1 Introduction

1.1 Motivations

Orthogonal frequency-division multiplexing (OFDM) is a multicarrier modulation technique that has been implemented for many high-speed wireless and wireline applications. Indeed, the orthogonal properties among subcarriers of OFDM lead to high spectral efficiency and excellent ability to cope with multipath fading environment. Since the spectra of the subcarriers are overlapping, an accurate frequency-synchronization technique is needed. Due to oscillator inaccuracies and non-ideal transmitter/receiver synchronization, the orthogonal properties are easily broken down and result in errors due to frequency offsets. It is well-known that the carrier frequency offset (CFO) reduces the useful signal power and creates inter-carrier interference (ICI) [1, 2].

1.2 Related works

Two main approaches have been proposed in the literature to mitigate the ICI problem caused by the CFO. One approach is to estimate and remove the frequency offset [36]. In this approach, the frequency-offset estimation is generally performed in two steps: coarse frequency-offset estimation, which estimates the partial frequency offset that is a multiple of the subcarrier spacing and fine frequency-offset estimation, which estimates the remaining part of the offset. There exist several CFO estimation techniques, e.g., training based methods [712], and semi-blind or blind methods [3, 13]. Another approach is to use coding1 to reduce the sensitivity of the OFDM system to frequency offsets [1417]. The coding approach is generally adopted after the removal of coarse CFO and hence assumes fine residual CFO. A large range of coding techniques has been developed in recent years and can be classified as follows (see Table 1):

  • Self-cancellation: A simple and effective method—known as the ICI self-cancelation scheme—was proposed by Zhao and Haggman in [18] and later generalized in [15, 19], where polynomial coding in the frequency domain is used to mitigate the effect of frequency offset. In this method, copies of the same data symbol are modulated on r adjacent sub-carriers using specific weights. This method can reduce the ICI at the price of lowering the transmission rate by a factor r. To further improve the ICI self-cancellation performance, many researchers proposed more efficient mapping (optimized weighting coefficients) for the redundant data symbol modulated over adjacent or non-adjacent subcarriers [2027]. The weights are designed such that, at the receiver, the ICI at each subcarrier is reduced when a frequency offset is present. Note that ICI self-cancellation techniques can be regarded as a coding scheme, where only the codewords with low ICI are used, this key idea was first proposed in [28, 29].

    Table 1 Coding techniques to reduce OFDM systems sensitivity to frequency shifts
  • Windowing: Seyedi and Saulnier [30] showed that the polynomial coding in the frequency domain—used by ICI self-cancellation schemes—is equivalent to using windowing in time domain. They hence used windowing at both the transmitter and the receiver to generalize and improve self-cancellation schemes. Recently, Real and Almenar [31] used windowing at the transmitter only allowing a reduction of the receiver complexity without any performance degradation. The windowing methods reduce ICI sensitivity significantly but they lower the transmission rate and increase the complexity of the transceiver.

  • Two-path transmission: The two-path transmission method halves the spectral efficiency similar to ICI self-cancellation techniques in [18]. However, unlike ICI self-cancellation method, two-path transmission method transmits the data copies in two concatenated OFDM blocks. The first path represents the standard OFDM signal and the second one is formed by a conjugate of the first path [32, 33]. This approach was generalized in [3436] by introducing phase rotation and space-time coding.

  • Correlative-coding: Contrary to all previous coding techniques, that reduce the sensitivity to CFO at the price of reducing the transmission rate, the correlative coding method do not reduce the data rate [37, 38]. This method is based on frequency-domain Partial-response Coding (PRC). PRC were originally proposed in the time domain to reduce the sensitivity of single-carrier systems to time offset.

    The PRC does not sacrifice spectral efficiency but needs a maximum-likelihood sequence estimator (MLSE) thus increasing the receiver complexity. An interesting combination of correlative-coding and self-cancellation was proposed in [39].

1.3 Our contributions

The intend of this paper is to reduce the sensitivity of OFDM systems to CFO without reducing the transmission rate. Our technique is inspired by the following key observation: all current wireless OFDM systems include forward-error-correction or channel codes to reduce the probability of error. Indeed, the forward-error-correction or channel codes have been studied and used for controlling errors in data transmission for the last half century (since Shannon 1948 landmark paper). Sathananthan and Tellambura related ICI reduction to channel coding and showed the capability of any forward-error correction code to reduce the errors caused by the ICI in [14]. We propose here to extend the role of those codes in OFDM systems. The main idea is to rotate each coordinate of the channel code by a fixed phase-shift such that the maximum inter-carrier interference taken over all sub-carriers is minimized. Clearly, the phase-shifted version of the code has the same error correcting capability, rate, decoding complexity as the original code. But it has lower maximum ICI and this reduction comes with no reduction of the spectral efficiency of the system. We proposed a simple technique—phase-shift—to reduce the sensitivity of OFDM system to CFO in [40]. This paper is an extension of this work—it provides an analytical evaluation of the proposed technique.

The key departure of our research from prior works on CFO effect reduction is that (a) we provide a geometric interpretation of the peak interference to carrier ratio (PICR) of OFDM signals, (b) we propose a simple phase-shift approach to reduce the sensitivity of OFDM to fine frequency offset, (c) we analyze the fundamental limit of the proposed technique and obtain a lower bound of the PICR of phase-shifted binary codes which we evaluate for non-redundant binary code, BCH codes, and Reed-Muller codes, and (d) we numerically evaluate phase-shift designs and prove their resilience to CFO change.

2 Statement of the problem

2.1 Notations and preliminaries

An OFDM signal is the sum of many independent signals modulated onto sub-channels of equal bandwidth. The OFDM transmitter applies the inverse discrete Fourier transform (IDFT) operation and sends the symbol sequence to the RF chain. The transmitted signal at time t may be represented as the real part of the complex envelope

$$ S_{\mathbf{c}}(t)= \sum_{n=0}^{N-1} c_{n} \exp(j 2 \pi (f_{0}+n f_{s})t)\quad\text{for}\quad 0 \leq t \leq T_{s}, $$
(1)

where \(j=\sqrt {-1}\), f 0 is the first subcarrier frequency and f s is the bandwidth of each subcarrier. The OFDM-symbol duration T s is equal to \(\frac {1}{f_{s}}\) to ensure the orthogonality among the subcarriers. The vector c=[ c 0,c 1,…,c N−1] of length N is the modulating data sequence. We refer to c as codeword of code \(\mathcal {C}\) that maps blocks of k input bits into blocks of N symbols. The element of the vector c, c n , are typically taken from a constellation \(\mathcal {Q}\). In this paper, we assume an equal energy constellation \(\mathcal {Q}\) (i.e., all the points in \(\mathcal {Q}\) have the same energy such as MPSK). We assume that S c (t) is transmitted on an additive white Gaussian noise (AWGN) channel. The receiver receives the signal \(\mathfrak {R}(S_{\mathbf {c}}(t))\) perturbed by noise and performs the inverse operations: the RF chain at the receiver down-converts, processes the received data. The receiver then applies a discrete Fourier transform (DFT) to generate estimate of c. Finally it extracts the block of input bits by applying a suitable error-correction algorithm. The received signal sample for the kth subcarrier after DFT can be written as

$$ \begin{aligned} y_{k}&=c_{k} b_{0} + \sum_{l=0, l\neq k}^{N-1} b_{l-k} c_{l} +n_{k} \\ &=c_{k} b_{0} + I_{k}+n_{k} \ \text{for} \ k=0,1, \dots, N-1, \end{aligned} $$
(2)

where n k is a complex Gaussian noise sample. The first term in the right-hand side of (2) represents the desired signal. The ICI term, attributable to the CFO, on the kth subcarrier is expressed by I k . The ICI coefficients b k are given by [29]

$$\begin{array}{@{}rcl@{}} b_{k}&=&\frac{\sin \pi (k+\varepsilon)}{N \sin \frac{\pi}{N}(k+\varepsilon)} \exp\left[j \pi \left(1-\frac{1}{N}\right)(k+\varepsilon) \right], \\ &=& \frac{\sin \pi \varepsilon}{N \sin \frac{\pi}{N}(k+\varepsilon)} \exp\left[j \pi \left(1-\frac{1}{N}\right)\varepsilon-j \pi \frac{k}{N} \right], \end{array} $$
(3)

where ε is the normalized fine frequency offset defined as a ratio between the fine frequency offset and the subcarrier spacing (i.e. \(|\varepsilon |\leq \frac 12\)). We note that I k is a function of both c and ε. In the following, we will list the main properties of the the ICI coefficients b k . Those properties give insights into the ICI interference I k and will be used in the rest of the paper.

  1. 1.

    Without frequency error (ε=0), b k reduces to the unit impulse sequence b k =δ[ k].

  2. 2.

    The coefficient b 0 depends on ε but is independent of k. In other words, all subcarriers experience the same degree of attenuation and rotation of the wanted component.

  3. 3.

    b k =b N+k , so if we consider an N modulo numbering −k maps to Nk. This property is easy to prove and is used in [20] to propose a repetition code that reduces the ICI.

  4. 4.

    All the coefficients b k for k≠0 slowly vary with k, b k+1b k , the slow varying nature of b k is the key motivation for self ICI cancelation [19]. This property will be used here to derive a more practical (approximate) lower bound of PICR of phase-shifted binary codes.

  5. 5.

    Under the assumption of small normalized frequency offset (|ε|≪1), the coefficients b k became

    $$b_{k} \simeq \frac{\sin \pi \varepsilon }{N \sin \frac{\pi k}{N}} \exp\left[j \pi\left(1-\frac{1}{N}\right)\varepsilon-j \pi \frac{k}{N} \right]. $$
  6. 6.

    The average power of the inter-carrier interference is derived as [1]

    $$ E\left[|I_{k}|^{2}\right]=\sum_{l=1}^{N-1} |b_{l}|^{2}=1-|b_{0}|^{2}, $$
    (4)

    where E [.] denotes the expected value over the distribution of data.

3 Peak interference to carrier ratio evaluation

In this section, we provide a geometric interpretation of the maximum ICI taken over all sub-carriers that explicitly incorporates the distance between the codewords c and some specific points. Based on this interpretation, we will propose a simple phase-shifted approach to reduce the sensitivity of OFDM systems to CFO.

3.1 PICR definition

Sathanannthan and Tellambura [28, 29] defined the peak interference to carrier ratio (PICR) as the maximum interference-to-signal ratio for any subcarrier:

$$ \text{PICR}(\mathbf{c},\varepsilon)=\max_{0 \leq k \leq N-1} \frac{|I_{k}|^{2}}{|b_{0} c_{k}|^{2} }. $$
(5)

It specifies the worst-case ICI on any subcarrier. Large I k value cause high bit errors in subcarriers. Therefore, to reduce ICI effects, PICR should be minimized [29]. Here we also define the PICR of a code \(\mathcal {C}\) as the maximum PICR over all codewords in \(\mathcal {C}\)

$$ \text{PICR}(\mathcal{C},\varepsilon)= \max \left\{ \text{PICR}(\mathbf{c},\varepsilon)\quad | \quad\forall \mathbf{c} \in \mathcal{C}\right\}. $$
(6)

Note that the expression of PICR is similar to the peak-to-mean envelope power ratio (PMEPR) that is considered as measure of the fluctuation of the OFDM signal2 \(\text {PMEPR}(\mathbf {c})= \max _{0\leq t \leq 1} \frac {|S_{\mathbf {c}}(t)|^{2}}{\parallel \mathbf {c} \parallel ^{2}}.\)

3.2 PICR geometric representation

We rewrite \(\text {PICR}(\mathcal {C},\varepsilon)\) as

$$ {{\begin{aligned} \text{PICR}(\mathcal{C},\varepsilon)=\max_{0 \leq k \leq N-1} \mathcal{J}(k,\varepsilon), \ \ \text{where} \ \ \ \mathcal{J}(k,\varepsilon)=\max_{\mathbf{c} \in \mathcal{C}} \frac{|I_{k}|^{2}}{|b_{0} c_{k}|^{2}}. \end{aligned}}} $$
(7)

We refer to \(\mathcal {J}(k,\varepsilon)\) as the maximum interference-to-signal ratio of code \(\mathcal {C}\) on subcarrier k and focus on its computation. The next theorem provides a geometric interpretation of the PICR per subcarrier [40].

Theorem 3.1

Let \(\mathcal {C}\) be a code of length N defined over unit energy constellation Q. For each k, the value of \(\mathcal {J}(k,\varepsilon)\) is determined by the distance between the codewords \(\mathbf {c} \in \mathcal {C}\) and the points w k and j w k , where

$$ \mathbf{w_{k}}=\left[b^{*}_{-k}, \ldots, b^{*}_{-1}, 0, b^{*}_{1}, \dots, b^{*}_{N-1-k}\right]. $$
(8)

If \(\mathcal {C}\)is a cyclic code then

$$ \text{PICR}(\mathcal{C},\varepsilon)=\mathcal{J}(0,\varepsilon). $$
(9)

The value of \(\mathcal {J}(0,\varepsilon)\)is determined by the distance between the codewords \(\mathbf {c} \in \mathcal {C}\) and the two points w 0 and j w 0 .

Proof

For any vectors x=(x 0,x 1,…,x N−1) and y=(y 0,y 1,…,y N−1), let \(\mathbf {x}.\mathbf {y}=\sum _{i=0}^{N-1}x_{i} y^{*}_{i}\) denote the inner product of x and y. Using the identities

$$\begin{array}{@{}rcl@{}} ||\mathbf{x}-\mathbf{y}||^{2} &=& ||\mathbf{x}||^{2} +||\mathbf{y}||^{2}- 2 \mathfrak{R}({\mathbf{x}.\mathbf{y}}), \\ ||\mathbf{x}-j\mathbf{y}||^{2} &=& ||\mathbf{x}||^{2} +||\mathbf{y}||^{2}- 2 \mathfrak{I} ({\mathbf{x}.\mathbf{y}}), \end{array} $$

we derive the following equalities

$$\begin{array}{@{}rcl@{}} ||\mathbf{c}-\mathbf{w_{k}}||^{2} &=& ||\mathbf{c}||^{2} +||\mathbf{w_{k}}||^{2}- 2 \mathfrak{R} ({I_{k}}), \\ ||\mathbf{c}-j\mathbf{w_{k}}||^{2} &=& ||\mathbf{c}||^{2} +||\mathbf{w_{k}}||^{2}- 2 \mathfrak{I} ({I_{k}}). \end{array} $$

where c=[ c 0,…,c N−1]. Without loss of generality, we assume that the elements of Q have unit amplitude (|c n |2=1, 0≤nN−1) then ||c||2=N.3

Using properties 3 and 6 of the ICI coefficients, we get \(||\mathbf {w_{k}}||^{2}= \sum _{l=-k, l \neq 0}^{N-1-k} |b_{l}|^{2}=\sum _{l=1}^{N-1} |b_{l}|^{2}=1-|b_{0}|^{2}\). Hence, we rewrite \(\mathcal {J}(k,\varepsilon)\) as follows:

$$ {{\begin{aligned} \mathcal{J}(k,\varepsilon) = & \max_{\mathbf{c} \in \mathcal{C}}\frac{|I_{k}|^{2} }{|b_{0}|^{2}} =\max_{\mathbf{c} \in \mathcal{C}}\frac{1}{|b_{0}|^{2}} \left[\left(\mathfrak{R} \left({I_{k}}\right)\right)^{2} + \left(\mathfrak{I} \left({I_{k}}\right)\right)^{2} \right],\\ = & \max_{\mathbf{c} \in \mathcal{C}}\frac{\left(N\,+\,1\,-\,|b_{0}|^{2} \,-\, ||\mathbf{c}-\mathbf{w_{k}}||^{2}\right)^{2} + \left(N+1-|b_{0}|^{2}-||\mathbf{c}-j\mathbf{w_{k}}||^{2}\right)^{2} }{4|b_{0}|^{2}}. \end{aligned}}} $$
(10)

Let c + denote the codeword for which \(\mathcal {J}(k,\varepsilon)\) is attained, c + maximizes

$$\begin{aligned} &\left(N+1-|b_{0}|^{2} - ||\mathbf{c}-\mathbf{w_{k}}||^{2} \right)^{2} \\ &+\left(N+1-|b_{0}|^{2}-||\mathbf{c}-j\mathbf{w_{k}}||^{2} \right)^{2}, \end{aligned} $$

among all the codewords. So for each k, the value of \(\mathcal {J}(k,\varepsilon)\) is determined by the distance between the codewords \(\mathbf {c} \in \mathcal {C}\) and the points w k and j w k .

The proof of the second part of Theorem 3.1 is based on the definition of cyclic code. For every codeword c=[ c 0,…,c N−1]∈ cyclic code \(\mathcal {C}\), the word [ c k ,…,c Nk−1] obtained by a cyclic shift of k components is again a codeword. In addition, based on property 3 of the coefficients b n , w k is obtained by k left cyclic shift of the element of w 0. If we assume that the \(\text {PICR}(\mathcal {C},\varepsilon)\) is reached for the subcarrier k≠0 and code c k+, then we have just to shift the codeword c k+ by k to find a codeword c 0+ and it is easy to prove that the interference generated for the subcarrier 0 and code c 0+ is equals to \(\text {PICR}(\mathcal {C},\varepsilon)\). Hence, the \(\text {PICR}(\mathcal {C},\varepsilon)\) is also reached for the subcarrier k=0. □

The geometric interpretation of Theorem 3.1 is simple but important because it explicitly states that the value of \(\text {PICR}(\mathcal {C},\varepsilon)\) is determined by the distance between the codewords \(\mathbf {c} \in \mathcal {C} \) and the points w k and j w k , k=0,…,N−1. Furthermore for cyclic code, the value of PICR is only function of the distance between the codewords and the two points w 0 and j w 0 . This representation leads to an understanding of the value of \(\text {PICR}(\mathcal {C},\varepsilon)\) and how to reduce it through phase-shift approach which is described in the following Section 4.

4 PICR reduction

4.1 Phase-shift technique: illustration

Theorem 3.1 provides a geometric interpretation of the value of PICR. Based on this interpretation, we propose a simple approach that was originally proposed by Jones and Wilkinson [41, 42] and further developed by Tarokh, Jafarkhani and Paterson [43, 44] to reduce PMEPR. The idea is to take a code with good BER performance and to rotate each coordinate of the code by a fixed phase-shift such that the maximum PICR evaluated for all codewords is minimized. For the purpose of illustration, we assume a unit amplitude constellation; thus all the codewords are points on the N-dimensional complex sphere of radius \(\sqrt {N}\). The phase-shifts may reduce the PICR by reducing/increasing the distance between the codewords and the points w k and j w k , k=0,…,N−1. For cyclic code, we just focus on the distance between the codewords and the points w 0 and j w 0 only. Our design will shift the codewords without changing the distance between them as illustrated in Fig. 1. So it leaves the error-correcting properties of the code unchanged. In addition, we can use the standard decoding algorithm of the original code after the received signals are rotated back.

Fig. 1
figure 1

Illustration of the geometric interpretation of PICR. We plot two codewords on the sphere N=3. By rotating the codewords over the sphere (through phase-shift) we can change the distance between the codewords and the two points w 0 and j w 0

The reduction of interference for OFDM can now be tackled as follows: For a given code \(\mathcal {C}\), the reducing phase-shift problem is to find offset \(\mathbf {v}=[\!v_{0}, \ldots, v_{N-1}] \in \mathbb {Z}_{2^{h}}^{N}\) such that \(\text {PICR}(\mathcal {C}_{v}, \epsilon)\) is minimized, where \( \mathcal {C}_{v}=\{ e^{j \pi \mathbf {v}/2^{h}} \mathbf {c} \ | \mathbf {c} \in \mathcal {C} \} \), h is an integer that set the resolution of the offset. Notice that, when h tends to infinity, we can consider \(\text {PICR}(\mathcal {C}_{v}, \epsilon)\) as a continuous multi-variable function of ϕ 0=2π v 0/2h,…,ϕ N−1=2π v N−1/2h. Because of the continuity, the global minimum of this function over [ 0,2π]×[ 0,2π]×⋯×[ 0,2π] exists. But this function may have various local minima and saddle points over this compact set as well. There are various methods for minimization of \(\text {PICR}(\mathcal {C}_{v}, \epsilon)\) in the literature, but they can only guarantee convergence to a local minima. As representative of these methods, we have used the gradient method in our simulations. It is important to note that this approach can be applied to binary and non-binary codes. Then, we used the lower bound, derived in the following section, to evaluate the optimality of our design.

4.2 Phase-shift technique: range

This section is dedicated to prove that phase-shift designs are robust to CFO change. The optimum offset v minimizes the PICR for a range of frequency offset (not for a specific frequency offset value). To do so we need the following proposition.

Proposition 4.1

Let \(\mathcal {C}\) be a code of length N defined over an equal energy constellation Q. Let ε 1 and ε 2 be small normalized frequency offsets (|ε 1|≪1 and |ε 2|≪1). If the offset \(\mathbf {v} \in \mathbb {Z}_{2^{h}}^{N}\) minimizes \(\text {PICR}(\mathcal {C}_{v}, \varepsilon _{1})\) that it minimizes \(\text {PICR}(\mathcal {C}_{v}, \epsilon _{2})\) too.

Proof

The proof is based on the fifth property of the coefficients b n . We rewrite the \(\text {PICR}(\mathcal {C},\varepsilon _{2})\) as

$$\text{PICR}(\mathcal{C},\varepsilon_{2})= \max_{0 \leq k \leq N-1, \mathbf{c} \in \mathcal{C}} \frac{|I_{k}(\varepsilon_{2})|^{2}}{|b_{0}(\varepsilon_{2}) c_{k}|^{2}} $$

where I k (ε 2) is the inter-carrier interference on the kth subcarrier and b 0(ε 2) is the ICI coefficient on the desired signal evaluated for normalized CFO of ε 2 as in Eq. (2). Using the property 5 of the ICI coefficients, we have

$$\begin{array}{@{}rcl@{}} \text{PICR}(\mathcal{C},\varepsilon_{2}) &=& \max_{0 \leq k \leq N-1, \mathbf{c} \in \mathcal{C}} \frac{|I_{k}(\varepsilon_{2})|^{2}}{|b_{0}(\varepsilon_{2}) c_{k}|^{2} }, \\ &\!\simeq\!& \frac{|\sin(\pi \varepsilon_{2})b_{0}(\varepsilon_{2}) |^{2}} {|\sin(\pi \varepsilon_{1}) b_{0}(\varepsilon_{1}) |^{2}} \max_{0 \leq k \leq N\,-\,1, \mathbf{c} \in \mathcal{C}} \frac{ |I_{k}(\varepsilon_{1})|^{2}}{ |b_{0}(\varepsilon_{1}) c_{k}|^{2} }, \\ &=& \mid\frac{\sin(\pi \varepsilon_{2})b_{0}(\varepsilon_{2})} {\sin(\pi \varepsilon_{1}) b_{0}(\varepsilon_{1}) }\mid^{2} \text{PICR}(\mathcal{C},\varepsilon_{1}). \end{array} $$

Hence, the offset \(\mathbf {v} \in \mathbb {Z}_{2^{h}}^{N}\), that minimizes \(\text {PICR}(\mathcal {C}_{v}, \varepsilon _{1})\), minimizes \(\text {PICR}(\mathcal {C}_{v}, \epsilon _{2})\) too. Therefore, there is no need to search for an offset v specific to each carrier frequency offset. The simulation results will show in Section 6 that the optimum set of shifts, derived for ε=0.1, reduce the inter-carrier interference for a wide range of CFO (0<ε<0.5).

5 Minimum PICR for phase-shifted binary code

Motivated by the previous design of phase-shifts, we would like to know how much PICR reduction can be achieved. In particular, in our framework, similar to that of Schmidt’s [45], we consider the following question. For a given binary code \(\mathcal {B}\), let \(\mathcal {B}_{v}\) be the phase-shifted version of \(\mathcal {B}\), what is

$$\min_{\mathcal{B}_{v} \in E_{h}(B)} \text{PICR}(\mathcal{B}_{v}, \epsilon). $$

We provide a lower bound and an approximated lower bound for this limit. The bounds are used to evaluate the optimality of our design.

5.1 Main results

Our lower bound in the spirit of Schmidt’s [45] will be expressed in terms of the covering radius of the binary code \(\mathcal {B}\) defined below.

Definition

The covering radius of a code \(\mathcal {B} \subseteq \{1,-1\}^{N}\) is defined to be

$$\rho(\mathcal{B})\triangleq \max_{x \in \mathbb{Z}_{2}^{N}} \min_{\mathbf{b}^{+} \in \mathcal{B^{+}}} wt_{H} (b+x). $$

where each codeword \( \mathbf {b}^{+} \in \mathcal {B^{+}}\) is associated with a codeword \( \mathbf {b} \in \mathcal {B}\) (where \(b_{i}^{+}=\frac {b_{i}+1}{2}\)), wt H (b) is the Hamming weight of a binary vector b. We now state our main result.

Theorem 5.1

Given a binary code B⊆{1,−1}N with covering radius \(\rho (\mathcal {B})\), then if h>1

$${{\begin{aligned} &\min_{C \in E_{h}(B)} {PICR}(\mathcal{C}, \epsilon) \geq\\ &\frac{1}{8|b_{0}|^{2}} \left[2N\,-\,2|b_{0}|^{2} \,-\,2 \sum_{i=1}^{N\,-\,1} (1\,-\,|b_{i}|)^{2} \,-\, \lambda \left(N\,+\, 2 \rho(\mathcal{B}) \right) \right]^{+^{2}}\!\!\!\!\!\!, \end{aligned}}} $$

where \(\lambda =b_{{\text {max}}} 2^{2h-2} \sin ^{2} \left (\frac {\pi }{2^{h}} \right)\), b max=max i≠0|b i | and [x]+= max(x,0). If |ε|≪1 then

$${{} {\begin{aligned} &\min_{C \in E_{h}(B)} {\text{PICR}}(\mathcal{C}, \epsilon) \gtrsim\\ & \frac{1}{8|b_{0}|^{2}} \left[2N\,-\,2|b_{0}|^{2} \,-\,2 \sum_{i\,=\,1}^{N\,-\,1} (1\,-\,|b_{i}|)^{2} \,-\, \lambda_{{\text{avg}}} \left(N\!\,+\,\! 2 \rho(\mathcal{B}) \right) \right]^{+^{2}}\!\!\!\!\!\!, \end{aligned}}} $$

where \(\lambda _{{\text {avg}}}=b_{{\text {avg}}} 2^{2h-2} \sin ^{2} \left (\frac {\pi }{2^{h}} \right)\) and b avg=mean1≤iN−1|b i |.

The proof of Theorem 5.1 is provided in Appendix. The preceding lower bound is a decreased function of h. The corollary below states the asymptotic lower bound for h.

Corollary 5.2

Given a binary code B⊆{1,−1}N with covering radius \(\rho (\mathcal {B})\), then if h>1

$${{\begin{aligned} &\min_{C \in E_{\infty}(B)} {\text{PICR}}(\mathcal{C}, \epsilon) \geq\\ & \frac{1}{8|b_{0}|^{2}} \left[2N\,-\,2|b_{0}|^{2} \,-\,2 \sum_{i\,=\,1}^{N\,-\,1} (1\,-\,|b_{i}|)^{2} \,-\, b_{{\text{max}}} \frac{\pi^{2}}{4} \left(N\,+\, 2 \rho(\mathcal{B}) \right) \right]^{+^{2}}. \end{aligned}}} $$

If |ε|≪1 then

$${{\begin{aligned} &\min_{C \in E_{\infty}(B)} {\text{PICR}}(\mathcal{C}, \epsilon) \gtrsim\\ & \frac{1}{8|b_{0}|^{2}} \left[2N\,-\,2|b_{0}|^{2} \,-\,2 \sum_{i\,=\,1}^{N\,-\,1} (1\,-\,|b_{i}|)^{2} \,-\, b_{{\text{avg}}} \frac{\pi^{2}}{4} \left(N\,+\, 2 \rho(\mathcal{B}) \right) \right]^{+^{2}}. \end{aligned}}} $$

Proof

Similarly to [45], we used \( {\lim }_{h \rightarrow \infty } 2^{2h-2} \sin ^{2} \left (\frac {\pi }{2^{h}} \right) = \frac {\pi ^{2}}{4}. \)

5.2 Examples

5.2.1 Non-redundant BPSK signaling

The code {1,−1}N is a binary code without redundancy, ρ({1,−1}N)=0, Theorem 5.1 and Corollary 5.2 imply the following.

Corollary 5.3

For h>1, the PICR of a 2h-ary PSK code equivalent to {1,−1}N is at least

$${{\begin{aligned} &\min_{C \in E_{h}\left(\mathbb{Z}_{2}^{N}\right)} {\text{PICR}}(\mathcal{C}, \epsilon) \gtrsim\\ & \frac{1}{8|b_{0}|^{2}} \left[2N-2|b_{0}|^{2} -2 \sum_{i=1}^{N-1} (1-|b_{i}|)^{2} - \lambda_{{\text{avg}}~} N \right]^{+^{2}}, \end{aligned}}} $$

and

$${{\begin{aligned} &\min_{C \in E_{\infty}\left(\mathbb{Z}_{2}^{N}\right)} {\text{PICR}}(\mathcal{C}, \epsilon) \gtrsim\\ & \frac{1}{8|b_{0}|^{2}} \left[2N\,-\,2|b_{0}|^{2} \,-\,2 \sum_{i\,=\,1}^{N\,-\,1} (1\,-\,|b_{i}|)^{2} - b_{{\text{avg}}~} \frac{\pi^{2}}{4} N \right]^{+^{2}}\!\!\!\!\!\!. \end{aligned}}} $$

For N=16 and N=64 the PICR approximated lower bounds are 0.10 and 0.22, respectively. Since the PICR for non-redundant binary code are 0.19 (N=16) and 0.50 (N=64), the maximum PICR reduction of the proposed phase-shift designs is 3 dB for non-redundant code.

5.2.2 Reed-Muller codes

In the following we inspect codes that are equivalent to first order Reed-Muller codes of length 2m, RM(1,m).

Corollary 5.4

For h>1 and N=2m, the PICR of a 2h-ary PSK code equivalent to RM(1,m) is at least

$$ {{\begin{aligned} \min_{C \in E_{h}(RM(1,m))} {\text{PICR}}(\mathcal{C}, \epsilon) & \gtrsim & \frac{1}{8|b_{0}|^{2}} \left[2N-2|b_{0}|^{2} -2 \sum_{i=1}^{N-1} (1-|b_{i}|)^{2} \right. \\ & & \left. - \lambda_{{\text{avg}}} \left(N+(2^{m}- 2^{m/2})) \right) \right]^{+^{2}}\!\!\!\!\!\!, \end{aligned}}} $$

and when h=

$$ {{\begin{aligned} \min_{C \in E_{\infty}(RM(1,m))} {\text{PICR}}(\mathcal{C}, \epsilon)\! & \gtrsim\! & \frac{1}{8|b_{0}|^{2}} \left[2N-2|b_{0}|^{2} -2 \sum_{i=1}^{N-1} (1-|b_{i}|)^{2} \right. \\ && \left. - b_{{\text{avg}}} \frac{\pi^{2}}{4} \left(N\,+\,(2^{m}- 2^{m/2})) \right) \right]^{+^{2}}\!\!\!\!\!\!. \end{aligned}}} $$

Proof

It was proved in [46] that

$$2^{m-1}-2^{(m-1)/2} \leq \rho(RM(1,m)) \leq 2^{m-1} -2^{m/2 -1}. $$

5.2.3 Binary primitive BCH codes

Next we present the lower bounds on the PICR of codes that equivalent to binary primitive t-error-correcting BCH codes, \(\mathcal {B}(t,m)\).

Corollary 5.5

For h>1 and N=2m−1, the PICR of a 2h-ary PSK code equivalent to t-error-correcting BCH codes, \(\mathcal {B}(t,m)\) is at least

$${{\begin{aligned} &\min_{C \in E_{h}(\mathcal{B}(t,m))} {\text{PICR}}(\mathcal{C}, \epsilon) \gtrsim\\& \frac{1}{8|b_{0}|^{2}} \left[2N-2|b_{0}|^{2} -2 \sum_{i=1}^{N-1} (1-|b_{i}|)^{2} - \lambda_{{\text{avg}}} \left(N+(4t-2)) \right) \right]^{+^{2}}\!\!\!\!\!\!, \end{aligned}}} $$

and when h=

$${{\begin{aligned} &\!\min_{C \in E_{\infty}(\mathcal{B}(t,m))} {\text{PICR}}(\mathcal{C}, \epsilon) \gtrsim\\ \!\! &\frac{1}{8|b_{0}|^{2}} \!\! \left[ 2N\,-\,2|b_{0}|^{2} \,-\,2 \! \sum_{i\,=\,1}^{N\,-\,1} (1-|b_{i}|)^{2} - b_{{\text{avg}}} \frac{\pi^{2}}{4} \left(N+(4t-2)) \right) \right]^{+^{2}}\!. \ \ \end{aligned}}} $$

Proof

The authors of [47] proved that there exists an m o depending on t such that \(\rho (\mathcal {B}(t,m))=2t-1\) for all mm o . □

6 Numerical results

The numerical results presented in this section aim to evaluate the ICI reduction performance of the proposed phase-shift approach. We considered a normalized frequency offset of ε=0.1 and two well-known codes extended Bose-Chaudhuri-Hocqenghem (BCH) and Reed Muller (RM). We note that Pyndiah [48] has proposed a simple soft-input soft-output (approximated MAP) decoder for BCH codes, based on Chase algorithm, that gives excellent BER performance. RM codes achieve capacity on erasure channels and reduce PMEPR [49, 50].

For the BPSK case, we have optimized the phase-shifts by finding a local minima of \(\text {PICR}(\mathcal {C},\varepsilon)\). Once the optimal phase-shifts were computed, they were rounded to 8-PSK, and 16-PSK phase-shifts. The PICR was then calculated for the rounded phase shifted. The optimal set of shifts for BCH(64,10) are given in Table 2. The reduction in PICR is 2.56 dB, it decreases to 1.99 and 1.39 dB for 16-PSK and 8-PSK, respectively. The optimal set of shifts for RM(1,6) are given in Table 3. The reduction in PICR is 7.10 dB; it decreases to 6.28 and 5.86 dB for 16-PSK and 8-PSK, respectively. The numerical results show that a fixed phase-shift applied to code coordinates reduces the ICI, and that most of the gain can be obtained by using 8-PSK and 16-PSK type phase-shifts. The phase-shift design reduce the PICR from 0.255 (BCH) and 0.519 (RM) to 0.14 and 0.098, respectively. These values approaches the lower bound in Corollary 5.4 and Corollary 5.5.

Table 2 Optimum phase shifts for BCH(64,10) in radians
Table 3 Optimum phase shifts for RM(1,6) in radians

Furthermore, we use the same set of phase-shifts with various CFO (0<ε<0.5). The PICR results shown in Figs. 2 and 3 prove that the optimum set of shifts, derived for ε=0.1, reduce the inter-carrier interference for a wide range of CFO. For the purpose of comparison, we also plot the PICR with a self-interference cancellation that reduces the transmission-rate by half [18]. In fairness, we implemented the self-cancellation technique over the non-redundant data sequences (no channel coding). The simulation results prove that our simple phase-shift designs are very competitive - especially when applied to codes with high large covering radius like RM codes. To illustrate the impact of our phase-shift technique on the bit error rate (BER), we consider RM(1,6) code and BPSK modulation. The BER vs. signal to noise ratio (SNR) performance with and without phase-shifts are shown in Fig. 4. Note that the phase-shift technique improves the performance at BER 10−6 by 10 dB for normalized frequency offset ε=0.1.

Fig. 2
figure 2

PICR of 2h-ary PSK code equivalent to BCH(64,10)

Fig. 3
figure 3

PICR of 2h-ary PSK code equivalent to RM(1,6)

Fig. 4
figure 4

BER vs. SNR of RM(1,6) code with and without phase-shifts

7 Conclusions

In this paper, we proposed an interference reduction scheme to mitigate the effects of CFO in OFDM system. We provided a geometrical interpretation of \(\text {PICR}(\mathcal {C},\varepsilon)\), the PICR of \(\mathcal {C}\). To reduce PICR, we focused on a simple phase-shift approach. The idea is to take a code with good BER performance and to rotate each coordinate of the code by a fixed phase-shift such that the maximum PICR taken over all codewords is minimized. This shift leaves unchanged the error-correcting properties of the code. In addition, we can use the standard decoding algorithm of the original code after back rotation of the received signals. Simulation results show that a reduction of 7 dB can freely be obtained.

We also study the fundamental limit of the proposed technique by providing an approximated lower bound of the PICR. The bound is applied to some codes: non-redundant binary code, BCH codes, and Reed-Muller codes. It is demonstrated that our phase-shift designs approach our bound.

8 Endnotes

1 One more approach uses signal processing, such as time and frequency equalization, to reduce the sensitivity of OFDM systems to frequency offset. Although efficient, signal processing techniques usually increase the complexity of the transceiver (see [16] and references therein).

2 The authors of [29] have noted that despite the similarities between PICR and PMEPR, the PICR problem differs from PMEPR issue in several ways.

3 In the case of non-uniform energy constellation, like QAM, \(\mathcal {J}(k,\varepsilon)\) will be determined for each energy level and then minimized over all the levels.

9 Appendix

10 Proof of Theorem 5.1

The proof follows along the lines of [45]. Based on Eq. (7), we have

$$ \text{PICR}(\mathcal{C},\varepsilon) \geq \mathcal{J}(0,\varepsilon) $$
(11)

Using the following inequality

$$\begin{array}{@{}rcl@{}} x^{2}+y^{2} &=&\frac12\left[(x+y)^{2} +(x-y)^{2}\right]\\ &\geq & \frac12 (x+y)^{2}, \ \ \ x,y \ \in R \end{array} $$

and Eq. (10), we get

$$ {{\begin{aligned} \text{PICR}(\mathbf{c},\varepsilon) \geq \frac{1}{8|b_{0}|^{2}} \left[2N\,+\,2-2|b_{0}|^{2} - ||\mathbf{c}-\mathbf{w_{0}}||^{2}-||\mathbf{c}-j\mathbf{w_{0}}||^{2} \right]^{2} \end{aligned}}} $$
(12)

We need some preliminaries in order to prove Theorem 5.1. If we assume that elements of \(\mathcal {C}\) have unit energy, It is straightforward to establish that

$$ {{\begin{aligned} ||\mathbf{c}-\mathbf{w_{0}}||^{2}= 1 + \sum_{i=1}^{N-1} (1-|b_{i}|)^{2} + 4 \sum_{i=1}^{N-1}|b_{i}| \sin^{2}\left(\frac{\angle b_{i} -\angle c_{i} }{2} \right) \end{aligned}}} $$
(13)

and

$$ {{\begin{aligned} ||\mathbf{c}-j\mathbf{w_{0}}||^{2}=1 + \sum_{i=1}^{N-1} (1-|b_{i}|)^{2} + 4 \sum_{i=1}^{N-1}|b_{i}| \sin^{2}\left(\frac{\angle b_{i} -\angle c_{i} }{2} + \frac{\pi}{4} \right) \end{aligned}}} $$
(14)

where |x| and x are the amplitude and the angle of x, respectively. Let \(\mathbb {Z}_{2^{h}}\) denote the ring of integers modulo 2h. We define \(\overline {c}_{i}\) and \(\overline {b}_{i}\) \(\in \mathbb {Z}_{2^{h}}\) as: \(\frac {2\pi \overline {c}_{i}}{2^{h}} \simeq \angle c_{i} \) and \(\frac {2\pi \overline {b}_{i} }{2^{h}} \simeq \angle b_{i}\). Note that when h tends to the infinity the phases can be approximated with arbitrary high probability.

Schmidt showed in [45] that

$$\sin^{2}\left(w \frac{\pi}{2^{h}}\right) \leq \frac{2^{h}}{4} \sin^{2}\left(\frac{\pi}{2^{h}}\right) w $$

for h>1 and w=0,1,…,2h−1.

Based on this result, we get

$$ {{\begin{aligned} ||\mathbf{c}-\mathbf{w_{0}}||^{2} \leq 1 + \sum_{i=1}^{N-1} (1-|b_{i}|)^{2} + 2^{h} \sin^{2}\left(\frac{\pi}{2^{h}}\right) \\\sum_{i=1}^{N-1} |b_{i}| \min\left(\overline{b_{i}} - \overline{c_{i}}, 2^{h} - \overline{b_{i}} + \overline{c_{i}}\right), \end{aligned}}} $$
(15)

and

$$ {{}{\begin{aligned} &||\mathbf{c}-j \mathbf{w_{0}}||^{2} \leq 1 + \sum_{i=1}^{N-1} (1-|b_{i}|)^{2} + 2^{h} \sin^{2}\left(\frac{\pi}{2^{h}}\right) \\&\qquad\sum_{i=1}^{N-1} |b_{i}| \min\left(\overline{b_{i}} \,-\, \overline{c_{i}}\,-\, 2^{h-2}, 2^{h} - \overline{b_{i}} + \overline{c_{i}}+2^{h-2}\right). \end{aligned}}} $$
(16)

We now use the previous results to derive a lower bound of the PICR:

$$ {{} {\begin{aligned} &\text{PICR}(\mathbf{c},\varepsilon) \!\geq\! \frac{1}{8|b_{0}|^{2}} \left[2N\,-\,2|b_{0}|^{2} \,-\, 2 \sum_{i=1}^{N-1} (1-|b_{i}|)^{2} \right. \\ &\qquad \left.\!-2^{h} |b_{max}|\! \sin^{2}(\frac{\pi}{2^{h}})\! \left(\!wt_{L}\!\left(\overline{b}\,-\,\overline{c}\right)\,+\, wt_{L}\left(\overline{b}\,-\,\overline{c}\,-\,2^{h-2}\right)\! \right)\! \right]^{2} \end{aligned}}} $$
(17)

where b max =max1≤iN−1|b i |, \(\overline {b}=[\overline {b}_{0}, \ldots, \overline {b}_{N-1}]\), \( \overline {c}=[\overline {c}_{0}, \ldots, \overline {c}_{N-1}]\) and wt L (x) is Lee weight of the vector x=[x 0,x 1,…,x N−1] defined as

$$ wt_{L}(x) \triangleq \sum_{i=0}^{N-1} \min\{x_{i}, 2^{h}-x_{i}\}. $$
(18)

Note that this lower bound is not always tight. Therefore, since all the coefficients b k slowly vary with k, b k+1b k (if |ε|≪1), we derived this approximated lower bound

$$ {{} {\begin{aligned} &\text{PICR}(\mathbf{c},\varepsilon) \gtrsim \frac{1}{8|b_{0}|^{2}} \left[2N\,-\,2|b_{0}|^{2} - 2 \sum_{i=1}^{N-1} \left(1-|b_{i}|\right)^{2} \right. \\ &\qquad \left. \!-2^{h} |b_{\text{avg}}|\! \sin^{2}\!\left(\!\frac{\pi}{2^{h}}\!\right)\! \left(\! wt_{L}\!\left(\overline{b}\,-\,\overline{c}\right)\,+\, wt_{L}\!\left(\overline{b}\,-\,\overline{c}\,-\,2^{h-2}\right)\! \right)\! \right]^{2} \end{aligned}}} $$
(19)

where b avg=mean1≤iN−1|b i |. The resulting values are very good approximations to the PICR lower bound yet analytically tractable. We use Definition 12 and Lemma 13 in [45] to derive

$$ wt_{L}\left(\overline{b}\,-\,\overline{c}\right)+ wt_{L}\left(\overline{b}-\overline{c}-2^{h-2}\right) =2^{h-2} N+ 2^{h-1} \rho(\mathcal{B}), $$
(20)

where \(\rho (\mathcal {B})\) is covering radius of the binary code \(\mathcal {B} \subseteq \{1,-1\}^{N}\). We replace Eq. (20) in Eqs. (17) and (19) to complete the proof.