Next Article in Journal
A Flexible Platform of Electrochemically Functionalized Carbon Nanotubes for NADH Sensors
Next Article in Special Issue
A Sigfox Energy Consumption Model
Previous Article in Journal
Hyper-Heuristic Capacitance Array Method for Multi-Metal Wear Debris Detection
Previous Article in Special Issue
A Distributed Energy-Balanced Topology Control Algorithm Based on a Noncooperative Game for Wireless Sensor Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Signal Detection for Ambient Backscatter Communication with OFDM Carriers

1
School of Electronic Engineering, Soongsil University, Seoul 06978, Korea
2
Department of Wireless Communications Engineering, Kwangwoon University, Seoul 01897, Korea
3
College of Information and Communication Engineering, Sungkyunkwan University, Suwon 16419, Gyeonggi-do, Korea
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(3), 517; https://doi.org/10.3390/s19030517
Submission received: 18 December 2018 / Revised: 22 January 2019 / Accepted: 23 January 2019 / Published: 26 January 2019

Abstract

:
Ambient backscatter communication (AmBC) is considered as a promising future emerging technology. Several works on AmBC have been proposed thanks to its convenience and low cost property. This paper focuses on finding the optimal energy detector at the receiver side and estimating the corresponding bit error rate for the communication system utilizing the AmBC. Through theoretical and numerical analyses, we present two important results. First, we improve the existing energy detector by calculating the optimal averaging power orders. Second, we take advantage of the early work on orthogonal frequency division multiplexing (OFDM), where the repeating structure of ambient OFDM signals is exploited to cancel out the direct-link interference by using a cyclic prefix, then provide a test statistic in which optimal detection threshold and optimal power order are derived accordingly. The study reveals the inherent limitation of AmBC energy detectors and provides a guidance for achieving optimal power order for a given significance level.

1. Introduction

Ambient backscatter communication (AmBC) is a new mechanism in which a device can communicate with others by backscattering ambient radio-frequency (RF) signals (e.g, WiFi, TV signals) without any additional power suppliers [1,2]. In traditional backscatter communication such as radio-frequency identification (RFID system), a device conveys the data by modulating its reflections of an incident RF signal, which takes an expensive process for generating radio waves. For instance, a reader generates a continuous carrier wave then broadcasts it. A tag receives the signal and modulates it, and backscatters to the reader. Thus, the backscattered signal has a long delay and additional path loss. Moreover, as communicating and computing devices become smaller and abundant, powering them becomes more difficult because they require more batteries, cost, and recharging/replacement that is impractical at large scales. The AmBC solves this problem by utilizing existing RF signals, rather than generating their own radio waves. Since the RF signals are reused, the AmBC is more power-efficient and much cheaper than the traditional radio communication [3,4,5]. Therefore, the AmBC is the key building block that enables internet-of-things (IoT) and ubiquitous communication among devices with cheap and nearly zero maintenance.
Basically, RF-power devices employing the AmBC must face three main challenging issues [5,6]. First, since the backscatter signals are weak, the problem of signal detection with small changes needs to be investigated. Second, traditional backscatter receivers are constructed from powered components (e.g., oscillators), while the AmBC ones use already available RF sources, thereby reducing extra hardware cost and power consumption. In terms of spectrum sensing, the spectrum resource utilization can be much more improved since it does not need to allocate a new frequency spectrum [7]. For instance, by taking the advantage of existing RF signals in the air, it does not required any additional deployment like the RFID reader that suffers more installation and maintenance costs. The question is either how to build a network that enables ambient backscattering or build new complex digital signal processing techniques. Third, how to operate a distributed multiple access protocol and supporting the functionalities required for the AmBC should be considered. In this paper, we attempt to solve the first problem, which is the design of reader detector to recover the tag bits. There are several related works on this topic such as [5,8,9]. In [5], the authors first performed energy detection without the ability to directly measure the energy on the medium. The key insight is that if the transmitter backscatter information at a lower rate than the ambient signals, then one is able to design a receiver that can separate the two signals by leveraging the difference in communication rates. Thus, the results are very low signal-to-noise ratio (SNR) decoding and low data rate. In [8,9], the authors focused on the uplink signal detection of the communication systems adopting the AmBC, where the detectors exploit maximum a posteriori probability (MAP) and maximum-likelihood (ML) estimators at the receiver side. However, the solutions do not perform well when the difference between the backscatter channel and the direct-link channel is small. Other approaches [10,11] make use of WiFi backscatter to decode the tag bits by detecting the changes in the received signal strength which highly depend on channel and multi-path effects. Recently, a new AmBC over orthogonal frequency division multiplexing (OFDM) signals was proposed in [12], where the system model for such AmBC system from spread-spectrum perspective was established. By inhibiting the effects of cyclic prefix (CP) on the ambient OFDM signals, the authors developed a test statistic that is able to invalidate the inter-symbol interference among them. An extension of [12] to the case of multi-antenna receiver was presented in [13], where the test statistic was built from a linear combination of the per-antenna test statistics.
Inspired by [12], our approach is to focus on the uplink signal detection and the performance analysis for a communication system that utilizes AmBC over ambient OFDM signals. Our main ideas and contributions are highlighted as follows. First, we introduce the system model for the AmBC over ambient OFDM carriers in the air and the test statistic for tag signal detection, which are established in [12]. Second, we design an improved energy detector by proposing an arbitrary positive power operation on the signal amplitude instead of the squaring operation given as the previous work. Numerical results demonstrate that the proposed detector with optimum power order can achieve lower bit error rate (BER) and higher data rate than those in [12].
The remainder of this paper is organized as follows. Section 2 presents the system model and the problem formulation. Section 3 analyzes the optimal energy detector design for the proposed scheme. Section 4 gives the numerical results, followed by the conclusion in Section 5.

2. System Model and Problem Formulation

The aim of this section is first to introduce the existing AmBC system that utilizes OFDM carriers, then to present those factors that affect the detector performance. In order to understand how to make use of both energy harvesting and backscattering, we investigate the AmBC system model where an energy harvesting tag uses the existing radio signals from ambient sources to operate itself (e.g., RF source). It produces a modulated reflection of those signals to a nearby receiver (e.g., reader). Legacy receivers employ OFDM structure, where data is transmitted in parallel on a certain number of sub-carriers of different frequencies. Thus, it leads to low power consumption on data transmissions which is very suitable for low-powered hardware or batteryless IoT devices. Moreover, in terms of efficient spectrum sensing, it has been shown that energy detection approach has low computational complexity and ability to identify the spectrum holes without a priori knowledge of primary characteristic [8,14,15]. Once we develop an appropriate test statistic for energy detector, it can guarantee a desired detection performance.

2.1. Notations

The following notations are used throughout the paper.
  • E ( · ) and Var ( · ) denote the expectation and variance operators, respectively.
  • N ( μ , σ 2 ) and CN ( μ , σ 2 ) denote the Gaussian and the circularly-symmetric Gaussian distributions with mean μ and variance σ 2 , respectively.
  • Re { · } is the real part of a complex number.
  • A random variable X that is gamma-distributed with shape k and rate θ is denoted as X Γ ( k , θ ) . The corresponding probability density function (PDF) in the shape-rate parametrization is f ( x ; k , θ ) = 1 θ k Γ ( k ) x k 1 exp { x / θ } , where Γ ( k ) = 0 x k 1 e x d x , k ( 0 , ) is the gamma function evaluated at k.

2.2. Overall System Architecture

The overall system architecture utilizing the AmBC over OFDM carriers is illustrated in Figure 1. In this system, we consider two communication components coexist: the legacy OFDM system and the AmBC system. In the legacy OFDM system, the RF source transmits OFDM signals to its legacy users, while in the AmBC system a backscatter tag transmits its modulated signals to the reader over ambient OFDM carriers from the RF source. Note that this tag is equipped with a switch that can split the received signal into two parts: information decoder (ID) and energy harvester (EH). Assume that they are all connected to a single antenna and use the same RF signals. The RF-powered passive tag communicates with the reader by switching its antenna impedance of its backscattered signals. The energy harvester collects the energy from the ambient OFDM signals and uses it to provide a small amount power required for the communication and performing tasks at the tag. Finally, the backscattered signal is received and decoded by the reader.
Mathematically, the RF source transmit a passband signal s ˜ ( n ) = Re P s s ( n ) exp { j ω 2 π f c n f s } , where s ( n ) is the equivalent complex baseband signal with unit power, P s is the average transmit power, f c is the carrier frequency, and f s is the OFDM bandwidth. The tag receives the RF source signal and transmit its modulation signal c ˜ ( n ) to the reader. When we add the CP, the ambient OFDM signals are converted to a serial form and transmitted through a wireless channel. Suppose that the channel impulse response of a multipath channel is modeled as a finite impulse response filter with a certain number of taps. We denote N s t , N t r , and N s r as the number of taps corresponding to h s t ( n ) , h t r ( n ) , and h s r ( n ) , respectively. Here, we define the maximum delay of the multipath channels as L max { N s r , N s t + N t r 1 } . Let N be the number of subcarriers of OFDM signals s ( n ) and N c p be the CP length. In order to gain perfect timing alignment and frequency synchronization at the receiver side, we assume that the maximum delay spread of the channel is less than the length of the CP, i.e., L N c p . Theoretically, increasing the number of OFDM subcarriers N leads to larger delay spread. With a fixed available bandwidth, it may cause the frequency mismatch problem between two neighbor subcarriers because the subcarrier spacing is very small. On the other hand, the number of OFDM carriers should be proportional to the CP length in practice. Thus, a tradeoff between the CP length and the subcarrier spacing must be obtained for a reasonable design.
Let x ( n ) be the tag data signal, thus, the received signal at the reader is given as
y ( n ) = [ η c ( n ) x ( n ) ] h t r ( n ) y b ( n ) : received backscattered signal from the tag + P s s ( n ) h s r ( n ) y d ( n ) : direct link interference from the RF source + w ( n ) ,
where w ( n ) CN ( 0 , σ 2 ) and η are the noise and the signal attenuation parameter inside the tag, respectively.

2.3. Tag Operation

To ensure the orthogonality of received subcarriers over the useful symbol period as well as efficient joint allocation of subcarriers and powers among legacy users, we need to design a waveform to convey information bit in tag symbol, where the CP is longer than the delay spread of the channel. In fact, the tag uses the waveform construction x ( n ) in [12] to convey the bit B in each tag symbol as
x ( n ) = Π ( n ) + Π n N + N c p 2 , if B ( n ) = 0 ( bit 0 ) , Π ( n ) Π n N N c p 2 , if B ( n ) = 1 ( bit 1 ) ,
where the square function Π ( n ) is defined as
Π ( n ) = 1 for n = 0 , 1 , , N + N c p 2 1 , 0 , otherwise .

2.4. Received Signal at the Reader

At the reader, due to the multipath effect, two portions of the direct-link interference signal y d ( n ) in each OFDM symbol period are identical, i.e., y d ( n ) = y d ( n + N ) , n = N s r 1 , , N c p 1 . Similarly, for the received ambient OFDM signal c ( n ) at the tag, c ( n ) = c ( n + N ) , n = N s t 1 , , N c p 1 . Finally, we obtain the received backscattered signal y b ( n ) at the reader as
y b ( n ) = y b ( n + N ) , if B = 0 y b ( n + N ) , if B = 1 .
For n = L 1 , , N c p 1 , we have
z ( n ) y ( n ) y ( n + N ) = v ( n ) , if B = 0 u ( n ) + v ( n ) , if B = 1 .
Here, v ( n ) CN ( 0 , σ v 2 ) with σ v 2 = ρ σ 2 where ρ is the noise uncertainty factor with a given upper bound noise uncertainty (in dB) B = supp { 10 log 10 ρ } [8], and u ( n ) CN ( 0 , σ u 2 ) with σ u 2 = 4 P s | η | 2 | h t r | 2 l = 0 N s t 1 | h s t ( l ) | 2 . Our goal is to design a test statistic for the reader to recover the tag signal x ( n ) from the received signal y ( n ) without knowledge on OFDM ambient signal P s s ( n ) transmitted from RF source. We begin by exterminating the following detection problem which tries to distinguish between the hypotheses H 0 and H 1 .
H 0 : z ( n ) = v ( n ) , if B = 0 H 1 : z ( n ) = u ( n ) + v ( n ) , if B = 1 .
We define the detection SNR as γ σ u 2 σ v 2 .

3. Optimal Detector Design

Let π 0 = P ( H 0 ) and π 1 = P ( H 1 ) , then π 0 + π 1 = 1 . Regarding to [16], a decision function δ ( x ) partitions the observation domain R into two disjoint sets R 0 and R 1 , where
R 0 = { x : δ ( x ) = 0 } , R 1 = { x : δ ( x ) = 1 } .
We also observe that we have two possible incorrect decisions: (i) probability of false alarm, P f (type-I error) and (ii) probability of miss detection, P m ( δ ) = 1 P d ( δ ) (type-II error), where P d ( δ ) is the probability of correct detection. Mathematically, we express
P f = P ( H 1 was chosen when H 0 true ) , P d = P ( H 1 was chosen when H 1 true ) .
In [16], Neyman and Pearson formulated the binary hypothesis testing problem pragmatically by selecting the test δ that maximizes P d ( δ ) or equivalently that minimizes P m ( δ ) , while ensuring that P f ( δ ) is less than or equal to a number α . The energy detector is derived by using the generated likelihood ratio test approach [16], where u ( n ) CN ( 0 , σ u 2 ) and v ( n ) CN ( 0 , σ v 2 ) .
L ( x ) = f 1 ( z ) f 0 ( z ) H 1 H 0 τ ,
where τ is chosen such that P f = L ( z ) > τ f ( z | H 0 ) d z = α . We define z = { z ( n ) } , u = { u ( n ) } , v = { v ( n ) } ( n = L 1 , , N c p 1 ) , and D = N c p L + 1 . For our hypotheses H 0 and H 1 , the PDFs of the samples can be derived as
f 0 ( z ) = 1 ( 2 π σ v 2 ) D / 2 exp n = L 1 N c p 1 | z ( n ) | 2 2 σ v 2 ,
f 1 ( z ) = 1 ( 2 π σ v 2 ) D / 2 exp n = L 1 N c p 1 | z ( n ) u ( n ) | 2 2 σ v 2 .
Considering the same detection problem of (6), we define a new test as the following to improve the detection performance.
t 1 D n = L 1 N c p 1 | z ( n ) | p σ v p H 1 H 0 τ .
Here, p > 0 is an arbitrary constant which is discussed later, and τ is the detection threshold to be determined. Then, the test statistic follows the Gamma distribution with shape k i and scale θ i , i.e., t Γ ( k i , θ i ) under H i , where k i = [ E ( t | H i ) ] 2 Var ( t | H i ) , θ i = Var ( t | H i ) E ( t | H i ) ( i = 0 or 1 ) . We denote F 0 ( · ) , F 1 ( · ) are the cumulative distribution functions (CDFs) of the Gamma variable t under H 0 and H 1 , respectively, thus, F i ( z ; k i ; θ i ) = 0 z 1 θ i k i Γ ( k i ) x k i 1 e x / θ i d x ( i = 0 , 1 ) . Then, we have
P f = P ( t > τ | H 0 ) = 1 F 0 ( τ ; k 0 , θ 0 ) ,
P d = P ( t > τ | H 1 ) = 1 F 1 ( τ ; k 1 , θ 1 ) .
To set the threshold, we set P f = α and thus, τ = F 0 1 ( 1 α , k 0 , θ 0 ) , resulting in P d = 1 F 1 ( F 0 1 ( 1 α , k 0 , θ 0 ) ; k 1 ; θ 1 ) . According to the central limit theorem (CLT) [16], as D becomes large we can represent t N E ( t ) , Var ( t ) . By assuming that | z ( n ) | p / σ v p are independent and identically distributed random variables, we obtain
E ( t | H 0 ) = μ 0 ; Var ( t | H 0 ) = σ 0 2 D ,
E ( t | H 1 ) = μ 1 ; Var ( t | H 1 ) = σ 1 2 D .
Here, we have
μ 0 = 2 p / 2 π Γ p + 1 2 , μ 1 = 2 p / 2 ( 1 + γ ) p / 2 π Γ p + 1 2 ,
σ 0 2 = 2 p π Γ 2 p + 1 2 1 π Γ 2 p + 1 2 ,
σ 1 2 = 2 p ( 1 + γ ) p π Γ 2 p + 1 2 1 π Γ 2 p + 1 2 ,
where Γ ( k ) = 0 x k 1 e x d x ( k > 0 ) is the Gamma function evaluated at k. Thus, the probabilities of false alarm and correct detection can be evaluated as
P f Q τ μ 0 σ 0 / D , P d Q τ μ 1 σ 1 / D .
To set the threshold, we have P f = α , and thus, τ = Q 1 ( α ) σ 0 / D + μ 0 , resulting in
P d Q Q 1 ( α ) σ 0 + D ( μ 0 μ 1 ) σ 1 .
Thus, the overall BER is given by
P e = π 0 P f + π 1 ( 1 P d ) .
Considering equal probabilities of each type of error, i.e., π 0 = π 1 = 1 / 2 , the minimum value of BER is achieved by taking the derivative of P e with respect to τ and letting it to zeros, resulting the optimal detection threshold τ * . The detailed derivation is given in the Remark 1.
Remark 1 (Optimal value of detection threshold).
In order to find the optimal value τ * , we need to solve the following equation
1 2 π σ 0 2 / D exp ( t μ 0 ) 2 2 σ 0 2 / D = 1 2 π σ 1 2 / D exp ( t μ 1 ) 2 2 σ 1 2 / D .
By taking the natural logarithm on both sides, (22) can be simplified as
D 2 1 σ 0 2 1 σ 1 2 t 2 + D μ 0 σ 0 2 μ 1 σ 1 2 t + ln σ 0 σ 1 + D 2 μ 0 2 σ 0 2 μ 1 2 σ 1 2 = 0 .
The above equation is a quadratic form, thus, the optimal detection threshold is given by τ * = ξ 1 2 + ξ 1 2 2 ξ 2 , where
ξ 1 2 = μ 0 σ 0 2 μ 1 σ 1 2 1 σ 0 2 1 σ 1 2 , ξ 2 = 2 D ln σ 0 σ 1 + μ 0 2 σ 0 2 μ 1 2 σ 1 2 1 σ 0 2 1 σ 1 2 .
Remark 2 (Optimal value of power order p).
In [12], the value p is fixed at p = 2 . In our paper, the value p is chosen to maximize P d at fixed P f , γ , and D. Thus, the optimal value of p * is obtained by solving
p * = arg max p P d = arg max p Q Q 1 ( α ) σ 0 / D + μ 0 μ 1 σ 1 / D .
If we assume P d to be differentiable, then we can differentiate both sides
P d p = 0 .
The derivation of solving this equation is given in Appendix A.

4. Numerical Results

In [12], the authors compared the energy detector with a benchmark design in which the reader detected the tag bit by distinguishing between two different orders of the average power of the received signal y ( n ) , where
z ¯ 1 N + C c p n = 1 N + N c p 1 | y ( n ) | 2 .
They also showed that the their design was comparable to the benchmark design in terms of complexity, but the performance was better in terms of transmission rate and BER. Thus, we compare our proposed approach with [12] (i.e., p = 2 ), which is referred as the “conventional” energy detector. A summary description of simulation parameters is given in Table 1. For comparison purpose, we keep all the parameter as the same for both detection schemes. In fact, if the tag backscatters the information at a lower rate than the ambient signals, we can design a receiver that can separate two signals [5,12].
In the following, we briefly describe some metrics that we used to evaluate the proposed statistic test. The test must be a sufficient statistic for our energy detection problem and contains all the information required to distinguish two hypotheses H 0 and H 1 .
(i)
First, we check the validity of the Gaussian approximation for the proposed test. In fact, since the test statistic (11) follows the Gamma distribution under both hypotheses, the length D must be large enough to apply the CLT while not very large to keep the approximation meaningful. In the first run, Figure 2 gives us a case study on this approximation.
(ii)
Second, in order to find the optimal p for the test (11) instead of using p = 2 , we solve (25) to obtain an adaptive power order. The result is shown in Figure 3. The purpose of this result is to observe how the p * changes for maximizing the probability of correct detection according to the changes in the SNR. Thus, we may have a certain strategy to select p for a given SNR and a false alarm rate.
(iii)
Third, with different settings (e.g., SNR and N c p ), we observe how much the BER changes when using our test statistics and the conventional ones in terms of our ability to solve p * with high correct detection probability P d . The results are given in Figure 4 and Figure 5.
(iv)
Finally, we provide the median receiver operating characteristics (ROC) curve for our detector design as predicted by our aforementioned analysis.
Following the above construction, in order to verify the accuracy of approximating the simulated PDFs (i.e., Gamma distribution) by the theoretical approximation (i.e., Q-function), Figure 2 illustrates those PDFs when γ = 0 dB, N c p = 64 , and N = 512 , thus, L = 8 and D = 57 . We observe that the Gamma approximation fits well in most cases considered. The accuracy of the approximation increases when p decreases. This approximation may be adequate for practical energy detectors since we can improve it by increasing the length D in the detection. Thus, we have to select appropriate values of length D and P f to guarantee high probability of detection, while keeping the Gaussian approximations to be valid.
Figure 3 shows the optimum value of p in (25) with different fixed values of P f = α . The value p * maximizing P d decreases when γ increases. We also plot a small subgraph at the right hand side of Figure 3 to illustrate the p * value (in vertical axis) versus small SNR (in horizontal axis) because we observe that p * -curve has a big jump in its value for γ in the range of ( 0 , 1 . 5 ) . We offer some brief comments. First, the value p * is probably the best solution we has achieved through numerical results. The p * -curve grows sub-linearly versus small value of SNR (e.g, γ 1 ) simultaneously, while it decays slowly and remains constant as a function of γ 6 . In a certain sense, the vector z represents the relative difference between two input signals. Due to weak backscattered signals, if it has any small component, p = 2 makes them negligible. On the other hand, the optimal power order is around 1, which is more irritated by small values. For instance, when γ 1 , the proposed detector returns p * 1 rather than p = 2 . In this case, it prefers returning the number of non-zero values of the vector z = { z ( n ) } rather than tolerates them.
Figure 4 demonstrates the theoretical BER performance of the conventional energy detector with p = 2 and the proposed detector with optimal power order p * . We set N c p = 64 , N = 512 , and α = 0 . 01 . We can see that the energy detector performs worse than the proposed one because of the inaccurate Gaussian approximation. We also see that the improvement here becomes more prominent when the target probability of false alarm is smaller, as well as the achieved SNR is relatively higher. The BER becomes flat even for high SNR value. For the proposed detector, it can be found that the increasing SNR yields reduced BER, especially when SNR is small (e.g., SNR 2 dB). For larger SNR, the BER performance remains unchanged. This phenomenon may be caused by the strong direct-link interference [13]. Morever, since the reader tries to distinguish between two bits by taking a sufficiently large number of samples, i.e., D, the value of D we consider here is large enough to apply the CLT, thus, the probability of miss detection and the probability of false alarm are moderate, i.e., they are not changed with D. Consequently, the overall BER in (21) does not become much different. The detector must reach the error probabilities uniformly over a whole uncertainty set with various D. As SNR increases, it hits the SNR wall [17] while the required sample complexity meets our performance target.
Figure 5 depicts the curves of BER versus SNR with several value of N c p for the proposed detector. We set γ = 5 dB and α = 0 . 01 . The BER approaches 0.5 at small N c p and there exist little gaps between BER curves. We observe that the BER decreases as N c p increases. However, the smaller N c p offers higher data rate from the relationship
R tag = f s ( N + N c p ) ,
where R tag is the tag rate [12]. Obviously, if we fix the number of OFDM carriers N, R tag decreases as the CP length increases, while the BER decreases, as illustrated in Figure 5. Thus, there exists a trade-off between the BER and the data rate R tag .
In order to assess the performance of the proposed detector, we plot the ROC curves in Figure 6, which shows the relationship between the probability of detection P d and the probability of false alarm P f for a given SNR γ . We confirm that the proposed approach provides better ROC values when γ is small, i.e., the performance gain becomes much larger in the lower SNR environment. As the SNR increases, the detection threshold must be set higher to obtain a good ROC.

5. Conclusions

In this paper, we have studied the signal detection for the AmBC system with OFDM carriers, while providing some key mathematical insights underlying this theory and proposing an improved energy detector with optimum power orders. Especially, in order to maximize the probability of correct detection, the power order of energy detector was chosen subject to the target probability of false alarm. The proposed detector was shown to improve energy efficiency for spectrum sharing via AmBC.
Moreover, based on the insightful results we suggest the following directions for future work.
(i)
Regarding tag operation, an important direction is to come up with a model that examines the energy harvesting model and enhances the detection performance accordingly.
(i)
In our problem formulation, we use a simple noise uncertainty model, i.e., the variance of v ( n ) is assumed to be bounded by a given number B. This value depends only on a single value ρ , thus, it may not incorporate the RF strength and other changes in the environments. Therefore, we need to investigate other nonlinear models that relate to energy detector’s inherent noise uncertainty.
(ii)
We have shown that the proposed energy detector can be effective for the AmBC system with OFDM carriers. However, it needs more theoretical bounds on D and SNR γ along with numerical results.
(iii)
In the problem formulation, we assumed that the tag has two states: backscattering and non-backscattering, while in practice its antenna load may switch among three states: no reflecting, reflecting in the same phase, and reflecting in the opposite phase, resulting in a ternary signal B ( n ) . Thus, we need to design a waveform x ( n ) to convey the corresponding bits.
We expect that the above future directions can contribute to the advancement of energy detection and estimation areas.

Author Contributions

The work was realized with the collaboration of all the authors. T.L.N.N. contributed to the main results and code implementation. Y.S., J.Y.K. and D.I.K. organized the work, provided the funding, supervised the research and reviewed the draft of the paper. All authors discussed the results, approved the final version, and wrote the paper.

Funding

This work was supported by the National Research Foundation of Korea grant funded by the Korean government (MSIT) (2014R1A5A1011478).

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
AmBCAmbient backscatter communication
BERBit error rate
CDFCumulative distribution function
CLTCentral limit theorem
CPCyclic prefix
EDEnergy harvester
IDInformation decoder
MAPMaximum a posteriori probability
MLMaximum likelihood
OFDMOrthogonal frequency-division multiplexing
PDFProbability density function
RFRadio frequency
RFIDRadio-frequency identification
ROCReceiver operating characteristic
SNRsignal-to-noise ratio
TVTelevision

Appendix A. Solving (26)

As we mentioned before, the optimal value p * can be obtained by simply taking the derivative of P d and setting it to be zero. The detailed procedure is described as follows. By using the chain rule and the fundamental theorem of calculus to find the derivative of P d p , we rewrite (26) as
P d Λ Λ p = 0 ,
where Λ = [ Q 1 ( α ) σ 0 + D ( μ 0 μ 1 ) ] / σ 1 A / σ 1 . With some mathematical manipulations, it can be shown that
P d Λ = 1 2 π e Λ 2 2 , Λ p = A p σ 1 A σ 1 p σ 1 2 .
Defining Ψ ( x ) = d d x ln Γ ( x ) = Γ ( x ) Γ ( x ) which is known as the Ψ -function [18], we have
A p = Q 1 ( α ) d σ 0 d p + D d μ 0 d p d μ 1 d p ,
d μ 0 d p = 2 p / 2 1 π Γ p + 1 2 ln 2 + Ψ p + 1 2 ,
d σ 0 d p = 2 p / 2 1 B π 4 B 2 ln 2 + Ψ p + 1 2 Γ p + 1 2 1 π Ψ p + 1 2 Γ 2 p + 1 2 ,
d μ 1 d p = 2 p / 2 1 ( 1 + γ ) p / 2 π Γ p + 1 2 × Ψ p + 1 2 + ln ( 2 + 2 γ ) ,
d σ 1 d p = 2 p / 2 1 ( 1 + γ ) p / 2 B π 4 [ B 2 ln ( 2 + 2 γ ) + Ψ p + 1 2 × Γ p + 1 2 1 π Ψ p + 1 2 Γ 2 p + 1 2 ] ,
where B = Γ p + 1 2 1 π Γ p + 1 2 . By substituting (A3)–(A7) into (A2), the solution of (26) can be numerically found. With other fixed parameters, P d is a function of the single variable p. Thus, we first select an guess interval for p, then apply efficient numerical tools (e.g., Newton method [16]) to obtain the approximate roots of (A2). We also assume that the error produced due to computing process can be ignored, i.e., the numerical result is acceptable for all cases.

References

  1. Ho, C.-K.; Zhang, R. Optimal energy allocation for wireless communications with energy harvesting constraints. IEEE Trans. Signal Process. 2012, 60, 4808–4818. [Google Scholar] [CrossRef]
  2. Sharma, V.; Mukherji, U.; Joseph, V.; Gupta, S. Optimal energy management policies for energy harvesting sensor nodes. IEEE Trans. Wirel. Commun. 2010, 9, 1326–1336. [Google Scholar] [CrossRef] [Green Version]
  3. Buettner, M. Backscatter Protocols and Energy-Efficient Computing for RF-Powered Devices. Ph.D. Thesis, University of Washington, Seattle, WA, USA, 2012. [Google Scholar]
  4. Lu, X.; Wang, P.; Niyato, D.; Kim, D.I.; Han, Z. Wireless networks with RF energy harvesting: A contemporary survey. IEEE Commun. Surv. Tutor. 2014, 17, 757–789. [Google Scholar] [CrossRef]
  5. Liu, V.; Parks, A.; Talla, V.; Gollakota, S.; Wetherall, D.; Smith, J.R. Ambient backscatter: Wireless communication out of thin air. In Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM, Hong Kong, China, 12–16 August 2013; pp. 1–13. [Google Scholar]
  6. Mat, Z.; Zeng, T.; Wang, G.; Gao, F. Signal detection for ambient backscatter system with multiple receiving antennas. In Proceedings of the 2015 IEEE 14th Canadian Workshop on Information Theory (CWIT), St. John’s, NL, Canada, 6–9 July 2015; pp. 50–53. [Google Scholar]
  7. Huynh, N.V.; Hoang, D.T.; Lu, X.; Niyato, D.; Wang, P.; Kim, D.I. Ambient backscatter communications: A contemporary survey. IEEE Commun. Surv. Tutor. 2018, 20, 2889–2922. [Google Scholar] [CrossRef]
  8. Wang, G.; Gao, F.; Fan, R.; Tellambura, C. Ambient backscatter communication systems detection and performance analysis. IEEE Trans. Commun. 2016, 64, 4836–4846. [Google Scholar] [CrossRef]
  9. Qian, J.; Gao, F.; Wang, G.; Jin, S.; Zhu, H. Noncoherent detections for ambient backscatter system. IEEE Trans. Wirel. Commun. 2017, 16, 1412–1422. [Google Scholar] [CrossRef]
  10. Kellogg, B.; Parks, A.; Gollakota, S.; Smith, J.R.; Wetherall, D. Wi-Fi backscatter: Internet connectivity for RF-powered devices. In Proceedings of the 2014 ACM Conference on SIGCOMM, Chicago, IL, USA, 17–22 August 2014; pp. 1–12. [Google Scholar]
  11. Bharadia, D.; Joshi, K.; Kotaru, M.; Katti, S. BackFi: High throughput WiFi backscatter. ACM SIGCOMM Comput. Commun. Rev. 2015, 45, 283–296. [Google Scholar] [CrossRef]
  12. Yang, G.; Liang, Y.C. Backscatter communications over ambient OFDM signals: Transceiver design and performance analysis. In Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 4–8 December 2016; pp. 1–6. [Google Scholar]
  13. Yang, G.; Liang, Y.; Zhang, R.; Pei, Y. Modulation in the air: Backscatter communication over ambient OFDM carrier. IEEE Trans. Commun. 2018, 66, 1219–1233. [Google Scholar] [CrossRef]
  14. Yang, G.; Zhang, Q.; Liang, Y. Cooperative ambient backscatter communications for green Internet-of-things. IEEE Internet Things J. 2018, 5, 1116–1130. [Google Scholar] [CrossRef]
  15. Parks, A.N.; Liu, A.; Gollakota, S.; Smith, J.R. Turbocharging ambient backscatter communication. In Proceedings of the 2014 ACM conference on SIGCOMM, Chicago, IL, USA, 17–22 August 2014; pp. 619–630. [Google Scholar]
  16. Levy, B.C. Principles of Signal Detection and Parameter Estimation; Springer Science & Business Media: New York, NY, USA, 2008; Chapter 2. [Google Scholar]
  17. Tandra, R.; Sahai, A. SNR walls for signal detection. IEEE J. Sel. Top. Signal Process. 2008, 2, 4–17. [Google Scholar] [CrossRef]
  18. Gradshteyn, I.S.; Ryzhik, I.M. Table of Integrals, Series, and Products, 7th ed.; Academic Press: Cambridge, MA, USA, 2007; Chapter 8. [Google Scholar]
Figure 1. A communication system utilizing the AmBC over OFDM carriers. The AmBC system consists of three main components: RF source (e.g., TV tower), ambient backscatter transmitter (e.g., AmBC tag), and ambient backscattter receiver (e.g., reader), while the legacy OFDM system consists of several legacy receivers (e.g., mobile phones).
Figure 1. A communication system utilizing the AmBC over OFDM carriers. The AmBC system consists of three main components: RF source (e.g., TV tower), ambient backscatter transmitter (e.g., AmBC tag), and ambient backscattter receiver (e.g., reader), while the legacy OFDM system consists of several legacy receivers (e.g., mobile phones).
Sensors 19 00517 g001
Figure 2. Illustration of CDFs under H 0 and H 1 . Note that the theoretical analysis shows that the test statistic t Γ ( k i , θ i ) under H i , while the simulation approximation gives us t N ( E ( t ) , Var ( t ) ) , where E ( t ) and Var ( t ) are given in (14) and (15), respectively. (a) Simulated CDFs for t under H 0 when γ = 0 . (b) Simulated CDFs for t under H 1 when γ = 0 .
Figure 2. Illustration of CDFs under H 0 and H 1 . Note that the theoretical analysis shows that the test statistic t Γ ( k i , θ i ) under H i , while the simulation approximation gives us t N ( E ( t ) , Var ( t ) ) , where E ( t ) and Var ( t ) are given in (14) and (15), respectively. (a) Simulated CDFs for t under H 0 when γ = 0 . (b) Simulated CDFs for t under H 1 when γ = 0 .
Sensors 19 00517 g002aSensors 19 00517 g002b
Figure 3. The optimum value of power order p versus γ . It shows the effect of γ on p * at several different SNR levels, which comes from solving procedure of (26). We generated an SNR vector of 21 equally-spaced points between 0 and 10. The p * -curve is aimed to choose the appropriate p value for the test statistic.
Figure 3. The optimum value of power order p versus γ . It shows the effect of γ on p * at several different SNR levels, which comes from solving procedure of (26). We generated an SNR vector of 21 equally-spaced points between 0 and 10. The p * -curve is aimed to choose the appropriate p value for the test statistic.
Sensors 19 00517 g003
Figure 4. BER versus SNR γ . We observe that BER achieves the maximum at γ = 0 . The designed detector can perform well even when the SNR is high. In both detector schemes, the BER remains unchanged despite of large SNR because of strong direct-link interference [8] or SNR wall problem [17].
Figure 4. BER versus SNR γ . We observe that BER achieves the maximum at γ = 0 . The designed detector can perform well even when the SNR is high. In both detector schemes, the BER remains unchanged despite of large SNR because of strong direct-link interference [8] or SNR wall problem [17].
Sensors 19 00517 g004
Figure 5. BER versus SNR with N c p . As we predicted, the BER increases as N c p decreases. Since N is defined to be proportional to N c p , while N c p should be greater than the channel delay spread L to eliminating the interference, there exists tradeoffs between the CP length and the subcarrier spacing as well as the CP length and the tag rate.
Figure 5. BER versus SNR with N c p . As we predicted, the BER increases as N c p decreases. Since N is defined to be proportional to N c p , while N c p should be greater than the channel delay spread L to eliminating the interference, there exists tradeoffs between the CP length and the subcarrier spacing as well as the CP length and the tag rate.
Sensors 19 00517 g005
Figure 6. ROC curve with SNR γ . An ROC curve is obtained by taking the average over 100 independent trials. From the figure, for each false alarm rate P f , there is a SNR value γ for achieving the objective probability of correct detection P d .
Figure 6. ROC curve with SNR γ . An ROC curve is obtained by taking the average over 100 independent trials. From the figure, for each false alarm rate P f , there is a SNR value γ for achieving the objective probability of correct detection P d .
Sensors 19 00517 g006
Table 1. Simulation Parameters
Table 1. Simulation Parameters
ParameterValue
OFDM bandwidth f s = 20 MHz
Number of paths N s r = N s t = 8 , N t r = 1
Attenuation value η = 1
CP length N c p = 16 , 32 , 64 , 128
Number of carriers N = 8 N c p

Share and Cite

MDPI and ACS Style

Nguyen, T.L.N.; Shin, Y.; Kim, J.Y.; Kim, D.I. Signal Detection for Ambient Backscatter Communication with OFDM Carriers. Sensors 2019, 19, 517. https://doi.org/10.3390/s19030517

AMA Style

Nguyen TLN, Shin Y, Kim JY, Kim DI. Signal Detection for Ambient Backscatter Communication with OFDM Carriers. Sensors. 2019; 19(3):517. https://doi.org/10.3390/s19030517

Chicago/Turabian Style

Nguyen, Thu L. N., Yoan Shin, Jin Young Kim, and Dong In Kim. 2019. "Signal Detection for Ambient Backscatter Communication with OFDM Carriers" Sensors 19, no. 3: 517. https://doi.org/10.3390/s19030517

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop