Beruflich Dokumente
Kultur Dokumente
24, 2017.
Digital Object Identifier 10.1109/ACCESS.2017.2679135
ABSTRACT Ambient backscatter technology has attracted much attention recently, because it enables
battery-free devices, such as tags or sensors, to communicate through wireless energy harvesting and
radio backscattering. Existing studies about ambient backscatter assume that the tags have only two states:
backscatter or non-backscatter. Actually, some references have shown that the tags can readily realize three
states: positive and negative phase backscatter, and non-backscatter. In this paper, we propose a new coding
scheme for these tags with three states to improve the throughput of the ambient backscatter communication
system. We then design a maximum a posteriori (MAP) detector for the reader to extract binary information
from ternary coded signals. We also analyze the detection performance in terms of closed-form bit error
rate (BER) expressions. It is found that the proposed coding scheme can improve the throughput of an
ambient backscatter system, and there exists an error floor for the BER curve. Finally, simulation results are
provided to corroborate our theoretical studies.
INDEX TERMS Ambient backscatter, coding, maximum a posteriori (MAP) detection, bit error rate (BER),
error floor, system throughput.
2169-3536
2017 IEEE. Translations and content mining are permitted for academic research only.
VOLUME 5, 2017 Personal use is also permitted, but republication/redistribution requires IEEE permission. 4947
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Y. Liu et al.: Coding and Detection Schemes for Ambient Backscatter Communication Systems
To find the threshold, we should find suitable Tk s that sat- 2) In the case of fg < 0,
isfy the following two unary quadric equations respectively
H−1 , if Tk > ξ1 ,
Pr(T−1 |H−1 ) Pr(H−1 ) = Pr(T0 |H0 ) Pr(H0 ), (9) H = H0 ,
b if ξ2 < Tk < ξ1 , (16)
Pr(T1 |H1 ) Pr(H1 ) = Pr(T0 |H0 ) Pr(H0 ). (10)
H1 , if Tk < ξ2 .
The solutions of (9) is derived as (11), shown at the bottom
of this page, where B. BER PERFORMANCE ANALYSIS
The error probability of our detector (15) and (16) is given
H = Ph2 p2 + Nwb , by
V = Pν 2 p2 + Nwb ,
Pe = Pr(H0 ) Pr(H̄0 |H0 ) + Pr(H1 ) Pr(H̄1 |H1 )
κV = Vh − H ν.
+ Pr(H−1 ) Pr(H̄−1 |H−1 ), (17)
Owing to the relationship of h, µ and ν, the PDF curve of
Tk under H0 is always in the middle of the three curves in where
Fig. 3. Therefore we choose one solution in (11) nearer the √
expectation of Tk under H0 . The threshold based on (9) is set ξ1 − Pνp
,
Pr (H̄−1 |H−1 ) = Q q (18)
as 1 2 2
( √ √ + Nwb )
N (Pν p
ζ1,a , if |ζ1,a − Php| < |ζ1,b − Php|, √
ξ1 =
√ √ (12) ξ − Php
ζ1,b , if |ζ1,b − Php| ≤ |ζ1,a − Php|. Pr (H̄0 |H0 ) = 1 − Q q
1
1 2 2
Similarly, the other threshold can be obtained from the N (Ph p + Nwb )
solutions of (10), as (13), shown at the bottom of this page, √ !
ξ2 − Php
where +Q 1 , (19)
2 2
N (Ph p + Nwb )
U = Pµ2 p2 + Nwb , √
ξ2 − Pµp
κU = Uh − H µ. Pr (H̄1 |H1 ) = 1 − Q q , (20)
1 2 p2 + N )
N (Pµ wb
And the threshold according to (10) is chosen as
( √ √ where Q(·) denotes the Gaussian Q-function [16] and is given
ζ2,a , if |ζ2,a − Php| < |ζ1,b − Php|,
ξ2 = √ √ (14) as
ζ2,b , if |ζ2,b − Php| ≤ |ζ1,a − Php|. Z ∞
1 t2
Finally the related detection rule can be summarized as Q(x) = √ e− 2 dt. (21)
follows 2π x
1) In the case of fg > 0, Define γ = NPwb as the transmit SNR. Next we inves-
tigate the asymptotic error probability performance when
H−1 , if Tk < ξ1 ,
γ → ∞, i.e., lim Pe . For the simplicity of our discus-
H = H0 ,
b if ξ1 < Tk < ξ2 , (15) γ →∞
sion, we only consider the situation when ξ1 = ζ1,a and
H1 , if Tk > ξ2 .
ξ2 = ζ2,a .
r h i
κ κ 2 − (v2 − h2 ) PN p2 (h2 − v2 ) + VH
ln 3H
V + V wb N 2V
ζ
1,a
= √
r P(v2 − h2 )p (11)
h i
κV − κV2 − (v2 − h2 ) PNwb p2 (h2 − v2 ) + VH
ln 3H
N 2V
ζ1,b =
√
P(v2 − h2 )p
r h i
κ κ 2 − (u2 − h2 ) PN p2 (h2 − u2 ) + UH
ln 3H
U + U wb N 2U
ζ2,a =
√
P(u2 − h2 )p
r h i (13)
κU − κU2 − (u2 − h2 ) PNwb p2 (h2 − u2 ) + UH 3H
N ln 2U
ζ2,b =
√
P(u2 − h2 )p
√ q
|νh| 3h 2
ν N h(ν − h) + ν (ν − h)2 − (ν 2 − h2 ) ln 2ν 2
lim Pr(H̄−1 |H−1 ) = Q − 1 (27)
γ →∞ |ν| ν 2 − h2
√ q
|νh| 3h2
h N ν(ν − h) + ν (ν − h)2 − (ν 2 − h2 ) ln 2ν 2
lim Pr(H̄0 |H0 ) = 1 − Q − 1
γ →∞ |h| ν 2 − h2
√ q
3h2
h N µ(µ − h) + |µh|
µ (µ − h)2 − (µ2 − h2 ) ln 2µ 2
+Q − 1 (28)
|h| µ2 − h2
√ q
2 − (µ2 − h2 ) ln 3h2
µ N h(µ − h) + |µh|
µ (µ − h) 2µ 2
lim Pr(H̄1 |H1 ) = 1 − Q − 1 (29)
γ →∞ |µ| µ2 − h2
V. CONCLUSION
Ambient backscatter is a newborn technology that has many
open problems. This paper focused on the coding and detec-
tion of the uplink ambient backscatter systems where the
tag has three states. We proposed a new coding scheme
and designed the corresponding detector. The closed-form
expression of detection BER was obtained, and its error floor
was also proved and derived. It was shown that the throughput
was improved with our new coding scheme. Finally, sim-
ulation results were provided to corroborate our theoretical
results.
REFERENCES
[1] L. Xie, Y. Yin, A. V. Vasilakos, and S. Lu, ‘‘Managing RFID Data:
Challenges, opportunities and solutions,’’ IEEE Commun. Surveys Tut.,
vol. 16, no. 3, pp. 1294–1311, Mar. 2014.
[2] C. Boyer and S. Roy, ‘‘Backscatter communication and RFID: Coding,
FIGURE 6. Throughput of different coding schemes and detectors.
energy and MIMO analysis,’’ IEEE Trans. Commun., vol. 62, no. 3,
pp. 770–785, Mar. 2014.
[3] V. Liu, A. Parks, V. Talla, S. Gollakota, D. Wetherall, and J. R. Smith,
The throughput performance of the uplink ambient ‘‘Ambient backscatter: Wireless communication out of thin air,’’ in Proc.
backscatter system based on different coding schemes and ACM SIGCOMM, Hong Kong, 2013, pp. 1–13.
detectors are plotted in Fig. 6. The traditional coding scheme, [4] G. Wang, F. Gao, R. Fan, and C. Tellambura, ‘‘Ambient backscatter com-
munication systems: Detection and performance analysis,’’ IEEE Trans.
the corresponding detector and its BER P0e are given in Commun., vol. 64, no. 11, pp. 1–10, Aug. 2016.
[4, Eq. (46)], and its throughput is calculated as follows [5] B. Kellogg, A. Parks, S. Gollakota, J. R. Smith, and D. Wetherall, ‘‘Wi-Fi
backscatter: Internet connectivity for RF-powered devices,’’ in Proc. ACM
(1 − P0e ) SIGCOMM, Chicago, IL, USA, 2014, pp. 1–12.
Rold = log2 (1 + γ ). (30) [6] V. Iyer, V. Talla, B. Kellogg, S. Gollakota, and J. R. Smith, ‘‘Inter-
N
technology backscatter: Towards Internet connectivity for implanted
For our proposed scheme, the throughput is given by devices,’’ in Proc. ACM SIGCOMM, Florianópolis, Brazil, 2016,
pp. 1–14.
(1 − Pe ) log2 3 [7] A. Parks, A. Liu, S. Gollakota, and J. R. Smith, ‘‘Turbocharging ambient
Rnew = log2 (1 + γ ), (31) backscatter communications,’’ in Proc. ACM SIGCOMM, Chicago, IL,
N USA, 2014, pp. 1–12.
where the BER Pe is provided in (17). Fig. 6 plots both [8] D. Bharadia, K. R. Joshi, M. Kotaru, and S. Katti, ‘‘BackFi: High through-
put WiFi backscatter,’’ in Proc. ACM SIGCOMM, London, U.K., 2015,
throughput curves for Rold and Rnew . It can be seen from pp. 1–14.
Fig. 6 that the new coding scheme can significantly improve [9] Z. Zhang, K. Long, V. A. Vasilakos, and L. Hanzo, ‘‘Full-duplex wireless
the system throughput. Besides, when the traditional coding communications: Challenges, solutions and future research directions,’’
Proc. IEEE, vol. 104, no. 7, pp. 1369–1409, Jul. 2016.
scheme is applied, both the traditional detector and our pro-
[10] J. Kimionis, A. Bletsas, and J. N. Sahalos, ‘‘Increased range bistatic scatter
posed detector are suitable and can achieve similar perfor- radio,’’ IEEE Trans. Commun., vol. 62, no. 3, pp. 1091–1104, Mar. 2014.
mance, which indicates that the proposed detector has similar [11] J. G. Proakis and M. Salehi, Digital Communications, 5th ed. New York,
detection accuracy with the traditional one. NY, USA: McGraw-Hill, 2008.
[12] F. Xu, Y. Q. Jin, and A. Moreira, ‘‘A preliminary study on SAR advanced ZHONGZHAO DOU received the bachelor’s degree in communication
information retrieval and scene reconstruction,’’ IEEE Geosci. Remote engineering and the M.Sc. degree from Beijing University of Posts and
Sens. Lett., vol. 13, no. 10, pp. 1443–1447, Oct. 2016. Telecommunications, Beijing, China, in 2001 and 2004, respectively. He is a
[13] F. Gao, T. Cui, and A. Nallanathan, ‘‘On channel estimation and optimal Ph.D. candidate of South China University of Technology. He is a Wireless
training design for amplify and forward relay network,’’ IEEE Trans. Chief Engineer of the Guangdong Planning and Designing Institute and he
Wireless Commun., vol. 7, no. 5, pp. 1907–1916, May 2008. is currently the Vice President of the Digital and Economy Commission of
[14] F. Gao, R. Zhang, and Y.-C. Liang, ‘‘Optimal channel estimation and train- International Chamber of Commerce China. His research interests include
ing design for two-way relay networks,’’ IEEE Trans. Commun., vol. 57,
SON of LTE and wireless communication theory.
no. 10, pp. 3024–3033, Oct. 2009.
[15] C. Xing, S. Ma, Z. Fei, Y. C. Wu, and H. V. Poor, ‘‘A general robust linear
transceiver design for multi-hop amplify-and-forward MIMO relaying
systems,’’ IEEE Trans. Signal Process., vol. 61, no. 5, pp. 1196–1209,
Mar. 2013.
[16] I. M. Ryzhik, A. Jeffrey, and D. Zwillinger, Table of Integrals, Series and
Products. San Diego, CA, USA: Academic, 2007.
YANG LIU received the B.E. degree from the School of Electronic
and Information Engineering, Beijing Jiaotong University, Beijing, China,
in 2011, where he is currently pursuing the Ph.D. degree with the State ZHANGDUI ZHONG received the B.E. and M.S. degrees from Beijing
Key Laboratory of Rail Traffic Control and Safety. His current research Jiaotong University, Beijing, China, in 1983 and 1988, respectively. He
interests are in the field of detection theory, spectrum-sensing algorithm and is currently a Professor and an Advisor of Ph.D. candidates with Beijing
performance analysis for cognitive radio networks, and ambient backscatter Jiaotong University, where he is also a Director of the School of Computer
communication systems. and Information Technology, and a Chief Scientist with the State Key
Laboratory of Rail Traffic Control and Safety. He is also a Director of
the Innovative Research Team, Ministry of Education, Beijing, and a Chief
Scientist of the Ministry of Railways, Beijing. His interests include wireless
communications for railways, control theory and techniques for railways, and
GSM-R systems. His research has been widely used in railway engineering,
GONGPU WANG received the B.Eng. degree in communication engi- such as Qinghai-Xizang railway, Datong-Qinhuangdao Heavy Haul railway,
neering from Anhui University, Hefei, China, in 2001, and the M.Sc. and many high-speed railway lines in China. He is an Executive Council
degree from Beijing University of Posts and Telecommunications (BUPT), Member of the Radio Association of China, Beijing, and a Deputy Director
China, in 2004, and the Ph.D. degree from the University of Alberta, of the Radio Association, Beijing.
Edmonton, Canada, in 2011. From 2004 to 2007, he was an Assistant He holds five invention patents, and has authored or co-authored seven
Professor with the School of Network Education, BUPT. He has since joined books, and more than 200 scientific research papers in his research area.
the School of Computer and Information Technology, Beijing Jiaotong Uni- He received the MaoYiSheng Scientific Award of China, the ZhanTianYou
versity, China, where he is currently an Associate Professor. His research Railway Honorary Award of China, and the Top 10 Science/Technology
interests include Internet of Things, wireless communication theories, and Achievements Award of Chinese Universities.
signal processing technologies.