 Research
 Open access
 Published:
DFTbased lowcomplexity optimal cell ID estimation in NBIoT
EURASIP Journal on Advances in Signal Processing volume 2020, Article number: 14 (2020)
Abstract
This paper deals with cell identifier (ID) estimation for narrowbandInternet of things (NBIoT) system. It is suggested to transform the usual maximum likelihood (ML) estimator expression in order to highlight a discrete Fourier transform (DFT), which can be computed with fast algorithms. Therefore, the proposed method is a DFTbased lowcomplexity cell ID estimator that can be qualified as optimal in the ML sense. The principle is extended to the practical case where the channel is unknown and must be estimated. In this scenario, the concentrated likelihood function needs to be maximized, in which the ML channel estimate is a function of the unknown cell ID parameter. This operation only involves a few additional multiplications. Simulation results reveal that the performance of the proposed method actually matches the optimal one of the ML cell ID estimator. Furthermore, the technique is robust to residual frequency offset up to several hundreds of Hertz. We also show that the mean square error of channel estimation reaches its CramérRao bound (CRB).
1 Introduction
The Internet of things (IoT) market is growing rapidly as the number of applications increases in various domains such as industry, smart home, smart cities, and agriculture. Among the lowpower wide area (LPWA) technologies allowing for longrange applications [1–3], narrowbandIoT (NBIoT) is a promising solution as it is inherited from longterm evolution (LTE) [4–7]. Thus, similar to LTE, NBIoT devices work in licensed frequency bands, occupying one resource block of the LTE system. Moreover, every device must be synchronized with an evolved node B (eNB) to connect the network. The synchronization process is carried out according to two main steps: the devices physically synchronize with the eNBs using the narrowband primary synchronization signal (NPSS) [8–11] and then seek the cell identifier (ID) of the neighboring eNBs through the narrowband secondary synchronization signal (NSSS). In this paper, we focus on the cell ID estimation process.
The cell ID can take 504 different values and is transmitted through the NSSS as a combination (multiplication) of a ZadoffChu (ZC) sequence and a Hadamard sequence. Few papers dealing with the cell ID estimation in NBIoT have been proposed in the literature yet. In [12], the exhaustive maximum likelihood (ML) cell ID search is suggested, and computational simplifications are established in [13, 14]. The ML leads to a crosscorrelations between the observations (i.e., the received NSSS) and all the possible combinations of ZC and Hadamard sequences. The presented reductions of complexity in [13, 14] are based on the fact that the Hadamard sequences composing the NSSS consist in ± 1 elements. As a consequence, all the multiplications of the NSSS observation by the Hadamard sequences do not need to be computed as it only changes the sign of the observation samples. Despite their advantageous reduction of complexity, the methods in [13, 14] are based on crosscorrelation and do not take further advantage of the NSSS features to simplify the cell ID estimation.
In this paper, we suggest to rewrite the crosscorrelation in the cell ID ML estimator as a discrete Fourier transform (DFT) of the observations. To do so, we first notice that the ZC sequence consists in complex exponential samples that can then be transformed and reformulated as the coefficients \(\omega ^{\text {kn}} = e^{2 j \pi \frac {\text {kn}}{N}}\) of the DFT. It results that algorithms for fast computations of DFTs [15, 16] can be used, therefore reducing the complexity of the ML estimator. Furthermore, the suggested method is also compatible with other simplifications based on the property of Hadamard sequences [13, 14]. In addition, we deal with the practical case where the channel is unknown and must be jointly estimated with the cell ID. It is proved that the complex argument of the channel only needs to be estimated, as the modulus of the channel is not involved in the maximization of the likelihood function. Besides, we show that the cell ID can then be estimated by maximizing the socalled concentratedlikelihood function in which the channel argument is substituted by the estimated one and whose value only depends on the cell ID value. This operation only slightly increases the complexity of the proposed ML estimator. The simulation results show that the performance of the suggested method actually matches that of the exhaustive ML and that it remains accurate for residual frequency offset of several hundreds of Hertz. Moreover, it is verified through simulations that the mean square error (MSE) of the estimator of the channel phase reaches the CramérRao bound (CRB).
The rest of the paper is organized as follows: Section 3 presents the NSSS reception model, including the exhaustive ML cell ID search. Section 4 introduces the suggested lowcomplexity ML estimator, and it is extended to the practical case where the channel needs to be estimated. The performance of the estimator is shown and discussed in Section 5, and Section 6 concludes this paper.
Notation: the vectors and matrices are written in boldface x and uppercase boldface X, respectively, and the scalars are written in normal font x. ∥.∥ represents the Euclidian norm, . the modulus (of complex scalar), and Re{.} the real part. Moreover, x^{∗}, arg(.), and (.)^{H} stand for the conjugate, the argument, and the Hermitian (complex conjugate) operators, respectively. The modulo is written mod, the mathematical expectation is denoted by \(\mathbb {E}\{.\}\), and ⊗ is the Kronecker product.
2 Method
The aim of this study is to prove that the ML estimation of the cell ID in NBIoT system can be carried out through a simple DFT without loss of performance compared with the exhaustive search. The paper includes a theoretical development that describes the DFTbased ML cell ID estimator and simulation results that show the relevance of the suggested method. The theoretical study does not require any specific material, and the simulations have been carried out with MatLab R2016a.
3 NSSS reception
3.1 System model
This section describes the received NSSS, which is also detailed in [17]. The NSSS is composed of 11 OFDM symbols of 12 subcarriers, namely 11×12=132 resource elements. It is assumed that the timefrequency synchronization has been accurately performed thanks to the NPSS [8–11], in such way that the residual synchronization errors are negligible. Otherwise, the effect of the potential residual errors will be discussed in Section 5. Furthermore, since the signal is narrowband, it is reasonable to suppose that the frequency response of the channel is constant over the NSSS resource block of 12 subcarriers. Thus, after the cyclic prefix removal and the DFT over the 11 OFDM symbols, the received NSSS column vector y of size N=132 can be expressed as
where α is the complex channel coefficient, w is the additive white Gaussian noise (AWGN) vector of size N×1 containing the samples \(w_{n} \sim \mathcal {CN}(0,\sigma ^{2})\), and d is the transmitted NSSS sequence, whose elements d_{n} are defined in [17] as
where {b_{q}(m)∈{−1,1}} is one of the four Hadamard sequences defined in Table 10.2.7.2.11 in [17], which has been reproduced in Table 1. Moreover, we have
where n_{f} is the frame number, which is always even. Furthermore, we have:
with \(N_{\text {ID}}^{\text {Ncell}}\) the cell ID of the eNB.
For a sake of clarity, we can rewrite (1) in a detailed form as follows:
where B,θ, and X(q,θ_{f}) are the N×N diagonal matrix composed of the elements \(\phantom {\dot {i}\!}b_{q}(m), e^{2j\pi \theta _{f} n}\), and \(\phantom {\dot {i}\!}b_{q}(m)e^{2j\pi \theta _{f} n}\), respectively. Note that the diagonal elements of X(q,θ_{f}) are taken from a finite set {±1,±j}. The N×1 vector e(u) contains the ZC sequence [18, 19] \(\phantom {\dot {i}\!}e_{n}(u)=e^{j\frac {\pi u n'(n'+1)}{131}}\), where the parameter u is called the root of the sequence. In the following, the estimation of the cell ID results in finding the parameters (u,q) from the observation y, as the cell ID can be expressed from (4) as
It can be noticed that the estimation of the cell ID does not require that of the parameter θ, but it must be nevertheless properly estimated in order to unscramble the received NSSS sequence, i.e., remove the sequence θ.
3.2 Maximum likelihood cell ID estimation
The ML estimation of u, q, and θ_{f} leads to an exhaustive search of the optimal parameters through the likelihood function of complex observation y, denoted by L, which can be expressed as
where C is a constant that can be omitted in the following developments since it does not depend on (u,q,θ_{f}). Since X_{n}^{2}=1 and e_{n}(u)^{2}=1 for any X_{n}∈{±1,±j}, we can develop (7) as
which can be rewritten in a scalar form as
The crosscorrelation in (9) requires N_{m}=16×126×132=266112 complex multiplications, where 16 corresponds to q×θ_{f} possible values, and 126 corresponds to u possible values. Furthermore, it requires the a priori knowledge of the channel coefficient α or it must be estimated. In the following, we take advantage of the ZC sequence \(e_{n}(u)=e^{j\frac {\pi u n'(n'+1)}{131}}\) to rewrite (9) as a DFT, therefore simplifying the process. Furthermore, the estimation of the channel is tackled as well.
4 Suggested lowcomplex ML cell ID estimation
This section presents the way to reformulate the ML estimator (9) into a simplest form using DFT. The principle of the method is first detailed in an ideal case where the channel is supposed to be known (or at least accurately estimated), and we then extend to a more general case where both the cell ID and the channel are estimated through ML using DFT formulation.
4.1 Ideal case: known channel
In order to reduce the complexity of the cell ID estimation, we can rewrite (9) by means of a DFT. For clarity purpose, we note \(z_{n} = y_{n}^{*} \alpha X_{n}(q,\theta _{f})\), then (9) can be expressed as
To further develop the sum in (10), it should be noticed that n^{′}(n^{′}+1) is always even, for every even or odd n^{′} and can be expressed as
To recognize a DFT, we define \(\tilde {n} = \binom {n'+1}{2} \mod 131\) such that the sum in (10) can be rewritten as
We show in Fig. 1\(\tilde {n} = n'(n'+1) \mod 131\) versus n, with n^{′}=n mod 131. Thus, we can observe that \(\tilde {n}\) is symmetrical according to n=65, i.e., for any n_{1}<65, there exists a 65<n_{2}≤130 such as n_{1}+n_{2}=130 and \(\tilde {n}_{1} = \tilde {n}_{2}\). Moreover, the set \(\Omega _{n} = \{\tilde {n} = \binom {n'+1}{2} \mod 131n=0,1,..,N1\}\) is a subset of [ [0,131] ]. As a consequence, we can rearrange the elements \(z_{n} e^{j\arg (z_{n})}\) in order to highlight the DFT. To this end, we define p_{k} as
Finally, from (12) and the rearrangement in (13), we obtain:
where we recognize the DFT of p_{k}. By defining the vector p=[p_{0},p_{1},…,p_{N−1}], the ML estimator of u, q, and θ_{f} can be simply expressed as
Figure 2 illustrates Re{DFT(p)} versus u, for a ZC sequence featuring a root u=7. We can see a peak at u=7, which proves the relevance of the suggested transformation. The direct computation of (15) using DFT has a complexity of 16×66×126=133056 complex multiplications, which is very similar to the exhaustive search in (9). This is because 131 is a prime number. However, this can be reduced by using an algorithm for fast calculation of prime DFT, such as FFTW^{Footnote 1}, chirpz algorithm [15], or generalized Goertzel algorithm [16]. Thus, considering the complexity analysis of the chirpz algorithm [15] for instance, the computation of (15) requires 2 multiplications of size 132, one of size 256 (the first power of 2 larger than 132), and 2 FFTs of size 256. Therefore, the complexity of (15) is of order 16×4016=73856 where 16 correspond to the estimation of (u,θ_{f}) and 4016 to the chirpz algorithm. This is of order four times less complex than the exhaustive search (9) and could be even simplified. In fact, it must be noted that the FFT is sparse, as only 66 samples over 131 are nonzero in the input vector p; therefore, numerous multiplications can be avoided. Furthermore, we can take advantage of the fact that X_{n}(q,θ_{f})∈{±1,±j} to further simplify (15) since the 16 possible combinations (q,θ_{f}) can be tested with straightforward changes of signs in the different sums that compose the FFTs. The complexity could then be reduced by eight, namely 9232 multiplications, leading to a computation cost similar to that in [13, 14]. However, note that the different FFT implementations are out of the scope of this paper and then not further dealt with in this work. In the following, we extend the suggested solution to a more realistic case where the channel is unknown and must be estimated.
4.2 ML cell ID and channel estimation
From (9), we can notice that the substitution \(\phantom {\dot {i}\!}\alpha = \alpha e^{j\phi _{\alpha }}\) with ϕ_{α} the argument of α, yields:
since α is independent of (u,q,θ_{f}) and can then be removed from (9). We deduce that it is sufficient to focus on the estimation of ϕ_{α} to, in turn, estimate \((\hat {u},\hat {q},\hat {\theta }_{f})\). Thus, the ML estimation of ϕ_{α} can be expressed, after straightforward developments, as
Hence, solving \(\frac {\partial }{\partial \phi _{\alpha }} f(\phi _{\alpha }) = 0\) leads to
since the denominator is the conjugate of the numerator. The CRB [20, 21] of this estimator is given by \({CRB} = \frac {\sigma ^{2}}{2\alpha ^{2}N}\), such as proved in Appendix 6. In the following, we note the estimate \(\hat {\phi }_{\alpha }(u,q,\theta _{f})\) in order to highlight its dependency to the unknown discrete parameters. Furthermore, we can rewrite the ML estimator (16) by substituting the likelihood function L by the concentratedlikelihood one (including the estimate \(\hat {\phi }_{\alpha }(u,q,\theta _{f})\)), leading to
Interestingly, it must be noticed that the sum \(\sum _{n = 0}^{131} y_{n}^{*} X_{n}(q,\theta _{f}) e_{n}(u)\) is found in both (18) and (19). It can then be computed only once by using the DFTbased method leading to (15) with \(z_{n} = y_{n}^{*} X_{n}(q,\theta _{f})\) and (19) then becomes
The joint ML cell ID and channel estimation algorithm can be summarized as follows:
 1.
Compute DFT(p) with \(z_{n} = y_{n}^{*} X_{n}(q,\theta _{f})\) by using an algorithm such as the chirpz transform. This step has the same complexity as that discussed after (15).
 2.
Estimate \(\hat {\phi }_{\alpha }(u,q,\theta _{f})\) in (18). The computation of \(\hat {\phi }_{\alpha }(u,q,\theta _{f})\) requires the ratio of the real and the imaginary parts of \(\sum _{n = 0}^{131} y_{n} X_{n}^{*}(q,\theta _{f}) e_{n}^{*}(u)\) to feed the arctangent function. The computational cost is then 16×126=2016 multiplications, corresponding to all possible (u,q,θ_{f}) values.
 3.
Estimate (u,q,θ_{f}) in (20). This also requires 2016 multiplications.
The general algorithm for joint cell ID and channel estimation then requires 4032 more complex multiplications than the ideal case where the channel is supposed to be known. This is a reasonable additional complexity compared to the ML, even in simplified implementations such as the suggested one or those presented in [13, 14]. Table 2 summarizes the achievable complexity of the suggested DFTbased cell ID estimator compared with [12–14], given in a number of complex multiplications. The indicated value 73856 is given considering the chirpz algorithm for the computation of the DFT. In that case, the computation cost is of the same order as [13]. Moreover, if we consider further simplifications (sparse DFT and X_{n}(q,θ_{f})∈{±1,±j}, not dealt with in this paper), the complexity could be reduced to 9232, i.e., of the same order as [14]. In addition, the channel estimation has been added as well, which is not considered in [12–14].
Unfortunately, we cannot theoretically predict the estimation performance in case of discrete unknown parameters (except in binary detection), such as done through CRB for continuous parameters. In fact, it is only tractable to asymptotically predict the probability of estimation errors, such as hereby presented. As a consequence, we will show the accuracy of the estimators (15) and (20) through simulations in Section 5.
4.3 Asymptotic error probability analysis
In this section, we carry out an asymptotic analysis of the probability of error of cell ID estimation for the ML estimators (9) and its DFTbased version (15). An error of cell ID estimation occurs if q, u, or both parameters are badly estimated. We denote by \(\mathcal {P}\) this probability, then it is expressed as
We can reasonably assume that the events are independent (this assumption will be verified in Section 5), therefore \(\mathcal {P}\) simplifies to
Unfortunately, the probabilities \(\mathbb {P}(\hat {q} \neq q)\) and \(\mathbb {P}(\hat {u} \neq u)\) (respectively \(\mathbb {P}(\hat {q} = q)\) and \(\mathbb {P}(\hat {u} = u)\)) do not have tractable expressions, as they involve multiple integrals of multivariate Gaussian distributions. However, we can straightforwardly obtain the upper bound of the probabilities in (22) when σ^{2} tends to +∞. In that case, the events \(\hat {q} = q\) and \(\hat {u} = u\) are equiprobable for any q and u, respectively. As a consequence, we have \({\lim }_{\sigma ^{2} \to +\infty } \mathbb {P}(\hat {q} \neq q) = \frac {3}{4}\) and \({\lim }_{\sigma ^{2} \to +\infty } \mathbb {P}(\hat {u} \neq u) = \frac {125}{126}\), yielding \({\lim }_{\sigma ^{2} \to +\infty } \mathcal {P} = \frac {503}{504}\). In fact, this corresponds to the probability of missing the cell ID in a random choice of the cell ID among the 504 possible values.
5 Simulations and discussion
5.1 Simulations results
The simulation results have obtained using MatLab, and 10^{5} independent runs per point have been performed. The channel coefficient obeys a zeromean complex Gaussian distribution with unitary variance. The signal to noise ratio (SNR) is defined as \(\text {SNR} = \frac {\mathbb {E}\{\\alpha \mathbf {d}\^{2}\}}{\mathbb {E}\{\\mathbf {w}\^{2}\}}\). In the simulations, the chirpz algorithm [15] has been used, but we remind that other fast DFT techniques could be applied. Note that for simplicity matter, we use a descriptive shortcut in all the following comments. Thus, we mention the “ML cell ID estimation” whereas we refer to the ML estimations of (u,q,θ_{f}) (e.g., in (9) or (15)). The actual cell ID estimation is obtained from the estimate \((\hat {u},\hat {q})\) using (6), i.e., \(\hat {N}_{\text {ID}}^{\text {Ncell}} = 126\hat {q} + \hat {u} 3\).
5.1.1 Known channel
In Fig. 3, we compare the ML exhaustive cell ID search (9) and the suggested DFTbased implementation (15) through the probability of error of estimation versus SNR in the range [−15,−2] dB. We assume the ideal case where the channel is known. It can be verified that both trajectories match, as a very slight difference (<0.1 dB) can be observed. The latter can be due to the computation in transformed domains that are involved in the suggested algorithm. In fact, it can be seen for instance in Fig. 2 that Re{DFT(p)} is not null around the peak at u=7, which may lead to few errors in low SNR range. However, this result shows that the suggested implementation of the ML estimator does not change its performance as the difference is negligible. We can observe that the probability of estimation error dives below 10^{−3} for SNR values larger than – 7.5 dB, showing the robustness of the ML estimator.
Figure 4 shows \(\mathcal {P}\) versus SNR from – 20 to – 8 dB, the different probabilities of error developed in (21) and (22) and the corresponding asymptotes in very low SNR range. It can be observed that it is more likely to badly estimate both u and q than one of the parameter for any SNR value. Moreover, the asymptotes 0.744, 0.248, and 0.006 well fit \(\mathbb {P}(\hat {u} \neq u \cap \hat {q} \neq q), \mathbb {P}(\hat {u} \neq u \cap \hat {q} = q)\), and \(\mathbb {P}(\hat {u} = u \cap \hat {q} \neq q)\), respectively, in a very low SNR range. This shows that the assumption of independence of the events holds, as for instance
The assumption of independence of the events is also verified in Fig. 4 as we can see that (22) holds. In fact, the behaviors of \(\mathcal {P}\) and \(\mathbb {P}(\hat {q} \neq q) + \mathbb {P}(\hat {u} \neq u)\mathbb {P}(\hat {q} = q)\) exactly match for any SNR value.
5.1.2 Estimated channel
Figure 5 compares the probability of error of the suggested cell ID estimation versus SNR in the ideal cases where the channel is supposed to be known with the more practical case where the channel phase is estimated. It can be observed that the performance of the cell ID estimation where the channel is estimated is only 0.8 dB weaker than the ideal case. This shows that the substitution of the likelihood function by the concentratedlikelihood function only slightly degrades the performance and that the channel phase is accurately estimated in (18).
In order to confirm the previous statement, we show in Fig. 6 the MSE of the channel phase estimator versus SNR, where the MSE is defined as
Moreover, it is compared with the CRB previously defined. It can be seen in Fig. 6 that the MSE matches the CRB, the phase estimator is then optimal in the ML sense.
5.2 Discussion
5.2.1 Performance of the method under residual frequency offset hypothesis
In this section, we consider the nonidealistic case where a residual frequency offset still remains after the physical synchronization stage thanks to NPSS. Thus, Fig. 7 shows the performance of the suggested ML cell ID estimator (20) (i.e., the channel phase is estimated) in the presence of a phase offset Δ_{f} taken in the set {100,200,400} Hz. We can observe in Fig. 7 that the estimation error behaviors corresponding to Δ_{f}=100,200, and 400 Hz experience performance losses of 0.1, 0.4, and 1.3 dB, respectively. These results show the robustness of the DFTbased ML cell ID estimator to the residual errors, in particular, if it is below 200 Hz.
5.2.2 Suboptimal MLbased estimator
In order to avoid the channel phase estimation step, we suggest to rewrite (20) by substituting the real part by the modulus operator as follows:
This new expression is referred as the “alternative form” of the ML estimator. It is supposed to be suboptimal compared with the DFTbased ML method in (20), as it is not obtained from the maximization of the (concentrated) likelihood function. However, it is shown in Fig. 8 that the performance of the alternative form actually matches that of the DFTbased ML estimator. This could be due to the channel model we assumed: we considered an invariant channel over 12 subcarriers. Thus, taking the modulus removes the channel phase in the expression of the estimator. We draw from Fig. 8 that in very low frequency selectivity conditions, if the channel does not need to be estimated, then the alternative ML form (24) can be used without loss of performance compared with (20).
5.2.3 Performance in frequency selective channel
The channel was considered constant over the 180 kHz bandwidth in previous simulations. This is justified by the fact that it can be reasonably assumed that the channel is shorter than the cyclic prefix duration of 4.7 μs. It results that the coherence bandwidth of the channel is larger than \(\frac {1}{4.7\times 10^{6}} \approx 212.7\) kHz, i.e., larger than the 180 kHz bandwidth of the NSSS signal. However, more realistic channel models should be considered, taking into account the slight frequency selectivity within the 180 kHz. To this end, a four taps channel h=[h_{0},h_{1},h_{2},h_{3}] has been simulated, where the coefficients h_{i} are zeromean complex Gaussian variables (i.e., h is a Rayleigh channel) with the same variance \(\mathbb {E}\{h_{i}^{2}\} = \frac {1}{4}\). The delay between two taps has been set to 1 μs, such that the maximum delay is shorter than the cyclic prefix. Note that in that case, (1) should be rewritten to highlight the frequency selectivity. Thus, if the channel is supposed to be temporarily static over the 11 OFDM symbols, then (1) becomes
where \(\bar {\mathbf {H}}\) is a 132×132 diagonal channel matrix which can be expressed as \(\bar {\mathbf {H}} = \mathbf {I} \otimes \mathbf {H}\), with I the 11×11 identity matrix, and H the 12×12 diagonal matrix containing the channel frequency response [H_{0},H_{1},..,H_{11}]. Therefore, each subcarrier is weighted by a complex coefficient \(\phantom {\dot {i}\!}H_{m} = r_{m} e^{j \phi _{m}}, m=0,1,..,11\).
Figure 9 shows the corresponding error probability versus SNR (dB) for both the suggested DFTbased implementation (15) compared with the alternative form. It can be observed that the probability of error is larger in Fig. 9 than in Fig. 8, due to the effect of the frequency selectivity. The error probability is even lower bounded for higher SNR values. Once again, both trajectories match, but this behavior is not further investigated in this paper. However, the advantage of the DFTbased implementation using the channel estimation compared with the modulus form is that it can be adapted to cope with frequency selective channels. Thus, the phase estimation (18) can be redefined for any subcarrier index m∈{0,1,..,11} as
where the sum corresponds to the 11 OFDM symbols. The modulus r_{m} could be also estimated similarly (knowing that ZC sequences have unitary modulus) and integrated in the concentratedlikelihood function to jointly estimate the channel coefficients H_{m} and the cell ID. However, this is not further detailed in this paper.
5.2.4 Possible use of the method in other applications
We hereby discuss the possible application of such a suggested method in other applications. As a general comment, it must be noted that the DFTbased algorithm can be used to solve any problem where the root u of a ZC sequence must be estimated from noisy observations y. For instance in LTE, ZC sequences are used to generate signals in both downlink and uplink. Thus, in downlink, the cell ID is split into two values: one is transmitted through the PSS generated with ZC sequences and the other one is transmitted through the SSS generated with binary sequences [17]. The PSS in LTE is then used for both physical synchronization and part of the cell ID estimation, by estimating the ZC root value u among {0,1,2}. The suggested technique could then be used to estimate u from PSS, but with some limitations in the presented form. First the reduction of complexity is effective when the set of possible ZC roots is large, which is not the case as u∈{0,1,2}. Second, the proposed method requires a prior physical synchronization, and it is not adapted to perform both synchronization and estimation yet.
In uplinkLTE [17] and 5Gnew radio (5GnR) [22], ZC sequences are also used by UEs to generate preambles that are transmitted to start the random access procedure, i.e., to inform the eNBs that UEs intend to access the network. To this end, each UE randomly chooses a preamble among a predefined list, and the corresponding ZC root u defines a random access preamble identifier (RAPID). This RAPID is then retransmitted by the eNB to initiate contention resolution among UEs. The eNBs then require to properly estimate the root u, and the suggested method could therefore be used to accurately perform this step.
6 Conclusion
In this paper, we have presented a DFTbased lowcomplexity estimator of the cell ID in NBIoT, which is optimal in the ML sense. In fact, the ML estimator leads to a crosscorrelation between the observation and a ZC sequence defined as a complex exponential. Thus, by transforming and interchanging the samples of the observation, the crosscorrelation can be rewritten as a DFT. It follows that an algorithm for fast computation of DFTs can be used, reducing the complexity of the ML estimator. This principle has been extended to the case where the channel must be estimated. The channel estimate is then introduced in the likelihood function, leading to the maximization of the concentrated likelihood function. This operation can be carried out with a slight additional complexity. The simulation results have shown that the proposed method indeed reaches the performance of the exhaustive ML cell ID search. Furthermore, other series of simulations have revealed that the DFTbased technique is robust to the residual frequency offset, as it experiences ≤0.5 dB loss up to 200 Hz offset. Further investigations will be undertaken in future works in order to adapt the estimator to frequency selective channels.
7 Appendix: cramérRao bound of ϕ_{α} estimator
The CRB [20, 21] is defined as
where L is defined in (7), and then
Since for any n=0,1,..,131, we have
then we obtain \(CRB = \frac {\sigma ^{2}}{2\alpha ^{2}N}\) where N=132.
Availability of data and materials
Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.
Notes
see FFTW site http://www.fftw.org/
Abbreviations
 AWGN:

Additive white Gaussian noise
 CRB:

CramérRao bound
 DFT:

Discrete fourier transform
 FFT:

Fast fourier transform
 ID:

Identifier
 IDFT:

Inverse discrete fourier transform
 eDRX:

Extended discontinuous reception
 eNB:

Evolved node B
 IoT:

Internet of things
 LMMSE:

Linear minimum mean square error
 LPWA:

Low power wide area
 LTE:

Longterm evolution
 ML:

Maximum likelihood
 MSE:

Mean square error
 NBIoT:

Narrowband Internet of things
 NPSS:

Narrowband primary synchronization signal
 NSSS:

Narrowband secondary synchronization signal
 OFDM:

Orthogonal frequency division multiplexing
 ZC:

ZadoffChu
References
U. Raza, P. Kulkarni, M. Sooriyabandara, Lowpower wide area networks: an overview. IEEE Commun. Surv. Tutor.19(2), 855–873 (2017).
K. Mekki, E. Bajic, F. Chaxel, F. Meyer, A comparative study of LPWAN technologies for largescale IoT deployment. Elsevier ICT Express. 5(1), 1–7 (2019).
A. Ikpehai, B. Adebisi, K. M. Rabie, K. Anoh, R. E. Ande, M. Hammoudeh, H. Gacanin, U. M. Mbanaso, Lowpower wide area network technologies for Internetofthings: a comparative review. IEEE Internet Things J.6(2), 2225–2240 (2019).
J. Gozalvez, New 3GPP Standard for IoT [Mobile Radio]. IEEE Veh. Technol. Mag.11(1), 14–20 (2016).
R. Ratasuk, N. Mangalvedhe, Y. Zhang, J. P. Robert, M. Koskinen, in Proc. of CSCN’16. Overview of narrowband IoT in LTE Rel13 (Berlin, 2016), pp. 1–7.
J. Schlienz, D. Raddino, Narrowband Internet of Things  Whitepaper, Technical report (Rohde & Schwarz, 2016).
Y. P. E. Wang, X. Lin, A. Adhikary, A. Grövlen, Y. Sui, J. Blankenship, Y. Bergman, H. S. Razaghi, A primer on 3GPP narrowband Internet of Things. IEEE Commun. Mag.55(3), 117–123 (2017).
H. Kröll, M. Korb, B. Weber, S. Willi, Q. Huang, in Proc. of WCNCW’17. Maximumlikelihood detection for energyefficient timing acquisition in NBIoT (San Francisco, 2017).
K. Manolakis, D. M. GutiérrezEstévez, V. Jungnickel, W. Xu, C. Drewes, in Proc. of WCNC’09. A closed concept for synchronization and cell search in 3GPP LTE Systems (Budapest, 2009).
Qualcomm, in 3GPP TSG RAN WG1. NBPSS and NBSSS design, Technical Report Tech. Rep. R1161981 (SophiaAntipolis, 2016).
A. Bhamri, L. Zexian, L. Lindh, C. Ribeiro, in Proc. of VTC’2015Fall. Primary synchronization signal detection method for devicetodevice in LTERel 12 and beyond (Bosto, 2015).
Intel Corporation, in 3GPP TSG RAN WG1. Synchronization and cell search in NBIoT: performance evaluations. Technical Report Tech. Rep. R1161898 (SophiaAntipolis, 2016).
A. Ali, W. Hamouda, On the cell search and initial synchronization for NBIoT LTE systems. IEEE Commun. Lett.21(8), 1843–1846 (2017).
Y. B. Li, S. Chen, W. Ye, F. Lin, A joint lowpower cell search and frequency tracking scheme in NBIoT systems for green Internet of Things. Sensors. 18(10), 22 (2018).
L. R. Rabiner, R. W. Schafer, C. M. Rader, The Chirp ztransform algorithm. IEEE Transactions on Audio and Electroacoustics. AU17(2), 86–92 (1969).
P. Rajmic, Z. Prusa, C. Wiesmeyr, in Proc. of EUSIPCO’14. Computational cost of chirp Ztransform and generalized Goertzel algorithm (Lisbon, 2014).
3GPP, 3GPP TS 36.211, Physical channels and modulation (Release 14), Technical report (3GPP, 2017).
R. Frank, Polyphase codes with good nonperiodic correlation properties. IEEE Trans. Inf. Theory. 9(1), 43–45 (1963).
D. Chu, Polyphase codes with good periodic correlation properties. IEEE Trans. Inf. Theory. 18(4), 531–532 (1972).
D. C. Rife, R. R. Boorstyn, Singletone parameter estimation from discretetime observations. IEEE Transactions on Information Theory. IT20(5) (1974).
S. M. Kay. Fundamentals of statistical signal processing : estimation theory (Prentice Hall, 2003), pp. 157–214.
3GPP, 3GPP TS 38.211, Physical channels and modulation (Release 16). Technical report (3GPP, 2019).
Acknowledgements
Not applicable
Funding
Not applicable
Author information
Authors and Affiliations
Contributions
The author carried out both the theoretical developments and the simulations. The author read and approved the final manuscript.
Corresponding author
Ethics declarations
Consent for publication
Not applicable
Competing interests
The author declares that he has no competing interests.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Savaux, V. DFTbased lowcomplexity optimal cell ID estimation in NBIoT. EURASIP J. Adv. Signal Process. 2020, 14 (2020). https://doi.org/10.1186/s13634020006774
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s13634020006774