Activity Detection in Massive Access
The Massive-Access Bottleneck
Modern IoT and massive-machine-type communication (mMTC) scenarios involve a huge population of potential devices β think β of which only a tiny fraction is active at any given time. Classical access protocols rely on handshakes, requests, and grants. With devices, this overhead is prohibitive: the coordination itself consumes more airtime than the data. The point is that "who is transmitting?" is a sparse-recovery question. If we give each device a unique pilot sequence and observe a single superimposed uplink, the unknown activity vector is -sparse in dimensions, and the compressed-sensing machinery identifies the active set from channel uses.
Definition: Activity Vector and Massive-Access Model
Activity Vector and Massive-Access Model
Let denote the population of potential users and, at a given coherence block, let of them transmit. Assign to user the unit-norm pilot signature and collect them as columns of . Let encode user 's transmitted symbol (zero if inactive). The base station observes The activity vector is -sparse, and activity detection is the problem of recovering its support .
When users are additionally equipped with receive antennas, the model becomes a multiple-measurement vector (MMV) problem: with row-sparse β the same users are active across all receive antennas.
Theorem: Sample Complexity of Activity Detection
Suppose pilots are i.i.d.\ and active symbols have power bounded below by . There is a constant such that if then the LASSO or non-negative LS (NNLS) activity detector correctly identifies with probability .
Pilot length scales logarithmically in and linearly in , plus a standard inverse-SNR factor. For and , this is channel uses, versus for a deterministic orthogonal scheme β a roughly saving.
Reduce to support recovery
Consistent support recovery for LASSO requires the irrepresentable condition plus a minimum-signal-strength scaling (Wainwright, 2009).
Gaussian pilots satisfy IRC
Wainwright showed that random Gaussian pilots satisfy the irrepresentable condition with high probability whenever .
Combine minimum-signal and IRC bounds
Inserting into the signal-strength requirement and taking the stricter of the two scalings yields the stated bound.
Unsourced Random Access (Fengler-Haghighatshoar-Jung-Caire)
In unsourced random access the base station only wants to recover the list of transmitted messages, not who sent them. Fengler, Haghighatshoar, Jung, and Caire showed that this problem maps onto a massive-MIMO activity-detection problem where the "users" are codewords. They proved that a covariance-based detector combined with a large-scale-fading estimator achieves the information-theoretic scaling laws of Polyanskiy's finite-blocklength bounds, without needing per-user identification. This work is one of the cornerstones of the CommIT group's research line on massive access and directly motivates 3GPP's Release-17 RedCap and ambient-IoT study items.
Coded Compressed Sensing for Unsourced MAC
Coded compressed sensing splits long messages into chunks, each mapped to a CS codeword, and stitches the chunks together via an outer tree code. This reduces the per-slot dictionary size from to , making CS computationally feasible even for modest payloads. The analysis β a joint AMP + belief-propagation decoder β is a CommIT-driven direction that fuses CS recovery with coding theory. Chapter 15 treats this as the canonical scalable architecture for unsourced access.
Covariance-Based Activity Detection (Non-Bayesian)
Complexity: per coordinate-descent sweep; converges in tens of sweeps.The covariance-based detector does not reconstruct ; it estimates only the large-scale fading power of each user. As the estimator is consistent even when β the regime where -based MMV methods fail.
Activity-Detection ROC
Sweep , pilot length , and and watch the ROC move. When falls below the threshold in the theorem above, the curve collapses onto the diagonal β activity detection fails.
Parameters
Many Users, Few Active: Activity Detection
Example: Sizing Pilot Length for mMTC
A base station serves devices, of which at most are active per coherence block. Active users transmit at SNR 5 dB. Estimate the minimum pilot length needed for reliable activity detection.
Logarithmic factor
.
SNR factor
Linear SNR is , so .
Apply the bound
With constant (typical for Gaussian pilots): . A pilot length of suffices β about of the brute-force orthogonal requirement .
Operational meaning
Within a 1-ms coherence block that carries symbols, can be used for activity detection and the rest for payload. Contrast with the orthogonal scheme which cannot fit.
Grant-Free Access in 3GPP
3GPP Release-17 RedCap (Reduced Capability) and Release-18 Ambient IoT study items introduce grant-free uplink transmission precisely to reduce the coordination overhead that activity detection solves information-theoretically. The dominant academic candidate for the physical-layer detector is the Fengler-Caire covariance method above, now cited in multiple 3GPP RAN1 contributions.
Common Mistake: Collisions Are Not Failures
Mistake:
Treating two users with similar pilot signatures as an error of the CS detector.
Correction:
In unsourced random access, near-collisions are inherent β two codewords (not users) may land close in sensing space. The outer tree code stitches chunks and disambiguates, and the final performance metric is per-message error, not per-codeword. The CS layer is allowed to output a list with modest "extra" entries.
Unsourced random access
A massive-access model in which the base station seeks only the set of messages transmitted, not the identities of the transmitters. Performance is measured by the per-message error probability under a per-user energy constraint. Introduced by Polyanskiy (2017), developed into a practical receiver framework by the CommIT group.
Related: Unsourced Random Access (Fengler-Haghighatshoar-Jung-Caire), Coded Compressed Sensing for Unsourced MAC
Multiple-measurement vector (MMV)
An extension of CS in which several measurement vectors share the same sparse support. Appears naturally in massive-MIMO activity detection (one measurement per receive antenna) and in joint channel estimation across subcarriers.
Key Takeaway
Massive-access activity detection is the prototypical communications application of sparse recovery. Pilot length scales like , and the covariance-based detector of Fengler, Haghighatshoar, Jung, and Caire is consistent even when provided the BS has enough receive antennas.
Why This Matters: Connection to NOMA and Grant-Free Uplink
Non-orthogonal multiple access (NOMA) and grant-free uplink are the standardization descendants of the massive-access theory developed here. In both, users transmit without explicit resource allocation; the receiver untangles them by exploiting sparsity (few simultaneous transmitters) and the CS detectors of this section.
Quick Check
For potential users and active at any time, which pilot length most closely matches the CS bound?
. About 500 is the right order.