: Muppirisetty, L. Srikar; Charalambous, Themistoklis ... · L. Srikar Muppirisetty and Henk Wymeersch are with the Department of Signals and Systems, Chalmers University of Technology,

10

-2000 -1000 0 1000 2000

-500

0

500

1000

1500

2000

2500

BS 1

BS 2

1

1

2

2

(a)BS antennas

10 20 30 40 50 60

Channel

estimationerrorin

dB

-45

-40

-35

-30

-25

-20

-15

Greedy [13],[16]: pilot 1

Greedy [13],[16]: pilot 2

Proposed joint-opt: pilot 1

Proposed joint-opt: pilot 2

(b)

Fig. 6. Performance comparison of a greedy vs joint optimization for a two cell scenario. Inset (a) two cell scenario with two users each, users are markedwith a plus sign and BS with pentagons, and (b) channel estimation error η as a function of the number of BS for the users in cell 1 with greedy and jointoptimization schemes.

BS antennas

0 10 20 30 40 50 60 70

Channel

estimationerrorin

dB

-60

-50

-40

-30

-20

-10

0

pilot 1

pilot 2

Ch. est. error of desired channel, cell 1

Interf. free scenario, cell 1

Ch. est. error of desired channel, cell 2

Interf. free scenario, cell 2

Fig. 7. Channel estimation performance of the target users in each cell for atwo-cell scenario with joint optimization scheme. The different colors showusers in different cells, while the markers show different pilots, reused in bothcells.

VI. CONCLUSIONS AND FUTURE DIRECTIONS

In this paper, we characterized the effect of interferencefor MIMO BSs with a large, but finite, number of antennas,harnessing user location information. Building on this char-acterization, we formulated several pilot assignment problemsas integer quadratic constraint optimization problem. Theseproblems are solved centrally, provided that all the informationabout all users is shared among all BSs. To reduce thecomputational complexity of these joint optimization prob-lems, we further proposed heuristic algorithm which assignsusers to pilots based on both distance and angle of arrivalinformation of the users. We show proposed pilot assignmentstrategies offer improved channel estimation performance aswell as enhanced downlink sum rate even when the number of

E

0 1 2 3 4

CDFF(E

)

0

0.2

0.4

0.6

0.8

1

Pilot 1Pilot 2Pilot 3Pilot 4Pilot 5

Joint optimizationSmart pilot [28]Heuristic

Fig. 8. CDF of channel estimation error for 2 cell scenario with 5 users percell. For this scenario, rij is chosen randomly between [50,100] m for eachuser. The pilot length is τ = 5. The BS antenna size is M = 64. The CDFplot is compared for the each pilot and for the joint optimization, smart pilot,and proposed heuristic schemes. 1000 Monte-Carlo channel realizations aregenerated to obtain the results.

antennas is finite. However, low-complexity greedy methodssuffer from a severe performance penalty compared to jointoptimization.

Part of our ongoing research focuses on developing dis-tributed implementations based on local information. Dis-tributed implementations for pilot contamination avoidanceunder a game theoretic framework have been proposed us-ing coalition games [52] and non-cooperative games [27].However, none of the aforementioned approaches exploits thelocation information that BSs can obtain and considered inthis work.

Page 12: Muppirisetty, L. Srikar; Charalambous, Themistoklis ... · L. Srikar Muppirisetty and Henk Wymeersch are with the Department of Signals and Systems, Chalmers University of Technology,

11

E

0 10 20 30 40 50

CDFF(E

)

0

0.2

0.4

0.6

0.8

1

Pilot 1Pilot 2Pilot 3Pilot 4Pilot 5

Joint optimizationSmart pilot [28]Heuristic

Fig. 9. CDF of channel estimation error for 7 cell scenario with 5 users percell. For this scenario, rij is chosen randomly between [50,100] m for theeach user. The pilot length is τ = 5. The BS antenna size is M = 64. TheCDF plot is compared for the each pilot and for the joint optimization, smartpilot, and proposed heuristic schemes. 1000 Monte-Carlo channel realizationsare generated to obtain the results.

BS antennas10 20 30 40 50 60

Per

cellsum

rate

[bits/sec/Hz]

15

20

25

30

35

40

45

Interf. free scenarioJoint optimizationHeuristicSmart pilot [28]Random

Fig. 10. The per-cell down link sum rate as function of BS antennas. 7-cellscenario with 5 users per cell is considered. For this scenario, rij is chosenrandomly between [50,100] m for the each user. The pilot length is τ = 5.The results are averaged over 1000 Monte-Carlo channel realizations.

APPENDIX ACHANNEL ESTIMATION UNDER FINITE MIMO

The channel estimate hi of the desired user can be writtenusing (4) and (5), with

Qi = Ri

(σ2IM + τ

L∑j=1

Rj

)−1

Number of users5 6 7 8 9 10

Per

cellsum

rate

[bits/sec/Hz]

40

50

60

70

80

90

100

110

Interf. free scenarioJoint optimizationHeuristicSmart pilot [28]

Fig. 11. The per-cell down link sum rate as function of increasing users percell for 7 cell scenario. For this scenario, rij is chosen randomly between[50,100] m for the each user. The pilot length is varied from τ = 5 toτ = 10. The BS antenna size is M = 64. The results are averaged over 1000Monte-Carlo channel realizations.

as

hi = QiSH(S

L∑j=1

hj + n)

= Qi(τhi + SHn) + τQi

∑j 6=i

hj ,

where L = |C| and the last terms constitutes the inter-ference. We approximate Rj by a low-rank version, i.e.,Rj ≈ UjΣjU

Hj , in which Σj is an mj × mj matrix. In

general, for finite M , Rj is full rank, but for a sufficientlylarge number of antennas, mj < M , provided the AoA supportof p(θj) is finite [18], so low-rank approximation of Rj exists.Then,

∑Lj=1 Rj has a rank m ≤∑L

j=1mj approximation:

L∑j=1

Rj ≈L∑j=1

UjΣjUHj = UΣUH

= UiΣiUHi + UiΣiU

Hi ,

in which span(U) = span(Ui) ∪ span(Ui) is decomposedinto two orthogonal spaces. Note that Σi may be differentfrom Σi.

We can now express IM = VVH + UUH, where V is aunitary matrix spanning the orthogonal complement of UUH.Then

Qi = UiΣi(σ2Imi + τΣi)

−1UHi .

The interference from user j is thus determined by

‖UiΣi(σ2Imi + τΣi)

−1UHi τhj‖2

‖UiΣi(σ2Imi + τΣi)−1UHi τhi‖2

.

Since hj ∈ span(a(θj)), responses a(θj) and a(θ′j) for which‖UH

i a(θj)‖ > ‖UHi a(θ′j)‖ indicate that a(θj) causes more

interference. Since aH(θj)Ria(θj) = aH(θj)UiΣiUHi a(θj),

Page 13: Muppirisetty, L. Srikar; Charalambous, Themistoklis ... · L. Srikar Muppirisetty and Henk Wymeersch are with the Department of Signals and Systems, Chalmers University of Technology,

12

it can be used as a measure of interference. Hence, inter-fering users j for which the steering vectors are such thataH(θj)Ria(θj) is small are preferred over users for whichaH(θj)Ria(θj) is large, to limit the impact of interferenceduring channel estimation for user i.

APPENDIX BSELECTION OF ψi

minAND ψi

max

We denote φ∗r,θδir and φ∗

r,π−θδir as the sets of zeros

of functions J(θδi , φ) and J(π − θδi , φ), respectively. Thevalues of φ∗

θδiand φ∗

π−θδiare obtained by solving the following

expressions using (11)

cos(φ∗θδi) = cos(θδi ) +

MD, (24)

cos(φ∗π−θδi) = − cos(θδi ) +

MD. (25)

We further define ψimin

=max(min

r(φ∗

r,θδir),min

r(φ∗

r,π−θδir)) and ψi

max=

min(maxr

(φ∗r,θδir),max(φ∗

r,π−θδir)).

ACKNOWLEDGMENT

We would like to thank Haifan Yin and David Gesbertfor fruitful discussions. The authors would like to thankGUROBI for the free academic license to use their numericaloptimization software.

REFERENCES

[1] L. S. Muppirisetty, H. Wymeersch, J. Karout, and G. Fodor, “Location-aided pilot contamination elimination for massive MIMO systems,” inProc. IEEE Global Communications Conference, Dec 2015.

[2] F. Boccardi, R. W. Heath, A. Lozano, T. L. Marzetta, and P. Popovski,“Five disruptive technology directions for 5G,” IEEE CommunicationsMagazine, vol. 52, no. 2, pp. 74–80, Feb 2014.

[3] Y.-G. Lim, C.-B. Chae, and G. Caire, “Performance analysis of mas-sive MIMO for cell-boundary users,” IEEE Transactions on WirelessCommunications, vol. 14, no. 12, pp. 6827–6842, Dec 2015.

[4] E. G. Larsson, O. Edfors, F. Tufvesson, and T. L. Marzetta, “MassiveMIMO for next generation wireless systems,” IEEE CommunicationsMagazine, vol. 52, no. 2, pp. 186–195, Feb 2014.

[5] F. Rusek, D. Persson, B. K. Lau, E. G. Larsson, T. L. Marzetta,O. Edfors, and F. Tufvesson, “Scaling up MIMO: Opportunities andchallenges with very large arrays,” IEEE Signal Processing Magazine,vol. 30, no. 1, pp. 40–60, Jan 2013.

[6] E. Bjornson, E. G. Larsson, and M. Debbah, “Optimizing multi-cellmassive MIMO for spectral efficiency: How many users should be sched-uled?” in Proc. IEEE Global Conference on Signal and InformationProcessing, Dec 2014, pp. 612–616.

[7] T. L. Marzetta, “Noncooperative cellular wireless with unlimited num-bers of base station antennas,” IEEE Transactions on Wireless Commu-nications, vol. 9, no. 11, pp. 3590–3600, Nov 2010.

[8] N. Rajatheva, S. Suyama, W. Zirwas, L. Thiele, G. Fodor, A. Tolli,E. D. Carvalho, and J. H. Sorensen, 5G Mobile and Wireless Commu-nications Technology, A. Osseiran, J. F. Monserrat, and P. Marsch, Eds.Cambrdige University Press, 2016, no. ISBN 9781107130098.

[9] J. Hoydis, S. Ten Brink, and M. Debbah, “Massive MIMO in the UL/DLof cellular networks: How many antennas do we need?” IEEE Journalon Selected Areas in Communications, vol. 31, no. 2, pp. 160–171, 2013.

[10] O. Elijah, C. Y. Leow, T. A. Rahman, S. Nunoo, and S. Z. Iliya,“A comprehensive survey of pilot contamination in massive MIMO-5G system,” IEEE Communications Surveys &Tutorials, vol. 18, no. 2,pp. 905–923, 2016.

[11] F. Fernandes, A. Ashikhmin, and T. L. Marzetta, “Inter-cell interferencein noncooperative TDD large scale antenna systems,” IEEE Journal onSelected Areas in Communications, vol. 31, no. 2, pp. 192–201, 2013.

[12] K. Appaiah, A. Ashikhmin, and T. L. Marzetta, “Pilot contaminationreduction in multi-user TDD systems,” in Proc. IEEE InternationalConference on Communications, May 2010.

[13] W. A. W. M. Mahyiddin, P. A. Martin, and P. J. Smith, “Pilot con-tamination reduction using time-shifted pilots in finite massive MIMOsystems,” in Proc. IEEE Vehicular Technology Conference (Fall), Sep2014.

[14] T. X. Vu, T. A. Vu, and T. Q. S. Quek, “Successive pilot contaminationelimination in multiantenna multicell networks,” IEEE Wireless Com-munications Letters, vol. 3, no. 6, pp. 617–620, Dec 2014.

[15] J. Zhang, B. Zhang, S. Chen, X. Mu, M. El-Hajjar, and L. Hanzo, “PilotContamination Elimination for Large-Scale Multiple-Antenna AidedOFDM Systems,” IEEE Journal of Selected Topics in Signal Processing,vol. 8, no. 5, pp. 759–772, Oct 2014.

[16] H. Yin, D. Gesbert, M. C. Filippou, and Y. Liu, “Decontaminatingpilots in massive MIMO systems,” in IEEE International Conferenceon Communications (ICC), 2013, pp. 3170–3175.

[17] M. Filippou, D. Gesbert, and H. Yin, “Decontaminating pilots incognitive massive MIMO networks,” in International Symposium onWireless Communication Systems (ISWCS), 2012, pp. 816–820.

[18] H. Yin, D. Gesbert, M. Filippou, and Y. Liu, “A coordinated approachto channel estimation in large-scale multiple-antenna systems,” IEEEJournal on Selected Areas in Communications, vol. 31, no. 2, pp. 264–273, Feb 2013.

[19] R. R. Mueller, M. Vehkaperae, and L. Cottatellucci, “Blind pilot decon-tamination,” in 17th International ITG Workshop on Smart Antennas,Mar 2013, pp. 1–6.

[20] R. R. Muller, M. Vehkapera, and L. Cottatellucci, “Analysis of blindpilot decontamination,” in Asilomar Conference on Signals Systems andComputers, 2013, pp. 1016–1020.

[21] R. R. Müller, L. Cottatellucci, and M. Vehkaperä, “Blind pilot decontam-ination,” IEEE Journal of Selected Topics in Signal Processing, vol. 8,no. 5, pp. 773–786, 2014.

[22] L. Cottatellucci, R. R. Muller, and M. Vehkapera, “Analysis of pilotdecontamination based on power control,” in 77th Vehicular TechnologyConference (VTC Spring), 2013, pp. 1–5.

[23] H. Q. Ngo and E. G. Larsson, “EVD-based channel estimation inmulticell multiuser MIMO systems with very large antenna arrays,” inProc. IEEE International Conference on Acoustics, Speech and SignalProcessing, Mar 2012, pp. 3249–3252.

[24] M. Li, S. Jin, and X. Gao, “Spatial orthogonality-based pilot reuse formulti-cell massive MIMO transmission,” in Wireless Communications& Signal Processing (WCSP), 2013 International Conference on, 2013,pp. 1–6.

[25] L. You, X. Gao, X.-G. Xia, N. Ma, and Y. Peng, “Pilot reuse for massiveMIMO transmission over spatially correlated Rayleigh fading channels,”IEEE Transactions on Wireless Communications, vol. 14, no. 6, pp.3352–3366, 2015.

[26] A. Adhikary, J. Nam, J.-Y. Ahn, and G. Caire, “Joint spatial divisionand multiplexing: The large-scale array regime,” IEEE Transactions onInformation Theory, vol. 59, no. 10, pp. 6441–6463, Oct 2013.

[27] H. Ahmadi, A. Farhang, N. Marchetti, and A. MacKenzie, “A gametheoretic approach for pilot contamination avoidance in massive MIMO,”IEEE Wireless Communications Letters, vol. 5, no. 1, pp. 12–15, Feb2016.

[28] X. Zhu, Z. Wang, L. Dai, and C. Qian, “Smart pilot assignment formassive mimo,” IEEE Communications Letters, vol. 19, no. 9, pp. 1644–1647, Sep 2015.

[29] D. Zhang, H. Wand, and Y. Fu, “Uplink sum rate analysis with flexiblepilot reuse,” in 8th International Conference on Wireless Communica-tions and Signal Processing (WCSP), Yangzhou, China, October 2016.

[30] H. Yang and T. L. Marzetta, “Total energy efficiency of cellular largescale antenna system multiple access mobile networks,” in IEEE OnlineConference on Green Communications (GreenCom), 2013, pp. 27–32.

[31] Y. Li, Y.-H. Nam, B. L. Ng, and J. Zhang, “A non-asymptotic throughputfor massive MIMO cellular uplink with pilot reuse,” in IEEE GlobalCommunications Conference (GLOBECOM), 2012, pp. 4500–4504.

[32] V. Saxena, G. Fodor, and E. Karipidis, “Mitigating pilot contaminationby pilot reuse and power control schemes for massive MIMO systems,”in Proc. IEEE Vehicular Technology Conference Spring, May 2015.

[33] M. Li, S. Jin, and X. Gao, “Spatial orthogonality-based pilot reuse formulti-cell massive MIMO transmission,” in International Conference onWireless Communications and Signal Porcessing (WCSP), Hangzhou,China, 24-26 October 2013.

[34] J. Li, L. Xiao, X. Xu, and S. Zhou, “Sectorization based pilot reuse forimproving net spectral efficiency in the multicell massive MIMO sys-

Page 14: Muppirisetty, L. Srikar; Charalambous, Themistoklis ... · L. Srikar Muppirisetty and Henk Wymeersch are with the Department of Signals and Systems, Chalmers University of Technology,

13

tem,” Science China Information Sciences, vol. 59(2):022307, February2016.

[35] Z. Wang, C. Qian, L. Dai, J. Chen, C. Sun, and S. Chen, “Location-basedchannel estimation and pilot assignment for massive MIMO systems,” inIEEE International Conference on Communication Workshop (ICCW),June 2015, pp. 1264–1268.

[36] P. Zhao, Z. Wang, C. Qian, L. Dai, and S. Chen, “Location-aware pilotassignment for massive MIMO systems in heterogeneous networks,”IEEE Transactions on Vehicular Technology, vol. 65, no. 8, pp. 6815–6821, Aug 2016.

[37] N. Akbar, S. Yan, N. Yang, and J. Yuan, “Mitigating pilot contaminationthrough location-aware pilot assignment in massive MIMO networks,”in IEEE Globecom Workshops (GC Wkshps), Dec 2016, pp. 1–6.

[38] E. Björnson, J. Hoydis, and L. Sanguinetti, “Massive mimo has unlimitedcapacity,” arXiv preprint arXiv:1705.00538, 2017.

[39] J.-A. Tsai, R. Buehrer, and B. Woerner, “The impact of AOA energydistribution on the spatial fading correlation of linear antenna array,” in55th IEEE Vehicular Technology Conference (Spring), vol. 2, 2002, pp.933–937.

[40] D. S. Shiu, G. Foschini, M. J. Gans, and J. M. Kahn, “Fading correlationand its effect on the capacity of multielement antenna systems,” IEEETransactions on Communications, vol. 48, no. 3, pp. 502–513, March2000.

[41] A. Abdi and M. Kaveh, “A space-time correlation model for multiele-ment antenna systems in mobile fading channels,” IEEE Journal onSelected Areas in Communications, vol. 20, no. 3, pp. 550–560, April2002.

[42] C. Oestges, B. Clerckx, D. Vanhoenacker-Janvier, and A. J. Paulraj,“Impact of diagonal correlations on MIMO capacity: Application togeometrical scattering models,” in Proc. 58th IEEE Vehicle TechnologyConference, vol. 1, October 2003, pp. 394–398.

[43] C. Oestges and A. J. Paulraj, “Beneficial impact of channel correlations

on MIMO capacity,” IEEE Electronics Letters, vol. 40, no. 10, May2004.

[44] M. Zhang, P. J. Smith, and M. Shafi, “An extended one-ring MIMOchannel model,” IEEE Transactions on Wireless Communications, vol. 6,no. 8, pp. 2759–2764, August 2007.

[45] Z. Gao, L. Dai, Z. Wang, and S. Chen, “Spatially common sparsity basedadaptive channel estimation and feedback for FDD massive MIMO,”IEEE Transactions on Signal Processing, vol. 63, no. 23, pp. 6169–6183, Dec 2015.

[46] J. Fang, X. Li, H. Li, and F. Gao, “Low-rank covariance-assisteddownlink training and channel estimation for FDD massive MIMOsystems,” IEEE Transactions on Wireless Communications, vol. 16,no. 3, pp. 1935–1947, March 2017.

[47] H. Huh, G. Caire, H. C. Papadopoulos, and S. A. Ramprashad, “Achiev-ing "Massive MIMO" spectral efficiency with a not-so-large numberof antennas,” IEEE Transactions on Wireless Communications, vol. 11,no. 9, pp. 3226–3239, September 2012.

[48] H. Q. Ngo, E. G. Larsson, and T. L. Marzetta, “Massive MU-MIMOdownlink TDD systems with linear precoding and downlink pilots,” in51st Annual Allerton Conference, Allerton House, UIUC, Illinois, USA,October 2-3 2013, pp. 293–298.

[49] S. A. Vavasis, “Quadratic programming is in NP,” Information Process-ing Letters, vol. 36, no. 2, pp. 73–77, 1990.

[50] M. Kozlov, S. Tarasov, and L. Khachiyan, “The polynomial solvabilityof convex quadratic programming,” USSR Computational Mathematicsand Mathematical Physics, vol. 20, no. 5, pp. 223–228, 1980.

[51] S. Sahni, “Computationally related problems,” SIAM Journal on Com-puting, vol. 3, no. 4, pp. 262–279, 1974.

[52] R. Mochaourab, E. Björnson, and M. Bengtsson, “Adaptive pilot clus-tering in heterogeneous massive MIMO networks,” IEEE Transactions

on Wireless Communications, vol. 15, no. 8, pp. 5555–5568, Aug 2016.