Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-xbtfd Total loading time: 0 Render date: 2024-11-09T20:24:25.806Z Has data issue: false hasContentIssue false

6 - Backscattering Wireless-Powered Communications

from Part II - Architectures, Protocols, and Performance Analysis

Published online by Cambridge University Press:  01 December 2016

Dinh Thai Hoang
Affiliation:
Nanyang Technological University, Singapore
Dusit Niyato
Affiliation:
Nanyang Technological University, Singapore
Ekram Hossain
Affiliation:
University of Manitoba, Canada
Dong In Kim
Affiliation:
Sungkyunkwan University, Korea
Vijay Bhargava
Affiliation:
University of British Columbia, Vancouver
Lotfollah Shafai
Affiliation:
University of Manitoba, Canada
Get access

Summary

Introduction

The concept of modulating backscatter for communication was first introduced by Stockman in 1948 [1] and promptly received a lot of attention from researchers and developers owing to its potential advantages. Basically, backscatter communication is a technique that allows wireless nodes to communicate without requiring any active radiofrequency (RF) components on the tag [2]. In a conventional backscatter communication system (CBCS), there are two main components, called the wireless tag reader device (WTRD) and the wireless tag device (WTD), as illustrated in Figure 6.1. The WTD in the CBCS is able not only to harvest energy from the received signals, but also to modulate and reflect the signals back to the WTRD. The signal reflection is caused by the intentional mismatch between the antenna and the load impedance at the WTD. Theoretically, when the load impedance is varied, it will generate the complex scatter coefficient which can be used to modulate the reflected signal with information bits. The WTRD then uses the receive antenna to receive reflected signals from the WTD and demodulate these signals to obtain the useful information.

In conventional backscattering communication systems, there are two special features that differ from traditional communication systems. First, in conventional backscattering communication systems, the receivers (i.e., WTRDs) have to be equipped with a power source to transmit RF signals to the transmitter (i.e., WTDs). Second, the transmitters do not need to be equipped with a power source to transmit data because they will reflect signals received by the receivers instead of generating their own signals. The second feature is the most important characteristic and also the main objective for the development of conventional backscattering communication systems. This special communication feature of CBCSs has received a great deal of attention, mainly because of the successful implementation of RFID systems and the potential use in sensor devices that are small in size and have a low power supply.

Typically, backscattering communication systems operate using RF signals and require the WTRD to be able to transmit RF signals to the WTD. However, a new solution, called ambient backscatter communication, which utilizes RF signals from ambient sources, e.g., TV signals [3] and Wi-Fi signals [4], to help the WTRD to obtain data from the WTD without generating RF signals has recently been introduced.

Type
Chapter
Information
Wireless-Powered Communication Networks
Architectures, Protocols, and Applications
, pp. 217 - 245
Publisher: Cambridge University Press
Print publication year: 2016

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

[1] H., Stockman, “Communication by means of reflected power',' in Proceedings of the IRE, vol. 36, no. 10, pp. 1196–1204, October 1948.Google Scholar
[2] C., Boyer and S., Roy, “Backscatter communication and RFID: Coding, energy, and MIMO analysis,” IEEE Transactions on Communications, vol. 62, no. 3, pp. 770–785, March 2014.Google Scholar
[3] V., Liu, A., Parks, V., Talla et al., “Ambient backscatter: Wireless communication out of thin air,” ACM SIGCOMM Computer Communication Review, vol. 43, no. 4, pp. 39–50, October 2013.Google Scholar
[4] B., Kellogg, A., Parks, S., Gollakota, J. R., Smith, and D., Wetherall, “Ambient backscatter: Wireless communication out of thin air,” in Proc. 2014 ACM conference on SIGCOMM, August 2014, pp. 607–618.Google Scholar
[5] R., Correia, N. B. D., Carvalho, G., Fukuda, A., Miyaji, and S., Kawasaki, “Backscatter wireless sensor network with WPT capabilities,” in IEEE MTT-S International Microwave Symposium, May 2015, pp. 1–4.Google Scholar
[6] G., Yang, C. K., Ho, and Y. L., Guan, “Multi-antenna wireless energy transfer for backscatter communication systems,” IEEE Journal on Selected Areas in Communications, vol. 33, no. 12, pp. 2974–2987, November 2015.Google Scholar
[7] A. S., Boaventura and N. B., Carvalho, “Evaluation of simultaneous wireless power transfer and backscattering data communication through multisine signals,” in IEEE Wireless Power Transfer Conference, May 2015, pp. 1–3.Google Scholar
[8] A., Collado and A., Georgiadis, “Improving wireless power transmission efficiency using chaotic waveform,” in IEEE MTT-S International Microwave Symposium Digest, June 2012, pp. 1–3.Google Scholar
[9] K., Finkenzeller, RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication, 3rd edn. West Sussex : Wiley, 2010.
[10] J. D., Griffin, High-Frequency Modulated-Backscatter Communication Using Multiple Antennas, PhD Thesis, School of Electrical and Computer Engineering, May, 2009.
[11] S., Movassaghi, M., Abolhasan, J., Lipman, D., Smith, and A., Jamalipour, “Wireless body area networks: A survey,” IEEE Communications Surveys & Tutorials, vol. 16, no. 3, pp. 1658–1686, January 2014.Google Scholar
[12] R., Cavallari, F., Martelli, R., Rosini, C., Buratti, and R., Verdone, “A survey on wireless body area networks: Technologies and design challenges,” IEEE Communications Surveys & TutCavallari, vol. 16, no. 3, pp. 1635–1657, February 2014.Google Scholar
[13] S., Basagni, M. Y., Naderi, C., Petrioli, and D., Spenza, “Wireless sensor networks with energy harvesting,” in Mobile Ad Hoc Networking: Cutting Edge Directions, 2nd edn., Hoboken, NJ : Wiley.
[14] S. D., Barman, A. W., Reza, N., Kumar, M. E., Karim, and A. B., Munir, “Wireless powering by magnetic resonant coupling: Recent trends in wireless power transfer system and its applications,” Renewable and Sustainable Energy Reviews, vol. 51, pp. 1525–1552, November 2015.Google Scholar
[15] X., Lu, P., Wang, D., Niyato, D., Kim, and Z., Han, “Wireless charging technologies: Fundamentals, standards, and network applications,” IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1413–1452, second quarter, 2016.Google Scholar
[16] A. P., Sample, D. A., Meyer, and J. R., Smith, “Analysis, experimental results, and range adaption of magnetically coupled resonators for wireless power transfer,” IEEE Transactions on Industrial Electronics, vol. 58, no. 2, pp. 544–554, February 2011.Google Scholar
[17] M., Akimoto and M., Iizuka, “Load modulation applied to magnetic resonance wireless power transfer technology and its applications,” NTT Technical Review, vol. 11, no. 10, not paginated, October 2013.Google Scholar
[18] W., Dabney, Adaptive Step-Sizes for Reinforcement Learning, Doctoral Dissertation, May 2014.
[19] C. J. C. H., Watkins and P., Dayan, “Q-Learning,” Machine Learning, vol. 8, nos. 3–4, pp. 279–292, 1992.Google Scholar
[20] S., Singh, T., Jaakkola, M. L., Littman, and C., Szepesvari, “Convergence results for singlestep on-policy reinforcement-learning algorithms,” Machine Learning, vol. 38, no. 3, pp. 287–308. 2000.Google Scholar
[21] R. S., Sutton, and A. G., Barto. Reinforcement Learning: An Introduction, vol. 1. Cambridge, MA : MIT Press, 1998.
[22] B., Efron, “Bootstrap methods: Another look at the jackknife,” The Annals of Statistics, vol. 7, no. 1, pp. 1–26. 1979.Google Scholar
[23] M., Geist and O., Pietquin, “A brief survey of parametric value function approximation,” technical report, September 2010.
[24] A., Geramifard, T. J., Walsh, S., Tellex et al., “A tutorial on linear function approximation for dynamic programming and reinforcement learning,” Foundations and Trends in Machine Learning, vol. 6, no. 4, pp. 375–451. 2013.Google Scholar
[25] J. N., Tsitsiklis and B. V., Roy, “Feature-based methods for large scale dynamic programming,” Machine Learning, vol. 22, no. 1-3, pp. 59–94, March 1996.Google Scholar
[26] J. C., Butcher, The Numerical Methods for Ordinary Differential Equations, Hoboken, NJ : Wiley, 2008.
[27] A., Benveniste, M., Metivier, and P., Priouret, Adaptive Algorithms and Stochastic Approximations. Berlin : Springer, 1990.
[28] D. P. De, Farias and B. V., Roy, “On the existence of fixed points for approximate value iteration and temporal-difference learning,” Journal of Optimization Theory and Applications, vol. 105, no. 3, pp. 589–608, June 2000.Google Scholar
[29] G. H., Golub and C. F. V., Loan, Matrix Computations. Baltimore, MD : Johns Hopkins University Press, 1996.
[30] J. N., Tsitsiklis and B. V., Roy, “An analysis of temporal-difference learning with linear function approximation,” IEEE Transactions on Automatic Control, vol. 42, no. 5, pp. 674–690, May 1997.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×