Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2025 Nov 6;25(21):6800. doi: 10.3390/s25216800

Joint Coherent/Non-Coherent Detection for Distributed Massive MIMO: Enabling Cooperation Under Mixed Channel State Information

Supuni Gunasekara 1,*, Peter Smith 2, Margreta Kuijper 1, Rajitha Senanayake 1
Editor: Antonio Guerrieri
PMCID: PMC12609264  PMID: 41229023

Abstract

Beyond-5G wireless systems increasingly rely on distributed massive multiple-input multiple-output (MIMO) architectures to achieve high spectral efficiency, low latency, and wide coverage. A key challenge in such networks is that cooperating base stations (BSs) often possess different levels of channel state information (CSI) due to fronthaul constraints, user mobility, or hardware limitation. In this paper, we propose two novel detectors that enable cooperation between BSs with differing CSI availability. In this setup, some BSs have access to instantaneous CSI, while others only have long-term channel information. The proposed detectors—termed the coherent/non-coherent (CNC) detector and the differential CNC detector—integrate coherent and non-coherent approaches to signal detection. This framework allows BSs with only long-term information to actively contribute to the detection process, while leveraging instantaneous CSI where available. This approach enables the system to integrate the advantages of non-coherent detection with the precision of coherent processing, improving overall performance without requiring full CSI at all cooperating BSs. We formulate the detectors based on the maximum likelihood (ML) criterion and derive analytical expressions for their pairwise block error probabilities under Rayleigh fading channels. Leveraging the pairwise block error probability expression for the CNC detector, we derive a tight upper bound on the average block error probability. Numerical results show that the CNC and differential CNC detectors outperform their respective single-BS baseline-coherent ML and non-coherent differential detection. Moreover, both detectors demonstrate strong resilience to mid-to-high range correlation at the BS antennas.

Keywords: cell-free networks, coherent detection, cooperative communications, distributed antenna systems, massive MIMO, non-coherent detection

1. Introduction

Massive multiple-input multiple-output (MIMO) systems are a cornerstone of modern wireless communication systems, offering significant improvements in spectral efficiency, reliability, and network capacity [1,2]. By employing a large number of antennas at the base station (BS), massive MIMO systems are able to provide substantial improvements in data rates and serve multiple users simultaneously, leveraging spatial multiplexing and diversity gains.

Traditional approaches to user signal detection in massive MIMO systems can be broadly classified into two categories: coherent detection [3,4,5,6,7,8,9], which depends on instantaneous channel state information (CSI), and non-coherent detection [10,11,12,13,14,15,16,17,18,19], which operates using long-term channel information. Using pilot-based mechanisms to acquire channel estimates, coherent detection offers excellent performance under ideal circumstances [5]. Several works [3,4,5] have examined the performance of such systems under centralized and decentralized architectures. However, these systems are susceptible to channel variations and require regular CSI updates, which impose substantial overhead in terms of signaling and computational complexity. Recent studies have proposed scalable and practical solutions to mitigate these challenges. For instance, ref. [6] introduces subset minimum mean squared error receivers to reduce computational burden, while [7,8,9] propose partial joint processing and clustering architectures that reduce network overhead while maintaining performance.

In contrast, non-coherent detection relies on long-term channel information, which often results in a substantially inferior performance compared to coherent detection [14]. However, BSs operating non-coherently benefit from low computational complexity, power consumption [20] and reduced overhead associated with CSI updates. Several non-coherent detection strategies have been proposed for use in massive MIMO systems. These systems, mainly utilize approaches based on differential detection [10,11,12,13] and energy detection [14,15,16,17]. Differential detection strategies encode information in the phase difference across time without requiring CSI. For example, refs. [10,12] explore differential phase shift keying schemes under various fading environments, while ref. [11] studies non-coherent detection from a system-level perspective. Works such as [13,18,19] examine the effect of spatial correlation and distributed implementations, providing insight into practical performance in large-scale arrays. Energy-based non-coherent detection relies on received signal strength rather than phase information. While [15,16,17] examine energy-based modulation schemes in various setups, ref. [14] proposes constellation design strategies for energy based non-coherent massive MIMO systems. In addition to these traditional paradigms, several works have explored joint channel estimation and signal detection [21,22,23], where the channel state and transmitted data symbols are estimated simultaneously-circumventing the need for dedicated pilot signaling.

In non-cooperative cellular networks, users located near the cell edge suffer from significantly lower signal-to-interference-noise ratios (SINR) compared to those closer to the center. This degradation occurs for two main reasons: as users move farther from the BS, the received signal power diminishes rapidly with the propagation distance [24]. Additionally, because each user is exclusively served by a single BS, signals from users in neighboring cells are treated as interference. The combined impact of these factors leads to a notable reduction in SINR at the cell edge, which in turn causes substantial variations in data rates across the cell. These disparities present challenges for maintaining the high data rates required by modern mobile networks. Distributed massive MIMO systems have been proposed as a solution, with coherent and non-coherent approaches addressing the problem in different ways. Here, geographically distributed BSs equipped with massive MIMO arrays are interconnected via fronthaul links to a central processing unit (CPU). Note that, in this work, the term CPU refers to the central processing unit of the network, i.e., the entity where signals from distributed BSs are aggregated via fronthaul links and jointly processed. This setup enables the CPU to detect signals from all users within the cooperating cells, effectively managing network resources and improving overall service quality. Coherent cooperative systems can combat interference by exploiting the CSI of traditionally interfering users, thus improving the SINR [25]. On the other hand, non-coherent cooperative systems enhance performance by accumulating more signal power from the additional antennas provided through cooperation, despite not relying on real-time CSI [18].

1.1. Motivation

Conventionally, cooperation in wireless systems has been limited to BSs utilizing the same type of processing: either coherent-to-coherent [3,9,26] or non-coherent-to-non-coherent [18,19] coordination. The underlying idea is that cooperation is most effective when the detection capabilities of the BSs are aligned. Nonetheless, there may be instances where enhancing system performance is crucial, yet locating BSs that share the same processing techniques for cooperation can be problematic. In such cases, involving BSs with alternative processing techniques could help maintain the required level of error performance.

In the literature, coherent and non-coherent detection methods are typically applied in isolation, with systems rarely utilizing both approaches simultaneously. A hybrid demodulation approach that attempts to combine the benefits of both techniques was introduced in [27]. This method uses differentially-encoded data streams instead of traditional pilot symbols, and the data is demodulated using non-coherent detection at the BS to support channel estimation. However, this system still applies coherent and non-coherent detection in two separate layers rather than truly integrating them. Moreover, these methods perform well when the system operates under uniform channel conditions or when all cooperating BSs can provide coherent channel estimates. However, they do not address the increasingly common situation in modern wireless systems where some BSs may only be able to provide non-coherent signal observations due to hardware limitations, synchronization issues, fronthaul constraints, or high user mobility. More importantly, even if coherent CSI could be acquired at more BSs, doing so involves significant signaling and computational overhead. Therefore, limiting the number of BSs that acquire instantaneous CSI is not only realistic but also a strategy to reduce system complexity and improve scalability.

Building on these insights, in this paper, we propose two novel detectors that integrate coherent and non-coherent detection schemes into a unified approach for user data detection, enabling both methods to work simultaneously. In contrast to conventional detection approaches restricted to a single mode of cooperation, the proposed method provides a fresh perspective by jointly exploiting both coherent and non-coherent modes to enhance user performance. As discussed earlier, coherent detection leverages phase-aligned signals using known CSI, while non-coherent detection relies on energy or amplitude without requiring precise phase knowledge. Although fundamentally different, both types of information contribute to the likelihood of each symbol hypothesis. The coherent component provides a phase-sensitive term, while the non-coherent component contributes a phase-invariant, energy-based term. The joint likelihood function naturally integrates both, making the joint detection approach not only feasible but also highly relevant for next-generation wireless networks.

1.2. Contribution

We consider a distributed massive MIMO network where BSs cooperate to serve a single-antenna user (A natural extension is the multi-user case; however, this lies beyond the present scope as it would introduce inter-user interference and scheduling aspects.). While some BSs possess instantaneous CSI, another set of BSs contribute to the cooperative detection process by relying solely on long-term channel information. We use the terms coherent and non-coherent to categorize BSs according to their access to user channel information, distinguishing between those with instantaneous user channel information and those with only long-term channel information. The coherent and non-coherent BSs are linked to a CPU through a fronthaul network. The user channel information (be it instantaneous or long-term) and the user signals received at these BSs are transmitted to the CPU, where user signals are jointly detected. Our objective is to evaluate the potential performance improvements when a user is supported by additional BSs that operate differently from their primary BSs. It should be noted that the term primary is adopted solely for explanatory purposes to refer to the BSs initially serving the user. In practice, there is no distinction between cooperating BSs beyond whether they operate in coherent or non-coherent mode. We study this in two complementary perspectives as discussed below.

We further consider a scenario where the user is initially served by a primary BS-operating either coherently or non-coherently, depending on its processing capability. If this link’s quality degrades due to fading, mobility, or interference, neighboring BSs may assist opportunistically in whichever mode their CSI availability allows.

  • Coherent primary BSs with non-coherent assistance: In the first scenario, we consider a user primarily served by a set of coherent BSs, without differential encoding. As the user signals are being detected coherently, the instantaneous user channels from the user to this set of BSs are known. Some other BSs, while able to contribute to the detection of user signals, lack the capability to access instantaneous user channel information and are restricted to using long-term channel information. We introduce one or more such non-coherent BSs to assist in the detection process, allowing the system to leverage non-coherent benefits in conjunction with coherent detection. Given that this novel detector leverages both coherent and non-coherent approaches for data detection, we term this as the coherent/non-coherent detector (CNC detector). We propose that this method could be implemented as an inter-tier cooperative scheme for heterogeneous networks [28,29]. For example a massive MIMO BS in the coverage tier can provide aid in detection non-coherently to a set of BSs working cooperatively in the hotspot tier. This method will also be useful in scenarios where a handover process is initiated for a user, but the target BS set lacks the resources to serve the user coherently. Until the process is finalized, and the target BS set learns the instantaneous user channel, the user can be jointly served by the two sets of BSs, so that a disruption to service will not occur. Another use case for this detector would be a scenario where non-coherent detection may serve as a fallback or resilience mechanism-for example, during rapid channel fluctuations or sudden fading events-when coherent CSI becomes temporarily unreliable or unavailable.

  • Non-coherent primary BS with coherent assistance: In the second scenario, we focus on a user employing differential encoding, served by a non-coherent BS that utilizes differential detection. Adding distant non-coherent BSs provides little benefit, as noted in [18], but a distant coherent BS could still support the system by working with instantaneous channels, even if the estimated channel quality is not ideal. In this study, we explore how a coherent BS can offer additional support to a non-coherent system while maintaining differential detection at the CPU. As this detector is a variation of the CNC detector, we refer to this detector as the differential CNC detector.

The above dual analysis examines both configurations, thereby enabling a comprehensive characterization of the performance gains achievable through coherent and non-coherent BS cooperation.

The ability to opportunistically extract gains from a mixed set of BSs—regardless whether they provide coherent or non-coherent support-enables greater adaptability and resilience in practical deployment scenarios, especially where single-mode cooperation cannot be guaranteed. The proposed detectors are especially relevant in scenarios where a user is served by BSs with varying CSI capabilities, but not enough BSs support the same cooperation mode (e.g., all coherently or all non-coherently), rendering conventional cooperative schemes ineffective. The proposed joint detection approach addresses this limitation by offering a practical solution for those users as well as the users in constrained conditions-such as those at the cell edge, with limited CSI, or in a deep fade-where performance degradation requires timely support. Moreover, hybrid detection is well-suited for beyond-5G systems where infrastructure components operate with varying levels of CSI and where there is a critical need to balance performance with resource and overhead efficiency. For instance, in cell-free massive MIMO networks [24], nearby BSs with accurate CSI can contribute coherently, while distant BSs with only statistical CSI can contribute non-coherently. Recent studies have also investigated the integration of cell-free massive MIMO with emerging paradigms such as reconfigurable intelligent surfaces (RIS) and unmanned aerial vehicle (UAV) [30,31,32,33], demonstrating the flexibility of distributed architectures in supporting heterogeneous devices and service requirements. These developments underscore the importance of hybrid detection and cooperation strategies, which motivate our proposed CNC and differential CNC detectors for scenarios with heterogeneous CSI availability. Accordingly, the joint detection framework introduced in this paper lays the foundation for adaptive, overhead-aware receiver designs that are expected to become increasingly important as wireless networks continue to evolve. In this context, RIS-assisted communications [34] and UAV-assisted systems [35] are natural application domains, where the CPU can apply the proposed detectors to combine instantaneous CSI from ground BSs with non-coherent contributions from RIS or UAV nodes that typically lack precise CSI.

The proposed detectors consider L contiguous symbol times and perform an exhaustive search over all possible symbol combinations to detect the transmitted symbol sequence. While the detectors, which are based on the maximum likelihood (ML) criterion, are straightforward, the mathematical analysis proves to be challenging. Hence, while an exact analysis of error performance is challenging, we provide upper bounds on the average error probability using the exact block error probability expressions. Consequently, this paper offers the following key contributions:

  • We formulate two novel detectors where BSs cooperate to detect user signals having two levels of user channel information. Specifically, one group of BSs accesses instantaneous CSI, while a second group possesses only long-term channel information of the user. User signals are detected using either the CNC detector or the differential CNC detector, which are derived using the ML criterion. It is important to emphasize that the proposed detectors are not derived based on any assumptions on the channel model, and remain model-agnostic, thereby possessing the flexibility to operate across a range of fading environments depending on the system conditions. As explained later in the text, one part of the detectors operate with access to finer channel characteristics such as correlation structures or line-of-sight (LOS) component strengths, while the other does not and therefore contributes to the detection process based solely on the received channel powers. Due to this setup, the proposed detectors are not optimized for such channels; however, they offer the best performance possible with the available information and remain applicable under these conditions.

  • Assuming correlated Rayleigh channels, we derive analytical expressions to determine the pairwise block error probability of a user when detected using the CNC detector and the differential CNC detector. Based on the derived pairwise error probability expression we provide an upper bound on the average block error probability of the CNC detector.

  • Based on numerical results, we identify the following key insights:

    1. The CNC detector outperforms coherent detection at a single BS, with its performance gains increasing as the user moves closer to the non-coherent BS.

    2. The differential CNC detector surpasses the error performance over non-coherent differential detection at a single BS, with performance gains increasing as the user moves closer to the coherent BS.

    3. The performance degradation due to correlation at the BS antennas is minimal for both the CNC and differential CNC detectors, highlighting their robustness under such conditions.

The rest of the paper is structured as follows: Section 2 outlines the system model used in this analysis. In Section 3, we present the CNC detector, followed by Section 4, where we analyze the error performance of the proposed detector. Section 5 presents the differential CNC detector and derives an expression to calculate the pairwise block error probability. Section 6 analyzes key system-level factors. Numerical examples are given in Section 7, and the paper concludes in Section 8.

Notation: We use (·) for complex conjugate, (·)T for transpose, and (·)H for conjugate transpose. The m×n null matrix is indicated by 0m×n and Im denotes an m×m identity matrix. R is the set of real numbers. P[·] denotes probability whereas FX(x) denotes the cumulative distribution function (CDF) of X evaluated at x.

2. System Model

This section introduces the system model employed in the rest of the paper. We examine the uplink of a communication network where a total of Mnc+Mc antennas (Mnc non-coherent antennas and Mc coherent antennas) collaborate to serve a user as shown in Figure 1. These antennas may be part of multiple co-located multi-antenna BSs, where at least one BS operates coherently, and the rest operate non-coherently. Alternatively, they could be distributed throughout the service area, functioning as single-antenna access points (APs). For illustrative purposes, Figure 1 employs single-antenna APs, which simplifies the problem formulation and improves notational clarity, thereby allowing a clear distinction between long-term and instantaneous user channels available at each antenna. Among these antennas, an antenna m[1,Mnc] possesses only long-term information regarding the user channel whereas an antenna m[Mnc+1,Mnc+Mc] obtains instantaneous CSI regarding the user channel. This setup is depicted in Figure 1, in which we have shown the possession of long-term channel information by dotted lines, and the possession of instantaneous CSI by solid lines. We define long-term channel information as the combined effect of distance-based gain and shadow fading. Consequently, the first set of antennas will aid in user symbol detection non-coherently, while the second set of antennas will aid detection coherently. We consider that the desired user is equipped with a single antenna and all Mnc+Mc antennas are connected to a CPU through a delay-free fronthaul network. In this work, ideal fronthaul links with negligible latency are assumed to focus on the core design of the joint coherent and non-coherent detection framework. In practical deployments, fronthaul limitations such as transmission delays and bandwidth constraints could impact performance, particularly by affecting the availability and aging of CSI.

Figure 1.

Figure 1

System model. The ith AP is denoted by APi. Single antenna APs are shown to simplify the figure. AP1 to APMnc have only the long-term channel information of the user whereas APMnc+1 to APMnc+Mc possess instantaneous user channel information.

In this scenario, the vertically stacked received signal vectors at time instant l, for the non-coherent and coherent antenna groups are expressed, respectively, as

rnc,l=hncsl+nnc,l,rnc,l,hnc,nnc,lCMnc×1, (1)

and

rc,l=hcsl+nc,l,rc,l,hc,nc,lCMc×1. (2)

Here sl denotes the transmitted data symbol at time instant l. The corresponding noise vectors at the non-coherent and coherent antennas are nnc,l=n1,l,,nMnc,lT and nc,l=nMnc+1,l,,nMnc+Mc,lT, respectively, with nm,l representing the noise at antenna m at time instant l. We assume that each noise component follows a complex Gaussian distribution, characterized by a zero mean and a variance of σ2. In (1) and (2), the channel vectors hnc=h1,,hMncT and hc=hMnc+1,,hMnc+McT collect the unknown channel coefficients from the user to the non-coherent antennas and known channel coefficients from the user to the coherent antennas, respectively. In these channel vectors, hm represents the channel from the user to antenna m.

Note that we intentionally refrain from specifying statistical properties of the channel vectors to maintain generality. The proposed detection framework is designed to be flexible and broadly applicable to many propagation environments. As the analysis progresses, we introduce specific assumptions-only when needed to support tractable derivations or provide simulation results. Importantly, the proposed detector does not rely on a fixed channel model and can operate under diverse propagation conditions, making it well-suited for deployment in heterogeneous network environments.

3. CNC Detector

The first main contribution of this paper, which is the design of the CNC detector is presented in this section. We use the ML estimation criterion to derive the CNC detector.

Let us first consider an observation window of L time steps, and define s=[s1,s2,sL] as the sequence of transmitted symbols and the matrix R=[r1,r2,,rL]C(Mnc+Mc)×L, where rl=[rnc,lT,rc,lT]T, as the joint received signal matrix associated with this block. As the received signals at coherent and non-coherent antennas are independent, the joint probability distribution function (PDF) of the received signals at time instant l for coherent (i.e., rc,l) and non-coherent (i.e., rnc,l) antennas conditioned on the transmitted symbol sequence s, and the channel coefficients hc and hnc follows a multivariate Gaussian distribution with joint PDF given by

fRR|hc,hnc,s=exp(l=1Lrc,lhcsl2σ2+rnc,lhncsl2σ2)πσ2Mnc+Mc+McL. (3)

In (3), we assume additive white Gaussian noise with identical variance σ2 at each antenna. We consider that the channel coefficients to both coherent and non-coherent antennas remain constant over the L time-steps considered, making a subscript of l unnecessary.

We define the base signal constellation denoted by M, to represent the set of symbols available for transmission at a single time instant. To model transmissions across L time instants jointly, we further introduce the extended constellation, ML, defined as the set of all ordered L-tuples (s1,s2,sL) where each slM. Thus, ML encompasses all possible sequences of transmitted symbols over L consecutive uses of the channel. Now, based on (3), the ML detection problem is given as,

sML=argmaxs¯MLfR(Rhc,s¯), (4)

where s¯ is the hypothesis for the transmitted symbols and sML is the detected symbol sequence according to the ML principle. In order to apply the ML principle to (3), we first need to eliminate hnc, which is unknown at the CPU. One approach to do this is to average fRR|hc,hnc,s over the unknown channel hnc [11]. To accomplish this, we must have prior knowledge of the distribution of hnc. However, non-coherent processing operates under the assumption that only channel powers are accessible at the antennas, and therefore the CPU lacks awareness regarding the channel properties. Given this lack of information, the most rational approach for decision-making is to rely on a model that solely utilizes the available knowledge, namely, the channel powers. Hence, we presume that the channels are independent and Rayleigh distributed across the antennas, i.e., hncCN0,Pnc. Note that the diagonal, non-coherent long-term channel information matrix, Pnc, is defined as Pnc=diagP1,,PMnc where Pm denotes the aggregation of distance-dependent path gain and shadow fading between the user and antenna m. While no such assumption was made for the coherent antennas, we have assumed that the non-coherent antennas are uncorrelated. In reality, correlations may exist among the non-coherent antennas. However, since the detector can only utilize the information available at the BSs, the detector is developed based on the model outlined above.

Given these assumptions, we obtain an expression for fRR|hc,s as expressed in (5).

fRR|hc,s=m=1Mncξm2σ2e1σ2l=1Lrc,lHrc,l+rnc,lHrnc,lπσ2LMc+MncdetPncexp(1σ2l=1Lrc,lHhcsl+hcHrc,lslhcHslslhc+l=1LΞrnc,lsl2). (5)

In (5), we have introduced the diagonal weighting matrix Ξ=diagξ1,,ξMnc with weighting factors defined as

ξm=Pmσ2+Pml=1Lslsl1/2. (6)

In order to simplify the decoding process, we assume that the power of the transmit symbols is constant in the utilized modulation scheme (as is usual in non-coherent systems [10,11,12,13]), more specifically s2=1sM. To adhere to such a criterion, we can employ either MPSK-ary phase shift keying (PSK) or MPSK-ary differential PSK modulation schemes [36]. Here and in the next section, we discuss the CNC detector using MPSK-ary modulation, and later, in Section 5 we will examine its application to MPSK-ary differential PSK. Hence, for the CNC detector the signal constellation, M, can be expressed as

M=ej2πi/MPSK,i=0,...,MPSK1. (7)

As a result, the value of ξm in (6) could be simplified as

ξm=Pmσ2+LPm1/2. (8)

Note that ξm in (8), which weights the non-coherent antennas relative to the long-term power at that antenna, shares a similar structure to the weighting coefficients utilized for the non-coherent antennas as in [18].

By considering the log-likelihood of (5) and disregarding terms that do not depend on the hypothesis, s¯, we can reformulate the detection problem as

sML=argmaxs¯MLRel=1Lrc,lHhcs¯lCoherentcomponent+l=2Lj=1l1rnc,lHΞ2rnc,js¯ls¯jNon-coherentcomponent, (9)

in which we have utilized the fact that s¯ls¯l=1, since each symbol s¯l is an element of the constant-modulus transmit vector s¯ with s¯2=1.

Disregarding the non-coherent component in (9) and restricting the observation window to a single time slot (L=1), simplifies the detection rule to the conventional coherent ML detection (and therein the maximum ratio combining receiver). The non-coherent component, which correlates the received signals at different time instants, closely resembles the ML detector for differential encoding outlined in [18]. Note that, due to the weighting matrix Ξ, which weights each non-coherent antenna according to (8) the signals received at the non-coherent antennas are scaled in accordance with the power received at each antenna. Consequently, in the CNC detector, the non-coherent antennas which receive a higher power from the user will exert a greater influence on the final detection outcome. This method of weighting non-coherent antennas resembles the maximum ratio combining for coherent antennas, where the signals from different antennas are weighted according to the SNR of each branch, allocating more weight to signals with a higher SNR.

The coherent and non-coherent components in (9) approach symbol detection differently.

  • (a)

    Coherent component: Evaluates which symbol at each time-step maximizes the hypothesis, thereby verifying if the symbol at each time-step is correct (s¯l=sl).

  • (b)

    Non-coherent component: Checks whether the product between each pair of symbol hypotheses at each time-step yields the correct result, i.e., s¯js¯l=sjsl, thereby maximizing the overall hypothesis. Notably, this may still hold true even if s¯lsl and s¯jsj.

While the coherent component tries to alleviate single time-step errors, the non-coherent component aims to correct multi-symbol errors by ensuring that the products of symbol pairs match expected outcomes across time-steps. Essentially, CNC chooses the symbol set that best meets both criteria. As such, the performance improvement of the CNC detector is largely attributed to its ability to account for both these factors, with the emphasis on each one determined by the power levels received at the respective BSs (coherent or non-coherent). If the user can deliver greater power to the non-coherent BSs, then more weight is placed on ensuring that the multiplications are correct. However, when more power is directed to the coherent BSs, the priority shifts to detecting individual symbols accurately.

Note that, when L=1, the non-coherent term disappears resulting in the coherent ML detector. As such, to implement the CNC detector, we need L2. In the remainder of this paper we use (9) with L2 and consider different user locations to analyze the performance of the CNC detector.

4. Error Analysis for the CNC Detector

In this section, we analyze the error performance of the CNC detector in (9).

Given that the proposed detector examines L consecutive time-steps to jointly determine the transmitted symbols, we evaluate the probability of erroneously detecting the symbols in the detection period. As such we refer to this probability as the block error probability. We first derive an analytical formula for the pairwise block error probability, where the symbol set s=[s1,s2,,sL] is erroneously decoded as s^=[s^1,s^2,,s^L], and then leverage it to determine an upper bound on the average block error probability.

In the following error analysis, we model both the coherent and non-coherent channels as correlated Rayleigh channels (if a different fading model—e.g., Rician were assumed, the analytical expressions would change accordingly), with Σc and Σnc being the covariance matrices of the coherent channel, hc and the non-coherent channel, hnc, respectively. It is worth noting that we designed the system under the assumption that the non-coherent channels were independent, based on the fact that only long-term user power information was accessible at the non-coherent antennas, leaving correlation matrices unavailable. As a result, when correlation exists in the non-coherent channels, the detector is not fully matched to the actual channel model. However, simulation results presented later in the manuscript demonstrate that the proposed detector continues to operate effectively even in the presence of channel correlation, highlighting its robustness and adaptability in realistic settings.

4.1. Pairwise Block Error Probability

From (9), the pairwise block error probability of deciding on s^ when s was transmitted can be formulated as

Pss^=PRel=1Lrc,lHhcs^l+l=2Lj=1l1rnc,lHΞ2rnc,js^ls^j>Rel=1Lrc,lHhcsl+l=2Lj=1l1rnc,lHΞ2rnc,jslsj. (10)

By employing the constants,

al=sls^l1,bl=s^lsl,dl,j=slsjs^ls^j1,el,j=sjs^ls^jsl,fl,j=sls^ls^jsj,gl,j=s^ls^jslsj, (11)

we reorganize the expression in (10) to Pss^=PT>0, where the full expression for the pairwise test statistic [37,38], T, is given in (12).

T=Rel=1LalhcHhc+blnc,lHhc+l=2Lj=1l1dl,jhncHΞ2hnc+el,jnnc,lHΞ2hnc+fl,jhncHΞ2nnc,j+gl,jnnc,lHΞ2nnc,j. (12)

Note that, in (12), we have decomposed the received signal at the coherent and non-coherent antennas using (2) and (1), respectively. This decomposition allows us to clearly separate the user channel-related terms from the noise components.

At first glance, (12) appear quite complex, as it involves the summation of multiple products containing both channel and noise terms. However, with some strategic rearrangement and considerable algebra, we transform it into a more tractable quadratic form in the following analysis. We begin by representing T in matrix form, which enables us to derive an expression for the CDF of T. Leveraging this CDF, the pairwise block error probability of deciding on s^ when s was transmitted can be obtained by

Pss^=1FT0. (13)

In order to represent T in matrix form, we begin by introducing the vectors

ηc=hcnc,1nc,LC(L+1)Mc×1,ηnc=ΞhncΞnnc,1Ξnnc,LC(L+1)Mnc×1, (14)

and the matrices

Gc=l=1Lal+alIMcb1IMcbLIMcb1IMc0Mc0McbLIMc0Mc0McC(L+1)Mc×(L+1)Mc, (15)

and GncC(L+1)Mnc×(L+1)Mnc,

Gnc=l=2Lj=1l1dl,j+dl,jIMnck=2Lfk,1IMnck=3Lfk,2+e2,1IMnck=l+1Lfk,l+j=1l1el,jIMncj=1L1eL,jIMnck=2Lfk,1IMnc0Mncg2,1IMncgl,1IMncgL,1IMnck=3Lfk,2+e2,1IMncg2,1IMnc0Mncgl,2IMncgL,2IMnck=l+1Lfk,l+j=1l1el,jIMncgl,1IMnc0MncgL,lIMncfL,L1+j=1L2eL,jIMncgL1,1IMnc0MncgL,L1IMncj=1L1eL,jIMncgL,1IMncgL,2IMncgL,L1IMnc0Mnc. (16)

Now, expressing T in matrix format yields

T=ηHGη, (17)

where η=ηcT,ηncTT and

G=Gc0(L+1)Mc×(L+1)Mnc0(L+1)Mnc×(L+1)McGncC(L+1)Mnc+Mc×(L+1)Mnc+Mc. (18)

Let us now define hc=Σc12uhc, hnc=Σnc12uhnc, nc,l=σunc, and nnc,l=σunnc where uhc,uncCN0,IMc, uhnc,unncCN0,IMnc. We next introduce the covariance matrix of η, Ση,

Ση=Σc0Mc×McL0Mc×Mnc0Mc×MncL0McL×Mcσ2IMcL0McL×Mnc0McL×MncL0Mnc×Mc0Mnc×McLΞ2Σnc0Mnc×MncL0MncL×Mc0MncL×McL0MncL×Mncσ2Ξ2IMncL, (19)

and the vector x=uhcT,uncT,,uncT,uhncT,unncT,,unncTC1×(L+1)Mnc+Mc. We are now able to express (17) as

T=xHΣη1/2GΣη1/2x=xHΩHΛΩx=x˜HΛx˜. (20)

In (20), to obtain the second equality we have utilized the fact that Ση1/2GΣη1/2 is Hermitian, allowing it to be expressed in terms of the unitary matrix Ω and the diagonal matrix Λ, which contain the eigenvalues of Ση1/2GΣη1/2. Note that when a complex Gaussian vector x is multiplied by a unitary vector, the resulting vector x˜ remains Gaussian in nature, following the same distribution characteristics as the original Gaussian vector. Therefore, x˜CN0,I(Mc+Mnc)(L+1). Using (20), the characteristic function (CF) of T is given by

φTt=EejtT=i=1n11jtλi, (21)

where γiR are the eigenvalues of the matrix GΣη, and n=(Mc+Mnc)(L+1). To obtain the final result in (21) we have used [39] (Lemma 2). Using the inverse Fourier transformation on (21), the CDF of T can be obtained as [36]

FTy=12πyφTtejtzdtdz. (22)

The inversion approach in (22) can be simplified to a single numerical integral as in [40] (Equation (3.1)). This approach is well-known and can be conveniently computed using the gx2cdf(..., ‘method’, ‘imhof’) function from the Matlab toolbox ‘Generalized chi-square distribution’ [41], which implements the methodology from [40].

4.2. Upper Bound on the Average Block Error Probability

For the CNC detector using an MPSK modulation over L time slots, there are MPSKL1 potential erroneous detections. By summing over all the possible erroneous detection combinations we can gain an upper bound on the average block error probability of CNC:

PavePUB=1MPSKLqSq^S{q}Pqq^, (23)

where S is the set of all possible symbol sequences, Pave is the average block error probability and PUB is the union based upper bound for the CNC detector. However, given that this bound considers all conceivable erroneous scenarios, it remains relatively loose. Nevertheless, an approximation on the average block error probability of the CNC detector can be obtained by using the nearest-neighbor (NN) approximation.

To commence, let us first identify the NN errors for the CNC detector. For an arbitrary symbol, sl=ej2πi/MPSK, the closest erroneous detections would be ej2π(i+1)/MPSK and ej2π(i1)/MPSK. Note that, sl is the transmitted symbol at time instant, l, and is independent of i[0,MPSK1] which denotes the phase of the transmitted symbol. Nonetheless, to determine the NN error sequences for CNC, we should consider the erroneous symbol combinations that satisfy (a) and (b) given in Section 3.

  • Considering (a), the NN errors occur when only sl is incorrectly detected as s^l=ej2π(i+1)/MPSK (or s^l=ej2π(i1)/MPSK), while all other symbols are correctly identified (i.e, s^k=sk,k[1,,L]l). Hence, there are 2L such NN sequences (For the special case of binary PSK, there are only L such NN sequences.).

  • Considering (b), the symbol sequences that contain double errors which satisfy the multiplication s^ks^l=sksl but s^l=ej2π(i+1)/MPSK (or s^l=ej2π(i1)/MPSK) and s^k=ej2π(i+1)/MPSK (or s^k=ej2π(i1)/MPSK) are also NN error sequences.

By denoting the NN error sequences of a particular symbol sequence q as Nq, we can formulate an approximation on the average block error probability as

PavePNN=1MPSKLqSq^NqPqq^, (24)

where PNN is the NN approximation for the CNC detector.

In Section 7, we provide simulations demonstrating that the analytical CDF obtained by inverting (21) matches perfectly with the numerically generated CDF of T. We also present simulations that demonstrate the effectiveness of (23) and (24).

5. CNC Detector with Differential Encoding

Earlier, in Section 3, we introduced the CNC detector based on MPSK-ary PSK, which can also be adapted to operate with MPSK-ary differential PSK, referred to as the differential CNC detector. In this section, we present the differential CNC detector.

5.1. Differential Encoding

We begin by explaining the differential encoding process, which serves as a foundation for introducing the differential CNC detector. At each time step, l, the user transmits a symbol, sl, which is differentially encoded via

sl=mlsl1,s1=1. (25)

The information symbols, ml, are drawn from an MPSK-ary PSK constellation, M, as defined in (7).

5.2. Differential CNC Detector

With differential encoding, the ML detection problem in (4) is reformulated as

sML-d=argmaxs¯ML,s¯1=1fR(Rhc,s¯). (26)

Note that, the key difference between (4) and (26) is that (26) assumes s¯1=1, while (4) does not, as there is no differential encoding involved in the former. Hence, following the same procedure outlined in Section 3, the final detection problem will be given by

sML-d=argmaxs¯ML,s¯1=1Rel=2Lrc,lHhcs¯lCoherentcomponent+l=2Lj=1l1rnc,lHΞ2rnc,js¯ls¯jNon-coherentcomponent. (27)

However, the resulting symbol set sMLd in (27) does not estimate the set of information symbols (i.e., ml). In Section 3, the information symbols directly matched the transmitted symbols, eliminating the need for any further steps. Conversely, in this section, due to the differential encoding implemented at the user end, we are required to take an extra step to estimate the information symbols:

m¯l=s¯ls¯l1,s¯lsMLd. (28)

As is evident from (28), the detection process compares consecutive symbols, allowing errors in one symbol to propagate to subsequent ones, thereby increasing overall detection errors. Consequently, the differential CNC detector, much like the non-coherent differential detector, is susceptible to error propagation.

5.3. Error Analysis of the Differential CNC Detector

The most basic and frequently adopted differential detection scheme is achieved with L=2. Therefore, this subsection analyzes the differential CNC detector error probability for the case of L=2.

For L=2, the first symbol, s1, is always estimated in the immediately preceding cycle, while s2 is estimated in the current cycle. However, there are two ways a correct detection of the information symbol, m2, can occur.

  • s^1=s1, and s^2=s2, therefore m^2=m2.

  • s^1s1, and s^2s2, but m^2=s^2s^1=m2.

Hence, the pairwise error probability of deciding on m^2 when m2 was transmitted is

Pm2m^2=PTd>0|s^1=s1,s^2s2,PTd>0|s^1s1,s^2=s2,PTd>0|s^1s1,s^2s2,m^2m2, (29)

in which the pairwise test statistic, Td, is expressed in (30) where we have separated the user channel-related terms from the noise components, as previously done in Section 3. The derivation of (29) and (30) follows the same approach used for (10), but utilizing (27) for the differential CNC detector.

Td=Res2s^21hcHhc+s^2s2nc,2Hhc+s2s1s^2s^11hncHΞ2hnc+s2s^2s^1s1hncHΞ2nnc,1+s1s^2s^1s2nnc,2HΞ2hnc,+s^2s^1s2s1nnc,2HΞ2nnc,1. (30)

Despite being considerably simpler than T in (12), Td in (30) still comprises a summation of products that involve channel and noise terms. However, it shares a similar structure with (12), which permits us to transform it into a quadratic form as in Section 3.

By defining ηd=hcT,nc,2T,ΞhncT,Ξnnc,1T,Ξnnc,2TTC2Mc+3Mnc×1 with the covariance matrix

Σηd=Σc0Mc×Mc0Mc×Mnc0Mc×2Mnc0Mc×Mcσ2IMc0Mc×Mnc0Mc×2Mnc0Mnc×Mc0Mnc×McΞ2Σnc0Mnc×2Mnc02Mnc×Mc02Mnc×Mc02Mnc×Mncσ2Ξ2I2MncC2Mc+3Mnc×2Mc+3Mnc, (31)

and Gd as given in (32),

Gd=s2s^2+s2s^22IMcs^2s2IMc0Mc×Mnc0Mc×Mnc0Mc×Mncs^2s2IMc0Mc0Mc×Mnc0Mc×Mnc0Mc×Mnc0Mnc×Mc0Mnc×Mcs2s1s^2s^1+s2s1s^2s^12IMncs2s^2s^1s1IMncs1s^2s^1s2IMnc0Mnc×Mc0Mnc×Mcs2s^2s^1s1IMnc0Mncs^2s^1s2s1IMnc0Mnc×Mc0Mnc×Mcs1s^2s^1s2IMncs^2s^1s2s1IMnc0Mnc, (32)

we represent Td in matrix form:

Td=ηdHGdηd. (33)

Following the same approach as in Section 3, the CDF of Td can be evaluated by inverting the CF of Td:

φTdt=i=1nd11jtγi, (34)

where γiR are the eigenvalues of the matrix GdΣηd, and nd=2Mc+3Mnc. Similar to Section 5.3, the CDF of Td can be calculated using the gx2cdf(..., ‘method’, ‘imhof’) function from the Matlab toolbox ‘Generalized chi-square distribution’ [41]. In Section 7, we present simulations showing that the analytical CDF obtained using (33) aligns perfectly with the numerically computed CDF of Td.

Note that, there is an interdependency between the symbols transmitted in the two time-steps, s1 and s2, as well as between the information symbol m2 and the symbols s1 and s2. Moreover, as noted previously in Section 5.2, due to the inherent iterative approach, differential CNC is prone to error propagation. Systems characterized by error propagation present considerable challenges for effective error analysis [42]. As such, it is not possible to derive a generic upper bound on the average error probability for the differential CNC using the union bounding technique (or the NN approach) on the pairwise error probability, Pm2m^2, as was done in Section 5.3. Nonetheless, by assuming previously detected symbols are error-free (Note that this assumption is a valid approximation in the high SNR regime, where the probability of the previous symbol being detected incorrectly is low [42,43].), we are able to derive an upper bound on the average symbol error probability (SEP) by employing the union bounding technique:

Paved1MPSKs2Ms^2M{s2}PTd>0|s^1=s1,s^2s2=PUBd, (35)

where Paved is the average SEP for the differential CNC detector and PUBd is the union based upper bound for the differential CNC detector.

In Section 7 we evaluate and compare the differential CNC detector with the CNC detector. We also provide simulations showing that (35) effectively serves as an upper bound on the average SEP for the differential CNC detector in the high SNR regime.

6. System-Level Considerations

In this section, we examine key system-level factors that impact the practical deployment of the proposed detection framework. Specifically, we analyze three important aspects: the computational complexity associated with the detection process, the network overhead arising from the exchange of channel information between BSs and the CPU and the performance implications of adding additional cooperative BSs—both coherent and non-coherent—to the proposed detectors. We provide comparisons for the complexity and network overhead incurred by the proposed approaches against two appropriate baseline schemes: fully coherent ML detection and fully non-coherent ML detection. These benchmarks represent the two extremes in terms of CSI availability and cooperation models, and provide a meaningful context for evaluating the proposed middle-ground joint detection approach.

To quantify the associated complexity, we decompose the computational cost into two components: (i) the number of complex operations required for channel estimation, and (ii) the complexity of ML detection. We assume that all cooperating BSs use the same channel estimation method, and that estimating the channel of the target user at any BS requires C complex operations. Consequently, the total channel estimation complexity depends on both the number of participating BSs and the type of CSI each BS provides during detection. We further characterize the ML detection complexity by the number of complex multiplications (Due to their low hardware cost, additions and subtractions are not considered [44].) required to evaluate the detection rule. Similarly, we quantify network overhead by the number of instantaneous channel coefficients that must be transmitted to the CPU in a coherence block. A detailed comparison of the three considered schemes is presented in Table 1. To emphasize that the number of cooperative antennas in fully coherent and fully non-coherent modes are different to that used in CNC and differential CNC, we denote the number of antennas in fully coherent and fully non-coherent mode as McF and MncF, respectively.

Table 1.

Comparison of computational complexity and network overhead between the proposed detection schemes and baseline approaches.

    Channel Estimation ML Detection Network Overhead
Fully coherent CMcF LMcFMPSK McF
Fully non-coherent - L(L1)2MncFMPSK2 -
CNC CMc LMcMPSK+L(L1)2MncMPSK2 Mc
Differential CNC CMc McMPSK+MncMPSK2 Mc

The proposed scheme relaxes the need for acquiring instantaneous CSI from all cooperating BSs, resulting in a significant reduction in both signaling overhead and channel estimation complexity compared to fully coherent cooperative systems that require real-time CSI at every BS. However, this comes at the cost of a higher overhead relative to fully non-coherent cooperative systems. In Section 7, we demonstrate that, given the same overhead for channel estimation and network signaling, the proposed approach outperforms both fully coherent and fully non-coherent schemes.

It is worth emphasizing that while this work focuses on full ML detection to establish a performance benchmark for joint coherent and non-coherent processing, the exhaustive search involved can become computationally demanding with higher-order modulations or longer detection windows. To address this, low-complexity alternatives such as sphere decoding [45,46], lattice reduction-aided detection [47], or sequential search techniques [48,49] can be applied to reduce computational burden while preserving near-ML performance. Incorporating these complexity-reduction strategies into the hybrid detection framework is a promising direction for future work and practical system design.

Next, we discuss the impact of adding additional cooperative BSs-both coherent and non-coherent-on system level performance of the CNC and differential CNC detectors. From (9) and (27), it can be observed that the influence of each non-coherent antenna on the final decision metric is weighted by the power it captures. Therefore, increasing the number of non-coherent BSs does not always result in performance improvement (although performance does not degrade)-especially when the received signal powers at those BSs are uneven. In cases where one BS dominates in received power, the contribution from additional, weaker BSs becomes marginal, offering limited combining gain in the overall detection process. This phenomenon mirrors that of [18], where it was noted that the effectiveness of cooperation hinges largely on cooperating non-coherent BSs receiving nearly equal powers from the user. In contrast, adding more coherent BSs tends to yield more consistent and substantial performance gains. This is due to the phase-aligned nature of coherent combining, which allows effective signal addition even when received powers vary moderately. However, this improvement comes at the cost of higher system-level complexity: each coherent BS must perform accurate instantaneous channel estimation and transmit this information to the central processor. As a result, coherent cooperation introduces significant overhead in terms of CSI acquisition and coordination. This trade-off underscores a key strength of the joint detection scheme. The proposed detectors enable the system to opportunistically adapt to available resources, utilizing coherent BSs where CSI is reliable and supplementing with non-coherent BSs in a low-overhead, power-aware manner.

While this work focuses on the design and performance evaluation of the joint detectors, we acknowledge that a practical deployment would benefit from a more systematic strategy to classify BSs as coherent or non-coherent. Such a strategy could be based on real-time factors such as signal quality, mobility patterns, or service-level requirements. We consider this another valuable direction for future work, aimed at enhancing the adaptability and efficiency of joint cooperative detection in dynamic networks.

7. Numerical Results

In this section, we evaluate the performance of the proposed CNC and differential CNC detectors through Monte Carlo simulations. The complete simulation setup and parameters are summarized in Table 2. To investigate the impact of user location on detector performance, we consider three representative user positions, also listed in Table 2. The layout of the BSs and the three user scenarios is illustrated in Figure 2. Note that since shadowing effects are not included in the channel model, the user’s position directly determines the received power levels at the BS antennas. Unless specified otherwise, the subsequent figures present the average SEP versus the received signal-to-noise ratio (SNR), comparing the performance of the proposed detectors with that of the baseline counterparts. The cooperation gain achieved by the proposed detectors across various configurations is evident from the improvements in average SEP depicted in the in those figures.

Table 2.

Simulation Setup and Parameters.

Category Details
System model Hexagonal cell with three BSs (BS1, BS2, BS3) at fixed positions and are equipped with M1, M2 and M3 antennas, respectively.
Antennas per BS M1=M2=M3=32 *
User Single-antenna user
User positions Scenario 1 (Sc1): User 20% closer to BS2 compared to Sc2
Scenario 2 (Sc2): User equidistant from BS1 and BS2
Scenario 3 (Sc3): User 20% farther from BS2 compared to Sc2
Modulation QPSK (M=4)
Channel model Independent Rayleigh fading *
Path loss Distance-dependent path decay with path loss exponent = 4. To ensure simplicity in numerical results, only distance-based path loss was considered in the simulations. Incorporating shadow fading would have introduced variability that could obscure key performance trends. Nonetheless, as shadow fading is incorporated in the detector design, the derived detectors could be readily used in systems where shadow fading is present.
Block length L=2 *
Detectors compared Proposed: CNC, Differential CNC Baselines: Fully coherent ML, Fully non-coherent ML

* Unless otherwise stated.

Figure 2.

Figure 2

Simulation model: three hexagonal cells each equipped with a BS located at the cell center.

In Figure 3, we illustrate the performance gains experienced by the user (located corresponding to Sc2) when signals are detected using the CNC detector, compared to detection by a non-cooperative coherent BS. Here, we assume that BS1 possesses instantaneous CSI of the user, while BS2 and BS3 only have access to long-term channel information. The light blue dashed curve represents the error performance of the user when detected coherently at BS1. If BS2 also had instantaneous CSI and both BS1 and BS2 were used for coherent detection, the user would obtain the error performance depicted in the dark blue curve. However, since BS2 only possesses long-term channel information, this level of performance is unachievable. Thus, employing the CNC detector with BS1 operating coherently and BS2 operating non-coherently results in the error performance illustrated by the light purple curve, which demonstrates a notable improvement over coherent detection alone (e.g., at SNR = 18 dB the average SEP decreases from 3.3×104 with coherent ML detection to 5.8×105 with the proposed CNC detector, corresponding to an improvement of approximately 83%). Notably, the CNC detector outperforms coherent detection while maintaining the same channel estimation and signaling overhead. The light orange dashed line represents the average SEP when both BS1 and BS2 operate in a fully non-coherent mode, relying solely on long-term channel information to cooperatively detect the user’s signal. As observed, even with cooperation, the performance of the non-coherent detector remains significantly limited.

Figure 3.

Figure 3

Error performance of the user: Performance comparison as the number of coherent and non-coherent antennas change.

Figure 3 also demonstrates the error performance of the CNC detector when more than one non-coherent BS cooperates with a coherent BS to detect user signals. The orange dotted line shows the error performance when BS3 is also included in the CNC detector as a non-coherent BS, contributing only a very minor increase in performance compared to the CNC detector with just BS1 and BS2. This performance improvement is very small with 32 antennas at each BS, and both curves seem to be on top of each other. For lower number of antennas at each BS this improvement is more discernible. As explained in Section 6, the marginal improvement associated with incorporating BS3 into the detection process stems from the fact that the signals at this BS are weighted based on the received power. Due to the distant location of BS3 (compared to that of BS2), the aid supplied by BS3 for the CNC detector is minimal. Alternatively, doubling the antennas at BS2 (or adding another non-coherent BS obtaining similar power to BS2), rather than incorporating BS3, would result in a greater performance improvement as depicted by the green dotted curve. This is attributed to the higher weighting factor at BS2. As such, in the subsequent simulations (except Figure 8) we consider only BS1 and BS2.

The error performance of the CNC detector as L increases is depicted in Figure 4. As expected, the trends illustrated in Figure 4 suggest that the performance gains of the CNC detector diminish with each additional increase in L. Additionally, it appears that as L tends towards infinity, the performance of the CNC detector is constrained by the error performance achievable through coherent detection at both BSs.

Figure 4.

Figure 4

Performance of the CNC detector as L increases.

Figure 5 illustrates how the performance gains of the CNC detector vary as the user moves away from the non-coherent BS (BS2). We observe that the performance gain of the CNC detector is highest in Sc1 i.e., when the user is positioned closer to BS2. The reason for this improvement is that being closer to BS2 allows it to capture stronger signals from the user, which increases the scaling factor and consequently, enhances the benefits derived from adding the non-coherent BS in the detection process. Additionally, both CNC and coherent detectors show improved performance as the user approaches the coherent BS. This improvement is due to the improved channel conditions at the coherent BS, which enables more accurate decoding of the user’s signals.

Figure 5.

Figure 5

Performance gain of the CNC detector as user moves away from the non-coherent BS.

In Figure 6, we demonstrate that the accuracy of the analytical expressions for the CDF of the pairwise test statistics, T and Td, which were obtained via inversion of (21) and (34), respectively. For the CNC detector, we plot the CDF where both signals are detected incorrectly (i.e., s^1s1 and s^2s2). For the differential CNC detector, we analyze two specific error cases: first, when s1 is correctly detected while s2 is in error (i.e., s^1=s1,s^2s2), and second, when s2 is correctly detected while s1 is in error (i.e., s^1s1,s^2=s2). We observe that the derived expression aligns with the simulated CDFs in all three cases.

Figure 6.

Figure 6

Analytical and simulated CDF of the pairwise test statistic.

In Figure 7, the effectiveness of the union-based upper bound (23) and the NN approximation (24) on average block error probability of the CNC detector is demonstrated for the three considered scenarios. Both the upper bound and the NN approximation accurately capture the error behavior of the CNC detector for all three scenarios. Additionally, as SNR increases, both the bound and the approximation become tighter, eventually converging, with the NN approximation and union-based bound yielding the same results.

Figure 7.

Figure 7

CNC detector: A comparison of simulations and bounds.

Figure 8 illustrates how CNC compares to differential CNC as the user location changes. We assume that BS1 and BS3 have access to instantaneous CSI, while BS2 has only long-term channel information of the user. For comparison, the error performance for single BS coherent detection (denoted by Coh. in the plots–BS1 in Figure 8a–c, and BS3 in Figure 8d) and non-coherent differential detection (denoted by Diff. NC in the plots-BS2) are also shown. Similar to Figure 5, Figure 8a–c, demonstrate the increasing performance gain of the CNC detector as the user approaches the non-coherent BS. As we progress from Figure 8a–d, the differential non-coherent detector (as well as the differential CNC detector) begins to outperform the coherent detector as the user moves farther from the coherent BS. This phenomenon likely occurs because, as the user moves away from the coherent BS, the precise channel estimates no longer yield superior error performance compared to processing the user at a nearby BS with long-term information. To achieve good performance from the non-coherent BS, differential encoding and detection are required to cancel out the channel effect. Furthermore, as the user continues to move away, the differential CNC detector begins to outperform the CNC detector. This trend is more noticeable in Figure 8d, where the distant coherent BS (BS3) performs poorly, and using CNC with BS2 and BS3 instead of differential non-coherent detection at BS2 degrades the system’s error performance. However, differential CNC with BS2 and BS3 can only marginally improve performance as BS3 is too distant to provide significant assistance.

Figure 8.

Figure 8

Performance comparison of CNC and differential CNC (Diff. CNC): (a) BS1BS2 cooperation for Sc3. (b) BS1BS2 cooperation for Sc2. (c) BS1BS2 cooperation for Sc1. (d) BS2BS3 cooperation for Sc1.

Figure 9 further demonstrates the above discussed trend in detector performance as the user moves from the vicinity of the coherent BS (BS1) to the non-coherent BS (BS2). The x-axis represents the user’s position along the line between the two BSs. As expected, the performance of the fully coherent detector (Coh. BS1) degrades as the user moves away from BS1 due to weaker signal strength. Conversely, the performance of the differential non-coherent detector associated with BS2 (Diff. NC BS2) improves, as it approaches BS2. The proposed joint detectors in particular differential CNC detector exhibit strong adaptability. These detectors effectively combine the strengths of both coherent and non-coherent processing, resulting in consistently lower average SEP compared to using either BS in isolation.

Figure 9.

Figure 9

Performance of the detectors as the user moves away from the coherent BS (BS1) towards the non-coherent BS (BS2).

Similar to Figure 7, Figure 10 highlights the effectiveness of the upper bound given in (35) in capturing the behavior of the average SEP of the differential CNC detector in the high SNR regime. The results show that the upper bound effectively captures the error behavior in all three considered cases, making it a practical tool for understanding system dynamics with differential CNC detector in high-SNR conditions.

Figure 10.

Figure 10

Differential CNC detector: A comparison of simulations and bounds.

Figure 11 assesses the impact of correlation at BS antennas on the error performance of the proposed detectors. We model the user channels at both coherent and non-coherent BSs as exponentially correlated Rayleigh channels using [50]. Hence, the correlation matrix at the coherent BS is defined by (Rc)i,j=ρc|ij|, and at the non-coherent BS we have (Rnc)i,j=ρnc|ij|, where ρc and ρnc represent the correlation coefficient between neighboring receive branches at the coherent and non-coherent BS, respectively. In Figure 11a, the light orange curves show the performance of the coherent detector at BS1, while the pink curves depict the performance of the CNC detector if the user channels at the non-coherent BS, BS2, were independent. In Figure 11b, the light orange curve represents the performance of the non-coherent differential detector, while the green curve shows the performance of the differential CNC detector, both assuming independent user channels at the non-coherent BS. Since both CNC and differential CNC detectors are designed under the assumption of uncorrelated non-coherent antennas, the presence of correlation at these antennas is likely to result in some performance loss. Accordingly, when the user channels at the non-coherent BS are correlated with ρnc=0.8exp(jπ/4), a performance drop is observed, as depicted by the blue lines (for both CNC and differential CNC) in the plots. Since the non-coherent differential detector encounters the same issue as the CNC and differential CNC detectors, it also experiences a performance loss, illustrated by the pink curve in Figure 11b. Nevertheless, we observe that, even with a mid-to-high correlation coefficient, the performance loss is minimal across all three scenarios for the CNC detector, with degradation becoming even less noticeable as the user approaches the coherent BS. For the differential CNC detector in Figure 11b we have only shown the performance curves for Sc1 and Sc2 as adding in Sc3 would add clutter to the plot. We observe that, for the differential CNC detector in both scenarios, the performance degradation is minimal. Similar to the CNC detector, the performance loss due to correlation between non-coherent antennas diminishes as the user moves farther from the non-coherent BS.

Figure 11.

Figure 11

Effect of correlated channels on the proposed detectors: (a) CNC detector. (b) Differential CNC detector.

Figure 12 illustrates the sensitivity of the proposed detectors to channel estimation errors. We model the estimation error using the framework described in [51], which captures the statistical properties of errors arising from the use of a linear minimum mean squared error (LMMSE) channel estimator. For this evaluation, the training SNR is set equal to the detection SNR to highlight the impact of estimation inaccuracies-despite this conservative assumption, the performance degradation remains low in both considered scenarios. It is important to note that, in practical systems, the training SNR is typically higher than that of the detection SNR, which would result in even smaller estimation-induced degradation. To maintain the presentation clarity, the performance curves for Sc1 have been omitted, and only Sc2 and Sc3 are shown. In the configuration represented by scenario Sc3, where coherent BSs contribute more significantly to the detection process, the system exhibits slightly increased sensitivity to estimation error, consistent with its heavier reliance on accurate coherent CSI. The behavior of Sc1 follows trivially, exhibiting even lower—effectively negligible—performance degradation due to the minimal influence of coherent channels in that configuration. As such, the proposed CNC and differential CNC detectors exhibit strong robustness to imperfect CSI, with performance loss closely matching that of the conventional coherent detector. It is important to emphasize that the performance degradation experienced by the proposed detectors under channel estimation errors is highly dependent on the choice of estimation algorithm. With a robust approach such as LMMSE, the degradation remains limited and aligns closely with that of the conventional coherent detector.

Figure 12.

Figure 12

Impact of channel estimation errors on the proposed detectors. The dotted curves represent detector performance under perfect channel knowledge (hc), while the solid curves correspond to performance when estimated channels (h^c) are used in the detection process.

8. Conclusions

We introduced a novel detector termed the CNC detector which enables cooperation among BSs that have access to different levels of user channel information. In this setup, some BSs possess instantaneous user channel information and are able to detect user signals coherently, while others relying on long-term information of the user’s channel can detect user signals non-coherently. The CNC and differential CNC detectors combine the coherent and non-coherent methods of signal detection and enables cooperation among these two sets of BSs. We derived analytical expressions for the pairwise block error probability for both detectors and provided a tight upper bound on the average block error probability for the CNC detector. Our numerical evaluations demonstrated that the CNC detector and the differential CNC detector outperform coherent detection and non-coherent differential detection, respectively, at a single BS. Notably, the performance of the CNC detector improves as the user moves closer to BSs cooperating with long-term channel information, while the differential CNC detector shows higher gains as the user approaches BSs utilizing instantaneous CSI. Furthermore, we note that both detectors exhibited strong resilience to mid-to-high correlation at the BS antennas, and channel estimation errors highlighting their robustness in practical deployment scenarios.

Abbreviations

The following abbreviations are used in this manuscript:

MIMO Multiple-input Multiple-output
BS Base Station
CSI Channel State Information
CNC Coherent/Non-coherent
ML Maximum Likelihood
SINR Signal-to-Interference-and-Noise Ratio
SNR Signal-to-Noise Ratio
CPU Unmanned Aerial Vehicle
RIS Reconfigurable Intelligent Surfaces
AP Access Point
PDF Probability Distribution Function
PSK Phase Shift Keying
CDF Cumulative Distribution Function
CF Characteristic Function
NN Nearest Neighbor
SEP Symbol Error Probability

Author Contributions

Conceptualization, S.G., P.S., M.K. and R.S.; methodology, S.G. and P.S.; software, S.G.; validation, P.S. and R.S.; writing—original draft preparation, S.G.; writing—review and editing, P.S., M.K. and R.S.; funding acquisition, R.S. All authors have read and agreed to the published version of the manuscript.

Data Availability Statement

Data contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

Funding Statement

This work was supported in part by the Australian Research Council (ARC) through the ARC Discovery Early Career Researcher Award under Grant DE180100501.

Footnotes

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

References

  • 1.Liu L., Yu W. Massive connectivity with massive MIMO-Part I: Device activity detection and channel estimation. IEEE Trans. Signal Process. 2018;66:2933–2946. doi: 10.1109/TSP.2018.2818082. [DOI] [Google Scholar]
  • 2.Marzetta T.L. Fundamentals of Massive MIMO. Cambridge University Press; Cambridge, UK: 2016. [Google Scholar]
  • 3.Senanayake R., Yeoh P.L., Evans J.S. Performance analysis of centralized and partially decentralized co-operative networks. IEEE Trans. Commun. 2015;64:863–875. doi: 10.1109/TCOMM.2015.2512918. [DOI] [Google Scholar]
  • 4.O’Hurley S., Tran L.N. A Comparison of the Uplink Performance of Cell-Free Massive MIMO using Three Linear Combining Schemes: Full-Pilot Zero Forcing with Access Point Selection, Matched-Filter and Local-Minimum-Mean-Square Error; Proceedings of the 2020 31st Irish Signals and Systems Conference (ISSC); Letterkenny, Ireland. 11–12 June 2020; pp. 1–6. [Google Scholar]
  • 5.Chen S., Zhang J., Zhang J., Björnson E., Ai B. A survey on user-centric cell-free massive MIMO systems. Digit. Commun. Netw. 2022;8:695–719. doi: 10.1016/j.dcan.2021.12.005. [DOI] [Google Scholar]
  • 6.Attarifar M., Abbasfar A., Lozano A. Subset MMSE receivers for cell-free networks. IEEE Trans. Wireless Commun. 2020;19:4183–4194. doi: 10.1109/TWC.2020.2980820. [DOI] [Google Scholar]
  • 7.Björnson E., Sanguinetti L. Scalable cell-free massive MIMO systems. IEEE Trans. Commun. 2020;68:4247–4261. doi: 10.1109/TCOMM.2020.2987311. [DOI] [Google Scholar]
  • 8.Gunasekara S., Senanayake R., Smith P., Kuijper M. A Novel Partial Joint Processing Architecture for distributed Massive MIMO; Proceedings of the 95th IEEE Vehicular Technology Conference, VTC Spring 2022; Helsinki, Finland. 19–22 June 2022. [Google Scholar]
  • 9.Gunasekara S., Senanayake R., Smith P., Kuijper M. Zeroing Unknown Terms: A Novel Clustering Architecture for Low Network Overhead in Distributed Massive MIMO. IEEE Open J. Commun. Soc. 2024;5:1256–1274. doi: 10.1109/OJCOMS.2024.3362875. [DOI] [Google Scholar]
  • 10.Armada A.G., Hanzo L. A non-coherent multi-user large scale SIMO system relaying on M-ary DPSK; Proceedings of the 2015 IEEE International Conference on Communications, ICC 2015; London, UK. 8–12 June 2015; pp. 2517–2522. [Google Scholar]
  • 11.Schenk A., Fischer R.F. Noncoherent detection in massive MIMO systems; Proceedings of the 17th International ITG Workshop on Smart Antennas, WSA 2013; Stuttgart, Germany. 13–14 March 2013; pp. 1–8. [Google Scholar]
  • 12.Baeza V.M., Armada A.G. Non-coherent massive SIMO system based on M-DPSK for Rician channels. IEEE Trans. Veh. Technol. 2019;68:2413–2426. doi: 10.1109/TVT.2019.2892390. [DOI] [Google Scholar]
  • 13.Morales M.J.L., Chen-Hu K., Armada A.G. Effect of Spatial Correlation on the Performance of Non-coherent Massive MIMO based on DMPSK; Proceedings of the IEEE Global Communications Conference, GLOBECOM 2021; Madrid, Spain. 7–11 December 2021; pp. 1–6. [Google Scholar]
  • 14.Xie H., Xu W., Ngo H.Q., Li B. Non-coherent massive MIMO systems: A constellation design approach. IEEE Trans. Wireless Commun. 2020;19:3812–3825. doi: 10.1109/TWC.2020.2978806. [DOI] [Google Scholar]
  • 15.Manolakos A., Chowdhury M., Goldsmith A. Energy-Based Modulation for Noncoherent Massive SIMO Systems. IEEE Trans. Wireless Commun. 2016;15:7831–7846. doi: 10.1109/TWC.2016.2608883. [DOI] [Google Scholar]
  • 16.Manolakos A., Chowdhury M., Goldsmith A.J. CSI is not needed for optimal scaling in multiuser massive SIMO systems; Proceedings of the 2014 IEEE International Symposium on Information Theory; Honolulu, HI, USA. 29 June–4 July 2014; pp. 3117–3121. [Google Scholar]
  • 17.Chowdhury M., Manolakos A., Goldsmith A. Scaling laws for noncoherent energy-based communications in the SIMO MAC. IEEE Trans. Inf. Theory. 2016;62:1980–1992. doi: 10.1109/TIT.2016.2527679. [DOI] [Google Scholar]
  • 18.Gunasekara S., Smith P., Kuijper M., Senanayake R. Non-coherent detection with differential modulation for distributed massive MIMO Systems; Proceedings of the 97th IEEE Vehicular Technology Conference, VTC Spring 2023; Florence, Italy. 20–23 June 2023. [Google Scholar]
  • 19.Gunasekara S., Smith P., Kuijper M., Senanayake R. Invited Paper: SNR Analysis of Differential Modulation for Distributed Massive MIMO Systems; Proceedings of the 17th IEEE International Conference on Industrial and Information Systems, ICIIS 2023; Peradeniya, Sri Lanka. 25–26 August 2023; pp. 103–108. [Google Scholar]
  • 20.Wang L., Hanzo L. Dispensing with channel estimation: Differentially modulated cooperative wireless communications. IEEE Commun. Surv. Tutor. 2011;14:836–857. doi: 10.1109/SURV.2011.081611.00138. [DOI] [Google Scholar]
  • 21.Xu W., Alshamary H.A., Al-Naffouri T., Zaib A. Optimal joint channel estimation and data detection for massive SIMO wireless systems: A polynomial complexity solution. IEEE Trans. Inf. Theory. 2019;66:1822–1844. doi: 10.1109/TIT.2019.2957084. [DOI] [Google Scholar]
  • 22.Song H., Goldstein T., You X., Zhang C., Tirkkonen O., Studer C. Joint channel estimation and data detection in cell-free massive MU-MIMO systems. IEEE Trans. Commun. 2022;21:4068–4084. doi: 10.1109/TWC.2021.3126646. [DOI] [Google Scholar]
  • 23.Karataev A., Forsch C., Cottatellucci L. Bilinear Expectation Propagation for Distributed Semi-Blind Joint Channel Estimation and Data Detection in Cell-Free Massive MIMO. IEEE Open J. Signal Process. 2024;5:284–293. doi: 10.1109/OJSP.2023.3348343. [DOI] [Google Scholar]
  • 24.Demir Ö.T., Björnson E., Sanguinetti L. Foundations of User-Centric Cell-Free Massive MIMO. Now Publishers; Norwell, MA, USA: 2021. [Google Scholar]
  • 25.Gesbert D., Hanly S., Huang H., Shitz S.S., Simeone O., Yu W. Multi-cell MIMO cooperative networks: A new look at interference. IEEE J. Sel. Areas Commun. 2010;28:1380–1408. doi: 10.1109/JSAC.2010.101202. [DOI] [Google Scholar]
  • 26.Björnson E., Sanguinetti L. Cell-Free versus Cellular Massive MIMO: What Processing is Needed for Cell-Free to Win?; Proceedings of the 20th IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2019; Cannes, France. 2–5 July 2019; pp. 1–5. [Google Scholar]
  • 27.Lopez-Morales M.J., Chen-Hu K., Garcia-Armada A. Differential data-aided channel estimation for up-link massive SIMO-OFDM. IEEE Open J. Commun. Soc. 2020;1:976–989. doi: 10.1109/OJCOMS.2020.3008634. [DOI] [Google Scholar]
  • 28.Sun W., Liu J. 2-to-M Coordinated Multipoint-Based Uplink Transmission in Ultra-Dense Cellular Networks. IEEE Trans. Wireless Commun. 2018;17:8342–8356. doi: 10.1109/TWC.2018.2876442. [DOI] [Google Scholar]
  • 29.Yang K., Zhang J., Zhang X., Wang W. Edge aware cross-tier base station cooperation in heterogeneous wireless networks with non-uniformly-distributed nodes. IET Commun. 2016;10:1896–1903. doi: 10.1049/iet-com.2016.0125. [DOI] [Google Scholar]
  • 30.Li F., Sun Q., Chen X., Peng B., Zhang J., Wong K.K. Cell-Free Massive MIMO Symbiotic Radio for IoT: RIS or BD? IEEE Trans. Wireless Commun. 2024 doi: 10.1109/TWC.2024.3520205. [DOI] [Google Scholar]
  • 31.Kenneth O., Mwangi E., Konditi D.B.O. Optimizing UAV location for deployment in Cell-Free Massive MIMO Networks Using a Soft Actor-Critic Reinforcement Learning. IEEE Access. 2025;13:139680–139695. doi: 10.1109/ACCESS.2025.3592733. [DOI] [Google Scholar]
  • 32.Van Chien T., Ngo H.Q., Chatzinotas S., Di Renzo M., Ottersten B. Reconfigurable intelligent surface-assisted cell-free massive MIMO systems over spatially-correlated channels. IEEE Trans. Wireless Commun. 2021;21:5106–5128. doi: 10.1109/TWC.2021.3136925. [DOI] [Google Scholar]
  • 33.Zhang Q., Zhao J., Zhang R., Yang L. Downlink Transmissions of UAV-RIS-Assisted Cell-Free Massive MIMO Systems: Location and Trajectory Optimization. Sensors. 2024;24:4064. doi: 10.3390/s24134064. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 34.Wu Q., Zhang R. Towards Smart and Reconfigurable Environment: Intelligent Reflecting Surface Aided Wireless Network. IEEE Commun. Mag. 2020;58:106–112. doi: 10.1109/MCOM.001.1900107. [DOI] [Google Scholar]
  • 35.Zeng Y., Wu Q., Zhang R. Accessing from the sky: A tutorial on UAV communications for 5G and beyond. Proc. IEEE. 2019;107:2327–2375. doi: 10.1109/JPROC.2019.2952892. [DOI] [Google Scholar]
  • 36.Proakis J.G., Salehi M. Digital Communications. Volume 4 McGraw-Hill; New York, NY, USA: 2001. [Google Scholar]
  • 37.Xiao L., Greenstein L.J., Mandayam N.B., Trappe W. Channel-based detection of sybil attacks in wireless networks. IEEE Trans. Inf. Forensics Secur. 2009;4:492–503. doi: 10.1109/TIFS.2009.2026454. [DOI] [Google Scholar]
  • 38.Simon M.K., Alouini M.S. Digital Communication over Fading Channels. 2nd ed. Wiley; Newark, NJ, USA: 2005. [Google Scholar]
  • 39.Basnayaka D.A., Smith P.J., Martin P.A. Performance Analysis of Dual-User Macrodiversity MIMO Systems with Linear Receivers in Flat Rayleigh Fading. IEEE Trans. Wireless Commun. 2012;11:4394–4404. doi: 10.1109/TWC.2012.101112.112110. [DOI] [Google Scholar]
  • 40.Imhof J.P. Computing the distribution of quadratic forms in normal variables. Biometrika. 1961;48:419–426. doi: 10.1093/biomet/48.3-4.419. [DOI] [Google Scholar]
  • 41.Das A. New methods for computing the generalized chi-square distribution. arXiv. 2024 doi: 10.48550/arXiv.2404.05062.2404.05062 [DOI] [Google Scholar]
  • 42.Liu J., Kwatra S., Kim J. An analysis of decision feedback detection of differentially encoded MPSK signals. IEEE Trans. Veh. Technol. 1995;44:261–267. doi: 10.1109/25.385917. [DOI] [Google Scholar]
  • 43.Loyka S., Gagnon F. Performance analysis of the V-BLAST algorithm: An analytical approach. IEEE Trans. Wireless Commun. 2004;3:1326–1337. doi: 10.1109/TWC.2004.830853. [DOI] [Google Scholar]
  • 44.Björnson E., Hoydis J., Sanguinetti L. Massive MIMO networks: Spectral, energy, and hardware efficiency. Found. Trends Signal Process. 2017;11:154–655. doi: 10.1561/2000000093. [DOI] [Google Scholar]
  • 45.Han S., Tellambura C. A complexity-efficient sphere decoder for MIMO systems; Proceedings of the 2011 IEEE International Conference on Communications (ICC); Kyoto, Japan. 5–9 June 2011; pp. 1–5. [Google Scholar]
  • 46.Liao J., Zhao J., Gao F., Li G.Y. Deep learning aided low complex sphere decoding for MIMO detection. IEEE Trans. Commun. 2022;70:8046–8059. doi: 10.1109/TCOMM.2022.3218630. [DOI] [Google Scholar]
  • 47.Pan J., Ma W.K., Jaldén J. MIMO detection by Lagrangian dual maximum-likelihood relaxation: Reinterpreting regularized lattice decoding. IEEE Trans. Signal Process. 2013;62:511–524. doi: 10.1109/TSP.2013.2292040. [DOI] [Google Scholar]
  • 48.Sah A.K., Chaturvedi A.K. Sequential and global likelihood ascent search-based detection in large MIMO systems. IEEE Trans. Commun. 2017;66:713–725. doi: 10.1109/TCOMM.2017.2761383. [DOI] [Google Scholar]
  • 49.Ali K.S., Abediseid W., Alouini M.S. Sequential decoders for large MIMO systems; Proceedings of the 2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt); Hammamet, Tunisia. 12–16 May 2014; pp. 709–716. [Google Scholar]
  • 50.Loyka S.L. Channel capacity of MIMO architecture using the exponential correlation matrix. IEEE Commun. Lett. 2001;5:369–371. doi: 10.1109/4234.951380. [DOI] [Google Scholar]
  • 51.Özdogan Ö., Björnson E., Larsson E.G. Massive MIMO with spatially correlated Rician fading channels. IEEE Trans. Commun. 2019;67:3234–3250. doi: 10.1109/TCOMM.2019.2893221. [DOI] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

Data contained within the article.


Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES