-
A Fully Asynchronous Unsourced Random Access Scheme
Authors:
Mert Ozates,
Mohammad Kazemi,
Gianluigi Liva,
Deniz Gündüz
Abstract:
We investigate fully asynchronous unsourced random access (URA), and propose a high-performing scheme that employs on-off division multiple access (ODMA). In this scheme, active users distribute their data over the transmit block based on a sparse transmission pattern without any limitations on the starting time. At the receiver side, we adopt a double sliding-window decoding approach, utilizing a…
▽ More
We investigate fully asynchronous unsourced random access (URA), and propose a high-performing scheme that employs on-off division multiple access (ODMA). In this scheme, active users distribute their data over the transmit block based on a sparse transmission pattern without any limitations on the starting time. At the receiver side, we adopt a double sliding-window decoding approach, utilizing a smaller inner decoding window of two block lengths within a larger outer window to enhance the interference cancellation process. Within the inner window, the receiver iteratively applies preamble-free joint starting time and pattern detection, single-user decoding, and successive interference cancellation operations. A notable feature of the proposed scheme is its elimination of the need for a preamble for starting time detection; this is achieved using ODMA transmission patterns. Numerical results demonstrate that the proposed asynchronous URA scheme outperforms existing alternatives.
△ Less
Submitted 15 April, 2025;
originally announced April 2025.
-
ODMA-Based Cell-Free Unsourced Random Access with Successive Interference Cancellation
Authors:
Mert Ozates,
Mohammad Kazemi,
Eduard Jorswieck,
Deniz Gunduz
Abstract:
We consider the unsourced random access problem with multiple receivers and propose a cell-free type solution for that. In our proposed scheme, the active users transmit their signals to the access points (APs) distributed in a geographical area and connected to a central processing unit (CPU). The transmitted signals are composed of a pilot and polar codeword, where the polar codeword bits occupy…
▽ More
We consider the unsourced random access problem with multiple receivers and propose a cell-free type solution for that. In our proposed scheme, the active users transmit their signals to the access points (APs) distributed in a geographical area and connected to a central processing unit (CPU). The transmitted signals are composed of a pilot and polar codeword, where the polar codeword bits occupy a small fraction of the data part of the transmission frame. The receiver operations of pilot detection and channel and symbol estimation take place at the APs, while the actual message bits are detected at the CPU by combining the symbol estimates from the APs forwarded over the fronthaul. The effect of the successfully decoded messages is then subtracted at the APs. Numerical examples illustrate that the proposed scheme can support up to 1400 users with a high energy efficiency, and the distributed structure decreases the error probability by more than two orders of magnitude.
△ Less
Submitted 17 January, 2025;
originally announced January 2025.
-
Unsourced Random Access: A Comprehensive Survey
Authors:
Mert Ozates,
Mohammad Javad Ahmadi,
Mohammad Kazemi,
Deniz Gündüz,
Tolga M. Duman
Abstract:
Multiple access communication systems enable numerous users to share common communication resources simultaneously, playing a crucial role in wireless networks. With the emergence of the sixth generation (6G) and beyond communication systems, supporting massive machine-type communications with sporadic activity patterns is expected to become a critical challenge. Unsourced random access (URA) has…
▽ More
Multiple access communication systems enable numerous users to share common communication resources simultaneously, playing a crucial role in wireless networks. With the emergence of the sixth generation (6G) and beyond communication systems, supporting massive machine-type communications with sporadic activity patterns is expected to become a critical challenge. Unsourced random access (URA) has emerged as a promising paradigm to address this challenge by decoupling user identification from data transmission through the use of a common codebook. This survey provides a comprehensive overview of URA solutions, covering both theoretical foundations and practical implementations. We present a systematic classification of URA solutions across three main channel models: Gaussian multiple access channels (GMACs), single-antenna fading, and multiple-input multiple-output (MIMO) fading channels. For each category, we analyze and compare state-of-the-art solutions in terms of performance, complexity, and practical feasibility. Additionally, we discuss critical challenges such as interference management, computational complexity, and synchronization issues. The survey concludes with promising future research directions and potential methods to address existing limitations, providing a roadmap for researchers and practitioners in this rapidly evolving field.
△ Less
Submitted 24 February, 2025; v1 submitted 23 September, 2024;
originally announced September 2024.
-
An ODMA-Based Unsourced Random Access Scheme with a Multiple Antenna Receiver
Authors:
Mert Ozates,
Mohammad Kazemi,
Tolga M. Duman
Abstract:
We investigate the unsourced random access scheme assuming that the base station is equipped with multiple antennas, and propose a high-performing solution utilizing on-off-division multiple access. We assume that each user spreads its pilot sequence and polar codeword to the pilot and data parts of the transmission frame, respectively, based on a transmission pattern. The iterative receiver opera…
▽ More
We investigate the unsourced random access scheme assuming that the base station is equipped with multiple antennas, and propose a high-performing solution utilizing on-off-division multiple access. We assume that each user spreads its pilot sequence and polar codeword to the pilot and data parts of the transmission frame, respectively, based on a transmission pattern. The iterative receiver operation consists of pilot and pattern detection followed by channel vector and symbol estimation, polar decoding, and successive interference cancellation. Numerical findings demonstrate that the proposed scheme has superior performance compared to the state-of-the-art in various antenna settings.
△ Less
Submitted 10 June, 2024;
originally announced June 2024.