1 Introduction

Wireless communication systems are usually designed assuming Gaussian noise. This fundamentally impacts many solutions that are used in transmitters and receivers. This is especially the case when it comes to the design of the receiver decision strategy which is typically directly derived from Gaussian assumptions. When these assumptions are not satisfied, or the interference is far from Gaussian, the receiver is significantly sub-optimal in its performance. One frequently encountered type of noise is designated by the term impulsive. However, this term covers a lot of different statistical models and each model gives rise to many different communication strategies. In this paper, we aim to give insight in the choices that can be made to model the noise and design an adapted receiver. We want this receiver to be flexible enough in order to exhibit performance close to the optimal in many situations, from purely Gaussian noise to highly impulsive situations.

Impulsive noises have an important impact in many communication settings, as can be seen in a very recent literature: power-line communications[1, 2] or digital subscriber loop [3]; wireless networks and OFDM [4, 5]; wireless sensor networks [6,7,8]; acoustic communication [9, 10]; it is also frequently encountered in different vehicular communications scenarios [11].

In the literature, a variety of statistical models have been proposed for the interference, but it remains challenging to unify these frameworks and to select between the different choices for a given application. One commonly encountered feature is that the noise can exhibit an impulsive behaviour. This means that large noise values can appear from time to time [12, 13]. These large samples have a dramatic impact on the receiver which is not supposed to see such events and fails to recover the proper data.

In this paper, we first make a survey of interference statistical models and receiver designs that have been developed in the wireless communications literature since the works from Middleton in 1977. We then propose to characterize impulsiveness in a mathematical way according to an overarching family of models: the subexponential family. This provides valuable insight into general properties of impulsive interference, which were previously proposed in seemingly unrelated studies.

We then consider the detection problem in a block fading scenario. Each data symbol is transmitted over wireless channels and K versions of each symbol are received. This transmission structure can be motivated by many different practical wireless communication systems, for example transmission for a rake receiver [14], a single-input-multiple-output system [15], in a cooperative communication system involving multiple relays [16] or in impulse radio Ultra Wide Band systems where repetitions of the transmitted symbol occur [17]. However the design rule that we propose can also be applied when channel coding [18, 19] or CDMA are implied which induce higher dimension problems. However, focusing on a simple scheme allows us to better understand the underlying phenomena in detail.

The main objective of this paper is not to introduce new receiver designs but to explore the state of the art of receiver design from a wide variety of literatures in great detail with regard to their decision regions and performance, adaptibility, robustness and flexibility under varying impulsive environments. We attempt to explain behaviours of classes of existing receivers so that one can better understand their properties relative to each other and make appropriate choices in a specific context. The main contributions can be summarized as:

  1. 1

    We first present a review of existing works about impulsive interference modelling and receiver design. We define three ways to design the receiver: linear approach, approximation of the interference PDF or approximation of the log-likelihood ratio (LLR).

  2. 2

    We propose in Sect. 3.3 a definition for impulsive interference using the sub-exponential family. It is important because impulsiveness in communication is widely used but rarely defined. We also propose in Sect. 3.4 to visualize the effect of impulsive noise on the decision regions of an optimal receiver.

  3. 3

    We propose in Sect. 4 design strategies for robust receivers. Some are already known (Myriad filter [20, 21], p-norm [22]) but we are interested by their efficiency, accuracy and robustness when the noise characteristics change. We introduce estimation algorithms to ensure their adaptation capabilities. We also extend the solution we introduced in [23] based on the Normal Inverse Gaussian (NIG) family and propose a receiver that directly estimates the log-likelihood ratio function [19, 24, 25].

  4. 4

    We finally evaluate through simulations the robustness of several receivers when the interference impulsiveness varies or when the noise model is changed in the case of linear, myriad, p-norm, NIG and LLR-based receivers. We also study the impact of the length of the training sequence.

Since we do not assume that we know a priori the interference distribution or because general models result in complicated (or non existing) analytical expressions for the PDF, it is not possible to have a fully analytical performance study. We consequently rely on Monte Carlo simulations to assess the performance. However, in the analysis we provide we do consider a large spectrum of interference settings so that our results are general and our findings wide ranging in their coverage. Besides our theoretical interference analysis makes clear the reasons why a receiver design works and when it will fail.

2 Method and organisation of the paper

The work is organised in three main steps:

  • an important effort was made to understand previous works on interference and receiver and especially to understand the impact of non Gaussian noises on the receiver design. First we did an extensive study of the state of the art on the interference models, presented in Sect. 3.2. This allowed us to identify properties of impulsive interference (sub-exponential family, Sect. 3.3). We then proposed a clear illustration of the effect of non Gaussian noise on the optimal decision that the receiver should make (Sect. 3.4.1). Along with a review on receiver design (Sect. 3.4.2), we then proposed a classification of receivers (linear, interference PDF based or LLR based);

  • we then proposed relevant receiver strategies (Myriad filter, p-norm, Normal Inverse Gaussian and LLR approximation) and the necessary parameter estimations (Sect. 4). If we assumed that the channel is known (perfect channel state information) at the receiver, on the contrary, no information about the noise is known a priori;

  • the different approaches are finally evaluated through simulations under different interference scenarios and compared to a linear approach and to the optimal receiver (Sect. 5). We showed that the proposed receivers can adapt to a wide range of interference settings, but the myriad filter that do not adapt well to a decrease in impulsiveness.

In the rest of the paper we use the following notation: a bold letter (for instance \(\mathbf {Y}\), \(\mathbf {h}\)) refers to a vector ; if not bold (for instance sYh), it refers to a scalar. A random vector is an uppercase bold letter (\(\mathbf {Y}\)) when a lowercase bold letter is a specific realization (\(\mathbf {y}\)). \(\mathbb {P}_{\mathbf {Y}}(\mathbf {y}|s;\mathbf {h})\) refers to the probability of the event \(\mathbf {Y}=\mathbf {y}\) knowing s and \(\mathbf {h}\). For a continuous random variable it will be the probability density function denoted as \(f_{\mathbf {Y}}( \mathbf {y})\). \(\hat{s}\) is the estimated value of s.

\(\mathbf {Y}\) refers to the received vector, \(\mathbf {h}\) to the channel realization, K is the number of repetitions of the transmitted bit, s is the transmitted information bit, \(\mathbf {I}\) is the interference vector ans \(\mathbf {N}\) is the thermal noise vector. Each of the previously mentioned vector is of dimension \(K\times 1\).

3 System model, interference modeling and receiver review

3.1 System model

For a single transmitted symbol, the received signal \(\mathbf {Y}\in \mathbb {R}^{K}\) is:

$$\begin{aligned} \mathbf {Y}=s\mathbf {h}+\mathbf {I}+\mathbf {N}, \end{aligned}$$
(1)

where s is the unknown transmitted symbol, \(\mathbf {h}\in \mathbb {R}^{K}\) is the block fading channel coefficients, \(\mathbf {I}\in \mathbb {R}^{K}\) is the interference and \(\mathbf {N}\in \mathbb {R}^{K}\) is the thermal noise with its elements \(N_{k}{\mathop {\sim }\limits ^{\text {i.i.d.}}} \mathcal {N}(0,\sigma ^2)\).

The optimal receiver in terms of minimizing the Bit Error Rate (BER) is the Maximum Likelihood (ML) detector. It is given by the solution to the following optimization problem:

$$\begin{aligned} \widehat{s}= {\mathop {\hbox {arg max}}\limits _{s \in \Omega }} \mathbb {P}_{\mathbf {Y}}(\mathbf {y}|s;\mathbf {h}) ={\mathop {\hbox {arg max}}\limits _{s \in \Omega }} \sum _{k=1}^{K} \log \mathbb {P}_{Y_k}(y|s;h_k), \end{aligned}$$
(2)

the second equality assuming independent noise samples.

Calculating (2) requires the evaluation of the measure \(\mathbb {P}_{\mathbf {Y}}\left( \mathbf {y}|s;\mathbf {h}\right)\). In a general approach, this involves several steps: (a) specify the representation of the impulsive noise \(\mathbf {I}\), either by its characteristic function (CF) or distribution function (when it exists in closed form); (b) if \(\mathbf {I}\) is known only through its CF (like for \(\alpha\)-stable distributions), find its Probability Density Function (PDF) through the Fourier transform; (c) calculate the PDF of the total interference \(I_k+N_k\), via a convolution:

$$\begin{aligned} f_{I_k+N_k}\left( \zeta \right) = \frac{1}{2\pi } \int _{-\infty }^{\infty } f_N\left( \tau \right) \int _{-\infty }^{\infty } \varphi _{I_k}\left( t\right) e^{-i \left( \zeta -\tau \right) t} \text {d}t \text {d}\tau , \;\;\forall k \in \left\{ 1,\ldots ,K\right\} ; \end{aligned}$$
(3)

(d) conditional on the channel state information, find the likelihood function as a function of s denoted by \(\mathbb {P}_{\mathbf {Y}}\left( \mathbf {y}|s;\mathbf {h}\right)\) and choose s that maximizes the likelihood.

The description of these different steps serves to highlight the difficulties one can encounter when designing a receiver. Firstly, specifying the PDF of the interference can simply be a priori impossible because the transmission environment is not predictable. Secondly complexity can be an important issue when deriving the likelihood, for example with Middleton or \(\alpha\)-stable PDF. This challenges how one approaches receiver design.

We consider the binary case only and make the following assumptions:

  1. 1

    The unknown transmitted symbol, s, is defined on a discrete support \(\Omega =\left\{ -1,1\right\}\) with equally likely elements to be transmitted.

  2. 2

    The block fading channel coefficients define a random vector (RV) denoted by \(\mathbf {h}\in \mathbb {R}^{K}\). The distribution of the coefficients depends on the considered channel model (e.g. Rayleigh, Nakagami, Rician etc.). We assume perfect channel state information at the receiver.

  3. 3

    The impulsive interference is denoted by a RV \(\mathbf {I}\in \mathbb {R}^{K}\) in which all elements are assumed independent and identically distributed (i.i.d.). This assumption is verified in some settings [26] but is an open discussion and can depend on the scenario considered [27, 28]. The physical layer and signal processing, like discussed in [29] for the passband-to-baseband conversion, can lead to different dependence structure. Treating the dependent case, however, remains out of the scope of this paper.

  4. 4

    The thermal noise at the receiver is a RV \(\mathbf {N}\in \mathbb {R}^{K}\) in which all elements are assumed i.i.d. with a Gaussian distribution, \(N_{k}{\mathop {\sim }\limits ^{\text {i.i.d.}}} \mathcal {N}(0,\sigma ^2)\).

  5. 5

    The interference is independent of the thermal noise, i.e., \(\mathbf {I}\bot \mathbf {N}\).

With these assumptions, the ML detector in (2) is given by:

$$\begin{aligned} \sum \limits _{k=1}^{K}\log \frac{\mathbb {P}_{Y_k}(y| s=1,h_k)}{\mathbb {P}_{Y_k}(y| s=-1,h_k)} \overset{\widehat{s} = 1}{\underset{\widehat{s} =-1}{\gtrless }} 0. \end{aligned}$$
(4)

3.2 Standard interference modeling

In many previous papers, it has been shown that the interference term is not adequately modelled with a simple Gaussian distribution assumption. We present here some of the key results in this regard that we summarize in Table 1.

Table 1 Different interference models

3.2.1 Middleton model

We can trace back some works on non Gaussian noise to 1960 [30] and 1972 [31] about atmospheric noise. Assuming Poisson distributed sources, the CF of the impulsive noise can be obtained. Furthermore, appropriate assumptions on the transmission medium and source waveforms allow one to obtain the interference PDF. A similar approach based on the CF was used by Middleton [32, 33] who obtained more general expressions based on series expansions. He classified interference in two main categories depending if the noise bandwidth is less than the useful signal (class A) or greater (class B). Class C is a sum of class A and B.

Middleton models have been widely used in different contexts [34, 35]. It is clear however that this popular model is challenging to work with in receiver design since the density function involves infinite sums. Furthermore, for the class B, the alternating sign of the series of summands make truncation challenging to ensure the truncated representation is still a positive quantity for probability calculations. Besides, the individual summand terms can become for large indexes challenging computationally to evaluate, hence not easily computable online in real receiver settings. Consequently, several approximation models have been proposed. The main approach is to consider only the most significant terms. For instance, it is claimed in [36] that, in many situations for the class A, two or three terms can be sufficient to obtain a good approximation leading to a Gaussian mixture [37]. Moreover, in a different context but relevant for how interference characterization in Sect. 3.3, it is mentioned in [38] that a Gaussian mixture can capture multi-modality, asymmetry, heavy tails, which makes it an appealing solution. The two terms case is often denoted as the \(\epsilon\)-contaminated noise, see [35]. In this case the interference PDF is \(\mathbb {P}(x)=(1-p)\mathcal {N}\left( 0,\sigma ^2\right) +p\mathcal {N}\left( 0,\kappa \sigma ^2\right)\), where p denotes the probability to have an impulse, distributed from a Normal with variance \(\kappa \sigma ^2\) while \((1-p)\) gives the probability to only have the Gaussian noise with variance \(\sigma ^2\). Usually, p is small (\(p=0.01\)) and \(\kappa\) large (\(\kappa =50, 100\)). The \(\epsilon\)-contaminated model can also be expressed in the form of a Bernoulli–Gaussian noise [39, 40]. Noise plus interference is expressed as \(n+bi\), where n is the Gaussian noise, always present, and b a Bernoulli random variable with parameter \(p=\mathbb {P}(b=1)\) representing the frequency of impulsive noise i occurrence. Usually, i is represented by a Gaussian random variable with a larger variance than n.

In [41,42,43], the class A model is represented by a Markov process: the noise distribution depends on the state of the process. It reduces to the \(\epsilon\)-contaminated case when only two states are present, but with an additional feature of time dependence structure, see [44].

The popular Class B model can be approximated by an \(\alpha\)-stable distribution [33], still difficult to use in practice but that we will introduce in Sect. 3.2.3.

3.2.2 Empirical approaches

More recently, many works have been done concerning Time Hopping Ultra Wide Band (TH-UWB) [45]. After showing that the standard Gaussian model is not accurate [46], non Gaussian models were developed. To specify the representation of the impulsive noise \(\mathbf {I}\) for TH-UWB, Forouzan et al. [47] have studied the perfect power control case, synchronized or unsynchronized, and derived a tractable expression for the total interference PDF. To do so, they approximated the interference generated by one user. Sabattini et al. [48] have considered the CF. These works do not solve the complexity issues and remain very specific to the studied cases. Durisi and Benedetto [49] have simplified the analysis, only considering the moments to derive the error probability. However, this does not allow an efficient receiver design. Many works have also proposed empirical choices that allow analytical analysis of the receiver, justified by simulations, observations of the estimated PDF and/or gains in BER. The main solutions that have been proposed include Gaussian–Laplace mixture [50], Generalized Gaussian [51,52,53], Gaussian mixtures [54] or Cauchy-Gaussian mixture [55]. In this last paper it is mentioned that the heavier tail of the Gaussian Mixture allows better performance than the Laplace approach. Some surveys can be found in [56, 57].

All these approaches target a specific class of interference and are not supposed to be robust or adaptive to changing interference environments. Another class of model of direct relevance to interference modelling is the \(\alpha\)-stable. It has often been used in the UWB context [17, 56, 58,59,60,61]. But on the contrary to the previously discussed approaches, it relies (when no power control is done) on a theoretical derivation (that can be related to a physical interpretation), closely linked to the Middleton’s work and finding its foundation in stochastic geometry [62,63,64].

3.2.3 Stochastic geometry and \(\alpha\)-stable

Although the first papers were published in the nineties [65,66,67], the analysis of networks has recently attracted a lot of works relying on stochastic geometry. As in Middleton’s work, interferers are assumed spatially distributed according to a Poisson field. In this context, the distribution of interference is expressed as

$$\begin{aligned} I=\sum _{i \in \Omega } l(d_i).\mathcal {Q}_i \end{aligned}$$
(5)

where \(d_i\) is the distance between interferer i and the destination and l(d) the attenuation as a function of the distance; a classical model is \(l_{\gamma ,\epsilon }(d)=d^{-\gamma }\mathrm {1}_{r\ge \epsilon }, d\in \mathbb {R}^+\) where \(\gamma\) is the channel attenuation coefficient; \(\epsilon\) accounts for a minimum distance between the receiver and the transmitter for physical reasons or due to some MAC layer protocol like carrier sensing; \(Q_i\) accommodates various propagation effects such as multipath fading and shadowing as well as the physical layer of the transmitters and the receiver; and \(\Omega\) is the set of interferers.

If applied in an ad hoc network, an unbounded received power assumption makes the interference fall in the attraction domain of a stable law. This unbounded assumption means taking the limit as \(\epsilon \rightarrow 0\); in that case the received power tends to infinity when d tends towards zero. The accuracy of the approximation has been questioned in [68, 69], but working without the unbounded received power assumption does not allow an analytical derivation of the characteristic function [64, 70]. A truncated \(\alpha\)-stable distribution is proposed in [13, 71] to solve the infinite variance problem.

This result can be seen as a consequence of the generalized central limit theorem [72, 73]. The main advantage of the heavy tailed stable distributions is their ability to represent rare events. In many communication situations, these events are in fact those that will limit the system performance. The traditional Gaussian distribution ignores them leading to poor results.

The proof of this result is generally done considering the log-CF of the total interference, see for instance [17, 65, 74], which can be written as:

$$\begin{aligned} \psi _I\left( \omega \right) =\log \left( \mathbb {E}\left[ e^{j\omega ^T I}\right] \right) =-\delta ^{\alpha } \left| \omega \right| ^{\alpha }, \end{aligned}$$
(6)

where I is the total interference and T denotes the transpose. The right term is the log-characteristic function of a symmetric \(\alpha\)-stable (S\(\alpha\)S) random variable with dispersion \(\delta\). Another solution for the proof, based on the Lepage series, was proposed in [67].

This area of research is still active. Problems concerning the non homogeneous position of users are studied, for instance based on cluster point process [75, 76] for general ad hoc networks or Poisson hole process for cognitive radio [77]. The dependence structure of interference is also attracting many works [78,79,80]: it is an important feature for the network analysis but difficult to handle. Mahmood et al. studied the dependence structure at the baseband between two \(\alpha\)-stable interference sample [29, 81] and showed that with proper sampling they could be made independent.

If the proposed framework offers an efficient tool for the network performance evaluation, a simple (with a tractable expression) and accurate model is still to be found [82]. It is probably unrealistic anyway to believe that one simple model will be able to cover all the possible situations. Therefore if we aim to design a robust receiver, we need it to adapt to the context and the changing interference environments that may be faced over space or time.

3.3 Impusive interference modelling under the unified family of the sub-exponential models

The previous discussions on background literature have detailed specific examples of impulsive interference models. Unifying these different concepts in a general class can help communication strategies, which are flexible and can adapt to a wide range of interference environments. In this section we propose a general class of mathematical models for impulsive interference which encompasses examples discussed previously: the sub-exponential family, extended to the entire real line (not only \(\mathbb {R}^+\)). In [12], interference distributions are classified in superexponentially, exponentially or subexponentially decaying tails to explain the reason why a large deviation can appear in the total interference: due to many small contributions or a single large one. Similarly, Weber et al. [83] justify the tightness of a lower bound on the transmission capacity in an ad hoc network, using the fact that a sum of iid random variables typically achieve large values due to one or more large summands rather than a large number of moderate value summands; such observations are aligned naturally with the property of distributions in the sub-exponential class of interference models.

A way to characterize impulsive interference is via considering probability distributions whose tails are not exponentially bounded: that is, they have heavier tails than the exponential distribution. Indeed, in impulsive interference we can observe large values that rarely appear. Such a behavior can be accurately represented with a so-called heavy tailed distribution. It is useful to relate this class of distributions to the behaviour of the moment generating function (MGF) as one often considers heavy tailed models as those with non-finite mean or variance or higher order moments. In doing so, we see that an interference distribution which is heavy-tailed under this characterization will have a MGF that is finite in some right neighborhood of the origin if and only if the following bound on the complementary cumulative distribution function \(\overline{F}(x)=\mathbb {P}(X>x)\) holds for some positive real numbers M and t,

$$\begin{aligned} \overline{F}(x) \le M\exp (-tx), \; \forall x > 0. \end{aligned}$$
(7)

Clearly, this links the moment existence directly to the tail behaviour. Hence, one may characterize heavy tailed distributions or processes with impulsive realizations either as families which have infinite mean or variance. Or equivalently, via (7), as those distributions which have tails which fail to satisfy this bound for some positive constant M.

For instance some of the interference models discussed in Sect. 3.2 (such as the Middleton or the \(\alpha\)-stable) can be characterized as sub-families of the sub-exponential class on the entire real line. The knowledge of the properties of this class of distributions will allow us to get insight on how one can design receivers that will be robust to a wide range of interference settings.

We denote this sub-exponential class according to the general notation \(\mathcal {F}\) (see the original characterization in [84]). This family of heavy tailed distributions has played an important role in many areas of science such as branching phenomena for positive random variables in [85] and insurance contexts in [86]. Here, we introduce it as an over-arching model framework for understanding different types of impulsive interference models in wireless communications, where existing models previously discussed can be considered as subfamilies in \(\mathcal {F}\).

The original specification of the \(\mathcal {F}\) class of interference distributions involved distributions F with support \(F:\mathbb {R}^+ \mapsto [0,1]\) and is given by Definition 1.

Definition 1

(Sub-exponential Impulsive Noise [87]) The sub-exponential family of distributions defines a class of heavy tailed severity models that satisfy the limits

$$\begin{aligned} \lim _{x \rightarrow \infty } \frac{1-F^{n\star }(x)}{1-F(x)}=n, \end{aligned}$$
(8)

if and only if,

$$\begin{aligned} \lim _{x \rightarrow \infty } \frac{1-F^{2\star }(x)}{1-F(x)}=2, \end{aligned}$$
(9)

where \(F^{n\star }(x)\) is the n-fold convolution of distribution F with itself.

It was shown by [88] that a distribution is a member of this class \((F \in \mathcal {F})\) if and only if it is long-tailed, i.e., it satisfies

$$\begin{aligned} \lim _{x \rightarrow \infty }\frac{1 - F(x+y)}{1 - F(x)} = 1, \; \forall y \in \mathbb {R}^+ \end{aligned}$$
(10)

The extension of the family of sub-exponential distributions to the entire real-line is required for wireless communications applications. This extension is a relatively recent result, see [89, Section 3.2], therefore we believe it will be highly informative for the wireless communications audience to have these results briefly brought to consideration. In particular it can be shown that an interference model is sub-exponential on the entire real line, denoted by \(F \in \mathcal {F}_{\mathbb {R}}\), if and only if it satisfies that \(F \in \mathcal {F}\) and F is long-tailed on \(\mathbb {R}\) and therefore satisfies (10) and finally that given independent \(I \sim G_1\) and \(N \sim G_2\) with \(G_i = O(F(x))\) as \(x \rightarrow \infty\) then one has the total interference in the tails given by

$$\begin{aligned} \mathbb {P} \left[ I + N> x, I> g(x), N > g(x)\right] = o\left( \overline{F}(x)\right) , \; as \; x \rightarrow \infty \end{aligned}$$
(11)

where g(x) is a function that satisfies that \(g(x) \rightarrow \infty\) as \(x \rightarrow \infty\) and O(.) and o(.) are the big-Oh and little-Oh Landau notations.

To understand how such a general characterization of all interference models can be interpreted and becomes practically useful for things like receiver design, consider the following property: consider the noise plus interference distribution in (3) required for receiver design. The impulsive noise term I has a distribution \(F_I\) in the sub-exponential class. It can be shown that it dominates the Gaussian thermal noise N, with distribution \(F_N\), in the tails. Therefore, one can avoid to calculate any complicated convolutions and instead work with approximation of the heavy tailed interference. Put another way, if one considers the distribution of the maximum, for sub-exponential models one obtains

$$\begin{aligned} \mathbb {P}\left( \max \left\{ I+ N\right\} > x\right) = \overline{F}_I(x)\overline{F}_N(x) \sim 2 \overline{F}_I(x), \; \mathrm{as} \; x \rightarrow \infty . \end{aligned}$$
(12)

where \(\sim\) denotes the asymptotic equivalence between the distributions. The equivalent result can be obtained for the minimum also, i.e., the left tail. This property implies that the partial sum is likely to get large when one of the random variables gets large. Importantly, for receiver design such a result tells us that asymptotically the interference distribution dominates so that we need to design receivers flexible enough to adapt to the interference tail behaviour, when receivers based on the Gaussian model are not producing acceptable performance in the presence of impulsive noise because they do not handle the tail behaviour characteristic; this remark is general for all sub-exponential models.

Considering this general overarching characterization of impulsive interference models, we can state that a simple Gaussian approximation for the receiver design will fail to capture the tail behavior and, consequently, will not perform efficiently in practice. We therefore conclude that we must consider a new paradigm for receiver design if we truly wish to have a receiver strategy that is flexible enough to accommodate a variety of different impulsive noise environments and to be adaptive enough to work efficiently in all situations.

3.4 Receiver design

When it comes to receiver design, the first observation is the poor behaviour obtained by the linear receiver, which is optimal in a Gaussian noise but highly suboptimal in other interference settings. The second observation is the difficulty in developing an optimal receiver. One reason is the variety of proposed interference models: which model should I design my receiver for and how will it perform if my environment changes? If empirical models, chosen to offer analytical solutions, are attractive, their ability to adapt to different contexts is to be proven. Another reason is that implementing a receiver can be complex for some specific interference distributions, for instance with the infinite series from Middleton’s model, stochastic geometry or the absence of closed-form \(\alpha\)-stable PDF.

3.4.1 Impact of impulsiveness on the optimal decision

An efficient way to characterize and understand the influence of impulsive noise is to visualize the impact of the non linearities by representing the decision regions. This was proposed by Saaifan and Henkel [90] for the Middleton class A case and by Shehat et al. [91] and by Saleh et al. [92] for the \(\alpha\)-stable case.

We represent in Fig. 1 four different examples of noise realizations. Then we show in Fig. 2 the decision regions that the optimal receiver must produce in a binary case under each of the different models, i.e., the regions that maximize the probability of having transmitted s when \(\mathbf {Y}=(y_1,y_2)\) is received.

Fig. 1
figure 1

Realisation examples for different noise processes. The following parameters were used in each case: Gaussian case (\(\mu =0\) and \(\sigma ^2=0.2\)); \(\alpha\)-stable (\(\alpha =1.5\), \(\gamma =0.1\)); \(\epsilon\)-contaminated case (\(\epsilon =0.01\), \(\kappa =100\), \(\sigma ^2=0.2\)); sum of Gaussian and \(\alpha\)-stable in a moderately impulsive case (\(\alpha =1.5\), \(\gamma =0.1\) and \(\sigma ^2=0.2\) (\(\mathrm{NIR}=0\)))

Fig. 2
figure 2

Optimal decision regions for the different noise processes. We follow the framework proposed in [92] and use the same parameters defined in Fig. 1: the received vector \(\mathbf {Y}\) is composed of two received samples (two dimensions, \(\mathbf {Y}= \left[ y_1 \;y_2\right]\)), the wireless channel is set to \(\mathbf {h}=\left[ 1 \; 1\right]\), and we consider two possible transmitted values (ie. \(\Omega =\{-1,1\}\)). The areas in black correspond to a decision \(\hat{s}=+1\), the areas in white to \(\hat{s}=-1\)

The Generalized Gaussian distribution, when the shape parameter is less than 1, is sub-exponential in nature. The Mixture of Gaussians, including the \(\epsilon\)-contaminated, are not strictly sub-exponential. However, as noted in [93] one can approximate for instance an \(\alpha\)-stable sub-exponential interference model to an arbitrary accuracy over any tail probabilities, eventually with enough Gaussian mixture components. It is in this context that we consider such models as “impulsive”. The \(\alpha\)-stable distributions belong to the sub-exponential family.

It is well known that the optimal decision regions are linearly separated under interference with exponential tail decay, such as the Gaussian case shown in Fig. 2. However, the optimal decision regions under heavy tailed sub-exponential interference produce non-linear frontiers and disjoint regions, as seen with the \(\alpha\)-stable noise. We can identify two operating regions: for small received values \(y_1, y_2\), boundaries are linear. However, when at least one value becomes larger, linear boundaries completely fail to recover the most likely transmitted symbol. The point at which this non-linearities appear is linked to the heaviness of the tail: the heavier it is, the more reduced the linear frontiers are, since the sub-exponential tail asymptotic is dominant sooner.

In the \(\epsilon\)-contaminated case, we see that for large values, the exponential tail makes the decision boundary become linear again. However, the impulses generated by the rare but large variance Gaussian component in the noise distribution create a non linear area; very similar to the \(\alpha\)-stable case.

Finally, in the \(\alpha\)-stable and Gaussian mixture, the heavy-tailed interference noise dominates the light tailed Gaussian thermal noise in extremes and dictates the extent of the non linearity in the decision boundaries, considerably increasing the complexity of the optimal receiver design.

3.4.2 Overview of receiver strategies

In the following we do not try to be exhaustive about the existing receiver strategies but we propose to classify the different receiver design approaches into three categories, see Table 2.

Table 2 Receiver strategies discussed in this paper

3.4.3 Linear approaches

Evaluating the LLR with a Gaussian noise assumption results in a linear operation for detection. We primarily consider this choice for its simple implementation structure (and also as a reference), though it is known to perform poorly in impulsive situations. Maximum Ratio Combining maximizes the Signal to Noise Ratio in Gaussian noise. Johnson [94] proposes a general study of linear optimal receivers in non Gaussian noise and takes the specific example of \(\alpha\)-stable noise. This is further studied for a rake receiver in [14, 95] and for diversity combining schemes in a multi-antenna receiver in [96] in presence of symmetric \(\alpha\)-stable interference. However we found that the improvement over the standard linear approach is very limited and we have therefore omitted the corresponding BER curves in Sect. 5.

3.4.4 Noise distribution approximation

Another way to solve (4) is to find a distribution that would approximate well the true noise plus interference PDF \(f_{I+N}(.)\) with an analytical expression and parameters that can be simply estimated. If I is sub-exponential and N Gaussian, I will dominate N, at least in the tails, so that it is important to increase the heaviness of the tail and several ways have been proposed to do so. Erseghe et al. used a Gaussian mixture for UWB communications [97]. In [98], the \(\epsilon\)-contaminated is used to study the impact of impulsive noise on Parity Check Codes. The importance to take the real noise model into account during the decoding is underlined. A review in the UWB case can be found in [56]. For instance Fiorina [51] proposed a receiver based on a generalized Gaussian distribution approximation. Beaulieu and Niranjayan [50] considered a mixture of Laplacian and Gaussian noise. The Cauchy model, based on a sub-exponential distribution, is proposed in [17]. Each solution is shown to significantly improve the performance in their specific context. We can wonder how robust they will be in case of a model mismatch.

In this paper, we propose two receivers based on this approach and taking into a account the sub-exponentional nature of the impulsive noise, which means our choices are able to capture the heaviness characteristic of the noise distribution. The Myriad receiver [20, 99] is an improved version of the Cauchy receiver [17] for \(\alpha \ne 1\) or a mixture of stable and Gaussian interference; as a complement to the work started in [23], we also propose the use of NIG distributions. It is a flexible family of distributions that contains as limiting cases both the Myriad filters and standard linear Gaussian receiver.

Myriad receiver

This receiver is based on Cauchy distributions, which are a special case of S\(\alpha\)S distributions that have an explicit PDF expression with dispersion \(\gamma\) and median \(\mu\):

$$\begin{aligned} f_{1}(x)=\frac{\gamma }{\pi [\gamma ^2+(x-\mu )^2]}. \end{aligned}$$
(13)

To improve the adaptability of a receiver based on the Cauchy distribution, the myriad filters have been discussed in [20, 92, 99]. They are based on the Cauchy density but with a modified dispersion parameter \(\kappa\) replacing \(\gamma\) in (13) so that the decision rule becomes:

$$\begin{aligned} \sum _{k=1}^{K}\log \frac{\kappa ^2+(y_k+h_k )^2}{\kappa ^2+(y_k-h_k )^2} \overset{\widehat{s} = 1}{\underset{\widehat{s} =-1}{\gtrless }} 0. \end{aligned}$$
(14)

The so called “linearity parameter” \(\kappa\) was firstly used to adapt the receiver to interference with an \(\alpha\)-stable distribution for \(\alpha \ne 1\). We discuss the estimation of \(\kappa\) in Sect. 4.2.

Normal Inverse Gaussian receiver family

We propose the family of receivers specified by the Normal-inverse-Gaussian distributions (details about these distributions are given in “Appendix”). We implement a Symmetric NIG receiver, presented in details in Sect. 4.1. The NIG distribution is denoted \(f_{\mathrm {NIG}}(x;\alpha ,\beta , \mu , \delta )\). We note that extension of the receiver can easily be developed for asymmetric cases.

3.4.5 LLR inspired solutions

When noise is impulsive with a sub-exponential distribution, the optimal LLR is no longer an monotonic increasing function but tends to reduce the weight of large values in the decision, as shown in [19] in the case of \(\alpha\)-stable distributions. It means that we should not trust large positive or negative received values, contrary to the decision weight that the linear receiver would attribute. This is illustrated in Fig. 3, which represents the LLR as a function of the received value for the four previously described noise settings.

Fig. 3
figure 3

LLR for the different noise processes. Gaussian case (\(\mu =0\) and \(\sigma ^2=0.2\)); \(\alpha\)-stable (\(\alpha =1.5\), \(\gamma =0.1\)); \(\epsilon\)-contaminated case (\(\epsilon =0.01\), \(\kappa =100\), \(\sigma ^2=0.2\)); sum of Gaussian and \(\alpha\)-stable in a moderately impulsive case (\(\alpha =1.5\), \(\gamma =0.1\) and \(\sigma ^2=0.2\) (\(NIR=0\)))

Except for the Gaussian noise whose LLR is a linear function, the three other cases reaches a maximum and then decrease and tends towards zero. Once again we notice the strong resemblance between the pure \(\alpha\)-stable and the mixture with the Gaussian noise, curves being nearly identical when superimposed on each other.

This idea leads to a modification of the LLR function and classical examples are the soft limiter and the hole puncher [66, 73, 92, 100, 101]. For small received samples, a linear function is used and for large samples, respectively, a constant value or a zero are used as output of the LLR function. Another approximation is given by:

$$\begin{aligned} \mathrm{LLR}(y)=\text {sign}\left( y\right) \min \left( a\left| y\right| ,\frac{b}{\left| y\right| }\right) \end{aligned}$$
(15)

where \(\text {sign}(x)\) is the sign of x. It was proposed in [19] for Low Density Parity Check codes. The model fits the linear part of the LLR for small values of x and the 1/x approximation is inspired from the limit of the likelihood ratio for high values of x in the \(\alpha\)-stable case. Parameters a and b are estimated with different methods. Good results are obtained in \(\alpha\)-stable and Middleton class A interferences.

Other works for weak signal detection approximate the function \(f'_{I+N}(.)/f_{I+N}(.)\) where \(f'(.)\) is the derivative of f(.). Zozor et al. [102] for instance used a polynomial approximation of the function. Spaulding and Middleton [103, 104] proposed optimal and suboptimal strategies for coherent and non coherent detection in Middleton Noises. In the coherent case, the optimal detector necessitates to evaluate a ratio of infinite sums, too complex to be implemented. A locally optimum detector is proposed, using a series expansion for small signal. It results in applying a logarithm to the received signal followed by the linear operation.

Another way to analyse detection is to consider that the likelihood measures a distance between the received signal and the possible transmitted signals. Optimal in Gaussian noise, the Euclidean distance is not adapted to the impulsive case. To improve the performance, a solution is then to modify this metric and to use the p-norm, which is a distance measurement in \(\alpha\)-stable situations with \(p<\alpha\), see [105],

$$\begin{aligned} ||X-Y||_\alpha = \left\{ \begin{array}{ll} {[}\mathbb {E}|X-Y|^p/C(\alpha , p)]^{1/p}, &{} 1 \le \alpha \le 2,\\ {[}\mathbb {E}|X-Y|^p/C(\alpha , p)]^{\alpha /p}, &{} 0< \alpha < 1, \end{array}\right. \end{aligned}$$
(16)

where \(C(\alpha ,p)=\frac{2^{p+1}\Gamma ((p+1)/2)\Gamma (-p/\alpha )}{\alpha \sqrt{\pi }\Gamma (-p/2)}\), and \(\Gamma (.)\) is the gamma function. In [106], an interference suppression scheme for DS-CDMA systems in the presence of additive S\(\alpha\)S interference is proposed based on the \(L_p\)-norm instead of the standard Least Mean Square based on the \(L_2\)-norm.

This expression is of interest as it does not depend on any estimation of distribution parameters and a rough knowledge of \(\alpha\) can be sufficient if the condition \(0<p<\alpha\) is fulfilled. We can therefore utilize the p-norm metric in our decision statistic as,

$$\begin{aligned} \Lambda _{p}\left( \mathbf {Y}\right) = \sum \limits _{k=1}^{K} \left( \left| y_k+h_k \right| ^p - \left| y_k-h_k \right| ^p\right) \overset{\widehat{s} = 1}{\underset{\widehat{s} =-1}{\gtrless }} 0. \end{aligned}$$
(17)

We can notice that this metric would be optimal in a Generalized Gaussian noise.

We present in Fig. 4 the proposed approximations: p-norm, soft limiter and hole puncher and from (15).

Fig. 4
figure 4

Examples of approximated LLR

We see that the p-norm and the solution from (15) offer a wider flexibility. The p-norm can also mimic the linear case when \(p=2\). This aspect is confirmed in the performance evaluation that is why we are not going to represent the performance of the hole-puncher nor the soft-limiter.

4 Proposed robust receivers

In this section we first detail the NIG receiver and the necessary parameters’ estimation. We then propose estimation procedures for the parameters \(\kappa\) in the Myriad, p in the p-norm receivers and a and b for the LLR approximation.

4.1 Receiver based on the Normal Inverse Gaussian approximation

In order to develop a flexible receiver that can accommodate high performance in a wide variety of impulsive interference environments, as characterized by the sub-exponential family, we need a receiver which has three practical characteristics: (1) it should have heavy tailed properties commensurate with the sub-exponential characterization in Sect. 3.3; (2) it should be easy to perform online real time estimation the receiver parameters; and (3) wide range of skew-kurtosis property for the density. We will show below that the family of distributions known as the NIG model has these three desirable characteristics.

In particular, estimation via Method of Moments is trivially achieved in general for NIG models if one restricts to a subfamily of the NIG distributions, through constraining on the existence of the first four cumulants [107] (see “Appendix”, (24)–(27) for the moment expression). The expressions for the parameters of the NIG distribution are then given in (18).

Method of moments closed form parameter estimation for NIG models Given i.i.d. distributed NIG\((\alpha , \beta , \mu , \delta )\) random variables, the sample mean, variance, skewness and excess kurtosis, denoted by \(\hat{\mathcal {M}}\), \(\hat{\mathcal {V}}\), \(\hat{\mathcal {S}}\) and \(\hat{\mathcal {K}}\) respectively can be utilized to estimate the model parameters with a constraint imposed. Assume that the following constraint applies to the kurtosis \(3\hat{\mathcal {K}}>5\) and the skewness \(\hat{\mathcal {S}}^2>0\), then the method of moments estimators for the parameters are given by

$$\begin{aligned}&\hat{\alpha } = 3\hat{\rho }^{1/2}(\hat{\rho }-1)^{-1}\hat{\mathcal {V}}^{-1/2}|\hat{\mathcal {S}}|^{-1}, \\&\hat{\beta } = 3(\hat{\rho }-1)^{-1}\hat{\mathcal {V}}^{-1/2}\hat{\mathcal {S}}^{-1}, \\&\hat{\mu } = \hat{\mathcal {M}}-3\hat{\rho }^{-1}\hat{\mathcal {V}}^{1/2}\hat{\mathcal {S}}^{-1}, \\&\hat{\delta } = 3\hat{\rho }^{-1}(\hat{\rho }-1)^{1/2}\hat{\mathcal {V}}^{1/2}|\hat{\mathcal {S}}|^{-1}, \end{aligned}$$
(18)

where \(\hat{\rho } = 3\hat{\mathcal {K}}\hat{\mathcal {S}}^{-2} - 4 > 1\).

We can further simplify these expressions for the Symmetric case (\(\beta =\mu =0\)). This results in simpler parameter estimators given by \(\hat{\alpha }= \sqrt{3}\hat{\mathcal {V}}^{-1/2}\hat{\mathcal {K}}^{-1/2}\) and \(\hat{\delta }= \sqrt{3}\hat{\mathcal {V}}^{1/2}\hat{\mathcal {K}}^{-1/2}\).

Remark 1

We note that special care has to be taken due to the high order moment calculation, especially in the illustration we take involving stable distribution for the true impulsive interference distribution. To ensure the validity of the obtained parameters, the training data has to respect some restrictions. Another way is to reduce the impact of large samples in the training sequence by a soft thresholding method known widely in statistics as tempering the empirical distribution of the data before calculating the moments. This can also be known as exponential tilting and it ensures the approximate NIG receiver model is always well defined, see discussions in [108].

To illustrate how flexible the proposed NIG receiver behaves in an impulsive noise environment, we plot in Fig. 5 the decision regions as in Sect. 3.2, considering the maximisation problem in (2) with the density \(f_{\mathrm {NIG}}(x;\alpha ,0,0,\delta )\) given in (22).

Fig. 5
figure 5

LLR and decision regions for the NIG receiver when \(\alpha =0.3, \delta =0.5\) or \(\alpha =2.5, \delta =5\) (\(\beta =\mu =0\))

We notice that the impact of impulsiveness is well taken into account and modifying the parameters will allow to adjust the “linear part” of the receiver. We can expect that this receiver will be able to adjust to different impulsiveness degrees approximating well a wide variety of sub-exponential impulsive noise models, such as those illustrated in Fig. 1.

4.2 Estimation steps for the Myriad filter

The myriad filter relies on one parameter \(\kappa\). An empirical estimator \(\left(\hat{\kappa }_{\alpha }=\sqrt{\frac{\alpha }{2-\alpha }}\gamma ^{1/\alpha }\right)\) was developed in [20] for an \(\alpha\)-stable noise. It was further modified by Niranjayan and Beaulieu [99] in the case of a sum of \(\alpha\)-stable and Gaussian noises. However, these solutions necessitate to estimate the noise parameters which is not trivial. Consequently we have chosen to directly estimate \(\kappa\). This can be done by maximizing the LLR \(\lambda _0\) given by (we consider the case of a symmetric distribution so that \(\mu =0\)):

$$\begin{aligned} \lambda _0&=\log f_{I+N}(x)=\sum _{i=1}^N\log (f_{I+N}(x_i)) \\&=\sum _{i=1}^N\log \left( \frac{\kappa }{\pi [\kappa ^2+x^2]}\right) . \end{aligned}$$
(19)

where \(x=(x_1, x_2, \ldots , x_N)\) are the i.i.d thermal noise plus interference samples (\(x_i=N_i+I_i\)) which can be obtained when the source is silent. \(\kappa\) can be obtained through the derivative by solving:

$$\begin{aligned} \frac{\mathrm{d}\lambda _0}{\mathrm{d}\kappa }=0 \; \Leftrightarrow \; \sum _{i=1}^N\left( \frac{\kappa ^2}{x_i^2+\kappa ^2}\right) -\frac{N}{2}=0, \end{aligned}$$
(20)

and \(\kappa ^2\) is simply obtained for instance via a simple univariate root search procedure.

4.3 Estimation steps for the p-norm

To adapt to different contexts, we propose to estimate p using a similar framework as for estimating the shape parameter of a generalized Gaussian distribution based on the maximum likelihood method [109]. We use a univariate root search procedure method to find the p value that verifies [110]:

$$\begin{aligned} 1+\frac{\psi (1/p)}{p}-\frac{\sum _{i=1}^N|x_i|^p\log |x_i|}{\sum _{i=1}^N|x_i|^p}+\frac{\log (\frac{p}{N}\sum _{i=1}^N|x_i|^p)}{p}=0, \end{aligned}$$
(21)

where \(\psi (.)\) is the digamma function. When the estimated p is larger than 2, we set it to 2.

4.4 Estimation for the LLR inspired approach

We use the approximation given in (15). We will estimate a and b based on a training sequence. We first estimate the probability density function of the noise using a classical kernel based approach. We then estimate the LLR directly by computing (4) using the density estimate. We cannot use the estimated LLR, \(\hat{LLR}(x)\), directly to make a decision because of the numerous numerical uncertainties. So we extract from \(\hat{LLR}(x)\) the two parameters a and b by considering linear approximations for small values to get a and for the inverse of the large values to get b. Defining what are the small and what are the large values remains tricky. We use the empirical rules that small values are \(x<h_i\) and large values are \(x>1.5h_i\) (where \(h_i\) is the channel attenuation). This leads to good results if we take care of problems due to the division and to the \(\log\) in (4). When noise is low and for short training sequences, we can still have problems to evaluate one of the two parameters due to missing values. In that case we choose an empirical value that we fixed at two.

If the proposed approach shows good results, it fails when the noise is too low giving a noise floor when bit error rate reaches approximately \(10^{-5}\). This could be improved with more efficient estimation steps.

5 Simulation results

An analytical evaluation of our framework is difficult because we want to be flexible on the noise model. Consequently we have preferred to perform extensive simulations to compare the performance of the proposed detection solutions.

The network configuration is set as follows: \(K=8\) repetitions are available at the destination. The channels are i.i.d. Rayleigh block fading, with a different coefficient per repetition. We study four representative cases, the same as presented in Fig. 1:

  1. 1

    A pure Gaussian case; it is important that the proposed receivers behave well when no impulsive noise is present.

  2. 2

    A pure \(\alpha\)-stable noise with \(\alpha =1.5\); this represents a highly impulsive situation and an interference limited regime where the Gaussian noise is negligible. This can be representative of Network interference as described in [27].

  3. 3

    A mixture of \(\alpha\)-stable and Gaussian noises with \(\alpha =1.5\) and the noise to interference ratio NIR\(=\sigma ^2/(2\gamma )=0\) dB; this represents a more complex situation with a noise whose density has no explicit form. It is a similar situation as the previous case but the contribution of both impulsive interference and Gaussian thermal noise are significant. The optimal receiver is based on the inverse Fourier transform of the characteristic function.

  4. 4

    \(\epsilon\)-contaminated noise with \(\epsilon =0.01\), \(\kappa =100\), reflecting rare but strong impulses (highly impulsive noise). This case is not strictly in the sub-Gaussian family and it is interesting to see how receivers will then behave. It is a simplification of the Middleton model thant can be used to model for impulsive noise caused by atmospheric man-made partial discharge, switching effect, electromagnetic interference [35].

We consider four receivers: Gaussian, Myriad, symmetric NIG, p-norm and LLR-approximation. They have been selected because they exhibit a good behaviour in the different situations.

In a first step we evaluate the performance of the estimation steps, before comparing the receiving strategies with the BER curves. When the noise involves an \(\alpha\)-stable impulsive interference, the BER is measured as a function of the inverse dispersion of the S\(\alpha\)S distributions (\(1/\gamma\)), since the increase of inverse dispersion indicates the decrease of the noise strength, reflecting the conventional signal-to-noise ratio. When the noise is purely Gaussian or \(\epsilon\)-contaminated, the SNR at the receiver is used for the x-axis. The number of training sequence for NIG, Myriad, p and LLR-approximation estimations is set to 200 bits per dimension, so 1600 bits.

5.1 Estimation

Estimation performance is good, even if it is difficult sometimes to evaluate because we do not know what the optimal values should be. So we mainly study the variability, given by the standard deviation, and the evolution of the BER as a function of the training sequence length. We only present results for the Gaussian and Stable mixture in Table 3 and similar tendency are obtained for the other noises.

  • p-norm receiver the estimator converges but tends to over estimate p when the training sequence is short and the estimation exhibits an important variability, which degrades the BER. A long training sequence is necessary to reach the optimal performance

  • Myriad receiver the estimator of \(\kappa\) is certainly the most robust one. The standard deviation of the estimated value is very low, even for short training sequences and the mimimum BER is rapidly reached.

  • NIG receiver values of the parameters, as well as the standard deviation, decrease when the training length increases. However the lower BER is reached for rather short training sequences (\(\sim 100\) bits) but increases with longer training sequences. This is due to the difficult estimation of the higher order moments in sub-exponential noises. Longer sequences increase the risk of restriction violation (see Remark 1) in the estimation process, inducing the error degradation.

  • LLR-approximation: It exhibits a large variability in the estimated parameters as the training sequence length increases. Long sequences are necessary to reach low BER. However, it is the one reaching the lowest BER. The estimation procedure in that case has to be optimized.

In the following, we take a long training sequence (1600 bits), ensuring the convergence of the algorithms. Shorter sequences may modify the optimal receiver choice. The noise approximations work better when the training sequence is short and rapidly exhibit good performance. The LLR approximations converge much slower but reaches better performance for long training sequence and, as seen in Fig. 8 attains the optimal performance.

Table 3 Estimated parameters in the mixture of Gaussian and α-stable noise (α = 1.5, γ = 0.3, σ2 = 0.6 (NIR = 0))

5.2 Performance in Gaussian noise

In Fig. 6, the linear combiner (maximum ratio combining) is the optimal receiver. The p-norm receiver reaches the same performance as the optimal one, meaning that in that case the estimation of p works well, always giving values close to 2, which corresponds to the optimal receiver. The values slightly less than two do not introduce errors and we have set to 2 estimated values larger than 2.

Fig. 6
figure 6

BER comparison of different receivers, Gaussian noise

The NIG and LLR approximation perform very close to the optimal. Only the Myriad receiver exhibits a slight degradation of the performance. This is naturally explained because it is based on a modified version of the Cauchy distribution [see (13) and (14)] and the receiver has difficulties to well behave in noises with exponential tails.

5.3 Performance in \(\alpha\)-stable noise

In Fig. 7, \(\alpha\) is set to 1.5, corresponding to a rather impulsive noise. All receivers perform well but the linear receiver, which exhibits a very significant performance degradation. This last solution is indeed badly affected by large, but rare, values. The four other proposals (p-norm, Myriad, NIG, LLR approximation) behave well and very close to the optimal solution.

Fig. 7
figure 7

BER comparison of different receivers, impulsive environment

5.4 Performance in a mixture of \(\alpha\)-stable and Gaussian noise

In Fig. 8, \(\alpha\) is set to 1.5 for network interference and NIR is 0 dB. This case includes both a sub-exponential type component and a more traditional thermal noise. Once again the linear receiver can not handle large received noise samples and its performance are significantly degraded.

Fig. 8
figure 8

BER comparison of different receivers, mixed stable and Gaussian environment

The four other solutions behave well, close again from the optimal. The LLR approximation is in this case very close to the optimal. In the LLR, the linear part corresponds to the Gaussian noise for small values and the 1/x part to the tails of the distribution which is dominated by the sub-exponential contribution.

We notice in the example that, as suggested by the discussion about (12), the sub-exponential component dictates the tail behaviour and it is important that the receiver takes this into account.

5.5 Performance in \(\epsilon\)-contaminated noise

Finally we consider in Fig. 9 the \(\epsilon\)-contaminated environment with \(epsilon=0.01\) and \(\kappa =100\). This situation represents a highly impulsive noise but without a heavy tail representation. Again, the linear receiver sees its performance far below the optimality when the others tend to get very close. The LLR approximation is once again the most efficient approach when the NIG exhibits a slight loss.

Fig. 9
figure 9

BER comparison of different receivers, \(\epsilon\)-contaminated noise

5.6 Summary

From the preceding figures, and also considering other approaches we did not include here, we make the following comments:

  1. 1

    Linear receivers only behave well in Gaussian noise. When an impulsive component is present, the degradation in comparison to receivers that take this component into account is significantly poorer as seen in Fig. 8. This is especially clear when the noise is purely sub-exponential (Fig. 7) but it is also true with models having exponential tails, like the \(\epsilon\)-contaminated in Fig. 9 when rare but large samples are present. This conclusion would be similar, even if optimal linear receivers [94] were considered.

  2. 2

    Approaches trying to approximate the noise distribution give good performance. We evaluated two flexible families of distributions with parameters that can be easily and efficiently estimated: (a) the Myriad with a single parameter to be estimated with a quick and efficient root search; (b) the NIG distribution family presents both the required flexibility and an easy parameter estimation procedure based on moment estimation. Both approaches are robust and adaptive but the NIG outperforms the myriad in Gaussian noise. For short training sequences they are more efficient than LLR based approaches, due to efficient estimation algorithms. It would be needed to further study the complexity issue, especially for the NIG receiver that relies on more complex function, including a Bessel function.

  3. 3

    LLR approximation based approaches have a good potential. They have been less studied in the literature and more work has to be done in that direction. The intuitive approaches are the soft limiter and the hole puncher that limits the impact of the large values. If they improve the performance in comparison to the linear approach when impulsive interference is present and have a limited impact when impulsiveness decreases, their performance remains far from the optimal [101] and we did not include them in our result section. We studied two other alternatives. If they increase the complexity, they significantly outperform the soft limiter. The p-norm allows either a “close to linear” or linear behaviour when the Gaussian noise is the main contribution to the noise and also approaches the sharp shape of the LLR when impulsiveness increases. A single parameter has to be estimated with a root search numerical procedure. The LLR-approximation is also very efficient. It is the receiver that adapts the best to configuration mixing different distributions. Especially the linear part adapt to low noise value corresponding to the Gaussian part and the 1/x part correspond to the tail of the interference, dominated by the sub-exponential component of the total noise. It is however more complex to estimated but recent proposals allow to address this task [25, 111].

It is important to consider the non Gaussian nature of the noise in the receiver design. Having in mind the sub-exponential class of distribution can give hints for the design of a receiver, either by approaching the noise distribution or approximating the LLR. If both approaches tend to give close results, some research questions are still opened. Complexity is an issue but implementation of each solution has to be optimized. We have shown that the receiver can be defined by a limited set of parameters. This is especially true for the p-norm and the myriad filter which only require a single parameter. Besides, making assumptions on the noise distribution allows one to rely on well-studied algorithms for the parameter estimation, ensuring an accurate result with a shorter training sequence.

Adaptability and robustness to different situations are also important. For instance, if the Myriad filter seems to be very efficient, performance is not so good when the noise is just Gaussian. And this could happen when the activity in the network is varying with time. LLR approximation and p-norm seem very flexible and attractive but require a longer training sequence. However, the estimation has not been optimized and further research is needed, as proposed in [111] for instance.

6 Conclusion

Interference is a significant limiting factor in many communication situations. Besides it is not Gaussian distributed in many cases. A large amount of papers have dealt with such contexts for many different physical layers and many different applications and the topic is still very active.

We proposed in this paper a study of impulsive noise models. We defined impulsive interference thanks to a broad class of models, the sub-exponential family, and showed the impacts interference has on the optimal signal detection regions, resulting in non linear decision boundaries, not even contiguously joined. To design receivers, we proposed to classify the different approaches (linear, flexible density functions, LLR-inspired). Based on it, we evaluated the p-norm, the NIG, the Myriad and a LLR-approximation receivers. We included the estimation steps of the receivers and tested them in different contexts, modifying the impact of impulsiveness and the models for interference. The four solutions under test outperform the traditional linear approach. They offer simple parameter estimation and robustness in environments that are impulsive or not.

The wireless communication environment has significantly changed in the last decades. However engineers are generally still using the Gaussian assumption for receiver designs. This is significantly sub-optimal in many cases. The difficult point is that the receiver has to adapt to many different scenarios depending on space and time and the transmission conditions are generally unpredictable. We showed with only one or two parameters, a robust and adaptive receiver can be designed but it is still to be implemented in real systems and the impact of the hardware part is also to be studied and probably adapted. Another important issue is to model the space, time and frequency dependence [27] of the interference and to link it with the resource allocation strategy [112] to improve the scalability and coexistence of networks.