Next Article in Journal
Adaptive Line Enhancer Based on Maximum Correntropy Criterion and Frequency Domain Sparsity for Passive Sonars
Next Article in Special Issue
A Low-Latency Approach for RFF Identification in Open-Set Scenarios
Previous Article in Journal
Efficient Object Placement via FTOPNet
Previous Article in Special Issue
Research on Illegal Mobile Device Identification Based on Radio Frequency Fingerprint Feature
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Efficient Transmitter Feature Extraction Scheme with IQ Imbalance and Nonlinearity in TDD OFDM Systems

1
School of Cyber Science and Engineering, Southeast University, Nanjing 210096, China
2
Zhangjiagang Campus, Jiangsu University of Science and Technology, Suzhou 215600, China
*
Author to whom correspondence should be addressed.
Electronics 2023, 12(19), 4108; https://doi.org/10.3390/electronics12194108
Submission received: 26 July 2023 / Revised: 8 September 2023 / Accepted: 19 September 2023 / Published: 30 September 2023
(This article belongs to the Special Issue Precise Timing and Security in Internet of Things)

Abstract

:
Radio frequency (RF) fingerprints have been an emerging research topic for the last decade. Numerous algorithms for recognition have been proposed. However, very few algorithms for the accurate extraction of IQI and PA nonlinearity are available, especially when multiple paths are considered. In this study, we present a scheme that uses the transmitter in-phase/quadrature-phase imbalance (IQI) and the power amplifier (PA) nonlinearity as RF fingerprint features in time-division duplexing (TDD) OFDM systems, which are always considered to be harmful to data transmission. The scheme consists of two round trips with four steps for two cases: in the first, the IQI and PA nonlinearity are unknown at the terminal; in the second, they are known at the terminal. A channel state information (CSI)-tracking algorithm based on the sliding-window least squares method is first adopted at the terminal. In case A, the obtained CSI is sent to the base station (BS) to remove its impact there; in case B, this removal is conducted directly by using pre-equalization at the terminal. Then, by following a sequential iterative approach, the IQI and nonlinearity are individually calculated. Theoretical analyses reveal how CSI estimation errors influence subsequent estimates at the BS in these two cases. Furthermore, the approximate unbiasedness is verified. The theoretical variance and Cramer–Rao lower bound (CRLB) are also given. It is indicated that the theoretical minimum variance in case B is lower than that in case A from the perspective of the CRLB. The numerical results demonstrate the efficiency of the scheme in comparison with existing techniques in the literature.

1. Introduction

With the development of B5G and 6G communication technologies, the physical-layer security of communication is becoming increasingly important, not only for future mobile communication systems but also for the internet of things (IoT) [1,2,3]. Security mechanisms that do not need to be built by using cryptography-based means in the upper layers and that rely solely on inherent physical-layer characteristics have their own unique characteristics, such as the inherent fingerprints of electronic components in transmitters, design defects or vulnerabilities in components in circuits, and the open propagation of electromagnetic waves in wireless communications [4]. In-phase/quadrature-phase imbalance (IQI) and power amplifier (PA) nonlinearity are two key transmitter characteristics that are relatively stable over the long term and vary from device to device [5,6]. They are harmful for data transmission, but are unique to each transmitter for use as a radio frequency (RF) fingerprint. Therefore, it is intuitive to use the transmitter IQI and PA nonlinearity as the RF fingerprint of a transmitter.
IQI estimation is always found in the field of channel equalization and is used to compensate for the distortion of the received signal generated by the IQI. A large number of methods based on linear technology have already been extensively discussed. In [7,8], Alireza Tarighat proposed the least squares (LS) and adaptive equalization method for estimating the combination of transmitter and receiver IQI and channel state information (CSI) to compensate for the resulting transceiver performance degradation. The CSI and IQI were independently estimated based on the pilot by using linear estimation technology in a multiuser single-input–multiple-output (MU-SIMO) system; first, the linear minimum mean squared error (LMMSE) was used to estimate the CSI, and then LS was used to estimate the IQI, thus achieving the separation of the CSI and IQI parameters due to the assumption of IQI at the receiver only [9]. The transmitter (TX) and receiver (RX) IQI compensation problem in differential space–time block-coded orthogonal frequency division multiplexing (STBC-OFDM) systems was studied in [10] and developed further in [11]; the TX and RX IQIs were extracted by employing an algorithm based on a widely linear estimation. An iterative decision feedback (DFB) receiver was proposed to compensate for the IQI due to imperfections in the transceiver RF link for a single carrier with a frequency-domain equalization (SC-FDE) system [12]. This method was a nonlinear compensation method that could greatly improve the equalization performance of an SC-FDE system under IQI compared to the above-mentioned approaches. The authors of [13] used an iterative nonlinear least squares (NLS) method to jointly estimate the IQI in the TX, RX, and channels for generalized orthogonal frequency-division multiplexing (GFDM) systems. Ayse Elif Canbilen [14] investigated the impact of the IQI under generalized Beckmann fading channels for SM-MIMO systems, and both TX and RX IQIs were involved. A performance analysis of the effective channel estimation (e.g., the joint effect of the IQI and channel) and MMSE-based estimation was conducted in [15,16], where the RX IQI was considered in uplink MIMO-OFDM systems. Xiantao Cheng addressed two similar algorithms for estimating the IQI and CSI. One was a sequential estimation algorithm for determining the transmitter IQI and CSI [17], and the other was an EM-based estimation algorithm for determining the transceiver IQI and CSI [18]. Unlike previous methods, they were able to obtain separate estimates of the IQI and CSI. However, our simulation studies showed that these algorithms tended to fall into local minima.
The various methods mentioned above are able to effectively combat performance degradation due to IQI in direct conversion systems, but none of them take the PA nonlinearity of the transmitter into account. PA nonlinearity exists at the front-end of an RF link, and it distorts digitally modulated signals in wireless communications [19,20]. In addition to in-band distortion, the spectral regrowth of digitally modulated signals and adjacent channel interference are also produced by PA nonlinearity [19,20]. PA nonlinearity and IQI are always exploited in specific emitter identification (SEI) (also known as RF-distinct native attribute (RF-DNA) fingerprints) due to their uniqueness and long-term invariant nature [4].
In [21], Ming-Wei Liu extracted PA nonlinearity by using an alternate iterative LS estimation of the channel coefficients and distorted baseband signal to obtain this reliable characteristic in a transmitter based on a training sequence. However, this algorithm required a certain number of samples with a low-enough amplitude in the sequence; otherwise, severe performance degradation would be inevitable. Recently, many works have employed machine learning technology, such as classification algorithms and deep learning technology, to cope with SEI [5,6,22,23]. In such works, a number of simulated and practical trials were conducted, thus verifying the efficiency and reliability of their proposed methods. Nevertheless, unlike traditional approaches [7,8,9,10,11,12,13,14,15,16,17,18], machine learning is powerless in environments without samples, due to its requirements for learning.
In a word, in the previous literature, there are almost no algorithms that directly extract these two transmitter features separately, especially in the presence of multiple paths. The contributions of this study are summarized as follows:
  • We establish a feature model of the IQI and PA nonlinearity at the transmitter with multiple paths. Following a brief analysis, we reveal that it is not possible to separately extract the parameters from just one transmission. However, separately extracting IQI and PA nonlinearity under the impact of the CSI is necessary for robust feature extraction. To this end, we propose a scheme for separately estimating the IQI and PA nonlinearity, which involves two round trips with four steps.
  • The CSI is estimated/tracked via a sliding-window LS algorithm based on previously depicted training sequences in the first round trip. Then, the IQI and PA nonlinearity of the transmitter are obtained by utilizing a sequential iterative approach after removing the impact of the CSI in the second round trip. The scheme includes two cases: A: IQI and PA nonlinearity are unknown at the terminal; B: IQI and PA nonlinearity are known at the terminal. These have different procedures in steps 3 and 4. The terminal needs to send the coded CSI to the base station (BS) in order to eliminate the channel effect at the BS for case A. The latter deals with the channel effect directly via pre-equalization in step 3 so as to estimate the IQI and PA nonlinearity more simply at the BS for case B.
  • We also derive the performance expressions for the two cases and indicate the influence of CSI estimation/tracking. The results of the theoretical analysis show that the theoretical minimum variance in case B is lower than that in case A from the perspective of the Cramer–Rao lower bound (CRLB). In addition, the results of a numerical simulation verify the efficiency of the proposed scheme.
The rest of this study is organized as follows: We first describe the system model and give a CSI tracking algorithm based on the sliding-window LS (CTA_SWLS) with the IQI at the receiver of a terminal in Section 2.  In Section 3, we propose an efficient scheme, with four steps, for eliminating the channel impact, and a sequential iterative approach for simultaneously and separately estimating the TX IQI and nonlinear coefficient at the BS is given. This is followed by a performance analysis and an analysis of the CRLB and complexity of the proposed scheme with the two cases in Section 4. Section 5 demonstrates the simulation results. Finally, conclusions are given in Section 6.
Notation: ( ) * , ( ) T , and ( ) H denote the complex conjugate, transpose, and complex conjugate transpose, respectively. ⊙ denotes element-by-element multiplication. ∗ represents circular convolution. DFT{x} and IDFT{X} denote the discrete Fourier transform of x and the inverse discrete Fourier transform of X, respectively. X mod Y refers to taking the remainder after the division of X by Y. Imaginary units are represented by j. Re{X} and Im{X} denotes taking the real part and imaginary part of X, respectively. X Y indicates element-by-element division. The subscript or superscript i or k indicates the index of a variable, vector, or matrix in its context. x 0 = x x = x 0 refers to taking the partial derivative of with respect to x when x = x 0 .

2. System Model and Analysis

Here, we consider a direct upconversion transmitter in which the carrier frequency from an oscillation source is f c , the phase difference between the I-branch and Q-branch is 90 degrees, and the amplitude coefficients are equal under ideal conditions. However, due to imperfections in the components of the analog circuits in the transmitter RF link and the diversity in manufacturing, the phases of the two branches do not have a difference of strictly 90 degrees, and the amplitude coefficients are not strictly the same, resulting in errors in the demodulated data on the receiver side if there is no countermeasure. On the other hand, the nonlinearity of the transmitter PA also leads to performance degradation at the receiver.
We assume here that no IQI and PA linearity are maintained across the operating range at the BS. Generally speaking, the BS has a more powerful function and can use higher-cost wide-linearity-region PA- and IQI-free devices; IQI and nonlinearity are even present in the RF link, which can also be pre-corrected to achieve more perfect IQ balance and PA linearity, while this is more difficult to achieve at the terminals due to the relatively low cost and performance of the devices, as well as the relatively large number of terminals.

2.1. TX IQI at the Terminal Only

Let d ( t ) = d I ( t ) + j d Q ( t ) denote the ideal baseband equivalence symbol of the transmitter link at the terminal OFDM system. Because of the impact of the TX IQI at the terminal, this signal is distorted into the following form:
s ( t ) = u d ( t ) + v d * ( t ) ,
where u and v are the TX IQI coefficients, which are defined by the following two equations:
u = cos ( θ / 2 ) + j α s i n ( θ / 2 ) v = α cos ( θ / 2 ) + j s i n ( θ / 2 ) ,
where α and θ are the amplitude imbalance and the phase imbalance, respectively, generated by the same local oscillator; this is called a symmetric IQI model. As shown in Figure 1a, under conditions of no IQI, u = 1 and v = 0 .
Considering that the OFDM system consists of N subcarriers, the symbol period is T, T = N T s , the cyclic prefix is N c p , and T s denotes the sampling period. The discrete signal expressions in the following parts of this study are all normalized by the sampling period unless specifically stated. The uplink signal received by the BS is
r ( n ) = u d ( n ) + v d * ( n ) h ( n ) + w ( n ) ,
where h ( n ) is the multipath channel length of L, and w ( n ) is additional white Gaussian noise (AWGN).

2.2. CSI Estimation with the RX IQI at the Terminal

If we consider the RX IQI at the terminal, a high-frequency (HF) signal that is received passes through a bandpass filter (BPF) and enters a low-noise amplifier (LNA), whose function is mainly to increase the output signal-to-noise ratio (SNR) (unlike the PA), so it can be considered linear over the entire operation range, as shown in Figure 1b. To facilitate the illustration of estimating the CSI at the terminal, we use an asymmetric model to describe the received signal in this section [9,24]. Thus, the signal received at the terminal in the time-division duplexing (TDD) system is
y d o w n _ r ( n ) = β 1 [ d B ( n ) h ( n ) + w d w o n _ r ( n ) ] + β 2 [ d B * ( n ) h * ( n ) + w d o w n _ r * ( n ) ] ,
where d B ( n ) represents a training sequence sent by the BS to the terminal, w d w o n _ r ( n ) is AWGN, and w d w o n _ r ( n ) CN ( 0 , σ w d o w n _ r 2 ) . β 1 = 1 + g e j θ 2 and β 2 = 1 g e j θ 2 are the RX IQI coefficients. Their complementary property is β 1 + β 2 * = 1 , and this can be exploited to separate the received signal and the RX IQI. By taking the conjugate to (4) and adding it, we obtain
y d o w n _ r ( n ) + y d o w n _ r * ( n ) = d B * ( n ) h * ( n ) + d B ( n ) h ( n ) + w d o w n _ r ( n ) + w d o w n _ r * ( n ) .
Let DFT { x ( n ) } = X ( k ) , which satisfies the conjugate symmetry DFT { x * ( n ) } = X * ( N k ) . Taking the DFT of (5) and using conjugate symmetry and the complementary property results in
Y d o w n _ r ( k ) + Y d o w n _ r * ( N k ) = D B ( k ) H ( k ) + D B * ( N k ) H * ( N k ) + W d o w n _ r ( k ) + W d o w n _ r * ( N k ) 1 k N 2 1 Re { Y d o w n _ r ( k ) } = Re { D B ( k ) H ( k ) + W d o w n _ r ( k ) } k = 0 , N 2 .
It can be seen in (6) that when sending P ( P 2 ) different training sequences, we can obtain N 2 + 1 independent linear equations; each equation can estimate two variables of the CSI via the LS. However, considering the time-varying nature of wireless channels, P sequences are required to be no longer than the channel coherence time [25].
P ( T + T c p ) < T c = 0.423 f m ,
where f m is the Doppler shift. For better tracking performance within the channel coherence time, we can send P consecutive but different training sequences circularly, herein utilizing the sliding-window LS algorithm to estimate the CSI for each symbol period. We introduce the symbol period index i and rewrite (6) in matrix form, resulting in
A k i H k i + W k i = [ A k 1 i , A k 2 i ] H k i + W k i = Y k i P i , 0 k N 2 ,
where
A k 1 i = [ D B , ( i P + 1 ) m o d P ( k ) , D B , ( i P + 2 ) m o d P ( k ) , , D B , i m o d P ( k ) ] T P i , 1 k N 2 1 2 [ Re { D B , ( i P + 1 ) m o d P ( k ) } , Re { D B , ( i P + 2 ) m o d P ( k ) } , , Re { D B , i m o d P ( k ) } ] T P i , k = 0 , N 2 ,
A k 2 i = [ D B , ( i P + 1 ) m o d P * ( N k ) , D B , ( i P + 2 ) m o d P * ( N k ) , , D B , i m o d P * ( N k ) ] T P i , 1 k N 2 1 2 [ Im { D B , ( i P + 1 ) m o d P ( k ) } , Im { D B , ( i P + 2 ) m o d P ( k ) } , , Im { D B , i m o d P ( k ) } ] T P i , k = 0 , N 2 ,
H k i = [ H i ( k ) , H i * ( N k ) ] T P i , 1 k N 2 1 [ Re { H i ( k ) } , Im { H i ( k ) } ] T P i , k = 0 , N 2 , .
Y k i = [ Y d o w n _ r , ( i P + 1 ) ( k ) + Y d o w n _ r , ( i P + 1 ) * ( N k ) , Y d o w n _ r , ( i P + 2 ) ( k ) + Y d o w n _ r , ( i P + 2 ) * ( N k ) , , Y d o w n _ r , i ( k ) + Y d o w n _ r , i * ( N k ) ] T P i , 0 k N 2 , .
W k i = [ W d o w n _ r , ( i P + 1 ) ( k ) + W d o w n _ r , ( i P + 1 ) * ( N k ) , W d o w n _ r , ( i P + 2 ) ( k ) + W d o w n _ r , ( i P + 2 ) * ( N k ) , , W d o w n _ r , i ( k ) + W d o w n _ r , i * ( N k ) ] T P i , 0 k N 2 .
It is easy to obtain the CSI estimate as follows:
H ^ k i = ( A k i H A k i ) 1 A k i H Y k i P i , 0 k N 2 .
Since interchanges of rows or columns of a matrix do not change its singular values, ( A k i H A k i ) 1 = ( A k H A k ) 1 is a fixed value. Let
Y k i = A k i H Y k i = Y k i 1 + A k ( i m o d P ) H [ Y k i ( P 1 ) Y k i 1 ( 0 ) ] P i , .
Thus,
H ^ k i = H ^ k i 1 + ( A k H A k ) 1 Y k i P i , 0 k N 2 ,
where A k ( i ) denotes row i + 1 of A k , as well as Y k i ( i ) . To avoid large estimation errors, it is necessary to design the training sequences with a small condition number for A k . The CSI tracking algorithm based on the sliding window LS (CTA_SWLS) is given in the form of Algorithm 1 and is shown in Figure 2.
Algorithm 1 CSI tracking algorithm based on the sliding-window LS (CTA_SWLS).
1:
Initial i = P 1 ;
Calculate B k = ( A k H A k ) 1 and H ^ k i = B k A k i H Y k i offline.
2:
For i P
   Calculate Y k = A k ( i m o d P ) H [ Y k i ( P 1 ) Y k i 1 ( 0 ) ] ;
   Update H ^ k i = H ^ k i 1 + B k Y k ;
    i = i + 1
End

2.3. TX Link with Nonlinear PA Only at the Terminal

Considering a memoryless PA, via Taylor expansions, a complex power-series expansion can be used to model the effect of a digital baseband signal passing through a transmitter front-end PA [20,21]. Accordingly, the even terms of the expanded series are discarded, leaving only the odd items, such that the baseband signal becomes
x = i = 0 M 1 b m d m + 1 ( d * ) m = i = 0 M 1 b m d 2 m d .
In (17), x denotes the signal after the baseband signal d passes the nonlinear PA, and b m is a complex coefficient of odd items. Equation (17) shows that the items of m = 0 form the linear component of the PA. To facilitate analysis, herein, let b m be normalized to b 0 , so b 0 = 1 . We rewrite (17) in matrix form as follows:
x = [ d , D 1 ] b = Db ,
where x = [ x 0 , x 1 , , x N 1 ] T , d = [ d 0 , d 1 , , d N 1 ] T , D i , m = d i 2 m and b = [ b 0 , , b M 1 ] T .

2.4. Coexistence of the TX IQI and PA Nonlinearity in the Terminal Transmitter Link

By combining the IQ imbalance and PA nonlinearity and considering multipath channels and noise, the following received signals can be obtained at the BS:
r = x h + n = ( [ s , S R ] b ) h + n = ( Sb ) h + n ,
where s is the first column of S , and S R is a matrix whose columns are composed of the last M 1 columns of S . n is an additional white Gaussian noise (AWGN) vector, and n CN ( 0 , σ 2 I N × N ) . Thus, matrix S becomes S i , m = u d i + v d i * 2 m ( u d i + v d i * ) .
It can be seen from S that the IQI coefficients u and v are in each element of S , as well as in the nonlinearity coefficient vector b ; all of these are the transmitter features that need to be extracted. If the CSI is unknown at the BS, an arbitrary set of values of u and v can be used to determine the matrix S by combining arbitrary values of b , provided that h takes an appropriate value; this can make (19) consistent whether there is error or not. Hence, the parameters in this model cannot be determined if the CSI is unknown at the BS. With special cases in which b 0 = 1 , b m = 0   ( m > 0 ) , which is a scenario that has been extensively studied in many previous papers [7,8,9,10,11,12,13,14,15,16,17,18]. However, for transmitter feature extraction, the requirement of obtaining independent estimates of the transmitter IQ imbalance and PA nonlinearity from multiple paths is necessary. Therefore, we need to seek a new approach to deal with this issue.
The situation will be different under the condition that the CSI is known according to (19). If a set of values of u and v are available, by using LS estimation, an estimate of b can be obtained; the closer the values of u and v are to their true values in all estimates, the more accurate the estimate of b is in the sense of the LS. Note that the LS algorithm requires that the column rank of s be equal to the number of non-zero terms in b ; otherwise, it will be ill conditioned, leading to large errors. Since S can be written as
S = diag ( s ) Ψ ,
where Ψ i , m = u d i + v d i * 2 m is a Vandermonde matrix, rank ( S ) min { rank ( diag ( s ) ) , rank ( Ψ ) } is equal to a non-zero number, and the rank of Ψ is equal to the number of different non-zero d i values. In other words, the number of different non-zero d i values in the training sequence is greater than the number of non-zero elements of b . b has an LS solution for the existence of IQI. Nevertheless, for IQI-free cases, the rank of Ψ is determined by the number of different non-zero d i values. It is, therefore, necessary that the number of different amplitudes is not less than M.

3. The Proposed Scheme

The above analysis shows that when the CSI is unknown at the BS, the model has no deterministic solution. Therefore, we propose a scheme for the joint and independent extraction of the IQI and nonlinear parameters in the terminal transmitter, and this scheme has two cases, which are shown in Figure 3.

3.1. Case A: IQI and PA Nonlinearity Are Unknown at the Terminal

In this case, transmitter feature extraction and authentication are conducted via two round trips with four steps in TDD systems.
Step 1: The terminal sends an access request to the BS.
Step 2: Upon receipt of the request by the BS, P consecutive but different training sequences are cyclically sent to the terminal.
Step 3: The CTA_SWLS algorithm is employed to track the CSI after P training sequences are received at the terminal. When k = 0 N N 2 2 H ^ k i H ^ k i 1 2 < δ is satisfied ( δ denotes a threshold), an FFT is performed on H ^ i to obtain the time-domain CSI h ^ i . The first L ( L > τ max T s is the max delay spread) values of h ^ i are retained. Then, a training sequence is sent, and the CSI is truncated to the BS. It is assumed that the CSI remains constant during the last symbol period in step 2 and step 3. Note that to maintain the relevance of the CSI, the training sequence needs to be sent to the BS before the CSI.
Step 4: The BS estimates the combination of the CSI and transmitter IQI based on the training sequence in step 3 by using the LS or MMSE with PA nonlinearity; then, it demodulates the data, which are also known as the CSI. Followed by the removal of the effect of the CSI in the received signal, the BS then estimates the terminal IQI and PA nonlinearity coefficients. The features are stored in a local database either directly or after processing. It is also possible to compare data in the database by using pattern recognition so that the resulting signal to accept or reject the transmitter’s access can be given.
Considering the effects of PA nonlinearity and noise, in step 3, when the terminal encodes and modulates the estimated CSI, it should use a lower-order modulation method, such as BPSK or QPSK, on each OFDM subcarrier. For example, the number of effective paths is generally within 10 for a frequency-selective channel; when using 10 bits (1024-level uniform quantization) and BPSK modulation, a total of 100 bits are required. As long as the number of subcarriers satisfies N 100 , this requirement is met. After the BS receives the CSI and removes the impact of the channel, Equation (19) becomes
r = Sb + n ,
where r = 1 N F H Fr F h 0 and n = 1 N F H Fn F h 0 . F k , n = 1 N e j 2 π n k / N is a Fourier matrix. This problem now turns into
min u , v , b r Sb 2 s . t . b 0 = 1 .
Let ν = ( b , u , v ) T . Since u and v in S are to be estimated, b is also to be estimated; we use a sequential iterative approach to estimate these quantities.
Setting the initial values to u = 1 and v = 0 , first, we calculate
b ^ = ( S R H S R ) 1 S R H ( r s ) ,
where b ^ = [ 1 , b ^ ] T . Next, by utilizing the gradient descent method, the estimate of v can be iteratively obtained as follows:
v ^ = v ^ μ r S b ^ 2 v = v ^ μ ( ( b ^ H S H S b ^ r H S b ^ b ^ H S H r ) v x j ( b ^ H S H S b ^ r H S b ^ b ^ H S H r ) v y ) ,
where μ is a small positive value for controlling the step size. In addition,
( b ^ H S H S b ^ r H S b ^ b ^ H S H r ) v x = b ^ H ( S H v x S + S H S v x ) b ^ r H S v x b ^ b ^ H S H v x r
( b ^ H S H S b ^ r H S b ^ b ^ H S H r ) v y = b ^ H ( S H v y S + S H S v y ) b ^ r H S v y b ^ b ^ H S H v y r
where
S i , m v x = ( S m , i H v x ) * = u d i + v d i * 2 m ( u d i + v d i * ) v x = u d i + v d i * 2 m [ m 2 v x d i 2 + u d i 2 + u * d i * 2 ( u d i + v d i * ) * + d i * ] ,
S i , m v y = ( S m , i H v y ) * = u d i + v d i * 2 m ( u d i + v d i * ) v y = u d i + v d i * 2 m [ m 2 v y d i 2 j u d i 2 + j u * d i * 2 ( u d i + v d i * ) * + j d i * ] .
The following relationship of u and v based on (2) is used here to estimate u.
u = 1 v y 2 + j v x v y 1 v y 2 .
After a finite number of iterations, the temporary suboptimal values of v ^ and u ^ can be obtained. Then, v ^ and u ^ are substituted into (23), and the iterative process is repeated until the stopping criteria are met. We summarize the estimation procedure in Algorithm 2.
Algorithm 2 IQI and nonlinearity sequential estimation algorithm (IQINSEA)
1:
Initialization: Set u = 1 , v = 0 , i = 0 , μ , ε 1 , ε 2
2:
For (external iteration)
   Update b ^ i using (23);
   Form b ^ i = [ 1 , b ^ i ] T ;
   If [ b ^ i , v ^ i ] [ b ^ i 1 , v ^ i 1 ] < ε 2
      Stop and calculate u ^ i using (27)
      Output: ν ^ i .
   Else
       k = 0 ;
      For (internal iteration)
         Using (24) to update v ^ i , k + 1 ;
         If v ^ i , k + 1 v ^ i , k < ε 1
            Stop
         Else
             k = k + 1 ;
         Endif
      End
       i = i + 1 ;
   Endif
End

3.2. Case B: IQI and PA Nonlinearity Are Known at the Terminal

Figure 3b demonstrates the procedure for case B. Here, prior knowledge is given at the terminal, and the corresponding processing is different to that in case A. The differences between case a and case B are as follows.
Step 3: The CTA_SWLS algorithm is employed to track the CSI after P training sequences are received at the terminal. When k = 0 N N 2 2 H ^ k i H ^ k i 1 2 < δ is satisfied, a modified sequence is directly obtained via a pre-equalization operation and sent to the BS instead of step 3 in case A.
Step 4: The BS receives and estimates the terminal IQI and nonlinear coefficients via Algorithm 2. The subsequent actions are the same as those in case A.
Since we only need to send a pre-equalization training sequence to the BS, case B is more suitable for faster-varying channels. With no CSI effect, the signal received by the BS should be shown as follows:
r = Sb + n .
The matrix S is known at both the terminal and the BS, but due to the CSI there is no unique solution, as described in the previous section. Therefore, we are able to send a pre-equalized training sequence to the BS after the CSI is estimated, and a signal with no CSI effect is equivalently received at the BS. To satisfy
r = S b h + n = Sb + n ,
that is,
S b = F H diag ( H ) 1 FSb = r ˜ ,
Equation (30) can be written as N independent equations for d i :
m = 0 M 1 b m u d i + v d i * 2 m ( u d i + v d i * ) = r ˜ i + n ˜ i 0 i N 1
or
F = f 1 = m = 0 M 1 Q m Φ x m C x = 0 f 2 = m = 0 M 1 Q m Φ y m C y = 0 0 i N 1 ,
where
Q = u d i + v d i * 2
Φ x m = b x m ( u x d x i u y d y i + v x d x i + v y d y i ) b y m ( u x d y i + u y d x i v x d y i + v y d x i )
Φ y m = b y m ( u x d x i u y d y i + v x d x i + v y d y i ) + b x m ( u x d y i + u y d x i v x d y i + v y d x i )
C x = Re { r ˜ i + n ˜ i }
C y = Im { r ˜ i + n ˜ i } .
Equation (31) is a binary nonlinear system of equations with respect to d x i and d y i , and the solution can be obtained via the Newton–Raphson method. We omit the subscript i and let d = d x , d y T so that we can obtain the following solution:
d k + 1 = d k J ( d k ) 1 F ( d k ) ,
where J ( d ) = f 1 d x f 1 d y f 2 d x f 2 d y is a Jacobian matrix. In addition,
f 1 d x = m = 0 M 1 Q m Φ x m d x + m Q m 1 Q d x Φ x m ,
in which f 1 and Φ x m can be simultaneously replaced with f 2 and Φ x m . d x can be replaced with d y .
Q d x = 2 ( u x d x u y d y + v x d x + v y d y ) ( u x + v x ) + 2 ( u x d y + u y d x v x d y + v y d x ) ( u y + v y )
Q d y = 2 ( u x d x u y d y + v x d x + v y d y ) ( v y u y ) + 2 ( u x d y + u y d x v x d y + v y d x ) ( u x v x )
Φ x m d x = b x m ( u x + v x ) b y m ( u y + v y )
Φ x m d y = b x m ( v y u y ) b y m ( u x v x )
Φ y m d x = b y m ( u x + v x ) + b x m ( u y + v y )
Φ y m d y = b y m ( v y u y ) + b x m ( u x v x ) .
It is also possible to use nonlinear least squares to find the solution for the following optimization problem:
min m = 0 M 1 b m u d + v d * 2 m ( u d + v d * ) ( r ˜ + n ˜ ) 2 .
It is given as
d k + 1 = d k η ( d k ) ,
where ( d ) = 2 J ( d ) T F ( d ) , and η is a small positive value for controlling the step size.
This is a system of N independent binary nonlinear equations that can be calculated in parallel at the transmitter side and implemented very quickly. The received signal that is transmitted to the BS can be eliminated from the CSI beforehand to facilitate subsequent processing at the BS. Once it is received by the BS, Algorithm 2 is used to directly estimate the IQI and nonlinear coefficients.

4. Performance Analysis

4.1. Performance Analysis of CTA_SWLS

Let H 0 k i represent the true value of H k i . Thus, the estimated CSI with k and N k subcarriers is
H ^ k i = ( A k H A k ) 1 p = 0 P 1 A k [ ( i p ) mod P ] H { A k [ ( i p ) mod P ] H 0 k i p + W k ( i p ) } .
Taking the expectation to Δ H ^ k i = H ^ k i H 0 k i yields
E [ Δ H ^ k i ] = ( A k H A k ) 1 p = 0 P 1 A k [ ( i p ) mod P ] H A k [ ( i p ) mod P ] ( E [ H 0 k i p ] E [ H 0 k i ] ) .
It can be seen from (37) that the unbiasedness of Algorithm 1 depends on the means of the past P 1 true CSI. If the CSI is a stationary process over P symbol periods, then E [ Δ H ^ k i ] = 0 , that is, Algorithm 1 is unbiased. It is assumed here that the channel is independent and identically distributed (IID), and h 0 i CN ( h ¯ , σ h 2 I N × N ) for each path; thus, H 0 i = DFT ( h 0 i ) CN ( H ¯ , N σ h 2 I N × N ) , where h 0 i and H 0 i denote the true CSI time-domain and frequency-domain vectors, respectively. h ¯ and H ¯ denote their respective means.
Then, the autocorrelation matrix of the channel error is given in the form of (38):
R k = E [ Δ H ^ k i Δ H ^ k i H ] = ( A k H A k ) 1 p = 0 P A k ( p ) H A k ( p ) A k ( p ) H A k ( p ) ( A k H A k ) 1 σ k 2 + σ k 2 I I ( A k H A k ) 1 A k [ i mod P ] H A k [ i mod P ] + A k [ i mod P ] H A k [ i mod P ] ( A k H A k ) 1 σ k 2 I I + 2 ( A k H A k ) 1 N σ w d o w n _ r 2 I I I ,
where σ k 2 = N σ h 2 1 k N 2 1 N σ h 2 / 2 k = 0 , N 2 . In (38), I is a fixed item, while II is an item with a period P. Both are generated by channel jitter, and III is generated by AWGN.

4.2. Error Propagation

In this subsection, the performance of Algorithm 2 in Step 4 is described. CSI estimation and quantization errors and demodulation errors in case A, as well as errors arising from pre-equalization in case B, are ignored. Before that, consideration of error propagation is necessary. In the scheme, error propagation affects the estimation of the terminal IQI and nonlinear parameters at the BS.

4.2.1. Case A

The received signal at the BS is
r = S 0 b 0 h 0 + n .
After removing the impact of the CSI, r is now turned into r ^ in the estimated version of (21). Then, an FFT is implemented on both sides:
N F r ^ = N Fr N F h ^ = N F S 0 b 0 N F h ^ N F h 0 + N Fn N F h ^ = ( 1 1 + F Δ h / F h 0 ) N F S 0 b 0 + ( 1 1 + F Δ h / F h 0 ) N Fn ,
where 1 N = [ 1 , 1 , , 1 ] 1 × N T .

4.2.2. Case B

The pre-equalization effect satisfies
S ^ b 0 h ^ + n = ( S 0 + Δ S ) b 0 ( h 0 + Δ h ) + n = S 0 b 0 h 0 + n = S 0 b 0 + n = r .
Then,
r ^ = ( S 0 + Δ S ) b 0 h 0 + n = r + Δ S b 0 h 0 = r S ^ b 0 Δ h .
An FFT is implemented on both sides of the estimated version of (29):
N F r ^ = N Fr N F S ^ b 0 N F Δ h = ( 1 1 + F Δ h / F h 0 ) N F S 0 b 0 + N Fn .
It can be seen that apart from the noise items, the two received signals at the BS are equivalent to the convolution of the received signal and IDFT ( F h 0 F h 0 + F Δ h ) after removing the CSI in both case A and case B. The factor vector is determined by the CSI estimation error of CTA_SWLS and the true CSI value. Note that the pre-equalization does not introduce new errors in case B, it just propagates the estimation error of the CSI. The only difference between the two cases is the noise effect.
Each element of the factor vector F h 0 F h 0 + F Δ h follows a reciprocal normal distribution, with F Δ h obeying a gaussian distribution. Its expectation exists and is a scaled Faddeeva function whose exact expression depends on the sign of the imaginary part Im ( F h 0 ) [26]. Accordingly, the precise analysis of the factor vector’s impact on the estimation error in Algorithm 2 is intractable. Here, we consider a moderate condition, Δ h 0 ; then, F h 0 F h 0 + F Δ h 1 F Δ h F h 0 .

4.3. Performance Analysis of Algorithm 2

A detailed mathematical analysis of the performance of Algorithm 2 in case A and case B can be found in Appendix A.

4.4. Complexity Analysis

Here, we consider a time-complexity analysis based on the number of multiplications. In Step 3, the FFTs of P training sequences and B k = ( A k H A k ) 1 are calculated offline. A total of P FFTs are required during the coherence time, and N 2 log 2 N multiplications are acquired per FFT. There are ( N 2 + 1 ) parallel calculations, with each requiring [ 4 P + O ( 8 ) ] multiplications.
However, during each symbol period, only Y k i is needed for online calculation. Then, the iterations in Algorithm 1 are executed in parallel. Lastly, an IFFT is implemented for H ^ i . Therefore, a total of N log 2 N + 6 multiplications are required online.
In case B, pre-equalization is a parallel calculation of a system of N equations. Each equation requires only K M + 2 complex multiplications, where K is the number of iterations of the Newton–Raphson method. For the implementation of Algorithm 2 in Step 4, { 2 K 1 [ ( M 2 + 1 ) N + M ( N + 2 ) + 4 ] + M N ( 2 M + 1 ) } K 2 complex multiplications are needed. K 1 and K 2 denote the numbers of internal and external iterations in Algorithm 2, respectively.

5. Simulation and Analysis

In this section, simulations, analysis, and confirmation of the effectiveness of the proposed scheme are provided. The following simulation configuration was used: OFDM signals were sent at the BS and terminal, the number of subcarriers was N = 1024 , N c p = 16 , f s = 1 / T s = 10 MHz, and 64-QAM modulation was adopted in each subcarrier. The carrier frequency was f c = 2 GHz, the relative movement velocity was 300 km/h, and P = 7 satisfied P ( T + T c p ) < T c = 0.423 f m 7.6 × 10 4 s . In step 3 of case A, quantification errors were ignored, and the CSI was coded by using BPSK modulation for each subcarrier. Therefore, the BS demodulation error was not considered here. The time-varying channels were set up as independent Gaussian processes, and σ w d o w n _ r 2 = σ 2 . The SNR was defined as follows:
SNR = i = 0 N 1 d i 2 N σ 2 .
The MSE was used as a performance indicator:
MSE [ ν ^ ] = 10 l o g ( E ν ^ ν 0 2 ) .
The proposed scheme is labeled as 1 in subscript, the method from [17] is labeled as 2, and the method from [21] is labeled as 3. A total of 1000 independent trials were implemented per setting.

5.1. CSI Tracking via CTA_SWLS in Step 3

In this subsection, we simulate cyclically sending P consecutive but different training sequences to the terminal. β 1 ( 5 , 0.3 ) = 0 . 5425 j 0 . 1438 , β 2 ( 5 , 0.3 ) = 0 . 4575 j 0 . 1438 , h ¯ = 1 , 0 . 5 , 0 . 2 , 0 . 1 , 0 . 3 T .
In Figure 4, one can see that the SNR difference did not significantly change the tracking performance. This performance was relatively more affected by the jitter of the channel itself. The reason for this was that the smoothing effect of RLS brought the tracking curve closer to the steady-state value of the channel, and the additive noise was effectively suppressed by using P training sequences to track the channel. Meanwhile, the time-varying nature of the P training sequences themselves had a larger cumulative impact on the tracking accuracy of the current symbol period. Thereby, the jitter of the channel had a greater impact on the tracking performance compared to the noise effect.
Figure 5 demonstrates the tracking performance of CTA_SWLS according to the MSE. Different noise levels only affected the mean value of the deviation, as shown by, for example, the fixed distance between the two curves at the top and bottom of Figure 5a,b, which was consistent with III in (38). However, the magnitude of the deviation was only affected by the channel jitter, which agreed with I and II in (38). In addition, the curves exhibited a cyclic pattern of the downlink with respect to the number of training sequences due to the cyclical sending of P sequences, which was in agreement with II of (38). Therefore, the theoretical variance of CTA_SWLS given by (38) was confirmed through this simulation.

5.2. IQI and PA Nonlinearity Estimation Performance via IQINSEA in Case A and Case B

Figure 6, Figure 7 and Figure 8 show the MSE performance curves versus the SNR for IQINSEA in the two cases. The IQI and PA nonlinearity parameters were configured as follows: strong IQI and strong PA nonlinearity in Figure 6, strong IQI and weak PA nonlinearity in Figure 7, and weak IQI and strong PA nonlinearity in Figure 8. It was considered that the proposed scheme had to estimate the CSI first for both cases before the IQI and PA nonlinearity could be estimated by using IQINSEA. To facilitate fair comparisons, the ideal CSI was provided for method 2 and method 3; otherwise, the estimation performance of these two algorithms would be worse. Under this condition, since method 2 did not have the ability to estimate the PA nonlinearity and method 3 could not estimate the IQI, method 2 was only involved in the estimation of the IQI, and method 3 was only involved in the estimation of the PA nonlinearity.
In Figure 6, it can be observed that, in the strong IQI scenarios, the PA nonlinearity estimation with method 3 hardly improved as the SNR grew (Figure 6 and Figure 7) because this method did not take the IQI into account, although there was some improvement in the weak IQI scenario (Figure 8). Accordingly, it can be seen that the effect of the IQI on the estimation performance of method 3 was relatively large. Note that the MSE performance of method 2 hardly varied with the SNR in all of the scenarios because this method is prone to local minima and does not consider the PA nonlinearity. These results were obtained with the assumption that the CSI was known at the BS for methods 2 and 3. Otherwise, the estimated errors would be even larger.
Nevertheless, of all of the scenarios, our proposed scheme was the most efficient among the three methods, i.e., it had a lower MSE and was closer to the CRLB. Another noteworthy aspect is that the MSE curves slowly decreased as the SNR grew, especially in the high-SNR regime. Note that the MSEs in case B were slightly lower than those in case A, especially with a low SNR, which verified the conclusion given in Section 4. This is because when the CSI was estimated, it was placed at the transmitter to directly remove the effect of the CSI on the system; then, the signal without the impact of the CSI was transmitted, i.e., case B. On the contrary, the CSI was further distorted in transmission, resulting in the removal of the impact of the CSI on the system at the receiver, thus making the error of the system larger, i.e., case A.

6. Conclusions

In this study, two important features of a transmitter, i.e., IQI and PA nonlinearity, were utilized, and these are generated by the nonlinear circuit of the RF front-end at the terminal. They are detrimental to the efficiency of data transmission, but due to their uniqueness and long-term invariance, they can be used as RF fingerprints of a transmitter for terminal identification. This study focuses on the problem of extracting the IQI and PA nonlinearity of a transmitter efficiently and separately in the presence of multiple paths for TDD OFDM systems.
Via system modeling, it was found that only a single transmission could not yield a unique solution due to the coexistence of the IQI, PA nonlinearity, and multiple paths. To address this intractable problem, we proposed a scheme for independently estimating the IQI and nonlinearity, and this involved two round trips with four steps.
Once the training sequences from the BS were received, the real-time CSI was first estimated/tracked at the terminal by using the CTA_SWLS algorithm. The procedures were then divided into different parts for the two cases. In case A, the IQI and PA nonlinearity were unknown at the terminal; in case B, the IQI and PA nonlinearity were known at the terminal. In the two cases, the treatments for removing the impact of the CSI were distinct. Finally, the IQI and PA nonlinearity were estimated at the receiver by using IQINSEA.
With the theoretical analysis, the CSI tracking performance of CTA_SWLS was given. The influence of error propagation on further processing stages was given for both cases. Then, the approximate unbiasedness of the estimation algorithm was theoretically proven, and the variances of IQINSEA were given with the CRLB for both cases. The numerical results show the efficiency of the scheme in comparison with existing techniques in the literature.

Author Contributions

Conceptualization, Y.H. and A.H.; methodology, Y.H.; software, J.F.; validation, Y.H., X.L. and Y.Z.; formal analysis, Y.H. and H.T.; investigation, Y.H. and J.F.; resources, H.T.; data curation, Y.H. and H.T.; writing—original draft preparation, Y.H.; writing—review and editing, A.H.; visualization, X.L. and Y.Z.; supervision, A.H.; project administration, Y.H.; funding acquisition, A.H. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported in part by Jiangsu Provincial Key Laboratory of Network and Information Security (No. BM2003201), Natural Science Foundation of Jiangsu Province, China (Grant No. BK20201199).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Performance Analysis of Algorithm 2

Appendix A.1. Case A

To facilitate the analysis of unbiasedness and efficiency, we analyze an estimator under the condition that the others are known. In practice, the parameters interact with each other, and the results of this analysis will have some errors with respect to its real performance. However, if the effects of interaction are considered, the analysis will be intractable due to its complexity. Considering the unbiasedness of v x , it is first provided that v y , u, and b are known. Once the iterations converge to the optimal value, it is required that
( b H S H Sb r H Sb b H S H r ) v x = b H ( S H v x S + S H S v x ) b r H S v x b b H S H v x r = 0 .
Substituting (21) into (A1), the following is given:
b H { S H v x [ S ( I F H Λ F ) S 0 ] + [ S ( I F H Λ F ) S 0 ] H S v x } b n H ( I F H Λ F ) H S v x b b H S H v x ( I F H Λ F ) n = 0 .
Since the presence of nonlinear components in the matrix S ( b m 0 , m > 1 ) leads to the presence of higher-order quantities that cannot be easily and directly calculated, we use the Taylor approximation and retain the linear and quadratic terms.
S S 0 i , m = S i , m v x 0 Δ v x + 1 2 2 S i , m v x 2 v x = ξ i , m ( Δ v x ) 2 ,
S v x i , m = S i , m v x 0 + 2 S i , m v x 0 2 Δ v x + 3 S i , m v x 3 v x = ξ i , m ( Δ v x ) 2 ,
where ξ i , m ( min v x , v x 0 , max v x , v x 0 ) . Let Δ H = N F Δ h , H = N F h 0 , Λ = diag { Δ H H } , and σ h 2 0 to simplify the derivation, and (A2) becomes (A5).
b H { S H v x [ S ( I F H Λ F ) S 0 ] + [ S ( I F H Λ F ) S 0 ] H S v x } b n H ( I F H Λ F ) H S v x b b H S H v x ( I F H Λ F ) n = 2 b H S H v x 0 S v x 0 b Δ v x + b H { S H v x F H Λ F S 0 + ( F H Λ F S 0 ) H S v x } b n H ( I F H Λ F ) H S v x b b H S H v x ( I F H Λ F ) n + O ( Δ v x ) = 2 b H S H v x 0 S v x 0 b Δ v x + b H { 2 S H v x 0 2 F H Λ F S 0 + ( F H Λ F S 0 ) H 2 S v x 0 2 } b Δ v x + b H { S H v x 0 F H Λ F S 0 + ( F H Λ F S 0 ) H S v x 0 } b n H ( I F H Λ F ) H S v x 0 b n H ( I F H Λ F ) H 2 S v x 0 2 b Δ v x b H S H v x 0 ( I F H Λ F ) n b H 2 S v x 0 2 H ( I F H Λ F ) n Δ v x + O ( Δ v x ) = 0
Ignoring higher-order infinitesimals and taking the expectation on both sides of (A5), the following is obtained:
2 b H ( S H v x 0 S v x 0 ) b E [ Δ v x ] 0 .
This holds for any d , and E [ Δ v x ] = 0 is obtained. So, under weak nonlinearity, the estimate of v x is approximately unbiased. Similarly to the above derivation, v y , u, and b are also evidently unbiased. That is, Algorithm 2 is approximately unbiased in case A.
Let Ξ = N F h ¯ h ¯ H F H , Ξ = N F h ¯ h ¯ T F T . Ignoring higher-order infinitesimals and taking the variance on both sides of (A5), E [ Δ v x ] = 0 and E [ n ] = 0 are substituted. ν and n are independent. We obtain the variance of Δ v x through (A7).
D A [ Δ v x ] = E [ Δ v x 2 ] = 2 E [ b H S H v x 0 ( I F H Λ F ) ( I F H Λ F ) H S v x 0 b ] σ 2 + E { b H [ S H v x 0 F H Λ F S 0 + ( F H Λ F S 0 ) H S v x 0 ] b } 2 2 b H S H v x 0 S v x 0 b 2 + E { b H [ 2 S H v x 0 2 F H Λ F S 0 + ( F H Λ F S 0 ) H 2 S v x 0 2 ] b } 2 + 2 E [ b H 2 S H v x 0 2 ( I F H Λ F ) ( I F H Λ F ) H 2 S v x 0 2 b ] σ 2 2 b H S H v x 0 S v x 0 b σ 2 + 2 b H S H v x 0 ( F H Λ F ) S v x 0 b σ 2 + v x 2 b H S H v x 0 S v x 0 b 2 + 2 b H 2 S H v x 0 2 2 S v x 0 2 b σ 2 + 2 b H 2 S H v x 0 2 ( F H Λ F ) 2 S v x 0 2 b σ 2 + v x ν = ν 0 ,
where v x and v x are given by
v x = 2 b H S H v x 0 F H ( F S 0 b b H S 0 H F H Λ ) F S v x 0 b + 2 Re [ b H S H v x 0 F H ( F S 0 b b H S H v x 0 F H Λ ) F S 0 b ] ,
v x = 2 b H 2 S H v x 0 2 F H ( F S 0 b b H S 0 H F H Λ ) F 2 S v x 0 2 b + 2 Re [ b H 2 S H v x 0 2 F H ( F S 0 b b H 2 S H v x 0 2 F H Λ ) F S 0 b ] ,
where 2 S i , m v x 2 and 2 S i , m v y 2 are given in (A10) and (A11), respectively.
2 S i , m v x 2 = m ( 1 v y 2 + j v x v y 1 v y 2 ) d i + v d i * 2 ( m 1 ) q 1 [ m q 1 ( u d i + v d i * ) * + j v y 1 v y 2 d i + d i * ] + u d i + v d i * 2 m [ m q 1 v x ( u d i + v d i * ) * m q 1 ( u d i + v d i * ) * 2 ( j v y 1 v y 2 d i * + d i ) ] = ( 2 S m , i H v x 2 ) * ,
2 S i , m v y 2 = m ( 1 v y 2 + j v x v y 1 v y 2 ) d i + v d i * 2 m 2 q 2 [ m q 2 ( u d i + v d i * ) * + [ v y 1 v y 2 + j v x ( 1 v y 2 ) 3 ] d i + j d i * ] + ( 1 v y 2 + j v x v y 1 v y 2 ) d i + v d i * 2 m { m q 2 v y ( u d i + v d i * ) * m q 2 ( u d i + v d i * ) * 2 { [ v y 1 v y 2 j v x ( 1 v y 2 ) 3 ] d i * j d i } + [ ( 1 1 v y 2 + v y 2 ( 1 v y 2 ) 3 ) + j 3 v x v y ( 1 v y 2 ) 5 ] d i } .
Here,
q 1 v x = 2 1 v y 2 d i 2 + j 2 v y 1 v y 2 d i 2 j 2 v y 1 v y 2 d i * 2 ,
q 2 v y = [ 6 v y 2 v x 2 + 2 v x 2 ( 1 v y 2 ) 3 2 ] d i 2 + 1 1 v y 2 [ 2 v x v y 2 + v x ( 1 v y 2 ) 2 + j ( 3 v y 2 v y 3 1 v y 2 + 3 v x 2 v y ( 1 v y 2 ) 2 ) ] d i 2 + 1 1 v y 2 [ 2 v x v y 2 + v x ( 1 v y 2 ) 2 j ( 3 v y 2 v y 3 1 v y 2 + 3 v x 2 v y ( 1 v y 2 ) 2 ) ] d i * 2 .
Λ and Λ in (A8) and (A9) are given as in (A14) and (A15), respectively.
Λ = diag { R 0 ( 0 , 0 ) + R 0 ( 1 , 1 ) Ξ ( 0 , 0 ) , R 1 ( 0 , 0 ) Ξ ( 1 , 1 ) , , R N / 2 1 ( 0 , 0 ) Ξ ( N / 2 1 , N / 2 1 ) , R N / 2 ( 0 , 0 ) + R N / 2 ( 1 , 1 ) Ξ ( N / 2 , N / 2 ) , R N / 2 1 ( 1 , 1 ) Ξ ( N / 2 + 1 , N / 2 + 1 ) , , R 1 ( 1 , 1 ) Ξ ( N 1 , N 1 ) }
Λ = R 0 ( 0 , 0 ) R 0 ( 1 , 1 ) + 2 j R 0 ( 0 , 1 ) Ξ ( 0 , 0 ) 0 R 1 ( 0 , 1 ) Ξ ( 1 , N 1 ) 0 N / 2 1 R ( 0 , 1 ) Ξ ( N / 2 1 , N / 2 + 1 ) N / 2 R ( 0 , 0 ) N / 2 R ( 1 , 1 ) + 2 j N / 2 R ( 0 , 1 ) Ξ ( N / 2 , N / 2 ) N / 2 1 R ( 0 , 1 ) Ξ ( N / 2 1 , N / 2 + 1 ) 0 R 1 ( 0 , 1 ) Ξ ( 1 , N 1 ) 0
Similarly, the variance of Δ v y is given by (A16):
D A [ Δ v y ] = E [ Δ v y 2 ] 2 b H S H v y 0 S v y 0 b σ 2 + 2 b H S H v y 0 ( F H Λ F ) S v y 0 b σ 2 + v y 2 b H S H v y 0 S v y 0 b 2 + 2 b H 2 S H v y 0 2 2 S v y 0 2 b σ 2 + 2 b H 2 S H v y 0 2 ( F H Λ F ) 2 S v y 0 2 b σ 2 + v y ν = ν 0 ,
where v y and v y are similar to v x and v x , respectively. So, the mean square error (MSE) of v ^ is given by
MSE A [ v ^ ] = E [ Δ v 2 ] = D A [ Δ v x ] + D A [ Δ v y ] ,
where D A [ Δ v y ] is similar to D A [ Δ v x ] .
From (23) and (A2), it follows that
b ^ A = ( S R H S R ) 1 S R H [ ( I F H Λ F ) S 0 b 0 + ( I F H Λ F ) n s ] .
The expectation is taken on both sides of
E [ Δ b ^ A ] = E [ b ^ A b 0 ] = 0 .
Accordingly, the autocorrelation matrix of Δ b ^ A is given as in (A20).
E Δ b ^ A Δ b ^ A H = ( S R H S R ) 1 S R H F H ( F S 0 b 0 b 0 H S 0 H F H Λ ) F S R ( S R H S R ) 1 + ( S R H S R ) 1 σ 2 + ( S R H S R ) 1 S R H F H Λ F S R ( S R H S R ) 1 σ 2 ν = ν 0
Note that, actually, the MSE will be larger than the above result if interactions are considered.
The variance of any unbiased estimator can only approximate the CRLB without restriction and not go below it; thus, we derive the CRLB of the model for comparative analyses here. The conditional probability density function (CPDF) of r ^ is shown as in (A21).
pdf ( r ^ ; ν ) = 1 π N d e t [ ( I F H Λ F ) ( I F H Λ F ) H ] σ 2 exp { 1 σ 2 [ r ^ ( I F H Λ F ) Sb ] H [ ( I F H Λ F ) ( I F H Λ F ) H ] 1 × [ r ^ ( I F H Λ F ) Sb ] }
Let L F A = ln pdf ( r ^ ; ν ) . It can be seen in (A21) that the CPDF satisfies the regularity conditions E L F A ν = 0 among all of the available estimates. Accordingly, a minimum-variance unbiased estimator is attained, that is, the CRLB. The Fisher information matrix is obtained as
I [ ν ] A = E 2 L F A ν i ν j * ν = ν 0 ,
where
E 2 L F A v x 2 = 2 b H S H v x S v x b σ 2
E 2 L F A v y 2 = 2 b H S H v y S v y b σ 2
E 2 L F A b b H = S R H S R σ 2
E 2 L F A v x v y = b H S H v x S v y b + b H S H v y S v x b σ 2
E 2 L F A b v x = S R H S v x b σ 2 , E 2 L F A b v y = S R H S v y b σ 2 .
So, the CRLB in case A is equal to CRL B A = I [ ν ] A 1 . Straightforwardly, the minimum variances of v and b in case A are given by
CRL B A v = [ CRL B A ] 1 , 1 + [ CRL B A ] 2 , 2
CRL B A b = [ CRL B A ] 3 : M + 1 , 3 : M + 1 .

Appendix A.2. Case B

Here, Equation (A2) becomes
b H { S H v x [ S ( I F H Λ F ) S 0 ] + [ S ( I F H Λ F ) S 0 ] H S v x } b n H S v x b b H S H v x n = 0 .
In a similar derivation to that for case A, we find that Algorithm 2 is also approximately unbiased in case B.
D B [ Δ v x ] = E [ Δ v x 2 ] = 2 b H S H v x 0 S v x 0 b σ 2 + v x 2 b H S H v x 0 S v x 0 b 2 + 2 b H 2 S H v x 0 2 2 S v x 0 2 b σ 2 + v x ν = ν 0
MSE B [ v ^ ] = D B [ Δ v x ] + D B [ Δ v y ] ,
where D B [ Δ v y ] is similar to D B [ Δ v x ] .
The CPDF of r ^ is given as
pdf ( r ^ ; ν ) = 1 π N σ 2 exp 1 σ 2 [ r ^ ( I F H Λ F ) Sb ] H [ r ^ ( I F H Λ F ) Sb ] .
Let L F B = ln pdf ( r ^ ; ν ) . After a similar derivation, this yields
E 2 L F B v x 2 = 2 b H S H v x S v x b + 2 b H S H v x ( F H Λ F ) S v x b σ 2
E 2 L F B v y 2 = 2 b H S H v y S v y b + 2 b H S H v y ( F H Λ F ) S v y b σ 2
E 2 L F B b b H = S R H S R + S R H F H Λ F S R σ 2
E 2 L F B v x v y = 1 σ 2 b H S H v x S v y b + b H S H v y S v x b + b H S H v x ( F H Λ F ) S v y b + b H S H v y ( F H Λ F ) S v x b
E 2 L F B b v x = S R H S v x b + S R H ( F H Λ F ) S v x b σ 2
E 2 L F B b v y = S R H S v y b + S R H ( F H Λ F ) S v y b σ 2 .
Straightforwardly, the CRLB in case B is achieved as in (A28).
Obviously, I [ ν ] B I [ ν ] A , where the notation ≺ means that Δ A B = I [ ν ] B I [ ν ] A is a positive-definite matrix. Δ A B consists of elements that satisfy ( F H Λ F ) . Straightforwardly, CRL B B CRL B A . The reason for this is that any prior knowledge at the transceivers should achieve the performance gain illustrated in case B.
Another point to note is that due to the relationship between u and v in (27), both the MSE and CRLB for u are given as follows. From (27) and using u = u 0 + u 0 T Δ v + O ( Δ v ) , where u 0 = j v y 1 v y 2 v y 1 v y 2 + j v x 1 v y 2 3 v = v 0 and Δ v = v x v x 0 v y v y 0 , ignoring higher-order infinitesimals yields
MSE [ Δ u ] = MSE [ u u 0 ] u 0 H MSE [ Δ v ] u 0 ,
in which the MSE can be replaced by the CRLB for case A and case B.

References

  1. Li, G.; Hu, L.; Staat, P.; Elders-Boll, H.; Zenger, C.; Paar, C.; Hu, A. Reconfigurable Intelligent Surface for Physical Layer Key Generation: Constructive or Destructive? IEEE Wirel. Commun. 2022, 29, 146–153. [Google Scholar] [CrossRef]
  2. Li, G.; Sun, C.; Xu, W.; Renzo, M.D.; Hu, A. On Maximizing the Sum Secret Key Rate for Reconfigurable Intelligent Surface-Assisted Multiuser Systems. IEEE Trans. Inf. Forensics Secur. 2022, 17, 211–225. [Google Scholar] [CrossRef]
  3. Li, G.; Sun, C.; Jorswieck, E.A.; Zhang, J.; Hu, A.; Chen, Y. Sum Secret Key Rate Maximization for TDD Multi-User Massive MIMO Wireless Networks. IEEE Trans. Inf. Forensics Secur. 2021, 16, 968–982. [Google Scholar] [CrossRef]
  4. Danev, B.; Zanetti, D.; Capkun, S. On physical-layer identification of wireless devices. ACM Comput. Surv. (CSUR) 2012, 45, 1–29. [Google Scholar] [CrossRef]
  5. Fadul, M.K.; Reising, D.R.; Sartipi, M. Identification of OFDM-based radios under rayleigh fading using RF-DNA and deep learning. IEEE Access 2021, 9, 17100–17113. [Google Scholar] [CrossRef]
  6. Zha, X.; Chen, H.; Li, T.; Qiu, Z.; Feng, Y. Specific emitter identification based on complex Fourier neural network. IEEE Commun. Lett. 2021, 26, 592–596. [Google Scholar] [CrossRef]
  7. Tarighat, A.; Bagheri, R.; Sayed, A.H. Compensation schemes and performance analysis of IQ imbalances in OFDM receivers. IEEE Trans. Signal Process. 2005, 53, 3257–3268. [Google Scholar] [CrossRef]
  8. Tarighat, A.; Sayed, A.H. Joint compensation of transmitter and receiver impairments in OFDM systems. IEEE Trans. Wirel. Commun. 2007, 6, 240–247. [Google Scholar] [CrossRef]
  9. Kolomvakis, N.; Matthaiou, M.; Coldrey, M. IQ imbalance in multiuser systems: Channel estimation and compensation. IEEE Trans. Commun. 2016, 64, 3039–3051. [Google Scholar] [CrossRef]
  10. Chen, L.; Helmy, A.G.; Yue, G.; Li, S.; Al-Dhahir, N. Performance analysis and compensation of joint TX/RX I/Q imbalance in differential STBC-OFDM. IEEE Trans. Veh. Technol. 2016, 66, 6184–6200. [Google Scholar] [CrossRef]
  11. Chen, L.; Helmy, A.G.; Yue, G.; Li, S.; Al-Dhahir, N. Performance and compensation of I/Q imbalance in differential STBC-OFDM. In Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 4–8 December 2016; IEEE: Piscataway Township, NJ, USA, 2016; pp. 1–7. [Google Scholar]
  12. Zhang, X.; Li, H.; Liu, W.; Qiao, J. Iterative IQ imbalance compensation receiver for single carrier transmission. IEEE Trans. Veh. Technol. 2017, 66, 8238–8248. [Google Scholar] [CrossRef]
  13. Cheng, H.; Xia, Y.; Huang, Y.; Yang, L.; Mandic, D.P. Joint channel estimation and Tx/Rx I/Q imbalance compensation for GFDM systems. IEEE Trans. Wirel. Commun. 2019, 18, 1304–1317. [Google Scholar] [CrossRef]
  14. Canbilen, A.E.; Ikki, S.S.; Basar, E.; Gultekin, S.S.; Develi, I. Joint impact of I/Q imbalance and imperfect CSI on SM-MIMO systems over generalized Beckmann fading channels: Optimal detection and Cramer-Rao bound. IEEE Trans. Wirel. Commun. 2020, 19, 3034–3046. [Google Scholar] [CrossRef]
  15. Chen, Y.; You, L.; Lu, A.A.; Gao, X.; Xia, X.G. Channel estimation and robust detection for IQ imbalanced uplink massive MIMO-OFDM with adjustable phase shift pilots. IEEE Access 2021, 9, 35864–35878. [Google Scholar] [CrossRef]
  16. Chen, Y.; You, L.; Lu, A.A.; Gao, X. Widely-linear processing for the uplink of the massive MIMO with IQ imbalance: Channel estimation and data detection. IEEE Trans. Signal Process. 2021, 69, 4685–4698. [Google Scholar] [CrossRef]
  17. Cheng, X.; Luo, Z. Compensation of transmitter I/Q imbalance in millimeter-wave SC-FDE systems. IEEE Trans. Veh. Technol. 2016, 66, 4472–4476. [Google Scholar] [CrossRef]
  18. Cheng, X.; Yang, Y.; Li, S. Joint compensation of transmitter and receiver I/Q imbalances for SC-FDE systems. IEEE Trans. Veh. Technol. 2020, 69, 8483–8498. [Google Scholar] [CrossRef]
  19. Aparin, V. Analysis of CDMA signal spectral regrowth and waveform quality. IEEE Trans. Microw. Theory Tech. 2001, 49, 2306–2314. [Google Scholar] [CrossRef]
  20. Gard, K.G.; Larson, L.E.; Steer, M.B. The impact of RF front-end characteristics on the spectral regrowth of communications signals. IEEE Trans. Microw. Theory Tech. 2005, 53, 2179–2186. [Google Scholar] [CrossRef]
  21. Liu, M.W.; Doherty, J.F. Nonlinearity estimation for specific emitter identification in multipath channels. IEEE Trans. Inf. Forensics Secur. 2011, 6, 1076–1085. [Google Scholar]
  22. Pan, Y.; Yang, S.; Peng, H.; Li, T.; Wang, W. Specific emitter identification based on deep residual networks. IEEE Access 2019, 7, 54425–54434. [Google Scholar] [CrossRef]
  23. Liu, W.; Li, X.; Huang, Z.; Wang, X. Transmitter fingerprinting for VLC systems via deep feature separation network. IEEE Photonics J. 2021, 13, 1–7. [Google Scholar] [CrossRef]
  24. Li, J.; Matthaiou, M.; Svensson, T. I/Q imbalance in two-way AF relaying. IEEE Trans. Commun. 2014, 62, 2271–2285. [Google Scholar] [CrossRef]
  25. Rappaport, T.S. Wireless Communications: Principles and Practice, 2nd ed.; Pearson Education: Upper Saddle River, NJ, USA, 2010. [Google Scholar]
  26. Lecomte, C. Exact statistics of systems with uncertainties: An analytical theory of rank-one stochastic dynamic systems. J. Sound Vib. 2013, 332, 2750–2776. [Google Scholar] [CrossRef]
Figure 1. TX and RX block diagrams with IQI at the terminal. (a) Block diagram of the TX IQI at the terminal. (b) Block diagram of the RX IQI at the terminal.
Figure 1. TX and RX block diagrams with IQI at the terminal. (a) Block diagram of the TX IQI at the terminal. (b) Block diagram of the RX IQI at the terminal.
Electronics 12 04108 g001
Figure 2. Block diagram of CSI tracking based on the sliding-window LS (CTA_SWLS) at the terminal.
Figure 2. Block diagram of CSI tracking based on the sliding-window LS (CTA_SWLS) at the terminal.
Electronics 12 04108 g002
Figure 3. Block diagram of the proposed scheme. (a) Case A: IQI and PA nonlinearity are unknown at the terminal. (b) Case B: IQI and PA nonlinearity are known at the terminal.
Figure 3. Block diagram of the proposed scheme. (a) Case A: IQI and PA nonlinearity are unknown at the terminal. (b) Case B: IQI and PA nonlinearity are known at the terminal.
Electronics 12 04108 g003
Figure 4. Tracking performance of CTA_SWLS for each channel tap. (a) σ h = 0.02 , SNR = 5 dB. (b) σ h = 0.02 , SNR = 20 dB. (c) σ h = 0.005 , SNR = 5 dB. (d) σ h = 0.005 , SNR = 20 dB.
Figure 4. Tracking performance of CTA_SWLS for each channel tap. (a) σ h = 0.02 , SNR = 5 dB. (b) σ h = 0.02 , SNR = 20 dB. (c) σ h = 0.005 , SNR = 5 dB. (d) σ h = 0.005 , SNR = 20 dB.
Electronics 12 04108 g004
Figure 5. Tracking performance of CTA_SWLS according to the MSE. (a) σ h = 0.01 , SNR = 10 dB/15 dB/+. (b) σ h = 0.2 , SNR = 10 dB/15 dB/+.
Figure 5. Tracking performance of CTA_SWLS according to the MSE. (a) σ h = 0.01 , SNR = 10 dB/15 dB/+. (b) σ h = 0.2 , SNR = 10 dB/15 dB/+.
Electronics 12 04108 g005
Figure 6. MSE curves for the three methods, as well as the CRLB. σ h = 0.02 . ν was set as follows: [ 1 , 0.3 , 0.2 + j 0.3 , j 0.1 ] , v ( 10 , 0.2 ) , u ( 10 , 0.2 ) T .
Figure 6. MSE curves for the three methods, as well as the CRLB. σ h = 0.02 . ν was set as follows: [ 1 , 0.3 , 0.2 + j 0.3 , j 0.1 ] , v ( 10 , 0.2 ) , u ( 10 , 0.2 ) T .
Electronics 12 04108 g006
Figure 7. MSE curves for the three methods, as well as the CRLB. σ h = 0.02 . ν was set as follows: [ 1 , 0.4 ] , v ( 10 , 0.2 ) , u ( 10 , 0.2 ) T .
Figure 7. MSE curves for the three methods, as well as the CRLB. σ h = 0.02 . ν was set as follows: [ 1 , 0.4 ] , v ( 10 , 0.2 ) , u ( 10 , 0.2 ) T .
Electronics 12 04108 g007
Figure 8. MSE curves for the three methods, as well as the CRLB. σ h = 0.02 . ν was set as follows: [ 1 , 0.3 , 0.2 + j 0.3 , j 0.1 ] , v ( 0.1 , 0.01 ) , u ( 0.1 , 0.01 ) T .
Figure 8. MSE curves for the three methods, as well as the CRLB. σ h = 0.02 . ν was set as follows: [ 1 , 0.3 , 0.2 + j 0.3 , j 0.1 ] , v ( 0.1 , 0.01 ) , u ( 0.1 , 0.01 ) T .
Electronics 12 04108 g008
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Huang, Y.; Hu, A.; Fan, J.; Tian, H.; Li, X.; Zheng, Y. An Efficient Transmitter Feature Extraction Scheme with IQ Imbalance and Nonlinearity in TDD OFDM Systems. Electronics 2023, 12, 4108. https://doi.org/10.3390/electronics12194108

AMA Style

Huang Y, Hu A, Fan J, Tian H, Li X, Zheng Y. An Efficient Transmitter Feature Extraction Scheme with IQ Imbalance and Nonlinearity in TDD OFDM Systems. Electronics. 2023; 12(19):4108. https://doi.org/10.3390/electronics12194108

Chicago/Turabian Style

Huang, Yi, Aiqun Hu, Jiayi Fan, Huifeng Tian, Xuebao Li, and Yanfang Zheng. 2023. "An Efficient Transmitter Feature Extraction Scheme with IQ Imbalance and Nonlinearity in TDD OFDM Systems" Electronics 12, no. 19: 4108. https://doi.org/10.3390/electronics12194108

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop