Вы находитесь на странице: 1из 14

984 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO.

2, APRIL 2018

Wireless Powered Asynchronous Backscatter


Networks With Sporadic Short Packets:
Performance Analysis and Optimization
Qian Yang , Student Member, IEEE, Hui-Ming Wang, Senior Member, IEEE, Tong-Xing Zheng, Member, IEEE,
Zhu Han, Fellow, IEEE, and Moon Ho Lee , Life Senior Member, IEEE

Abstract—In the fifth generation era, the pervasive applications Index Terms—Backscatter wireless powered communications
of Internet of Things and massive machine-type communications (B-WPCs), energy harvest, Internet of Things (IoT), radio
have initiated increasing research interests on the backscatter frequency identification (RFID), stochastic geometry.
wireless powered communication (B-WPC) technique due to its
ultrahigh energy efficiency and low cost. The ubiquitous B-WPC
network is characterized by nodes with dynamic spatial positions
and sporadic short packets, of which the performance has not
been fully investigated. In this paper, we give a comprehensive I. I NTRODUCTION
analysis of a multiantenna B-WPC network with sporadic short HE PROMISING Internet of Things (IoT) paradigm
packets under a stochastic geometry framework. By exploiting
a time-space Poisson point process model, the behavior of the
network is well captured in a decentralized and asynchronous
T aims to bridge diverse technologies to support intelli-
gent decision making by connecting pervasive physical objects
transmission way. We then analyze the energy and informa- together [1]. One of the most important technologies for
tion outage performance in the energy harvest and backscatter enabling IoT is backscatter radio, which has received increas-
modulation phases of the backscatter network, respectively. The ing attention from both academic and industrial communities
optimal transmission slot length and division are obtained by
maximizing the network-wide spatial throughput. Moreover, we nowadays due to its distinguished low-energy requirement and
find an interesting result that there exists the optimal tradeoff rapid cut down of manufacture cost [2]. The most promi-
between the durations of the energy harvest and backscatter mod- nent commercial application of backscatter radio lies in radio
ulation phases for spatial throughput maximization. Numerical frequency identification (RFID), which is the first technol-
results are demonstrated to verify our analytical findings and ogy realizing the machine-to-machine concept (RFID tag and
show that this tradeoff region gets shrunk when the outage
constraints become more stringent. reader) and plays an indispensable role in the evolution of the
IoT [1]. A typical RFID system consists of an RFID reader
(interrogator) and an RFID tag (transponder) where the RFID
reader interrogates the RFID tag for the desired information
like an identification number [3]. Among all kinds of RFID
Manuscript received July 25, 2017; revised December 25, 2017; accepted tags, the passive tag receives more emphasis compared with
January 22, 2018. Date of publication January 31, 2018; date of current ver-
sion April 10, 2018. The work of Q. Yang, H.-M. Wang, and T.-X. Zheng the active and semipassive tags, since it has no on-tag power
was supported in part by the National Natural Science Foundation of China source but relies on the electromagnetic field transmitted by an
under Grant 61671364 and Grant 61701390, in part by the Outstanding Young RFID reader and “backscattering” for energy harvesting and
Research Fund of Shaanxi Province, in part by the Young Talent Support Fund
of Science and Technology of Shaanxi Province under Grant 2015KJXX- information transmission, respectively [4]. An illustration of
01, and in part by the China Post-Doctoral Science Foundation under Grant passive tag applications is the wireless integrated sensing plat-
2017M613140. The work of Z. Han was supported by the U.S. NSF under form [5], which is a programmable sensor platform based on
Grant CNS-1717454, Grant CNS-1731424, Grant CNS-1702850, Grant CNS-
1646607, Grant ECCS-1547201, Grant CMMI-1434789, Grant CNS-1443917, RFID and aims to create a wirelessly networked, battery-less
and Grant ECCS-1405121. The work of M. H. Lee was supported by the NRF, sensor device. In the revolution of replacing the conventional
South Korea, under Grant MEST 2015R1A2A1A05000977. (Corresponding barcode system, the commercial adoption of RFID is largely
author: Hui-Ming Wang.)
Q. Yang, H.-M. Wang, and T.-X. Zheng are with the School of predicated on the passive tag due to its high energy efficiency,
Electronic and Information Engineering, Xi’an Jiaotong University, Xi’an tiny size, and ultralow cost [6].
710049, China, and also with the Ministry of Education Key Laboratory In a passive RFID system, to initiate a querying procedure
for Intelligent Networks and Network Security, Xi’an Jiaotong University,
Xi’an 710049, China (e-mail: yangq36@gmail.com; xjbswhm@gmail.com; the RFID reader first transmits a continuous standardized sig-
zhengtx@mail.xjtu.edu.cn). nal to power up the passive RFID tag. Then the RFID tag
Z. Han is with the Department of Electrical and Computer Engineering, wakes up after harvesting sufficient energy from the RFID
University of Houston, Houston, TX 77004 USA, and also with the
Department of Computer Science and Engineering, Kyung Hee University, reader’s radio frequency (RF) signal and responds to the
Seoul, South Korea (e-mail: zhan2@uh.edu). RFID reader via backscatter modulation. Finally, the RFID
M. H. Lee is with the Division of Electronics Engineering, reader extracts the tag information from the signal backscat-
Chonbuk National University, Jeonju 561-756, South Korea (e-mail:
moonho@jbnu.ac.kr). tered by the passive RFID tag [3]. With the prevalence of
Digital Object Identifier 10.1109/JIOT.2018.2800096 the above described RFID backscatter system, there emerge
2327-4662 c 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
YANG et al.: WIRELESS POWERED ASYNCHRONOUS BACKSCATTER NETWORKS WITH SPORADIC SHORT PACKETS 985

the following three main research branches in the backscatter overhead for slot synchronization. Therefore, the grant-free
communication system. access control is favorable for these networks and the packet
The first and most important research branch is the transmit transmission of the nodes in the whole network is usually
signal design and performance analysis in the point-to-point asynchronous, which further incurs time-varying interference
backscatter system. To meet the increasing expectation of the in the network. The study on how this time-varying inter-
data rate and data reliability for prominent RFID applica- ference affects the performance of the network-wide spatial
tions, many efforts have been devoted to investigating and throughput is challenging but interesting, since the interference
improving the performance of the backscatter RFID system is a contributing factor for WET while it hinders information
under multiantenna frameworks [6]–[12]. Ingram et al. [7] reception.
showed that equipping with multiple antennas at both RFID
reader and tag can improve the coverage and capacity of the
backscatter system. The fading characteristics of the multiple- A. Related Work and Motivation
input multiple-output (MIMO) backscatter system is studied As reviewed in [25], there exist lots of IoT applications for
in [8] where the dyadic backscatter channel is first introduced. backscatter communications. For example, backscatter com-
From then, the space-time coding scheme is widely explored bined with WET provides a ultralow-cost and battery-free
in [6] and [9]–[12] for MIMO RFID backscatter systems. In platform for the applications of smart homes or cities such
addition, the transmit signal design of the RFID reader is as people or car navigation, weather monitoring, and secu-
investigated in [13]. With security issues further taken into rity surveillance. Other application scenarios in IoT can be
account, the artificial-noise-aided transmit design is studied found in logistic tracking and biomedical applications [25].
in [14]–[16] under the framework of physical layer security. In [26], a multiple-access scheme based on time-hopping
Recently, the ambient backscatter technology, which utilizes spread-spectrum is proposed to enable both one-way WET
RF signals from the environment rather than the RF signals and two-way wireless information transfer under a system with
transmitted by the RFID reader, is studied in [17] and [18]. coexisting backscatter reader-tag links. However, the consid-
Since the passive tag has no on-tag power source but relies ered system model in [26] is not general with only a limited
on energy harvesting, the second research direction lies in number of predetermined backscatter reader-tag links, while
considering energy transfer in the point-to-point backscat- the model with coexisting reader-tag pairs is quite common in
ter system, which is also called the backscatter wireless practical IoT applications. For instance, multiple customers in
powered communication (B-WPC) system [19]. In [20], a a shopping mall or supermarket may use their smart devices
measurement-based proof of the B-WPC concept is presented, (i.e., RFID readers) to query prices or track producing infor-
and it is shown that the wireless energy transfer (WET) can mation (contained in RFID tags) from various goods on the
be optimized by relying on only the power levels received by shelf at the same time, which actually constitutes a B-WPC
the base station. The authors in [21] study RF-enabled WET interference network.
via energy beamforming in a backscatter system with multiple To cope with the feature of dynamic spatial positions of
RFID tags, and a customized method is proposed to resolve the nodes in the random and large-scale network, the recently
associated channel estimation problem. However, the research developed stochastic geometry theory has provided a power-
on B-WPC is still sparse. ful framework for evaluating the average performance of a
Different from the above research on point-to-point dynamic network. Under the stochastic geometry framework,
backscatter communication systems, the third research trend the locations of the network nodes are modeled according to
arises from the increasing deployments of B-WPC networks. a certain spatial distribution such as the Poisson point process
As it is pointed out in [22], handheld and mobile RFID read- (PPP) and then the analytical analysis can be carried out eas-
ers become more and more prevailing due to their portability ily [27]. Moreover, once the model parameters like network
and flexibility in the evolution of the IoT in the fifth genera- density are carefully chosen, these theoretical models can pro-
tion (5G) era. Therefore, it is of great importance to further vide an accurate approximation for the network performance in
study the backscatter system design and B-WPC from the real-world applications [28], [29]. We notice that the stochastic
perspective of large-scale random networks. However, under geometry model has been widely exploited to study the per-
pervasive and dense B-WPC networks in IoT and massive formance of WPC networks [30]–[34] but not the backscatter
machine-type communications (mMTCs) [23], [24] applica- applications. In [31], the performance of microwave power
tions such as in retail business, smart senors, and transportation transfer is investigated in an uplink cellular network pow-
checkpoints, how to formulate and resolve scalable and effi- ered by randomly deployed power beacons (PBs). The network
cient WET and communication connectivity issues remains throughput maximization problem is studied under an energy
nearly untouched by the existing work. Apart from the com- harvesting mobile ad hoc network (MANET) and under a
mon features like the nodes with random spatial positions in WPC network in [32] and [33], respectively. The impact of
conventional large-scale networks, one of the most challeng- physical layer security is further studied in [34]. However,
ing characteristics brought by B-WPC networks in mMTC these work cannot be directly exploited in B-WPC applica-
scenarios is that the transmissions are with sporadic short tions with low-complexity passive devices due to the special
packets [23]. The traffic of the nodes in these B-WPC net- mechanism of backscatter communications.
works is usually event-driven and uncoordinated, which makes Despite the above-mentioned prominent applications in IoT,
slot-aligned transmissions prohibitive due to the overwhelming the area of the large-scale B-WPC network with multiple
986 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 2, APRIL 2018

3) We investigate the network-wide spatial throughput,


which is defined as the total bits successfully transmit-
ted by the RFID reader-tag pairs emerged at the unit
time and network area. The spatial throughput is max-
imized by optimizing the slot length and slot division,
i.e., the durations of the two phases, and we find an
interesting result that there exists a tradeoff between the
durations of the two phases for spatial throughput max-
imization. In addition, the optimal network time-space
density is numerically analyzed for spatial throughput
Fig. 1. Stochastic B-WPC ad hoc network consisting of multiple RFID
maximization when the slot length and slot division are
reader-tag pairs. predetermined.

C. Organization and Notations


reader-tag links has been largely uncharted. A very recent con- The remainder of this paper is organized as follows. In
tribution [35] considers the network coverage probability and Sections II and III, we present the network models and
transmission capacity of a B-WPC network with PBs, where develop the formulation for the spatial throughput of the B-
the network is modeled as a random Poisson cluster process WPC MANET based on the information transmission model,
by leveraging stochastic geometry. Most recently, the network respectively. In Section IV, we investigate energy outage
model in [35] is further extended to a more generic network probability and information outage probability, respectively.
setup with the energy from multiple nearby PBs taken into In Section V, we solve the spatial throughput maximization
consideration in [36]. However, the work in [35] and [36] problem. Numerical simulations and analysis are presented in
only focuses on the scenario where the energy is harvested Section VI and the conclusion is drawn in Section VII.
from dedicated PBs, while the performance of the decentral- Notations: AT and AH represent the transpose and conjugate
ized B-WPC MANET remains unknown. Most importantly, transpose of a matrix A, respectively. I denotes an identity
all the above work fails to capture the sporadic short-packet matrix. E{·} and D{·} denote the expectation and variance
nature of the B-WPC network in pervasive IoT and mMTC operations, respectively. 1(·) denotes the indicator function.
applications with asynchronous transmissions and the incurred x ∼ CN (µ, ) means that x is a random vector following
time-varying interference. The above reasons motivate this a complex circular Gaussian distribution with mean µ and
paper. covariance . X ∼ Exp(λ) denotes the exponential distributed
random variable with rate λ, and X ∼ Gamma(k, θ ) denotes
the gamma-distributed random variable with shape k and scale
B. Our Work and Contributions θ . (x) is the gamma function [37, eq. (8.310)], and γ (k, x)
In this paper, to better characterize stochastic networks with is the lower incomplete gamma function [37, eq. (8.350.1)].
sporadic short packets, a time-space PPP (TS-PPP) is exploited
to model a B-WPC MANET. All the nodes in the network II. N ETWORK M ODELS
work in a decentralized and asynchronous way. Different
from [35], we assume that each RFID reader is equipped with We consider a stochastic B-WPC ad hoc network consist-
multiple antennas for more efficient power transfer and signal ing of multiple RFID reader-tag pairs, where each reader and
reception. We give a comprehensive performance analysis of a tag are separated by a common distance d0 ≥ 1 as shown
B-WPC MANET and uncover the main tradeoff as well as the in Fig. 1.1 As in [6], [8], and [9], each RFID reader in the
optimal parameter design in terms of spatial throughput maxi- network works in a full-duplex mode and is equipped with
mization in the network. The novelties and main contributions M antennas for simultaneously transmitting query signal and
of this paper are summarized as follows. receiving information signal from its corresponding RFID tag.
1) We study the performance of B-WPC in a multiantenna In addition, we consider a practical assumption that each RFID
MANET and introduce a TS-PPP model to fully capture tag in the network is equipped with a single antenna. Since
the two main characteristics of the nodes in B-WPC passive RFID tags are prominent for their low-cost and low-
networks in pervasive IoT and mMTC applications, i.e., power characteristics [6], we assume that all the RFID tags in
dynamic spatial positions and sporadic short packets. the considered network are passive RFID tags. In this paper,
2) Based on the TS-PPP model, we analyze the energy we focus on the information transmission from each RFID
and information outage performance arising in the tag to its corresponding RFID reader, but before that each
two phases of each information transmission slot, RFID tag has to be first powered up by harvesting the energy
namely the energy harvest and backscatter modulation of the RF signals transmitted by the ambient RFID readers.
phases, respectively. Moreover, the energy and informa-
1 Note that the results obtained in this paper can be extended to a general
tion outage probabilities are derived in closed forms,
distance distribution in the similar way. The reason to adopt this simplified
which facilitates the further evaluation of network-wide assumption is for the ease of analysis while preserving the key characteristics
metrics. and tradeoffs in the network.
YANG et al.: WIRELESS POWERED ASYNCHRONOUS BACKSCATTER NETWORKS WITH SPORADIC SHORT PACKETS 987

Therefore, each transmission slot for each RFID tag is com- with parameter λAT0 [38, Sec. 2.4.3], namely,
prised of the successive two phases, i.e., the energy harvest
(λAT0 )n e−λAT0
phase and the backscatter modulation phase. For notational Pr{N = n} = . (1)
simplicity, we use the terms “reader” and “tag” as commonly n!
used in RFID systems hereinafter.
B. Channel Model
Based on the fact that the reader is usually close to its tag
A. Asynchronous Network Model (small d0 ) and beamforming is employed for efficient WPT,
In most of conventional network settings, it is assumed the forward channel from each reader to its corresponding tag
that the beginning time of each transmission slot for mul- is characterized by a path loss combined with a multiantenna
tiple transmitter–receiver pairs should be perfectly aligned. gain G but no √ small-scale fading [31], [35], [41], which is
However, this assumption may be impractical especially for −α/2
represented as Gd0 . All the other channels, including
some decentralized networks like the ad hoc network where interference channels from the concurrent transmission of the
the overhead for the time slot synchronization is overwhelm- other reader-tag pairs and the reverse tag-reader channels of all
ing and unaffordable. Most importantly, with the coming of the the pairs, are assumed to undergo flat Rayleigh fading with a
5G era pervasive IoT and mMTC applications in large-scale large-scale path loss governed by the exponent α > 2.3 To be
networks are featured with uncoordinated and sporadic short specific, the forward channel from the reader located at z to the
−α/2
packets [23], which makes the fulfillment of slot synchroniza- tag located at x̂ is represented as hzx̂ dzx̂ , where hzx̂ ∈ CM×1
tion in these B-WPC networks even harder. In this paper, we accounts for the small-scale fading with hzx̂ ∼ CN (0, I) and
consider a more practical scenario where each reader-tag pair dzx̂ denotes the path distance. Similarly, the reverse chan-
in the network randomly accesses the same frequency for ad nel from the tag located at x̂ to the reader located at w is
hoc transmission in an asynchronous transmission way. −α/2
characterized by gx̂w rx̂w with gx̂w ∼ CN (0, I).
Different from the conventional stochastic geometry frame-
work, the time randomness has to be further taken into
III. I NFORMATION T RANSMISSION M ODEL
consideration such that the asynchronous behavior of spo-
radic short packets in B-WPC networks can be better captured. As a passive tag, the fulfillment of passing the informa-
In this paper, we consider a homogeneous time-space PPP tion such as identification data to its corresponding reader
 = {(x, tx )} of intensity λ accounting for all the readers in the mainly relies on the procedure of backscatter modulation
network, where x ∈ R2 denotes the location of a reader whose which requires the passive tag to harvest sufficient energy first
transmission starts from time tx and lasts for a predefined com- as illustrated in Fig. 1.
mon time T. In the considered network, it is assumed that there For the tractability of analysis, we consider a scenario where
exists one tag paired with each reader according to some pre- each tag in the network has a sporadic short packet with the
determined pairing rule,2 and each tag is located at a distance same duration T2 to transmit according to some unified pro-
d0 from its paired reader in a random direction. According tocol. By splitting the duration of each transmission slot as
to the displacement theorem [38], the collection of the cor- T = T1 + T2 , each slot can be further divided into two phases,
responding tags is denoted by another TS-PPP  ˆ = {(x̂, tx )} i.e., an energy harvest phase of duration T1 for energy har-
with intensity λ where x̂ ∈ R2 is the location of the corre- vesting and a backscatter modulation phase of duration T2 for
sponding tag paired with the reader located at x. This TS-PPP packet transmission, respectively. Note that different from con-
model seizes the essential time-space features of the network ventional WET networks, in the considered B-WPC network
by leveraging only a single parameter λ, which captures the the reader continuously transmits a standardized carrier-wave
space-time frequency of the channel access, i.e., the number signal over the both phases in its slot. However, the signal
of transmission initiations per unit of space and time. Each acts as different roles during the two phases: an energy signal
reader-tag pair is born at a random time tx and random loca- to power up the tag in the first phase and a query signal to
tions x, x̂, accesses the channel during a time slot of duration T, enable the backscatter modulation in the second phase. In the
and disappears immediately later. This model is also named as both phases, we assume that maximal-ratio transmit (MRT)
the Poisson rain model in [39] and [40]. Note that this model is employed at each reader to improve the transmitting effi-
is naturally motivated by the two main characteristics of B- ciency. An illustration of the time slot model in the network
WPC networks in pervasive IoT and mMTC applications in is shown in Fig. 2.
the 5G era, i.e., dynamic spatial positions captured by {x, x̂}
and sporadic short packets captured by {tx }. Therefore, the A. Energy Harvest Phase
model actually describes the behavior of the whole B-WPC By leveraging the homogeneity of the PPP [42], we focus
network in a precise manner. on a typical tag (ô, 0) which locates at the origin and its
Under this stochastic geometry framework, the number of reader begins the transmission at the time zero. During the
reader-tag pairs N established communication in a region of energy harvest phase in time interval [0, T1 ], the tag harvests
area A over time duration T0 follows a Poisson distribution energy not only from its own dedicated reader (o, 0) but also
2 To preserve the tractability of the main performance and tradeoff analysis 3 The analysis for different path-loss exponents accounting for WPT and
in the considered network, as in [26], [35], and [36] the study of the specific backscatter information transmission can be performed in the similar way,
association rule between readers and tags is out of the scope of this paper. which is omitted in this paper for the ease of presentation.
988 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 2, APRIL 2018

where η is the energy-harvest efficiency5 at each tag. If the


harvested energy by the tag is larger than a given threshold
EC at the end of the energy harvest phase, i.e., EH ≥ EC ,
the tag will have sufficient energy to feedback the informa-
tion back to its reader in the backscatter modulation phase.
Otherwise, the tag will stay silent over the whole backscat-
ter modulation phase as illustrated in Fig. 2 [35]. The energy
outage probability for a tag in the network is thereby given by
Peo = Pr{EH < EC }. (4)
Accordingly, the collections of the readers and the correspond-
ing tags which have sufficient energy to transmit information at
Fig. 2. Illustration of the time slot model in the network. the second phase are denoted as T = {(x, tx ) ∈  | EH ≥ EC }
and  ˆ | EH ≥ EC } with the same intensity
ˆ T = {(x̂, tx ) ∈ 
λt  (1 − Peo )λ, respectively.
from the other readers in the network which are concurrently Remark 1: It is worth noting that T and  ˆ T are no longer
transmitting. Note that the transmitted signal from the other PPPs in general since the harvested energy at each tag is actu-
readers during either of their two transmission phases can ally correlated by a common network of the readers and the
be harvested to power up tag (ô, 0) (see Fig. 2). It is clear thinning process is thereby dependent. However, it has been
that the received power from the other readers at the typical verified by the simulations in [33] that the thinned nodes
tag is time-varying according to the assumed asynchronous still approximately form a PPP. For analytical tractability,
network in Section II-A. For the ease of notation, we define we will view  ˆ T as a PPP in the sequel, and the accuracy
e(t, tx )  1(tx ≤ t ≤ tx + T) with the aid of the indicator func- of this approximation will be checked by the simulations in
tion. According to Fig. 2, the incident time-varying signal at Section IV-B.
the typical tag is given by
 B. Backscatter Modulation Phase
yT (t) = PT Gd0−α ejϕô
   As illustrated in Fig. 1, when the passive tag has accu-
from its paired reader mulated the sufficient energy EC at the beginning of the
  backscatter modulation phase, different impedance loads (or
+ PT e(t, tx )hTxô wx L(dxô )−α/2 ejϕx (2)
equivalently impedance mismatch levels) of its antenna are
(x,tx )∈
\(o,0) adjusted based on the stored information to reflect the inci-
   dent query signal back to the reader. By doing so, the tag’s
from other readers
information signal is modulated on the reflected query signal
where PT is the power of the energy signal transmitted by each and finally is detected by the reader [6]. By similarly defining
reader and wx = hxx̂ /hxx̂  is the MRT weight vector used at ι(t, tx )  1(tx + T1 ≤ t ≤ tx + T), according to Fig. 2 the
the transmitter of the reader (x, tx ). Since the considered net- received signal at the typical reader (o, 0) which locates at
work is decentralized and the transmissions are asynchronous, the origin and starts the transmission at time zero is given by


−α/2 
the transmitted √ energy signals (i.e., the carrier-wave signals
with amplitude PT ) by different readers can have different yR (t) = yT (t)gôo d0 βsô 1(T1 ≤ t ≤ T)
initial phases. To model this, we use ϕô and ϕx in (2) to account   
backscattered information signal from its paired tag
for different phases of the incident carrier-wave signal at tag 

−α/2 
(ô, 0) from its paired reader (o, 0) and the transmitted carrier- + ι(t, tx ) yT(x̂,tx ) (t) · gx̂o rx̂o βsx̂ +n (5)
wave signal by reader (x, tx ), respectively, and these phases (x̂,tx )∈
are assumed to be independently and uniformly distributed on ˆ T \(ô,0)

[−π, π ). Note that in (2) we use a short-range propagation   
interference from other tags
model for characterizing path loss with L(dxô ) = max{dxô , ro }
and a constant ro ≥ 1 to avoid the singularity at zero dis- where yT(x̂,tx ) (t) is the incident carrier-wave signal at tag (x̂, tx )
tance and ensure that the finite moments of the total harvested and takes the similar form of (2) with ô and (o, 0) changed
energy exist as in [31].4 By leveraging (2), the total harvested to x̂ and (x, tx ), respectively; sx̂ denotes the information sig-
energy in the first phase is expressed as nal of tag (x̂, tx ), which is modulated on the incident carrier
T1 wave by the tag and has unit power; and β is the backscat-
EH = η |yT (t)|2 dt (3) ter coefficient of each tag during backscatter modulation, and
0 n ∼ CN (0, N0 I) accounts for the additive white Gaussian
4 The tags in phase one also have the opportunity to harvest the backscat- 5 Note that an RF energy-harvesting sensitivity level is usually required to
tered power by the tags in phase two. However, this part of power is neglected activate the harvesting circuit. However, we omit this level in this paper for
in (2) based on the fact that the backscattered signal goes through a double the tractability of analysis as in [31]–[35] and for the fact that such sensitivity
path loss and is much smaller than the energy directly transferred from the level can be kept relatively low compared to the harvested energy from the
readers. dedicated reader nowadays [43].
YANG et al.: WIRELESS POWERED ASYNCHRONOUS BACKSCATTER NETWORKS WITH SPORADIC SHORT PACKETS 989

noise (AWGN) at the receiver of each reader. It should be A. Energy Outage Probability
noted that the query signal terms transmitted from other read- Different from the scenario in the conventional WET net-
ers do not appear in (5), since the standardized unmodulated work, calculating the energy outage probability given in (4) is
carrier wave appears as a direct current level after down very challenging in the considered B-WPC network. The main
conversion and thereby can be easily removed [35]. By denot- reasons are summarized as follows.
ing the signal-to-interference-plus-noise ratio (SINR) of the 1) According to the transmission model given in (2), the
received signal in (5) as SINRR , the information outage prob- tags harvest energy from the carrier-wave signals with
ability for a reader in the backscatter modulation phase is different phases transmitted by different readers in the
thereby given by network, which are actually highly correlated. Therefore,
Pio = Pr{SINRR < γR } (6) compared to the scenario in the conventional WET net-
work, the total harvest power here is no longer simply
where γR is the targeted SINR level. the sum of different received signal power but the power
of the received signal sum given by |yT (t)|2 as in (3).
C. Spatial Throughput Metric 2) Since the received power |yT (t)|2 is time-varying, the
Similar to [32], [33], and [35], we define the spatial total harvested energy takes the integral form in (3),
throughput of the backscatter network as the total bits success- which is hard to tackle.
fully transmitted by the reader-tag pairs emerged at the unit The above two factors render finding the exact expression of
time and network area. Accordingly, the spatial throughput is the energy outage probability prohibitive.
characterized by To circumvent this issue, we propose to exploit the second-
order moment matching technique to obtain an approximation
R(T1 , T2 , β) = λt T2 (1 − Pio )B (7)
of the probability. To be specific, the total harvested energy
where factor B represents the data rate per tag-reader link EH will be approximated as a gamma random variable by
during the backscatter modulation phase, and factor λt (1 − matching the first and second order moments of EH [44].
Pio ) accounts for the time-space density of active links with Accordingly, the two parameters of the gamma distribution
successful transmission. Note that the data rate B is a function is given in the following lemma.
of the targeted SINR level γR , whose form is determined by Lemma 1: After using second-order moment matching, the
the specific realization of modulation in practice. distribution Gamma(k, θ ) with the same first and second order
Remark 2: It is worth noting that to obtain the exact spa- moments of EH has parameters
tial throughput, the information outage probability Pio used
in (7) should be the probability conditioned on the reader-tag (E{EH })2 D{EH }
k= θ= . (9)
pairs which have harvested sufficient energy in the first phase. D{EH } E{EH }
However, for analytical tractability we remark that imposing
the independence on the two phases and simply substitut- Proof: The lemma follows from [44, Lemma 3].
ing (6) into (7) actually incur little accuracy loss, which will According to Lemma 1, the mean and variance of EH have
be validated by the simulations in Section IV-B. to be calculated in order to obtain an approximation of the
From (7), we observe that the choices of T1 and T2 are crit- energy outage probability. The results are provided in the
ical for improving the spatial throughput. Intuitively, larger T1 following lemma.
or T2 enables the tags to harvest more energy in the energy Lemma 2: The mean and variance of EH are given by
harvest phase, which improves the spatial throughput perfor-
α 2−α
mance. However, larger T1 or T2 also incurs more interference E{EH } = ηPT T1 Gd0−α + π λT ro (10)
to the readers in the backscatter modulation phase, which α−2
deteriorates the spatial throughput performance. Therefore, it and
is of much interest to study how to design the transmission   
−α
slot length and slot division to maximize the network-wide 2 2−α Gd0 ro−α
D{EH } = (ηPT T1 )2
(2T1 + 3T2 )π λαro +
spatial throughput. Under energy and information outage con- 3 α−2 α−1
straints, the spatial throughput maximization problem can be 
α 2−α 2 1
2
formulated as + πλ r 3T1 + 8T1 T2 + 6T22
α−2 o 6
maximize R(T1 , T2 , β)
T1 ,T2 (11)
s.t. Peo ≤ e , Pio ≤ i . (8)
respectively.
The above problem will be investigated in Section V. Proof: The proof is given in Appendix A.
It is worth noting that the first term in (10) is actually the
IV. E NERGY AND I NFORMATION O UTAGE P ERFORMANCE energy harvested directly from each tag’s dedicated reader,
In this section, we derive the analytical expressions for the while the second term in (10) accounts for the average energy
energy and information outage probabilities during the energy harvested from the B-WPC network. By leveraging Lemmas 1
harvest and backscatter modulation phases in Sections IV-A and 2, an approximation of the energy outage probability
and IV-B, respectively. defined in (4) is provided in the following theorem.
990 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 2, APRIL 2018

or T2 both leads to an increase in the energy outage proba-


bility. This is because when the whole transmission duration
T gets smaller, the tags in the first phase are likely to har-
vest less power from the ambient readers’ signal which lasts
for both durations of T1 and T2 . Above all, since T1 directly
determines the duration of the energy harvest phase, reducing
T1 impacts the energy outage performance even more.

B. Information Outage Probability


When the tag harvests sufficient energy in the first phase,
i.e., there is no energy outage, the passive tag will pass its
stored information to the reader during the backscatter mod-
ulation phase. To calculate the information outage probability
during this phase, we first formulate the SINR of the received
signal at the typical reader in (5). For analysis tractability, we
use the expectation of average power
 T 
1 1
Fig. 3. Energy outage probability versus the energy threshold EC in the ȳ2T  E |yT (t)|2 dt = E{EH } (15)
energy harvest phase. The solid lines stand for simulation results, while dashed T2 T1 ηT1
lines present the corresponding analytical results. Moreover, the upper and
lower Cantelli bounds are provided for the case of T1 = 0.2 ms and T2 = to approximate the power of yT (t) and yT(x̂,tx ) (t) for any
0.5 ms. The other network parameters are: λ = 0.1 /(m2 · ms), M = 3, ˆ T \(ô, 0) during time duration [T1 , T]. Note that
G = M with  = 2/3, PT = 20 dBm (100 mW), η = 0.8, d0 = ro = 2 m,
(x̂, tx ) ∈ 
and α = 3. this approximation is quite accurate when the incident power
transferred from the dedicated reader is dominant in the total
incident power at the tag, which is the usual case. Let
Theorem 1: The energy outage probability for the tags in 
−α
the energy harvest phase can be approximated as RI (t) = β ȳ2T ι(t, tx )rx̂o gx̂o gH
x̂o (16)
γ (k, EC /θ ) (x̂,tx )∈ˆ T \(ô,0)
Peo ≈ (12)
(k) be the covariance matrix of the received interference. To
where k and θ are given in Lemma 1. further evaluate the information outage performance of the
Proof: By leveraging Lemma 1 and the cumulative dis- network, the time-varying term RI (t) renders the SINRR
tribution function (CDF) of gamma random variables, the intractable. To circumvent this problem, as in [39] and [40] we
theorem is immediately obtained. use the average interference  T value over the backscatter mod-
In addition, lower and upper bounds of Peo can be obtained ulation phase R̄I = 1/T2 T1 RI (t)dt to replace the intractable
by using the Cantelli inequality (also known as the one-sided time-varying term. Note that this corresponds to the case
Chebyshev inequality [45]) and the results in Lemma 2. To be where some coding with repetition and interleaving of bits
specific, the energy outage probability is upper bounded as is employed [39]. We only consider this average interference
case in this paper, and other more sophisticated scenarios like
D{EH }
Peo ≤ , for EC ≤ E{EH } (13) the maximal interference constraint for the outage probability
D{EH } + (EC − E{EH })2 are left for future work. By employing the minimum mean
and a lower bound of Peo is given by square error receiver, the optimal SINR performance at the
typical reader can be characterized as
(EC − E{EH })2
Peo ≥ , for EC ≥ E{EH }. (14)  −1
D{EH } + (EC − E{EH })2 SINRR = β ȳ2T d0−α gH
ôo R̄I + N0 I gôo
⎛ ⎞−1
To validate our theoretical findings, we leverage the Monte
Carlo method by averaging 103 network realizations to obtain ⎜ ⎟
⎜  N0 ⎟
the simulation results throughout this paper. Note that finite yet = d0−α gH ⎜ w(t )r −α
g gH
+ I ⎟ gôo
ôo ⎜
β ȳ2T ⎟
x x̂o x̂o x̂o
adequately large network area and time duration are considered ⎝ (x̂,tx )∈ ⎠
in the simulations such that the introduced border effect on the ˆ T \(ô,0)

performance can be neglected. Fig. 3 depicts the energy outage (17)
probability versus the energy threshold EC under different net-
work parameters, where the upper and lower Cantelli bounds where

are provided for the case of T1 = 0.2 ms and T2 = 0.5 ms. T2 −|tx |
T2 , tx ∈ [−T2 , T2 ]
1 T
From Fig. 3, we observe that the bounds given by (13) and (14) w(tx )  ι(t, tx )dt = (18)
T2 T1 0, elsewhere.
are loose, since the Cantelli inequality is general and holds
for any random variables. Contrarily, our analytical approxi- To calculate the information outage probability defined
mations obtained by Theorem 1 are found very close to the in (6), the main obstacles lie in the fact that the number of
simulation results. It can be seen from Fig. 3 that reducing T1 interference terms in (17) is infinite and the time randomness
YANG et al.: WIRELESS POWERED ASYNCHRONOUS BACKSCATTER NETWORKS WITH SPORADIC SHORT PACKETS 991

of the network {tx } involved in (18) should be further tackled,


which makes the calculation of (6) challenging. To circumvent
these problems, our method is to first calculate the information
outage probability for a fixed area and time duration, and then
we obtain the final result by letting the area and time dura-
tion go to infinity. Note that this approach leads to no loss of
accuracy. The main result is given in the following theorem.
Theorem 2: The information outage probability defined
in (6) in the backscatter modulation phase is given by
 
 
α δ N0 α
Pio = 1 − H λt γR d0 T2 + 2 γR d0 (19)
β ȳT
M−1 i
where H(x)  i=0 (x /i!)e−x ,   [4π /(2 + α)](δ)(1 −
δ) = [4π /(2 + α) sin(δπ )], and δ  (2/α).
2

Proof: The proof is given in Appendix B.


Since the first order derivative of H(x) can be found as
xM−1 −x
H
(x) = − e ≤0 (20) Fig. 4. Information outage probability versus the targeted SINR level γR
(M − 1)! in the backscatter modulation phase under different EC ’s. The other network
parameters are: λ = 0.03 /(m2 · ms), T1 = T2 = 0.5 ms, N0 = −90 dBm,
the information outage probability decreases with an increase β = 0.8, M = 3, G = M with  = 2/3, PT = 20 dBm (100 mW), η = 0.8,
in the backscatter coefficient β or the incident power ȳ2T . This d0 = ro = 2 m, and α = 3.
result is not surprising, because increasing β or ȳ2T leads to an
increase in both signal and interference terms in (5), which is
equivalent to reducing the AWGN level σ 2  (N0 /β ȳ2T ) with a larger T1 or T2 will be beneficial for energy harvest while
the backscatter power normalized to one. it will deteriorate the performance of information decoding
In realistic backscatter applications, the receiver noise power during the backscatter modulation phase. Therefore, it is of
N0 is small (as low as −90 dBm [14]) and can be much lower great importance to investigate the optimal design for spatial
than the power of network interference. Therefore, the study of throughput maximization and the optimal tradeoff between T1
the network performance under the interference-limited regime and T2 .
is of much importance. Under this scenario, the information By focusing on the interference-limited regime and substi-
outage probability in (19) becomes tuting (21) into (7), we obtain the spatial throughput of the

 δ asynchronous B-WPC network as
Pio = 1 − H λt γR d0α T2 . (21)
 δ
R(T1 , T2 , β) = λt T2 · H λt T2 γR d0α  · B. (22)
From (21), based on (20) and by recalling λt = (1 − Peo )λ
where Peo decreases with an increase in T1 or T2 , we know Based on (22), the spatial throughput maximization problem
that the information outage probability increases with T1 and in (8) is equivalent to
T2 . This is because the average number of emerged interfering maximize f (χ )  χ · H(χ ) (23a)
nodes in unit area during the backscatter modulation phase T1 ,T2 ,χ
becomes larger when λt T2 increases. s.t. χ = τ λt T2 (23b)
Fig. 4 depicts the relation between the information out- Peo ≤ e , Pio ≤ i (23c)
age performance and the targeted SINR level under different
energy thresholds. The simulation result shown in Fig. 4 is the where λt is a function of both T1 and T2 by recalling that
information outage probability conditioned on the successful λt = (1 − Peo )λ, and τ  (γR d0α )δ . Before proceeding, we
energy harvesting (EH ≥ EC ) in the first phase. The results first show that the objective function f (χ ) in (23a) is quasi-
are obtained by counting the information outage events of the concave [46, p. 99] for χ ≥ 0 in the following proposition.
tag located at the origin only when it has harvested sufficient Proposition 1: The function f (x) = xH(x) =
energy in the first phase. As we can see from Fig. 4, our
M−1 i+1
i=0 (x /i!)e−x is quasi-concave for x ≥ 0. Specifically,
analytical results coincide with the simulation ones, which val- f (x) first increases in x ∈ [0, xM ] and then decreases in
idates the correctness of our analytical derivations. In addition, x ∈ (xM , ∞), where xM ∈ ((M/2), M) is the unique number
it is straightforward to see that Pio becomes smaller with a satisfying
larger demanded EC , since the working tags in the backscatter  xn
M−1
xM
modulation phase become sparser under this situation. Q(x) = − + = 0. (24)
(M − 1)! n!
n=0
V. S PATIAL T HROUGHPUT M AXIMIZATION Proof: Please refer to [47, Appendix B] for the detail of
As pointed out in Section IV, the choices of T1 and T2 the proof. The quasi-concavity of f is immediately obtained
largely determine the performance of the energy and informa- according to the definition of the quasi-concave function in
tion outage in the two transmission phases. Specifically, setting [46, p. 99].
992 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 2, APRIL 2018

It is worth noting that based on the quasi-concavity of to achieve the same optimal spatial throughput, T1 and T2
function f (x) in Proposition 1, the maximizer xM of f can can complement for each other. For example, on the line con-
be efficiently calculated via a bisection search in the interval strained by p(T1 , T2 ) = (χ  /τ λ), we can find a smaller T2
((M/2), M). Additionally, when the outage constraints in (23c) by enlarging T1 to achieve a tighter constraint for energy out-
are absent, the optimal spatial density λt T2 linearly scales with age. In addition, we remark that the obtained solution given
the antenna number at each reader M due to xM ∈ ((M/2), M). in (27) can further easily incorporate individual constraints on
By leveraging the monotonic property of the informa- the time lengths of T1 and T2 .
tion outage probability based on (20), problem (23) is 3) Optimal Network Density for Spatial Throughput
equivalent to Maximization: By far, we have found the optimal slot design
(T1 , T2 ) which maximizes the spatial throughput. We remark
maximize f (χ ) (25a)
T1 ,T2 ,χ that when the time durations of the two transmission phases are
s.t. χ = τ λT2 (1 − Peo ) (25b) predetermined according to some given protocol, the similar
χ ≤ χup (25c) tradeoff also exists in network density optimization for spa-
tial throughput maximization. However, as will be observed
Peo ≤ e (25d) by the simulations in Section VI, the energy outage prob-
where χup  H −1 (1 − i ) withH −1 (x)
being the inverse func- ability Peo (λ) is not necessarily an decreasing function of
tion of H(x). By considering the constraint on χ in (25c) and λ in the considered B-WPC network. Therefore, the similar
leveraging the quasi-concave property of f (χ ) in Proposition 1, method developed in this section cannot be used, and we will
we obtain the optimal numerically check the impact of network density on the spatial
  throughput performance in Section VI.
χ  = min xM , χup (26)
for problem (25). By further jointly taking account of the
VI. N UMERICAL R ESULTS
remaining constraints in (25b) and (25d), the constraint on Peo
in (25d) can be recast as T2 ≤ (χ  /τ λ(1 − e )). Therefore, the In this section, more representative results are provided to
optimal solution (T1 , T2 ) to the spatial throughput maximiza- unveil the network performance and optimal parameter design
tion problem is given by the collection in terms of spatial throughput maximization.
   As in [35] and [36], the Monte Carlo simulations are
    χ χ
T1 , T2 ∈ (T1 , T2 )  T2 (1 − Peo ) = , T2 ≤ conducted with the aid of the MATLAB software on a
τλ τ λ(1 −  )
e desktop computer. The parameter settings are as follows,
(27) unless otherwise specified. The density of the network is
and the optimal spatial throughput is thereby given by λ = 0.03 /(m2 · ms). The time durations allocated for the
energy harvest and backscatter modulation phases in each slot
χ   are T1 = T2 = 0.5 ms. The antenna number at each reader in
Ropt = · H χ  · B. (28)
τ the network is M = 3, and the multiantenna gain for direct
Concerning the optimal solution (T1 , T2 ) given in (27), we energy transfer is set as G = M with  = 2/3. The transmit
have the following observations. power for each reader is PT = 20 dBm (100 mW), and the
1) Existence of the Optimal Solution: The optimal solution energy-harvest efficiency at each tag is η = 0.8. The distance
collection in (27) always exists. This observation can be easily between the reader and the tag in each pair is d0 = 2 m and
verified as follows. From the equality constraint in (27), we ro = 2 m, and the path-loss exponent is α = 3. The relation
obtain the lower bound of T2 given by T2LB = (χ  /τ λ) due to between the data rate B and the targeted SINR level γR is
Peo ≥ 0. By noting that this lower bound of T2 is always captured by B = log(1 + γR ).
smaller than its upper bound T2UB = (χ  /τ λ(1 − e )), the We first check the impact of the network density λ on the
optimal T2 can be arbitrarily chosen from (T2LB , T2UB ]. Once energy outage performance. As shown in Fig. 5, the energy
T2 is determined, the optimal T1 can be obtained according outage probability is not always a decreasing function of λ,
to the equality constraint in (27). e.g., the case of M = 4. Note that this result is different from
2) Tradeoff of the Optimal Solution: From (27), we know the one in the conventional WPC network where the WPC
that there exists a tradeoff between T1 and T2 , while different nodes always benefit more from denser network deployments.
choices of T1 and T2 restrained by (27) yield the same optimal The reason behind is that the transmitted carrier-wave sig-
objective value. To see more clearly, we rewrite (27) as nal by different readers is actually highly correlated due to
   the same working frequency. Therefore, the harvested total
 χ
(T1 , T2 )  p(T1 , T2 ) = , T2LB < T2 ≤ T2UB (29) energy is no longer simply the summation of the energy inde-
τλ
pendently harvested from each network node. As observed
where from Fig. 5, the energy outage probability first increases as λ
increases from 0.01 to 0.03 /(m2 · ms) under a large antenna
p(T1 , T2 )  T2 (1 − Peo (T1 , T2 )). (30)
number M = 4. This is because the outage probability is small
In light of the numerical results shown in Section IV-A, it due to the large multiantenna gain provided by the dedicated
is not hard to see that the function p(T1 , T2 ) is an increas- reader, when λ is extremely small and the energy harvested
ing function of both T1 and T2 . This observation means that from ambient readers in the network can be neglected. When
YANG et al.: WIRELESS POWERED ASYNCHRONOUS BACKSCATTER NETWORKS WITH SPORADIC SHORT PACKETS 993

(a)

Fig. 5. Energy outage probability versus the network density λ in the energy
harvest phase under different antenna numbers at the readers. The energy
threshold is EC = 8 μJ.

λ gets larger, the incident carrier waves from different readers


can be destructively combined, which leads to a higher energy
outage probability. Furthermore, from Fig. 5 the outage proba-
bility decreases when the readers in the network are equipped
with more antennas as expected.
As we have indicated in Section V, the spatial throughput
largely depends on the choice of the slot division (T1 and T2 ).
We first show the spatial throughput versus time durations of
T1 and T2 in Fig. 6 without energy and information outage
constraints. It can be observed that for any given T1 there
does exist a T2 that maximizes the spatial throughput and vice
versa. Since the optimal spatial throughput achieved by mul-
tiple (T1 , T2 ) pairs is the same from Fig. 6, there exists a
tradeoff between the optimal T1 and T2 as we have discussed (b)
in Section V. From Fig. 6, when T1 becomes smaller in the
regime of T1 < 0.1 ms, the optimal T2 increases rapidly. The Fig. 6. Spatial throughput versus time durations of T1 and T2 without energy
and information outage constraints. The energy threshold is EC = 6 μJ, and
reason behind this is twofold. On the one hand, since the time the targeted SINR level is γR = 5 dB. (a) Mesh figure. (b) Contour figure.
duration for energy harvesting is limited the energy outage
becomes the bottleneck of the spatial throughput, and a larger probability. It is also straightforward to foresee that the optimal
T2 is beneficial to maintain low energy outage probability; on set for T2 will further get smaller when e decreases according
the other hand, since the density of the working tags reduces to (27). Moreover, it is worth noting that from Fig. 7(a) the
in the backscatter modulation phase, a longer time duration of optimal solution collections for (T1 , T2 ) are almost the same
T2 is needed to transmit more information bits in the second for i = 0.7, 0.6, 0.5, 0.4. This is because the information out-
phase. age constraints are loose at this time and we have the same
When the constraint of information outage probability is optimal χ  = xM . Fig. 7(b) shows that the optimal spatial
taken into consideration, the optimal solution collection for throughput increases and finally remains at its maximal value
(T1 , T2 ) and the corresponding optimal spatial throughput are with an increase in i . Additionally, a larger path-loss expo-
shown in Fig. 7. The solid lines in Fig. 7(a) stand for the nent α leads to a higher spatial throughput as observed from
situation where the constraint of energy outage probability is Fig. 7(b).
further taken into account over dashed lines. From Fig. 7(a), Fig. 8 shows the impact of the network time-space den-
we can see that with the more and more stringent information sity on the performance of the spatial throughput. The solid
outage constraint, the time durations for optimal T1 and T2 lines in Fig. 8 stand for the situation where the constraints of
become smaller and the collection {(T1 , T2 )} gets shrunk. This energy and information outage probabilities are further taken
is because the information outage probability is an increasing into account over dashed lines, and the star markers further
function of T1 and T2 as we have pointed out in Section IV-B. indicate the optimal network density. It can be observed from
In addition, when i increases the optimal set for T2 becomes Fig. 8 that there does exist an optimal λ for spatial throughput
smaller so as to meet the same constraint for energy outage maximization, since too large λ induces a lot of interferences
994 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 2, APRIL 2018

(a) Fig. 8. Spatial throughput versus the time-space density of the network
λ under different numbers of antennas equipped at the readers. The solid
lines stand for the situation where the constraints of energy and information
outage probabilities are further taken into account over dashed lines, and the
star markers indicate the optimal λ for spatial throughput maximization. The
energy and information outage constraints are e = i = 0.35. The energy
threshold is EC = 6 μJ, and the targeted SINR level is γR = 5 dB.

exploiting a TS-PPP model, the behavior of the network with


sporadic short packets has been well captured in a decentral-
ized and asynchronous transmission way. We have obtained
the analytical energy and information outage probabilities in
closed forms, respectively. Furthermore, we have obtained the
optimal transmission slot length and division by maximizing
the network-wide spatial throughput. Finally, we have pre-
sented numerical results to verify our theoretical analysis. It
is shown that there exists the optimal tradeoff between the
durations of the two transmission phases for spatial through-
(b) put maximization, and this tradeoff region gets shrunk when
the outage constraints become more stringent.
Fig. 7. (a) Optimal solution collections for (T1 , T2 ) and (b) corresponding
optimal spatial throughput under different constraints of information outage
probability i ’s. The solid lines in (a) stand for the situation where the con-
straint of energy outage probability is further taken into account over dashed A PPENDIX A
lines. The constraint of energy outage probability is the same e = 0.4. The
energy threshold is EC = 6 μJ, and the targeted SINR level is γR = 5 dB. P ROOF OF L EMMA 2
Since hxô is independent of wx , we have hTxô wx  ξx ∼
CN (0, 1) and {ξx } are independent and identically distributed
in the backscatter modulation phase while too small λ limits (i.i.d.). Therefore, the mean of ZH can be found as
the density of reader-tag pairs and may even incur the shortage T1 !
of harvested energy in the energy harvest phase. Moreover, the
E{EH } = η E |yT (t)|2 dt
number of antennas equipped at the readers is critical to the 0 ⎛ ⎧ ⎫⎞
network performance under the same energy and information
T1 ⎪
⎪ ⎪

outage constraints. Indeed, from Fig. 8 the feasible region of ⎜ −α ⎨  ⎬⎟
(a)
= ηPT ⎜Gd + E e(t, t )L(d ) −α ⎟dt
λ becomes larger when M increases from 2 to 5, since a larger ⎝ 0 ⎪ x xô
⎪⎠
0 ⎪
⎩ (x,tx )∈ ⎪

M is beneficial for both energy harvest and information recep- \(o,0)
tion. In addition, both spatial throughput and optimal network T1
Gd0−α
(b)
density increase as M increases. = ηPT
0
∞ ∞
VII. C ONCLUSION + 2πλ e(t1 , t2 )L(r)−α rdrdt2 dt1
−∞ 0

In this paper, we have studied the network-wide per- −α α 2−α
= ηPT T1 Gd0 + πλT r (31)
formance of a multiantenna B-WPC ad hoc network. By α−2 o
YANG et al.: WIRELESS POWERED ASYNCHRONOUS BACKSCATTER NETWORKS WITH SPORADIC SHORT PACKETS 995

where step (a) is obtained by noting that {ξx } are i.i.d. connection probability) can be represented as [47]
CN (0, 1) random variables, and step (b) is an application of
the Campbell theorem [42]. P̄ic (λt , γR )
Similarly, the second order moment of EH is given by  Pr{SINRR > γR }
⎡  
! T1 T1
 N σ 2 ϑ i−k
 min(i,N)
M−1
E EH 2
= (ηPT )2 E{q(t1 )q(t2 )}dt1 dt2 (32) = exp −σ ϑ EN ⎣
2
0 0 k (i − k)!
i=0 k=0

where + , + ,
⎧ ⎫ ϑX 1 ⎦ (36)
⎪ ⎪ × EkX EN−k

⎨ ⎪
⎬ 1 + ϑX X 1 + ϑX

q(t)  Gd0−α + 2Re −α
Gd0 e(t, tx )ξ̄x L(dxô ) −α/2

⎪ ⎪
⎪ −α
⎩ (x,tx )∈ ⎭ where σ 2  (N0 /β ȳ2T ), ϑ  γR d0α , and X  w(tx )rx̂o is a
\(o,0)
 2 random variable determined by (x̂, tx ) ∈ (A, T0 ). Recall from
  the property of PPP that once conditioned on N, (x̂, tx ) is
  
  uniformly distributed in the domain (A, T0 ) [38]. Therefore,
+  e(t, tx )ξ̄x L(dxô )−α/2  (33)
 (x,tx )∈  we further have
\(o,0)  + ,
ϑX 1 ϑX  
EX = d x̂, tx (37)
with ξ̄x = ξx ej(ϕx −ϕô ) following the CN (0, 1) distribution. 1 + ϑX AT0 (A,T0 ) 1 + ϑX
By plunging (33) into (32) and leveraging the Campbell the- and
orem [42], we finally obtain E{EH 2 } after several algebraic
+ ,
manipulations as 1 1 1  
EX = d x̂, tx . (38)
! 1 + ϑX AT0 (A,T0 ) 1 + ϑX
E EH
2
 Substituting (37), (38), and the distribution of N given in (1)
 2 2 Gd−α α into (36) yields
= (ηPT T1 ) 2
Gd0−α + (5T1 + 6T2 )π λ 0 ro2−α
3 α−2
2 α 2(1−α) P̄ic (λt , γR )
+ (2T1 + 3T2 )π λ  
 N σ 2 ϑ i−k
r
 ∞ M−1
3 α−1 o  min(i,N)
2
 = exp −σ ϑ 2
α 2−α 1
+ πλ r 9T1 + 20T1 T2 + 12T2 .
2 2 k (i − k)!
N=0 i=0 k=0
α−2 o 6   
 k    N−k
(34) ϑXd x̂, tx d x̂, tx
× λt λt
(A,T0 ) 1 + ϑX (A,T0 ) 1 + ϑX
Based on (31) and (34), the variance of ZH can be found as exp(−λt AT0 )
×
D{EH } N!
!
M−1
 i  ∞  2 i−k
= E EH2
− E2 {EH } σ ϑ
= exp −σ ϑ2
   k!(i − k)!
−α
2 2 2−α Gd0 ro−α 
i=0 k=0 N=k
  k
= (ηPT T1 ) (2T1 + 3T2 )π λαro + ϑXd x̂, tx
3 α−2 α−1 1
 × λt
1 + ϑX (N − k)!
α 2−α 2 1
2

(A,T0 )
+ πλ r 3T1 + 8T1 T2 + 6T2 .
2   N−k
α−2 o 6 d x̂, tx
× λt exp(−λt AT0 ). (39)
(35) (A,T0 ) 1 + ϑX

The proof is completed. Using the fact that AT0 = (A,T0 ) 1d(x̂, tx ), we have

P̄ic (λt , γR )
A PPENDIX B

M−1
 i  2 i−k
P ROOF OF T HEOREM 2 σ ϑ (λt  )k
= exp −σ ϑ 2
exp(−λt  )
The proof of (19) follows the similar line of that in k!(i − k)!
i=0 k=0
 

[47, Th. 1], but here we consider a TS-PPP and further cope  λt  + σ 2 ϑ i
M−1
with time domain. First, let us focus on the SINR performance = exp −λt  − σ 2 ϑ (40)
in a given region of area A over time T0 denoted by the domain i!
i=0
(A, T0 ) ⊆ R2 × R. We denote the number of the emerged
where
reader-tag pairs in (A, T0 ) as the random variable N with the
distribution given in (1). By applying the result in [48], the ϑX  
  d x̂, tx . (41)
complementary CDF of the SINRR (or namely, the information (A,T0 ) 1 + ϑX
996 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 2, APRIL 2018

Finally, by letting the formerly restricted domain (A, T0 ) go [18] G. Wang, F. Gao, R. Fan, and C. Tellambura, “Ambient backscatter com-
to infinity, the integral  in (41) can be calculated as munication systems: Detection and performance analysis,” IEEE Trans.
Commun., vol. 64, no. 11, pp. 4836–4846, Nov. 2016.
∞ ∞
ϑw(t)r−α [19] K. Huang, C. Zhong, and G. Zhu, “Some new research trends in wire-
 = 2π rdrdt lessly powered communications,” IEEE Wireless Commun., vol. 23,
−∞ 0 1 + ϑw(t)r−α no. 2, pp. 19–27, Apr. 2016.
∞ −δ ∞ [20] D. Arnitz and M. S. Reynolds, “Multitransmitter wireless power trans-
(a) 2π x
= dx (ϑw(t))δ dt fer optimization for backscatter RFID transponders,” IEEE Antennas
α 0 1+x −∞ Wireless Propag. Lett., vol. 12, no. 12, pp. 849–852, Jul. 2013.
T2
(b) 2π π T2 − t δ [21] G. Yang, C. K. Ho, and Y. L. Guan, “Multi-antenna wireless energy
= 2ϑ δ dt transfer for backscatter communication systems,” IEEE J. Sel. Areas
α sin(δπ ) 0 T2 Commun., vol. 33, no. 12, pp. 2974–2987, Dec. 2015.
= ϑ δ T2  (42) [22] X. Xu, L. Gu, J. Wang, G. Xing, and S.-C. Cheung, “Read more with
less: An adaptive approach to energy-efficient RFID systems,” IEEE J.
Sel. Areas Commun., vol. 29, no. 8, pp. 1684–1697, Sep. 2011.
where   [4π /(2 + α)](δ)(1 − δ) =
[23] C. Bockelmann et al., “Massive machine-type communications in 5G:
(4π 2 /(2 + α) sin(δπ )), δ  (2/α), step (a) follows from the Physical and MAC-layer solutions,” IEEE Commun. Mag., vol. 54, no. 9,
variable change x = ϑw(t)r−α , and equality (b) is obtained pp. 59–65, Sep. 2016.
by the use of [37, eq. (3.222.2)] and (18). Plunging (42) [24] H. Shariatmadari et al., “Machine-type communications: Current sta-
tus and future perspectives toward 5G systems,” IEEE Commun. Mag.,
into (40) yields the result shown in Theorem 2. The proof is vol. 53, no. 9, pp. 10–17, Sep. 2015.
completed. [25] W. Liu, K. Huang, X. Zhou, and S. Durrani. (Jan. 2017). Next
Generation Backscatter Communication: Theory and Applications.
[Online]. Available: http://arxiv.org/abs/1701.07588
R EFERENCES [26] W. Liu, K. Huang, X. Zhou, and S. Durrani, “Full-duplex backscatter
[1] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and interference networks based on time-hopping spread spectrum,” IEEE
M. Ayyash, “Internet of Things: A survey on enabling technologies, pro- Trans. Wireless Commun., vol. 16, no. 7, pp. 4361–4377, Jul. 2017.
tocols, and applications,” IEEE Commun. Surveys Tuts., vol. 17, no. 4, [27] M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse, and
pp. 2347–2376, 1st Quart., 2015. M. Franceschetti, “Stochastic geometry and random graphs for
[2] L. Xie, Y. Yin, A. V. Vasilakos, and S. Lu, “Managing RFID data: the analysis and design of wireless networks,” IEEE J. Sel. Areas
Challenges, opportunities and solutions,” IEEE Commun. Surveys Tuts., Commun., vol. 27, no. 7, pp. 1029–1046, Sep. 2009.
vol. 16, no. 3, pp. 1294–1311, 3rd Quart., 2014. [28] J. G. Andrews, F. Baccelli, and R. K. Ganti, “A tractable approach to
[3] D. M. Dobkin, The RF in RFID: Passive UHF RFID in Practice. coverage and rate in cellular networks,” IEEE Trans. Commun., vol. 59,
Burlington, MA, USA: Newnes, 2007. no. 11, pp. 3122–3134, Nov. 2011.
[4] V. Chawla and D. S. Ha, “An overview of passive RFID,” IEEE Commun. [29] H. ElSawy, A. Sultan-Salem, M. S. Alouini, and M. Z. Win, “Modeling
Mag., vol. 45, no. 9, pp. 11–17, Sep. 2007. and analysis of cellular networks using stochastic geometry: A tuto-
[5] A. P. Sample, D. J. Yeager, P. S. Powledge, and J. R. Smith, “Design of a rial,” IEEE Commun. Surveys Tuts., vol. 19, no. 1, pp. 167–203,
passively-powered, programmable sensing platform for UHF RFID sys- 1st Quart., 2017.
tems,” in Proc. IEEE Int. Conf. RFID, Grapevine, TX, USA, Mar. 2007, [30] S. Bi, C. K. Ho, and R. Zhang, “Wireless powered communication:
pp. 149–156. Opportunities and challenges,” IEEE Commun. Mag., vol. 53, no. 4,
[6] C. Boyer and S. Roy, “Backscatter communication and RFID: Coding, pp. 117–125, Apr. 2015.
energy, and MIMO analysis,” IEEE Trans. Commun., vol. 62, no. 3, [31] K. Huang and V. K. N. Lau, “Enabling wireless power transfer in cel-
pp. 770–785, Mar. 2014. lular networks: Architecture, modeling and deployment,” IEEE Trans.
[7] M. A. Ingram, M. F. Demirkol, and D. Kim, “Transmit diversity and spa- Wireless Commun., vol. 13, no. 2, pp. 902–912, Feb. 2014.
tial multiplexing for RF links using modulated backscatter,” in Proc. Int. [32] K. Huang, “Spatial throughput of mobile ad hoc networks powered
Symp. Signals Syst. Electron. (ISSSE), Tokyo, Japan, Jul. 2001, pp. 1–4. by energy harvesting,” IEEE Trans. Inf. Theory, vol. 59, no. 11,
[8] J. D. Griffin and G. D. Durgin, “Gains for RF tags using multiple pp. 7597–7612, Nov. 2013.
antennas,” IEEE Trans. Antennas Propag., vol. 56, no. 2, pp. 563–570, [33] Y. L. Che, L. Duan, and R. Zhang, “Spatial throughput maximiza-
Feb. 2008. tion of wireless powered communication networks,” IEEE J. Sel. Areas
[9] C. Boyer and S. Roy, “Space time coding for backscatter RFID,” IEEE Commun., vol. 33, no. 8, pp. 1534–1548, Aug. 2015.
Trans. Wireless Commun., vol. 12, no. 5, pp. 2272–2280, May 2013. [34] Y. Liu, L. Wang, S. A. R. Zaidi, M. Elkashlan, and T. Q. Duong,
[10] C. He and Z. J. Wang, “SER of orthogonal space-time block codes over “Secure D2D communication in large-scale cognitive cellular networks:
Rician and Nakagami-m RF backscattering channels,” IEEE Trans. Veh. A wireless power transfer model,” IEEE Trans. Commun., vol. 64, no. 1,
Technol., vol. 63, no. 2, pp. 654–663, Feb. 2014. pp. 329–342, Jan. 2016.
[11] C. He, Z. J. Wang, and V. C. M. Leung, “Unitary query for the M × L × [35] K. Han and K. Huang, “Wirelessly powered backscatter communica-
N MIMO backscatter RFID channel,” IEEE Trans. Wireless Commun., tion networks: Modeling, coverage, and capacity,” IEEE Trans. Wireless
vol. 14, no. 5, pp. 2613–2625, May 2015. Commun., vol. 16, no. 4, pp. 2548–2561, Apr. 2017.
[12] C. He, Z. J. Wang, C. Miao, and V. C. M. Leung, “Block-level unitary
[36] M. Bacha, B. Clerckx, and K. Huang. (Nov. 2017). Backscatter
query: Enabling orthogonal-like space-time code with query diversity
Communications for the Internet of Things: A Stochastic Geometry
for MIMO backscatter RFID,” IEEE Trans. Wireless Commun., vol. 15,
Approach. [Online]. Available: http://arxiv.org/abs/1711.07277
no. 3, pp. 1937–1949, Mar. 2016.
[13] F. Zheng and T. Kaiser, “On the transmit signal design at the reader [37] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and
for RFID MIMO systems,” in Proc. 4th Int. EURASIP Workshop RFID Products, 7th ed. New York, NY, USA: Academic Press, 2007.
Technol. (EURASIP RFID), Torino, Italy, Sep. 2012, pp. 59–64. [38] M. Haenggi, Stochastic Geometry for Wireless Networks. Cambridge,
[14] W. Saad, X. Zhou, Z. Han, and H. V. Poor, “On the physical layer secu- U.K.: Cambridge Univ. Press, 2012.
rity of backscatter wireless systems,” IEEE Trans. Wireless Commun., [39] B. Błaszczyszyn and P. Mühlethaler, “Stochastic analysis of non-
vol. 13, no. 6, pp. 3442–3451, Jun. 2014. slotted Aloha in wireless ad-hoc networks,” in Proc. IEEE INFOCOM,
[15] Q. Yang, Y. Zhang, H.-M. Wang, and Z. Han, “Transmit optimization San Diego, CA, USA, Mar. 2010, pp. 1–9.
for secure MIMO RFID wireless communication,” in Proc. IEEE Int. [40] A. Munari, P. Mähönen, and M. Petrova. (Dec. 2015). A Stochastic
Conf. Commun. (ICC), Kuala Lumpur, Malaysia, May 2016, pp. 1–6. Geometry Framework for Asynchronous Full-Duplex Networks.
[16] Q. Yang, H.-M. Wang, Y. Zhang, and Z. Han, “Physical layer security in [Online]. Available: http://arxiv.org/abs/1512.01478
MIMO backscatter wireless systems,” IEEE Trans. Wireless Commun., [41] K. Huang and X. Zhou, “Cutting the last wires for mobile communi-
vol. 15, no. 11, pp. 7547–7560, Nov. 2016. cations by microwave power transfer,” IEEE Commun. Mag., vol. 53,
[17] B. Kellogg, A. Parks, S. Gollakota, J. R. Smith, and D. Wetherall, no. 6, pp. 86–93, Jun. 2015.
“Wi-Fi backscatter: Internet connectivity for RF-powered devices,” in [42] S. N. Chiu, D. Stoyan, W. S. Kendall, and J. Mecke, Stochastic Geometry
Proc. SIGCOMM, Chicago, IL, USA, Aug. 2014, pp. 607–618. and Its Applications, 3rd ed. Chichester, U.K.: Wiley, 2013.
YANG et al.: WIRELESS POWERED ASYNCHRONOUS BACKSCATTER NETWORKS WITH SPORADIC SHORT PACKETS 997

[43] X. Lu, P. Wang, D. Niyato, D. I. Kim, and Z. Han, “Wireless networks Tong-Xing Zheng (S’14–M’16) received the B.S.
with RF energy harvesting: A contemporary survey,” IEEE Commun. and Ph.D. degrees from the School of Electronic and
Surveys Tuts., vol. 17, no. 2, pp. 757–789, May 2015. Information Engineering, Xi’an Jiaotong University,
[44] R. W. Heath, M. Kountouris, and T. Bai, “Modeling heterogeneous net- Xi’an, China, in 2010 and 2016, respectively.
work interference using poisson point processes,” IEEE Trans. Signal He is currently a Lecturer with the Department
Process., vol. 61, no. 16, pp. 4114–4126, Aug. 2013. of Information and Communications Engineering,
[45] A. W. Marshall and I. Olkin, “A one-sided inequality of the Chebyshev and the Ministry of Education Key Laboratory
type,” Ann. Math. Stat., vol. 31, no. 2, pp. 488–491, Jun. 1960. for Intelligent Networks and Network Security,
[46] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge, U.K.: Xi’an Jiaotong University. He is also a Visiting
Cambridge Univ. Press, 2004. Scholar with the School of Electrical Engineering
[47] O. B. S. Ali, C. Cardinal, and F. Gagnon, “Performance of optimum and Telecommunications, University of New South
combining in a Poisson field of interferers and Rayleigh fading chan- Wales, Sydney, NSW, Australia. He has co-authored the book entitled
nels,” IEEE Trans. Wireless Commun., vol. 9, no. 8, pp. 2461–2467, Physical Layer Security in Random Cellular Networks (Springer, 2016). His
Aug. 2010. current research interests include physical-layer security of wireless com-
[48] H. Gao, P. J. Smith, and M. V. Clark, “Theoretical reliability of munications, wireless caching, heterogeneous cellular networks, full-duplex
MMSE linear diversity combining in Rayleigh-fading additive interfer- communications, and stochastic geometry theory and its applications.
ence channels,” IEEE Trans. Commun., vol. 46, no. 5, pp. 666–672,
May 1998.

Zhu Han (S’01–M’04–SM’09–F’14) received the


B.S. degree in electronic engineering from Tsinghua
University, Beijing, China, in 1997, and the M.S. and
Ph.D. degrees in electrical and computer engineer-
ing from the University of Maryland at College Park,
Qian Yang (S’16) received the B.S. degree in infor- College Park, MD, USA, in 1999 and 2003, respec-
mation engineering from Xi’an Jiaotong University, tively.
Xi’an, China, in 2014, where he is currently pursuing From 2000 to 2002, he was an Research and
the Ph.D. degree in information and communication Development Engineer of JDSU, Germantown, MD,
engineering. USA. From 2003 to 2006, he was a Research
His current research interests include 5G net- Associate with the University of Maryland at
works, MIMO systems, convex optimization, and College Park. From 2006 to 2008, he was an Assistant Professor with Boise
statistical signal processing. State University, Boise, ID, USA. He is currently a Professor with the
Electrical and Computer Engineering Department as well as the Computer
Science Department, University of Houston, Houston, TX, USA. His current
research interests include wireless resource allocation and management, wire-
less communications and networking, game theory, big data analysis, security,
and smart grid.
Dr. Han was a recipient of the NSF Career Award in 2010, the Fred W.
Ellersick Prize of the IEEE Communication Society in 2011, the EURASIP
Best Paper Award for the Journal on Advances in Signal Processing in 2015,
the IEEE Leonard G. Abraham Prize in the field of communications sys-
tems (Best Paper Award in the IEEE J OURNAL ON S ELECTED A REAS IN
C OMMUNICATIONS) in 2016, and several Best Paper Awards of IEEE con-
ferences. He is currently an IEEE Communications Society Distinguished
Hui-Ming Wang (S’07–M’10–SM’16) received the
Lecturer.
B.S. and Ph.D. degrees (Hons.) in electrical engi-
neering from Xi’an Jiaotong University, Xi’an,
China, in 2004 and 2010, respectively.
From 2007 to 2010, he was a Visiting Scholar
with the Department of Electrical and Computer
Engineering, University of Delaware, Newark, DE,
USA. He is currently a Full Professor with the
Department of Information and Communications
Engineering and the Ministry of Education Key
Laboratory for Intelligent Networks and Network Moon Ho Lee (S’81–M’85–SM’86–LSM’15)
Security, Xi’an Jiaotong University. His current research interests include received the Ph.D. degree in electrical engineering
cooperative communication systems, physical-layer security of wireless com- from Chonnam National University, Gwangju,
munications, MIMO, and space-timing coding. He co-authored Physical Layer South Korea, in 1984, and the University of Tokyo,
Security in Random Cellular Networks (Springer, 2016) and authored or co- Tokyo, Japan, in 1990.
authored over 100 IEEE journal and conference papers. He held a post-doctoral position with the
Dr. Wang was a recipient of the ESI Highly Cited Papers, the National University of Minnesota, Minneapolis, MN, USA,
Excellent Doctoral Dissertation Award in China in 2012, the Best Paper from 1985 to 1986. He was a Chief Engineer
Award from the International Conference on Wireless Communications and with Namyang MBC Broadcasting, from 1970 to
Signal Processing in 2011, and the Best Paper Award from the IEEE/CIC 1980. He joined Chonbuk National University, as a
International Conference on Communications in China in 2014. He has Professor, where he is currently a Professor and the
served as a TPC member of various IEEE sponsored conferences, includ- former Chair of the Department of Electronics Engineering. He has made
ing IEEE Globecom, ICC, WCNC, VTC, and PIMRC. He also served as significant original contributions in the areas of mobile communication code
the Symposium Chair of the Wireless Communications and Networking in design, channel coding, and multidimensional source and channel coding.
ChinaCom 2015 and the Technical Program Committee Chair of the Workshop He holds 116 patents. He was the inventor of the jacket matrix and had over
on Physical Layer Security in the IEEE Globecom 2016. He is currently an 95 559 citations in Wikipedia in 2014.
Associate Editor of the IEEE T RANSACTIONS ON C OMMUNICATIONS and Dr. Lee is a member of the National Academy of Engineering, Seoul,
IEEE ACCESS. South Korea, and a Foreign Fellow of the Bulgaria Academy of Sciences.

Вам также может понравиться