Space Shift Keying Modulation For MIMO Channels
Space Shift Keying Modulation For MIMO Channels
net/publication/224563047
CITATIONS READS
836 2,375
4 authors, including:
Some of the authors of this publication are also working on these related projects:
Physical (PHY) layer security (PLS) for visible light communications (VLC) View project
Distributed Collaborative Beamforming (DCB) for Multi-Node Wireless Relays and Sensor Networks View project
All content following this page was uploaded by Leszek Szczecinski on 28 June 2014.
Abstract— A fundamental component of spatial modulation remains active during transmission so that ICI is avoided, and
(SM), termed generalized space shift keying (GSSK), is pre- IAS is no longer needed.
sented. GSSK modulation inherently exploits fading in wireless Although SM is shown to reduce the receiver’s complexity
communication to provide better performance over conventional
amplitude/phase modulation (APM) techniques. In GSSK, only as compared to V-BLAST [3], this is under a sub-optimal
the antenna indices, and not the symbols themselves (as in the SM detection rule that is only valid under some constrained
case of SM and APM), relay information. We exploit GSSK’s assumptions about the channel. Due to the sub-optimality of
degrees of freedom to achieve better performance, which is done the detection, SM does not exhibit the best performance in
by formulating its constellation in an optimal manner. To support [3]. As well, the constrained assumptions about the channel
our results, we also derive upper bounds on GSSK’s bit error
probability, where the source of GSSK’s strength is made clear. questions the validity of the performance comparison with V-
Analytical and simulation results show performance gains (1.5−3 BLAST in [6]. The optimal detector for SM is, however, de-
dB) over popular multiple antenna APM systems (including rived in [7] under conventional channel assumptions, and SM
Bell Laboratories layered space time (BLAST) and maximum is shown to outperform many schemes including V-BLAST (at
ratio combining (MRC) schemes), making GSSK an excellent the expense of increased receiver complexity). Also, the trade-
candidate for future wireless applications.
off between the number of transmit antennas versus the APM
constellation size is chosen heuristically in [6]. All of this
I. I NTRODUCTION
motivates our presentation of a simpler modulation technique,
Using multiple antennas in wireless communications allows namely GSSK, which can be used to build a stronger SM
unprecedented improvements over single antenna systems. foundation.
One example is the vertical Bell Laboratories layered space- Contribution: We analyze GSSK as a fundamental com-
time (V-BLAST) architecture [1], where multiple symbols are ponent of SM, in which the spatial domain is exploited to
multiplexed in space, and transmitted at the same time over modulate information. The presentation of SM in [6] does
all antennas. Due to inter-channel interference (ICI), caused not fully explore the idea of using antenna indices as the
by coupling multiple symbols in time and space, V-BLAST only means to relay information, as is the case for our GSSK
maximum likelihood (ML) detection increases exponentially scheme. The transmitted symbols in GSSK are just a means of
in complexity with the number of transmit antennas. Hence, identifying the activated antenna. In doing so, we achieve all of
practical integration of V-BLAST requires sub-optimal, low the aforementioned advantages comprising SM, while reduc-
complexity receivers [2]. For adequate performance, these ing transceiver overhead. GSSK’s constellation is thoroughly
receivers require the number of receive antennas to be larger or analyzed, where we present the underlying idea that allows
equal to the number of transmit antennas, which is not practi- GSSK to outperform APM schemes (such as V-BLAST and
cal for downlink transmission to small mobile devices. Conse- MRC). In particular, we show that GSSK takes advantage of
quently, avoiding ICI greatly reduces receiver complexity, and the fading process by increasing the constellation’s dimension,
results in performance gains. Also, the V-BLAST algorithms whose points result to be well spread apart. This analysis
assume that all symbols are transmitted at the same time. opens the door to understanding how SM parameters may be
Hence, inter-antenna synchronization (IAS) is necessary to chosen to obtain better performance gains. We also consider
avoid performance degradation, which consequently increases the performance of the GSSK scheme, where upper bounds
transmitter overhead. on the bit error rate (BER) are derived. Through our analysis,
Prior Work: In [3]–[6], the so-called spatial modulation we design optimal constellations, where it is apparent that
(SM) seems to be an effective means to remove ICI, and the tremendous degrees of freedom is available for practical imple-
need for precise time synchronization amongst antennas. SM is mentation. Simulation results are also presented to support our
a pragmatic approach for transmitting information, where the findings, and illustrate the future research potential of GSSK
modulator uses well known APM techniques, such as PSK and modulation.
quadrature amplitude modulation (QAM), but also employs Organization: Section II introduces the basic GSSK system
the antenna index to convey information. Only one antenna model, including a detailed analysis of GSSK’s constellation
constellation of size M .
II. GSSK M ODULATION For example, with nt = 2 and Nt = 7, there are M 0 = 21
The general system model consists of a MIMO wire- possible combinations. Since we require a constellation size
less link with Nt transmit and Nr receive antennas, and M in multiples of 2, we only use 16 of the possible 21
is shown£ in Fig. 1. A random sequence of independent combinations. The set of antenna combinations, X , may be
¤ chosen at random, but we will see in Section IV that more
bits b = b1 b2 · · · bk enters a GSSK mapper, where
groups of m bits are optimal selection rules exist.
£ ¤T mapped to a constellation vector x = Once X is formulated, the GSSK’s mapper rule is straight-
x1 £ x2 ¤ · · · xNt , with a power constraint of unity (i.e.
forward. Groups of m = log2 (M ) bits are collected and
Ex xH x = 1). In GSSK, only nt antennas remain active
mapped to a vector xj , where j ∈ X specifies the antenna
during transmission, and hence, only nt of the xj ’s in x are
combination for the given m bit pattern. The symbols in xj
nonzero. The signal is transmitted over an Nr × Nt wireless
do not contain information, but can be designed to optimize
channel H, and experiences an£ Nr − dim additive ¤T white transmission.1 The vector xj specifies the activated antennas,
Gaussian (AWGN) noise η = η1 η2 · · · ηNr . The
√ during which all other antennas remain idle, and has the
received signal is given by y = ρHx + η, where ρ is the
following form:
average signal to noise ratio (SNR) at each receive antenna, h iT
and H and η have independent and identically distributed (iid) xj , √1nt 0 · · · 0 √1nt · · · √1nt 0 .
entries according to CN (0, 1). | {z }
nt of Nt non-zero values
η1
An example of 8-ary GSSK modulation is given in Table I,
1 1
η2
where we use Nt = 5, nt = 2, and X is chosen randomly. The
2 2
output of the channel is therefore given by
b GSSK GSSK b̂ p
MAPPER
M M ηN
DETECTOR
y = ρ0 hj,eff + η, (1)
r
A. Transmission B. Detection
The underlying concept in GSSK is using only antenna The detector’s main function is obtaining the antenna in-
indices to relay information. In general, combinations of dices used at the transmitter. Since the channel inputs are
antenna indices can be used.
¡ t¢Therefore, for GSSK using nt 1 For our purposes, we consider real values for x , and consider more
j
antennas, there are M 0 = Nnt possible constellation points. general (adaptive) symbol design in ongoing work.
assumed equally likely, the optimal detector is ML, which is assumed to be known at the receiver, and remains the same
given by regardless of the transmitted information. If, on the other
hand, both the antenna indices and the symbols conveyed
k = arg max pY (y | xj , H)
j information, the modulation scheme would not be APM, but
°
° p °2
° rather a form of SM. In this case, X eff is similar to GSSK, but
= arg min °y − ρ0 hj,eff ° with the possibility of having more than one scaled version of
j F
½³ √ 0 ´H ¾ xj,eff along the same direction.
ρ
= arg max Re y − 2 hj,eff hj,eff , (2)
j III. P ERFORMANCE A NALYSIS
where k ∈X represents the estimated antenna indices, and
pY (y | xj , H) is given by A. Error Probability
1 ³ √ ´ GSSK’s performance is derived using the well known union
pY (y | xj , H) = Nr exp − ky − ρHxj k2F . (3) bounding technique [8, p. 261-262]. The average BER for
π
Remark 2: The detection rule is a maximization problem GSSK is union bounded as
" #
over all effective columns of H (there are M of them). Es- X
sentially, these effective columns act as random constellation Pe,bit ≤ Exj N (j, k)P (xj → xk )
k
points for GSSK modulation. X X N (j, k)
= P (xj → xk ) , (4)
C. Constellation M
j k
We now look into GSSK’s constellation in more detail
and highlight some of its strength. Consider a fixed channel where N (j, k) is the number of bits in error between the
realization H, and the effective Nr −dim constellation symbol constellation vector xj and xk , and P (xj → xk ) denotes the
xj,eff = Hxj , shown in Fig. 2 for APM and GSSK. In APM, pairwise error probability (PEP) of deciding on xk given that
the effective constellation X eff is composed of scaled versions xj is transmitted. By using (2), the PEP conditioned on H is
of the vector hxj . But in GSSK, X eff is made up of scaled given by
¡√ ¢
versions of all effective columns of H. Decisions for APM P (xj → xk | H) = P (dk > dj | H) = Q κ ,
are performed in the 1 − dim complex space, independent ½³ ´H ¾
√ 0
of which antenna is used (since after matched filtering, the where dj = Re y − 2 hj,eff ρ
hj,eff and Q (x) =
sufficient statistics are scalar). On the other hand, GSSK R ∞ 1 − t2
decisions are made in the Nr −dim space. We therefore expect x 2π
e 2 dt. We define κ as
GSSK to outperform APM schemes for increasing M and Nr . 2Nr
Also, better performance is achieved in GSSK for channel ρ0 X
κ, khj,eff − hk,eff k2F = α2n , (5)
realizations having effective columns that are widely spread 2 n=1
apart in the Nr − dim space, which depend on the stochastic ¡ ¢
properties of the channel and can be capitalized upon for where αn ∼ N 0, σ2α , σ2α = ρd(j,k) 4nt
, and d (j, k) is the
adaptive forms of GSSK. As well, X can be formulated to number of distinct columns of H between hj,eff and hk,eff .
optimize the distance spectrum of GSSK’s X eff , by exploiting Remark 4: The metric affecting the system performance is
GSSK’s degrees of freedom, namely nt and Nt . the distance between the effective columns of H. We hinted
at this observation earlier in Section II-C, when analyzing
x2,eff = hx2 x3,eff = h3,eff GSSK’s constellation. Also, we can choose hj,eff ’s (i.e. X )
x1, eff = h1,eff such that large d (j, k)’s are obtained, which translates into
x1, eff = hx1 achieving better performance.
h The random variable κ in (5) is chi-squared distributed with
APM GSSK
s = 2Nr degrees of freedom, and PDF pκ (v) given by [8, p.
x2,eff = h2,eff 41]. The PEP can then be formulated as
P (xj → xk ) = Eκ [P (xj → xk | H)]
Fig. 2. Illustration of the effective constellation space X eff .
Z∞
¡√ ¢
= Q v pκ (v) dv, (6)
Remark 3: It is using the column indices of H as the
source of information that results in the improved constellation v=0
space, and not the fact that different columns are being used which has a closed form expression given in [9, Eq. (64)].
for transmission. For example, if APM with transmission Thus,
on alternating antenna indices is considered, X eff would not Nr −1 µ ¶
X Nr − 1 + k
change since at any given time, the receiver explores only P (xj → xk ) = γ N r
[1 − γ α ]k , (7)
α
all possible transmit symbols. The actual antenna indices are k=0
k
³ q 2 ´
σα
where γ α = 12 1 − 1+σ 2 , and is a function of j and k. we consider only minimizing the parameter γ α instead. Hence,
α
Plugging (7) into (4), we obtain the second constellation design rule is given by
XX
µ ¶ θ̂2 = arg max σ 2α
1 XX
NXr −1
Nr − 1 + k
Pe,bit ≤ N (j, k)γ Nα
r
[1 − γ α ]k . θ2
j k
M k
j k k=0 1 XX
(8) = arg max d (j, k) (12)
θ2 nt j k
B. Diversity ³ ´
In order to clearly show the system diversity, we re-derive where θ̂2 = N̂t , n̂t , X̂ , θ 2 = (Nt , nt , X ). Therefore, for a
the error probability with
³ a2 ´loose upper bound. Specifically, given Nt and nt value, we maximize the values of d (j, k).
we use Q (x) ≤ 2 exp − x2 [8, p. 54], and upper bound (6)
1 This maximization can be interpreted as having antenna com-
by binations that are as different from one another as possible.
³ ´ Widely varying antenna combinations imply having a large
Z ∞ exp ¡− v ¢ vNr −1 exp − v2 M 0 , which can be increased by choosing a larger Nt , and
2 2σα
P (xj → xĵ ) ≤
N +1 Nr
dv thus increasing the transmitter’s overhead. Note that a large
0 2 r σα Γ (Nr ) nt will also help, but will have adverse effects as well due
1¡ 2 ¢−Nr
to the n1t factor in (12). Depending on system requirements
= σ +1
2 α (i.e. low hardware overhead, or high performance), the range
µ ¶−Nr
d (j, k) of requirements for Nt and nt can be specified, from which
≤ 22Nr +1 ρ−Nr .
nt the optimal combination of Nt and nt can be obtained by (12)
Therefore, the bit error probability is given by through computer search.
Remark 5: The optimal set of parameters may not be
Pe,bit ≤ Cρ−Nr , (9) unique, since several sets may result in identical performance.
X X N(j,k) ³ ´−Nr Also, this trade-off between transmitter complexity and per-
2Nr +1 d(j,k)
where C = M 2 nt . We clearly see formance provides design flexibility, which can be exploited
j k in adaptive type systems.
from (9) that a diversity order of Nr is achieved, which is Figure 3 illustrates GSSK’s performance bounds given by
the same as that of an MRC-APM system using Nr receive (8), with M = 8 and M = 32, and for varying Nt ’s. For each
antennas. plot, nt and X are obtained by computer simulations using
IV. O PTIMAL C ONSTELLATION D ESIGN (12).
We consider the optimal formulation of GSSK’s constel- 10
0