1. Introduction
With the development of B5G and 6G communication technologies, the physical-layer security of communication is becoming increasingly important, not only for future mobile communication systems but also for the internet of things (IoT) [
1,
2,
3]. Security mechanisms that do not need to be built by using cryptography-based means in the upper layers and that rely solely on inherent physical-layer characteristics have their own unique characteristics, such as the inherent fingerprints of electronic components in transmitters, design defects or vulnerabilities in components in circuits, and the open propagation of electromagnetic waves in wireless communications [
4]. In-phase/quadrature-phase imbalance (IQI) and power amplifier (PA) nonlinearity are two key transmitter characteristics that are relatively stable over the long term and vary from device to device [
5,
6]. They are harmful for data transmission, but are unique to each transmitter for use as a radio frequency (RF) fingerprint. Therefore, it is intuitive to use the transmitter IQI and PA nonlinearity as the RF fingerprint of a transmitter.
IQI estimation is always found in the field of channel equalization and is used to compensate for the distortion of the received signal generated by the IQI. A large number of methods based on linear technology have already been extensively discussed. In [
7,
8], Alireza Tarighat proposed the least squares (LS) and adaptive equalization method for estimating the combination of transmitter and receiver IQI and channel state information (CSI) to compensate for the resulting transceiver performance degradation. The CSI and IQI were independently estimated based on the pilot by using linear estimation technology in a multiuser single-input–multiple-output (MU-SIMO) system; first, the linear minimum mean squared error (LMMSE) was used to estimate the CSI, and then LS was used to estimate the IQI, thus achieving the separation of the CSI and IQI parameters due to the assumption of IQI at the receiver only [
9]. The transmitter (TX) and receiver (RX) IQI compensation problem in differential space–time block-coded orthogonal frequency division multiplexing (STBC-OFDM) systems was studied in [
10] and developed further in [
11]; the TX and RX IQIs were extracted by employing an algorithm based on a widely linear estimation. An iterative decision feedback (DFB) receiver was proposed to compensate for the IQI due to imperfections in the transceiver RF link for a single carrier with a frequency-domain equalization (SC-FDE) system [
12]. This method was a nonlinear compensation method that could greatly improve the equalization performance of an SC-FDE system under IQI compared to the above-mentioned approaches. The authors of [
13] used an iterative nonlinear least squares (NLS) method to jointly estimate the IQI in the TX, RX, and channels for generalized orthogonal frequency-division multiplexing (GFDM) systems. Ayse Elif Canbilen [
14] investigated the impact of the IQI under generalized Beckmann fading channels for SM-MIMO systems, and both TX and RX IQIs were involved. A performance analysis of the effective channel estimation (e.g., the joint effect of the IQI and channel) and MMSE-based estimation was conducted in [
15,
16], where the RX IQI was considered in uplink MIMO-OFDM systems. Xiantao Cheng addressed two similar algorithms for estimating the IQI and CSI. One was a sequential estimation algorithm for determining the transmitter IQI and CSI [
17], and the other was an EM-based estimation algorithm for determining the transceiver IQI and CSI [
18]. Unlike previous methods, they were able to obtain separate estimates of the IQI and CSI. However, our simulation studies showed that these algorithms tended to fall into local minima.
The various methods mentioned above are able to effectively combat performance degradation due to IQI in direct conversion systems, but none of them take the PA nonlinearity of the transmitter into account. PA nonlinearity exists at the front-end of an RF link, and it distorts digitally modulated signals in wireless communications [
19,
20]. In addition to in-band distortion, the spectral regrowth of digitally modulated signals and adjacent channel interference are also produced by PA nonlinearity [
19,
20]. PA nonlinearity and IQI are always exploited in specific emitter identification (SEI) (also known as RF-distinct native attribute (RF-DNA) fingerprints) due to their uniqueness and long-term invariant nature [
4].
In [
21], Ming-Wei Liu extracted PA nonlinearity by using an alternate iterative LS estimation of the channel coefficients and distorted baseband signal to obtain this reliable characteristic in a transmitter based on a training sequence. However, this algorithm required a certain number of samples with a low-enough amplitude in the sequence; otherwise, severe performance degradation would be inevitable. Recently, many works have employed machine learning technology, such as classification algorithms and deep learning technology, to cope with SEI [
5,
6,
22,
23]. In such works, a number of simulated and practical trials were conducted, thus verifying the efficiency and reliability of their proposed methods. Nevertheless, unlike traditional approaches [
7,
8,
9,
10,
11,
12,
13,
14,
15,
16,
17,
18], machine learning is powerless in environments without samples, due to its requirements for learning.
In a word, in the previous literature, there are almost no algorithms that directly extract these two transmitter features separately, especially in the presence of multiple paths. The contributions of this study are summarized as follows:
We establish a feature model of the IQI and PA nonlinearity at the transmitter with multiple paths. Following a brief analysis, we reveal that it is not possible to separately extract the parameters from just one transmission. However, separately extracting IQI and PA nonlinearity under the impact of the CSI is necessary for robust feature extraction. To this end, we propose a scheme for separately estimating the IQI and PA nonlinearity, which involves two round trips with four steps.
The CSI is estimated/tracked via a sliding-window LS algorithm based on previously depicted training sequences in the first round trip. Then, the IQI and PA nonlinearity of the transmitter are obtained by utilizing a sequential iterative approach after removing the impact of the CSI in the second round trip. The scheme includes two cases: A: IQI and PA nonlinearity are unknown at the terminal; B: IQI and PA nonlinearity are known at the terminal. These have different procedures in steps 3 and 4. The terminal needs to send the coded CSI to the base station (BS) in order to eliminate the channel effect at the BS for case A. The latter deals with the channel effect directly via pre-equalization in step 3 so as to estimate the IQI and PA nonlinearity more simply at the BS for case B.
We also derive the performance expressions for the two cases and indicate the influence of CSI estimation/tracking. The results of the theoretical analysis show that the theoretical minimum variance in case B is lower than that in case A from the perspective of the Cramer–Rao lower bound (CRLB). In addition, the results of a numerical simulation verify the efficiency of the proposed scheme.
The rest of this study is organized as follows: We first describe the system model and give a CSI tracking algorithm based on the sliding-window LS (CTA_SWLS) with the IQI at the receiver of a terminal in
Section 2. In
Section 3, we propose an efficient scheme, with four steps, for eliminating the channel impact, and a sequential iterative approach for simultaneously and separately estimating the TX IQI and nonlinear coefficient at the BS is given. This is followed by a performance analysis and an analysis of the CRLB and complexity of the proposed scheme with the two cases in
Section 4.
Section 5 demonstrates the simulation results. Finally, conclusions are given in
Section 6.
Notation: , , and denote the complex conjugate, transpose, and complex conjugate transpose, respectively. ⊙ denotes element-by-element multiplication. ∗ represents circular convolution. DFT{x} and IDFT{X} denote the discrete Fourier transform of x and the inverse discrete Fourier transform of X, respectively. X mod Y refers to taking the remainder after the division of X by Y. Imaginary units are represented by j. Re{X} and Im{X} denotes taking the real part and imaginary part of X, respectively. indicates element-by-element division. The subscript or superscript i or k indicates the index of a variable, vector, or matrix in its context. refers to taking the partial derivative of ℑ with respect to x when .
2. System Model and Analysis
Here, we consider a direct upconversion transmitter in which the carrier frequency from an oscillation source is , the phase difference between the I-branch and Q-branch is 90 degrees, and the amplitude coefficients are equal under ideal conditions. However, due to imperfections in the components of the analog circuits in the transmitter RF link and the diversity in manufacturing, the phases of the two branches do not have a difference of strictly 90 degrees, and the amplitude coefficients are not strictly the same, resulting in errors in the demodulated data on the receiver side if there is no countermeasure. On the other hand, the nonlinearity of the transmitter PA also leads to performance degradation at the receiver.
We assume here that no IQI and PA linearity are maintained across the operating range at the BS. Generally speaking, the BS has a more powerful function and can use higher-cost wide-linearity-region PA- and IQI-free devices; IQI and nonlinearity are even present in the RF link, which can also be pre-corrected to achieve more perfect IQ balance and PA linearity, while this is more difficult to achieve at the terminals due to the relatively low cost and performance of the devices, as well as the relatively large number of terminals.
2.1. TX IQI at the Terminal Only
Let
denote the ideal baseband equivalence symbol of the transmitter link at the terminal OFDM system. Because of the impact of the TX IQI at the terminal, this signal is distorted into the following form:
where
u and
v are the TX IQI coefficients, which are defined by the following two equations:
where
and
are the amplitude imbalance and the phase imbalance, respectively, generated by the same local oscillator; this is called a symmetric IQI model. As shown in
Figure 1a, under conditions of no IQI,
and
.
Considering that the OFDM system consists of
N subcarriers, the symbol period is
T,
, the cyclic prefix is
, and
denotes the sampling period. The discrete signal expressions in the following parts of this study are all normalized by the sampling period unless specifically stated. The uplink signal received by the BS is
where
is the multipath channel length of
L, and
is additional white Gaussian noise (AWGN).
2.2. CSI Estimation with the RX IQI at the Terminal
If we consider the RX IQI at the terminal, a high-frequency (HF) signal that is received passes through a bandpass filter (BPF) and enters a low-noise amplifier (LNA), whose function is mainly to increase the output signal-to-noise ratio (SNR) (unlike the PA), so it can be considered linear over the entire operation range, as shown in
Figure 1b. To facilitate the illustration of estimating the CSI at the terminal, we use an asymmetric model to describe the received signal in this section [
9,
24]. Thus, the signal received at the terminal in the time-division duplexing (TDD) system is
where
represents a training sequence sent by the BS to the terminal,
is AWGN, and
.
and
are the RX IQI coefficients. Their complementary property is
, and this can be exploited to separate the received signal and the RX IQI. By taking the conjugate to (
4) and adding it, we obtain
Let
, which satisfies the conjugate symmetry
. Taking the DFT of (
5) and using conjugate symmetry and the complementary property results in
It can be seen in (
6) that when sending
different training sequences, we can obtain
independent linear equations; each equation can estimate two variables of the CSI via the LS. However, considering the time-varying nature of wireless channels,
P sequences are required to be no longer than the channel coherence time [
25].
where
is the Doppler shift. For better tracking performance within the channel coherence time, we can send
P consecutive but different training sequences circularly, herein utilizing the sliding-window LS algorithm to estimate the CSI for each symbol period. We introduce the symbol period index
i and rewrite (
6) in matrix form, resulting in
where
It is easy to obtain the CSI estimate as follows:
Since interchanges of rows or columns of a matrix do not change its singular values,
is a fixed value. Let
Thus,
where
denotes row
of
, as well as
. To avoid large estimation errors, it is necessary to design the training sequences with a small condition number for
. The CSI tracking algorithm based on the sliding window LS (CTA_SWLS) is given in the form of Algorithm 1 and is shown in
Figure 2.
Algorithm 1 CSI tracking algorithm based on the sliding-window LS (CTA_SWLS). |
- 1:
Initial ; Calculate and offline. - 2:
For Calculate ; Update ; End
|
2.3. TX Link with Nonlinear PA Only at the Terminal
Considering a memoryless PA, via Taylor expansions, a complex power-series expansion can be used to model the effect of a digital baseband signal passing through a transmitter front-end PA [
20,
21]. Accordingly, the even terms of the expanded series are discarded, leaving only the odd items, such that the baseband signal becomes
In (
17),
x denotes the signal after the baseband signal d passes the nonlinear PA, and
is a complex coefficient of odd items. Equation (
17) shows that the items of
form the linear component of the PA. To facilitate analysis, herein, let
be normalized to
, so
. We rewrite (
17) in matrix form as follows:
where
,
,
and
.
2.4. Coexistence of the TX IQI and PA Nonlinearity in the Terminal Transmitter Link
By combining the IQ imbalance and PA nonlinearity and considering multipath channels and noise, the following received signals can be obtained at the BS:
where
is the first column of
, and
is a matrix whose columns are composed of the last
columns of
.
is an additional white Gaussian noise (AWGN) vector, and
. Thus, matrix
becomes
.
It can be seen from
that the IQI coefficients u and v are in each element of
, as well as in the nonlinearity coefficient vector
; all of these are the transmitter features that need to be extracted. If the CSI is unknown at the BS, an arbitrary set of values of
u and
v can be used to determine the matrix
by combining arbitrary values of
, provided that
takes an appropriate value; this can make (
19) consistent whether there is error or not. Hence, the parameters in this model cannot be determined if the CSI is unknown at the BS. With special cases in which
,
, which is a scenario that has been extensively studied in many previous papers [
7,
8,
9,
10,
11,
12,
13,
14,
15,
16,
17,
18]. However, for transmitter feature extraction, the requirement of obtaining independent estimates of the transmitter IQ imbalance and PA nonlinearity from multiple paths is necessary. Therefore, we need to seek a new approach to deal with this issue.
The situation will be different under the condition that the CSI is known according to (
19). If a set of values of
u and
v are available, by using LS estimation, an estimate of
can be obtained; the closer the values of
u and
v are to their true values in all estimates, the more accurate the estimate of
is in the sense of the LS. Note that the LS algorithm requires that the column rank of
be equal to the number of non-zero terms in
; otherwise, it will be ill conditioned, leading to large errors. Since
can be written as
where
is a Vandermonde matrix,
is equal to a non-zero number, and the rank of
is equal to the number of different non-zero
values. In other words, the number of different non-zero
values in the training sequence is greater than the number of non-zero elements of
.
has an LS solution for the existence of IQI. Nevertheless, for IQI-free cases, the rank of
is determined by the number of different non-zero
values. It is, therefore, necessary that the number of different amplitudes is not less than
M.
3. The Proposed Scheme
The above analysis shows that when the CSI is unknown at the BS, the model has no deterministic solution. Therefore, we propose a scheme for the joint and independent extraction of the IQI and nonlinear parameters in the terminal transmitter, and this scheme has two cases, which are shown in
Figure 3.
3.1. Case A: IQI and PA Nonlinearity Are Unknown at the Terminal
In this case, transmitter feature extraction and authentication are conducted via two round trips with four steps in TDD systems.
Step 1: The terminal sends an access request to the BS.
Step 2: Upon receipt of the request by the BS, P consecutive but different training sequences are cyclically sent to the terminal.
Step 3: The CTA_SWLS algorithm is employed to track the CSI after P training sequences are received at the terminal. When is satisfied ( denotes a threshold), an FFT is performed on to obtain the time-domain CSI . The first L ( is the max delay spread) values of are retained. Then, a training sequence is sent, and the CSI is truncated to the BS. It is assumed that the CSI remains constant during the last symbol period in step 2 and step 3. Note that to maintain the relevance of the CSI, the training sequence needs to be sent to the BS before the CSI.
Step 4: The BS estimates the combination of the CSI and transmitter IQI based on the training sequence in step 3 by using the LS or MMSE with PA nonlinearity; then, it demodulates the data, which are also known as the CSI. Followed by the removal of the effect of the CSI in the received signal, the BS then estimates the terminal IQI and PA nonlinearity coefficients. The features are stored in a local database either directly or after processing. It is also possible to compare data in the database by using pattern recognition so that the resulting signal to accept or reject the transmitter’s access can be given.
Considering the effects of PA nonlinearity and noise, in step 3, when the terminal encodes and modulates the estimated CSI, it should use a lower-order modulation method, such as BPSK or QPSK, on each OFDM subcarrier. For example, the number of effective paths is generally within 10 for a frequency-selective channel; when using 10 bits (1024-level uniform quantization) and BPSK modulation, a total of 100 bits are required. As long as the number of subcarriers satisfies
, this requirement is met. After the BS receives the CSI and removes the impact of the channel, Equation (
19) becomes
where
and
.
is a Fourier matrix. This problem now turns into
Let
. Since
u and
v in
are to be estimated,
is also to be estimated; we use a sequential iterative approach to estimate these quantities.
Setting the initial values to
and
, first, we calculate
where
. Next, by utilizing the gradient descent method, the estimate of
v can be iteratively obtained as follows:
where
is a small positive value for controlling the step size. In addition,
where
The following relationship of
u and
v based on (
2) is used here to estimate
u.
After a finite number of iterations, the temporary suboptimal values of
and
can be obtained. Then,
and
are substituted into (
23), and the iterative process is repeated until the stopping criteria are met. We summarize the estimation procedure in Algorithm 2.
Algorithm 2 IQI and nonlinearity sequential estimation algorithm (IQINSEA) |
- 1:
Initialization: Set , , , , , - 2:
For (external iteration) Update using ( 23); Form ; If Stop and calculate using ( 27) Output: . Else ; For (internal iteration) Using ( 24) to update ; If Stop Else ; Endif End ; Endif End
|
3.2. Case B: IQI and PA Nonlinearity Are Known at the Terminal
Figure 3b demonstrates the procedure for case B. Here, prior knowledge is given at the terminal, and the corresponding processing is different to that in case A. The differences between case a and case B are as follows.
Step 3: The CTA_SWLS algorithm is employed to track the CSI after P training sequences are received at the terminal. When is satisfied, a modified sequence is directly obtained via a pre-equalization operation and sent to the BS instead of step 3 in case A.
Step 4: The BS receives and estimates the terminal IQI and nonlinear coefficients via Algorithm 2. The subsequent actions are the same as those in case A.
Since we only need to send a pre-equalization training sequence to the BS, case B is more suitable for faster-varying channels. With no CSI effect, the signal received by the BS should be shown as follows:
The matrix
is known at both the terminal and the BS, but due to the CSI there is no unique solution, as described in the previous section. Therefore, we are able to send a pre-equalized training sequence to the BS after the CSI is estimated, and a signal with no CSI effect is equivalently received at the BS. To satisfy
that is,
Equation (
30) can be written as
N independent equations for
:
or
where
Equation (
31) is a binary nonlinear system of equations with respect to
and
, and the solution can be obtained via the Newton–Raphson method. We omit the subscript
i and let
so that we can obtain the following solution:
where
is a Jacobian matrix. In addition,
in which
and
can be simultaneously replaced with
and
.
can be replaced with
.
It is also possible to use nonlinear least squares to find the solution for the following optimization problem:
It is given as
where
, and
is a small positive value for controlling the step size.
This is a system of N independent binary nonlinear equations that can be calculated in parallel at the transmitter side and implemented very quickly. The received signal that is transmitted to the BS can be eliminated from the CSI beforehand to facilitate subsequent processing at the BS. Once it is received by the BS, Algorithm 2 is used to directly estimate the IQI and nonlinear coefficients.
4. Performance Analysis
4.1. Performance Analysis of CTA_SWLS
Let
represent the true value of
. Thus, the estimated CSI with
k and
subcarriers is
Taking the expectation to
yields
It can be seen from (37) that the unbiasedness of Algorithm 1 depends on the means of the past true CSI. If the CSI is a stationary process over P symbol periods, then , that is, Algorithm 1 is unbiased. It is assumed here that the channel is independent and identically distributed (IID), and for each path; thus, , where and denote the true CSI time-domain and frequency-domain vectors, respectively. and denote their respective means.
Then, the autocorrelation matrix of the channel error is given in the form of (
38):
where
. In (
38), I is a fixed item, while II is an item with a
period
P. Both are generated by channel jitter, and III is generated by AWGN.
4.2. Error Propagation
In this subsection, the performance of Algorithm 2 in Step 4 is described. CSI estimation and quantization errors and demodulation errors in case A, as well as errors arising from pre-equalization in case B, are ignored. Before that, consideration of error propagation
is necessary. In the scheme, error propagation affects the estimation of the terminal IQI and
nonlinear parameters at the BS.
4.2.1. Case A
The received signal at the BS is
After removing the impact of the CSI,
is now turned into
in the estimated version of (
21). Then, an FFT is implemented on both sides:
where
.
4.2.2. Case B
The pre-equalization effect satisfies
Then,
An FFT is implemented on both sides of the estimated version of (
29):
It can be seen that apart from the noise items, the two received signals at the BS are equivalent to the convolution of the received signal and after removing the CSI in both case A and case B. The factor vector is determined by the CSI estimation error of CTA_SWLS and the true CSI value. Note that the pre-equalization does not introduce new errors in case B, it just propagates the estimation error of the CSI. The only difference between the two cases is the noise effect.
Each element of the factor vector
follows a reciprocal normal distribution, with
obeying a gaussian distribution. Its expectation exists and is a scaled Faddeeva function whose exact expression depends on the sign of the imaginary part
[
26]. Accordingly, the precise analysis of the factor vector’s impact on the estimation error in Algorithm 2 is intractable. Here, we consider a moderate condition,
; then,
.
4.3. Performance Analysis of Algorithm 2
A detailed mathematical analysis of the performance of Algorithm 2 in case A and case B can be found in
Appendix A.
4.4. Complexity Analysis
Here, we consider a time-complexity analysis based on the number of multiplications. In Step 3, the FFTs of P training sequences and are calculated offline. A total of P FFTs are required during the coherence time, and multiplications are acquired per FFT. There are parallel calculations, with each requiring multiplications.
However, during each symbol period, only is needed for online calculation. Then, the iterations in Algorithm 1 are executed in parallel. Lastly, an IFFT is implemented for . Therefore, a total of multiplications are required online.
In case B, pre-equalization is a parallel calculation of a system of N equations. Each equation requires only complex multiplications, where K is the number of iterations of the Newton–Raphson method. For the implementation of Algorithm 2 in Step 4, complex multiplications are needed. and denote the numbers of internal and external iterations in Algorithm 2, respectively.
5. Simulation and Analysis
In this section, simulations, analysis, and confirmation of the effectiveness of the proposed scheme are provided. The following simulation configuration was used: OFDM signals were sent at the BS and terminal, the number of subcarriers was
,
,
MHz, and 64-QAM modulation was adopted in each subcarrier. The carrier frequency was
GHz, the relative movement velocity was 300 km/h, and
satisfied
. In step 3 of case A, quantification errors were ignored, and the CSI was coded by using BPSK modulation for each subcarrier. Therefore, the BS demodulation error was not considered here. The time-varying channels were set up as independent Gaussian processes, and
. The SNR was defined as follows:
The MSE was used as a performance indicator:
The proposed scheme is labeled as 1 in subscript, the method from [
17] is labeled as 2, and the method from [
21] is labeled as 3. A total of 1000 independent trials were implemented per setting.
5.1. CSI Tracking via CTA_SWLS in Step 3
In this subsection, we simulate cyclically sending P consecutive but different training sequences to the terminal. , , .
In
Figure 4, one can see that the SNR difference did not significantly change the tracking performance. This performance was relatively more affected by the jitter of the channel itself. The reason for this was that the smoothing effect of RLS brought the tracking curve closer to the steady-state value of the channel, and the additive noise was effectively suppressed by using
P training sequences to track the channel. Meanwhile, the time-varying nature of the
P training sequences themselves had a larger cumulative impact on the tracking accuracy of the current symbol period. Thereby, the jitter of the channel had a greater impact on the tracking performance compared to the noise effect.
Figure 5 demonstrates the tracking performance of CTA_SWLS according to the MSE. Different noise levels only affected the mean value of the deviation, as shown by, for example, the fixed distance between the two curves at the top and bottom of
Figure 5a,b, which was consistent with III in (
38). However, the magnitude of the deviation was only affected by the channel jitter, which agreed with I and II in (
38). In addition, the curves exhibited a cyclic pattern of the downlink with respect to the number of training sequences due to the cyclical sending of
P sequences, which was in agreement with II of (
38). Therefore, the theoretical variance of CTA_SWLS given by (
38) was confirmed through this simulation.
5.2. IQI and PA Nonlinearity Estimation Performance via IQINSEA in Case A and Case B
Figure 6,
Figure 7 and
Figure 8 show the MSE performance curves versus the SNR for IQINSEA in the two cases. The IQI and PA nonlinearity parameters were configured as follows: strong IQI and strong PA nonlinearity in
Figure 6, strong IQI and weak PA nonlinearity in
Figure 7, and weak IQI and strong PA nonlinearity in
Figure 8. It was considered that the proposed scheme had to estimate the CSI first for both cases before the IQI and PA nonlinearity could be estimated by using IQINSEA. To facilitate fair comparisons, the ideal CSI was provided for method 2 and method 3; otherwise, the estimation performance of these two algorithms would be worse. Under this condition, since method 2 did not have the ability to estimate the PA nonlinearity and method 3 could not estimate the IQI, method 2 was only involved in the estimation of the IQI, and method 3 was only involved in the estimation of the PA nonlinearity.
In
Figure 6, it can be observed that, in the strong IQI scenarios, the PA nonlinearity estimation with method 3 hardly improved as the SNR grew (
Figure 6 and
Figure 7) because this method did not take the IQI into account, although there was some improvement in the weak IQI scenario (
Figure 8). Accordingly, it can be seen that the effect of the IQI on the estimation performance of method 3 was relatively large. Note that the MSE performance of method 2 hardly varied with the SNR in all of the scenarios because this method is prone to local minima and does not consider the PA nonlinearity. These results were obtained with the assumption that the CSI was known at the BS for methods 2 and 3. Otherwise, the estimated errors would be even larger.
Nevertheless, of all of the scenarios, our proposed scheme was the most efficient among the three methods, i.e., it had a lower MSE and was closer to the CRLB. Another noteworthy aspect is that the MSE curves slowly decreased as the SNR grew, especially in the high-SNR regime. Note that the MSEs in case B were slightly lower than those in case A, especially with a low SNR, which verified the conclusion given in
Section 4. This is because when the CSI was estimated, it was placed at the transmitter to directly remove the effect of the CSI on the system; then, the signal without the impact of the CSI was transmitted, i.e., case B. On the contrary, the CSI was further distorted in transmission, resulting in the removal of the impact of the CSI on the system at the receiver, thus making the error of the system larger, i.e., case A.
6. Conclusions
In this study, two important features of a transmitter, i.e., IQI and PA nonlinearity, were utilized, and these are generated by the nonlinear circuit of the RF front-end at the terminal. They are detrimental to the efficiency of data transmission, but due to their uniqueness and long-term invariance, they can be used as RF fingerprints of a transmitter for terminal identification. This study focuses on the problem of extracting the IQI and PA nonlinearity of a transmitter efficiently and separately in the presence of multiple paths for TDD OFDM systems.
Via system modeling, it was found that only a single transmission could not yield a unique solution due to the coexistence of the IQI, PA nonlinearity, and multiple paths. To address this intractable problem, we proposed a scheme for independently estimating the IQI and nonlinearity, and this involved two round trips with four steps.
Once the training sequences from the BS were received, the real-time CSI was first estimated/tracked at the terminal by using the CTA_SWLS algorithm. The procedures were then divided into different parts for the two cases. In case A, the IQI and PA nonlinearity were unknown at the terminal; in case B, the IQI and PA nonlinearity were known at the terminal. In the two cases, the treatments for removing the impact of the CSI were distinct. Finally, the IQI and PA nonlinearity were estimated at the receiver by using IQINSEA.
With the theoretical analysis, the CSI tracking performance of CTA_SWLS was given. The influence of error propagation on further processing stages was given for both cases. Then, the approximate unbiasedness of the estimation algorithm was theoretically proven, and the variances of IQINSEA were given with the CRLB for both cases. The numerical results show the efficiency of the scheme in comparison with existing techniques in the literature.