Next Article in Journal
Localization Based on Magnetic Markers for an All-Wheel Steering Vehicle
Next Article in Special Issue
A Robust and Device-Free System for the Recognition and Classification of Elderly Activities
Previous Article in Journal
Potential of Wake-Up Radio-Based MAC Protocols for Implantable Body Sensor Networks (IBSN)—A Survey
Previous Article in Special Issue
Task and Participant Scheduling of Trading Platforms in Vehicular Participatory Sensing Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Optimal Resource Allocation Policies for Multi-User Backscatter Communication Systems

1
Key Laboratory of Ministry of Education in Broadband Wireless Communication and Senor Network Technology, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
2
College of Physics and Electronic Information Engineering, Anhui Normal University, Wuhu 241000, China
*
Author to whom correspondence should be addressed.
Sensors 2016, 16(12), 2016; https://doi.org/10.3390/s16122016
Submission received: 26 October 2016 / Revised: 23 November 2016 / Accepted: 24 November 2016 / Published: 29 November 2016
(This article belongs to the Special Issue New Paradigms in Cyber-Physical Social Sensing)

Abstract

:
This paper considers a backscatter communication (BackCom) system including a reader and N tags, where each tag receives excitation signals transmitted by the reader and concurrently backscatters information to the reader in time-division-multiple-access (TDMA) mode. In this system, we aim to maximize the total system goodput by jointly optimizing reader transmission power, time allocation, and reflection ratio for the cases of passive and semi-passive tags. For each case, an optimization problem is formulated, which is non-convex and can be solved by being decomposed into at most N feasible sub-problems based on the priority of allocated reader transmission power. First, for the passive tags case, by solving the convex sub-problems sequentially and comparing their maximum total goodput, we derive the optimal resource allocation policy. Then, for the semi-passive tags case, we find a close-to-optimal solution, since each sub-problem can be reformulated as a biconvex problem, which is solved by a proposed block coordinate descent (BCD)-based optimization algorithm. Finally, simulation results demonstrate the superiority of the proposed resource allocation policies.

1. Introduction

With the emergence of the Internet-of-Things (IoT), the sustainable energy supply of electronic equipment has become an important issue. However, the lifetime of wireless devices with fixed sources (e.g., batteries) is limited, as periodically replacing or recharging batteries may be inconvenient or infeasible. Recently, radio frequency (RF) signals—which can charge devices by energy harvesting (EH) techniques—have become a potential energy source [1].
RF signals based on EH techniques have been extensively exploited in simultaneous wireless information and power transfer (SWIPT) systems [2,3] and wireless-powered communication networks (WPCNs) [4,5,6,7]. However, in either SWIPT systems or WPCNs, devices require oscillators for carrier signal generation and analog-to-digital converters (ADCs) for signal modulation, which causes high energy consumption. To solve this problem, backscatter communication (BackCom) techniques [8] that do not require oscillators and ADCs have received significant attention in recent years, and can be extensively used in wireless sensor networks [9,10,11,12]. BackCom systems normally include a transceiver, often known as a reader, and multiple nodes, known as tags. The reader transmits excitation signals to activate the tags in forward channels and receives backscattered signals from the tags in backward channels. Tags can be classified as three types: active, passive, and semi-passive. Active tags can radiate signals, while the latter two types communicate with readers based on reflection [8]. Throughout this paper, tags refer to passive or semi-passive tags without specific declaration. For an activated tag, there are typically two states—i.e., sleep and active states. In the sleep state, each tag’s antenna input impedance is matched, and all input energy will be harvested. In the active state, a portion of excitation signals is backscattered to the reader, and the remainder is harvested for circuit operation. However, only semi-passive tags can store energy during the sleep state, due to the availability of batteries.
In [13], ambient backscatter was introduced to enable ubiquitous communication where devices communicate by backscattering environment signals (e.g., TV broadcast signals). However, communication based on environmental power sources may not be stable. To fix this problem, fixed energy sources were introduced in [14]. In [15], a novel network architecture—i.e., a wirelessly powered BackCom network—was modeled using stochastic geometry, and the network coverage probability and transmission capacity were analyzed. In [16] and [17], the authors investigated the security problems of signal-input single-output (SISO) and multiple-input multiple output (MIMO) BackCom systems, respectively. To improve the transmission rate of the secondary user, the BackCom was introduced in cognitive radio networks [18]. To boost the deployment of BackCom systems, the reader collision problem was studied in [19].
The resource allocation problem is usually an important issue in wireless networks. In [20], the authors investigated the resource allocation schemes for two-tier networks, including spectrum-sharing femtocells and macrocells. In [21], the authors used cooperative Hash bargaining game theory to study the joint uplink subchannel and power allocation problem in cognitive small cells. Note that the time resource allocation of both the sleep and active states has an important effect on the performance of BackCom systems. However, this key factor was not investigated in the works [13,14,15,16,17]. Although this time allocation was considered in [18], the transmission rate was fixed such that the significant link reliability was not investigated. To account for the link reliability, the time allocation control for maximizing the system goodput with fixed reader transmission power in a single-user BackCom system including a semi-passive tag was studied in our previous work [22]. In practical deployment of a BackCom system, a reader usually serves multiple tags. Hence, this paper considers a practical multi-user BackCom system where each tag communicates with the reader in time-division-multiple-access (TDMA) mode. In this paper, both the passive and semi-passive tags are considered. Moreover, a dynamic reader transmission power allocation scheme is proposed to further improve the system performance. The key contributions of this paper are summarized as follows.
We consider a multi-user BackCom system including a reader and N tags for both cases of passive and semi-passive tags. To account for the link reliability of each case, an optimization problem is formulated to maximize the total goodput by jointly optimizing reader transmission power, time allocation, and reflection ratio.
For the case of passive tags, by exploiting the priority of allocated reader transmission power, the corresponding non-convex optimization problem is decomposed into N convex sub-problems. By solving the feasible sub-problems sequentially and comparing their maximum total goodput, we derive the optimal resource allocation policy. In this policy, a part of tags cannot be activated due to the low priorities. The “activate or not” decision is discussed.
For the case of semi-passive tags, the corresponding problems are also decomposed into N sub-problems. Each sub-problem is reformulated as a biconvex optimization problem, for which a local optimum point can be found by the proposed block coordinate descent (BCD) [23] based optimization algorithm. Finally, the close-to-optimal resource allocation policy is derived. Note that throughout this paper, “close-to-optimal” corresponds to “locally optimal”.
The simulation results are given to confirm the superiority of the proposed resource allocation policies. Moreover, the equal power allocation policy is given as the benchmark.
The rest of this paper is organized as follows. In Section 2, we introduce the system model. In Section 3 and Section 4, the problem formulation of the passive tags case is formulated, and the optimal solution for this problem is derived, respectively. In Section 5 and Section 6, for the case of semi-passive tags, the problem formulation and a close-to-optimal resource allocation policy are given, respectively. Simulation results are presented in Section 7. Finally, Section 8 concludes this paper.

2. System Model

As shown in Figure 1, we consider a BackCom system consisting of one two-antenna reader and N single-antenna tags. BackCom is studied based on frame slots. The time duration of each frame is given as N T seconds. Each tag is equally allocated with a fixed time duration (given as T seconds), and can only work during its allocated duration. We assume that full-duplex mode at the reader is enabled by employing the perfect self-interference cancellation. During the duration of each tag, the reader transmits excitation signals to the tag and concurrently receives backscattered signals modulated by the tag.

2.1. Backscatter Channel

The forward and backward channels between the reader and i-th tag are modeled as free-space channels and reciprocal. The channel gains of the forward and backward channels—denoted by h i and g i —remain constant over the frame slot. Moreover, the channel gain information is assumed to be perfectly known by the reader and tags. Therefore, the obtained total goodput of both cases of the passive and semi-passive tags using our proposed resource allocation policies are an upper bound of the total goodput with channel estimation errors in realistic scenarios.

2.2. Tag Configuration

Since batteries are only available for the semi-passive tags, the configurations of passive and semi-passive tags are quite different. Assuming the reader transmission power for the i-th tag as P i , the receive power at this tag is given as P i rec = P i h i . Considering the efficiency of both backscattered and harvested power, the signals are modulated by binary phase shift keying (BPSK) [24].

2.2.1. Passive Tag

For a passive tag, if the receive power exceeds a threshold, this tag is activated so that it can enter the active state directly without staying in the sleep state due to the absence of batteries. In the active state, the passive tag backscatters its signals using a portion of instantaneous excitation energy and harvests the remainder to support circuit power over the active time t i a , where t i a = T . The working model is shown in Figure 2. Without loss of generality, assume that the circuit power and energy harvesting efficiency of all passive tags are same, denoted by P c and η, respectively. Since BPSK is employed, define n i as the reflection ratio for signal backscattering of the i-th passive tag, following the definition in [24]. Hence, the backscattered power of the i-th passive tag (denoted by P i b ) is given as P i b = n i P i rec . The harvested energy to cover the circuit energy consumption is given as E i h = η ( 1 n i ) P i rec T . If the receive power is lower than the threshold, the passive tag cannot be activated, so no signals will be backscattered.

2.2.2. Semi-Passive Tag

For a semi-passive tag, we assume that the battery does not have energy at the beginning. First, the i-th semi-passive tag enters the sleep state to harvest energy while consuming negligible circuit power over sleep time t i s [8]. For symbol simplification, the definitions of the semi-passive tags case are the same ones as those of the passive tags case. The stored energy of the i-th semi-passive tag in the sleep state (denoted by E i s ) is given as E i s = η P i rec t i s . Then, the i-th semi-passive tag operates in the active state over the remaining time t i a , satisfying t i a = T t i s , which is shown in Figure 2. The other definitions of the i-th semi-passive tag during the active state can refer to those of the passive tags case.

2.3. Performance Metric

Define the bit error rate (BER) corresponding to the i-th tag at the reader as p i e . According to [25], p i e is given as
p i e = 1 2 erfc P i b g i σ 2 = 1 2 erfc a i n i P i ,
where a i = h i g i σ 2 and σ 2 is the noise power at the reader. To make the system more practical, the quality of service (QoS) is considered. Denote the maximum BER that the system can tolerate as ε (i.e., p i e ε ).
The successful transmission bits of each symbol in the active state—named as goodput—can be given as
G i = G i ( P i , t i a , n i ) = t i a ( 1 p i e ) = t i a 1 2 + 1 2 erf a i n i P i ,
where function erfc ( x ) = 1 erf ( x ) . The performance metric, total goodput, is given as i = 1 N G i .

3. Problem Formulation of Passive Tags

In this section, the total goodput maximization problem of a BackCom system with N passive tags is considered. As stated before, the i-th passive tag can be activated, only when the corresponding reader transmission power is not smaller than a threshold. The threshold is given as
P i th = P c η h i + [ erfc 1 ( 2 ε ) ] 2 a i , i .
To avoid the waste of power, if the reader transmission power for the i-th passive tag is smaller than its threshold, let P i = 0 to allocate more power to other tags with better channel conditions. Therefore, the reader transmission power for the i-th tag satisfies
P i > 0 , P i P i th = 0 , P i < P i th .
Based on the above analysis, the goodput formulation is rewritten as
G i ( P i , n i ) = T 1 2 + 1 2 erf a i n i P i , P i P i th 0 , P i < P i th .
Once the i-th passive tag is activated, the circuit energy constraint P c T E i h should be satisfied, from which n i is rewritten as n i n i max = P i h i η P c P i h i η . Considering the QoS constraint, the minimum reflection ratio for the i-th tag is given as n i min = [ erfc 1 ( 2 ε ) ] 2 a i P i . Therefore, the reflection ratio for the i-th tag satisfies n i min n i n i max . The reader transmission power for each tag is also constrained by the average and peak power, which are denoted by P ave and P max , respectively. The constraints are given as 1 N i = 1 N P i P ave and P i P max , i , respectively. Therefore, the optimization problem is formulated as follows to maximize the total goodput.
( P 1 ) max P , n i = 1 N G i ( P i , n i ) s . t . P i = P i 1 ( P i P i th ) , i , P i P max , i , n i min 1 ( P i P i th ) n i n i max 1 ( P i P i th ) , i , 1 N i = 1 N P i P ave ,
where P = [ P 1 , , P N ] and n = [ n 1 , , n N ] , 1 ( · ) is the indicator function, having the Value 1 if the condition P i P i th is satisfied, or the value 0 if the condition is not satisfied.
Problem P1 is a non-convex problem because the constraints include the indicator function. Hence, it is difficult to find the optimal solution by solving Problem P1 directly. In the following section, the optimal solution for Problem P1 is investigated by exploiting the priority of allocated reader transmission power.

4. Optimal Resource Allocation of Passive Tags

In this section, the optimal solution for Problem P1 is derived. First, Problem P1 is decomposed into N convex sub-problems. Then, the optimal solutions for these feasible sub-problems are derived by convex optimization techniques. Last, the solution for the sub-problem with the maximum total goodput also solves Problem P1.
G i ( P i , n i ) is an increasing function with respect to P i . To maximize the total goodput, these tags with better channel conditions will be allocated power (or be activated) with priority. Hence, there are at most N permutations for activated passive tags. Without loss of generality, assuming the channel gains of N passive tags satisfy h 1 h 2 h N , these N permutations for the indices of activated passive tags are given as [ 1 , , N ] , [ 1 , , N 1 ] , , [ 1 ] . Based on the above permutations, Problem P1 can be decomposed into N sub-problems. That is to say, each permutation corresponds to a sub-problem. For the i-th sub-problem, the number of activated passive tags is M, where M = N i + 1 . G i ( P i , n i ) is also an increasing function with respect to n i , so that n i can keep as n i = n i max over the whole duration in order to maximize the power of backscattered signals. The i-th sub-problem is given by
( P 2 ) max P ^ m = 1 M G ^ m ( P m ) s . t . P m th P m , P m P max , m , m = 1 M P m N P ave ,
where G ^ m ( P m ) = T 1 2 + 1 2 erf a m P m b m , b m = P c g m σ 2 η , and P ^ = [ P 1 , , P M ] . It can prove that G ^ m ( P m ) is a concave function by deriving its second derivative with respect to P m . It follows that m = 1 M G ^ m ( P m ) is also a concave function, since it is the summation of G ^ m ( P m ) . Hence, Problem P2 is a convex problem [26]. Before solving the i-th sub-problem, we first check its feasibility. The feasibility of Problem P2 is given as P m th P max , m and m = 1 M P m th N P ave . If Problem P2 is feasible, the optimal solution for Problem P2 can be derived by considering two sub-cases. First, check whether N P ave M P max . If so, the optimal solution for Problem P2 can be easily derived below.
Theorem 1.
The optimal power allocation of Problem P2 under the condition N P a v e M P m a x is given by
P m * = P m a x , m .
In order to derive the optimal solution for Problem P1, all feasible sub-problems need to be solved sequentially. To reduce the complexity, a useful conclusion is given in the following lemma.
Lemma 1.
If N P a v e M P m a x for the i-th sub-problem, then the optimal solutions for i + 1 -th, ..., N-th sub-problem are not the optimal solution for Problem P1.
Proof. 
See Appendix A. ☐
Based on Lemma 1, it is not necessary to solve the i + 1 -th, ..., N-th sub-problem if N P ave M P max , since the optimal solution for Problem P1 can be found from the first i sub-problems.
If N P ave < M P max , Problem P2 is solved by Lagrange method. The optimal power allocation is given in the following theorem.
Theorem 2.
If N P a v e < M P m a x , then the optimal power allocation for Problem P2 is given as follows
P m * = min { max { P m t h , ν m * + b m a m } , P m a x } , m ,
where ν m * is the unique solution for the equation G ( ν m , c m ) λ * = 0 with respect to ν m , G ( ν m , c m ) = 1 2 π c m e ν m ν m 1 2 , c m = a m T , λ * is the optimal Lagrange multiplier, and m = 1 M P m * = N P a v e .
Proof. 
See Appendix B. ☐
The optimal Lagrange multiplier λ * can be obtained by the bisection method. Based on above discussions, the optimal power allocation policy can be derived using Algorithm 1. The asymptotic complexity of Algorithm 1 is analyzed as follows. The main complexity of Problem P2 comes from deriving Theorem 2. Suppose Δ iterations are needed for the bisection method used in Theorem 2 to guarantee the converge. The complexity of deriving Theorem 2 is given as O ( Δ M ) . We assume that N P ave ( N i + 1 ) P max if and only if i > K ( K N ) and consider the worst-case; i.e., the first K sub-problems are all feasible, the total complexity of Algorithm 1 is thus O ( K Δ M ) .
Algorithm 1 Algorithm for Problem P1
  • Step 1: Decompose Problem P1 into N sub-problems given as Problem P2, and let i = 1 ;
  • Step 2: If i N , check the feasibility of the i-th sub-problem. Then, if the i-th sub-problem is feasible, turn to Step 3; else, let i = i + 1 and turn to Step 2. If i > N , turn to Step 4.
  • Step 3: If N P ave M P max , the optimal power allocation of the i-th sub-problem is given in Theorem 1 and turn to Step 4; If not, the optimal power allocation of i-th sub-problem is given in Theorem 2, let i = i + 1 , and turn to Step 2.
  • Step 4: Compare the total goodput of all feasible sub-problems. The solution corresponding to the maximum total goodput also solves Problem P1.
Remark 1 (Activate or Not).
It can be derived that the decision on whether a tag can be activated is determined by the allocated reader transmission power (or the receive power at the tag). If the allocated power P i is not smaller than the threshold P i t h , the i-th tag is activated; otherwise, this tag stays in the non-activated state. From Algorithm 1, if the i-th sub-problem corresponds to the maximum total goodput, only the first N i + 1 tags can be activated.
Generally, for a BackCom system with passive tags, the tags corresponding to worse channel conditions cannot be activated because the average and peak of reader transmission power are limited. To make the system work in lower reader transmission power, a BackCom system with semi-passive tags is considered in the following sections.

5. Problem Formulation of Semi-Passive Tags

In this section, the total goodput maximization problem of a BackCom system with N semi-passive tags is studied. Since each semi-passive tag has a battery, it can first enter the sleep state to store energy and then operate in the active state. Therefore, the activation threshold for the i-th semi-passive tag can be reduced compared to the case of passive tags. This threshold is given as follows:
P i th = [ erfc 1 ( 2 ε ) ] 2 a i , i .
Following the case of passive tags, Equation (1) is also suitable here, while t i a needs to further optimized. Hence, Equation (2) is rewritten as
G i ( P i , t i a , n i ) = t i a 1 2 + 1 2 erf ( a i n i P i ) , P i P i th 0 , P i < P i th .
If the i-th semi-passive tag can be activated, the reflection ratio satisfies n i min n i 1 . To power up the i-th semi-passive tag, the energy harvested during both the sleep and active states should be sufficient to cover the circuit energy consumption, resulting in the following circuit power constraint:
P c t i a η P i h i ( T t i a ) + η ( 1 n i ) P i h i t i a , i .
Based on the above discussions, the optimization problem of maximizing the total goodput is given as follows
( P 3 ) max P , t a , n i = 1 N G i ( P i , t i a , n i ) s . t . P i = P i 1 ( P i P i th ) , i , P i P max , 0 t i a T , i , n i min 1 ( P i P i th ) n i 1 ( P i P i th ) , i , P c t i a η P i h i ( T t i a ) + η ( 1 n i ) P i h i t i a , i 1 N i = 1 N P i P ave ,
where t a = [ t 1 a , , t N a ] .
Problem P3 is also a non-convex problem. Different from the case of passive tags, Problem P3 is more complicated. In the following section, both the priority of the allocated reader transmission power and the biconvex property are used to solve Problem P3.

6. The Optimal Resource Allocation of Semi-Passive Tags

Like the case of passive tags, the allocated reader transmission power controls the decision to “activate or not”. Hence, there are also at most N permutations for activated semi-passive tags. Based on the analysis in Section 4, Problem P3 is also decomposed into N sub-problems. The formulation of the i-th sub-problem is given by
( P 4 ) max P ^ , t ^ a , n ^ m = 1 M t m a 1 2 + 1 2 erf ( a m P m n m ) s . t . P m th P m , P m P max , m , 0 t m a T , n m min n m 1 , m , P c t m a η P m h m ( T t m a ) + η ( 1 n m ) P m h m t m a , m , m = 1 M P m N P ave ,
where t ^ a = [ t 1 a , , t M a ] and n ^ = [ n 1 , , n M ] . The feasible condition of Problem P4 is also given as P m th P max , m and m = 1 M P m th N P ave . Assume Problem P4 is feasible. Before solving Problem P4, a useful structure for the optimal solution is given in the following lemma.
Lemma 2.
The optimal P m * , t m a * , and n m * for solving Problem P4 satisfy:
P c t m a * = η P m * h m ( T t m a * ) + η ( 1 n m * ) P m * h m t m a * , m .
Proof. 
See Appendix C. ☐
To solve Problem P4, two sub-cases mentioned in Section 4 are considered. If N P ave M P max , let P m * = P max , m . Lemma 2 indicates that extending the active time by full use of harvested power leads to the maximum total goodput. With Lemma 2 and P m * = P max , m , n m is rewritten as n m = T t m a P c η P max h m . Combining with the constraints n m min n m 1 and 0 t m a T leads to the new constraint η P max h m T P c + η P max h m t m a T ^ , where T ^ m = min { η P max h m T P c + η n m min P max h m , T } . Based on the above analysis, Problem P4 can be reduced to Problem P5 as follows.
( P 5 ) max t ^ a m = 1 M t m a 1 2 + 1 2 erf γ m t m a b m s . t . η P max h m T P c + η P max h m t m a T ^ m , m ,
where γ m = c m P max . It is easy to prove that Problem P5 is a convex problem. Exploiting the Lagrange method and KKT conditions, the optimal active time and reflection ratio with P m * = P max , m are given in the following theorem.
Theorem 3.
Given the reader transmission power of each activated semi-passive tag as P m a x , the optimal t m a * and n m * have the following structure.
t m a * = min { max { η P m a x h m T P c + η P m a x h m , γ m z m * + b m } , T ^ m } ,
n m * = T t m a * P c η P m a x h m ,
where z m * is the solution for f ( z m , b m ) = 0 with respect to z m , f ( z m , b m ) = 1 2 + 1 2 erf z m 1 2 π ( z m + b m ) z m 1 2 e z m .
Proof. 
Please refer to [22]. ☐
Theorem 3 reveals that the optimal control policy of an activated tag has a threshold-based structure. The thresholds are with respect to the reader transmission power. Normally, an activated semi-passive tag has two working strategies; i.e., directly active or sleep-then-active. The decision on whether the activated semi-passive tag first enters the sleep state is characterized in [22].
If N P ave < M P max , the method used for Problem P5 cannot solve Problem P4, due to the coupling of P m , t m a and n m in the objective function and constraints. However, Problem P4 can be reformulated as Problem P6 based on Lemma 2,
( P 6 ) max P ^ , t ^ a m = 1 M t m a 1 2 + 1 2 erf c m P m t m a b m s . t . P m th P m P max , m , 0 t m a T , m , η P m h m T P c + η P m h m t m a η P m h m T P c + δ m , m , m = 1 M P m N P ave ,
where δ m = erfc 1 ( 2 ϵ ) 2 σ 2 η g m . Note that Problem P6 is still non-convex due to the coupling P m and t m a in the constraint. However, an important property can be used to solve Problem P6, which is given in the following lemma, and for which the proof is omitted for simplification.
Lemma 3.
Problem P6 can be reformulated as a biconvex optimization problem.
For a biconvex optimization problem, multiple local maxima can be found—some of which may be the global optimum [27]. In order to find a potentially point solving Problem P6, Problem P6 is decomposed into two convex optimization problems with given part of the variables according to Lemma 3. First, given P ^ , Problem P6 is reduced to a convex problem as follows:
( P 7 ) max t ^ a m = 1 M t m a 1 2 + 1 2 erf c m P m t m a b m s . t . η P m h m T P c + η P m h m t m a T ˜ m , m ,
where T ˜ m = min { η P m h m T P c + δ m , T } . Using the method for Problem P5, the solution for Problem P7 is given as: t m a = min { max { η P m h m T P c + η P m h m , c m P m z ˜ m * + b m } , T ˜ m } , where z ˜ m * is the solution for f ( z m , b m ) = 0 .
Given t ^ a , Problem P6 is reduced to the other convex problem as follows
( P 8 ) max P ^ m = 1 M t m a 1 2 + 1 2 erf c m P m t m a b m s . t . P m th P m P max , m , P m ( P c + δ m ) t m a η h m T , m , P m P c t m a η h m T η h m t m a , m , m = 1 M P m N P ave .
Using the method for Problem P2, the solution for Problem P8 can be obtained, and is given as: P m = min { max { P m min , ( ν ˜ m * + b m ) t m a c m } , P m max } , where P m min = max { P m th , ( P c + δ m ) t m a η h m T } and P m max = min { P c t m a η h m T η h m t m a , P max } , ν ˜ m * is the solution for equation G ( ν m , c m ) λ ˜ * = 0 with respect to ν m , λ ˜ * is the optimal Lagrange multiplier.
In the state-of-the-art literature, the BCD method is extensively used to solve biconvex problems due to its superior performance. Therefore, an algorithm-based BCD is proposed to solve Problem P6, which is summarized in Algorithm 2. After deriving the optimal P m * and t m a * , the optimal reflection ratio n m * is given as n m * = T t m a * P c η P m * h m . The asymptotic complexity of Algorithm 2 is analyzed as follows. The complexity of solving Problem P7 is O ( Θ M ) , where Θ is the number of iterations for the bisection method used for Problem P7. The complexity of solving Problem P8 is O ( Δ M ) , as analyzed for Algorithm 1. We assume that Ξ iterations is needed for Algorithm 2 to converge. The total complexity of Algorithm 2 is thus O ( ( Δ + Θ ) M Ξ ) .
Combining Algorithms 1 and 2, Problem P3 can be solved, and the close-to-optimal solution is finally derived. Following the assumptions for Algorithm 1, the asymptotic complexity for solving Problem P3 is O ( ( Δ + Θ ) M Ξ K ) .
Algorithm 2 Algorithm for Problem P6
1:
Initialize: Set j = 0 , choose P ^ ( j ) = [ P 1 ( j ) , , P M ( j ) ] , t ^ a ( j ) = [ t 1 a ( j ) , , t M a ( j ) ] satisfying the constraints of Problem P6, and compute G sum ( j ) = m = 1 M t m a ( j ) 1 2 + 1 2 erf c m P m ( j ) t m a ( j ) b m , set the threshold ϵ > 0 and G sum ( j + 1 ) = G sum ( j ) + 2 ϵ .
2:
while | G sum ( j + 1 ) G sum ( j ) | > ϵ do
3:
 Keep P ^ ( j ) fixed, solve Problem P7 to derive the optimal time allocation t ^ a ( j + 1 ) .
4:
 Keep t ^ a ( j + 1 ) fixed, solve Problem P8 to derive the optimal power allocation P ^ ( j + 1 ) .
5:
 j=j+1.
6:
 Update G sum ( j + 1 ) with P ^ ( j ) , t ^ a ( j ) .
7:
end while
8:
return P ^ * = P ^ ( j ) , t ^ a * = t ^ a ( j ) and G sum * = G sum ( j + 1 ) .

7. Simulation Results

In this section, simulation results are given to corroborate the superiority of the proposed resource allocation policies. The simulation environment is set as follows. For convenience, we assume that the duration of each tag is T = 1 s. The forward and backward channel gains are set as h i = g i = 10 3 d i 3 , where d i is the distance between the reader and i-th tag. d i is randomly generated from 4 m to 6 m. The energy harvesting efficiency and maximum BER are set as η = 0.5 and ϵ = 0.3 , respectively. Moreover, we set the circuit and noise power as P c = 20 dBm and σ 2 = 90 dBm, respectively. In addition, all of the experimental parameters are listed in Table 1. For performance comparison, the equal power allocation policy is considered. All of simulation curves are adopted 1000 Monte Carlo runs.
Figure 3 and Figure 4 show the curves of average total goodput versus the average reader transmission power. We can observe that as the average reader transmission power increases, the average total goodput first increases and then becomes invariant after the average reader transmission power exceeds some threshold. This is because the BER of each tag is close to 0 for high signal-to-noise ratio (SNR) when high allocated power is available. For low average reader transmission power, the passive tags cannot work. The performance of the case of semi-passive tags is superior to the case of passive tags due to the adoption of sleep-then-active strategy. Moreover, the proposed schemes yield much larger goodput than the scheme of equal power allocation.

8. Conclusions

This work studies resource allocation policies for multi-user BackCom systems by considering cases of both passive and semi-passive tags. To account for link reliability, the optimization problems are formulated to maximize the total system goodput of the two cases. For the passive tags case, we derive the optimal resource allocation policy by exploiting the priority of allocated reader transmission power. The “activate or not” decision is further discussed. For the semi-passive tags case, combing the priority of allocated reader transmission power and the proposed BCD-based optimization algorithm, we find the close-to-optimal solution. The simulation results confirm that the proposed policies can achieve larger total system goodput than conventional techniques.

Acknowledgments

This work was supported by the National Natural Science Foundation of China (Nos. 61271335, 61671252, 61401069), the Project Funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD), the Key University Science Research Project of Jiangsu Province (No. 14KJA510003), the Innovation Program of Graduate Education of Jiangsu Province, China (KYLX15-0828), the National Natural Science Foundation of China (Nos. 61471202, 61501251, 61571233), the Natural Science Foundation of Jiangsu Province (BK20140891).

Author Contributions

Bin Lyu and Zhen Yang conceived and designed the experiments; Bin Lyu performed the experiments; Bin Lyu and Guan Gui analyzed the data; Youhong Feng contributed analysis tools; Bin Lyu and Guan Gui wrote the paper.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

For the i-th sub-problem, if N P ave ( N i + 1 ) P max , the maximum total goodput is given as m = 1 N i + 1 G ^ m ( P max ) . For the i ^ -th sub-problem, i ^ = i + 1 , , N , N P ave ( N i ^ + 1 ) P max is still satisfied, and the maximum total goodput is given as m = 1 N i ^ + 1 G ^ m ( P max ) . It is obvious that m = 1 N i + 1 G ^ m ( P max ) > m = 1 N i G ^ m ( P max ) > > G ^ 1 ( P max ) . Hence, we conclude that the solution for the i ^ -th sub-problem is not the optimal solution for Problem P1.

Appendix B

The Lagrange function of Problem P2 is expressed as
L ( P ^ ) = m = 1 M T 1 2 + 1 2 erf a m P m b m λ ( m = 1 M P m N P ave )
where λ denotes the Lagrange multiplier. Problem P2 can be solved by exploiting its Karush–Kuhn–Tucker (KKT) conditions [26], which are given by
L P m * < 0 , P m * = P m th , = 0 , P m th P m * P max , > 0 , P m * = P max , m ,
λ * ( m = 1 M P m * N P ave ) = 0 ,
where P m * and λ * denote the optimal primal and dual solutions of Problem P2, respectively. It is easy to verify that m = 1 M P m * = N P ave holds for Problem P2. Hence, we can assume λ * > 0 from Equation (B2) without loss of generality. According to Equation (B1), if P m th P m * P max , it follows that
G ( a m P m * b m , c m ) = λ * , m ,
where G ( ν m , c m ) with respect to ν m is defined in Theorem 2. Define ν m * as the solution for the equation G ( ν m , c m ) = λ * . Since G ( ν m , c m ) is a monotonically decreasing function of ν m , it is obtained that ν m * is the unique solution. Based on ν m * , P m * = ν m * + b m a m . Combining with P m th P m * P max , the optimal solution for Problem P2 is given as P m * = min { max { P m th , ν m * + b m a m } , P max } .

Appendix C

Assume the optimal solution for Problem P4 is { P ^ m , t ^ m a , n ^ m } satisfying P c t ^ m a < η P ^ m h m ( T t ^ m a ) + η ( 1 n ^ m ) P ^ m h m t ^ m a , m . It is to prove that { P ^ m , t ^ m a , n ^ m } is not the optimal solution by contradiction. It is not difficult to find P m * , t m a * , and n m * , satisfying that t m a * = η P m * h m T P c + η P m * h m n m * with n m * = n ^ m , and P m * = P ^ m . Since t m a 1 2 + 1 2 erf ( a m P m n m ) is an increasing function of t m a and n m , respectively, it is evident that m = 1 M t m a * 1 2 + 1 2 erf ( a m P m * n m * ) > m = 1 M t ^ m a 1 2 + 1 2 erf ( a m P ^ m n ^ m ) . Therefore, the assumption is contradiction, completing the proof.

References

  1. Pinuela, M.; Mitcheson, P.D.; Lucyszyn, S. Ambient RF energy harvesting in urban and semi-urban environments. IEEE Trans. Microw. Theory Tech. 2013, 61, 2715–2726. [Google Scholar] [CrossRef]
  2. Zhang, R.; Ho, C.K. MIMO broadcasting for simultaneous wireless information and power transfer. IEEE Trans. Wirel. Commun. 2013, 12, 1989–2001. [Google Scholar] [CrossRef]
  3. Huang, K.; Larsson, E. Simultaneous information and power transfer for broadband wireless systems. IEEE Trans. Signal Process. 2013, 61, 5972–5986. [Google Scholar] [CrossRef]
  4. Huang, K.; Lau, V.K.N. Enabling wireless power transfer in cellular networks: Architecture, modeling and deployment. IEEE Trans. Wirel. Commun. 2014, 13, 902–912. [Google Scholar] [CrossRef] [Green Version]
  5. Ju, H.; Zhang, R. Throughput maximization in wireless powered communication networks. IEEE Trans. Wirel. Commun. 2014, 13, 418–428. [Google Scholar] [CrossRef]
  6. Kang, X.; Ho, C.K.; Sun, S. Full-duplex wireless-powered communication network with energy causality. IEEE Trans. Wirel. Commun. 2015, 14, 5539–5551. [Google Scholar] [CrossRef]
  7. Lee, H.; Lee, K.J.; Kim, H.; Clerckx, B.; Lee, I. Resource allocation techniques for wireless powered communication networks with energy storage constraint. IEEE Trans. Wirel Commun. 2016, 15, 2619–2628. [Google Scholar] [CrossRef]
  8. Boyer, C.; Roy, S. Backscatter communication and RFID: Coding, energy, and MIMO analysis. IEEE Trans. Commun. 2014, 62, 770–785. [Google Scholar] [CrossRef]
  9. Dong, M.; Ota, K.; Liu, A. RMER: Reliable and Energy-Efficient Data Collection for Large-Scale Wireless Sensor Networks. IEEE Internet Things J. 2016, 3, 511–519. [Google Scholar] [CrossRef]
  10. Liu, Y.; Dong, M.; Ota, K.; Liu, A. ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks. IEEE Trans. Inf. Forens. Secur. 2016, 11, 2013–2027. [Google Scholar] [CrossRef]
  11. Hu, Y.; Dong, M.; Ota, K.; Liu, A.; Guo, M. Mobile Target Detection in Wireless Sensor Networks with Adjustable Sensing Frequency. IEEE Syst. J. 2016, 10, 1160–1171. [Google Scholar] [CrossRef]
  12. Zhang, Q.; Liu, A. An Unequal Redundancy Level Based Mechanism for Reliable Data Collection in Wireless Sensor Networks. EURASIP J. Wirel. Commun. Netw. 2016, 2016, 258. [Google Scholar] [CrossRef]
  13. Liu, V.; Parks, A.; Talla, V.; Gollakota, S.; Wetherall, D.; Smith, J.R. Ambient backscatter: Wireless communication out of thin air. In Proceedings of the Special Interest Group on Data Communication (SIGCOMM), Hong Kong, China, 12–16 August 2013; pp. 39–50.
  14. Yang, G.; Ho, C.K.; Guan, G.L. Multi-antenna wireless energy transfer for backscatter communication systems. IEEE J. Sel. Areas Commun. 2015, 33, 2974–2987. [Google Scholar] [CrossRef]
  15. Han, K.; Huang, K. Wirelessly Powered Backscatter Communication Networks: Modeling, Coverage and Capacity. arXiv. 2016. Available online: https://arxiv.org/abs/1605.05875 (accessed on 18 September 2016).
  16. Saad, W.; Zhou, X.; Han, Z.; Poor, H. On the physical layer security of backscatter wireless systems. IEEE Trans. Wirel. Commun. 2014, 13, 3442–3451. [Google Scholar] [CrossRef]
  17. Yang, Q.; Wang, H.; Zhang, Y.; Han, Z. Physical layer security in MIMO backscatter wireless systems. IEEE Trans. Wirel. Commun. 2016, 11, 7547–7560. [Google Scholar] [CrossRef]
  18. Hoang, D.T.; Niyato, D.; Wang, P.; Kim, D.I.; Han, Z. The tradeoff analysis in RF-powered backscatter cognitive radio networks. arXiv. 2016. Available online: https://arxiv.org/abs/1608.01789 (accessed on 5 August 2016).
  19. Seo, H.; Lee, C. A new GA-based resource allocation scheme for a reader-to-reader interference problem in RFID systems. In Proceedings of the IEEE International Conference on Communications (ICC), Cape Town, South Africa, 23–27 May 2010.
  20. Zhang, H.; Jiang, C.; Beaulieu, N.; Chu, X.; Wen, X.; Tao, M. Resource Allocation in Spectrum-Sharing OFDMA Femtocells With Heterogeneous Services. IEEE Trans. Commun. 2014, 62, 2366–2377. [Google Scholar] [CrossRef]
  21. Zhang, H.; Jiang, C.; Beaulieu, N.; Chu, X.; Wang, X.; Quek, T. Resource allocation for cognitive small cell networks: A cooperative bargaining game theoretic approach. IEEE Trans. Wirel. Commun. 2015, 14, 3481–3493. [Google Scholar] [CrossRef]
  22. Lyu, B.; You, C.; Huang, K.; Yang, Z. Goodput maximization for backscatter communication systems. IEEE Commun. Lett. 2016, in press. [Google Scholar]
  23. Tseng, P. Convergence of a block coordinate descent method for nondifferentiable minimization. J. Optim. Theory Appl. 2001, 109, 475–494. [Google Scholar] [CrossRef]
  24. Karthaus, U.; Fischer, M. Fully integrated passive UHF RFID transponder IC with 16.7-μW minimum RF input power. IEEE J. Solid State Circuits 2003, 38, 1602–1608. [Google Scholar] [CrossRef]
  25. Bletsas, A.; Dimitriou, A.G.; Sahalos, J.N. Improving backscatter radio tag efficiency. IEEE Trans. Microw. Theory Tech. 2010, 58, 1502–1509. [Google Scholar] [CrossRef]
  26. Boyd, S.; Vandenberghe, L. Convex Optimization; Cambridge University Press: New York, NY, USA, 2004. [Google Scholar]
  27. Gorski, J.; Pfeuffer, F.; Klamroth, K. Biconvex sets and optimization with biconvex functions: A survey and extensions. Math. Methods Oper. Res. 2007, 66, 373–407. [Google Scholar] [CrossRef]
Figure 1. Multi-user backscatter communication system.
Figure 1. Multi-user backscatter communication system.
Sensors 16 02016 g001
Figure 2. The working model of an activated tag.
Figure 2. The working model of an activated tag.
Sensors 16 02016 g002
Figure 3. Average total goodput vs. average reader transmission power with N = 3 .
Figure 3. Average total goodput vs. average reader transmission power with N = 3 .
Sensors 16 02016 g003
Figure 4. Average total goodput vs. average reader transmission power with N = 5 .
Figure 4. Average total goodput vs. average reader transmission power with N = 5 .
Sensors 16 02016 g004
Table 1. Simulation parameters.
Table 1. Simulation parameters.
ParametersValues
Time duration T = 1 s
Distance4–6 m
Forward channel gains 10 3 d i 3
Backward channel gains 10 3 d i 3
Energy harvesting efficiency η = 0.5
Maximum BER ϵ = 0.3
Circuit power P c = 20 dBm
Noise power σ 2 = 90 dBm

Share and Cite

MDPI and ACS Style

Lyu, B.; Yang, Z.; Gui, G.; Feng, Y. Optimal Resource Allocation Policies for Multi-User Backscatter Communication Systems. Sensors 2016, 16, 2016. https://doi.org/10.3390/s16122016

AMA Style

Lyu B, Yang Z, Gui G, Feng Y. Optimal Resource Allocation Policies for Multi-User Backscatter Communication Systems. Sensors. 2016; 16(12):2016. https://doi.org/10.3390/s16122016

Chicago/Turabian Style

Lyu, Bin, Zhen Yang, Guan Gui, and Youhong Feng. 2016. "Optimal Resource Allocation Policies for Multi-User Backscatter Communication Systems" Sensors 16, no. 12: 2016. https://doi.org/10.3390/s16122016

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop