Next Article in Journal
An Online Measurement Method for Insulator Creepage Distance on Transmission Lines
Previous Article in Journal
Review of Electromagnetic Vibration in Electrical Machines
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Novel Sparse-Coded Ambient Backscatter Communication for Massive IoT Connectivity

School of Information and Communication Engineering, Sungkyunkwan University, Suwon 440-746, Korea
*
Author to whom correspondence should be addressed.
Energies 2018, 11(7), 1780; https://doi.org/10.3390/en11071780
Submission received: 8 June 2018 / Revised: 30 June 2018 / Accepted: 5 July 2018 / Published: 6 July 2018

Abstract

:
Low-power ambient backscatter communication (AmBC) relying on radio-frequency (RF) energy harvesting is an energy-efficient solution for batteryless Internet of Things (IoT). However, ambient backscatter signals are severely faded by dyadic backscatter channel (DBC), limiting connectivity in conventional orthogonal time-division-based AmBC (TD-AmBC). In order to support massive connectivity in AmBC, we propose sparse-coded AmBC (SC-AmBC) based on non-orthogonal signaling. Sparse code utilizes inherent sparsity of AmBC where power supplies of RF tags rely on ambient RF energy harvesting. Consequently, sparse-coded backscatter modulation algorithm (SC-BMA) can enable non-orthogonal multiple access (NOMA) as well as M-ary modulation for concurrent backscatter transmissions, providing additional diversity gain. These sparse codewords from multiple tags can be efficiently detected at access point (AP) using iterative message passing algorithm (MPA). To overcome DBC along with intersymbol interference (ISI), we propose dyadic channel estimation algorithm (D-CEA) and dyadic MPA (D-MPA) exploiting weighted-sum of the ISI for information exchange in the factor graph. Simulation results validate the potential of the SC-AmBC in terms of connectivity, detection performance and sum throughput.

1. Introduction

1.1. Backgrounds

Massive connectivity is a key component of future Internet of things (IoT) where radio frequency (RF) devices continuously interact with humans’ daily routine. The vision includes smart home gadgets connected to Wi-Fi (Wireless Fidelity) [1,2], real-time interactive applications such as Bluetooth exchanging video/audio data with a smart phone [3], and inventory management in a huge warehouse [4]. In these applications, RF devices should be designed in low power for prolonging their lifetime and small-form factor for cost savings. Unfortunately, it is reported that most of the power in RF devices are consumed by oscillators, which generate sinusoidal carrier signals for modulation of data. The high power consumption for this digital-to-analog converter (DAC) hinders connectivity for numerous IoT applications with energy-constrained RF devices [5,6,7]. Hence, alternative modulation without the oscillator is considered to be a promising solution for fulfilling IoT requirements.
Ambient backscatter communication (AmBC) is an innovative solution for batteryless IoT, since it replaces power-hungry oscillator with passive load impedances connected to RF antenna [5,6,7]. RF tags, kinds of RF devices composed of low-power micro-controller and load impedances, can reuse ambient signals such as television (TV) [5,7] and Wi-Fi [1,2,6] for sending their data. Instead of generating RF sinusoidal signals, RF tags simply reflect incoming ambient signals and modulate their data by switching load impedances. These load impedances implemented by passive circuit components, resistors and capacitors can constitute two-dimensional signal constellation space spanned by real and imaginary axes of reflection coefficients [8,9]. Only a few μ W of power is required for AmBC, which is in sharp contrast to traditional active RF radios demanding few tens of mW . In addition, ultra-low power consumption of backscatter tags can sustain with ambient RF energy harvesting (EH). Ambient RF signals can be recycled not only for EH but also for information transmission over RF signals by controlling reflection coefficients at RF tags. Therefore, AmBC has strong advantages in terms of energy efficiency and installation cost by reducing the size of RF hardware.

1.2. Related Works

Despite of its benefits, AmBC has several challenges that originate from inherent characteristics of RF signals and channels. Firstly, the ambient signals are not dedicated to backscatter communications. Hence, some of the backscatter schemes based on unmodulated excitation signals, such as energy beamforming [10,11], space-time coding [12,13], and frequency up/down conversion in radio-frequency identification (RFID) [3,4], may not be available in AmBC. Without dedicated RF infrastructure (i.e., 915 MHz RFID reader and power beacon), previous works such as LoRa (Long Range) [14], rateless code [15], statistical inference [16], time-hopping spreading spectrum [17] are not directly applied to AmBC scenarios. Since low-rate symbols are modulated on high-rate ambient signals, modulations and detections should be redesigned for applications of AmBC. Second, channel propagation of AmBC is distinguished from that of active radios [12,13,18,19,20,21]. Compared to one-way channel between transmitter and receiver [22], backscatter radios experience two-way channels (Here, we assume monostatic ambient backscatter where the reader (e.g., Wi-Fi AP) generates RF signals intended for legacy (Wi-Fi) users (instead of RF tags) and also acts as the receiver for the signals reflected from RF tags [2,23]. On the other hand, there is bistatic ambient backscatter where the RF signals are generated from the separated TV or FM station, and cellular base station, while the reader received the reflected signals from RF tags [5,7]): forward channel from reader to tag; backward channel from tag to reader. The cascade of two channels is referred to as dyadic backscatter channel (DBC) and exhibits significant channel attenuations [18] as well as delay spreads [23] compared to the one-way channel. Eventually, the phenomena lead to a low signal-to-noise ratio (SNR) for detection and severe intersymbol interference (ISI).
To overcome the inherent limitations in AmBC, various modulation and detection techniques based on diversity combining schemes are proposed. Multiple receive antennas can enhance detection performance in AmBC. For example, interference cancellation schemes using channel differences [7], or zero-forcing [24] are proposed. The multi-antenna configurations are useful for achieving spatial diversity gain and effective as the number of receive antennas increases. On the other hand, modulation and detection based on spreading sequences can also improve reliability achieving temporal diversity gain. In [2,5], detection SNR of AmBC is reinforced using maximal-ratio combining of backscatter samples. In [25], periodicity of ambient signal is utilized using cyclic prefix (CP) in orthogonal frequency division multiplexing (OFDM) sequences. Orthogonal spreading structure similar to code-division multiple access (CDMA) is proposed in [7].
However, most of the AmBC assumed orthogonality in both modulations and detections. For instance, non-overlapping backscatter symbols are typically represented in two-dimensional Euclidean space (e.g., on-off keying (OOK) [5,6], phase-shift keying (PSK) [2], ternary encoding [26] with orthogonal multiple access (OMA) such as time-division multiple access (TDMA) [27] for providing connectivity). For detections, conventional AmBC ignored ISI in DBC by assuming a long period of backscatter symbol [23] or simply filtered it, which reduces SNR for signal detections [2,23]. In AmBC, tag backscatters data in active mode and harvests RF energy in idle mode whose time portion is much larger than the active mode [15]. Consequently, we can utilize the duty-cycling operation by employing sparse coding over ambient RF signals and support non-orthogonal multiple access (NOMA) for massive connectivity. In addition, low-rate backscatter data are delivered over high-rate ambient RF signal, which can be equivalently regarded as spreading sequences to provide diversity gain for reliable backscatter communications [25]. Utilizing the non-orthogonality for large-scale multiple access [28], high-rate modulation [29], and cooperative diversity [30] techniques attracted significant attention in the fifth generation (5G) wireless network. Non-orthogonal signaling can support various wireless applications such as massive machine type communications (mMTC), ultra-reliable and low-latency communications (URLLC), and simultaneous wireless information and power transfer (SWIPT). However, there is a significant gap between NOMA and AmBC techniques, which requires sophisticated design criteria rather than a simple combination of existing RF techniques.
  • Modulation and Coding Scheme (MCS): In AmBC, MCS is implemented by only passive RF components with limited circuit power. Advanced MCS such as an adapting power ratio in conventional power-domain NOMA, or infinite-length channel coding may not be available in low-complexity AmBC hardware. Hence, code-domain NOMA based on sparse coding is preferred to power-domain NOMA especially for AmBC applications [28,29].  
  • Channel and Detector Modeling: Generally, AmBC modulation is operated in time domain typically using OOK [5,6] and M-PSK [2]. NOMA modulation, on the other hand, is operated in frequency domain such as filtered OFDM [31] for mitigating multipath fading. Consequently, AmBC signal is severely distorted by ISI as a tag’s information is conveyed in a high-rate ambient RF signal and experiences a two-way fading channel in time domain. Thus, proper channel and detector modeling are necessary in AmBC to prevent performance degradation, which may be induced by application of NOMA.
Therefore, we propose non-orthogonal sparse coding and a detector to realize massive connectivity for AmBC, which bridges the significant gap between AmBC and NOMA.

1.3. Proposed Sparse-Coded AmBC (SC-AmBC)

On the other hand, non-orthogonal signaling in both modulation and detection is proposed recently. For example, sparse code multiple access (SCMA) proposed by Huawei (China) proved effective in a highly-overloaded network [32,33]. In particular, sparse coding has three desirable properties that are suitable for massive connectivity:
  • Grant-Free Uplink Transmission: With sparse coding, RF tags can transmit data in the uplink based on a predefined sparse codebook. The codebook structure can accommodate massive and bursty uplink traffic without a request-grant procedure [34]. The property can lead to low-latency without scheduling and resource allocation in contrast to the cognitive radio based AmBC [27].  
  • NOMA: Sparse code encodes data in multi-dimensional complex codewords providing higher degrees of freedom than conventional two-dimensional AmBC modulators [2,5,6,26]. As a result, sparse code can support concurrent RF transmissions and multiple-access interference (MAI) can be efficiently resolved by an iterative message passing algorithm (MPA) [32].  
  • Projected M-ary Modulation: In conventional AmBC modulators, M-ary modulation is only implemented by M distinct load impedances increasing form factors of RF devices for higher-order modulations [2,8,9]. On the other hand, with sparse coding, M-ary data can be represented by few constellation symbols using codeword projection/expansion method [35,36]. Thus, M-ary modulation can be realized in AmBC without increasing form factors of RF devices.
In addition, due to increasing network densification and delay spreads in multipath propagation, exploiting ISI can achieve better spectral properties than conventional detectors by removing CP [31]. Based on these observations, we propose sparse-coded AmBC (SC-AmBC) including design of modulators and detectors for DBC. Our main contributions can be summarized as follows:
  • Sparse-coded backscatter modulation algorithm (SC-BMA) supporting M-ary modulation for AmBC with small-form factors. The modulation can constitute multi-dimensional signal space, which can be easily implemented for passive RF tags without increasing form-factor and exempted from complex signal processing burdening low-cost RF tags.
  • Dyadic channel estimation algorithm (D-CEA) fully capturing characteristics of DBC. The channel modeling includes both the effect of cascaded channel in AmBC and the effect of NOMA signaling and is distinguished from one-way Rayleigh and single-path fading channel without ISI.
  • Dyadic MPA (D-MPA) based on dyadic factor graph exploiting the weighted-sum of ISI caused by DBC in information exchange process. The proposed MPA exploiting ISI instead of filtering it provides superior detection performance to traditional MPA designed for one-way channels.
To the best of the authors’ knowledge, implementing the sparse code for energy-constrained AmBC is not fully explored in literature. The rest of the paper is organized as follows. Section 2 describes SC-AmBC and motivating examples of our model therein. Section 3 presents the load modulation including a sparse coding algorithm and channel estimation algorithm, and an iterative detector based on DBC is proposed in Section 4. Simulation results are provided in Section 5. Finally, Section 6 concludes the paper.

2. System Model

2.1. Notation

Matrices (vectors) are denoted with upper (lower) case bold-face letters (e.g., A or a ); the operator · H denotes the Hermitian; the operator · denotes the vector norm; the operator ⊗ denotes the Kronecker product; the set of real, complex and binary numbers are respectively denoted by R , C and B ; the vector 1 k denotes an all-one column vector with size k and the vector 0 k denotes an all-zero column vector with size k; the operator p A denotes the probability of the event A . the operator E · denotes statistical expectation; CN ( μ , σ 2 ) denotes the circularly symmetric complex normal distribution with mean μ and variance σ 2 .

2.2. System Model

We consider the AmBC network [37] based on access point (AP) such as Wi-Fi as depicted in Figure 1. The AP transmits data to its client as well as energy to nearby RF tags [2,8,9,38], replacing expensive and high-power RFID readers. In terms of deployment cost, utilizing ambient signals is very attractive for backscatter communication as they exist everywhere for providing low-cost Internet connectivity (e.g., TV signal, Wi-Fi, BlueTooth). In the AP’s coverage area, there are multiple RF tags utilizing the ambient signals transmitted from the AP to downlink (DL) client. These RF tags can use the ambient signals for RF energy harvesting using a rectifier circuit exempting large-sized batteries. If they harvest sufficient energy for activating backscatter communication, they modulate load impedances connected to micro-controller to transmit M-ary data instead of large and power-intensive oscillator components [2,8,9,38]. Depending on ambient energy harvesting, tags are only activated in a small fraction of time and mostly remain idle against harvest sufficient energy. The sparsity of ambient backscatter signals motivates us to use encoding data for multi-dimensional complex codewords [20,32,33,39] selected by time-variant reflection coefficients [20,40] and enables low-complexity decoding even for a massive number of concurrent RF transmissions and higher-order modulation. Consequently, SC-BMA among RF tags can enable NOMA, while providing massive connectivity for low-cost RF tags.
Upon the tags’ modulation, AP receives low-rate uplink (UL) backscatter signals from the tags while transmitting high-rate DL signals to the client. Assuming a single antenna at AP where transmission and reception occurs simultaneously in full-duplex, these signals are overlapped causing self-interference (SI) [2,41]. In addition, a high-sampling rate of DL signals significantly reduces sampling period of UL backscatter signals, causing ISI in multipath propagation environments [23]. Moreover, non-orthogonality of sparse code may cause MAI among active tags, degrading detection performance of concurrent RF transmissions [32,33,39,42,43,44]. Therefore, the detection of backscatter signals requires mitigation of the three interferences (i.e., SI, ISI and MAI). Based on self-interference cancellation (SIC) [41,45,46], strong DL interference can be efficiently removed so that UL backscatter detection can be feasible in practice [2]. Then, D-CEA followed by low-complexity iterative D-MPA is newly implemented to effectively detect data in the presence of the ISI and MAI. Clearly, the ambient backscatter rather exploiting interferences significantly improves spectral efficiency three-fold: full-duplex [2,41]; NOMA with sparse code [32,33,39]; and multipath-diversity combining [22].
To support multiple RF tags, link layer protocol of AmBC is composed of channel estimation and data transmission phase as described in Figure 2. In the channel estimation phase, AP estimates the SI channel using a silent period for RF tags [2]. Then, the tags transmit sparse pseudo random symbols known to AP, and it can efficiently estimate backscatter channels using compressed sensing algorithms [15,47]. Moreover, as the DBC [12,13,18,19,20,21] experiences two-way fading in contrast to the conventional one-way fading models, D-CEA capturing the characteristics of these channels will be described in Section 3.
In the data transmission phase, an ambient signal from AP can be sliced into K time slots, each with L samples, to spread N K backscatter signals to increase signal-to-noise ratio (SNR) and reduce circuit-power consumption [2,5,6,7,26,48,49]. As RF tags employ predefined codebooks for data transmissions, active tags can immediately transmit data with low latency without resource allocation and scheduling procedures [34]. At time slot k { 1 , 2 , , K } , the ambient signal with average transmit power σ s 2 can be expressed by
s k = [ s 1 , k , , s L , k ] T C L × 1 , s l , k CN ( 0 , σ s 2 ) ,
where a Gaussian source model with sampling period T s is assumed to design ambient signal [49]. Next, the signal broadcasted from the AP is attenuated by forward channels. The discrete-time channel impulse response between AP and tag n can be expressed as [23]
f n = [ f n ( 1 ) , , f n ( L n + ) ] T , where f n ( l ) CN ( 0 , σ f 2 / L n + ) , σ f 2 = G s A e 4 π d 2 , l { 1 , , L n + } ,
where L n + denotes the number of multipath for tag n { 1 , 2 , , N } . In Equation (2), G s , A e and d, respectively, denote antenna gain at AP, effective aperture of receive antenna and tag distance from AP [40]. Moreover, we assume independent and identically distributed (i.i.d.) channels among tags [12,18,19,21]. It is noteworthy that the forward channel with wide-band ambient signals (e.g., 20 MHz in Wi-Fi) generally experiences frequency-selective fading in sharp contrast to frequency-flat fading in RFID and bistatic backscatter, causing delay spreads of received signals in the forward channel f n [2]. To capture this characteristic, we can use Toeplitz matrix [50], matrix-vector representations of circular-convolution operations. We define Toeplitz lower- and upper-triangular matrices as follows [23]:
F n + = l = 1 L n + f n ( l ) ( J L + ) l 1 C L × L , F n = l = 1 L n + f n ( l ) ( J L ) L l + 1 C L × L ,
where the matrices J L + R L × L and J L R L × L , respectively, denote the Toeplitz forward shift and backward shift matrices of size L × L where the first column of J L + and the first row of J L are given by [ 0 , 1 , 0 , , 0 ] T and [ 0 , 1 , 0 , , 0 ] , respectively [23,50]. Due to delay spread, the received signal at tag n at time slot k can be expressed by superposition of k-th signals and ( k 1 ) -th signals such that
y k , n = F n + s k k th time + F n s k 1 k 1 -th time C L × 1 ,
where the second term in Equation (4) constitutes ISI for the ambient signal s k . Since tags rely on RF energy harvesting, it operates in active or idle state depending on the incident power [37] of the received signal in Equation (4), which is expressed as
E n = E k = 1 K y k , n 2 .
As described in Figure 3, the incident power in Equation (5) affects duty-cycling operation and thus sparsity of NOMA. Let 0 < α 1 be a power ratio between backscattered and incident power, affecting performance of backscatter detection as well as energy harvesting [8,9,38]. Let K 1 < K be the number of time slots when tag is activated. In a codeword of length K ˜ = K L , each tag is activated for K 1 L samples and remains idle for ( K K 1 ) L . It is remarkable that the delay spread of backscatter channel incurs ISI for L ˜ L samples. Moreover, backscatter symbols from N K tags (i.e., NOMA) in active states can be interfered in time-domain causing MAI, further complicating reliable detection of AmBC. Since RF tags are powered by ambient energy harvesting, circuit-power constraint that harvested power with efficiency η [51] is greater than circuit power for entire K ˜ sampling period should be satisfied. If we assume a linear power consumption model with respect to energy per symbol σ c 2 and backscatter symbol rate R s [8,9], the circuit-power constraint can be formulated as
D ( 1 σ b 2 ) η E n active state + ( 1 D ) η E n idle state P c ,
where D = K 1 K , P c = R s σ c 2 and R s = 1 L T s . The average backscatter symbol power proportional to α is denoted by σ b 2 and will be discussed in Section 3. For convenient analysis of EH, we define the normalized energy per backscatter symbol as
β = D σ b 2 .
Under these settings, energy harvesting (EH) constraint or the circuit-power constraint can be reformulated as [37]
E n θ = P c η ( 1 β ) .
From Equation (8), the state of tag a = [ a 1 , , a N ] (0: idle, 1: active) with EH threshold θ can be obtained by
a n = I { E n θ } , for n { 1 , , N } ,
where I { x } denotes the indicator function of the event x. If the EH constraint is satisfied, tag can encode sparse codewords using simple modulator circuit. In the following sections, we describe AmBC modulator in Section 3 and detector in Section 4.

3. Sparse-Coded Load Modulation

As described in the previous section, we design an AmBC modulator based on load impedances satisfying the following characteristics:
  • Small-form Factor: The size of the RF tags is very limited for IoT applications such as implanted biosensors and wearables, so they should have a small number of load impedances to reduce their size. The proposed SC-BMA can enable M-ary modulation [35,36] for these small-form factor IoT devices, which is in sharp contrast to traditional M-ary backscatter modulators with massive number of load impedances (e.g., M-PSK [2], M-QAM [8,52,53]).
  • Interference Exploitation: Detection performance of AmBC is severely degraded by the interferences (i.e., MAI and ISI). To rather exploit these interferences for massive connectivity, we design the codeword structure capturing sparsity [39] of ambient EH and characteristics of DBC [18,23] where two-way fading and severe ISI occur.
Toward these goals, we describe the modulation and encoding models [32,33,39,42], which include design of mapping function [35,36] and sparse factor graph [39].
If tag n is activated, the tag generates log 2 M -length bit stream d n as follows:
d n { d ( 1 ) , , d ( M ) } , d ( m ) = [ d 1 ( m ) d log 2 M ( m ) ] B 1 × log 2 M , if a n = 1 .
To modulate the binary vector d n into M-ary backscatter symbol vector b n , we define the mapping function ψ M for K 1 = 2 and M { 2 , 4 , 8 } as (Here, we consider relatively small values of K 1 and M to show feasibility of high-order AmBC modulation. It is noteworthy that even higher-order modulation (e.g.,  { K 1 = 3 , M = 16 } , { K 1 = 4 , M = 64 } ) can be efficiently implemented at RF tag by appropriate design of the parameter set { K 1 , M } and the mapping function.):
ψ 2 = α [ 1 , 1 ] , for d n = [ 0 ] , α [ 1 , 1 ] , for d n = [ 1 ] , ψ 4 = α [ 1 , 0 ] , for d n = [ 00 ] , α [ 0 , 1 ] , for d n = [ 01 ] , α [ 0 , 1 ] , for d n = [ 10 ] , α [ 1 , 0 ] , for d n = [ 11 ] , ψ 8 = α [ 1 , 1 ] , for d n = [ 000 ] , α [ 1 , 0 ] , for d n = [ 001 ] , α [ 0 , 1 ] , for d n = [ 010 ] , α [ 1 , 1 ] , for d n = [ 011 ] , α [ 0 , 1 ] , for d n = [ 100 ] , α [ 1 , 1 ] , for d n = [ 101 ] , α [ 1 , 1 ] , for d n = [ 110 ] , α [ 1 , 0 ] , for d n = [ 111 ] .
Then, the M-ary symbol vector b n can be expressed by
b n = ψ M ( d n ) { b ( 1 ) , , b ( M ) } , b ( m ) = [ b 1 ( m ) , , b K 1 ( m ) ] R 1 × K 1 ,
σ b 2 = E b n 2 K 1 = α , for M = 2 , 0.5 α , for M = 4 , 0.75 α , for M = 8 .
As described in Figure 4, these mapping functions satisfy the small-form factor requirement in RF tags. For instance, in conventional phase-shift keying (PSK)-based backscatter modulator, M constellation points are present in signal constellation with phase difference 2 π / M  in Figure 4a [2]. Thus, the modulator requires N Z = M distinct load impedances, inevitably increasing the size of RF tags. On the other hand, the SC-AmBC modulator only has three constellation points even for higher-order modulation. Accordingly, the required number of load impedances is N Z = 2 , since a zero-constellation point is equivalent to the idle state of RF tag [26]. Although several constellation points can be overlapped in Figure 4b, symbols can be detectable as long as they are uniquely mapped in K 1 -dimensional signal space in Equation (11), even achieving modulation diversity gain [54] for reliable AmBC. Thus, high-order modulation can be implemented to typical binary PSK (BPSK) backscatter modulator, enabling a high data rate for a small-form factor passive RF devices such as biosensors and wearables.
Remark 1.
The multidimensional mapping function can be designed for any values of K 1 and M with the following rules:
  • In each dimension, there are three constellation points (i.e.,  α , 0 , α ) .
  • A parameter set { K 1 , M } satisfies the inequality M 3 K 1 .
  • Multidimensional symbols are mapped with Gray code labeling.
An example of M-ary mapping function in vector space R 1 × K 1 is expressed in Figure 5. Interestingly, the previous example in Figure 4 is the projection of multidimensional symbol to the axes b 1 , , b K 1 . We can observe that the parameter K 1 constitutes the axes of the signal space and M represents the number of constellation points in the vector space. Since the number of symbols RF tag can represent in each dimension is only three, all of the constellation points exist in dashed rectangular lattices in Figure 5 and the number of symbols M is less than 3 K 1 for unique mapping of M-ary data. In addition, we adopt lattice constellations along with Gray code labeling to lower bit-error rate (BER), which may be suboptimal but efficient and practical heuristic for solving a mapping function design problem known to be NP-hard (Non-deterministic Polynomial-time hard) [33]. Based on these rules, we can generalize the mapping function ψ M even for higher values of K 1 and M based on the projection of the multidimensional constellation for the small-form factor AmBC applications. However, due to practical requirements of quality-of-service (QoS) and sparsity issue for low-complexity decoding, we consider small values of K 1 and M.
In the sequel, K 1 -length modulated symbols b n are spread into K-length sparse codewords using one-way factor graph (Tanner graph) G ˜ [44]. By doing so, dimension of signal is extended to 2 K -dimension [32,33,39,42] with M N points in a main constellation, in contrast to conventional AmBC modulators typically laid on two-dimensional Euclidean spaces [22] with M constellation points (e.g., 4-QAM [9,38], 16-QAM [8,52], 16-PSK [2], 32/64-QAM [53]). As a result, the number of tags allowed to transmit is increased to N = K K 1 . The overloading factor [32], ratio of the number of RF tags and the time slots can be defined by
λ = N / K 1 .
In addition, the duty cycle of tag is extended to D = K 1 / K , which is K 1 -fold increase compared to the time-division-based AmBC (TD-AmBC) with D = 1 / K [2,27]. Although N 1 = K 1 K 1 1 tags are interfering in an arbitrary time slot, the MAI can be efficiently suppressed by exploiting sparse code structure. Although there are many possible choices of K 1 , we choose K 1 = 2 for simplicity of system modeling. The setting can achieve maximum sparsity as well as reasonable error rate for backscatter detection [39]. In addition, it can reduce complexity of modulation and detection algorithms, which will be discussed later. (For example, if K 1 becomes larger, the `for’ loops in Algorithm 1, expressed in terms of n 1 and n 2 , should be modified in terms of n 1 , n 2 , , n K 1 . In addition, information projection and expansion in MPA, as summarized in Table 1, should be extended to higher-order modulation by increasing the range of the indicator parameter as Λ ( k ˜ , n ) { 1 , , K 1 } . It is noted that K 1 = 2 is a common assumption in sparse coding for low-complexity modulation and detection [32,33,34,35,39])
Algorithm 1 Sparse-coded backscatter modulation algorithm (SC-BMA)
1:input the number of time slots K and the modulation order M
2:obtain the symbol mapping b ( m ) = ψ M ( d ( m ) ) , m { 1 , , M } from (11)
3:for m { 1 , , M } do
4:    initialize n = 1
5:    for n 1 = 1 : K 1 do
6:        for n 2 = 1 : K n 1 do
7:           for k = 1 : K do
8:               if k = n 1 then
9:                    b ˜ k , n ( m ) = b 1 ( m ) , g ˜ k , n = 1         ▹ first non-zero element
10:               else if k = n 1 + n 2 then
11:                    b ˜ k , n ( m ) = b 2 ( m ) , g ˜ k , n = 1       ▹ second non-zero element
12:               else
13:                    b ˜ k , n ( m ) = 0 , g ˜ k , n = 0             ▹ zero element
14:               end if
15:           end for
16:            n n + 1
17:        end for
18:    end for
19:end for
20:obtain G ˜ = { g ˜ k , n } , B ( m ) = { b ˜ k , n ( m ) }     ▹ one-way factor graph, codebook
21:generate G ˜ + = G ˜ 1 L , B + ( m ) = B ( m ) 1 L
22:
 
generate G ˜ = [ ( J K + + ( J K ) K 1 ) G ˜ ] [ 1 L ˜ T 0 L L ˜ T ] T , B ( m ) = [ ( J K + + ( J K ) K 1 ) B ( m ) ] [ 1 L ˜ T 0 L L ˜ T ] T
23:output the codebooks { B + ( m ) , B ( m ) } m { 1 , , M } and the factor graphs G ˜ + , G ˜
Note that, in AmBC, to conserve energy as well as increase SNR for RF tags, K-length codewords are spanned on L samples, generating K ˜ = K L -length codewords. In addition, ambient backscatter signal experiences DBC in contrast to the one-way Rayleigh channel in conventional sparse coding. Based on these observations, we introduce dyadic factor graph extending one-way factor graph G ˜ as shown in Figure 6. The dyadic (two-way) factor graph has two kinds of nodes, namely, variable node (VN) representing codeword of tag n { 1 , , N } and function node (FN) representing received signal at sample k ˜ { 1 , , K ˜ } . Due to ISI among backscatter signals, the dyadic factor graph is composed of the forward factor graph G ˜ + = { g ˜ k ˜ , n + } B K ˜ × N and the backward factor graph G ˜ = { g ˜ k ˜ , n } B K ˜ × N representing interference symbols. Here, we use the superscript { · } to represent the signals related to ISI and the superscript { · } + vice versa. The backward factor graph has K L ˜ non-zero rows which are circular-shifted from the forward factor graph, and sparse matrix under the condition L ˜ < L , stating that symbols are only interfered by neighboring symbols [23]. The new graph structure can efficiently exploit the MAI and ISI for backscatter detection, satisfying the second requirement of AmBC for massive connectivity. Based on sparse factor graph structure [39] in UL, the backscatter modulation can be generalized by the pseudo codes in Algorithm 1.
Since channel information is not available at RF tags, they encode data using the one-way codebook { B ( m ) } m { 1 , , M } without knowing ISI, and the forward and backward codebooks { B + ( m ) , B ( m ) } m { 1 , , M } containing information on ISI will be used in detection procedure in Section 4. Thus, the reflection coefficients and backscattered signals at RF tags over L samples can be represented by
x k , n = Γ k , n y k , n C 1 × L , where Γ k , n { 0 } , if a n = 0 ( idle ) , b ˜ k , n ( m ) , if a n = 1 ( active ) .
Similar to the forward channel, backward channel and interference channel can be defined by
g n = [ g n ( 1 ) , , g n ( L n ) ] T , h 0 = [ h 0 ( 1 ) , , h 0 ( L 0 ) ] T , G n + = l = 1 L n g n ( l ) ( J L + ) l 1 C L × L , G n = l = 1 L n g n ( l ) ( J L ) L l + 1 C L × L , H 0 + = l = 1 L 0 h 0 ( l ) ( J L + ) l 1 C L × L , H 0 = l = 1 L 0 h 0 ( l ) ( J L ) L l + 1 C L × L ,
where g n ( l ) CN ( 0 , σ g 2 / L n ) , h 0 ( l ) CN ( 0 , σ h 0 2 / L 0 ) and the variance of backward and leakage channels are denoted by σ g 2 and σ h 0 2 , respectively. In Equation  (17), L n and L 0 denote the number of multipath for backward channel and leakage channel, respectively. Then, the signal received at AP at time slot k can be expressed as
r k = ( H 0 + s k + H 0 s k 1 ) + n = 1 N ( G n + x k , n + G n x k 1 , n ) + w k = n = 1 N ( G n + F n + s k + G n + F n s k 1 ) = h ˜ k , n + Γ k , n + n = 1 N ( G n F n + s k 1 + G n F n s k 2 ) = h ˜ k , n Γ k 1 , n + ( H 0 + s k + H 0 s k 1 ) = h ˜ k , 0 + w k = n = 1 N h ˜ k , n + Γ k , n forward codeword ( MAI ) + n = 1 N h ˜ k , n Γ k 1 , n backward codeword ( ISI ) + h ˜ k , 0 SI + w k noise C L × 1 ,
where w k = [ w 1 , k , , w L , k ] T denotes additive white Gaussian noise with variance σ n 2 . Since the AP knows the ambient signal s k for k { 1 , , K } and the leakage channel h 0 , the SI term in Equation (17) can be reconstructed for SIC [2].
The SIC ouput signal after hybrid digital and analog cancellation [41,45,46] can be given by
t k = r k h ˜ k , 0 C L × 1 .
However, as discussed in [2,23], AP estimates the composite forward-backward channel { h n } n { 1 , , N } rather than the individual estimates of the forward channels { f n } n { 1 , , N } and the backward channels { g n } n { 1 , , N } . The channels h n can be efficiently obtained by compressed sensing based channel estimation techniques [55], which can be defined as
h n = [ h n ( 1 ) , , h n ( L n ) ] T , H n + = l = 1 L n h n ( l ) ( J L + ) l 1 C L × L , H n = l = 1 L n h n ( l ) ( J L ) L l + 1 C L × L ,
where L n = L n + + L n 1 denotes the number of multipath for the composite channel. Assuming i.i.d. fully-correlated DBC model with channel reciprocity appearing in in-band wireless-powered communication network [56], the backward channel satisfies g n = f n and has L = L n = L + = L n + multipath. Consequently, for AmBC detection, we should estimate the forward channels with length L + from the dyadic channels with L = 2 L + 1 . Based on the circular convolution operation *, the relation between f n and h n can be represented by
h n = f n f n , h n ( l ) = i f n ( i ) f n ( l i + 1 ) , l { 1 , , L } .
For example, if L + = 3 , Equation (20) can be expressed by
h n ( 1 ) = f n ( 1 ) f n ( 1 ) = f n ( 1 ) 2 ,
h n ( 2 ) = f n ( 1 ) f n ( 2 ) + f n ( 2 ) f n ( 1 ) = 2 f n ( 1 ) f n ( 2 ) ,
h n ( 3 ) = f n ( 1 ) f n ( 3 ) + f n ( 2 ) f n ( 2 ) + f n ( 3 ) f n ( 1 ) = f n ( 2 ) 2 + 2 f n ( 1 ) f n ( 3 ) ,
h n ( 4 ) = f n ( 2 ) f n ( 3 ) + f n ( 3 ) f n ( 2 ) = 2 f n ( 2 ) f n ( 3 ) ,
h n ( 5 ) = f n ( 3 ) f n ( 3 ) = f n ( 3 ) 2 .
From Equation (21), f n ( 1 ) can be given by f n ( 1 ) = ± h n ( 1 ) . We choose the estimated channel f ^ n ( 1 ) = h n ( 1 ) from Equation (21) and then sequentially solve Equations (22) and (23). From Equation (17), by solving the first L + equations, the vector f ^ n and the corresponding matrices F ^ n + and F ^ n can be obtained from Equation (3). Then, the dyadic channels in Equation (17) can be reformulated as
h ˜ k , n + f ^ n = F ^ n + F ^ n + s k + F ^ n + F ^ n s k 1 ,
h ˜ k , n f ^ n = F ^ n F ^ n + s k 1 ,
where the second term F ^ n F ^ n s k 2 = 0 L is neglected under the condition L L [23].
Remark 2.
The dyadic channels are even such that
h ˜ k , n + f ^ n = h ˜ k , n + f ^ n ,
h ˜ k , n f ^ n = h ˜ k , n f ^ n .
Since f ^ n = ± f n , we may incorrectly estimate the channels when f ^ n = f n . However, the even symmetry of the channels ensures correct estimation of the channels regardless of their directions. It is noteworthy that the previous works [2,23] in AmBC assumed h ˜ k , n + = H n + s k and h ˜ k , n = 0 L by simply discarding L + 1 samples affected by ISI, inevitably leading to SNR reduction by factor 1 ( L + 1 ) / L . On the other hand, the proposed channel estimation based on the Algorithm 2 enables exploitation of these interferences without SNR loss. In the following section, we discuss iterative detection scheme for superposition signals using dyadic channels as well as codebooks.
Algorithm 2 Dyadic channel estimation algorithm (D-CEA)
1:
 
input the composite forward-backward channels h n n { 1 , , N } and the ambient source signals s k k { 1 , , K }
2:for n { 1 , , N } do
3:    initialize f n ( 1 ) = h n ( 1 )
4:    for l = 2 : ( L + 1 ) / 2 do
5:        solve (20) for the variable f n ( l )
6:    end for
7:    estimate the channel vector f ^ n = [ f ^ n ( 1 ) , , f ^ n ( ( L + 1 ) / 2 ) ] T
8:    estimate the Toeplitz matrices F ^ n + and F ^ n from the Equation (3)
9:    for k { 1 , , K } do
10:
 
        estimate the dyadic forward and backward channels h ˜ k , n + and h ˜ k , n from (26) and (27)
11:    end for
12:end for
13:
 
output the dyadic foward channel { h ˜ k , n + } k , n and the dyadic backward channel { h ˜ k , n } k , n

4. Iterative Detection on Dyadic Channel

For reliable detection of AmBC on DBC, we design the iterative detector with the following characteristics:
  • Interference Exploitation: To achieve massive connectivity in AmBC, the interferences (i.e., MAI and ISI) should be exploited in non-orthogonal manners [31,32], instead of excluding them by using orthogonal signaling as in conventional detectors [2,23]. In addition, iterative MPA should be modified for DBC to achieve additional gain without loss of backscatter signal power.
  • Low Complexity: The received signals in AP are superposition of multiple backscatter signals with M-ary modulation. In addition, ISI introduces another superposition of backscatter signals with delay spreads in the dyadic channels, further increasing complexity of iterative detector. Hence, the complexity of detector should be as low as possible for practical applications of SC-AmBC.
To achieve these goals, we describe an iterative detector especially on DBC in this section. The SIC output [41] in Equation (18) is rewritten by superposition of N reflected signals in time slot k and delayed signals in time slot k 1 , which is
t k = [ t 1 , k , , t L , k ] T = n = 1 N h ˜ k , n + Γ k , n + n = 1 N h ˜ k 1 , n Γ k 1 , n + w k C L × 1 , t l , k = n = 1 N h ˜ k , n , l + Γ k , n + n = 1 N h ˜ k , n , l Γ k 1 , n + w l , k C .
Let the n-th codeword γ n = [ Γ 1 , n , , Γ K , n ] T X n , where X n C K × 1 is the codebook of tag n with cardinality | X n | = M . Define a codeword matrix X = [ γ 1 , , γ N ] C K × N and a received signal matrix Y = [ t 1 , , t K ] C K × N . Then, the maximum a posteriori (MAP) detection rule for codeword X can be expressed as [32]
X ^ = arg max X X 1 × × X N p ( X | Y ) .
The complexity of the above problem is shown to increase exponentially with the number of tags N and polynomially with the constellation size M [32]. Fortunately, the MAP detection problem in Equation (31) can be translated into marginalize product of function (MPF) problem which can be efficiently solved by MPA [44]. In MPA, where codewords are iteratively decoded over the factor graph, we can achieve near-optimal detection performance with low complexity [32,33,39,42]. However, as described in Figure 7, DBC incurs significant ISI for detection of codeword X . If we simply filter ISI using inaccurate channel estimation as in [2,23], we lose a large portion of signal power (e.g., maximum 62.5% in Figure 7c), especially for high-rate AmBC applications. Thus, to prevent the SNR loss caused by DBC, we should modify the conventional MPA [44] to exploit the weighted-sum of ISI. In addition, we adopt the log-domain MPA [43,44], which shows superior decoding performance than MPA for reliable detection of AmBC at low SNR. To achieve this goal, we define the dyadic factor graph for ambient backscatter as follows:
G ˜ = G ˜ + G ˜ ,
where the operator ⊕ denotes element-wise OR operation. In addition, by the channel reciprocity, L ˜ = L + 1 .
Remark 3.
The dyadic factor graph G ˜ with K ˜ = K L FNs and N VNs satisfies the following properties:
  • There are K ( L L ˜ ) FNs with degree K 1 and K L ˜ FNs with degree 2 K 3 .
  • There are K VNs with degree 2 L + L ˜ and N K VNs with degree 2 L + 2 L ˜ .
If L ˜ = 0 , the graph is equivalent to the spreading of the one-way factor graph G ˜ with spreading factor L. As described in Figure 6, L ˜ samples are collided by previous backscatter symbols causing ISI and increasing complexity of decoding. The condition L ˜ < L ensures low-complexity decoding since the collision is only affected by neighboring backscatter symbols [23]. Especially, from Remark 3, information exchanged between FNs and VNs can be decomposed into two cases for reducing computational complexity while exploiting ISI. To perform decoding, we arrange the received signals and channels as follows:
y = [ y 1 , , y K ˜ ] T = [ t 1 T , , t K T ] T C K ˜ × 1 ,
h n + = h 1 , n + , , h K ˜ , n + T = h ˜ 1 , n + T , , h ˜ K , n + T T C K ˜ × 1 ,
h n = h 1 , n , , h K ˜ , n T = h ˜ 1 , n T , , h ˜ K , n T T C K ˜ × 1 .
Then, we define symbol vector composed of M ˜ = min ( M , 3 ) M components as
s = [ S ( m ˜ 1 ) , S ( m ˜ 2 ) ] = α [ 1 , 1 ] , for M = 2 , [ S ( m ˜ 1 ) , S ( m ˜ 2 ) , S ( m ˜ 3 ) ] = α [ 1 , 0 , 1 ] , for M 4 .
For notational convenience, we define the ISI condition as follows:
D ( k ˜ , n ) = n = 1 N a n g ˜ k ˜ , n > 0 .
Given the received signal y , the channels { h n + , h n } n , the noise variance σ n 2 , the tag state a [15], the factor graphs { G ˜ + , G ˜ , G ˜ } and the codebooks { B + ( m ) , B ( m ) } m , the initial information on FN k ˜ can be formulated as
f k ˜ ( { m i } i I k ˜ ) 1 2 σ n 2 y k ˜ i I k ˜ h k ˜ , i + B k ˜ , i + ( m i ) + h k ˜ , i B k ˜ , i ( m i ) 2 , if D ( k ˜ , n ) , 1 2 σ n 2 y k ˜ i I k ˜ h k ˜ , i + B k ˜ , i + ( m i ) 2 , otherwise ,
where the set I k ˜ = n | a n g ˜ k ˜ , n > 0 denotes the VN indices connected to FN k ˜ and codeword indices satisfy m i { 1 , , M } . If FN k ˜ is affected by ISI, the initial information is modified by adding the weighted-sum of ISI represented by the codebook { B ( m ) } m in Equation (38). On the other hand, the dimension of the information in Equation (38) increases exponentially as modulation order M increases [35,36]. Alternatively, we can utilize the fact that the number of symbols is much smaller than the number of codewords as described in Figure 4. For example, if M = 8 , a total of eight codewords are represented in K 1 = 2 dimension with three overlapped symbols. The non-orthogonal projections of the mapping function enable low-complexity decoding even for higher values of M by compression of the information. Using codeword projection method [35,36], the information in Equation (38) can be reformulated as
f k ˜ ( { m i } i I k ˜ ) 1 2 σ n 2 y k ˜ i I k ˜ h k ˜ , i + B k ˜ , i + ( m i ) + h k ˜ , i B k ˜ , i ( m i ) 2 , if D ( k ˜ , n ) ,
f k ˜ + ( { m ˜ i } i I k ˜ ) 1 2 σ n 2 y k ˜ i I k ˜ h k ˜ , i + S ( m ˜ i ) 2 , otherwise .
Now, computational complexity at each FN is reduced for the non-ISI condition in Equation (40). Then, we assign a priori probability a p n ( m n ) to initial information from VN n to FN k ˜ as follows:
I n k ˜ ( m n ) a p n ( m n ) = 1 M .
In the log-domain MPA, cascades of logarithm, summation and exponential operation are approximated using Jacobian logarithm and correction function for low-SNR applications. Now, we define a function max ( δ 1 , δ 2 ) as [43,44]
ln ( e δ 1 + e δ 2 ) max ( δ 1 , δ 2 ) = max ( δ 1 , δ 2 ) + ln ( 1 + e | δ 2 δ 1 | ) .
In the next step, FN k ˜ passes the updated messages to its neighboring VNs. The intermediate variable for the log-domain MPA can be calculated as
I ˜ k ˜ n ( { m i } i I k ˜ ) f k ˜ ( ( { m i } i I k ˜ ) ) + i I k ˜ { n } I i k ˜ ( m i ) , if D ( k ˜ , n ) ,
I ˜ k ˜ n + ( { m ˜ i } i I k ˜ ) f k ˜ + ( ( { m ˜ i } i I k ˜ ) ) + i I k ˜ { n } I ¯ i k ˜ ( m ˜ i ) , otherwise ,
where I ¯ n k ˜ ( m ˜ n ) denotes the projected information from VN n to FN k ˜ . To adapt previous works [35,36] for AmBC over L samples, we define FN indicator function as follows:
Λ ( k ˜ , n ) = i = 1 k ˜ g ˜ i , n + / L + 1 .
Consequently, the information I ¯ n k ˜ ( m ˜ n ) is summarized in Table 1.
Then, the updated message sent to neighboring VNs from FN k ˜ can be efficiently approximated as
I k ˜ n ( m n ) max m i , i I k ˜ { n } I ˜ k ˜ n ( { m i } i I k ˜ ) , if D ( k ˜ , n ) ,
I k ˜ n + ( m ˜ n ) max m ˜ i , i I k ˜ { n } I ˜ k ˜ n + ( { m ˜ i } i I k ˜ ) , otherwise .
Based on the information (46) and (47), VN n sends the updated message to FN k ˜ . Assuming K 1 = 2 and denoting the indices of FNs connected to VN n as J n , the updated message can be represented by
I n k ˜ ( m n ) ln a p n ( m n ) + I k ˜ n ( m n ) max m n , i J n { k ˜ } I i n ( m n ) ,
where the information from FN k ˜ to VN n can be expressed by
I k ˜ n ( m n ) = I k ˜ n ( m n ) , if D ( k ˜ , n ) , I ¯ k ˜ n ( m n ) , otherwise ,
where I ¯ k ˜ n ( m n ) denotes the expanded information which is also summarized in Table 1.
After N I iterations, VN n estimates logarithm of the probability of the code m n as
Q n ( m n ) ln a p n ( m n ) + i J n I i n ( m n ) .
Finally, the log-likelihood ratio (LLR) for m -th most significant bit (MSB) where m { 1 , , log 2 M } for tag n can be calculated as [44]
Θ n , m ln p ( d n , m ) = 0 p ( d n , m ) = 1 = max m : d m ( m ) = 0 Q n ( m ) max m : d m ( m ) = 1 Q n ( m ) .
Then, backscatter data can be detected as
d ^ n , m = 1 , if Θ n , m 0 0 , if Θ n , m > 0 , for a n = 1 .
Based on the iterative detector utilizing MAI and ISI, high-rate backscatter can be achievable by exploiting inherent characteristic of sparsity in ambient energy harvesting as well as DBC providing additional diversity gain.
Lemma 1.
The worst-case complexity of the iterative detector is given by
O 1 L ˜ L M ˜ K 1 + L ˜ L M 2 K 3 .
Proof. 
Information from FN to VN can be decomposed into two cases. In the first case where ISI is not affected, K ( L L ˜ ) FNs are connected to K 1 VNs, respectively, and M-ary codeword information is passed to VNs, resulting M K 1 combination of information. If M-ary codeword is projected to M ˜ symbols, the size of information can be reduced to M ˜ K 1 using information projection [35,36]. On the other hand, K L ˜ FNs affected by ISI are connected to additional K 2 VNs in dyadic factor graph, resulting M 2 K 3 combination of information. Since RF tag relies on energy harvesting, the complexity of detector diminishes as density of active tags becomes sparser. ☐
As expressed in Equation (53), ISI increases complexity of the iterative detector for achieving additional diversity gain. However, the fraction of the FNs affected by the interferences is very small when L ˜ < < L for sufficiently long periods of backscatter symbols. Therefore, we can enjoy low-complexity detection even for non-orthogonal and high-order AmBC. Finally, the average sum throughput of the proposed SC-AmBC can be evaluated as
C = λ R b p ( I ^ | E ) p E ,
where R b = R s / K log 2 M denotes the bit rate of RF tags and the successful information decoding event and energy harvesting event are denoted by I ^ and E , respectively. The probability of successful energy harvesting and information decoding can be calculated as
p ( I ^ | E ) = E a n = 1 d ^ n d n 2 log 2 M ,
p E = E a n ,
where ⊙ denotes exclusive-NOR operator. In conclusion, the comparison of the conventional TD-AmBC and the proposed SC-AmBC are summarized in Table 2.

5. Simulation Results

In this section, we evaluate the performance of our proposed SC-AmBC along with the conventional TD-AmBC. The simulation scenario is set as a wireless local area network (WLAN) using 2.4 GHz industrial, scientific and medical (ISM) band [57]. Applications for the AmBC would be smart home or IoT environments where massive numbers of RF devices are seamlessly integrated into existing wireless infrastructure. For AmBC, AP transmits IEEE 802.11g Wi-Fi OFDM signals [2] while tags harvest these ambient RF signals [51] and upload data streams by switching load impedances [9]. Then, RF tag in SC-AmBC modulates M ˜ load impedances with non-orthogonal sparse codeword, while that in TD-AmBC modulates M impedances with TDMA [2,23]. Then, the AP in SC-AmBC receives the illuminated signals experiencing fully-correlated DBC [12,13,18,19,20,21,23] and detects data streams from these signals via the proposed D-MPA. For simplicity, we assume a system model with a single antenna at AP and no forward-error correction (FEC) codes, but extensions of our model to such scenarios are done in a straightforward manner. The AmBC is numerically evaluated by Monte Carlo simulations, since it is challenging to derive a closed-form theoretical performance in multi-dimensional constellation [39] and in the DBC [13] especially for low SNR. System parameters are summarized in Table 3.

5.1. Applicability to M-Ary Modulation

Figure 8 shows the effect of the modulation order M on the harvesting probability and the conditional BER. In a conventional TD-AmBC modulator, the harvesting probability is irrelevant to the value of M, since all the M-PSK symbols are on the circle of radius α as shown in Figure 4a with β = 0.25 α , M in (7). Note that the reflection coefficient α in the horizontal axis is related to SNR per symbol rather than SNR per bit. Consequently, as M increases, conditional BER in TD-AmBC degrades as the SNR per bit is reduced by factor 1 log 2 M [22].
On the other hand, in an SC-AmBC modulator, the harvesting probability is affected by the modulation order M and the backscatter power σ b 2 in (13), which can be analyzed by the value of β and the threshold θ in (8). In 2-ary modulation, the normalized energy per symbol is given by β = 0.5 α , which is larger than those in TD-AmBC modulations. Larger value of β increases the threshold value θ and eventually reduces the harvesting probability. Similarly, we can anticipate the performance degradation in 8-ary modulation with β = 0.375 α . However, we can observe no performance degradation, especially for 4-ary modulation. In the 4-ary SC-AmBC, the duty cycle D is doubled by using spreading sequences with factor K 1 = 2 and the backscatter power σ b 2 is reduced to half by using zero-constellation point represented in Figure 4b. As a result, the non-orthogonal signaling with zero symbols (i.e., idle state) in SC-AmBC can compensate the harvesting probability without energy loss.
In terms of the BER performance in Figure 8b, all of the SC-AmBC schemes outperform the TD-AmBC schemes. Extension of signal space via sparse coding can enable 1.5× overloading as well as achieve significant diversity gains. Consequently, it is noted that, for large α , 4-ary SC-AmBC provides even lower BER than 2-ary TD-AmBC with the same β . Although the average backscatter power is the same, SC-AmBC can utilize instantaneous channel fluctuations among different time slots, achieving modulation diversity [54]. Therefore, the proposed SC-AmBC can support small-form RF devices with M-ary modulation.

5.2. Applicability to DBC

Figure 9 shows the effect of the DBC for harvesting probability and conditional BER. The harvesting probability increases as the number of multipaths in forward channel L + increases. The multipath diversity reinforces the incident power at tag antenna in (5), improving efficiency of ambient energy harvesting in both the TD-AmBC and the SC-AmBC. However, multipath is harmful to BER performance in conventional TD-AmBC. To resolve ISI caused by DBC, simply filtering ISI-affected samples in detector [2,23] incurs significant loss in SNR as the number of multipath L + increases. Moreover, this limits the operational range of backscatter applications such as inventory control in warehouse and grocery stores [4]. Thus, we can observe the trade-off between the harvesting probability and the conditional BER in the TD-AmBC where ISI is not exploited.
On the other hand, the proposed SC-AmBC can fully exploit the ISI based on D-MPA and D-CEA. Without these algorithms, we can partially exploit the ISI for performance improvement. As shown in Figure 9b, traditional MPA for one-way channel [35,36,44] shows worse BER than those of TD-AmBC, especially in DBC. However, if we add the weighted-sum of ISI for information calculation in Equation (38) using D-MPA, the conditional BER decreases as L + increases, which is in sharp contrast to the conventional TD-AmBC detectors and the baseline SC-AmBC with MPA. Therefore, the proposed D-MPA with D-CEA provides multipath diversity for both the energy harvesting and the information decoding by fully exploiting ISI in DBC.

5.3. Applicability to NOMA

Figure 10 shows the effect of the number of time slots K on the harvesting probability and the conditional BER. Due to high computational complexity for large K, we use M = 2 for this scenario. As the number of time slots K increases, the duty cycle decreases as D = 1 / K for TD-AmBC and D = 2 / K for SC-AmBC. Consequently, backscatter power is reduced to β = α K for TD-AmBC and β = 2 α K for SC-AmBC, providing sufficient power to rectifier circuits in RF tags. Remarkably, increasing K reduces the performance gap between the TD-AmBC and the SC-AmBC. In this manner, increasing K improves the harvesting probability by reducing the duty cycle D in Figure 10a.
On the other hand, increasing K degrades the conditional BER as shown in Figure 10b. Since the backscatter power β is reduced in both the TD-AmBC and the SC-AmBC in Equation (7), the BER performance is degraded accordingly. It is noteworthy that the TD-AmBC detectors have smaller backscatter power (i.e., β = α K ) than those of the SC-AmBC (i.e., β = 2 α K ), exhibiting the worse BER in Figure 10b. More importantly, the sparsity caused by a small duty cycle is not utilized in those TD-AmBC detectors. Those detectors can only support OMA with a limited number of RF tags (i.e., λ = 1 ) and thus are not suitable for massive connectivity. The proposed SC-AmBC can efficiently utilize the sparsity for reliable AmBC detection as well as for overloading multiple RF tags (i.e., λ > 1 ), supporting NOMA. Although MAI may degrade the BER performance, low-complexity MPA achieves near-optimal detection performance by the virtue of the sparsity [32], As a result, the proposed SC-AmBC can enable massive and reliable connectivity over the conventional TD-AmBC.

5.4. Applicability to Energy Harvesting

Figure 11 shows the effect of the reflection coefficient α for the average sum throughput. The magnitude of reflection coefficient α balances the incident power arrived at tag antenna in Equation (5) between energy harvesting and information decoding. The energy-information trade-off in AmBC determines the average sum throughput in various modulators and detectors [37]. However, in the conventional TD-AmBC, the throughput is only marginally improved as it does not exploit MAI and ISI by assuming orthogonality for the modulation and detection, as shown in Figure 11a.
The proposed SC-AmBC, on the other hand, is designed to exploit these interferences in a non-orthogonal manner. Figure 11b demonstrates the benefits of sparse coding in the throughput. Compared to 5.15 Mbps throughput in TD-AmBC, the maximum throughput of SC-AmBC is 8.26 Mbps, achieving an additional 60% gain. In addition, the energy-information trade-off can be flexibly adapted by controlling K, M, as well as α in SC-AmBC. In conclusion, the proposed SC-AmBC is an energy-efficient solution for passive RF devices based on energy harvesting.

6. Conclusions

In this paper, we have proposed an AmBC modulator and detector based on sparse code to address low connectivity and channel fading issues inherent in AmBC. The sparse code was employed at RF tags relying on ambient energy harvesting and supports non-orthogonal concurrent backscatter communications providing massive connectivity to Wi-Fi AP. The sparse code using SC-BMA can be implemented to small-form factor RF devices and enables NOMA with M-ary modulation, achieving modulation diversity by extending the dimension of signal space. For signal detection, the iterative D-MPA and the channel estimation based on D-CEA were proposed to overcome the DBC. By exploiting MAI and ISI in modulation and detection, energy efficiency of AmBC can be enhanced, realizing massive connectivity for passive RF devices relying on energy harvesting. Therefore, SC-AmBC can be applied to batteryless IoT including biosensors, wearables and smart homes where a massive number of these RF devices are seamlessly integrated into existing wireless infrastructure.

Author Contributions

T.Y.K. has contributed to the theoretical approaches, simulation and preparing the paper; D.I.K. carried out the revisions.

Funding

This work was funded by the Korean government (MSIT) (NRF-2014R1A5A1011478).

Acknowledgments

This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korean government (MSIT) (NRF-2014R1A5A1011478).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Kellogg, B.; Talla, V.; Smith, J.R.; Gollakota, S. Passive Wi-Fi: Bringing low power to Wi-Fi transmissions. In Proceedings of the 13th Usenix Symposium on Networked Systems Design and Implementation (NSDI’16), Santa Clara, CA, USA, 16–18 March 2016; pp. 151–164. [Google Scholar]
  2. Bharadia, D.; Joshi, K.R.; Kotaru, M.; Katti, S. BackFi: High throughput WiFi backscatter. In Proceedings of the ACM SIGCOMM’15, London, UK, 17–21 August 2015; pp. 283–296. [Google Scholar]
  3. Ensworth, J.F.; Reynolds, M.S. Every smart phone is a backscatter reader: Modulated backscatter compatibility with Bluetooth 4.0 low energy (BLE) devices. In Proceedings of the 2015 IEEE International Conference on RFID (IEEE RFID 2015), San Diego, CA, USA, 15–17 April 2015; pp. 78–85. [Google Scholar]
  4. Ma, Y.; Selby, N.; Adib, F. Drone relays for battery-free networks. In Proceedings of the ACM SIGCOMM’17, Los Angeles, CA, USA, 21–25 August 2017; pp. 335–347. [Google Scholar]
  5. Liu, V.; Parks, A.; Talla, V.; Gollakota, S.; Wetherall, D.; Smith, J.R. Ambient backscatter: Wireless communication out of thin air. In Proceedings of the ACM SIGCOMM’13, Hong Kong, China, 12–16 August 2013; pp. 39–50. [Google Scholar]
  6. Kellogg, B.; Parks, A.; Gollakota, S.; Smith, J.R.; Wetherall, D. Wi-Fi backscatter: Internet connectivity for RF-powered devices. In Proceedings of the ACM SIGCOMM’14, Chicago, IL, USA, 17–22 August 2014; pp. 607–618. [Google Scholar]
  7. Parks, A.N.; Liu, A.; Gollakota, S.; Smith, J.R. Turbocharging ambient backscatter communication. In Proceedings of the ACM SIGCOMM’14, Chicago, IL, USA, 17–22 August 2014; pp. 619–630. [Google Scholar]
  8. Thomas, S.J.; Reynolds, M.S. A 96 Mbit/sec, 15.5 pJ/bit 16-QAM modulator for UHF backscatter communication. In Proceedings of the 2012 IEEE International Conference on RFID (IEEE RFID 2012), Orlando, FL, USA, 3–5 April 2012; pp. 185–190. [Google Scholar]
  9. Thomas, S.J.; Wheeler, E.; Teizer, J.; Reynolds, M.S. Quadrature amplitude modulated backscatter in passive and semipassive UHF RFID systems. IEEE Trans. Microw. Theory Technol. 2012, 60, 1175–1182. [Google Scholar] [CrossRef]
  10. Krikidis, I. Retrodirective large antenna energy beamforming in backscatter multi-user networks. IEEE Wirel. Commun. Lett. 2018, 1–4. [Google Scholar] [CrossRef]
  11. Gong, S.; Huang, X.; Xu, J.; Liu, W.; Wang, P.; Niyato, D. Backscatter relay communications powered by wireless energy beamforming. IEEE Trans. Commun. 2018. [Google Scholar] [CrossRef]
  12. Boyer, C.; Roy, S. Space time coding for backscatter RFID. IEEE Trans. Wirel. Commun. 2013, 12, 2272–2280. [Google Scholar] [CrossRef]
  13. He, C.; Wang, Z.J.; Miao, C.; Leung, V.C.M. Block-level unitary query: Enabling orthogonal-link space-time code with query diversity for MIMO backscatter RFID. IEEE Trans. Wirel. Commun. 2016, 15, 1937–1949. [Google Scholar] [CrossRef]
  14. Talla, V.; Hessar, M.; Kellogg, B.; Najafi, A.; Smith, J.R.; Gollakota, S. LoRa backscatter: Enabling the vision of ubiquitous connectivity. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2017, 1, 105. [Google Scholar] [CrossRef]
  15. Wang, J.; Hassanieh, H.; Katabi, D.; Indyk, P. Efficient and reliable low-power backscatter networks. In Proceedings of the ACM SIGCOMM’12, Helsinki, Finland, 13–17 August 2012; pp. 61–72. [Google Scholar]
  16. Zhu, G.; Ko, S.-W.; Huang, K. Inference from randomized transmissions by many backscatter sensors. IEEE Trans. Wirel. Commun. 2018, 17, 3111–3127. [Google Scholar] [CrossRef]
  17. Liu, W.; Huang, K.; Zhou, X.; Durrani, S. Full-duplex backscatter interference networks based on time-hopping spread spectrum. IEEE Trans. Wirel. Commun. 2017, 16, 4361–4377. [Google Scholar] [CrossRef]
  18. Griffin, J.D.; Durgin, G.D. Link envelope correlation in the backscatter channel. IEEE Commun. Lett. 2007, 11, 735–737. [Google Scholar] [CrossRef]
  19. Griffin, J.D.; Durgin, G.D. Gains for RF tags using multiple antennas. IEEE Trans. Antennas Propag. 2008, 56, 563–570. [Google Scholar] [CrossRef]
  20. Liu, H.-C.; Lin, W.-C.; Lin, M.-Y.; Hsu, M.-H. Passive UHF RFID tag with backscatter diversity. IEEE Antennas Wirel. Propag. Lett. 2011, 10, 415–418. [Google Scholar]
  21. He, C.; Chen, X.; Wang, Z.J.; Su, W. On the performance of MIMO RFID backscattering channels. EURASIP J. Wirel. Commun. Netw. 2012, 11, 1–15. [Google Scholar] [CrossRef]
  22. Goldsmith, A. Wireless Communications; Cambridge University Press: New York, NY, USA, 2005. [Google Scholar]
  23. Darsena, D.; Gelli, G.; Verde, F. Modeling and performance analysis of wireless networks with ambient backscatter devices. IEEE Trans. Commun. 2017, 65, 1797–1814. [Google Scholar] [CrossRef]
  24. Yang, G.; Zhang, Q.; Liang, Y.-C. Cooperative ambient backscatter communications for green internet-of-things. IEEE IoT J. 2018, 5, 1116–1130. [Google Scholar] [CrossRef]
  25. Yang, G.; Liang, Y.-C.; Zhang, R.; Pei, Y. Modulation in the air: Backscatter communication over ambient OFDM carrier. IEEE Trans. Commun. 2018, 66, 1219–1233. [Google Scholar] [CrossRef]
  26. Liu, Y.; Wang, G.; Dou, Z.; Zhong, Z. Coding and detection schemes for ambient backscatter communication systems. IEEE Access 2017, 5, 4947–4953. [Google Scholar] [CrossRef]
  27. Lu, X.; Niyato, D.; Jiang, H.; Kim, D.I.; Xiao, Y.; Han, Z. Ambient backscatter assisted wireless powered communications. IEEE Wirel. Commun. 2018, 35, 170–177. [Google Scholar] [CrossRef]
  28. Dai, L.; Wang, B.; Yuan, Y.; Han, S.; Chih-Lin, I.; Wang, Z. Non-orthogonal multiple access for 5G: Solutions, challenges, opportunities, and future research trends. IEEE Commun. Mag. 2015, 53, 74–81. [Google Scholar] [CrossRef]
  29. Cai, Y.; Qin, Z.; Cui, F.; Li, G.Y.; McCann, J.A. Modulation and multiple access for 5G networks. IEEE Commun. Surv. Tutor. 2018, 20, 629–646. [Google Scholar] [CrossRef]
  30. Liu, Y.; Ding, Z.; Elkashlan, M.; Poor, H.V. Cooperative non-orthogonal multiple access with simultaneous wireless information and power transfer. IEEE J. Sel. Areas Commun. 2016, 34, 938–953. [Google Scholar] [CrossRef]
  31. Nissel, R.; Schwarz, S.; Rupp, M. Filter bank multicarrier modulation schemes for future mobile communications. IEEE J. Sel. Areas Commun. 2017, 35, 1768–1782. [Google Scholar] [CrossRef]
  32. Nikopour, H.; Baligh, H. Sparse code multiple access. In Proceedings of the 2013 IEEE 24th International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC Workshops), London, UK, 8–9 September 2013; pp. 332–336. [Google Scholar]
  33. Taherzadeh, M.; Nikopour, H.; Bayesteh, A.; Baligh, H. SCMA codebook design. In Proceedings of the 2014 IEEE 80th Vehicular Technology Conference (VTC Fall), Vancouver, BC, Canada, 14–17 September 2014. [Google Scholar]
  34. Au, K.; Zhang, L.; Nikopour, H.; Yi, E.; Bayesteh, A.; Vilaipornsawai, U.; Ma, J.; Zhu, P. Uplink contention based SCMA for 5G radio access. In Proceedings of the 2014 Globecom Workshops (GC Wkshps), Austin, TX, USA, 8–12 December 2014; pp. 900–905. [Google Scholar]
  35. Wu, Y.; Zhang, S.; Chen, Y. Iterative multiuser receiver in sparse code multiple access systems. In Proceedings of the 2015 IEEE International Conference on Communications (ICC), London, UK, 8–12 June 2015; pp. 2918–2923. [Google Scholar]
  36. Bayesteh, A.; Nikopour, H.; Taherzadeh, M.; Baligh, H.; Ma, J. Low complexity techniques for SCMA detection. In Proceedings of the 2015 Globecom Workshops (GC Wkshps), San Diego, CA, USA, 6–10 December 2015. [Google Scholar]
  37. Han, K.; Huang, K. Wirelessly powered backscatter communication networks: Modeling, coverage and capacity. IEEE Trans. Wirel. Commun. 2017, 16, 2548–2561. [Google Scholar] [CrossRef]
  38. Boyer, C.; Roy, S. Coded QAM backscatter modulation for RFID. IEEE Trans. Commun. 2012, 60, 1925–1934. [Google Scholar] [CrossRef]
  39. Zhou, Y.; Yu, Q.; Meng, W.; Li, C. SCMA codebook design based on constellation rotation. In Proceedings of the 2017 IEEE International Conference on Communications (ICC), Paris, France, 21–25 May 2017. [Google Scholar]
  40. Talla, V.; Smith, J.R. Hybrid analog-digital backscatter: A new approach for battery-free sensing. In Proceedings of the 2013 IEEE International Conference on RFID (IEEE RFID 2013), Penang, Malaysia, 30 April–2 May 2013; pp. 74–81. [Google Scholar]
  41. Bharadia, D.; McMilin, E.; Katti, S. Full duplex radios. In Proceedings of the ACM SIGCOMM’13, Hong Kong, China, 12–16 August 2013; pp. 375–386. [Google Scholar]
  42. Peng, J.; Chen, W.; Bai, B.; Guo, X.; Sun, C. Joint optimization of constellation with mapping matrix for SCMA codebook design. IEEE Signal Process. Lett. 2017, 24, 264–268. [Google Scholar] [CrossRef]
  43. Robertson, P.; Villebrun, E.; Hoeher, P. A comparison of optimal and sub-optimal MAP decoding algorithms operating in the log domain. In Proceedings of the 1995 IEEE International Conference on Communications (ICC), Seattle, WA, USA, 18–22 June 1995; pp. 1009–1013. [Google Scholar]
  44. Hoshyar, R.; Wathan, F.P.; Tafazolli, R. Novel low-density signature for synchronous CDMA systems over AWGN channel. IEEE Trans. Signal Process. 2008, 56, 1616–1626. [Google Scholar] [CrossRef] [Green Version]
  45. Sabharwal, A.; Schniter, P.; Guo, D.; Bliss, D.W.; Rangarajan, S.; Wichman, R. In-band full-duplex wireless: Challenges and opportunities. IEEE J. Sel. Areas Commun. 2014, 32, 1637–1652. [Google Scholar] [CrossRef]
  46. Zhang, Z.; Chai, X.; Long, K.; Vasilakos, A.V.; Hanzo, L. Full duplex techniques for 5G networks: Self-interference cancellation, protocol design, and relay selection. IEEE Commun. Mag. 2015, 53, 128–137. [Google Scholar] [CrossRef]
  47. Donoho, D.L. Compressed sensing. IEEE Trans. Inf. Theory 2006, 52, 1289–1306. [Google Scholar] [CrossRef]
  48. Wang, G.; Gao, F.; Fan, R.; Tellambura, C. Ambient backscatter communication systems: Detection and performance analysis. IEEE Trans. Commun. 2016, 64, 4836–4846. [Google Scholar] [CrossRef]
  49. Qian, J.; Gao, F.; Wang, G.; Jin, S.; Zhu, H. Noncoherent detections for ambient backscatter system. IEEE Trans. Wirel. Commun. 2017, 16, 1412–1422. [Google Scholar] [CrossRef]
  50. Wang, Z.; Giannakis, G.B. Wireless multicarrier communications—Where Fourier meets Shannon. IEEE Signal Process. Mag. 2000, 17, 29–48. [Google Scholar] [CrossRef]
  51. Kim, Y.-H.; Ahn, H.-S.; Yoon, C.; Lim, Y.; Lim, S.-O. An ambient RF energy harvesting and backscatter modulating tag system enabling zero-power wireless data communication. In Proceedings of the Seventh International Conference on the Internet of Things (IoT ’17), Linz, Austria, 22–25 October 2017. [Google Scholar]
  52. Besnoff, J.; Abbasi, M.; Ricketts, D.S. High data-rate communication in near-field RFID and wireless power using higher order modulation. IEEE Trans. Microw. Theory Technol. 2016, 64, 401–413. [Google Scholar] [CrossRef]
  53. Jordao, M.; Correia, R.; Carvalho, N.B. High order modulation backscatter systems characterization. In Proceedings of the 2018 IEEE Topical Conference on Wireless Sensors and Sensor Networks (WiSNet), Anaheim, CA, USA, 14–17 January 2018; pp. 44–46. [Google Scholar]
  54. Boutros, J.; Viterbo, E. Signal space diversity: A power- and bandwidth-efficient diversity technique for the Rayleigh fading channel. IEEE Trans. Inf. Theory 1998, 44, 1453–1467. [Google Scholar] [CrossRef]
  55. Choi, J.W.; Shim, B.; Ding, Y.; Rao, B.; Kim, D.I. Compressed sensing for wireless communiciations: Useful tips and tricks. IEEE Surv. Tutor. 2017, 19, 1527–1550. [Google Scholar] [CrossRef]
  56. Yang, G.; Ho, C.K.; Zhang, R.; Guan, Y.L. Throughput optimization for massive MIMO systems powered by wireless energy transfer. IEEE J. Sel. Areas Commun. 2015, 33, 1640–1650. [Google Scholar] [CrossRef]
  57. ISO/IEC Standard for Information Technology—Telecommunications and Information Exchange between Systems—Local and Metropolitan Area Networks—Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications; ISO/IEC 8802-11 IEEE Std 802.11 Second edition 2005-08-01 ISO/IEC 8802 11:2005(E) IEEE Std 802.11i-2003 Edition; IEEE: Piscataway, NJ, USA, 2005; pp. 1–721.
Figure 1. Proposed AmBC network with single AP and multiple RF tags employing ambient RF energy harvesting and backscatter communications using sparse code.
Figure 1. Proposed AmBC network with single AP and multiple RF tags employing ambient RF energy harvesting and backscatter communications using sparse code.
Energies 11 01780 g001
Figure 2. Link layer protocol for AmBC with sparse code.
Figure 2. Link layer protocol for AmBC with sparse code.
Energies 11 01780 g002
Figure 3. Example of duty-cycling operation per codeword of length K ˜ = K L .
Figure 3. Example of duty-cycling operation per codeword of length K ˜ = K L .
Energies 11 01780 g003
Figure 4. Example of mapping function ψ M for AmBC. (a) PSK-based backscatter modulator; (b) sparse-coded backscatter modulator.
Figure 4. Example of mapping function ψ M for AmBC. (a) PSK-based backscatter modulator; (b) sparse-coded backscatter modulator.
Energies 11 01780 g004
Figure 5. Example of multidimensional mapping function. (a) K 1 = 2 , M = 4 ; (b) K 1 = 2 , M = 8 ; (c) K 1 = 3 , M = 16 .
Figure 5. Example of multidimensional mapping function. (a) K 1 = 2 , M = 4 ; (b) K 1 = 2 , M = 8 ; (c) K 1 = 3 , M = 16 .
Energies 11 01780 g005
Figure 6. Example of dyadic factor graph composed of forward factor graph G ˜ + and backward factor graph G ˜ ( K = 4 , N = 6 , K 1 = 2 , L = 3 , L ˜ = 1 ).
Figure 6. Example of dyadic factor graph composed of forward factor graph G ˜ + and backward factor graph G ˜ ( K = 4 , N = 6 , K 1 = 2 , L = 3 , L ˜ = 1 ).
Energies 11 01780 g006
Figure 7. Example of AmBC signals in DBC ( K = 4 , L = 8 , L + = 3 ). (a) transmitted signal from AP; (b) received signal at tag with ISI from forward channel; (c) superposition signal at AP with ISI from a dyadic channel.
Figure 7. Example of AmBC signals in DBC ( K = 4 , L = 8 , L + = 3 ). (a) transmitted signal from AP; (b) received signal at tag with ISI from forward channel; (c) superposition signal at AP with ISI from a dyadic channel.
Energies 11 01780 g007
Figure 8. Effect of the modulation order M ( L + = 3 , K = 4 , λ = 1.5 for SC-AmBC).
Figure 8. Effect of the modulation order M ( L + = 3 , K = 4 , λ = 1.5 for SC-AmBC).
Energies 11 01780 g008
Figure 9. Effect of the number of multipath L + ( M = 4 , K = 4 , λ = 1.5 for SC-AmBC).
Figure 9. Effect of the number of multipath L + ( M = 4 , K = 4 , λ = 1.5 for SC-AmBC).
Energies 11 01780 g009
Figure 10. Effect of the number of time slots K ( M = 2 , L + = 3 ).
Figure 10. Effect of the number of time slots K ( M = 2 , L + = 3 ).
Energies 11 01780 g010
Figure 11. Effect of the reflection coefficient α ( L + = 3 ).
Figure 11. Effect of the reflection coefficient α ( L + = 3 ).
Energies 11 01780 g011
Table 1. Table of information projections and expansions (VN: variable node, FN: factor node).
Table 1. Table of information projections and expansions (VN: variable node, FN: factor node).
M Λ ( k ˜ , n ) Projected Information from VN n to FN k ˜
41 I ¯ n k ˜ ( 1 ) = I n k ˜ ( 1 ) , I ¯ n k ˜ ( 2 ) = max I n k ˜ ( 2 ) , I n k ˜ ( 3 ) , I ¯ n k ˜ ( 3 ) = I n k ˜ ( 4 )
2 I ¯ n k ˜ ( 1 ) = I n k ˜ ( 2 ) , I ¯ n k ˜ ( 2 ) = max I n k ˜ ( 1 ) , I n k ˜ ( 4 ) , I ¯ n k ˜ ( 3 ) = I n k ˜ ( 3 )
81 I ¯ n k ˜ ( 1 ) = max I n k ˜ ( 1 ) , I n k ˜ ( 2 ) , I n k ˜ ( 4 ) , I ¯ n k ˜ ( 2 ) = max I n k ˜ ( 3 ) , I n k ˜ ( 5 ) ,
I ¯ n k ˜ ( 3 ) = max I n k ˜ ( 6 ) , I n k ˜ ( 7 ) , I n k ˜ ( 8 )
2 I ¯ n k ˜ ( 1 ) = max I n k ˜ ( 1 ) , I n k ˜ ( 5 ) , I n k ˜ ( 6 ) , I ¯ n k ˜ ( 2 ) = max I n k ˜ ( 2 ) , I n k ˜ ( 8 ) ,
I ¯ n k ˜ ( 3 ) = max I n k ˜ ( 3 ) , I n k ˜ ( 4 ) , I n k ˜ ( 7 )
M Λ ( k ˜ , n ) Expanded Information from FN k ˜ to VN n
41 I ¯ k ˜ n ( 1 ) = I k ˜ n + ( 1 ) , I ¯ k ˜ n ( 2 ) = I k ˜ n + ( 2 ) , I ¯ k ˜ n ( 3 ) = I k ˜ n + ( 2 ) , I ¯ k ˜ n ( 4 ) = I k ˜ n + ( 3 )
2 I ¯ k ˜ n ( 1 ) = I k ˜ n + ( 2 ) , I ¯ k ˜ n ( 2 ) = I k ˜ n + ( 1 ) , I ¯ k ˜ n ( 3 ) = I k ˜ n + ( 3 ) , I ¯ k ˜ n ( 4 ) = I k ˜ n + ( 2 )
81 I ¯ k ˜ n ( 1 ) = I k ˜ n + ( 1 ) , I ¯ k ˜ n ( 2 ) = I k ˜ n + ( 1 ) , I ¯ k ˜ n ( 3 ) = I k ˜ n + ( 2 ) , I ¯ k ˜ n ( 4 ) = I k ˜ n + ( 1 ) ,
I ¯ k ˜ n ( 5 ) = I k ˜ n + ( 2 ) , I ¯ k ˜ n ( 6 ) = I k ˜ n + ( 3 ) , I ¯ k ˜ n ( 7 ) = I k ˜ n + ( 3 ) , I ¯ k ˜ n ( 8 ) = I k ˜ n + ( 3 )
2 I ¯ k ˜ n ( 1 ) = I k ˜ n + ( 1 ) , I ¯ k ˜ n ( 2 ) = I k ˜ n + ( 2 ) , I ¯ k ˜ n ( 3 ) = I k ˜ n + ( 3 ) , I ¯ k ˜ n ( 4 ) = I k ˜ n + ( 3 ) ,
I ¯ k ˜ n ( 5 ) = I k ˜ n + ( 1 ) , I ¯ k ˜ n ( 6 ) = I k ˜ n + ( 1 ) , I ¯ k ˜ n ( 7 ) = I k ˜ n + ( 3 ) , I ¯ k ˜ n ( 8 ) = I k ˜ n + ( 2 )
Table 2. Comparison of the conventional TD-AmBC and the proposed SC-AmBC.
Table 2. Comparison of the conventional TD-AmBC and the proposed SC-AmBC.
TD-AmBC [2,23]SC-AmBC
ModulationLoad impedancesM2
Constellation dimension2 2 K
Constellation symbolsM M ˜
DetectionISI exploitationnoyes
MAI exploitationnoyes
Complexitylowmedium
BERhighlow
NetworkingMax. sum throughput R b λ R b
Max. connectivityK ( K K 1 )
Duty cycle 1 / K K 1 / K
Latencyhighlow
Multiple accessorthogonalnon-orthogonal
Table 3. System parameters.
Table 3. System parameters.
ParametersValuesReferences
OFDM signaling σ s 2 = 20 dBm / σ n 2 = 90 dBm / T s = 50 ns IEEE 802.11g [57]
Antenna property A e = 0.0012 m 2 / G s = + 3 dB Testbed results [2]
Tag hardware η = 0.25 / σ c 2 = 0.58 pJ / symbol Testbed results [9,51]
Sparse code K 1 = 2 / N I = 3 iterations Theoretical results [39]
Coverage, rate d = 5 m  /  L = 8 samples Simulation settings [2]

Share and Cite

MDPI and ACS Style

Kim, T.Y.; Kim, D.I. Novel Sparse-Coded Ambient Backscatter Communication for Massive IoT Connectivity. Energies 2018, 11, 1780. https://doi.org/10.3390/en11071780

AMA Style

Kim TY, Kim DI. Novel Sparse-Coded Ambient Backscatter Communication for Massive IoT Connectivity. Energies. 2018; 11(7):1780. https://doi.org/10.3390/en11071780

Chicago/Turabian Style

Kim, Tae Yeong, and Dong In Kim. 2018. "Novel Sparse-Coded Ambient Backscatter Communication for Massive IoT Connectivity" Energies 11, no. 7: 1780. https://doi.org/10.3390/en11071780

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop