You are on page 1of 9

Received May 8, 2019, accepted May 11, 2019, date of publication May 15, 2019, date of current version

June 4, 2019.
Digital Object Identifier 10.1109/ACCESS.2019.2916995

A Multi-User Detection Scheme Based on Polar


Code Construction in Downlink Underwater
Acoustic OFDM Communication System
GANG QIAO, SIYU XING , AND FENG ZHOU
Acoustic Science and Technology Laboratory, Harbin Engineering University, Harbin 150001, China
Key Laboratory of Marine Information Acquisition and Security (Harbin Engineering University), Ministry of Industry and Information Technology,
Harbin 150001, China
College of Underwater Acoustic Engineering, Harbin Engineering University, Harbin 150001, China
Corresponding author: Feng Zhou (zhoufeng@hrbeu.edu.cn)
This work was supported in part by the National Natural Science Foundation of China under Grant 61431004, Grant G051917003,
Grant 61571151, Grant 61501134, Grant 11774074, Grant 61601136, and Grant 61771152, and in part by the National Key Research and
Development Program of China under Grant 2017YFC0305702 and Grant 2018YFC0308500.

ABSTRACT In this paper, we propose a novel polar code construction scheme, suitable for the under-
water acoustic (UWA) multi-user communication system using orthogonal frequency division multiplex-
ing (OFDM). We use the polar codes because the code rate of a polar code can be arbitrarily designed.
Moreover, the polar codes can also be used to create a nested code structure, divided into several subsets
(codebook). We exploit this feature of the polar codes and place the information bits in the codebook to avoid
superimposition of all the users. This helps to eliminate the influence of the power allocation coefficient and
make full use of the power of the transducer at the transmitted node. Furthermore, the proposed scheme
maximizes the utilization efficiency of the OFDM subcarrier resource for each user by avoiding null pilot
tones that are usually required for channel equalization in the traditional schemes. The proposed scheme also
does not depend on the channel state information (CSI) as prior information as each user can decode their
own data independently by using their own codebook without successive interference cancellation (SIC).
The simulation and tank experiment results demonstrate that the proposed scheme can significantly guarantee
the reliability of all the users, and reduces the complexity of the receiver, thus making it most suitable for the
downlink UWA multi-user communication systems.

INDEX TERMS Underwater acoustic communication (UAC), orthogonal frequency division multiplex-
ing (OFDM), multi-user detection, polar code construction.

I. INTRODUCTION multipath, strong Doppler, strong noise and other complex


The shallow underwater acoustic (UWA) channel is com- random transmission characteristics, making the reliable and
monly regarded as the most difficult wireless communica- high-rate underwater communication much more difficult
tion channel because of its complex environments, such as than the wireless communication. The reliability of shallow
low carrier frequency, strong multi-path interferences and seawater acoustic communication has always been a great
high noise level. The shallow seas with a depth less than challenge worldwide. Hence, the reliable and high-rate under-
200 meters are normally near the mainland, which makes water communication system remains a worldwide challenge
them the most extensive and densely populated areas of because of the unique nature of the underwater environment.
human ocean development, shipping, etc. However, the sound Since, orthogonal frequency division multiplexing (OFDM)
propagation in the shallow water is susceptible to the com- is an attractive technique for high-rate data transmission
plex effects of the sea surface and multiple reflections of due to the minimizing effect over frequency-selective fading
the sea floor and the sea surface, not mention the shipping, channels [1]. Therefore, OFDM has been extensively used
underwater engineering and other types of human industry. in high-rate underwater acoustic communication (UAC)
Thus, the shallow seawater acoustic channel exhibits strong systems [2]–[4].
In recent decades, underwater acoustic sensor networks
The associate editor coordinating the review of this manuscript and have been considered as a promising approach for explor-
approving it for publication was Qilian Liang. ing and monitoring the ocean. Hence, designing reliable
2169-3536
2019 IEEE. Translations and content mining are permitted for academic research only.
VOLUME 7, 2019 Personal use is also permitted, but republication/redistribution requires IEEE permission. 65973
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
G. Qiao et al.: Multi-User Detection Scheme Based on Polar Code Construction

and efficient data communication protocol is necessary for designed, which makes it more flexible adapting to various
reliable data transmission in underwater applications. Some application scenarios, such as security coding on the physical
high-energy efficient schemes with low memory requirement layer [32]–[34].
were proposed to repalace the traditional ones, such as the In this paper, we propose a novel polar code construction
link quality-aware queue-based spectral clustering routing scheme suitable for multi-user communication and especially
protocol and Quality-of-Service aware evolutionary routing the UWA OFDM communication system. Polar codes offer
protocol [5]–[6]. the flexibility to adjust the code rate on the fly and this
With the developing of the UAC network, multi-user advantage is exploited in the proposed scheme. Moreover,
communication technique draws much more interest than the polar codes can also be used to create a nested code
the single-user, and numerous methods of multi-user structure, divided into several subsets where each subset carry
detection have been proposed [7]–[9]. These methods the information bits and is called the codebook, for different
can be sorted into two typically types: the orthogonal users. The codebook is usually known to all the users and
approaches and the non-orthogonal approaches. The orthog- the transmitting node. The transmitted data of each user is
onal approaches can be achieved by time-division multi- already placed at different information bits in every codeword
ple access (TDMA) [10], frequency-division multiple access after conducting polar encoding, thus, there is no need to
(FDMA) [11], and orthogonal frequency division multi- superimpose the signal of all the users, which can eliminate
ple access (OFDMA) [12]–[14], while the non-orthogonal the influence of the power allocation coefficient. Meanwhile,
approach mainly consists of code division multiple access the novel polar encoding scheme is also a kind of channel
(CDMA) [15]–[17], interleave division multiple access coding scheme, the following process of the UWA OFDM
(IDMA) [18]–[20], and a recent popular scheme called the communication system remains the same as single user ones,
superposition coding [21]–[23]. resulting in no need for CSI and reserved null pilot subcarriers
In [24], CDMA and OFDM are combined to realize multi- for each user. Different users can decode their own data inde-
user UWA communication by adopting the time reversal mir- pendently by using their own codebook without SIC, which
ror technique. The proposed technique takes the advantages reduces the complexity of the receiver. The proposed scheme
of both CDMA and OFDM, which effectively suppressed can significantly enhance the quality and the frequency effi-
multi-path interference and reduced the error rate. However, ciency of the OFDM communication system, thus making it
due to the usage of the spreading code, there exists a trans- most suitable for UWA multi-user communication.
mitted rate loss of the UWA OFDM communication sys- The rest of the paper is organized as follows. In Section II,
tem. A superposition coding suitable for the downlink UWA we introduce the principle of the original polar code,
OFDM system is proposed in [25]. By applying superposition including the channel polarization, polar code construction,
coding, the source node transmits the superimposed signal of the encoder and decoder of polar code. In Section III,
the two users. The two users utilize different constellation we present a novel polar construction and encoder scheme
mapping mode, and then, the signal of both users is added which is designed for multi-user downlink UWA OFDM
with a power allocation coefficient, which mainly determined communication system, and also introduce the construction
the bit error rate (BER) performance of the two user’s system. of the system model. The simulation and experimental results
At the receiver, User A decodes its own data in the presence of were given in Section IV and conclusions are contained in
interference from User B’s signal, while User B with a higher Section V.
signal-to-noise ratio (SNR) performs successive interference
cancellation (SIC). User B firstly decodes the data of User A, II. PRINCIPLE OF THE ORIGINAL POLAR CODE
then subtracts the codeword of User A from the received A. CHANNEL POLARIZATION AND ORIGINAL
signal to better decode its own data. The scheme performs POLAR CODE CONSTRUCTION
well when the power difference between the two users is large The key idea of the channel polarization can be expressed
enough and require the channel state information (CSI). Thus, as a kind of channel equivalent transformation, and mainly
the complexity of the receiver is high which limits its use for consists of two parts: channel combining phase and channel
many applications. splitting phase.
The polar codes were invented by Erdal Arikan [26], based Considering a binary input discrete memoryless symmetric
on a novel concept called channel polarization. As soon as (BI-DMS) channel W , which can be described as
polar codes were invented, they became an active research W : X → Y, (1)
subject due to the fact that polar codes showed promising
results with increasing capacity. Polar codes have now where X denotes the input data symbol and Y represents the
been extended to a number of applications and generaliza- output, the transition probability W (y|x), x ∈ X and y ∈ Y .
tions [27]–[31], and it is proved that the polar code has Normally, X = {0, 1}.
better performance than other existing channel coding meth- The channel polarization can manufacture N polarized
ods. The advantage of polar code is the explicit construction channel out of N identical independent copies of BI-DMS
and very low complexity of encoding and decoding. Fur- channels. The first step is to transform the same indepen-
thermore, the code rate of a polar code can be arbitrarily dent channels into two types of synthesized channels with

65974 VOLUME 7, 2019


G. Qiao et al.: Multi-User Detection Scheme Based on Polar Code Construction

slightly varying reliabilities: the good bit-channels and the


bad bit-channels. Then the significant difference, which is
good ones get better and the bad get worse, can be shown
when the polarization transformation is applied on the result- FIGURE 2. The framework of construction of the original polar code.
ing channels recursively. When N → ∞, the channel can be
polarized into the channel either extremely noisy or noiseless information bits, and the rest N − K values are
without capacity loss. The symmetric capacity of bit-channels the indexes of the frozen bits. σ is the K th value in the
after the channel polarization when N = 2048 is given marked array value, representing the threshold of the
in Fig.1. logarithm of the bit-channel Bhattacharyya parameter
with the code rate R = K /N .
4) Finally, the construction of the codebook C of the polar
code with the code rate R = K /N is completed.

B. THE ENCODER OF THE ORIGINAL POLAR CODE


The encoding operation of an (N , K , F) polar code for a
vector information bit u = (u1 , u2 , . . . , uK ), whose length
1
is K , can be obtained as follows. Define n = log2 (N ) and
⊗n
F = F ⊗ · · · ⊗ F (n copies of F) be the n-fold Kronecker
 
1 1 1
product of Arikan’s standard polarizing kernel F = .
01
Then a codeword of Polar code can be generated as
FIGURE 1. The symmetric capacity of bit channels after channel
polarization when N=2048.
x = G · u = (F⊗n )F C · u, (3)
where F C is the complementary set of the frozen bits loca-
After the channel polarization, a rate of transmission close
tions F, which is usually known as the information bits
to capacity can be easily achieved by transmitting over only 1
the good bit-channels, while distributing frozen bits to the locations. G =(F⊗n )F C is the generator matrix of polar code.
extremely noisy ones. A polar code may be specified by Meanwhile, there is an alternative form of this polar code as
(N , K , F), where N represents the code length, which needs x = F⊗n d, (4)
to be at any finite length of 2n . K is defined as the number
of good bit-channels, in other words, the length of the infor- where d ∈ {0, 1}N is such that dF = 0 and dF C = u.
mation bits in a codeword. Thus, the code rate (CR) can be The information bits are assigned to the polarized channels
calculated as R = K /N . F is a set of N − K integer indices with the lower error probabilities, while the frozen bits are
known as the frozen bit locations from {0, 1, . . . , N − 1}. assigned to the remaining less reliable channels. The frozen
Polar code construction is a selection of the K bit-channels bits generally take a fixed value of zeros or a fixed vector
out of N , which defines a polar code. In order to conduct this which is known at both the encoder and the decoder.
selection, a ranking algorithm for the bit-channels is needed.
C. THE DECODER OF THE ORIGINAL POLAR CODE
Normally, the measurement information of the polar code
In this paper, the Successive Cancellation (SC) decoding
construction is the Bhattacharyya parameter, which is defined
technique is selected as the decoder for polar code. Due to
as Equation (2)
the regular structure of polar codes, the SC algorithm can be
1 Xp regarded as a soft/hard information-sending algorithm over
B(W ) = W (y|0)W (y|1). (2)
the trellis of polar code. The trellis has n stages and N levels.
y∈Y
The hard messages passed in the trellis are the estimation
In order to avoid underflow and overflow, the log-domain bits corresponding to the variable nodes si,j , where i and j are
calculations of the Bhattacharyya parameter are needed. the stage and level index in the trellis, respectively, 1 ≤ i ≤
Then, a polar code construction can be achieved by the n + 1, 1 ≤ j ≤ N . The hard messages update rule can be
following process and the framework of construction of the expressed as Equation (5)
original polar code is shown in Fig. 2.  
j−1

i,j+2i−1 , mod 2 = 0
s ⊗ s
1) Calculate the logarithm of the bit-channel i,j
Si,j = 2i−1 (5)
Bhattacharyya parameter Z (WNi ) = log10 [B(WNi )],
si,j , otherwise.

2) Sort Z (WNi ) with the ascending order, one marked array
flag is used to record the index of the bit-channel where ⊗ is the modulo-2 operation and b·c indicates the floor
while the other marked array value is set to record function.
the corresponding Z (WNi ). The soft messages corresponding to these bits are the log-
3) The top K values in the marked array flagare the likelihood ratios (LLR) values denoted as Li,j = L(si,j ).
indexes of the good bit-channels, which carries the For example, the trellis bit values on the first stage are the

VOLUME 7, 2019 65975


G. Qiao et al.: Multi-User Detection Scheme Based on Polar Code Construction

estimations of the source block s1,j = ûj , the correspond-


ing soft messages are L1,j = L(ûi,j ). The received signal
after bit-reversal permutation is yj , its corresponding LLR is
denoted by
FIGURE 3. The framework of the proposed polar code construction
P(yj |1) designed for the multi-user detection scheme in the UWA OFDM
Ln+1,j = log . (6) communication system.
P(yj |0)
The soft messages update rule can be expressed as
Equation (7)
Li,j

Li+1,j Li+1,j+2i−1
2 tanh−1 [tanh( ) · tanh( )],




 2  2
= j−1 (7)
i−1
mod 2 = 0


 2
i,j−2i−1 )(Li+1,j−2i−1 ) + Li+1,j ,

(1 − 2s otherwise
where i = 1, 2, . . . , n + 1, j = 1, 2, . . . N , tanh(·) denotes the
hyperbolic tangent function, and the other notations are the
same with Equation (6).
FIGURE 4. An illustration of polar coding for the multi-user detection
The bit decision rule of the SC decoder is described as scheme. The message bits of different users located at the different good
Equation (8) bit-channels index for each user, and the frozen bits located at the noisy
 bit-channels.

0, if i ∈ F

ûi = 0, if i ∈ F C & L1,j ≥ 0 . (8) the logarithm of the bit-channel Bhattacharyya parameter for
 each user, respectively. The CR for each user is Ruser =
1, otherwise

R/2 = K /2N .
III. PRINCIPLE OF THE PROPOSED MULTI-USER Finally, the construction of the codebook of the polar code
DETECTION SCHEME BASED ON POLAR CODE for each user is completed. The framework of the proposed
As polar codes can be employed to create a nested code polar code construction designed for the multi-user detection
structure, subsets of the set of good bits-channels for the scheme in the downlink UWA OFDM communication system
original polar code are defined to act as the information bits is shown in Fig. 3.
for different users. In other words, all the users share the Then the codeword of the proposed polar code can be
good bit-channels of the original polar code with a certain generated as
code rate R. Normally, the set of good bit-channels of the x = (F⊗n )FuserA · uuserA + (F⊗n )FuserB · uuserB , (9)
original polar code and all the subsets are known to the
sending node and all the users. The subsets are defined as where FuserA and Fuser2 denote the information bits of the
the codebook for each user, then the CR of each user together two users, that satisfies FuserA ∪ FuserB = F C , the transmitted
makes the R. In the following section of this paper, the number data for each user is uuserA = (u1 , u2 , . . . , uK /2 ) and uuserB =
of multi-user is set to two, and the CR for each user is equal, (u01 , u02 , . . . , u0K /2 ).
Ruser = R/2. Since R must be less than 1, Ruser can only The alternative form of this polar code can be given as
approach 1/2 infinitely. x = F⊗n d, (10)
A. POLAR CODE CONSTRUCTION AND ENCODER FOR where d can be composed of dF = 0, dFuserA = uuserA and
THE PROPOSED MULTI-USER DETECTION SCHEME dFuserB = uuserB .
Assuming that the User A’s channel is better than User B’s, The illustration of polar coding for the multi-user detection
the polar code construction for each user is achieved by the scheme is shown in Fig. 4.
following process.
Firstly, calculating the logarithm of the bit-channel B. SYSTEM MODEL OF THE UWA OFDM
Bhattacharyya parameter Z (WNi ), sorting Z (WNi ) with the COMMUNICATION ADOPTED THE
ascending order, and recording marked array flag and value MULTI-USER DETECTION SCHEME
is identical to the original polar code construction. BASED ON POLAR COEDS
Secondly, top KuserA = K /2 values in the marked array After the proposed polar code encoding, the transmitted data
flag are selected as the indexes of the good bit-channels for of each user is already placed at different information bits in
User A, and the next top KuserB = K /2 values are that every codeword, thus, there is no need to superimpose the two
for User B. Then, the rest N − K values are the indexes users’ signal. As the novel polar encoding scheme is also a
of the frozen bits. σ1 and σ2 represents the thresholds of scheme of channel coding, the codewords can be processed

65976 VOLUME 7, 2019


G. Qiao et al.: Multi-User Detection Scheme Based on Polar Code Construction

FIGURE 5. The framework of the UWA OFDM system which adopted the proposed multi-user detection scheme based on a novel polar code
construction technique.

as the normal UWA OFDM communication system, such Take one OFDM symbol as an example, after taking
as constellation mapping and allocated to the subcarriers. the fast Fourier transform (FFT) operation at the receiver,
The polar codewords after constellation mapping are XD , the received signal in the frequency domain can be given as
the OFDM symbol with the comb pilot XP in the frequency
Yi (k) = X (k)Hi (k) + Wi (k), (14)
domain can be represented as
ith
where Hi (k) denotes the frequency response of the user’s
X (k) = aXD (k) + bXP (k), (11) underwater acoustic channel and Wi (k) represents the white
Gaussian noise in the frequency domain. As all users can
where
share the same Po and XP , the estimation of Hi (k) also
a = 1, b = 0 / Pom
k∈ share the same way. Denote Ĥi (k) as the estimation of Hi (k),
a = 0, b = 1 k ∈ Pom . (12) YP is the value of the pilot tones, the sampling value of
the underwater acoustic channel frequency response ĤiP
Po is the position of the comb pilot tones, and all users can be achieved by ĤiP = YP /XP and Ĥi (k) should be
can share the same Po and XP . There is no need to reserve obtained by interpolation scheme or other channel estimation
null subcarriers for each user to obtain the sampling value scheme, such as compressed sensing. After the constellation
of the underwater acoustic channel frequency response ĤP , de-mapping, the received data need to be sent to the polar
each user can maximize the utilization efficiency of OFDM decoder, and the bit decision rule of the SC decoder for the
subcarrier resource. ith user can be described as Equation (15)
The communication rate Scom can be expressed as follow 
0, if i ∈ F

Scom =
NOFDM · (1P − Nuser ) · NBits_subcarrier · CR · Fs
, ûi = 0, if i ∈ Fuseri & L1,j ≥ 0 . (15)
1P · NOFDM _with_CP · κ

1, otherwise

(13)
Considering each user has its own codebook and there is no
where NOFDM and NOFDM _with_CP represent the number of cross among these codebooks, each user can obtain their own
the total subcarriers in an OFDM symbol and that in an output data by conducting SC decoding scheme according to
OFDM symbol with the cyclic prefix, NBits_subcarrier is the their codebooks.
number of the bits on each subcarrier, and Nuser denotes the
number of different users. 1P is defined as the pilot spacing, IV. NUMERICAL SIMULATION AND
CR has been pre-defined as the code rate, Fs is known as the TANK EXPERIMENT RESULTS
sampling frequency, and κ is the up-sampling factor. A. SIMULATION PARAMETERS AND RESULTS
As there is no need for the proposed scheme to reserve Simulations are performed to evaluate the performance of
null subcarriers for each user, the Nuser for the proposed this novel multi-user detection scheme. The main parameters
scheme can be fixed to 1. Thus, the communication rate of the polar coding UWA OFDM communication system
can be significantly increased with the increasing number of are given in Table 1. Meanwhile, a sparse shallow water
different users. acoustic channel, generated by a channel simulation soft-
Subsequently, IFFT is taken to generate the OFDM signals ware is adopted in the simulations. It is assumed that the
x in the time domain. The transmitted signal x experiences distance between the transducer and the hydrophone is about
different channels while reaching each user’s receiver. The 5700 meters, and the transducer is located at 8 meters under
framework of the UWA OFDM system which adopted the the water surface. The hydrophones of the two users are
proposed multi-user detection scheme based on a novel polar located at 8 meters and 15 meters under the water surface,
code construction technique is shown in Fig. 5. respectively. The velocity gradient distribution is set as a

VOLUME 7, 2019 65977


G. Qiao et al.: Multi-User Detection Scheme Based on Polar Code Construction

TABLE 1. Simulation parameters of the underwater acoustic OFDM


system.

FIGURE 7. Comparisons of the overall BER performance between the


proposed multi-user detection scheme and original polar code with
different code rate. (a): Code Rate are 7/16 and 1/4 for the two users and
corresponding Code Rate for the Original Polar code and control scheme.
(b): Code Rate are 3/8 and 5/16 for the two users and corresponding
Code Rate for the Original Polar code and control scheme.

FIGURE 6. The CIR of the simulation channel for both the two users. rate difference. It is because that the good bit-channels is
prior assigned to User A when constructing the proposed
surface channel, and the average depth of the sea is set to polar code. The BER performance of both users with the
55 meters. The impulse responses of the simulation channel code rate Ruser = R/2 are better than the original polar
for both users are illustrated in Fig. 6. It can be obviously code with code rate Roriginal = 2∗ Ruser = R, mainly due
seen that the direct sound intensity is higher than any other to the length of the information bits in one polar codeword of
multipath. the two users is shorter than that of the original polar code.
The original polar coding scheme given in [21] is chosen as Therefore, the error correction capability of the proposed
a control scheme. As discussed in Section III, the code rate of polar coding scheme for the multi-user system becomes better
each user is Ruser = R/2. The code rate of the original scheme when compared with the original one. With the decreasing of
is set to Roriginal = Ruser = R/2 and Roriginal = 2∗ Ruser = R, the code rate, the difference between them decreased from
to compare the system BER performance of the polar code 2 dB to 1 dB.
designed for multi-user detection scheme and the original Although the codebook for each user is independent,
one. Comparisons of the overall BER performance between the LLR value may be affected by the good bit-channels of
the proposed multi-user detection scheme and original polar the other user when updating the LLR in the SC decoder.
code with different code rate is given in Fig. 7. We set 10−7 It is indicated that the BER performance of each user is worse
our reference as BER is negligible and can be counted as than the original polar code with the same code rate. However,
no error. In Fig. 7 (a), the code rates of the two users are the difference decreases with the decrease in code rate. The
7/16 and 1/4, and the code rate of the original polar code difference in code rate 7/16 is about 6 dB, while it decreases
is 7/8, 7/16, 1/2, and 1/4, while the code rates in Fig. 7 (b) to 2 dB when the code rate is 1/4. When the code rate of the
are 3/8 and 5/16. The dash curves represent the BER of the multi-user system is 7/16, which is close to 1/2, the BER
proposed scheme and control scheme with the lower code of the multi-user finally become zeros at the condition of
rate, whilst the solid ones are the higher ones. Eb/N 0 = 17dB, and both of the two users can guaran-
It can be seen that the BER performance of User A is tee the reliable communication. The code rate determines
about 1 dB better than that of User B, despite the code both the efficiency of data transmission and the system BER

65978 VOLUME 7, 2019


G. Qiao et al.: Multi-User Detection Scheme Based on Polar Code Construction

FIGURE 8. The figures restored by the received data after decoding in these simulations with different CRs and
Eb/N0 conditions. (a): CR is 1/4 for the two users and corresponding CR for the Original Polar code and control
scheme under the condition of Eb/N0=9dB. (b): CR is 5/16 for the two users and corresponding CR for the
Original Polar code and control scheme under the condition of Eb/N0=11dB. (c): CR is 3/8 for the two users and
corresponding CR for the Original Polar code and control scheme under the condition of Eb/N0=13dB. (d): CR is
7/16 for the two users and corresponding CR for the Original Polar code and control scheme under the condition
of Eb/N0=16dB.

performance, thus, it should be selected carefully to balance


the reliability and effectiveness in practical applications.
To illustrate the performance of the proposed scheme more
intuitive, a Grayscale figure is chosen as the transmitted data.
The figures reconstructed at the receiver after polar decoding
are shown in Figure 8. The sub-figure (a), (b), (c) and (d) rep-
resents the transmitted results of different CRs at different
Eb/N0 conditions respectively. The value of Eb/N0 for each
CR is selected as the same value when BER of User A is close
to being counted as no error. FIGURE 9. The schematic diagram of the location of the transducers in
The system BER values in these figures are the results this experimental site.
which are obtained only in one simulation respectively, while
the curves in Fig. 7 are the average value of many circulations. seen in Fig. 8 (c) and (d). Both the two users can guarantee
Moreover, the total bits of the transmitted data in the simula- reliable communication at certain Eb/N0 conditions.
tions are at different magnitude. Thus, the BER data may not
be the same value we got in Fig. 7. From Fig. 8 (a) and (b), B. TANK EXPERIMENT RESULTS
it can be found that there is no error in both the original To evaluate the feasibility of the proposed multi-user detec-
polar code and the User A with code rate 1/2 and 5/16. The tion scheme for UWA OFDM communication system based
BER of the original polar code with code rate 1/2 and 5/8 are on a novel polar coding scheme, a field experiment was con-
0.0011 and 0.0068, respectively, while the BER of User B is ducted at the channel tank operated by Harbin Engineering
at the magnitude of 10−4 . With the increase of CR, the BER University, China and the schematic diagram of the exper-
of User A becomes at the magnitude of 10−5 , which can be imental site is shown in Fig.9. The length of the tank is

VOLUME 7, 2019 65979


G. Qiao et al.: Multi-User Detection Scheme Based on Polar Code Construction

about 25 meters and the average depth of the tank is about


5 meters. During this experiment, the two hydrophones were
located on the same vertical line, and they were 1.5 meters
and 2.5 meters under the tank surface. The distance between
the two receivers is larger than 10 times of the wavelength,
which makes the two users experience the independent chan-
nels. The horizontal distance between the transducer and the
receiver was 8.35 meters and the depth of the transducer was
2 meters under the tank surface. The parameters of the UWA
OFDM system remains the same as it was in the simulations,
and the code rate is set as 7/16 for both the two users, while
that for the original polar code are 7/16 and 7/8.

FIGURE 11. The figures restored by the received data after decoding in
this field experiment.

V. CONCLUSION
This paper proposed a novel polar code construction scheme
which is designed suitable for the multi-user communication
and embedded it in the downlink UWA OFDM communica-
tion system. Due to the character that the code rate of the
polar code can be designed arbitrarily and the polar codes
can be used to create a nested code structure, a novel polar
code construction scheme suitable for multi-user downlink
FIGURE 10. The real Channel Impulse Response of the tank channels.
UWA OFDM system is proposed. The transmitted data of
each user can be located at different information bits in every
Before any transmission, a linear frequency modu- codeword during the polar encoding. Thus, there is no need
lated (LFM) signal is placed as the probe signal for the to superimpose the signal, which can eliminate the influence
purpose of symbol synchronization. Meanwhile, the estima- of the power allocation coefficient and make full use of the
tion of the CIR for each user can be obtained by matched power of the transducer at the sending node. Meanwhile,
filtering the received LFM data with the transmitted LFM the CSI as prior information is no longer needed and all users
signal. The real tank CIR of the two users are illustrated in share the same pilot tones and comb pilot vector, which makes
Fig.10. It is noticed that the CIR has seven paths, the one the utilization efficiency of OFDM subcarrier resource for
with the maximum power is the direct sound, and the next each user maximized. At the receiver, each user can simply
three maxima are made up by the reflexed sound from the obtain its output data independently by decoding according
surface, reflexed sound from the bottom, reflexed sound from to the own codebook without SIC, which reduces the com-
both the surface and the bottom. The power of these second plexity of the receiver for each user. Simulation and tank
reflexed sounds is much lower than the four paths mentioned experiment results demonstrate that the proposed multi-user
above, which appears during the time period of 0.03∼0.04s. detection scheme based on the novel polar code construction
The CIR of User B got the direct sound and one of the reflexed technique can significantly guarantee the reliability of all the
sound almost at the same time, that may affect the system users, thus making it suitable for the downlink UWA OFDM
BER performance. communication system.
In the tank experiment, the original data comes from a
grayscale image, and the total bits of the image is at the REFERENCES
magnitude of 106 . The figures restored by the received data
[1] R. Van Nee and R. Prasad, OFDM for Wireless Multimedia Communica-
after decoding are shown in Fig. 11. The received SNR is tions. Norwood, MA, USA: Artech House, 2000.
about 9.79 dB. It can be found that there is no error in the [2] F. Zhou, Q. Wang, D. Nie, and G. Qiao, ‘‘DE-Sync: A Doppler-enhanced
original polar code with code rate 7/16, while the BER of time synchronization for mobile underwater sensor networks,’’ Sensors,
vol. 18, no. 6, pp. 1710-1–1710-15, 2018.
the original polar code with code rate 7/8 is 0.0015. This is [3] G. Qiao, S. Z. Liu, F. Zhou, and Z. Sun, ‘‘Experimental study of long-
consistent with the relationship between the polar code rate range shallow water acoustic communication based on OFDM-modem,’’
and the system BER performance, the larger the code rate, Adv. Mater. Res., vols. 546–547, pp. 1308–1313, Jul. 2012.
the worse the performance. The BER of the two users are at [4] W. Wang, G. Qiao, Y. Wang, S. Xing, and S. Liu, ‘‘Decision feedback
estimation of multiple input/multiple output orthogonal frequency division
the magnitude of 10−5 and 10−4 respectively, both of them multiplexing channel based on punching technique via UWA shallow sea,’’
can guarantee reliable communication. Acta Armamentarii, vol. 34, no. 9, pp. 1116–1124, 2013.

65980 VOLUME 7, 2019


G. Qiao et al.: Multi-User Detection Scheme Based on Polar Code Construction

[5] M. Faheem, G. Tuna, and V. C. Gungor, ‘‘LRP: Link quality-aware queue- [28] P. Akuon and H. Xu, ‘‘Polar coded spatial modulation,’’ IET Commun.,
based spectral clustering routing protocol for underwater acoustic sensor vol. 8, no. 9, pp. 1459–1466, Jun. 2014.
networks,’’ Int. J. Commun. Syst., vol. 30, no. 12, pp. e3257-1–e3257-17, [29] S. Korada, E. Şaşoğlu, and R. Urbanke, ‘‘Polar codes: Characterization of
2017. exponent, bounds, and constructions,’’ IEEE Trans. Inf. Theory, vol. 56,
[6] M. Faheem, G. Tuna, and V. C. Gungor, ‘‘QERP: Quality-of-service (QoS) no. 12, pp. 6253–6264, Dec. 2010.
aware evolutionary routing protocol for underwater wireless sensor net- [30] W. Wang, L. Li, and K. Niu, ‘‘An efficient construction of polar codes
works,’’ IEEE Syst. J., vol. 12, no. 3, pp. 2066–2073, Sep. 2018. based on the general partial order,’’ EURASIP J. Wireless Commun. Netw.,
[7] Y.-L. Yin, F. Zhou, G. Qiao, and S.-Z. Liu, ‘‘Orthogonal multicarrier M -ary vol. 2019, no. 12, pp. 1–12, 2019.
cycle shift keying spread spectrum underwater acoustic communication,’’ [31] M. Hanif and M. Ardakani, ‘‘Polar codes: Bounds on Bhattacharyya
Acta Phys. Sinica, vol. 62, no. 22, 2013, Art. no. 224302. parameters and their applications,’’ IEEE Trans. Commun., vol. 66, no. 12,
[8] J. Yin, G. Yang, D. Huang, L. Jin, and Q. Guo, ‘‘Blind adaptive multi-user pp. 5927–5937, Dec. 2018.
detection for under-ice acoustic communications with mobile interfering [32] H. Mahdavifar and A. Vardy, ‘‘Achieving the secrecy capacity of wiretap
users,’’ J. Acoust. Soc. Amer., vol. 141, no. 1, pp. EL70–EL75, 2017. channels using polar codes,’’ IEEE Trans. Inf. Theory, vol. 57, no. 10,
[9] L.-X. Guo, X. Han, J.-W. Yin, and X.-S. Yu, ‘‘Underwater acoustic com- pp. 6428–6443, Oct. 2011.
munication by a single-vector sensor: Performance comparison using three [33] H. Wang, N. Li, Z. Han, and X. Tao, ‘‘Polar coding for the wiretap channel
different algorithms,’’ Shock Vib., vol. 2018, Nov. 2018, Art. no. 2510378. with shared key,’’ IEEE Trans. Inf. Forensics Security, vol. 13, no. 6,
[10] N. Morozs, P. Mitchell, and Y. V. Zakharov, ‘‘TDA-MAC: TDMA without pp. 1351–1360, Jun. 2018.
clock synchronization in underwater acoustic networks,’’ IEEE Access, [34] R. A. Chou and A. Yener, ‘‘Polar coding for the multiple access wiretap
vol. 6, pp. 1091–1108, 2018. channel via rate-splitting and cooperative jamming,’’ IEEE Trans. Inf.
[11] X. Cheng, F. Qu, and L. Yang, ‘‘Single carrier FDMA over underwater Theory, vol. 64, no. 12, pp. 7903–7921, Dec. 2018.
acoustic channels,’’ in Proc. CHINACOM Conf., Harbin, China, Aug. 2011,
pp. 1052–1057. GANG QIAO received the bachelor’s degree,
[12] K. Tu, T. M. Duman, M. Stojanovic, and J. G. Proakis, ‘‘OFDMA for in 1996, the master’s degree, in 1999, and the Ph.D.
underwater acoustic communications,’’ in Proc. 49th Annu. Allerton Conf. degree from the College of Underwater Acous-
Commun., Control, Comput., Sep. 2011, pp. 633–638. tic Engineering, Harbin Engineering University,
[13] Y. Zhang et al., ‘‘Adaptive OFDMA for downlink underwater acoustic China, in 2004. Since 1999, he has been with
communications,’’ in Proc. MTS/IEEE OCEANS Conf., Sep. 2014, pp. 1–5.
the College of Underwater Acoustic Engineering,
[14] L. Ma, S.-Z. Liu, and G. Qiao, ‘‘Sparse channel estimation and pilot
Harbin Engineering University, China, where he is
optimization for underwater acoustic orthogonal frequency division mul-
currently a Professor and the Associate Dean of
tiple access uplink communications,’’ Acta Phys. Sinica, vol. 64, no. 15,
pp. 154304-1–154304-10, 2015. the College of Underwater Acoustic Engineering.
[15] M. Stojanovic and L. Freitag, ‘‘Multichannel detection for wideband He has already published over 80 papers and holds
underwater acoustic CDMA communications,’’ IEEE J. Ocean. Eng., seven national invention patents. His current research interests include under-
vol. 31, no. 3, pp. 685–695, Jul. 2006. water communication and networks, detection, and positioning of under-
[16] T. C. Yang and W.-B. Yang, ‘‘Interference suppression for code-division water targets, and the sonar designed for small carriers. He is a member
multiple-access communications in an underwater acoustic channel,’’ of the Acoustical Society of China, a member of the Youth Federation of
J. Acoust. Soc. Amer., vol. 126, no. 1, pp. 220–228, Jul. 2009. Heilongjiang Province, and the Vice Chairman of the Robotics Society of
[17] J. Yin, P. Du, G. Yang, and H. Zhou, ‘‘Space-division multiple access Heilongjiang Province. He received the National Award for the Outstanding
for CDMA multiuser underwater acoustic communications,’’ J. Syst. Eng. Scientific and Technological Work, and the Science and Technology Award
Electron., vol. 26, no. 6, pp. 1184–1190, 2015. for Young Talents in Heilongjiang Province.
[18] J. Dang, F. Qu, Z. Zhang, and L. Yang, ‘‘Experimental results on
OFDM-IDMA communications with carrier frequency offsets,’’ in Proc. SIYU XING received the B.S. and M.S.
MTS/IEEE OCEANS Conf., May 2012, pp. 1–5. degrees from the Harbin Engineering University,
[19] S. Aliesawi, C. C. Tsimenidis, B. S. Sharif, and M. Johnston, ‘‘Contin-
in 2011 and 2014, respectively, where she is cur-
uous pilot based adaptive estimation for IDMA systems on underwater
rently pursuing the Ph.D. degree with the College
acoustic channels,’’ in Proc. IEEE Int. Conf. Acoust., Speech, Signal
Process. (ICASSP), May 2011, pp. 3476–3479.
of Underwater Acoustic Engineering. From 2016
[20] J. Dang, F. Qu, Z. Zhang, and L. Yang, ‘‘OFDM-IDMA communications
to 2017, she has experienced a one-year study with
over underwater acoustic channels,’’ in Proc. Mil. Commun. Conf., 2011, the School of Engineering, Newcastle University,
pp. 418–423. as a joint Ph.D. student, supported by the China
[21] A. Zafar, M. Shaqfeh, M.-S. Alouini, and H. Alnuweiri, ‘‘On multiple users Scholarship Council. Her research focuses on the
scheduling using superposition coding over Rayleigh fading channels,’’ physical layer techniques of underwater acoustic
IEEE Commun. Lett., vol. 17, no. 4, pp. 733–736, Apr. 2013. communication, the key technology of underwater acoustic OFDM commu-
[22] Z. Ding, Z. Yang, P. Fan, and H. V. Poor, ‘‘On the performance of nication systems, such as the peak-to-average power ratio reduction, Doppler
nonorthogonal multiple access in 5G systems with randomly deployed estimation, and compensation.
users,’’ IEEE Signal Process. Lett., vol. 21, no. 12, pp. 1501–1505,
Dec. 2014. FENG ZHOU received the B.S. and M.S. degrees
[23] S. Vanka, S. Srinivasa, Z. Gong, P. Vizi, K. Stamatiou, and M. Haenggi, in communication and information systems from
‘‘Superposition coding strategies: Design and experimental evaluation,’’ Jilin University, China, in 2002 and 2005, respec-
IEEE Trans. Wireless Commun., vol. 11, no. 7, pp. 2628–2639, Jul. 2012.
tively, and the Ph.D. degree from the College of
[24] Y. Wang, J. Yin, Z. Pan, and P. Du, ‘‘Application of OFDM-CDMA
Underwater Acoustic, Harbin Engineering Univer-
in multi-user underwater acoustic communication based on time rever-
sity (HEU), where he is currently an Associate
sal mirror,’’ in Proc. 3rd Int. Conf. Pioneering Comput. Scientists, Eng.
Educators (ICPCSEE), 2017, pp. 325–334. Professor with the College of Underwater Acous-
[25] L. Ma, S. Zhou, G. Qiao, S. Liu, and F. Zhou, ‘‘Superposition coding tic, for the past 14 years. Throughout his career,
for downlink underwater acoustic OFDM,’’ IEEE J. Ocean. Eng., vol. 42, he has worked on primarily on underwater acoustic
no. 1, pp. 175–187, Jan. 2017. communications. His current research interests are
[26] E. Arikan, ‘‘Channel polarization: A method for constructing capacity- underwater acoustic spread spectrum communications, underwater acous-
achieving codes for symmetric binary-input memoryless channels,’’ IEEE tic multi-carrier communications, localization in underwater networks, and
Trans. Inf. Theory, vol. 55, no. 7, pp. 3051–3073, Jul. 2009. underwater acoustic modem development. He received the National Natural
[27] R. Mori and T. Tanaka, ‘‘Source and channel polarization over finite fields Science Foundation Award to design efficient communication solutions for
and Reed–Solomon matrices,’’ IEEE Trans. Inf. Theory, vol. 60, no. 5, underwater applications, in 2013 and 2015, respectively.
pp. 2720–2736, May 2014.

VOLUME 7, 2019 65981

You might also like