Inverse Multipath Fingerprinting for Millimeter Wave V2I Beam Alignment

Inverse Multipath Fingerprinting for Millimeter Wave V2I Beam Alignment

Vutha Va, Junil Choi, Takayuki Shimizu, Gaurav Bansal, and Robert W. Heath, Jr. Vutha Va and Robert W. Heath, Jr. are with the Wireless Networking and Communications Group, The University of Texas at Austin, TX 78712-1687 USA (e-mail: vutha.va@utexas.edu, rheath@utexas.edu).Junil Choi is with the Department of Electrical Engineering, Pohang University of Science and Technology (POSTECH), Pohang, Gyeongbuk, Korea 37673 (e-mail: junil@postech.ac.kr).Takayuki Shimizu and Gaurav Bansal are with TOYOTA InfoTechnology Center, U.S.A., Inc., Mountain View, CA 94043 USA (e-mail: tshimizu@us.toyota-itc.com, gbansal@us.toyota-itc.com).This work is supported in part by the U.S. Department of Transportation through the Data-Supported Transportation Operations and Planning (D-STOP) Tier 1 University Transportation Center and by the Texas Department of Transportation under Project 0-6877 entitled “Communications and Radar-Supported Transportation Operations and Planning (CAR-STOP)” and by a gift from TOYOTA InfoTechnology Center, U.S.A., Inc.
Abstract

Efficient beam alignment is a crucial component in millimeter wave systems with analog beamforming, especially in fast-changing vehicular settings. This paper proposes a position-aided approach where the vehicle’s position (e.g., available via GPS) is used to query the multipath fingerprint database, which provides prior knowledge of potential pointing directions for reliable beam alignment. The approach is the inverse of fingerprinting localization, where the measured multipath signature is compared to the fingerprint database to retrieve the most likely position. The power loss probability is introduced as a metric to quantify misalignment accuracy and is used for optimizing candidate beam selection. Two candidate beam selection methods are developed, where one is a heuristic while the other minimizes the misalignment probability. The proposed beam alignment is evaluated using realistic channels generated from a commercial ray-tracing simulator. Using the generated channels, an extensive investigation is provided, which includes the required measurement sample size to build an effective fingerprint, the impact of measurement noise, the sensitivity to changes in traffic density, and beam alignment overhead comparison with IEEE 802.11ad as the baseline. Using the concept of beam coherence time, which is the duration between two consecutive beam alignments, and parameters of IEEE 802.11ad, the overhead is compared in the mobility context. The results show that while the proposed approach provides increasing rates with larger antenna arrays, IEEE 802.11ad has decreasing rates due to the larger beam training overhead that eats up a large portion of the beam coherence time, which becomes shorter with increasing mobility.

Millimeter wave, vehicular communication, 5G mobile communication, beam alignment, position-aided.

I Introduction

Communication enhances advanced driver assistance systems, enables a wide range of infotainment options, and paves the way towards fully automated driving. Vehicular automation capabilities rely heavily on perception sensors such as camera, radar, and LIDAR [1]. Sharing the data from these sensors between vehicles, or with the infrastructure, can extend the sensing range as well as provide redundancy in case of sensor failures. High data rate links with the infrastructure also enable map updates, edge-network control of vehicles, and a wider range of infotainment services. Unfortunately, the data rate requirements are increasing beyond what can be provided by the fourth generation (4G) cellular or Dedicated Short-Range Communication (DSRC) solutions [2, 3, 4].

Millimeter wave (mmWave) is a means to provide high data rates in vehicle-to-everything (V2X) settings [5, 4], thanks to the large spectral channels [5]. The need for adaptive antennas to overcome the shrinking antenna aperture at high frequencies is one of the main challenges in using mmWave [5, 4]. Due to the use of sharp beams and the high susceptibility to blockage, beam pointing directions have to be aligned and readjusted according to the changes in the environment. The high mobility in the vehicular context will require frequent beam realignment. Therefore, fast and efficient beam alignment is crucial in enabling high data rate mmWave vehicular communications.

Prior knowledge of the propagation environment can help reduce the beam alignment overhead. This paper focuses on the use of multipath fingerprints, which are the long-term multipath channel characteristics associated with locations. The term “fingerprint” originates from the localization literature [6, 7, 8], where the main premise is that channel characteristics are highly correlated with locations. In fingerprinting-based localization methods, there is a fingerprint database, which records fingerprints at different locations in the area of interest. When a terminal wants to localize itself, it first performs radio frequency (RF) channel measurements to obtain the multipath fingerprint at the current location. The obtained fingerprint is then matched against the fingerprints in the database and the output location is computed based on the matched fingerprints in the database that are “closest” to the observed fingerprint. Considering the availability of position information in the vehicular context, we propose to use this idea in inverse. Localization is an important task in driving automation, where vehicles position themselves via a suite of sensors including Global Positioning System (GPS), cameras, and LIDAR [9]. This position information can be used to query the fingerprint database which is indexed by location to determine beam directions that are likely to provide satisfactory link quality. Because of the sparsity of mmWave channels [10], potential directions are expected to be highly concentrated, and thus we expect a large reduction in the beam training overhead.

The objective of this paper is to develop an efficient beam alignment method suitable for a vehicle-to-infrastructure (V2I) setting. Our contributions are summarized as follows.

  • We propose a novel and efficient beam alignment method using multipath fingerprints. This paper focuses on an offline learning setting where there is a dedicated period of time for building the database before it is used for efficient beam alignment. We provide a numerical example to show its extensibility to an online learning setting.

  • Two types of fingerprints (Types A and B) are proposed, which differ in how measurements are collected and stored. Type A assumes each contributing vehicle performs an exhaustive search over all beam pairs (so that correlation between beam pairs can be captured), while Type B collects only a fraction of the exhaustive search at a time. Type A stores the raw received power, while Type B only stores the average received power of each beam pair. This provides flexibility for actual implementations, where data collection and storage cost must be met.

  • We introduce the power loss probability as a metric for evaluating the beam alignment accuracy. This metric leads to a mathematical framework for optimizing the candidate beam pair selection. We propose two beam pair selection methods, where one is a heuristic and the other is a solution that minimizes the misalignment probability.

  • We provide an extensive numerical investigation, which includes the training sample size to build the fingerprint database, beam training overhead comparison with IEEE 802.11ad, and the sensitivity to changes in vehicular traffic density. For the overhead comparison, we leverage the concept of beam coherence time [11] to quantify the beam training cost in the vehicular context. We use realistic channels generated from a commercial ray-tracing simulator, Wireless InSite [12], in all our results.

We note that while we emphasize the V2I context in this work, the approach can also be applied to general cellular settings. An additional challenge is in how to determine the orientation of the antenna array of the user equipment (which is needed to translate angles of arrival and departure (AoAs/AoDs) to beam indices). This is not as important for vehicles because the array is fixed on the vehicle (e.g., the roof) and the orientation can be determined from the heading of the vehicle.

Beam alignment is a subject of intense research because of its importance in enabling mmWave communications. Here, we summarize and compare with relevant work in the context of analog beamforming, where both the transmitter and receiver have only one RF chain. We group existing solutions into four categories: beam sweeping [13, 14, 15], AoAs/AoDs estimation [16, 17, 18], blackbox optimization [19, 20, 21], and side information [22, 23, 24, 25, 26, 27, 28, 29].

Beam sweeping involves a set of beam measurements designed to cover all possible pointing directions, whose simplest form is the exhaustive search. It is simple and robust because it makes few assumptions on the channel. It only requires that the spatial channel does not change during the sweeping time. This approach has been adopted in existing mmWave standards such as IEEE 802.15.3c [30] and IEEE 802.11ad[31] for indoor use cases. The brute force search measures all transmit and receive beam pair combinations resulting in quadratic complexity in the beam codebook size. Our approach reduces the search time by prioritizing the most promising directions identified from the fingerprints. The beam search can also be done hierarchically [13, 14, 15], but the search time does not change much because large spreading is needed to use wide beams in the initial stage [32].

AoA/AoD estimation leverages the sparsity of mmWave channels to reduce the number of measurements required compared to beam sweeping. For example, compressive sensing is used in [16, 17] while an approximate maximum likelihood estimator is derived using the channel structure directly in [18]. Compressive measurements have to overcome the lack of antenna gain during the measurement phase, unlike our approach that uses narrow beams for the beam training.

Blackbox optimization is another approach to efficiently explore the beam directions [19, 20, 21]. This framework is based on the premise that there is some structure (e.g., smoothness) of the objective function (i.e., the received power here), and thus one does not have to blindly search all the beam pair combinations. This approach uses narrow beams in the initial search like our method, but it requires a larger number of feedbacks to navigate the search region and this feedback overhead will be the bottleneck in reducing the search time.

The final category uses side information available from sensors (including communication systems at other frequencies). Radar information is used in [22], and information from lower frequencies is used in [23, 24]. More related to our work are those that use position information [25, 26, 27, 28, 29]. The work in [25, 26, 27] uses position to determine beam directions. This can eliminate the beam training overhead but it only works when the LOS path is available. More elaborate channel models with LOS obstruction have been investigated in [28, 29]. It is proposed in [28] to memorize successful beam configurations observed in the past but no detail is given on how to rank those configurations in terms of their likelihood to provide a good link. Omnidirectional antennas at the users are assumed in [28], which may be impractical for mmWave communications. In [29], a heuristic is proposed for a hierarchical beam search with the help of position and multipath database. Only the search in the azimuth was considered and horn antennas were assumed. Our proposed approach is in this category, where we use position information and multipath fingerprints. Unlike [25, 26, 27], by leveraging multipath fingerprints, our approach can work in both LOS and non-LOS (NLOS) channels. Different from [28, 29], the proposed beam training uses narrow beams at both the roadside unit (RSU) and the vehicle. Also, we provide a mathematical framework to rank beam pointing directions from past measurements in the fingerprint database and both azimuth and elevation are considered.

The rest of the paper is as follows. The system model is described in Section II. In Section III, we define the multipath fingerprints and explain how the proposed beam alignment works. We provide an analytical framework for quantifying beam alignment accuracy in Section IV. In Section V, we present our beam candidate selection methods using the fingerprints. An extensive numerical investigation is provided in Section VI. Finally, the paper is concluded in Section VII.

Ii System Model

This paper proposes an efficient beam alignment method for V2I communications in an urban street canyon environment with high traffic density, where LOS is often unavailable and represents a challenging scenario for beam alignment. While the methodology of the beam training is general, we test the approach using data from a commercial ray-tracing simulator, Wireless InSite [12]. The evaluations of the proposed method are conducted via post-processing in MATLAB.

Ii-a Channel Model

The simulation environment is shown in Fig. 1, which is an urban street with two lanes. All the buildings are made of concrete (relative permittivity and conductivity S/m [33, Table 3]), and the road surfaces are made of asphalt ( and S/m [34]). The surface root mean square roughness is set to 0.2 mm for concrete and 0.34 mm for asphalt [34, Table 1]. We allow up to two reflections and one diffraction. We simulate two types of vehicles represented by metal boxes (made of perfect electric conductor which is predefined in Wireless InSite [12]): cars () and trucks (). The cars-to-trucks ratio is 3:2. The RSU is placed on the right side, and a car on the left lane is selected as the communicating vehicle (CV). The antenna heights are 7 m and 1.5 m for the RSU and the CV (on its roof), respectively. Because trucks are taller, they could block the LOS path between the CV and the RSU. The carrier frequency is set to 60 GHz.

To imitate the dynamic blockage environment, we simulate multiple snapshots of the scenario where vehicles are independently and randomly placed in each snapshot. The gap between vehicles (i.e., from the front bumper to the rear bumper of the heading vehicle) is randomly determined from the Erlang distribution [35] given by

(1)

where is the shape parameter and is the mean gap. Following [36], and are used in our simulation, which produces an average gap of m. Since multipath fingerprints are associated with locations, we need to generate multiple channels at a given location. To do this, the CV is placed at a longitudinal distance from the RSU (see Fig. 1), where is uniformly drawn from for some mean distance and some grid size . m and m are used when generating the channels. When applying our method, all points within this range are treated as being in the “same” location bin indexed by . By discretizing the location this way, we can provide some resilience to errors in position information estimated by the vehicle. The edge effect can be mitigated by defining overlapping location bins.

Fig. 1: Ray-tracing simulation environment. The numbers in the parenthesis are the antenna heights.

We note that no mobility is considered during the beam training. The beam training duration for the proposed method is sub-millisecond (see Section VI-F), so the displacement of vehicles during the beam training is negligible. For example, when arrays are used the training duration is about 150 s, so the displacement is only mm even with a speed of 20 m/s (high in urban scenarios). Our proposed beam alignment can be considered as an initial link establishment, and after which a beam tracking method such as [37] could be used to maintain the link to further reduce the overhead. Each channel sample corresponds to a random and independent placement of vehicles as described earlier in a per snapshot basis. These different snapshots produce blocking dynamics, where a good path in a snapshot could be useless due to blockage in another snapshot even if in both snapshots the CV is at the same location bin.

The output from the ray-tracing simulation is combined with the geometric channel model to obtain the corresponding channel matrix. A ray-tracing simulation outputs a number of rays, each corresponding to a distinct propagation path. The information associated with each ray includes the received power, the delay of the path, the phase, the AoA, and the AoD. Denoting the conjugate transpose, and the numbers of transmit and receive antennas, the number of rays, the complex channel gain, the delay, and the elevation AoA and AoD, and the azimuth AoA and AoD of the -th ray, the combined effect of lowpass filtering and pulse shaping, the system bandwidth, the symbol period, and and the receive and transmit steering vectors, the channel can be written as

(2)

The raised cosine filter with a roll-off factor of 0.1 is assumed for the pulse shaping filter. The total number of rays is . We use the Full3D model with Shooting and Bouncing Ray (SBR) tracing mode in Wireless InSite. The ray spacing is , which means the simulator shoots hundreds of rays and determines which of them form valid propagation paths and records the strongest 25 of them. The power gap among these 25 rays is more than 20 dB, and thus there is little value in keeping more rays. We also note that since we use ray-tracing, there is no need to specify the number of clusters or rays per cluster as typical of stochastic channel models. The ray-tracing will determine all relevant propagation paths. In fact, some of the 25 rays can be thought of as belonging to the same cluster in the sense that they have similar delays and AoAs. Note that by using ray-tracing, we ensure that the channels are spatially consistent, which is a feature not available in most stochastic channel models.

We use uniform planar arrays (UPAs) at both the transmitter and the receiver. Let , , be the wave number, denote the Kronecker product, and be the numbers of elements along the x- and y-axis, and and be the element spacing in the x- and y-direction, the steering vector is

In this paper, we use .

Ii-B Received Signal Model

We assume a time division duplex (TDD) system with analog beamforming, which uses only one RF chain. We assume the symbol timing is synchronized to the first path (shortest delay). This means that paths with larger delay are not likely synchronized to the sampling timing and the energy will leak to adjacent symbols, with the leak amount determined by the combined filter response . The received signal when the -th beam pair is used can be written as the time-domain convolution between the transmit signal and the effective channel seen through the -th beam pair , i.e.,

(3)

where , is the channel length, is the transmit power, is the known training signal, and denote the mapping of the beam pair index to the combiner and beamformer vector indices, and is the zero mean complex Gaussian noise . Let , and , we can rewrite the received signal in a matrix form as

(4)

where is the circularly shifted training sequence with the training sequence length. The channel can be estimated using a least-square approach as

(5)
(6)

where is the pseudo-inverse. When using a training sequence with good autocorrelation properties like Zadoff-Chu or Golay sequences, and the estimation error can be modeled as [38]. We refer to [38, Chapter 5] for more details. Note that the received powers in the fingerprints have to be measured using the same (or scaled appropriately if different are used). In our simulations, we use which is motivated by the training sequence used in IEEE 802.11ad. The Channel Estimation Field (CEF) of IEEE 802.11ad frame consists of two training sequences of length 512 which can be used to perform two independent channel estimations [31]. The actual channel length varies for different snapshots of the ray-tracing simulation and can be larger than 512. Since the powers of those paths with large delays are observed to be negligible compared to paths with short delays, we truncate the channel to get .

The vector and are selected from the receiver codebook and transmitter codebook , respectively. We assume UPAs are used at both the CV and the RSU. The beams in the codebook are generated using progressive phase shift [39] between antenna elements. The main lobe directions of the generated beams are separated by their 3dB-beamwidth. This ensures that the array gain fluctuates less than 3 dB over the entire field of view of the antenna array. We note that our proposed approach does not depend on this specific codebook, and any other codebook designs can replace the one used here.

Iii Inverse Fingerprint Beam Alignment

The main idea of the proposed approach is to leverage prior knowledge to identify promising beam directions and only train those directions. The prior knowledge is obtained from past observations in the database, and some of these paths may not exist in the current channel due to blockage by a truck for example. Therefore, beam training among the beam directions identified from the database is still required. The beam training here has much lower overhead than conventional methods because a large number of unlikely directions have already been eliminated using the database. In this section, we will define fingerprints and explain how the database is constructed. Then, we will describe the proposed approach for beam alignment.

Iii-a Multipath Fingerprint Database

In general, a fingerprint refers to some characteristics of the channel at a given location. These characteristics could be the received signal strengths from different access points [7] or the multipath signature of the channel from an access point [8]. In this work, a fingerprint refers to a set of received powers of different pairs of transmit and receive beams at a given location. We note that the location here refers to a grid so that the system can tolerate position information error used to query the fingerprint database.

We define two types of fingerprints, which differ by how measurement data are collected and stored. The first type, called Type A, requires that the contributing vehicle perform a full exhaustive beam measurements over all beam pairs. This ensures that the measurements over the different pairs happen within a channel coherence time so that the spatial channel does not change. This way, the fingerprint captures the correlation between the different beam pairs, i.e., whether they tend to have similar received power or not. For Type A fingerprints, the raw measurement samples are stored. One could store all the measurements of all the beam pairs from each contributing vehicle, but if memory storage is of concern, only the measurements of the top- beam pairs (ranked by the received power) can be stored. This makes sense because most of the beam pairs have negligible received power (since their main beam directions do not point along any propagation paths), and thus there is negligible information gain in keeping all beam pairs. In our simulation, we use . The average power difference between the strongest beam pair and the 100th strongest over the channel samples used is 22.2 dB. An example of Type A fingerprints is shown in Table I. In this example, there are observations collected by contributing vehicles.

Type B fingerprints do not require that the measurement of all the beam pair combinations be completed within a channel coherence time. This less restrictive data collection reduces the burden on individual vehicles contributing to building the database, as they do not need to commit to conducting a full scan of the exhaustive search and could contribute as many beam measurements as their time allows. A simple method would be to do a round-robin over the beam pair combinations. For example, assume that each vehicle can do only of the full exhaustive search. The RSU then divides the set of all beam pairs into four disjoint sets and assign these sets sequentially to subsequent contributing vehicles to collect the measurement data. The disadvantage is that now the correlation between the beam pairs cannot be easily captured. Only the average received powers (the average is computed in linear scale) of the beam pairs are stored. An example of Type B fingerprints is shown in Table II. We note that the sample averages can be computed recursively, and thus there is no need to temporally store the raw samples when collecting Type B fingerprints.

Observation No. Best 2nd best -th best
1 5 159 346
-64.5 dBm -69.2 dBm -95.8 dBm
2 159 263 354
-70.4 dBm -72.6 dBm -97.1 dBm
5 258 2
-66.4 dBm -68.1 dBm -82.6 dBm
TABLE I: An example of Type A fingerprints. For each contributing vehicles, the measurements of the top- beam pairs are stored. In each cell, the integer at the top is the beam pair index and the number at bottom is the received power.
Beam pair index 1 2
Average received power -92.3 dBm -73.5 dBm
TABLE II: An example of Type B fingerprints at a location bin. The average received power for each beam pair is recorded.

We focus on an offline learning setting to build the database in this work. The idea can readily be implemented online as shown in Section VI-G. In the proposed approach, the database is built and maintained by the RSU. By offline learning, we mean there is a dedicated period of time that is used to collect data to build the fingerprint database before it is exploited for efficient beam alignment. During this period, each contributing vehicle conducts beam training with the RSU. By having the vehicle be the transmitter during the beam training, there is no feedback. The RSU can measure the received power for each of the beam pairs and collect these observations to build the fingerprint database. In the case that each contributing vehicle can perform a full exhaustive search over all beam pair combinations in the codebook, we obtain Type A fingerprints. If each contributing vehicle cannot perform a full exhaustive search, we get Type B fingerprints.

We now discuss the cost for building and storing the database. The database can be collected in the initial stage of the system deployment. The RSU can request vehicles passing by its coverage to conduct beam training. Most modern vehicles are GPS equipped either for navigation or for safety message (which includes position, speed, and heading among other information) dissemination such as in DSRC. Thus, it is fair to assume that any vehicles equipped with mmWave communication also have positioning capability, and all mmWave communication capable vehicles can contribute to build the database. As shown in Section VI-B, around 250 full exhaustive beam measurements are enough to get a fully functioning database. In a dense urban traffic setting, this could be done within an hour if not less (e.g., the number of vehicles passing through an urban road segment was more than 100 per lane in 15 minutes as reported in the NGSIM Lankershim dataset [40]). We note that if exhaustive search is used as the beam alignment method when the database is not available [32], the data collection is essentially free since the vehicles will need to conduct the exhaustive search to establish the link during this stage.

The next question is how frequent the database needs to be updated. The main premise of the proposed method is to learn the long-term multipath information from the database, which is the propagation directions that depend on the geometry of the environment such as the road structure and buildings. The change in the traffic density can affect the relative importance of different paths, but as shown in Section VI-E, if the database is collected in a dense traffic, it will also work well in light traffic conditions. Thus, we expect the database collected in high traffic density to be valid for a long period of time such as weeks or even months if there is no construction in the surrounding buildings and road structure. Of course, once a functioning database has been established, it can be reinforced by requesting idle vehicles passing by to conduct beam measurements and replace the older data with the newly collected ones. This update can be done at a slow pace since we expect the database to change slowly.

Finally, we consider the storage requirement. For Type A fingerprints, using bytes for one received power and bytes for one beam index, the total storage of Table I is bytes. Assuming , and 200 location bins per RSU coverage (1 m bin size and 200 m RSU coverage), it requires about 30 MB. Type B requires even less data storage. This amount of data can be easily stored in any modern devices. Therefore, we conclude that storage is not at all a problem.

Iii-B Proposed Beam Alignment

Fig. 2 shows how the proposed beam alignment works. The procedure is initiated by a CV by transmitting a beam training request using a low-frequency system such as DSRC or mmWave communication with a large spreading factor. Within this request packet, the CV also includes its current position, which is available from some localization sensors equipped on the vehicle (e.g., GPS or other more advanced positioning method based on LIDAR and 3D map [9]). Upon receiving the request, the RSU will use the position information to query its database to obtain the fingerprint associated with that location. Using the fingerprint, the RSU determines the candidate beam pairs that are likely to provide a satisfactory link connection. The RSU then responds back with an acknowledgment to allow the beam training and also provides a list of candidate beam pairs. Beam pair selection methods will be described in Section V. The CV can now proceed to perform the beam training following the list provided by the RSU. Note that the list consists of beam pairs, and there is no need to do exhaustive measurements over all combinations of transmit and receive beams in the list. Upon completing the list, the RSU provides a feedback indicating the best beam index to the CV. This feedback ends the beam alignment and high data rate mmWave communication can start.

Fig. 2: Timing diagram of the proposed inverse fingerprint beam alignment method. The CV sends a beam training request with its position to the RSU. The RSU acknowledges and provides a list of candidate beam pairs for training by querying the fingerprint database using the CV’s position. Beam training can then start following the list. At the end, the RSU feeds back the best observed beam to the CV and high speed mmWave communications can begin.

Several remarks on the proposed method are now provided.

Remark 1: The position information here does not have to be highly accurate. It only needs to be accurate enough to identify the location bin index of the fingerprints. In our simulation, this bin size is 5 m. Edge effects can be avoided by having overlapping location bins.

Remark 2: The proposed method allows graceful degradation as the number of beam pairs trained decreases because the alignment accuracy decreases probabilistically with and there is no hard threshold on . See Fig. 8 for an example of how the average rate changes with . This is a desirable feature that allows the tradeoff between latency in link establishment and accuracy of the beam alignment.

Remark 3: Our method performs the beam training using only narrow beams, which provides several advantages. Narrow beams provide high antenna gain and are more resilient to Doppler spread [11]. Also, methods employing wide quasi-omni beams can suffer from antenna gain fluctuation because it is challenging to produce wide beamwidths with low gain fluctuation [15].

Remark 4: By having the CV transmit and the RSU receive during the beam training, the RSU obtains beam measurements for free, i.e., without any feedback from the CV. These measurements can be used for updating the database.

Iv Quantifying Beam Alignment Accuracy

This section defines a metric for measuring the beam alignment accuracy, which allows us to compare different candidate beam pair selection methods and can serve as a framework for optimizing the method to select candidate beam pairs for training in Section V. The definition here is defined assuming the measurement noise is negligible. In the presence of measurement noise, the metrics computed using (7) and (8) will be less accurate and can affect the beam pair selection and degrade the beam alignment accuracy. We investigate the effect of noise numerically in Section VI-D and show that the degradation due to noise is negligible if the transmit power is not too low.

The power loss is defined as the ratio between the received power of the optimal beam pair and the pair selected by the beam alignment method indexed by . Let be the set of all beam pair combinations, and be the received power of the -th beam pair. The power loss can be written as

(7)

If noise is negligible, the strongest beam pair will be selected after the beam training so that , where is the set of candidate beams selected for beam training. The power loss probability is defined as the probability that for some , i.e.,

(8)
(9)

We note that since is defined as a subset of , the definition in (9) is always well-defined.

V Candidate Beam Pair Selection Methods

This section proposes two methods to select candidate beam pairs for beam training using the information in the fingerprint database. The objective of the selection methods is to maximize the received power of the finally selected beam pair for a given beam training budget of . The first approach is a heuristic, while the second one minimizes the misalignment probability defined in Section IV. The heuristic is intended to be used with Type B fingerprints, and the other method is to be used with Type A fingerprints.

V-a Selection by Ranking Average Received Powers

This method is based on the simple intuition that we should choose candidate beam pairs with the highest expected received power. The proposed approach is to first rank the beam pairs by their average received powers in descending order and select the highest pairs for beam training. Note that this metric can balance the selection of opportunistic paths because such paths will occasionally have high received power so that their average received powers are relatively high. If the occurrence of the opportunistic path is high enough, its average received power will be larger than a path that always has moderate received power and the opportunistic path is selected. If the occurrence is rare, the average received power of the opportunistic path is low and the path with always moderate received power is selected by this method. Thus, this metric can balance the risk and gain to some extent. We call this method AvgPow.

V-B Selection by Minimizing the Misalignment Probability

Since the objective of beam alignment is to maximize the received power, an indirect way to achieve that is to choose the beam pair to minimize the misalignment probability, which is the power loss probability . For a given training budget of , the problem can be formulated as a subset selection problem given by

(10)
subject to

Here, denotes the cardinality of the set . This is a subset selection problem, which is combinatoric in nature and is difficult to solve in general, especially when is large. Fortunately, the structure of allows an efficient solution. Note that the problem (10) is equivalent to maximizing . Since is a modular function, the greedy solution given in Algorithm 1 is optimal [41, Theorem 7]. This is a well-known result that has been reported in different forms in the literature (see [42] and references therein.)

Proposition 1

is modular.

Proof:

Using the definition of power loss probability in (9) with , we have

(11)
(12)
(13)
(14)

where (12) is the application of the law of total probability on the event , and (13) follows because if then and if then . Using the fact that , we obtain (14). From (14), we have

(15)

Thus, for any and , we have , which is the definition of modular functions [43, 42]. \qed

While the solution in Algorithm 1 is intuitive, using a brute force search to solve the minimization problem at each selection step is not efficient. At each selection step, we need to evaluate the power loss probability times. Since typically is much larger than , this means that the total number of evaluations is . Defining the probability of being optimal as

(16)
(17)

the proof of Proposition 1 suggests a more efficient solution. From (14), we see that minimizing over is equivalent to solving

(18)

This means that Algorithm 1 is equivalent to selecting the beam pairs by ranking their probability of being optimal in descending order. This solution requires to compute the probability of being optimal times.

1:  
2:  for  do
3:     
4:  end for
Algorithm 1 Greedy candidate beam pair selection

We now present how to compute . Note that Type B cannot be used to compute because it only stores the average received powers. Denote the received power observed at the -th beam pair in the -th observation, is estimated using Type A fingerprints by

(19)

where is the number of observations in the fingerprint database (number of rows of Table I), and is the indicator function which outputs 1 if is true and 0 otherwise. Note that if we choose to keep measurements per contributing vehicle, not all for are recorded. We assume those that are not recorded to be zero in (19). This is a reasonable approximation because these are much smaller than the received power of the top ranked beam pairs that are recorded in the database. The expression in (19) is equivalent to counting how often the -th beam pair is observed to be the strongest. This means that is estimated to be 0 for all beam pairs that have not yet been seen to be the strongest in the database collected. Less important beam pairs that rarely provide the strongest received power are difficult to rank using (19) with a reasonable . In fact, in our simulation in Section VI-A with , there are about 30 distinct beam pairs that are observed to be the best at least once in the database. This means that using (19), we can produce a ranked list of length up to around 30. Since this list is short, it could happen that the allowable training budget is larger than 30, and we want to produce a longer list that ranks the less important beam pairs while using the same database. We propose to rank these less important beam pairs by the same metric but computed while ignoring the correlation in the fingerprints. By assuming the independence between the pairs, we have

(20)
(21)

To summarize, this beam pair selection method uses both (19) and (21) to produce a ranked list of beam pairs. Let be the set of all beam pairs with nonzero according to (19), then the top- in the ranked list are obtained using (19), and the rest of the beam pairs are ranked using (21). We call this beam pair selection method MinMisProb.

Vi Numerical Results and Discussions

This section provides numerical evaluations of the proposed beam alignment. All evaluations here use a dataset of 500 channel samples generated from the ray-tracing simulator (see Fig. 1) and assume UPAs at both the CV and RSU unless stated otherwise. The codebook for the array has 271 beams. We conduct -fold cross validation, with as recommended in [44]. Specifically, the dataset of 500 channel samples is divided into 10 subsets (or folds) of size 50 each. Then, nine of them are used as the training set to build the database, and the remaining one is used as the test set to evaluate the proposed beam alignment. This is repeated 10 times, where each time a different subset is selected as the test data. When a different evaluation method is used, it will be stated explicitly. Common simulation parameters are summarized in Table III.

Parameters Value
Carrier frequency 60 GHz
Bandwidth 1760 MHz
Antenna array 1616 UPA
Mean vehicle gap   4.78 m
TABLE III: Common simulation parameters

The two types of database are built in the following manners in the simulations. For Type A fingerprints, each contributing vehicle conducts a full exhaustive beam measurements and the top-100 beam pairs are recorded as explained in Section III-A. For a fair comparison, the two types of database should be built using the same number of measurement data. Thus, the database for Type B is obtained by summarizing Type A database. Specifically, instead of keeping all the raw received powers, only the average received power is recorded for each beam pair. We note that in actual implementations of Type B data collection, a full exhaustive search can be collected by a number of vehicles depending on the time budget the vehicles have as mentioned in Section III-A.

Vi-a Performance Comparison of Proposed Beam Pair Selection Methods

This subsection presents a performance comparison of the proposed beam alignment method with the two candidate beam pair selection methods, namely AvgPow and MinMisProb, when the measurement noise is negligible. The impact of noise will be considered in the next subsection.

Fig. 3: Power loss probability versus the number of beam pairs trained. The 3 dB power loss probability plot ends before reaching because there is no such instance of power loss computed from the cross validation. MinMisProb outperforms AvgPow in both the misalignment and 3 dB power loss probability.

Fig. 3 compares the two beam pair selection methods in terms of the power loss probability. Two different levels of power loss severity are shown: the misalignment probability and the probability that the power loss is less than 3 dB (called the 3 dB power loss probability). MinMisProb dominates AvgPow in both levels of misalignment. This is expected because MinMisProb is optimal (in terms of the misalignment probability) by its definition that exploits the correlation between the different beam pairs available in Type A fingerprints. We note that when computing the probability of being optimal using (19), the number of beam pairs with nonzero is around 30 (the exact number depends on the folds chosen for training). The plots of MinMisProb become flat at of around . This means that the complementary selection using (21) does not perform as well as when using (19) that exploits the correlation information. It, however, can still identify relevant beam pairs without additional training data. From these results, we conclude that if Type A fingerprints are available, MinMisProb is the choice; otherwise, the AvgPow method should be used.

Vi-B Required Training Sample Size

This subsection provides an empirical evaluation to estimate the training sample size to build the fingerprint database. By sample size here, we mean the number of exhaustive beam measurements conducted to collect the data (i.e., the number of rows of Table I). We start with the description of the evaluation method. We still use the 10-fold cross validation as before, but now instead of using all the nine folds (450 samples) for training, we only use a subset of of these samples. To average out the dependence on the sampling of the subset, we repeat the evaluation of the test set 50 times, where in each time we randomly choose samples out of the available training set of samples to build the database. Both AvgPow and MinMisProb show a similar trend, and we show only the results for AvgPow here.

(a) Average 3 dB power loss probability
(b) Learning curve at
Fig. 4: 3 dB power loss probability of AvgPow as a function of the training sample size . Fig. 4(a) shows the average 3 dB power loss probability for different . Fig. 4(b) shows the learning curve in terms of the 3 dB power loss probability when the number of beam pairs measured is set to . We can see from the plots that the improvement diminishes for subsequent increase in the training sample size.

We evaluate the quality of the fingerprint obtained using the training set of size by the average of the power loss probabilities estimated by the 50 cross validations as described earlier. Fig. 4 shows average 3 dB power loss probabilities for the training sample size ranging from 50 to 250. We can see a large improvement when increasing from 50 to 90. Subsequent increases in , however, provide diminishing improvement. To see this effect more clearly, we plot in Fig. 4(b) the 3 dB power loss probability when the number of beam pairs trained is fixed at . This plot is typically known as the learning curve [44], which quantifies the improvement as the training sample size (i.e., the learning effort) increases. The figure shows the mean and the region of one standard deviation from the mean. We see a sharp improvement up to around , and a slower improvement beyond that. We thus conclude that a training sample size of around 200 to 250 seems good enough.

Fig. 5: Average 3 dB power loss probability when using different location bin sizes. All bin sizes performs similarly when using arrays. When using the larger arrays, smaller bin sizes performs better.

Vi-C Effect of Location Bin Size

We start with the description of the evaluation method. We use 10-fold cross validations on 300 channel samples where the CV is within the location bin. Recall from Section II-A that the channel samples are generated with the center of the location bin at m and the CV is randomly placed in the range . For example, when evaluating the performance for a bin size of 2 m, we only use the channel samples where the CV’s center position (the position of its antenna) is within . Since each cross validation is computed on a different dataset, we need to perform averaging to eliminate dependency on the dataset. To do this, we repeat the cross validation 50 times, where each time 300 channel samples are randomly selected from the set of the channel samples where the CV is within the location bin. To be able to evaluate small bin sizes, we generated more channel samples (total 1000 samples) to ensure that we have enough samples for the averaging. For the comparison metric, we use the average 3 dB power loss probability, which is obtained by averaging over the results from the 50 cross validations. AvgPow is used as the beam selection method.

Fig. 5 shows the average 3 dB power loss probability for location bin sizes of 2, 3, 4, and 5 m when using UPA and . The variation of the bin size from 2 m to 5 m has little impact when using the arrays. We note that the plots are in log-scale and the gap at is small (it is less than 0.002). When using a larger array of , which requires higher location precision, we can see that a smaller bin size provides better performance. The physical reason why the performance is not that sensitive to the location bin size is that NLOS paths are less affected by the position accuracy than a LOS path. This is because NLOS paths have nonzero angular spread which makes it easier for beam alignment. Instead of having to align to a single direction as in the LOS path, the beam can be aligned to within the range of the angular spread. From these results, we can conclude that location bin size of 5 m is good enough when using UPA . When using a large array such as , smaller bin sizes provide better performance. Finally, note that while smaller bin sizes are preferred for beam alignment performance, it has to be large enough to account for the level of position accuracy available to the vehicles.

Vi-D Effect of Measurement Noise

Fig. 6: CDF of the link SNR of the generated channels.

This subsection studies the effect of measurement noise on the beam alignment accuracy. The results are shown in terms of the Equivalent Isotropic Radiated Power (EIRP), which is the transmit power plus the transmit antenna gain (in dB scale). EIRP is used instead of the transmit power because it is regulated [5]. To provide the context of the operating SNR, we start with a description of the link SNR of the channel samples generated from the ray-tracing simulation. We assume the noise power is given by dBm, where MHz is the sampling rate defined in IEEE 802.11ad for single carrier PHY [31]. Denote the received power when isotropic antennas (0 dBi antenna gain) are used at both the transmitter and the receiver with dBm transmit power, the link SNR is defined as

(22)

Fig. 6 shows the CDF of the link SNR computed from the received powers output from the ray-tracing simulation. We note that with an EIRP of 0 dBm, the SNR at the receiver (before the receive antenna gain) is the link SNR. The average link SNR is dB, and thus the average SNR at the receiver is around 0 dB when using an EIRP of 16 dBm.

(a) Misalignment probability with noise
(b) 3 dB power loss probability with noise
Fig. 7: Power loss probability as a function of in the presence of noise. The noise impacts the misalignment probability much more than the 3 dB power loss probability.

Fig. 7 shows a comparison of the power loss probability with and without noise for the two beam selection methods. It is assumed that the same EIRP is used during the database collection and when doing beam measurements for beam alignment. We can see that the misalignment probability is much more affected than the 3 dB power loss probability. This is because for a 3 dB power loss event to happen the noise must be large enough to flip the order of the optimal pair with a beam pair that has the power of at least 3 dB below the optimal beam pair, which occurs much less frequent than the misalignment event (i.e., any nonzero power loss). We note that the plots are in log-scale, and the gaps in the misalignment probability between the EIRP dBm case and the noise-free case are 0.03 and 0.02 at for AvgPow and MinMisProb, respectively. Thus, overall we can conclude that MinMisProb is less affected by noise than AvgPow.

We show the average rates when using the proposed beam alignment in Fig. 8. The instantaneous rate is computed using

(23)

where is the effective channel of the beam pair selected after the beam training. Fig. 8 shows the average rate as a function of the number of beam pairs trained for EIRP of 9, 14, and 19 dBm. Increasing the training overhead improves the alignment quality leading to higher average rates. The rate loss compared to the perfect alignment case becomes negligible at around for MinMisProb and at around for AvgPow. The gaps to the perfect alignment at small do not improve with increasing EIRP. This is due to the larger power loss probability when using a small and so cannot be eliminated by increasing the transmit power.

Fig. 8: Average rate of the proposed beam alignment compared to the perfect alignment case. MinMisProb consistently achieves a higher average rate than AvgPow for the same . The rate loss becomes negligible at at around 20 and 30 for MinMisProb and AvgPow, respectively.

Vi-E Effect of Traffic Mismatch during Database Collection and Exploitation

In this subsection, we provide some simulation results to show the effect of the mismatch of the traffic density during the database collection and exploitation. We expect the effect to be more pronounced when the difference in traffic density is large. We, thus, study the high and low traffic density cases. To do this, we generated another dataset of 500 channel samples using the ray-tracing simulation with the same setting as described in Section II-A but with a lower vehicular traffic using (average vehicle gap of 18.66 m) and the car-to-truck ratio of 9:1. We use all combinations of these two datasets as the training and test set to evaluate the performance of the proposed beam alignment, namely the four combinations of training and test set of (low,low), (high,low), (low,high), and (high,high). We note that (high,high) is what is used so far. AvgPow is used as the selection method here.

(a) 3 dB power loss probability.
(b) Normalized averaged rate when EIRP=24 dBm.
Fig. 9: Effect of the mismatch in traffic density during database collection and exploitation. Database collected in a light traffic does not work well when used in a dense traffic because the database cannot captures all the paths in the richer scattering environment of the dense traffic. On the contrary, database collected in a dense traffic works well regardless of the traffic condition when it is exploited. It only has a slightly degraded efficiency when used in a low traffic condition.

Fig. 9 shows the performance in terms of the 3 dB power loss probability and the average rate normalized by the perfect beam alignment case when using EIRP of 24 dBm. When exploiting in the low traffic setting, training (i.e., building the fingerprint database) in either the low or high traffic condition yields good performance while training in the low traffic density (i.e., matched traffic condition) is slightly more efficient. On the contrary, when exploiting in the high traffic condition, the performance loss due to the mismatch in the traffic conditions during database collection and exploitation is higher. Intuitively, this is because the database collected under a low traffic density cannot adequately capture paths in the richer scattering environment of the high traffic condition. The same trend can be confirmed in the rate plot in Fig. 9(b). We note that the largest loss observed is around 5% when using the database collected in the low traffic condition and used in the high traffic case. These results show that building the database in the same traffic condition as when the database is used provides the best performance. If adaptation to the traffic condition is not possible or costly, then the database should be collected in high traffic conditions.

Vi-F Comparison with Existing Techniques

This subsection compares the performance of the proposed method with two existing solutions. The first one is a hierarchical beam search adopted in IEEE 802.11ad, and the second one uses only the position to determine the beam pointing direction.

We start with a comparison with the IEEE 802.11ad method. IEEE 802.11ad beam alignment is a beam sweeping method using a hierarchical beam codebook structure to reduce the amount of beam training [31, 15]. It is required by the standard that the antenna gain of the quasi-omni pattern (the widest level in the codebook) be at most 15 dB ( in linear scale) lower than a directional pattern [31, Section 21.10.1]. Because of this constraint, we consider a two-level beam codebook: the quasi-omni and the sector level. We further assume for simplicity that the number of codewords at the sector level is equal to , the number of elements of the array (e.g., when using a 2D DFT codebook). Since the gain in the main beam direction of an array is , we have and , where is the number of sector beams and is the number of quasi-omni patterns. Since the quasi-omni patterns are the widest in the codebook, an exhaustive search is needed at the quasi-omni level to determine the best quasi-omni pair. Once the best quasi-omni pair has been identified, IEEE 802.11ad uses a low complexity single-sided search to find the best receive and transmit sectors. A single-sided search is conducted by having the transmitter use the best transmit quasi-omni pattern while the receiver sweeps over the sectors whose pointing directions are within the best receive quasi-omni pattern. The same procedure is used to find the best transmit sector. The total beam training time (excluding feedbacks) is given by

(24)

where and are the duration of a training frame at the quasi-omni and the sector level, respectively. The second term in (24) is based on the assumption that each quasi-omni pattern covers the same number of sectors. The factor two is because the single-sided search has to be conducted for both the transmitter and the receiver. We note that quasi-omni patterns have low antenna gain and thus require a large spreading factor to compensate for the lack of antenna gain. IEEE 802.11ad uses 32 spreading for this. A beam training at the quasi-omni level is done by sending an SSW (sector sweep) frame of length s, which consists of s for preamble and s for header and information in the SSW frame. Since the preamble might be needed for synchronization purpose, we assume that it is unchanged and set  s.

Fig. 10: Required amount of beam training of the proposed method. The overhead increases roughly linearly with the number of antenna elements of the array.

We now compute the overhead of the proposed approach. As discussed in Section III-A, the fingerprint database is expected to be valid for a long period of time and thus the cost per usage after the database is collected will be negligible. We, therefore, consider only the beam training overhead here. We define the overhead as the number of beam pairs trained needed to achieve %. Since our approach does not use wide beams for the beam training, we assume the training duration to be , and the total training time is

(25)

Fig. 10 shows the required amount of beam training for UPAs of sizes , , , and when using AvgPow as the beam pair selection method. The codebook sizes are 87, 271, 641, and 1047, respectively. The plot shows as a function of the number of elements , which shows a roughly linear trend in .

To understand this overhead in the mobility context, we leverage the concept of beam coherence time [11], which is the duration before beam realignment is required. The beam coherence time is the duration that the pointing error due to mobility causes the received power to drop by some threshold from the peak. Since the codebook quantizes the angular domain by the 3 dB beamwidth, the initial pointing error ranges in , where is the 3 dB beamwidth. Assuming the initial pointing error to be uniform in , then the beam coherence time is the duration that the pointing error becomes larger than half the 3 dB beamwidth. Using the pointing error derived in [11], the beam coherence time can be written as

(26)

where is the distance to the reflector/scatter, is the main beam direction with respect to the direction of travel, and is the speed of the CV (see Fig. 11). We note that refers to the distance from the receiver to the nearest reflector/scatter, and this concept can be applied to channels with high orders of reflections (although, paths undergoing multiple reflections are typically weak at mmWave frequencies). We note that this result is based on a 2D model considering only the azimuth. This, however, is applicable here because there is negligible change in the elevation angle as the vehicle moves. Since we are considering a square array with a total number of elements of , the azimuth beamwidth can be approximated by the beamwidth of a uniform linear array of size given by when the antenna spacing is set to half the wavelength [39, p. 885]. Using this approximation, we have

(27)

From the geometry, we set and m, which represents a typical reflection path off the buildings in Fig. 1. Note that these parameters are chosen as a representative worst case example with a reasonably small distance to the nearest reflector (a building in this case) and reasonably large . The worst value possible for is , but this path direction is unlikely in the geometry shown in Fig. 1.

Fig. 11: An illustration of the beam coherence time concept. For the beam to stay aligned, the reflection point must be within the beam projection. The beam coherence time is the average time that the reflection point is within the beam projection.
(a) Beam training duration versus the number of antenna elements.
(b) Average rate considering beam training overhead (transmit power of 0 dBm).
Fig. 12: Overhead comparison between the proposed method and that of IEEE 802.11ad. The beam training time of the proposed method only takes up to a few percent of the beam coherence time , while that of IEEE 802.11ad can exceed when using a large array leaving no time for data communications.

Fig. 12 compares the overhead of the proposed beam alignment using AvgPow selection method with that of IEEE 802.11ad. Fig. 12(a) shows beam training durations as a function of the array size . We recall that this beam training duration does not include the initial training request and feedback, which do not depend on the array size. We also plot the beam coherence times when the vehicle speed is 10, 15, and 20 m/s. The training duration of the proposed method is at most a few percents of , while that of IEEE 802.11ad can exceed when the array becomes large enough. This means that IEEE 802.11ad cannot finish the training before realignment is required. Fig. 12(b) compares the average rate when taking the beam training duration and into account assuming a transmit power of 0 dBm (corresponding to dBm EIRP when using a array). The average rate here is defined as

(28)

where is the beam training duration and is the average rate after the alignment. For the proposed method, is determined from rate plots when using the different array sizes (Fig. 8 shows rate plots when using arrays). We assume optimistically that IEEE 802.11ad achieves the perfect alignment rate. While the average rate of the proposed beam alignment keeps increasing as the array size increases, that of IEEE 802.11ad increases slowly at 10 m/s or starts to decrease at speed beyond 15 m/s when the array becomes larger than . We also observe that the average rate of IEEE 802.11ad becomes zero at around 800 and 1000 with when the speed is 15 and 20 m/s, respectively. This is because the training duration becomes larger than , and there is no time left for data communication.

We now compare the performance of the proposed beam alignment with the method that uses position only. Fig. 13 shows the average rate of the proposed method and the beam alignment using position only in high and low traffic conditions. The datasets used are the same as described in Section VI-E. UPA and 24 dBm EIRP are assumed. AvgPow is used and the number of beam pairs trained is selected such that . The average rates accounting for the beam training overhead and the beam coherence time are computed using (28) assuming a speed of 20 m/s. By using only the position, the beam training can be eliminated, but the method only works when the LOS path is available. This means that it will perform poorly when blockage of the LOS path occurs frequently. We can confirm this effect in Fig. 13. In the high traffic case, there are many trucks on the street which often block the LOS directions leading to a large gap compared to the proposed method. The gap becomes smaller in the low traffic case because of the less blockage. Leveraging the fingerprints database, the proposed method works in all traffic conditions. The benefit of fingerprints increases with the traffic density, or more generally the blockage probability of the LOS path.

(a) High traffic density.
(b) Low traffic density.
Fig. 13: Average rate comparison with the beam alignment method using position only. The method using only the position does not need beam training but works only when the LOS path is available. It performs well in a low traffic density where LOS path is often available but performs poorly in a dense traffic where the LOS path is often blocked. Taking advantage of the fingerprint database, the proposed method works well in both cases.

Vi-G Online Data Collection for Type B Fingerprints

While we described in this paper an offline method for database collection, online approaches are also feasible. Here, we provide an example implementation of the online database collection when using Type B fingerprints. This is meant to be an example, and further research is required to design an optimal exploration-exploitation tradeoff.

We now describe the proposed heuristic for online database collection. We assume the system starts with an initial database of some small size (recall that this is the number of rows in Table I), which is obtained from full exhaustive searches. Because is small, the initial database is not accurate. The purpose of the initial database is to screen relevant beam pairs that should be learned. The initial database is built in this way. For the first exhaustive search, we keep the top-200 beam pairs (ranked by their received powers). For subsequent exhaustive searches, we examine the top-200 beam pairs. If the beam pairs have already been seen, we update the average received powers of those beam pairs and if they have not yet been seen, we add the beam pairs into the database. In this way, we obtain the initial database that looks something like Table II. For the online operation, we assume each vehicle will measure beam pairs, which consist of for helping collect data for updating the database and for the vehicle’s own beam alignment purpose. As the measurement data accumulate, the exploration can be decreased. We assume a linearly decreasing function for this purpose. Let be the time index indicating the number of times beam measurements have been conducted, and be the exploration ratio in the initial stage and when the database becomes accurate enough, be the rate of decrease in the exploration, and denote the ceiling function, we define the function as

(29)

Note that for all . The beam pairs are chosen using the AvgPow beam selection method and the database available at time . The beams are selected randomly among the beam pairs in the current database (excluding the pairs already selected). This random exploration among the different choices is inspired by the -greedy approach used in reinforcement learning problems [45].

Finally, we show a numerical example to show the effect of the exploration-exploitation tradeoff. For the evaluation, we use the 1000 samples as in Section VI-C. To eliminate the dependence on the order of the data, we randomly permute the 1000 samples and run the online beam alignment 500 times. The metric for the evaluation is the 3 dB power loss probability averaged over the 500 runs. To better show the trend we perform smoothing average (window size of 10 indices) on the time index on the raw average 3 dB power loss probability. Fig. 14 shows an example of exploration-exploitation tradeoff. In this example, the total number of beam pairs trained per vehicle and the initial database size are used. We show the case of too-much-exploration (fixed ), too-much-exploitation (fixed ), and a balanced exploration-exploitation (, and ). When exploring too much, the system cannot take advantage of the database, and when exploiting too much, the accuracy of the database cannot be improved. Balancing the two provides a better performance in the long run. We note that this example is meant to show the feasibility of an online implementation. Optimal exploration-exploitation tradeoff will depend on how to balance the burden of exploration among the users at different stages of the system.

Fig. 14: Average 3 dB power loss probability when collecting the fingerprint database online. When exploring too much (Fixed ), the system cannot take advantage of the available database. When exploiting too much (Fixed ), the accuracy of the database cannot be improved. It is important to balance the exploration-exploitation tradeoff for a better performance in the long run as shown in the case when setting the tradeoff parameters as .

Vii Conclusion

We proposed an efficient beam alignment method for mmWave V2I communications leveraging position information and multipath fingerprints. Two types of fingerprints tailored with two beam pair selection methods were proposed. The results show that when Type A fingerprints are available, which can capture correlation between beam pairs, minimizing the misalignment probability is the best method for beam selection. If Type A is not possible, then our proposed heuristic beam selection by ranking the average received power should be used with Type B fingerprints, which only store the average received power. Regarding the overhead of the beam training, our approach requires training less than 30 beam pairs when 1616 arrays are used and the overhead increases roughly linearly with the number of antenna elements. The overhead calculation under the mobility context using the beam coherence time shows that while the proposed approach consumes less than a few percent of the beam coherence time for training, the IEEE 802.11ad beam training duration can exceed the beam coherence time for large arrays such as 3232. It is also shown that when adaptation to traffic conditions is not possible, fingerprints should be collected during dense traffic conditions so that most possible paths can be captured in the database. This work demonstrates that side information can be exploited to improve the efficiency of mmWave communications, which is not only desirable but also necessary in vehicular settings.

References

  • [1] J. Levinson et al., “Towards fully autonomous driving: Systems and algorithms,” in Proc. of the 2011 IEEE Intelligent Vehicles Symposium, Jun. 2011, pp. 163–168.
  • [2] J. B. Kenney, “Dedicated short-range communications (DSRC) standards in the United States,” Proceedings of the IEEE, vol. 99, no. 7, pp. 1162–1182, Jul. 2011.
  • [3] G. Araniti, C. Campolo, M. Condoluci, A. Iera, and A. Molinaro, “LTE for vehicular networking: A survey,” IEEE Communications Magazine, vol. 51, no. 5, pp. 148–157, May 2013.
  • [4] J. Choi, V. Va, N. Gonzalez-Prelcic, R. C. Daniels, C. R. Bhat, and R. W. Heath Jr., “Millimeter-wave vehicular communication to support massive automotive sensing,” IEEE Communications Magazine, vol. 54, no. 12, pp. 160–167, Dec. 2016.
  • [5] V. Va, T. Shimizu, G. Bansal, and R. W. Heath Jr., “Millimeter wave vehicular communications: A survey,” Foundations and Trends in Networking, vol. 10, no. 1, pp. 1–113, 2016.
  • [6] P. Bahl and V. N. Padmanabhan, “RADAR: an in-building RF-based user location and tracking system,” in Proc. of the IEEE INFOCOM, Mar. 2000, pp. 775–784.
  • [7] B. D. S. Lakmali and D. Dias, “Database correlation for GSM location in outdoor & indoor environments,” in Proc. of the 4th International Conference on Information and Automation for Sustainability, Dec. 2008, pp. 42–47.
  • [8] E. Kupershtein, M. Wax, and I. Cohen, “Single-site emitter localization via multipath fingerprinting,” IEEE Transactions on Signal Processing, vol. 61, no. 1, pp. 10–21, 2013.
  • [9] E. Ward and J. Folkesson, “Vehicle localization with low cost radar sensors,” in Proc. IEEE Intelligent Vehicles Symposium, Jun. 2016, pp. 864–870.
  • [10] T. S. Rappaport, F. Gutierrez, E. Ben-Dor, J. N. Murdock, Y. Qiao, and J. I. Tamir, “Broadband millimeter-wave propagation measurements and models using adaptive-beam antennas for outdoor urban cellular communications,” IEEE Transactions on Antennas and Propagation, vol. 61, no. 4, pp. 1850–1859, Apr. 2013.
  • [11] V. Va, J. Choi, and R. W. Heath Jr., “The impact of beamwidth on temporal channel variation in vehicular channels and its implications,” IEEE Transactions on Vehicular Technology, vol. 66, no. 6, pp. 5014–5029, Jun. 2017.
  • [12] Remcom, “Wireless InSite,” http://www.remcom.com/wireless-insite.
  • [13] J. Wang, Z. Lan, C. woo Pyo, T. Baykas, C.-S. Sum, M. Rahman, J. Gao, R. Funada, F. Kojima, H. Harada, and S. Kato, “Beam codebook based beamforming protocol for multi-Gbps millimeter-wave WPAN systems,” IEEE Journal on Selected Areas in Communications, vol. 27, no. 8, pp. 1390–1399, Oct. 2009.
  • [14] S. Hur, T. Kim, D. J. Love, J. V. Krogmeier, T. A. Thomas, and A. Ghosh, “Millimeter wave beamforming for wireless backhaul and access in small cell networks,” IEEE Transactions on Communications, vol. 61, no. 10, pp. 4391–4403, Oct. 2013.
  • [15] K. Hosoya, N. Prasad, K. Ramachandran, N. Orihashi, S. Kishimoto, S. Rangarajan, and K. Maruhashi, “Multiple sector ID capture (MIDC): A novel beamforming technique for 60-GHz band multi-Gbps WLAN/PAN systems,” IEEE Transactions on Antennas and Propagation, vol. 63, no. 1, pp. 81–96, Jan. 2015.
  • [16] T. Kim and D. J. Love, “Virtual AoA and AoD estimation for sparse millimeter wave MIMO channels,” in Proc. of the IEEE Workshop on Signal Processing Advances in Wireless Communications, 2015, pp. 146–150.
  • [17] Q. Duan, T. Kim, H. Huang, K. Liu, and G. Wang, “AoD and AoA tracking with directional sounding beam design for millimeter wave MIMO systems,” in Proc. of the IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Aug. 2015, pp. 2271–2276.
  • [18] Z. Marzi, D. Ramasamy, and U. Madhow, “Compressive channel estimation and tracking for large arrays in mm-wave picocells,” IEEE Journal of Selected Topics in Signal Processing, vol. 10, no. 3, pp. 514–527, 2016.
  • [19] B. Li, Z. Zhou, W. Zou, X. Sun, and G. Du, “On the efficient beam-forming training for 60 GHz wireless personal area networks,” IEEE Transactions on Wireless Communications, vol. 12, no. 2, pp. 504–515, 2013.
  • [20] B. Li, Z. Zhou, H. Zhang, and A. Nallanathan, “Efficient beamforming training for 60-GHz millimeter-wave communications: A novel numerical optimization framework,” IEEE Transactions on Vehicular Technology, vol. 63, no. 2, pp. 703–717, 2014.
  • [21] T. Kadur, H.-l. Chiang, and G. Fettweis, “Effective beam alignment algorithm for low cost millimeter wave communication,” in Proc. of the IEEE Vehicular Technology Conference, 2016, pp. 1–5.
  • [22] N. Gonzalez-Prelcic, R. Mendez-Rial, and R. W. Heath Jr., “Radar aided beam alignment in mmwave V2I communications supporting antenna diversity,” in Proceedings of the 2016 Information Theory and Applications Workshop, Feb. 2016.
  • [23] T. Nitsche, A. B. Flores, E. W. Knightly, and J. Widmer, “Steering with eyes closed: Mm-wave beam steering without in-band measurement,” in Proc. IEEE INFOCOM, vol. 26, 2015, pp. 2416–2424.
  • [24] A. Ali and R. W. Heath Jr., “Compressed beam selection in millimeter wave systems with out-of-band partial support information,” in Proc. of the IEEE International Conf. on Acoustics, Speech and Signal Processing, 2017.
  • [25] J. Kim and A. F. Molisch, “Enabling Gigabit services for IEEE 802.11ad-capable high-speed train networks,” in Proc. of the IEEE RWS, Jan. 2013, pp. 145–147.
  • [26] V. Va, T. Shimizu, G. Bansal, and R. W. Heath Jr., “Beam design for beam switching based millimeter wave vehicle-to-infrastructure communications,” in Proc. of the IEEE International Conference on Communications, May 2016, pp. 1–6.
  • [27] W. B. Abbas and M. Zorzi, “Context information based initial cell search for millimeter wave 5G cellular networks,” in Proc.of the EuCNC, Jun. 2016, pp. 111–116.
  • [28] A. Capone et al., “Obstacle avoidance cell discovery using mm-waves directive antennas in 5G networks,” in Proc. of the IEEE PIMRC, Aug. 2015, pp. 2349–2353.
  • [29] J. C. Aviles and A. Kouki, “Position-aided mm-wave beam training under NLOS conditions,” IEEE Access, vol. 4, pp. 8703–8714, Nov. 2016.
  • [30] “IEEE std 802.15.3c-2009,” IEEE Standard, pp. c1–187, Oct. 2009.
  • [31] “IEEE std 802.11ad-2012,” IEEE Standard, pp. 1–628, Dec. 2012.
  • [32] C. Liu, M. Li, S. V. Hanly, I. B. Collings, and P. Whiting, “Millimeter wave beam alignment: Large deviations analysis and design insights,” IEEE Journal on Selected Areas in Communications, vol. 35, no. 7, pp. 1619–1631, Jul. 2017.
  • [33] International Telecommunication Union (ITU), “Effects of building materials and structures on radiowave propagation above about 100 MHz,” ITU-R P.2040-1, Jul. 2015.
  • [34] E. S. Li and K. Sarabandi, “Low grazing incidence millimeter-wave scattering models and measurements for various road surfaces,” IEEE Transactions on Antennas and Propagation, vol. 47, no. 5, pp. 851–861, May 1999.
  • [35] A. S. Al-Ghamdi, “Analysis of time headways on urban roads: Case study from riyadh,” Transport Eng-J, vol. 127, no. 4, pp. 289–294, 2001.
  • [36] K. Mase, J. Inoue, and J. Kizu, “Performance evaluation of a roadside-to-vehicle communication system using narrow antenna beam switching based on traffic flow model,” in Proc. of the IEEE Globecom Workshops, 2008, pp. 1–5.
  • [37] X. Gao, L. Dai, Y. Zhang, T. Xie, X. Dai, and Z. Wang, “Fast channel tracking for terahertz beamspace massive MIMO systems,” IEEE Transactions on Vehicular Technology, vol. 66, no. 7, pp. 5689–5696, Jul. 2017.
  • [38] R. W. Heath Jr., Introduction to Wireless Digital Communication: A Signal Processing Perspective.   Prentice Hal, Mar. 2017.
  • [39] S. J. Orfanidis, Electromagnetic Waves and Antenna.   Rutgers University, 2014, online book http://www.ece.rutgers.edu/~orfanidi/ewa/.
  • [40] FHWA, U.S. Department of Transportation, “NGSIM–Next Generation SIMulation,” http://gateway.path.berkeley.edu/ngsimdocs/.
  • [41] J. Edmonds, “Matroids and the greedy algorithm,” Mathematical Programming, vol. 1, no. 1, pp. 127–136, 1971.
  • [42] G. Calinescu, C. Chekuri, M. Pál, and J. Vondrák, “Maximizing a monotone submodular function subject to a matroid constraint,” SIAM J. Comput., vol. 40, no. 6, pp. 1740–1766, Dec. 2011.
  • [43] G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher, “An analysis of approximations for maximizing submodular set functions–I,” Mathematical Programming, vol. 14, no. 1, pp. 265–294, 1978.
  • [44] T. J. Hastie, R. J. Tibshirani, and J. H. Friedman, The Elements of Statistical Learning : Data Mining, Inference, and Prediction, ser. Springer series in statistics.   New York: Springer, 2009.
  • [45] R. S. Sutton and A. G. Barto, Introduction to Reinforcement Learning, 1st ed.   Cambridge, MA, USA: MIT Press, 1998.
Comments 0
Request Comment
You are adding the first comment!
How to quickly get a good reply:
  • Give credit where it’s due by listing out the positive aspects of a paper before getting into which changes should be made.
  • Be specific in your critique, and provide supporting evidence with appropriate references to substantiate general statements.
  • Your comment should inspire ideas to flow and help the author improves the paper.

The better we are at sharing our knowledge with each other, the faster we move forward.
""
The feedback must be of minimum 40 characters and the title a minimum of 5 characters
   
Add comment
Cancel
Loading ...
66744
This is a comment super asjknd jkasnjk adsnkj
Upvote
Downvote
""
The feedback must be of minumum 40 characters
The feedback must be of minumum 40 characters
Submit
Cancel

You are asking your first question!
How to quickly get a good answer:
  • Keep your question short and to the point
  • Check for grammar or spelling errors.
  • Phrase it like a question
Test
Test description