Professional Documents
Culture Documents
2, JUNE 2018
Abstract—The problem of signal detection and modulation signals impaired by transmitter imperfections and propagation-
recognition is addressed in both the blind and nonblind con- channel conditions. Restricted versions of the RFSA problem
texts. Many relevant modulation recognition algorithms have are amenable to mathematical optimization, such as when
been created over the past three decades. The essential engineer-
ing tradeoff that fuels the algorithm-invention process is between the universe of signals comprising the scene is restricted to
generality and optimality. Optimal (e.g., maximum-likelihood) digital quadrature amplitude modulation (QAM) with square
algorithms can be devised for narrow subsets of signal types, constellations. More general versions are mathematically
whereas highly general but suboptimal feature-based algorithms intractable and suboptimal feature-based algorithms are typ-
can be devised for wide subsets of types. It has previously ically devised [11]. A class of useful feature-based algorithms
been shown that cyclostationary-based classifiers possess highly
desirable properties, such as tolerance to noise and cochannel exploits signal cyclostationarity (CS) because CS features are
interference, but also that they are computational costly and so relatively insensitive to noise and CCI, and because almost all
are resistant to real-time hardware implementation. In this paper, communication signals exhibit the property [32]–[47].
we present a reduced-complexity method of signal detection A persistent drawback preventing widespread adoption of
and modulation recognition that exploits the cyclostationarity of blind CS-based RFSA systems is large computational cost and
over-the-air observed communication signals. The key idea is to
represent wideband input data as a set of narrowband, contigu- large required system memory. The purpose of this paper is
ous, nonoverlapping subchannels, and then to extract the desired to describe a new approach to CS-based RFSA in which the
cyclostationary features for the wideband data using only sparse computational cost is lowered sufficiently to permit imple-
subsets of the subchannels. mentation on hardware platforms such as FPGAs. The key
Index Terms—Blind modulation recognition, cyclostationary innovation is to apply a channelizing operation on the wide-
signal processing, filterbank channelizer, spectral correlation, band (WB) input sample stream before any cyclostationary
cyclic cumulants, tunneling, spectrum sensing, cognitive radio. signal processing (CSP) algorithms are applied. The remain-
der of the processing extracts the CS features for any signals
in the WB data but uses only operations on sparse subsets of
the channelizer outputs.
I. I NTRODUCTION The novel contributions of this paper are (1) introduction of
UTOMATIC and general radio-frequency scene analysis a mathematical framework that relates the cyclostationarity of
A (RFSA) is a type of signal analysis that is traditionally
associated with spectrum monitoring and surveillance. Like
a spanning set of narrowband (NB) subchannels to the cyclo-
stationarity of the underlying WB signal, (2) a novel low-cost
other kinds of scene analysis—acoustic, dramatic, crime—the non-blind interference-tolerant detection algorithm for signals
ideal form of RFSA provides a comprehensive assessment of with known CS properties, (3) introduction of the cycle-
the scene, resulting in a description that contains all relevant frequency refinement technique of tolerating error in presumed
details as well as higher-level assessments. Recently RFSA has known cycle frequencies, (4) a novel low-cost interference-
become important in the commercial communications world tolerant detection algorithm for signals with unknown CS
as an enabling technology for cognitive radio (CR) [3]–[10]. properties, and (5) a novel low-cost modulation-recognition
A general RFSA algorithm must contend with a wide vari- algorithm for signals with unknown CS properties. This frame-
ety of RF scenes, including the nominal case of a single work and these algorithms are developed to enable operation
weak primary-user (PU) signal, as well as cases involving on a typical FPGA device (e.g., Virtex-6) where conven-
cochannel interference (CCI), signals of unknown type, and tional CSP algorithms are prohibitively costly in terms of
computational cost and required memory.
Manuscript received November 3, 2016; revised May 24, 2017 and October Material related to this paper was first published in [18].
27, 2017; accepted December 28, 2017. Date of publication January 8, 2018;
date of current version June 19, 2018. The authors would like to thank the Since then, Anthony et al. [1] have also been awarded an
Defense Advanced Research Projects Agency for supporting this work under international patent on this technology. In [18] the basic
Contracts W911QX-12-C-0047 and FA8750-11-C-7160. The associate editor approach of using spanning NB subchannels is presented, and
coordinating the review of this paper and approving it for publication was
M. Zorzi. (Corresponding author: Chad M. Spooner.) the various component algorithms were described at a high
C. M. Spooner is with NorthWest Research Associates, Monterey, CA level. In the present paper the algorithms are described in
93940 USA (e-mail: cmspooner@nwra.com). detail and their performance characterized by key assessments
A. N. Mody is with BAE Systems, Merrimack, NH 03054 USA (e-mail:
apurva.mody@ieee.org; apurva.mody@baesystems.com). involving a wide variety of captured and simulated signal
Digital Object Identifier 10.1109/TCCN.2018.2790971 types. Moreover, we provide computational cost comparisons
2332-7731 c 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
SPOONER AND MODY: WIDEBAND CSP USING SPARSE SUBSETS OF NB SUBCHANNELS 163
TABLE I
between the developed algorithm and a CSP-based reference A BBREVIATIONS U SED IN T HIS PAPER
algorithm suitable for FPGA implementation in the present
paper; no quantitative cost comparisons were presented in [18].
The remainder of this paper is organized as follows. In
Section II, we present the key RF scene difficulties that
foil almost all optimal and feature-based recognition systems:
CCI and overly simple signal models. Blind versus nonblind
processing is discussed and the utility of CS features is illus-
trated with an example involving several captured signals,
including ATSC-DTV, WCDMA, and CDMA-EVDO. The
computational costs and memory requirements are reviewed
for efficient blind and nonblind CSP estimators. Related work
on energy-efficient CSP is discussed in Section III. The CS
properties of over-the-air observed communications signals are
discussed in Section IV. The central concept of the paper,
WB-signal feature estimation using only selected NB subchan-
nels, is introduced in Section V, where algorithms for nonblind
and blind RFSA are also presented. A reference algorithm for
performance comparison is sketched in Section VI. Section VII
discusses the design parameters of the tunneling approach
and the boundary conditions of this approach. Illustrative pro-
cessing examples and Monte Carlo performance evaluations
are presented in Section VIII. Expended-energy comparisons
between the reference algorithm and the proposed algorithm
are provided in Section IX, and concluding remarks are made
in Section X.
For the reader’s convenience we have listed in Table I the
abbreviations used throughout this paper.
A. Cochannel Signals
We define cochannel signals as two or more signals whose
temporal and spectral support intervals significantly overlap.
In contrast, adjacent-channel signals are defined as signals problems, whereas more complex (realistic) models prohibit
with no spectral overlap, and arbitrary temporal overlap. the solution of optimization problems but can result in the
Inclusion of temporal overlap is important because we wish identification of useful classification features. The majority
the definition to encompass all those processing situations of published work on modulation recognition uses a sim-
for which simple signal-separation approaches such as linear ple linear modulation model that encompasses some subset
time-invariant (LTI) filtering and time gating are ineffective. of digital QAM, digital phase-shift keying (PSK), frequency-
shift keying, and staggered digital QAM signals. The model
B. Modulated Signals With No Medium Access Control or almost always includes independent and identically distributed
Framing (NOMAC) symbols (which rules out pilot sequences), and no trace of
A key issue in the context of CR spectrum sensing and an access mechanism—no framing, slotting, coding, hopping,
RFSA is the fidelity of the mathematical models for the signals etc. Such signal models are what one encounters in standard
of interest. Simpler models can lead to tractable optimization communication-theory textbooks, such as the excellent [56],
164 IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, VOL. 4, NO. 2, JUNE 2018
Fig. 6. Block diagram for a comprehensive signal-analysis system comprising both nonblind and blind elements.
Fig. 10. Illustration of the known-type detection method known as Dual where the SCF estimate is obtained using a cross version of
Conjugate Tunneling.
the TSM. The correlations are computed for all k in the set
Ndc
{k0 + j}j=−N dc
, resulting in the vector of measured spectral
correlation values given by
only some of the elements of Yd,X . The binary vector S selects
which of the elements are computed. The final dual-tunneling Ydc,X = Ydc,X (k0 − Ndc ) Ydc,X (k0 − Ndc + 1)
statistic is then
. . . Ydc,X (k0 ) . . . Ydc,X (k0 + Ndc ) . (16)
Ydual,X = max Yd,X ∗ S ⊗ Id,X . (13) This vector is the dual-conjugate tunnel response, and the
3) Dual-Conjugate Tunneling: In some important cases, a ideal dual-conjugate tunnel response is the response for T →
WB signal type cannot be successfully detected by either BT ∞. The decision statistic is simply the maximum value of the
or DT because it does not possess significant NC CFs. Instead, convolution between the dual-conjugate response and its ideal
it possesses only strong conjugate CFs. (An example is ATSC version.
DTV [39].) 4) Cycle-Frequency Refinement: The KT signal detection
Conjugate CFs typically involve the carrier (center) approach adopted here will be effective if the sets of CFs
frequency of the signal as well as a modulation rate, such assigned to each KT signal are actually exhibited by the trans-
as a chip rate or symbol rate. Therefore, prior knowledge of a mitted signals. However, in practice, the assigned CFs can
conjugate CF amounts to prior knowledge of both the carrier be different from the CFs exhibited by actual signals due to
frequency and one or more modulation rates. clock-frequency errors at the transmitter and/or at the receiver.
The dual-conjugate tunneling concept is illustrated in Moreover, conjugate CFs are shifted by the Doppler effect.
Figure 10. Unlike the basic- and dual-tunneling algorithms, Other authors consider this potential CF mismatch to be fatal
the DTC algorithm does not employ tunnel striding. Instead, it to CSP-based detection methods [13], [14], however, it is
computes SCF estimates for a few tunnel pairs corresponding remedied by searching for a strong feature over CFs very near
to spectral frequencies near zero. the assigned CF. This searching process results in a slight
The DTC algorithm exploits the conjugate SCF, which on-the-fly refinement of the CFs used for detection, and so
correlates Xt (t, f + α/2) with Xt (t, α/2 − f )∗ , is referred to as CF refinement. All known-type detection
results and algorithmic cost estimates in this paper take into
α
Ŝxx ∗ (f ) =
Xt (t, f + α/2)Xt (t, α/2 − f ). (14) account CF refinement. Ten CFs near the putative known CF
are included in every known-type TSM estimation.
For f = 0, this amounts to correlating Xt (t, α/2) with
∗ (t, α/2), the conjugated version of itself. As f is increased, 5) Signal Presence Detection: Most signal types will yield
Xt
a substantial tunnel response for only one of basic or dual tun-
the involved NB spectral components move away from zero
neling, and dual-conjugate tunneling is used only when there is
symmetrically, as shown in Figure 10. Because of this, all sig-
no other choice, as in the case of ATSC-DTV. In this research,
nals exhibiting conjugate spectral correlation have conjugate
we viewed each of the three distinct tunnel-based KT detectors
SCFs that are centered at f = 0.
as separate, and declare a signal is present if any one of them
Let the conjugate CF for KT X be denoted by α, and sup-
produces an output that exceeds an empirically determined
pose the total number of tunnel pairs to consider is 2Ndc + 1
threshold.
( Nt ). In practice, we are using shifted tunnels X(t, f ) and
X(t, α − f ), so we seek tunnel pairs symmetric around the
tunnel corresponding to f = −α/2 instead of f = 0. This D. Blind Tunnel-Based Signal Detection
center-point tunnel will have index k0 . Once the KT signals are detected, and their center
For any tunnel index k, we first find the index l for the tun- frequencies estimated, the spectral intervals over which they
nel that will be used to estimate the conjugate SCF. In dual reside can be estimated. To complete RFSA, the remaining
tunneling, k and l were simply two tunnel indices whose cen- portions of the input band can be examined for the presence
ter frequencies differed by approximately the cycle frequency of signals of unknown type (UT). Here unknown type is rela-
of interest α. In DTC, the sum of the two tunnel centers is tive to the catalog of signal types known to the KT processor.
approximately equal to the CF. That is, suppose we have tunnel The key concept is that the unknown signal types will exhibit
indices k and l such that there exists at least one frequency fk in at least one CF that is smaller than the tunnel bandwidth Bt .
170 IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, VOL. 4, NO. 2, JUNE 2018
TABLE IV
M ONTE -C ARLO E XPERIMENT PARAMETERS FOR K NOWN -T YPE
D ETECTION OF C OLLECTED WCDMA AND CDMA-EVDO S IGNALS
Fig. 13. ROCs for known-type processing. These ROCS omit the results for
the shortest block length.
TABLE V
M ONTE -C ARLO E XPERIMENT PARAMETERS FOR B LIND D ETECTION
OF S YNTHETIC DSSS AND PSK S IGNALS
Fig. 15. Known-type tunnel responses for the RF scene shown in Figure 14.
The responses are significant for each signal that is present, as well as the
5-MHz LTE signal, but are insignificant (well below threshold) for all the
other known types. 5-MHz and 10-MHz LTE share CFs, and so their tunnel
responses are large when either signal is present. Internal logic distinguishes
between the two depending on the tunnel-response width.
summarized in Figure 16. For the low inband SNRs, the front-
end ED processing stage will fail to detect the signals or will
underestimate their bandwidth, leading to feature-extraction
failure. However, the tunnel-based blind CSP detection step
reliably detects the WB DSSS signals starting at about -10 dB Fig. 16. Detection and classification performance for unknown-type signals
due to their rather rich CS feature sets. The strided tunnel- using CF pattern recognition. The performance for the NB BPSK, QPSK,
and MSK signals is poor for low SNR because the signals are missed by the
based algorithm cannot detect the relatively NB PSK/QAM energy-detection and strided unknown-type detection steps.
signals, however, due to the small tunnel bandwidth value of
Bt = 200 kHz and tunnel-striding factor of four. Therefore,
the NB PSK/QAM signals are not well detected until their
signal in a 50-MHz analysis band. The counts for channeliza-
SNR permits ED at around 3 dB.
tion, spectral whitening, and ED are combined into algorithm
stage one, and these counts are independent of the scenario.
Moreover, they are the same between the tunnel-based algo-
IX. E NERGY C OMPARISON rithm and the RA. However, the RA does not make use of
In this section, we evaluate the potential energy savings tunnels in the subsequent algorithm stages. The KT stage
obtained by using the tunnelized CSP algorithms as opposed has scenario-independent costs as well. We assume 22 known
to the nontunnelized RAs. Expended energy is measured by types, each with its own optimized tunnel-striding factor. The
counting complex multiplications, which neglects memory- average cost savings is larger than a factor of ten. The UT
access energy. However, the tunnel-based CSP algorithms are blind detection stage also has scenario-independent costs, and
designed to avoid accessing off-chip memory by ensuring all here the tunnel-based algorithm is vastly less costly than the
data vectors are sufficiently short. reference due to the RA’s forced use of the TSM operating
The computational counts are performed for four scenar- at the full 50-MHz input rate. Similarly, the UT classification
ios in Figure 17. The first scenario involves a 1-MHz wide cost for the tunnel-based algorithm is much less than for the
174 IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, VOL. 4, NO. 2, JUNE 2018
[53] C. Schreyogg, K. Kittel, U. Kressel, and J. Reichert, “Robust classifi- Apurva N. Mody received the Ph.D. degree in
cation of modulation types using spectral features applied to HMM,” in electrical engineering from the Georgia Institute
Proc. MILCOM, Monterey, CA, USA, 1997, pp. 1377–1381. of Technology in 2004. He is a world recog-
[54] D. J. Thomson, “Spectrum estimation and harmonic analysis,” Proc. nized expert on spectrum sharing, white spaces, and
IEEE, vol. 70, no. 9, pp. 1055–1096, Sep. 1982. spectrum exploitation technologies. Since 2005, he
[55] Q. Zhao and A. Swami, “A survey of dynamic spectrum access: Signal has been with BAE Systems Technology Solutions,
processing and networking perspectives,” IEEE Trans. Acoust. Speech currently leading the Dominance Awareness and
Signal Process., vol. 97, no. 1, pp. IV-1349–IV-1352, Apr. 2007. Sharing Group. He has been responsible for captur-
[56] J. G. Proakis and M. Salehi, Digital Communications, 5th ed. Boston, ing and leading many programs, which have resulted
MA, USA: McGraw-Hill, 2008. in the development of potential solutions to radar and
[57] E. Rebeiz, F.-L. Yuan, P. Urriza, D. Markovic, and D. Cabric, “Energy- communications spectrum sharing problems, devel-
efficient processor for blind signal classification in cognitive radio opment of a spectrum sensing chip, handheld spectrum analyzer, novel
networks,” IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 61, no. 2, interference mitigation techniques, co-existence between communications and
pp. 587–599, Feb. 2014. electronic warfare systems, and implementation of low-cost techniques to
[58] Tunneling Paper Captured Data Files. Accessed: May 2017. make any radio cognitive. He was a recipient of the IEEE SA Medal for
[Online]. Available: https://cyclostationary.blog/data-sets/tunneling- creating spectrum sharing technologies to reduce the global problem of the
paper-captured-data-files digital divide. He is serving as the Acting Chairman of the United States
National Spectrum Consortium, the Founding Chairman of the WhiteSpace
Alliance, and the Chairman of IEEE 802.22 Working Group for Wireless
Regional Area Networks.