• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
He Xin, Wu Fan, Zhu Yujun, Xu Yong, Yang Panlong. Protocol Design and Performance Analysis of Backscatter Communications Using Codes[J]. Journal of Computer Research and Development, 2024, 61(12): 3098-3107. DOI: 10.7544/issn1000-1239.202221010
Citation: He Xin, Wu Fan, Zhu Yujun, Xu Yong, Yang Panlong. Protocol Design and Performance Analysis of Backscatter Communications Using Codes[J]. Journal of Computer Research and Development, 2024, 61(12): 3098-3107. DOI: 10.7544/issn1000-1239.202221010

Protocol Design and Performance Analysis of Backscatter Communications Using Codes

Funds: This work was supported by the National Key Research and Development Program of China (2018YFB2100302) and the National Natural Science Foundation of China (62072004, 61702011).
More Information
  • Author Bio:

    He Xin: born in 1986. PhD, professor, master supervisor. His main research interests include information theory, coding theory, low-power backscatter communication, and wireless sensing

    Wu Fan: born in 1999. Master candidate. Her main research interests include Internet of things and backscatter communication

    Zhu Yujun: born in 1982. PhD, associate professor, master supervisor. His main research interest includes wireless sensor networks

    Xu Yong: born in 1966. PhD, professor, master supervisor. His main research interests include computer network security, key management and Internet of things security

    Yang Panlong: born in 1977. PhD, professor, PhD supervisor. His main research interests include wireless backscattering communication, AIoT, and integrated wireless sensing

  • Received Date: January 02, 2023
  • Revised Date: May 12, 2024
  • Accepted Date: May 29, 2024
  • Available Online: June 30, 2024
  • The increasing number of the Internet of things (IoT) devices in our environment presents significant opportunities as well as challenges, including limited battery life, low computing power, and scalability for multiple access. Recent advances in backscatter communication have enabled ubiquitous IoT devices to communicate in an energy-effective manner. However, a fundamental challenge in backscatter communication is to design a multiple access protocol to support concurrent communications from numerous tags. Aiming at tackling the high bit error rate and low transmission rate of large-scale tag concurrent communication, we design a coding-based code division multiple access technique to facilitate multi-tag backscattering with reliable communication. Firstly, the chip discrimination tags with strong orthogonality such as Walsh code are combined with error correction coding to enhance the anti-interference ability. Secondly, the joint decoding of correlation detection and decoding is used to reduce the bit error rate and realize the reliable communication from the backscatter link. Finally, a grouping algorithm is designed to cluster tags based on the K-means clustering algorithm, which fully utilizes the time-code resources and enhances the capacity. Experimental results demonstrate that our scheme can achieve reliable communication with 100+ tags, with a bit error rate of approximately 2%, and the achieved throughput of 39 Mbps.

  • [1]
    IoT Analytics. State of IoT 2023: Number of connected IoT devices growing 16% to 16.7 billion globally[EB/OL]. [2023-05-24]. https://iot-analytics. com/number-connected-iot-devices
    [2]
    Khan W U, Javed M A, Nguyen T N, et al. Energy-efficient resource allocation for 6G backscatter-enabled NOMA IoV networks[J]. IEEE Transactions on Intelligent Transportation Systems, 2021, 23(7): 9775−9785
    [3]
    Gong Wei, Yuan Longzhi, Wang Qiwei, et al. Multiprotocol backscatter for personal IoT sensors[C]//Proc of the 16th Int Conf on Emerging Networking Experiments and Technologies. New York: ACM, 2020: 261−273
    [4]
    Zhang Pengyu, Josephson C, Bharadia D, et al. FreeRider: Backscatter communication using commodity radios[C]//Proc of the 13th Int Conf on Emerging Networking Experiments and Technologies. New York: ACM, 2017: 389−401
    [5]
    Zhao Renjie, Zhu Fengyuan, Feng Yuda, et al. OFDMA-enabled Wi-Fi backscatter[C/OL]//Proc of the 25th Annual Int Conf on Mobile Computing and Networking. New York: ACM, 2019 [2023-05-22]. https://dl.acm.org/doi/pdf/10.1145/3300061.3300121
    [6]
    Khan W U, Li Xingwang, Zeng Ming, et al. Backscatter-enabled NOMA for future 6G systems: A new optimization framework under imperfect SIC[J]. IEEE Communications Letters, 2021, 25(5): 1669−1672 doi: 10.1109/LCOMM.2021.3052936
    [7]
    Kellogg B, Talla V, Gollakota S, et al. Passive Wi-Fi: Bringing low power to Wi-Fi transmissions[C]//Proc of the 13th USENIX Symp on Networked Systems Design and Implementation (NSDI 16). Berkeley, CA: USENIX Association, 2016: 151−164
    [8]
    Zhang Maolin, Chen Si, Zhao Jia, et al. Commodity-level BLE backscatter[C]//Proc of the 19th Annual Int Conf on Mobile Systems, Applications, and Services. New York: ACM, 2021: 402−414
    [9]
    Zhao Jia, Gong Wei, Liu Jiangchuan. Spatial stream backscatter using commodity WiFi[C]//Proc of the 16th Annual Int Conf on Mobile Systems, Applications, and Services. New York: ACM, 2018: 191−203
    [10]
    Kim T, Lee W. Exploiting residual channel for implicit Wi-Fi backscatter networks[C]//Proc of the 37th IEEE Conf on Computer Communications. Pascataway, NJ: IEEE, 2018: 1268−1276
    [11]
    Kellogg B, Parks A, Gollakota S, et al. Wi-Fi backscatter: Internet connectivity for RF-powered devices[C]//Proc of the 28th ACM Conf on SIGCOMM. New York: ACM, 2014: 607−618
    [12]
    Wang Wenjing, Xu Kangjun, Yan Yige, et al. Relay selection-based cooperative backscatter transmission with energy harvesting: Throughput maximization[J]. IEEE Wireless Communications Letters, 2022, 11(7): 1533−1537 doi: 10.1109/LWC.2022.3179019
    [13]
    Liu V, Parks A, Talla V, et al. Ambient backscatter: Wireless communication out of thin air[J]. ACM SIGCOMM Computer Communication Review, 2013, 43(4): 39−50 doi: 10.1145/2534169.2486015
    [14]
    徐勇军,杨浩克,李国军,等. 多标签无线供电反向散射通信网络能效优化算法[J]. 电子与信息学报,2022,44(10):3492−3498

    Xu Yongjun, Yang Haoke, Li Guojun, et al. Energy-efficient optimization algorithm in multi-tag wireless-powered backscatter communication networks[J]. Journal of Electronics & Information Technology, 2022, 44(10): 3492−3498 (in Chinese)
    [15]
    Mi Nanhuan, Zhang Xiaoxue, He Xin, et al. CBMA: Coded-backscatter multiple access[C]//Proc of the 39th IEEE Int Conf on Distributed Computing Systems (ICDCS). Pascataway, NJ: IEEE, 2019: 799−809
    [16]
    Huynh N V, Hoang D T, Lu Xiao, et al. Ambient backscatter communications: A contemporary survey[J]. IEEE Communications Surveys & Tutorials, 2018, 20(4): 2889−2922
    [17]
    王悦,樊凯. 物联网中超轻量级RFID电子票据安全认证方案[J]. 计算机研究与发展,2018,55(7):1432−1439

    Wang Yue, Fan Kai. Ultra-lightweight RFID electronic ticket authentication scheme in IoT[J]. Journal of Computer Research and Development, 2018, 55(7): 1432−1439 (in Chinese)
    [18]
    Kimionis J, Bletsas A, Sahalos J N. Increased range bistatic scatter radio[J]. IEEE Transactions on Communications, 2014, 62(3): 1091−1104 doi: 10.1109/TCOMM.2014.020314.130559
    [19]
    Fujiya Y, Edamatsu K, Shiba T, et al. Self-mixing noise reduction effect in Wi-Fi backscatter receiver by tx signal canceller[C]//Proc of the 24th Asia-Pacific Microwave Conf (APMC). Pascataway, NJ: IEEE, 2022: 493−495
    [20]
    Lazaro A, Lazaro M, Villarino R. Room-level localization system based on LoRa backscatters[J]. IEEE Access, 2021, 9: 16004−16018 doi: 10.1109/ACCESS.2021.3053144
    [21]
    Rosenthal J D, Mandal A, Sathe V, et al. An all-digital 1 Mbps, 57 pJ/bit Bluetooth low energy (BLE) backscatter ASIC in 65 nm CMOS[C]//Proc of the 16th IEEE Int Conf on RFID (RFID). Pascataway, NJ: IEEE, 2022: 109−113
    [22]
    Talla V, Hessar M, Kellogg B, et al. LoRa BackScatter: Enabling the vision of ubiquitous connectivity[C/OL]//Proc of the 19th ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies. New York: ACM, 2017 [2023-04-18]. https://dl.acm.org/doi/pdf/10.1145/3130970
    [23]
    Peng Yao, Shangguan Longfei, Hu Yue, et al. PLoRa: A passive long-range data network from ambient LoRa transmissions[C]//Proc of the 32nd ACM Conf on SIGCOMM. New York: ACM, 2018: 147−160
    [24]
    Guo Xiuzhen, Shangguan Longfei, He Yuan, et al. ALoba: Rethinking ON-OFF keying modulation for ambient LoRa backscatter[C]//Proc of the 18th Conf on Embedded Networked Sensor Systems. New York: ACM, 2020: 192−204
    [25]
    Jiang Jinyan, Xu Zhenqiang, Dang Fan, et al. Long-range ambient LoRa backscatter with parallel decoding[C]//Proc of the 27th Annual Int Conf on Mobile Computing and Networking. New York: ACM, 2021: 684−696
    [26]
    Hessar M, Najafi A, Gollakota S. NetScatter: Enabling large-scale backscatter networks[C]//Proc of the 16th USENIX Symp on Networked Systems Design and Implementation (NSDI 19). Berkeley, CA: USENIX Association, 2019: 271−284
    [27]
    Tong Xinyu, Zhu Fengyuan, Wan Yang, et al. Batch localization based on OFDMA backscatter[C/OL]//Proc of the 21st ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies. New York: ACM, 2019 [2023-03-27]. https://dl.acm.org/doi/pdf/10.1145/3314412
    [28]
    He Xin, Zhou Xiaobo, Anwar K, et al. Estimation of observation error probability in wireless sensor networks[J]. IEEE Communications Letters, 2013, 17(6): 1073−1076 doi: 10.1109/LCOMM.2013.042313.130361
    [29]
    Agee B G. Solving the near-far problem: Exploitation of Spatial and Spectral Diversity in Wireless Personal Communication Networks[M]//Wireless Personal Communications: Trends and Challenges. Berlin: Springer, 1994: 69−80
    [30]
    Ou Jiajue, Li Mo, Zheng Yuanqing. Come and be served: Parallel decoding for cots RFID tags[C]//Proc of the 21st Annual Int Conf on Mobile Computing and Networking. New York: ACM, 2015: 500−511
    [31]
    Jin Meng, He Yuan, Meng Xin, et al. FlipTracer: Practical parallel decoding for backscatter communication[C]//Proc of the 23rd Annual Int Conf on Mobile Computing and Networking. New York: ACM, 2017: 275−287
  • Related Articles

    [1]Gu Beibei, Qiu Jiyan, Wang Ning, Chen Jian, Chi Xuebin. A Performance Data Collection Method for Computing Software in Heterogeneous Systems[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440512
    [2]Chen Zhiyu, Gao Dequan, Wang Dong, Li Guochun, Wei Xiaojing. Performance Evaluation of Power Quantum Secure Communication System for Energy Internet[J]. Journal of Computer Research and Development, 2017, 54(4): 711-719. DOI: 10.7544/issn1000-1239.2017.20161024
    [3]Zhao Tiezhu, Dong Shoubin, Verdi March, Simon See. Predicting the Parallel File System Performance via Machine Learning[J]. Journal of Computer Research and Development, 2011, 48(7): 1202-1215.
    [4]Sun Xiangzheng, Zhang Yunquan, Wang Xuanqiang, Wang Lei. Research on the Evaluation Criterion for Performance Searching Process of Self-Adapting Numerical Software[J]. Journal of Computer Research and Development, 2010, 47(4): 679-686.
    [5]Fan Limin, Feng Dengguo, Zhou Yongbin. A Fuzzy-Based Randomness Evaluation Model for Block Cipher[J]. Journal of Computer Research and Development, 2008, 45(12): 2095-2101.
    [6]Li Lei, Wang Huaimin, and Shi Dianxi. A High Performance Total Order Broadcast Algorithm[J]. Journal of Computer Research and Development, 2007, 44(9): 1449-1455.
    [7]Xu Jian, Zhang Kun, Liu Fengyu, Xu Manwu. An Approach to Immunity-Based Performance Monitoring and Evaluation for Computing Systems[J]. Journal of Computer Research and Development, 2007, 44(3).
    [8]Yuan Wei, Zhang Yunquan, Sun Jiachang, Li Yucheng. Performance Analysis of NPB Benchmark on Domestic Tera-Scale Cluster Systems[J]. Journal of Computer Research and Development, 2005, 42(6): 1079-1084.
    [9]Chi Lihua, Liu jie, and Hu Qingfeng. Evaluation and Test for Scalability of Numerical Parallel Computation[J]. Journal of Computer Research and Development, 2005, 42(6): 1073-1078.
    [10]Jiang Hao and Dong Yisheng. A Time Performance Evaluation Method for Workflow Based on Extended Timed Petri Net[J]. Journal of Computer Research and Development, 2005, 42(5): 849-855.

Catalog

    Article views (151) PDF downloads (44) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return