2400 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 62, NO. 7, JULY 2014 A Semiblind Two-Way Training Method for Discriminatory Channel Estimation in MIMO Systems Junjie Yang, Shengli Xie, Senior Member, IEEE, Xiangyun Zhou, Member, IEEE, Rong Yu, Member, IEEE, and Yan Zhang, Senior Member, IEEE Abstract—Discriminatory channel estimation (DCE) is a recently developed strategy to enlarge the performance difference between a legitimate receiver (LR) and an unauthorized receiver (UR) in a multiple-input multiple-output (MIMO) wireless system. Specifically, it makes use of properly designed training signals to degrade channel estimation at the UR, which in turn limits the UR’s eavesdropping capability during data transmission. In this paper, we propose a new two-way training scheme for DCE through exploiting a whitening-rotation (WR) based semiblind method. To characterize the performance of DCE, a closed-form expression of the normalized mean squared error (NMSE) of the channel estimation is derived for both the LR and the UR. Furthermore, the developed analytical results on NMSE are utilized to perform optimal power allocation between the training signal and artificial noise (AN). The advantages of our proposed DCE scheme are twofold: 1) Compared with the existing DCE scheme based on the linear minimum mean square error (LMMSE) channel estimator, the proposed scheme adopts a semiblind approach and achieves better DCE performance; and 2) the proposed scheme is robust against active eavesdropping with the pilot contamination attack, whereas the existing scheme fails under such an attack. Index Terms—Two-way training, discriminatory channel estimation (DCE), semiblind approach, pilot contamination attack. Manuscript received January 6, 2014; revised March 26, 2014; accepted May 10, 2014. Date of publication May 22, 2014; date of current version July 18, 2014. The work was supported in part by the NSFC under Grant nos. 61322306, 61333013, U1201253, 61273192, 61370159, U1035001, 6120311761370159, U1035001 and 61203117, Guangdong Province Natural Science Foundation under Grant S2011030002886 (team project), the Department of Science and Technology of Guangdong Province, China under Grants 2011A090100039 and 2011B090400360, the Program for New Century Excellent Talents in University under Grant NCET-11-0911 and Special Scientific Funds approved in 2011 for the Recruited Talents by Guangdong Provincial universities, and the Science and Technology Program of Guangzhou, China under Grant 2014J2200097. The work of X. Zhou was supported by the Australian Research Council’s Discovery Projects funding scheme under Grant DP140101133. The associate editor coordinating the review of this paper and approving it for publication was H. Li. (Corresponding author: Shengli Xie.) J. Yang, S. Xie, and R. Yu are with the School of Automation, Guangdong University of Technology, Guangzhou 510006, China (e-mail: yangjunjie1985@gmail.com; shlxie@gdut.edu.cn; yurong@gdut.edu.cn). X. Zhou is with the Research School of Engineering, The Australian National University, Canberra, ACT 0200, Australia (e-mail: xiangyun.zhou@ anu.edu.au). Y. Zhang is with the Simula Research Laboratory, 1364 Fornebu, Norway and also with the Department of Informatics, University of Oslo, 0373 Oslo, Norway (e-mail: yanzhang@simula.no). Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org. Digital Object Identifier 10.1109/TCOMM.2014.2326394 I. I NTRODUCTION E AVESDROPPING by unauthorized receivers has become a prevalent security threat in wireless communications due to the broadcast nature of the wireless medium. Therefore, discriminating the signal reception performance between a legitimate receiver (LR) and an unauthorized receiver (UR) becomes an important issue in secure communications [1], [2]. To address the issue, the concept of physical layer security [3], [4] has been introduced which utilizes the physical layer properties of a wireless channel to achieve the desired discriminatory channel performance. From an informationtheoretic perspective, the studies in [5]–[7] showed that the maximal data rate can be achieved by exploiting the difference in the channel conditions between the LR and the UR, while preventing the UR from eavesdropping any information from the received signals. Moreover, [8] investigated the secrecy improvement resulting from frequency selectivity in MIMOOFDM systems. From a signal processing perspective, various beamforming schemes [9], [10] have been developed to enhance the signal reception at the LR whilst limiting the quality of signal at the UR. The beamforming design requires the channel state information (CSI) of the LR and/or the UR a priori. Besides, the technique of physical layer security can be used in many application scenarios, e.g., the two-way relaying [11]–[13]. Several studies on physical layer security mainly focus on data transmission without the assumption of perfect CSI. The pilot transmission phase is the period to acquire CSI. It is known that channel estimation performance has a significant effect on data detection. This observation has motivated the development of a new training strategy called discriminatory channel estimation (DCE) such that the channel estimation at the UR is much worse than the channel estimation at the LR. For this, artificial noise (AN) [14]–[16] is inserted in the training signals to jam the UR while keeping a minimal level of interference to the LR. Chang et al. [17] first designed a DCE scheme by employing multiple feedback-and-training processes. This scheme requires large training overhead and high design complexity. Later, a two-way training based DCE scheme was proposed in the study [18] to reduce overhead and hence improve the efficiency of DCE over the original scheme in [17]. The two-way DCE scheme in [18] works well against passive eavesdropping attack from the UR. However, as we will show in this paper, the two-way DCE scheme is not 0090-6778 © 2014 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. YANG et al.: SEMIBLIND TWO-WAY TRAINING METHOD FOR DCE IN MIMO SYSTEMS 2401 TABLE I N OTATION L IST IN T HIS PAPER able to achieve the desired performance under an active eavesdropping named the pilot contamination attack [19]. The pilot contamination attack makes use of the fixed and publicly known training signal used by the LR in the reverse training phase in order to influence the channel estimation at the transmitter (TX). Therefore, it is important to design a robust DCE scheme against the pilot contamination attack, which does not require any fixed and known training symbols at the LR. In this paper, we propose a new two-way training scheme via whitening-rotation (WR) based semiblind approach [20]–[22]. The proposed scheme includes two phases: 1) the LR transmits a sequence of stochastic signals in the reverse training phase. These symbols are only known by the LR itself, facilitating CSI acquisition at the TX; 2) the TX broadcasts a new sequence of signals inserted by AN in the forward training phase. This will enable the channel estimation at the LR while disrupting the channel estimation at the UR. With respect to the proposed scheme, we have the following contributions. • The proposed WR-based DCE scheme achieves a better DCE performance than the existing LMMSE-based DCE scheme in [18]. By combining the blind and trainingbased algorithms, the WR-based semiblind approach can potentially enhance the quality of DCE. As shown in our numerical results, the proposed scheme outperforms the existing scheme with the same training overhead. • Another advantage of the proposed DCE scheme is the provision of a way to protect against the pilot contamination attack due to the randomness feature in the training signal used by the LR. We present an analytical model to demonstrate the effective attack protection and show that such attack has a minor impact on the DCE performance. • Moreover, we analytically evaluate the DCE performance of the proposed scheme by deriving the NMSE of channel estimation at both the LR and the UR. The optimal power allocation between the training signal and the AN is also investigated and an efficient solution is obtained as an onedimensional line search. The remainder of this paper is organized as follows. First, the system model and problem description are presented in Section II. The proposed two-way training scheme using the WR-based channel estimator is presented in Section III. The performance analysis under the pilot contamination attack is discussed in Section IV. Next, simulation results are given in Section V, followed by the conclusions in Section VI. Through the paper, we adopt the notations in Table I. Fig. 1. Wireless MIMO system includes a multi-antennas transmitter (TX), a multi-antennas legitimate receiver (LR) and a multi-antennas unauthorized receiver (UR). II. S YSTEM M ODEL AND P ROBLEM DESCRIPTION A. System Model As shown in Fig. 1, we consider a wireless MIMO system consisting of a transmitter (TX), a legitimate receiver (LR) and an unauthorized receiver (UR). In the system, the TX, the LR and the UR have NT , NL , and NU antennas (NT > NL ), respectively. The TX is connected to one LR and one UR by means of two different communication channels, namely legitimate channel and wiretap channel. The legitimate channel and the wiretap channel are denoted as H ∈ CNL ×NT , G ∈ CNU ×NT , respectively. Besides, the channel from the LR to the UR is denoted as B ∈ CNU ×NL . To enable the LR to interpret the legitimate channel, the TX needs to emit a sequence of training signals, but this also allows the UR to perform wiretap channel estimation. Therefore, the design of training signal is required to ensure a high quality channel estimation at the LR but also prevent the UR from estimating the wiretap channel. The system model is based on the following assumptions. 1) Channels are assumed to be independently distributed and have reciprocity, e.g., matrix H represents downlink legitimate channel and HT is uplink legitimate channel. Besides, matrices H, G, and B are assumed to be the Rayleigh flat fading channels. 2) The entries of channel matrices H, G, and B are assumed 2 2 2 ), CN (0, σG ) and CN (0, σB ), reto be i.i.d, CN (0, σH spectively; moreover, the entries of receiver noises are assumed to be the same as independent additive white Gaussian distributed, i.i.d, C(0, σ02 ). The reciprocal assumption indicates that the uplink and downlink channel paths are similar, which happens in timedivision duplex (TDD) systems [23]. Such assumption is very critical for the two-way training, and this paper mainly focuses on the design of a DCE scheme in a TDD systems; besides, the Rayleigh flat fading channel indicates that the channels are relatively fixed over the transmission of symbols in one time slot but change randomly between time slots. For the second assumption of the system, it refers that the conditions of channels and noises are respectively treated as same for the sake of fair performance. 2402 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 62, NO. 7, JULY 2014 In this paper, two eavesdropping scenarios are taken into account, that is, passive eavesdropping and active eavesdropping, i.e., pilot contamination attack [19]. For the first case, the UR only silently receives signals via channels G and B during the training phase; for the latter case, the UR not only receives signal but also emits false training signal from the uplink channel GT within the training process. Such pilot contamination attack is a potential threat for the two-way training. The UR also makes use of the received signal for its channel estimation in the same manner as (7), but the channel performance at the UR would be restricted due to the AN. B. The Existing Two-Way Training Scheme We first give a brief introduction of the WR-based semiblind channel approach [20]–[22]. The channel matrix HT is firstly estimated in the reverse training phase, thus we take the decomposition of channel HT as an example by The two-way training includes a reverse training phase and a forward training phase. For the reverse training phase, the LR sends a reverse training signal to the TX as P0 T 0 C0 , (1) S0 = NL where P0 is the power of the training signal, and the reverse pilot matrix C0 ∈ CNL ×T1 satisfies an orthogonal condition C0 CH 0 = INL . The received signal at the TX is given by X0 = HT S0 + E0 , (2) where E0 ∈ CNT ×T0 refers to the AWGN matrix. By employing the linear minimum mean-square error (LMMSE) method [24], the channel estimation at the TX is given by 2 −1 2 2 σH S0 SH S 0 XH (3) Ĥ0 = σH 0 + σ 0 IN L 0 . In the forward training phase, the TX transmits a sequence of training signals inserted with AN to enable channel estimation at the LR while degrading the channel acquisition at the UR. In particular, the AN-aided training sequence, denoted by S1 , has the following expression P1 Δ S1 = T1 C1 + NĤ0 A, (4) NT where P1 refers to the power of the forward training signal, T1 is the training length, C1 ∈ CNT ×T1 represents the forward pilot matrix which satisfies an orthogonal condition C1 C H 1 = INT . Herein, NĤ0 is a matrix whose column vectors form an orthogonal basis for the left null space of Ĥ0 , that NĤ0 = INT −NL . In addition, A ∈ is, Ĥ0 NĤ0 = 0 and NH Ĥ 0 C(NT −NL )×T1 is the AN matrix with each component being i.i.d. CN (0, σa2 ). The received signals at the LR and the UR are respectively given by X1 = HS1 + E1 , (5) Y1 = GS1 + F1 , (6) where E1 ∈ CNL ×T1 and F1 ∈ CNU ×T1 are the AWGN matrices. By using the LMMSE, the channel estimation at the LR can be expressed as T −1 2 2 2 σH S1 SH S 1 XH . (7) Ĥ1 = σH 1 + σ 0 IN T 1 III. P ROPOSED DCE S CHEME U NDER PASSIVE E AVESDROPPING A. Preliminary of Whitening-Rotation Based Channel Estimator HT = WQH , (8) where W ∈ CNT ×NL is a whitening matrix and Q ∈ CNL ×NL is an unitary rotation matrix, i.e., QH Q = QQH = INL . Besides, performing singular value decomposition (SVD) [25] on the channel HT gives H HT = UHT ΣHT VH T, (9) where diag(ΣH ) = [ξ1 , . . . , ξNL ]T . One possible choice of W and Q can be UHT ΣHT and VHT , respectively. Without loss of generality, the channel estimation can be divided into two steps with the WR-based semiblind method. 1) Estimate the whitening matrix W in a blind fashion using the autocorrelation matrix of the received signals along with a subspace based method. 2) Estimate the unitary rotation matrix Q using the training signal with the constrained maximum likelihood (ML)based method. The two-steps of the WR-based channel estimator provide a new training design for improving the DCE performance. Specifically, the WR-based semiblind method can be used for the channel estimation both at the LR and the UR within the two-way training. B. Our Proposed WR-Based DCE Scheme 1) Step I. Reverse Training Phase: The LR sends the reverse training signals to the TX for the uplink channel estimation without benefiting the performance of channel estimation at the UR. In the proposed scheme, the design of reverse training signal has the same expression of (1). Different from the existing two-way training, the reverse training signal is randomly generated at the LR and only known by itself, therefore, the TX can not apply the LMMSE method for the channel estimation. Alternatively, the TX can resort to the WR-based semiblind method for the acquisition of channel HT . Specifically, we estimate the whitening matrix of HT by performing SVD on the autocorrelation matrix of the received signal, which has the following form Δ RX0 = X0 XH 0 . P0 T NL 0 (10) YANG et al.: SEMIBLIND TWO-WAY TRAINING METHOD FOR DCE IN MIMO SYSTEMS Referring (10), we can estimate the whitening matrix of HT as 1 1 2 Ŵ0 = √ UX0 ΣX 0 P0 (11) E0 EH 0 . T0 Considering the noise interference, the error of the estimate Ŵ0 can be defined as Δ ΔW0 = Ŵ0 − W. (14) By using the results of (8) and (13), ΔW0 can be deduced as ΔW0 = NL ΔRH S0 ,E0 Q. P0 ∗ ΣTX̂ Ŵ1 = VX̂ W (18) W Δ X̂W = X1 S̃H 1 , P1 T NT 1 (19) where H X̂W = UX̂W ΣX̂W VX̂ . W S 0 EH 0 = , T0 Δ Δ We apply the WR-based semiblind channel estimator for the channel estimation at the LR. First, the whitening matrix of H is estimated as by performing SVD on the matrix NL T ∗ H ΔRS0 ,E0 + ΔRH ΔRX0 = S0 ,E0 H + ΔRE0 ,E0 , P0 (13) where the cross correlation matrices ΔRS0 ,E0 , ΔRE0 ,E0 are defined as follows, respectively ΔRE0 ,E0 = Δ (12) From (12), the error of RX0 has the following form ΔRS0 ,E0 where Ẽ1 = HNŴ0 A + E1 . by performing SVD on RX0 . By using (2), the autocorrelation matrix RX0 can be expressed by RX0 = HT H∗ + ΔRX0 . 2403 (15) 2) Step II. Forward Training Phase: For the forward training phase, the design of forward training sequence is required to enable the LR to interpret the downlink channel information but degrade the channel performance at the UR. Specifically, the new forward training signal is given by P1 Δ S1 = T1 C1 + NŴ0 A, (16) NT where NŴ0 ∈ CNT ×(NT −NL ) is the orthogonal complement space matrix of Ŵ0 satisfying Ŵ0T NŴ0 = 0 and NH NŴ0 = INT −NL . Compared to (4), (16) utilizes the left Ŵ After that, the unitary rotation matrix of H can be obtained by solving the following optimization problem under the perturbation-free case, 2 NL NT ∗ X1 (i) − σ̂ q (j) LR : min f (Q) = Ŝ j ij 1 i=1 j=1 F s.t. QQ H = IN L , (20) H where Ŝ1 = VX S̃ , X1 (i) represents the ith column of W 1 X1 , and Ŝ1 (j) refers to the jth column of Ŝ1 , respectively. By using the Lagrange method (the derivation can be found in Appendix A), the unitary rotation matrix is calculated as follows H Q̂1 = UX̂Q VX̂ (21) Q by performing SVD on the matrix Δ X̂Q = X∗1 S̃T1 Ŵ1 P1 NT T1 (22) where H X̂Q = UX̂Q ΣX̂Q VX̂ . Q 0 ĤT0 null space of Ŵ0 instead of for the generation of AN. In fact, the left null spaces of the matrices Ŵ0 and ĤT0 are essentially the same because the matrix Ŵ0 has all the eigenvalues of ĤT0 . We denote the first term of (16) as P1 T 1 C1 . S̃1 = NT The LR may suffer from the imperfect estimation of W0 due to the interference of AN, thus the power between P1 and σa2 needs to be allocated carefully. a) Channel Estimation at the LR: Using (5) and (16), the received signal matrix at the LR can be rewritten as follows LR : X1 = HS̃1 + Ẽ1 , (17) According to (8), the legitimate channel H is estimated by Ĥ1 = Q̂∗1 Ŵ1T . b) Channel Estimation at UR: Likewise, the wiretape channel G is decomposed as G = MRH , (23) where M ∈ CNU ×NT is the whitening matrix, and R ∈ CNT ×NT is the unitary rotation matrix. Besides, G can be decomposed by SVD as follows H , G = U G Σ G VG (24) where diag(ΣG ) = [γ1 , . . . , γNU ]T . Without loss of generality, we assume that M = UG ΣG and R = VG . 2404 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 62, NO. 7, JULY 2014 Likewise, the UR employs the WR-based semiblind channel estimator for its channel estimation. The received signal matrix of (6) can be rewritten as follows UR : Y1 = GS̃1 + F̃1 , (25) Δ where F̃1 = GNŴ0 A + F1 . Then, the whitening matrix of G is obtained as M̂ = UŶM ΣŶM Notice that NTŴ Ŵ0 = 0, (31) is rewritten as 0 NT T 1 ∗ ∗ T H ΔW1 = Q ΔRS̃ ,E − ΔRS̃ ,A NŴ ΔRS0 ,E0 . 1 1 1 0 P1 P0 (32) Next, we deduce the closed-form expression of ΔQ1 . Using the result of [22], ΔQ1 equals to ΔQ1 ≈ Q(ΓQ ◦ ΠQ )H , (26) where by performing SVD to the matrix ⎡ H Δ Y1 S̃ ŶM = P1 1 NT T1 (33) , ⎢ ⎢ ΓQ = ⎢ ⎣ (27) where 1 , 2ξ12 1 , ξ22 +ξ12 1 , 2 ξN +ξ12 ... 1 , ξ2 +ξ 2 1 ... .... ... NL 1 , ξ2 +ξ 2 2 NL , 2ξ12 ⎤ ⎥ ⎥ ⎥ ⎦ (34) NL L and H . ŶM = UŶM ΣŶM VŶ M Next, the rotation matrix of G is calculated using the training-based method [22], R̂ = VŶR UH Ŷ (28) R Δ M̂H Y1 S̃H 1 , P1 T NT 1 (29) Δ NT ΔRTS̃ ,Ẽ W. 1 1 P1 (36) Therefore, we have ΔXQ = H∗ ΔW1 + where NT ΔRTS̃ ,Ẽ W. 1 1 P1 (37) Substituting (37) into (35), we have H . ŶR = UŶR ΣŶR VŶ R ΠQ = 0. Using (26) and (28), the wiretap channel G is calculated by Ĝ = M̂R̂H . C. DCE Performance Analysis A quantitative analysis of power allocation is offered for the optimal DCE scheme in this Section. 1) Channel Estimation Performance at the LR: To analyze channel estimation performance, we define the perturbation Δ Δ errors of Ŵ1 and Q̂1 by ΔW1 = Ŵ1 − W and ΔQ1 = Q̂1 − Q, respectively. The estimation error of H at the LR is given by Δ ΔH1 = Ĥ1 − H = Q̂∗ Ŵ1T − Q∗ W1T ≈ Q∗ ΔW1T + ΔQ∗1 WT . (30) First, we derive the closed-form expression of ΔW1 . Similar to (15), ΔW1 has the following expression ΔW1 = (35) To derive the perturbation error of ΔXQ , we define X̂Q = XQ + ΔXQ . Using (5), (22) is modified as X̂Q = H∗ W + H∗ ΔW1 + by performing SVD to the matrix ŶR = H ΠQ = ΔXH Q Q − Q ΔXQ . NT T Q ΔR∗S̃ ,Ẽ , 1 1 P1 (38) As a result, (33) is summarized as ΔQ1 = 0, and the perturbation error of Ĥ1 is given by P1 NL ∗ ∗ T H ΔH1 = ΔRS̃ ,A NŴ ΔRS0 ,E0 . ΔRS̃ ,E − 1 1 1 0 NT P0 (39) Similar to the derivation of [22], the NMSE criterion like [24] of the estimate matrix H at the LR is given by H Δ Tr E ΔH1 ΔH1 NMSEL = NL NT NT σ02 NL (NT − NL )σa2 NT σ02 = + . (40) P1 T 1 P0 T 0 P1 T 1 2) Channel Estimation Performance at the UR: We define Δ the perturbation errors of M̂ and R̂ by ΔM = M̂ − M and Δ ΔR = R̂ − R, respectively. In the following, the estimation error of channel G is given by Δ ΔG = Ĝ − G = M̂R̂H − MRH ≈ MΔRH + ΔMRH . (41) (31) First, we derive the closed-form expression of ΔM. Similar to (15), ΔM has the following expression where ΔRS̃1 ,Ẽ1 = ΔRS̃1 ,E1 + ΔRS̃1 ,A NH HH . Ŵ 0 ΔM = NT ΔRH R, S̃1 ,F̃1 P1 (42) YANG et al.: SEMIBLIND TWO-WAY TRAINING METHOD FOR DCE IN MIMO SYSTEMS where 2405 estimation error at the UR. Hence, we formulate the power allocation as the following optimization problem Δ ΔRS̃1 ,F̃1 = ΔRS̃1 ,A NH GH + ΔRS̃1 ,F1 . Ŵ 0 min 2 0 P0 ,P1 >0,σa Next, we deduce the closed-form expression of ΔR. Similar to (33), the perturbation matrix of R̂ is given by ΔR ≈ R(ΓR ◦ ΠR ), ⎡ ΓR ⎢ ⎢ =⎢ ⎣ 1 , 2γ12 1 , γ22 +γ12 1 , 2 γN +γ12 ... 1 ... .... ... , (50a) P0 ≤ Pave (50b) P1 + (NT − NL )σa2 ≤ Pave , (50c) (43) ⎤ 1 , γ 2 +γ 2 NU 1 2 γ22 +γN , 2γ12 U ⎥ ⎥ ⎥ ⎦ (44) where γ > 0 refers to the threshold of the UR’s achievable NMSE, and Pave is the total energy constraint of the training signal. We define x = P1 T1 /NT , y = (NT − NL )σa2 , z = P0 . Then, the problem (50) can be reformulated as NU U min and yNL σ02 σ02 + x xz (51) yσ 2 σ02 + G ≥ γ, x x (51a) z ≤ Pave , (51b) x>0,y≥0 H ΠR = RH ΔYR − ΔYR R. (45) s.t. Δ To derive the perturbation error matrix ΔYR , we define ŶR = YR + ΔYR . Using (6), (29) approximately equals to ŶR ≈ MH G + ΔMH G + NT H M ΔRH , S̃1 ,F̃1 P1 ΔYR = ΔMH G + NT H M ΔRH . S̃1 ,F̃1 P1 xNT + y ≤ Pave . T1 (46) Therefore, (47) Substituting (47) into (45), we have ΠR = 0. As a result, (43) is summarized as ΔR = 0. Then, the perturbation matrix of Ĝ is yielded as NT GNŴ0 ΔRS̃1 ,A + ΔRS̃1 ,F1 . (48) ΔG = P1 (51c) (51) is a convex optimization problem involving three variables (x, y, z). We have demonstrated that this threedimensional optimization problem can be solved by a simple one-dimensional line search [26]. (The proof can be found in the Appendix B.) Proposition 1: Let {x∗ , y ∗ , z ∗ } be the optimal solution to the convex optimization problem in (51) with the constraint that NT σ02 /Pave T1 ≤ γ ≤ (NT − NL )Pave . The optimal value of x can be solved by the following one-dimensional optimization problem y(x)NL σ02 σ02 + x x xz 2 σG Pave + σ02 T1 σ02 ≤x≤ , 2 γ γT1 + NT σG min In consequence, the NMSE criterion of estimate G at the UR is derived by H Δ Tr E{ΔGΔG } NMSEU = NT NU 2 NT σ02 + NT (NT − NL )σa2 σG = . P1 T 1 (50) NMSEU ≥ γ, s.t. where ΓR is NMSEL s.t. (52) (52a) where (49) Comparing (40) and (49), we find that the NMSE performance at the LR and the UR are mainly relevant to the selection of power among the training signal and AN. While the power of training signal becomes stronger, the precision of the channel estimation is higher for the LR but lower for the UR. Alternatively, the estimation precision is lower for the LR whereas higher for the UR when the power of training signal becomes lower. Therefore, a trade-off on power allocation exists between the training signal and the AN. 3) Optimal Power Allocation Between the Training Signal and the AN: One needs to allocate the available power between the training signal and the AN carefully through minimizing the channel estimation error at the LR while restricting the y(x∗ ) = xγ − σ02 , 2 σG z ∗ = Pave . The associated values of y ∗ , z ∗ are given by y(x∗ ), Pave , respectively. With Proposition 1, we can construct well on the design of training sequences for achieving optimal DCE performance. IV. P ROPOSED DCE S CHEME U NDER THE P ILOT C ONTAMINATION ATTACK In this Section, we analyze the performance of our proposed DCE scheme under the pilot contamination attack. 2406 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 62, NO. 7, JULY 2014 A. The Existing Pilot Contamination Attack where Under the existing two-way training scheme, the pilot contamination attack is possible when the reverse training signal is known by the UR. Notice that the publicly known reverse training signal provide an opportunity for the UR to make an adverse influence on the channel estimation at the TX. In particular, the UR sends the reverse training signal at the same time as the LR’s transmission during the reverse training phase. With the additive AWGN matrix F0 ∈ CNT ×T0 , the received signal at the TX is given by ΔRS̃1 ,Ẽ1 T T X0 = H S0 + E0 + G S̄0 + F0 , where (53) ≈ ΔRS̃1 ,E1 − NL ΔRTS0 ,E0 + ΔRTS0 ,F̄0 . ΔRS̃1 ,A NH Ŵ 0 P0 Similar to (33), the perturbation error of the unitary rotation matrix can be deduced as ΔQ1 = 0. Hence, the perturbation error of the estimate channel Ĥ1 is given by ΔH1 = P1 NT NL T ΔRSH0 ,E0+ΔRSH0 ,F̄0 . ΔRS̃∗ 1 ,A NŴ ΔRS̃∗ 1 ,E1− 0 P0 S̄0 = (56) P̄0 T0 C̄0 , NL With the result of (56), the NMSE criterion of the estimate channel H1 at the LR is given by P̄0 is the power of injected fake pilot and pilot matrix C̄0 satisfies that C̄0 C̄H 0 = INL . If the UR knows the reverse training pilot, then P̄0 = P0 and C̄0 = C0 . For simplicity, we define the injected noises of (53) as Δ F̄0 = GT S̄0 + F0 . B. The Impact of Pilot Contamination Attack on the Proposed DCE Scheme For our proposed two-way training, the reverse training signal is a private symbols at the LR and only known by itself, which is randomly generated. Thus, the randomness feature of the reverse training signal provides a natural way of protecting against the pilot contamination attack. Possibly, the UR may try to exploit the received signal from channel B via the blind detection methods [27], [28]. However, the UR would suffer from a rotation ambiguity between the estimate channel B̂ and the original channel B. Therefore, such techniques are still no use for the UR to interpret the reverse training pilot without the cooperation of the LR. Herein, we consider one reasonable scenario that the UR performs so called pilot contamination attack with a guessingbased way, that is, the pilot matrix C̄0 is randomly generated by a guess way. Specifically, we mainly discuss the impact on the NMSE performance of the estimate channel Ĥ1 with such pilot contamination attack. Using (31) and (53), the perturbation error of the estimate whitening matrix Ŵ1 can be rewritten as NT T Q ΔR∗S̃ ,Ẽ , 1 1 P1 NT σ02 NL (NT − NL )σa2 NT σ02 + P1 T 1 P0 T 0 P1 T 1 2 NL (NT − NL )σa2 NT σ02 NU σ G + + . P1 T 1 P0 T 0 P̄0 T0 (57) (54) The pilot contamination attack can be viewed as a form of malicious signal injection. With the injection of false training pilot, the UR can degrade the TX’s estimation of uplink channel HT and also align the wiretap channel estimation for the UR. In conclusion, the impact of the pilot contamination attack on the two-way DCE scheme has two folds: a) It reduces the accuracy of the LR’s estimation of the downlink channel due to the leakage of AN. b) More seriously, it increases the UR’s channel performance. ΔW1 = NMSEL ≈ (55) Compared (57) to (40), we find that the third term of (57) is newly introduced due to the injection of fake training pilot. Notice that the third term is significantly smaller than the first of two terms, thus, we can conclude that the pilot contamination attack only marginally increases the NMSE error at the LR. Furthermore, we also demonstrate that the scheme of power allocation via Proposition 1 is still valid under the pilot contamination attack. V. N UMERICAL R ESULTS We consider a MIMO wireless system with one LR and one UR. In the system, we have NT = 4, NL = 2 and NU = 2. Channel matrices H or G are i.i.d. complex Gaussian random 2 2 = σG = 1); variables with zero mean and unit variance (σH and the additive noise matrices E0 , E1 or F1 are i.i.d. AWGN with σ02 = 0.01. We set the maximum transmission power as 30 dBm, i.e., Pave = 1. The reverse pilot matrix and the H forward pilot matrix satisfy that C0 CH 0 = I N L , C1 C1 = I N T , respectively. Moreover, the overall training length is given as T = 280, in which T0 = T1 = 140. The parameter γ [17] is set as 0.03 and 0.1, respectively. With Pave = 1, the criterion of signal-to-noise ratios (SNRs) at the LR and the UR is defined as SNRL = EHS1 2F 1 2 = σ2 , EE1 F 0 SNRU = EGS1 2F 1 2 = σ2 , EF1 F 0 (58) where SNRL = SNRU . Herein, the DCE scheme based on the LMMSE channel estimator in [18] is employed as a fair comparison to the proposed DCE scheme based on the WR channel estimator. In the following, the scheme in [18] is called YANG et al.: SEMIBLIND TWO-WAY TRAINING METHOD FOR DCE IN MIMO SYSTEMS 2407 Fig. 2. Power allocation among the training signal and AN in our proposed DCE scheme. as LMMSE-based DCE scheme, and the proposed scheme is named as WR-based DCE scheme. The result of each DCE scheme is obtained over 100,000 Monte Carlo running. We first demonstrate the efficiency of the proposed DCE scheme. Both the LR and the UR exploit their channel estimation with the received signal. The optimal power value among P1 and σa2 can be calculated via the optimized solution of (52). Fig. 2 shows that more power is needed for the forward training signal than the AN at the SNR levels arranged from 10 dB to 40 dB. There is a minor variation between the power of forward training signal and the AN at all SNR levels, that is, the power of forward training signal keeps a stable state while the power of AN decreases slightly with the increasing of the SNR level. This observation indicates that the power allocation solution has a stable performance. From Fig. 3(a) and Fig. 3(b), it is found that the NMSE performance at the LR with the WR-based DCE scheme achieves better DCE performance than the LMMSE-based DCE scheme. By assuming that the TX knows perfect CSI of the uplink channel, we illustrate the ideal lower bound of NMSE with the proposed DCE scheme in the following figures. The gap between the ideal lower bound with perfect CSI and the NMSE error at the LR with the LMMSE-based DCE scheme is wide while it is very close to the WR-based DCE scheme. Furthermore, Fig. 3(c) shows the relationship between NMSE at the LR and the length of training sequence. The NMSE performance at the LR improves the DCE performance with longer training symbols. Although our simulation results are shown for the scenario where the LR and UR are at the same distance from the TX (σ 2H = σ 2G ), the proposed DCE scheme works well even if the UR is much closer to the TX as long as the transmit power is sufficiently large. The reason is that the SNR at the UR does not change much with distance when the inserted AN dominates the noise at the UR. We then look into the performance of the proposed WRbased DCE scheme under a pilot contamination attack. As discussed in Section IV, the UR has no priori knowledge of the reverse training signal. Thus, we suppose that the UR sends a guess-based orthogonal signal matrix S̄0 to attack the training Fig. 3. NMSE performance comparison between the LMMSE-based DCE scheme and the WR-based DCE scheme. (a) γ = 0.03; (b) γ = 0.1; (c) variation of T1 when SN RL = 25 dB. process, in which P̄0 = Pave = 1. From Fig. 4(a), one can see that the NMSE performance at the LR with LMMSE-based DCE scheme has approximately reached to the limitation of the UR’s NMSE due to the poor channel estimation. On the contrary, the NMSE performance at the LR with the proposed 2408 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 62, NO. 7, JULY 2014 Furthermore, Fig. 4(c) shows the impact of pilot contamination attack on the performance of DCE scheme with a variation of attacking power. Since the LMMSE-based DCE scheme works not very well under the pilot contamination attack, we only focus on the performance of the proposed DCE scheme herein. The result shows that the obtained NMSE error at the LR has a slight reduction with the increasing power P̄0 . Notice that the attacking power is restricted at the UR, hence, the pilot contamination attack has an ignorable impact on the performance of our proposed DCE scheme. VI. C ONCLUSION In this paper, we proposed a new two-way training scheme for DCE in wireless MIMO systems. To improve the DCE performance, an efficient whitening-rotation (WR) based semiblind approach has been employed in the two-way training. A closed-form of NMSE on the channel estimation between the LR and the UR have been developed, facilitating optimal power allocation between the training signals and the AN. Furthermore, the proposed training scheme offers a countermeasure against the pilot contamination attack. It has been proved that the pilot contamination attack has a very limited impact on the DCE performance. Simulation results have demonstrated that our proposed scheme can achieve higher performance than the existing training scheme. Our future work includes the following directions of research: (a) We will extend the study of DCE from narrowband systems to wideband OFDM-based systems [29]. The power allocation between the training signal and AN across all pilot subcarriers will be an interesting problem to investigate. (b) We will apply the semiblind two-way training method to tackle the pilot contamination problem in multi-cell massive MIMO systems. A PPENDIX A D ERIVATION OF U NITARY ROTATION M ATRIX According to (20), the rotation matrix Q can be obtained by using Lagrange method as follows, 2 NL NT ∗ σ̂j qij Ŝ1 (j) LR : min f (Q, λ, μ) = X1 (i) − i=1 j=1 + NL F NL NL Re λi qiH qi − 1 + Re μij qiH qj . i=1 i=1 j=i+1 (59) By differentiating (59) w.r.t Q and let it equals to 0, we have Fig. 4. NMSE performance of the LMMSE-based DCE scheme and the WRbased DCE scheme under the pilot contamination attack. (a) γ = 0.03; (b) γ = 0.1; (c) variation of P̄0 when the noise levels are set as 15 dB, 25 dB, 35 dB, respectively. DCE scheme only has a slight reduction. Similar results are also observed in Fig. 4(b) in the case of γ = 0.1. As a result, the LMMSE-based DCE scheme is more sensitive to the pilot contamination attack than our proposed DCE scheme. X∗1 S̃T1 Ŵ1 − QŴ1T S̃1 S̃H 1 Ŵ1 = QΘ, (60) where Θ is the matrix of Lagrange multipliers which satisfies Θii = λi , Θij = μij when i > j and Θij = μ∗ij when i < j. We divide (P1 /NT )T1 on both sides of (60), and denote Δ X̂Q = X∗1 ŜT1 Ŵ1 . P1 NT T1 YANG et al.: SEMIBLIND TWO-WAY TRAINING METHOD FOR DCE IN MIMO SYSTEMS Using the conjugate symmetry feature of Θ, we premultiply QH to (60) and post-multiply QH to the conjugate of (60). Performing a subtraction between the two new equations, we have QH X̂Q = X̂H Q Q. (61) According to the specific structure of (61), it holds if and only if H , Q̂1 = UX̂Q VX̂ (62) Q where UX̂Q and VX̂Q are the decomposition results after H . performing SVD on X̂Q , e.g., X̂Q = UX̂Q ΣX̂Q VX̂ Q A PPENDIX B D ERIVATION OF O PTIMUM P OWER A LLOCATION First, we need to develop the range of parameter γ. For the extreme case when y = 0, we know that x≤ Pave T1 NT (63) by using the power constraint of (51c). In this case, γ has the lower bound γ≥ NT σ02 . Pave T1 (64) To obtain the upper bound of γ, we need to analyze the NMSE error performance at the UR when x = 0. Similar to (42), the perturbation matrix of M can be rewritten as H ΔM ≈ ΔRH A,F1 NŴ R. 0 (65) In this case, we have the result as follows N M SEU ≈ (NT − NL )Pave . (66) This result implies the worst MNSE performance at the UR, so we can obtain the upper bowed of γ, γ ≤ (NT − NL )Pmax . (67) For the variable y, it satisfies the following inequations as xNT xγ − σ02 ≤ y ≤ Pave − 2 σG T1 (68) by using the constraints of (51a) and (51c). Besides, the inequations of (68) holds if and only if Pave − xNT xγ − σ02 ≥ . 2 T1 σG (69) Thus, x satisfies 2 σG Pave + σ02 T1 σ02 ≤x≤ . 2 γ γT1 + NT σG (70) 2409 From the optimal problem (51), the objective function is monotonically decreasing with respect to the variable y, so the optimal value can be achieved when y∗ = xγ − σ02 . 2 σG (71) Furthermore, z is independent from x and y, thus the objective function approaches its optimization point when z ∗ = Pave . R EFERENCES [1] A. Wyner, “Wire-tap channel,” Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355– 1387, Oct. 1975. [2] I. Csiszár and J. Körner, “Broadcast channels with confidential messages,” IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339–348, May 1978. [3] M. Bloch and J. Barros, Physical-Layer Security: From Information Theory to Security Engineering. Cambridge, U.K.: Cambridge Univ. Press, 2011. [4] X. Zhou, L. Song, and Y. Zhang, Physical Layer Security in Wireless Communications. Boca Raton, FL, USA: CRC Press, 2013. [5] N. Yang, H. Suraweera, I. Collings, and C. Yuen, “Physical layer security of TAS/MRC with antenna correlation,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 1, pp. 254–259, Jan. 2013. [6] P. Gopala, L. Lai, and H. E. Gamal, “On the secrecy capacity of fading channels,” IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687–4698, Oct. 2008. [7] X. Chen, L. Lei, H. Zhang, and C. Yuen, “On the secrecy outage capacity of physical layer security in large-scale MIMO relaying systems with imperfect CSI,” in Proc. IEEE ICC, Sydney, NSW, Australia, 2014, pp. 1–6. [8] N. R. Zurita, M. Ghogho, and D. M. Lernon, “Physical layer security of MIMO-OFDM systems by beamforming and artificial noise generation,” Phys. Commun., vol. 4, no. 4, pp. 313–321, Dec. 2011. [9] A. Mukherjee and A. L. Swindlehurst, “Robust beamforming for security in MIMO wiretap channels with imperfect CSI,” IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351–361, Jan. 2011. [10] X. Wang, K. Wang, and X. D. Zhang, “Secure relay beamforming with imperfect channel side information,” IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2140–2155, Jun. 2013. [11] L. Y. Song, “Relay Selection for Two-way Relaying with Amplify-andForward Protocols,” IEEE Trans. Veh. Technol., vol. 60, no. 4, pp. 1954– 1959, May 2011. [12] L. Y. Song, Y. H. Li, and B. L. Jiao, “Differential Modulation for Bidirectional Relaying With Analog Network Coding,” IEEE Trans. Signal Process., vol. 58, no. 7, pp. 3933–3938, Jul. 2010. [13] L. Y. Song, H. Guo, B. L Jiao, and M. Debbah, “Joint Relay Selection and Analog Network Coding Using Differential Modulation in Two-Way Relay Channels,” IEEE Trans. Veh. Technol., vol. 59, no. 6, pp. 2932– 2939, Jul. 2010. [14] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180–2189, Jun. 2008. [15] X. Zhou and M. R. McKay, “Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation,” IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831–3842, Oct. 2010. [16] X. Zhang, X. Zhou, and M. R. McKay, “On the design of artificial-noiseaided secure multi-antenna transmission in slow fading channels,” IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2170–2181, Jun. 2013. [17] T.-H. Chang, W.-C. Chiang, Y.-W. Hong, and C.-Y. Chi, “Training sequence design for discriminatory channel estimation in wireless MIMO systems,” IEEE Trans. Signal Process., vol. 58, no. 12, pp. 6223–6237, Dec. 2010. [18] C.-W. Huang, T.-H. Chang, X. Zhou, and Y.-W. P. Hong, “Two-way training for discriminatory channel estimation in wireless MIMO systems,” IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2724–2738, May 2013. [19] X. Zhou, B. Maham, and A. Hjørungnes, “Pilot contamination for active eavesdropping,” IEEE Trans. Wireless Commun., vol. 11, no. 3, pp. 903– 907, Mar. 2012. [20] C. R. Murthy, A. K. Jagannatham, and B. D. Rao, “Training-based and semiblind channel estimation for MIMO systems with maximum ratio transmission,” IEEE Trans. Signal Process., vol. 54, no. 7, pp. 2546–2558, Jul. 2006. [21] A. K. Jagannatham and B. D. Rao, “Whitening-rotation-based semiblind MIMO channel estimation,” IEEE Trans. Signal Process., vol. 54, no. 3, pp. 861–869, Mar. 2006. 2410 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 62, NO. 7, JULY 2014 [22] F. Wan, W. P. Zhu, and M. N. Swamy, “A signal perturbation free whitening-rotation-based semiblind approach for MIMO channel estimation,” IEEE Trans. Signal Process., vol. 57, no. 8, pp. 3154–3166, Aug. 2009. [23] H. Holma and A. Toskala, WCDMA for UMTS, vol. 4. New York, NY, USA: Wiley, 2000. [24] S. M. Kay, Fundamentals of Statistical Signal Processing: Estimation Theory. Englewood Cliffs, NJ, USA: Prentice-Hall, 1993. [25] G. H. Gene, V. Loan, and F. Charles, Matrix Computations, 3rd ed. Baltimore, MD, USA: The Johns Hopkins Univ. Press, 1996. [26] M. Chiang, C. W. Tan, D. P. Palomar, D. O’Neill, and D. Julian, “Power control by geometric programming,” IEEE Trans. Wireless Commun., vol. 6, no. 7, pp. 2640–2651, Jul. 2007. [27] V. Buchoux, O. Capper, E. Moulines, and A. Gorokhov, “On the performance of semiblind subspace-based channel estimation,” IEEE Trans. Signal Process., vol. 48, no. 6, pp. 1750–1759, Jun. 2000. [28] S. Shahbazpanahi, A. Gershman, and J. Manton, “Closed-form blind MIMO channel estimation for orthogonal space-time block codes,” IEEE Trans. Signal Process., vol. 53, no. 12, pp. 4506–4517, Dec. 2005. [29] A. Vinel, Q. Ni, D. Staehle, and A. Turlikov, “Capacity analysis of reservaion-based random access for broadband wireless access networks,” IEEE J. Sel. Areas Commun., vol. 27, no. 2, pp. 172–181, Feb. 2009. Junjie Yang received the M.S. degree in applied mathematics from Guangdong University of Technology, Guangzhou, China, in 2011. He is currently working toward the Ph.D. degree at Guangdong University of Technology under the supervision of Prof. S. Xie. His current research interests include blind signal processing, physical-layer security, and smart-grid cyber security. Shengli Xie (M’01–SM’02) received the M.S. degree in mathematics from Central China Normal University, Wuhan, China, in 1992 and the Ph.D. degree in control theory and applications from South China University of Technology, Guangzhou, China, in 1997. He is currently a Full Professor and the Vice Head of the Institute of Automation and Radio Engineering with Guangdong University of Technology, Guangzhou. He is the author or coauthor of two books and more than 70 scientific papers in journals and conference proceedings. His research interests include automatic control and blind signal processing. Dr. Xie received the Second Prize in China’s State Natural Science Award in 2009 for his work on blind source separation and identification. Xiangyun Zhou (S’08–M’11) received the B.E. (Hons.) degree in electronics and telecommunications engineering and the Ph.D. degree in telecommunications engineering from The Australian National University (ANU), Canberra, Australia, in 2007 and 2010, respectively. From June 2010 to June 2011, he worked as a Postdoctoral Fellow with UNIK-University Graduate Center, University of Oslo, Norway. He is currently a Lecturer with ANU. His research interests include communication theory and wireless networks. Dr. Zhou serves on the editorial board of the following journals: IEEE C OM MUNICATIONS L ETTERS , Wiley Security and Communication Networks, and Ad Hoc & Sensor Wireless Networks. He has also served as a Workshop Chair and as a Technical Program Committee member of major IEEE conferences. Currently, he is the Chair of the ACT Chapter of the IEEE Communications and Signal Processing Societies. He is a recipient of the Best Paper Award at the 2011 IEEE International Conference on Communications. Rong Yu (S’05–M’08) received the Ph.D. degree from Tsinghua University, Beijing, China, in 2007. Then, he was with the School of Electronic and Information Engineering, South China University of Technology, Guangzhou, China. Since 2010, he has been with the Institute of Intelligent Information Processing, Guangdong University of Technology, Guangzhou, where he is currently a Full Professor. He is the co-inventor of over ten patents and the author or co-author of over 50 international journal and conference papers. His research interests include wireless communications and networking, cognitive radio, wireless sensor networks, and home networking. Dr. Yu is currently serving as the Deputy Secretary General of the Internet of Things (IoT) Industry Alliance, Guangdong, China, and the Deputy Head of the IoT Engineering Center, Guangdong. He is a member of the Home Networking Standard Committee in China, where he leads the standardization work of three standards. Yan Zhang (M’05–SM’10) received the Ph.D. degree from Nanyang Technological University, Singapore. He is currently with the Simula Research Laboratory, Lysaker, Norway, and is an Adjunct Associate Professor with the University of Oslo, Oslo, Norway. His recent research interests include cognitive radio, smart grid, and machine-to-machine communications. Dr. Zhang is an Associate Editor and a Guest Editor for a number of international journals. He serves as an Organizing Committee Chair for many international conferences.