Improper signaling and symbol extensions: How far can we go with Gaussian P2P codebooks in the interfering MAC with TIN?

Meeting the challenges of 5G demands better exploitation of the available spectrum by allowing multiple parties to share resources. For instance, a secondary unlicensed system can share resources with the cellular uplink of a primary licensed system for an improved spectral efficiency. This induces interference which has to be taken into account when designing such a system. A simple yet robust strategy is treating interference as noise (TIN), which is widely adapted in practice. It is thus important to study the capabilities and limitations of TIN in such scenarios. In this paper, we study this scenario modelled as Multiple Access Channel (MAC) interfered by a Point-to-Point (P2P) channel. Here, we focus on rate maximization and power minimization problems separately. We use improper Gaussian signaling (instead of proper) at the transmitters to increase the design flexibility, which offers the freedom of optimizing the transmit signal pseudo-variance in addition to its variance. Furthermore, we allow correlation among the transmitted signals over orthogonal resource basis (i.e., time or frequency) for the purpose of optimal signaling design over the extended channel. We formulate the rate maximization problem as a semidefinite program, and use semidefinite relaxation (SDR) to obtain a near-optimal solution. Numerical optimizations show that, by improper Gaussian signaling the achievable rates can be improved upto three times depending on the strength of the interfering links. Furthermore, we observe significant benefits in power consumption by improper Gaussian signaling with symbol extensions compared to the traditional proper Gaussian signaling. Interestingly, by minimizing sum power given the solution of the rate maximization problem improves the energy efficiency significantly.

[1]  Maria-Gabriella Di Benedetto,et al.  A Survey on MAC Strategies for Cognitive Radio Networks , 2012, IEEE Communications Surveys & Tutorials.

[2]  Syed Ali Jafar,et al.  On the Optimality of Treating Interference as Noise: Compound Interference Networks , 2016, IEEE Transactions on Information Theory.

[3]  Aydin Sezgin,et al.  On the Capacity of the 2-user Gaussian MAC Interfering with a P2P Link , 2011, EW.

[4]  Jan Markendahl,et al.  Device-to-device communications and small cells: enabling spectrum reuse for dense networks , 2014, IEEE Wireless Communications.

[5]  H. Vincent Poor,et al.  An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.

[6]  Zhi-Quan Luo,et al.  Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.

[7]  Shuguang Cui,et al.  Cooperative Interference Management With MISO Beamforming , 2009, IEEE Transactions on Signal Processing.

[8]  H. Vincent Poor,et al.  An introduction to signal detection and estimation (2nd ed.) , 1994 .

[9]  Gerhard Kramer,et al.  A New Outer Bound and the Noisy-Interference Sum–Rate Capacity for Gaussian Interference Channels , 2007, IEEE Transactions on Information Theory.

[10]  H. Vincent Poor,et al.  On the Capacity of Multiple-Access-Z-Interference Channels , 2011, 2011 IEEE International Conference on Communications (ICC).

[11]  Aydin Sezgin,et al.  Capacity Results for a Primary MAC in the Presence of a Cognitive Radio , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[12]  L. Scharf,et al.  Statistical Signal Processing of Complex-Valued Data: The Theory of Improper and Noncircular Signals , 2010 .

[13]  Venugopal V. Veeravalli,et al.  Gaussian Interference Networks: Sum Capacity in the Low-Interference Regime and New Outer Bounds on the Capacity Region , 2008, IEEE Transactions on Information Theory.

[14]  Anas Chaaban,et al.  (Sub-)Optimality of Treating Interference as Noise in the Cellular Uplink With Weak Interference , 2011, IEEE Transactions on Information Theory.

[15]  Syed Ali Jafar,et al.  On the Optimality of Treating Interference as Noise , 2015, IEEE Transactions on Information Theory.

[16]  Hiroshi Sato,et al.  The capacity of the Gaussian interference channel under strong interference , 1981, IEEE Trans. Inf. Theory.

[17]  Venugopal V. Veeravalli,et al.  Gaussian interference networks: sum capacity in the low-interference regime and new outer bounds on the capacity region , 2009, IEEE Trans. Inf. Theory.

[18]  Wei Yu,et al.  Multicell Interference Mitigation with Joint Beamforming and Common Message Decoding , 2011, IEEE Transactions on Communications.

[19]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[20]  Syed Ali Jafar,et al.  Interference Alignment With Asymmetric Complex Signaling—Settling the Høst-Madsen–Nosratinia Conjecture , 2009, IEEE Transactions on Information Theory.

[21]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[22]  Wei Yu,et al.  An introduction to convex optimization for communications and signal processing , 2006, IEEE Journal on Selected Areas in Communications.

[23]  Nikos D. Sidiropoulos,et al.  Transmit beamforming for physical-layer multicasting , 2006, IEEE Transactions on Signal Processing.

[24]  Aydin Sezgin,et al.  Interference alignment and neutralization in a cognitive 3-user MAC-interference channel: degrees of freedom , 2011, 2011 12th Canadian Workshop on Information Theory.

[25]  Gerhard Wunder,et al.  The multiple access channel interfering with a point to point link: Linear deterministic sum capacity , 2012, 2012 IEEE International Conference on Communications (ICC).

[26]  Daniel Pérez Palomar,et al.  Rank-Constrained Separable Semidefinite Programming With Applications to Optimal Beamforming , 2010, IEEE Transactions on Signal Processing.

[27]  Patrick Mitran,et al.  Achievable rates in cognitive radio channels , 2006, IEEE Transactions on Information Theory.

[28]  Anas Chaaban,et al.  (Sub-)Optimality of Treating Interference as Noise in the Cellular Uplink With Weak Interference , 2016, IEEE Trans. Inf. Theory.

[29]  Peter J. Schreier,et al.  Analysis of maximally improper signaling schemes for underlay cognitive radio networks , 2015, 2015 IEEE International Conference on Communications (ICC).

[30]  Erry Gunawan,et al.  Ieee Transactions on Signal Processing, Accepted 1 Transmit Optimization with Improper Gaussian Signaling for Interference Channels , 2022 .

[31]  Eduard A. Jorswieck,et al.  Improper Gaussian signaling on the two-user SISO interference channel , 2011, 2011 8th International Symposium on Wireless Communication Systems.

[32]  Brian M. Sadler,et al.  Cognitive Medium Access: Constraining Interference Based on Experimental Models , 2008, IEEE Journal on Selected Areas in Communications.

[33]  Paul Tseng,et al.  Approximation Bounds for Quadratic Optimization with Homogeneous Quadratic Constraints , 2007, SIAM J. Optim..

[34]  Geoffrey Ye Li,et al.  Cognitive radio networking and communications: an overview , 2011, IEEE Transactions on Vehicular Technology.

[35]  Emre Telatar,et al.  Capacity of Multi-antenna Gaussian Channels , 1999, Eur. Trans. Telecommun..

[36]  Emil Björnson,et al.  Multiobjective Signal Processing Optimization: The way to balance conflicting metrics in 5G systems , 2014, IEEE Signal Processing Magazine.

[37]  Hua Sun,et al.  On the optimality of treating interference as noise , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).