Академический Документы
Профессиональный Документы
Культура Документы
2, APRIL 2018
Abstract—In the fifth generation era, the pervasive applications Index Terms—Backscatter wireless powered communications
of Internet of Things and massive machine-type communications (B-WPCs), energy harvest, Internet of Things (IoT), radio
have initiated increasing research interests on the backscatter frequency identification (RFID), stochastic geometry.
wireless powered communication (B-WPC) technique due to its
ultrahigh energy efficiency and low cost. The ubiquitous B-WPC
network is characterized by nodes with dynamic spatial positions
and sporadic short packets, of which the performance has not
been fully investigated. In this paper, we give a comprehensive I. I NTRODUCTION
analysis of a multiantenna B-WPC network with sporadic short HE PROMISING Internet of Things (IoT) paradigm
packets under a stochastic geometry framework. By exploiting
a time-space Poisson point process model, the behavior of the
network is well captured in a decentralized and asynchronous
T aims to bridge diverse technologies to support intelli-
gent decision making by connecting pervasive physical objects
transmission way. We then analyze the energy and informa- together [1]. One of the most important technologies for
tion outage performance in the energy harvest and backscatter enabling IoT is backscatter radio, which has received increas-
modulation phases of the backscatter network, respectively. The ing attention from both academic and industrial communities
optimal transmission slot length and division are obtained by
maximizing the network-wide spatial throughput. Moreover, we nowadays due to its distinguished low-energy requirement and
find an interesting result that there exists the optimal tradeoff rapid cut down of manufacture cost [2]. The most promi-
between the durations of the energy harvest and backscatter mod- nent commercial application of backscatter radio lies in radio
ulation phases for spatial throughput maximization. Numerical frequency identification (RFID), which is the first technol-
results are demonstrated to verify our analytical findings and ogy realizing the machine-to-machine concept (RFID tag and
show that this tradeoff region gets shrunk when the outage
constraints become more stringent. reader) and plays an indispensable role in the evolution of the
IoT [1]. A typical RFID system consists of an RFID reader
(interrogator) and an RFID tag (transponder) where the RFID
reader interrogates the RFID tag for the desired information
like an identification number [3]. Among all kinds of RFID
Manuscript received July 25, 2017; revised December 25, 2017; accepted tags, the passive tag receives more emphasis compared with
January 22, 2018. Date of publication January 31, 2018; date of current ver-
sion April 10, 2018. The work of Q. Yang, H.-M. Wang, and T.-X. Zheng the active and semipassive tags, since it has no on-tag power
was supported in part by the National Natural Science Foundation of China source but relies on the electromagnetic field transmitted by an
under Grant 61671364 and Grant 61701390, in part by the Outstanding Young RFID reader and “backscattering” for energy harvesting and
Research Fund of Shaanxi Province, in part by the Young Talent Support Fund
of Science and Technology of Shaanxi Province under Grant 2015KJXX- information transmission, respectively [4]. An illustration of
01, and in part by the China Post-Doctoral Science Foundation under Grant passive tag applications is the wireless integrated sensing plat-
2017M613140. The work of Z. Han was supported by the U.S. NSF under form [5], which is a programmable sensor platform based on
Grant CNS-1717454, Grant CNS-1731424, Grant CNS-1702850, Grant CNS-
1646607, Grant ECCS-1547201, Grant CMMI-1434789, Grant CNS-1443917, RFID and aims to create a wirelessly networked, battery-less
and Grant ECCS-1405121. The work of M. H. Lee was supported by the NRF, sensor device. In the revolution of replacing the conventional
South Korea, under Grant MEST 2015R1A2A1A05000977. (Corresponding barcode system, the commercial adoption of RFID is largely
author: Hui-Ming Wang.)
Q. Yang, H.-M. Wang, and T.-X. Zheng are with the School of predicated on the passive tag due to its high energy efficiency,
Electronic and Information Engineering, Xi’an Jiaotong University, Xi’an tiny size, and ultralow cost [6].
710049, China, and also with the Ministry of Education Key Laboratory In a passive RFID system, to initiate a querying procedure
for Intelligent Networks and Network Security, Xi’an Jiaotong University,
Xi’an 710049, China (e-mail: yangq36@gmail.com; xjbswhm@gmail.com; the RFID reader first transmits a continuous standardized sig-
zhengtx@mail.xjtu.edu.cn). nal to power up the passive RFID tag. Then the RFID tag
Z. Han is with the Department of Electrical and Computer Engineering, wakes up after harvesting sufficient energy from the RFID
University of Houston, Houston, TX 77004 USA, and also with the
Department of Computer Science and Engineering, Kyung Hee University, reader’s radio frequency (RF) signal and responds to the
Seoul, South Korea (e-mail: zhan2@uh.edu). RFID reader via backscatter modulation. Finally, the RFID
M. H. Lee is with the Division of Electronics Engineering, reader extracts the tag information from the signal backscat-
Chonbuk National University, Jeonju 561-756, South Korea (e-mail:
moonho@jbnu.ac.kr). tered by the passive RFID tag [3]. With the prevalence of
Digital Object Identifier 10.1109/JIOT.2018.2800096 the above described RFID backscatter system, there emerge
2327-4662 c 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
YANG et al.: WIRELESS POWERED ASYNCHRONOUS BACKSCATTER NETWORKS WITH SPORADIC SHORT PACKETS 985
the following three main research branches in the backscatter overhead for slot synchronization. Therefore, the grant-free
communication system. access control is favorable for these networks and the packet
The first and most important research branch is the transmit transmission of the nodes in the whole network is usually
signal design and performance analysis in the point-to-point asynchronous, which further incurs time-varying interference
backscatter system. To meet the increasing expectation of the in the network. The study on how this time-varying inter-
data rate and data reliability for prominent RFID applica- ference affects the performance of the network-wide spatial
tions, many efforts have been devoted to investigating and throughput is challenging but interesting, since the interference
improving the performance of the backscatter RFID system is a contributing factor for WET while it hinders information
under multiantenna frameworks [6]–[12]. Ingram et al. [7] reception.
showed that equipping with multiple antennas at both RFID
reader and tag can improve the coverage and capacity of the
backscatter system. The fading characteristics of the multiple- A. Related Work and Motivation
input multiple-output (MIMO) backscatter system is studied As reviewed in [25], there exist lots of IoT applications for
in [8] where the dyadic backscatter channel is first introduced. backscatter communications. For example, backscatter com-
From then, the space-time coding scheme is widely explored bined with WET provides a ultralow-cost and battery-free
in [6] and [9]–[12] for MIMO RFID backscatter systems. In platform for the applications of smart homes or cities such
addition, the transmit signal design of the RFID reader is as people or car navigation, weather monitoring, and secu-
investigated in [13]. With security issues further taken into rity surveillance. Other application scenarios in IoT can be
account, the artificial-noise-aided transmit design is studied found in logistic tracking and biomedical applications [25].
in [14]–[16] under the framework of physical layer security. In [26], a multiple-access scheme based on time-hopping
Recently, the ambient backscatter technology, which utilizes spread-spectrum is proposed to enable both one-way WET
RF signals from the environment rather than the RF signals and two-way wireless information transfer under a system with
transmitted by the RFID reader, is studied in [17] and [18]. coexisting backscatter reader-tag links. However, the consid-
Since the passive tag has no on-tag power source but relies ered system model in [26] is not general with only a limited
on energy harvesting, the second research direction lies in number of predetermined backscatter reader-tag links, while
considering energy transfer in the point-to-point backscat- the model with coexisting reader-tag pairs is quite common in
ter system, which is also called the backscatter wireless practical IoT applications. For instance, multiple customers in
powered communication (B-WPC) system [19]. In [20], a a shopping mall or supermarket may use their smart devices
measurement-based proof of the B-WPC concept is presented, (i.e., RFID readers) to query prices or track producing infor-
and it is shown that the wireless energy transfer (WET) can mation (contained in RFID tags) from various goods on the
be optimized by relying on only the power levels received by shelf at the same time, which actually constitutes a B-WPC
the base station. The authors in [21] study RF-enabled WET interference network.
via energy beamforming in a backscatter system with multiple To cope with the feature of dynamic spatial positions of
RFID tags, and a customized method is proposed to resolve the nodes in the random and large-scale network, the recently
associated channel estimation problem. However, the research developed stochastic geometry theory has provided a power-
on B-WPC is still sparse. ful framework for evaluating the average performance of a
Different from the above research on point-to-point dynamic network. Under the stochastic geometry framework,
backscatter communication systems, the third research trend the locations of the network nodes are modeled according to
arises from the increasing deployments of B-WPC networks. a certain spatial distribution such as the Poisson point process
As it is pointed out in [22], handheld and mobile RFID read- (PPP) and then the analytical analysis can be carried out eas-
ers become more and more prevailing due to their portability ily [27]. Moreover, once the model parameters like network
and flexibility in the evolution of the IoT in the fifth genera- density are carefully chosen, these theoretical models can pro-
tion (5G) era. Therefore, it is of great importance to further vide an accurate approximation for the network performance in
study the backscatter system design and B-WPC from the real-world applications [28], [29]. We notice that the stochastic
perspective of large-scale random networks. However, under geometry model has been widely exploited to study the per-
pervasive and dense B-WPC networks in IoT and massive formance of WPC networks [30]–[34] but not the backscatter
machine-type communications (mMTCs) [23], [24] applica- applications. In [31], the performance of microwave power
tions such as in retail business, smart senors, and transportation transfer is investigated in an uplink cellular network pow-
checkpoints, how to formulate and resolve scalable and effi- ered by randomly deployed power beacons (PBs). The network
cient WET and communication connectivity issues remains throughput maximization problem is studied under an energy
nearly untouched by the existing work. Apart from the com- harvesting mobile ad hoc network (MANET) and under a
mon features like the nodes with random spatial positions in WPC network in [32] and [33], respectively. The impact of
conventional large-scale networks, one of the most challeng- physical layer security is further studied in [34]. However,
ing characteristics brought by B-WPC networks in mMTC these work cannot be directly exploited in B-WPC applica-
scenarios is that the transmissions are with sporadic short tions with low-complexity passive devices due to the special
packets [23]. The traffic of the nodes in these B-WPC net- mechanism of backscatter communications.
works is usually event-driven and uncoordinated, which makes Despite the above-mentioned prominent applications in IoT,
slot-aligned transmissions prohibitive due to the overwhelming the area of the large-scale B-WPC network with multiple
986 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 2, APRIL 2018
Therefore, each transmission slot for each RFID tag is com- with parameter λAT0 [38, Sec. 2.4.3], namely,
prised of the successive two phases, i.e., the energy harvest
(λAT0 )n e−λAT0
phase and the backscatter modulation phase. For notational Pr{N = n} = . (1)
simplicity, we use the terms “reader” and “tag” as commonly n!
used in RFID systems hereinafter.
B. Channel Model
Based on the fact that the reader is usually close to its tag
A. Asynchronous Network Model (small d0 ) and beamforming is employed for efficient WPT,
In most of conventional network settings, it is assumed the forward channel from each reader to its corresponding tag
that the beginning time of each transmission slot for mul- is characterized by a path loss combined with a multiantenna
tiple transmitter–receiver pairs should be perfectly aligned. gain G but no √ small-scale fading [31], [35], [41], which is
However, this assumption may be impractical especially for −α/2
represented as Gd0 . All the other channels, including
some decentralized networks like the ad hoc network where interference channels from the concurrent transmission of the
the overhead for the time slot synchronization is overwhelm- other reader-tag pairs and the reverse tag-reader channels of all
ing and unaffordable. Most importantly, with the coming of the the pairs, are assumed to undergo flat Rayleigh fading with a
5G era pervasive IoT and mMTC applications in large-scale large-scale path loss governed by the exponent α > 2.3 To be
networks are featured with uncoordinated and sporadic short specific, the forward channel from the reader located at z to the
−α/2
packets [23], which makes the fulfillment of slot synchroniza- tag located at x̂ is represented as hzx̂ dzx̂ , where hzx̂ ∈ CM×1
tion in these B-WPC networks even harder. In this paper, we accounts for the small-scale fading with hzx̂ ∼ CN (0, I) and
consider a more practical scenario where each reader-tag pair dzx̂ denotes the path distance. Similarly, the reverse chan-
in the network randomly accesses the same frequency for ad nel from the tag located at x̂ to the reader located at w is
hoc transmission in an asynchronous transmission way. −α/2
characterized by gx̂w rx̂w with gx̂w ∼ CN (0, I).
Different from the conventional stochastic geometry frame-
work, the time randomness has to be further taken into
III. I NFORMATION T RANSMISSION M ODEL
consideration such that the asynchronous behavior of spo-
radic short packets in B-WPC networks can be better captured. As a passive tag, the fulfillment of passing the informa-
In this paper, we consider a homogeneous time-space PPP tion such as identification data to its corresponding reader
= {(x, tx )} of intensity λ accounting for all the readers in the mainly relies on the procedure of backscatter modulation
network, where x ∈ R2 denotes the location of a reader whose which requires the passive tag to harvest sufficient energy first
transmission starts from time tx and lasts for a predefined com- as illustrated in Fig. 1.
mon time T. In the considered network, it is assumed that there For the tractability of analysis, we consider a scenario where
exists one tag paired with each reader according to some pre- each tag in the network has a sporadic short packet with the
determined pairing rule,2 and each tag is located at a distance same duration T2 to transmit according to some unified pro-
d0 from its paired reader in a random direction. According tocol. By splitting the duration of each transmission slot as
to the displacement theorem [38], the collection of the cor- T = T1 + T2 , each slot can be further divided into two phases,
responding tags is denoted by another TS-PPP ˆ = {(x̂, tx )} i.e., an energy harvest phase of duration T1 for energy har-
with intensity λ where x̂ ∈ R2 is the location of the corre- vesting and a backscatter modulation phase of duration T2 for
sponding tag paired with the reader located at x. This TS-PPP packet transmission, respectively. Note that different from con-
model seizes the essential time-space features of the network ventional WET networks, in the considered B-WPC network
by leveraging only a single parameter λ, which captures the the reader continuously transmits a standardized carrier-wave
space-time frequency of the channel access, i.e., the number signal over the both phases in its slot. However, the signal
of transmission initiations per unit of space and time. Each acts as different roles during the two phases: an energy signal
reader-tag pair is born at a random time tx and random loca- to power up the tag in the first phase and a query signal to
tions x, x̂, accesses the channel during a time slot of duration T, enable the backscatter modulation in the second phase. In the
and disappears immediately later. This model is also named as both phases, we assume that maximal-ratio transmit (MRT)
the Poisson rain model in [39] and [40]. Note that this model is employed at each reader to improve the transmitting effi-
is naturally motivated by the two main characteristics of B- ciency. An illustration of the time slot model in the network
WPC networks in pervasive IoT and mMTC applications in is shown in Fig. 2.
the 5G era, i.e., dynamic spatial positions captured by {x, x̂}
and sporadic short packets captured by {tx }. Therefore, the A. Energy Harvest Phase
model actually describes the behavior of the whole B-WPC By leveraging the homogeneity of the PPP [42], we focus
network in a precise manner. on a typical tag (ô, 0) which locates at the origin and its
Under this stochastic geometry framework, the number of reader begins the transmission at the time zero. During the
reader-tag pairs N established communication in a region of energy harvest phase in time interval [0, T1 ], the tag harvests
area A over time duration T0 follows a Poisson distribution energy not only from its own dedicated reader (o, 0) but also
2 To preserve the tractability of the main performance and tradeoff analysis 3 The analysis for different path-loss exponents accounting for WPT and
in the considered network, as in [26], [35], and [36] the study of the specific backscatter information transmission can be performed in the similar way,
association rule between readers and tags is out of the scope of this paper. which is omitted in this paper for the ease of presentation.
988 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 2, APRIL 2018
noise (AWGN) at the receiver of each reader. It should be A. Energy Outage Probability
noted that the query signal terms transmitted from other read- Different from the scenario in the conventional WET net-
ers do not appear in (5), since the standardized unmodulated work, calculating the energy outage probability given in (4) is
carrier wave appears as a direct current level after down very challenging in the considered B-WPC network. The main
conversion and thereby can be easily removed [35]. By denot- reasons are summarized as follows.
ing the signal-to-interference-plus-noise ratio (SINR) of the 1) According to the transmission model given in (2), the
received signal in (5) as SINRR , the information outage prob- tags harvest energy from the carrier-wave signals with
ability for a reader in the backscatter modulation phase is different phases transmitted by different readers in the
thereby given by network, which are actually highly correlated. Therefore,
Pio = Pr{SINRR < γR } (6) compared to the scenario in the conventional WET net-
work, the total harvest power here is no longer simply
where γR is the targeted SINR level. the sum of different received signal power but the power
of the received signal sum given by |yT (t)|2 as in (3).
C. Spatial Throughput Metric 2) Since the received power |yT (t)|2 is time-varying, the
Similar to [32], [33], and [35], we define the spatial total harvested energy takes the integral form in (3),
throughput of the backscatter network as the total bits success- which is hard to tackle.
fully transmitted by the reader-tag pairs emerged at the unit The above two factors render finding the exact expression of
time and network area. Accordingly, the spatial throughput is the energy outage probability prohibitive.
characterized by To circumvent this issue, we propose to exploit the second-
order moment matching technique to obtain an approximation
R(T1 , T2 , β) = λt T2 (1 − Pio )B (7)
of the probability. To be specific, the total harvested energy
where factor B represents the data rate per tag-reader link EH will be approximated as a gamma random variable by
during the backscatter modulation phase, and factor λt (1 − matching the first and second order moments of EH [44].
Pio ) accounts for the time-space density of active links with Accordingly, the two parameters of the gamma distribution
successful transmission. Note that the data rate B is a function is given in the following lemma.
of the targeted SINR level γR , whose form is determined by Lemma 1: After using second-order moment matching, the
the specific realization of modulation in practice. distribution Gamma(k, θ ) with the same first and second order
Remark 2: It is worth noting that to obtain the exact spa- moments of EH has parameters
tial throughput, the information outage probability Pio used
in (7) should be the probability conditioned on the reader-tag (E{EH })2 D{EH }
k= θ= . (9)
pairs which have harvested sufficient energy in the first phase. D{EH } E{EH }
However, for analytical tractability we remark that imposing
the independence on the two phases and simply substitut- Proof: The lemma follows from [44, Lemma 3].
ing (6) into (7) actually incur little accuracy loss, which will According to Lemma 1, the mean and variance of EH have
be validated by the simulations in Section IV-B. to be calculated in order to obtain an approximation of the
From (7), we observe that the choices of T1 and T2 are crit- energy outage probability. The results are provided in the
ical for improving the spatial throughput. Intuitively, larger T1 following lemma.
or T2 enables the tags to harvest more energy in the energy Lemma 2: The mean and variance of EH are given by
harvest phase, which improves the spatial throughput perfor-
α 2−α
mance. However, larger T1 or T2 also incurs more interference E{EH } = ηPT T1 Gd0−α + π λT ro (10)
to the readers in the backscatter modulation phase, which α−2
deteriorates the spatial throughput performance. Therefore, it and
is of much interest to study how to design the transmission
−α
slot length and slot division to maximize the network-wide 2 2−α Gd0 ro−α
D{EH } = (ηPT T1 )2
(2T1 + 3T2 )π λαro +
spatial throughput. Under energy and information outage con- 3 α−2 α−1
straints, the spatial throughput maximization problem can be
α 2−α 2 1
2
formulated as + πλ r 3T1 + 8T1 T2 + 6T22
α−2 o 6
maximize R(T1 , T2 , β)
T1 ,T2 (11)
s.t. Peo ≤ e , Pio ≤ i . (8)
respectively.
The above problem will be investigated in Section V. Proof: The proof is given in Appendix A.
It is worth noting that the first term in (10) is actually the
IV. E NERGY AND I NFORMATION O UTAGE P ERFORMANCE energy harvested directly from each tag’s dedicated reader,
In this section, we derive the analytical expressions for the while the second term in (10) accounts for the average energy
energy and information outage probabilities during the energy harvested from the B-WPC network. By leveraging Lemmas 1
harvest and backscatter modulation phases in Sections IV-A and 2, an approximation of the energy outage probability
and IV-B, respectively. defined in (4) is provided in the following theorem.
990 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 2, APRIL 2018
It is worth noting that based on the quasi-concavity of to achieve the same optimal spatial throughput, T1 and T2
function f (x) in Proposition 1, the maximizer xM of f can can complement for each other. For example, on the line con-
be efficiently calculated via a bisection search in the interval strained by p(T1 , T2 ) = (χ /τ λ), we can find a smaller T2
((M/2), M). Additionally, when the outage constraints in (23c) by enlarging T1 to achieve a tighter constraint for energy out-
are absent, the optimal spatial density λt T2 linearly scales with age. In addition, we remark that the obtained solution given
the antenna number at each reader M due to xM ∈ ((M/2), M). in (27) can further easily incorporate individual constraints on
By leveraging the monotonic property of the informa- the time lengths of T1 and T2 .
tion outage probability based on (20), problem (23) is 3) Optimal Network Density for Spatial Throughput
equivalent to Maximization: By far, we have found the optimal slot design
(T1 , T2 ) which maximizes the spatial throughput. We remark
maximize f (χ ) (25a)
T1 ,T2 ,χ that when the time durations of the two transmission phases are
s.t. χ = τ λT2 (1 − Peo ) (25b) predetermined according to some given protocol, the similar
χ ≤ χup (25c) tradeoff also exists in network density optimization for spa-
tial throughput maximization. However, as will be observed
Peo ≤ e (25d) by the simulations in Section VI, the energy outage prob-
where χup H −1 (1 − i ) withH −1 (x)
being the inverse func- ability Peo (λ) is not necessarily an decreasing function of
tion of H(x). By considering the constraint on χ in (25c) and λ in the considered B-WPC network. Therefore, the similar
leveraging the quasi-concave property of f (χ ) in Proposition 1, method developed in this section cannot be used, and we will
we obtain the optimal numerically check the impact of network density on the spatial
throughput performance in Section VI.
χ = min xM , χup (26)
for problem (25). By further jointly taking account of the
VI. N UMERICAL R ESULTS
remaining constraints in (25b) and (25d), the constraint on Peo
in (25d) can be recast as T2 ≤ (χ /τ λ(1 − e )). Therefore, the In this section, more representative results are provided to
optimal solution (T1 , T2 ) to the spatial throughput maximiza- unveil the network performance and optimal parameter design
tion problem is given by the collection in terms of spatial throughput maximization.
As in [35] and [36], the Monte Carlo simulations are
χ χ
T1 , T2 ∈ (T1 , T2 ) T2 (1 − Peo ) = , T2 ≤ conducted with the aid of the MATLAB software on a
τλ τ λ(1 − )
e desktop computer. The parameter settings are as follows,
(27) unless otherwise specified. The density of the network is
and the optimal spatial throughput is thereby given by λ = 0.03 /(m2 · ms). The time durations allocated for the
energy harvest and backscatter modulation phases in each slot
χ are T1 = T2 = 0.5 ms. The antenna number at each reader in
Ropt = · H χ · B. (28)
τ the network is M = 3, and the multiantenna gain for direct
Concerning the optimal solution (T1 , T2 ) given in (27), we energy transfer is set as G = M with = 2/3. The transmit
have the following observations. power for each reader is PT = 20 dBm (100 mW), and the
1) Existence of the Optimal Solution: The optimal solution energy-harvest efficiency at each tag is η = 0.8. The distance
collection in (27) always exists. This observation can be easily between the reader and the tag in each pair is d0 = 2 m and
verified as follows. From the equality constraint in (27), we ro = 2 m, and the path-loss exponent is α = 3. The relation
obtain the lower bound of T2 given by T2LB = (χ /τ λ) due to between the data rate B and the targeted SINR level γR is
Peo ≥ 0. By noting that this lower bound of T2 is always captured by B = log(1 + γR ).
smaller than its upper bound T2UB = (χ /τ λ(1 − e )), the We first check the impact of the network density λ on the
optimal T2 can be arbitrarily chosen from (T2LB , T2UB ]. Once energy outage performance. As shown in Fig. 5, the energy
T2 is determined, the optimal T1 can be obtained according outage probability is not always a decreasing function of λ,
to the equality constraint in (27). e.g., the case of M = 4. Note that this result is different from
2) Tradeoff of the Optimal Solution: From (27), we know the one in the conventional WPC network where the WPC
that there exists a tradeoff between T1 and T2 , while different nodes always benefit more from denser network deployments.
choices of T1 and T2 restrained by (27) yield the same optimal The reason behind is that the transmitted carrier-wave sig-
objective value. To see more clearly, we rewrite (27) as nal by different readers is actually highly correlated due to
the same working frequency. Therefore, the harvested total
χ
(T1 , T2 ) p(T1 , T2 ) = , T2LB < T2 ≤ T2UB (29) energy is no longer simply the summation of the energy inde-
τλ
pendently harvested from each network node. As observed
where from Fig. 5, the energy outage probability first increases as λ
increases from 0.01 to 0.03 /(m2 · ms) under a large antenna
p(T1 , T2 ) T2 (1 − Peo (T1 , T2 )). (30)
number M = 4. This is because the outage probability is small
In light of the numerical results shown in Section IV-A, it due to the large multiantenna gain provided by the dedicated
is not hard to see that the function p(T1 , T2 ) is an increas- reader, when λ is extremely small and the energy harvested
ing function of both T1 and T2 . This observation means that from ambient readers in the network can be neglected. When
YANG et al.: WIRELESS POWERED ASYNCHRONOUS BACKSCATTER NETWORKS WITH SPORADIC SHORT PACKETS 993
(a)
Fig. 5. Energy outage probability versus the network density λ in the energy
harvest phase under different antenna numbers at the readers. The energy
threshold is EC = 8 μJ.
(a) Fig. 8. Spatial throughput versus the time-space density of the network
λ under different numbers of antennas equipped at the readers. The solid
lines stand for the situation where the constraints of energy and information
outage probabilities are further taken into account over dashed lines, and the
star markers indicate the optimal λ for spatial throughput maximization. The
energy and information outage constraints are e = i = 0.35. The energy
threshold is EC = 6 μJ, and the targeted SINR level is γR = 5 dB.
where step (a) is obtained by noting that {ξx } are i.i.d. connection probability) can be represented as [47]
CN (0, 1) random variables, and step (b) is an application of
the Campbell theorem [42]. P̄ic (λt , γR )
Similarly, the second order moment of EH is given by Pr{SINRR > γR }
⎡
! T1 T1
N
σ 2 ϑ i−k
min(i,N)
M−1
E EH 2
= (ηPT )2 E{q(t1 )q(t2 )}dt1 dt2 (32) = exp −σ ϑ EN ⎣
2
0 0 k (i − k)!
i=0 k=0
⎤
where + , + ,
⎧ ⎫ ϑX 1 ⎦ (36)
⎪ ⎪ × EkX EN−k
⎪
⎨ ⎪
⎬ 1 + ϑX X 1 + ϑX
q(t) Gd0−α + 2Re −α
Gd0 e(t, tx )ξ̄x L(dxô ) −α/2
⎪
⎪ ⎪
⎪ −α
⎩ (x,tx )∈ ⎭ where σ 2 (N0 /β ȳ2T ), ϑ γR d0α , and X w(tx )rx̂o is a
\(o,0)
2 random variable determined by (x̂, tx ) ∈ (A, T0 ). Recall from
the property of PPP that once conditioned on N, (x̂, tx ) is
uniformly distributed in the domain (A, T0 ) [38]. Therefore,
+ e(t, tx )ξ̄x L(dxô )−α/2 (33)
(x,tx )∈ we further have
\(o,0) + ,
ϑX 1 ϑX
EX = d x̂, tx (37)
with ξ̄x = ξx ej(ϕx −ϕô ) following the CN (0, 1) distribution. 1 + ϑX AT0 (A,T0 ) 1 + ϑX
By plunging (33) into (32) and leveraging the Campbell the- and
orem [42], we finally obtain E{EH 2 } after several algebraic
+ ,
manipulations as 1 1 1
EX = d x̂, tx . (38)
! 1 + ϑX AT0 (A,T0 ) 1 + ϑX
E EH
2
Substituting (37), (38), and the distribution of N given in (1)
2 2 Gd−α α into (36) yields
= (ηPT T1 ) 2
Gd0−α + (5T1 + 6T2 )π λ 0 ro2−α
3 α−2
2 α 2(1−α) P̄ic (λt , γR )
+ (2T1 + 3T2 )π λ
N
σ 2 ϑ i−k
r
∞ M−1
3 α−1 o min(i,N)
2
= exp −σ ϑ 2
α 2−α 1
+ πλ r 9T1 + 20T1 T2 + 12T2 .
2 2 k (i − k)!
N=0 i=0 k=0
α−2 o 6
k N−k
(34) ϑXd x̂, tx d x̂, tx
× λt λt
(A,T0 ) 1 + ϑX (A,T0 ) 1 + ϑX
Based on (31) and (34), the variance of ZH can be found as exp(−λt AT0 )
×
D{EH } N!
!
M−1
i ∞ 2 i−k
= E EH2
− E2 {EH } σ ϑ
= exp −σ ϑ2
k!(i − k)!
−α
2 2 2−α Gd0 ro−α
i=0 k=0 N=k
k
= (ηPT T1 ) (2T1 + 3T2 )π λαro + ϑXd x̂, tx
3 α−2 α−1 1
× λt
1 + ϑX (N − k)!
α 2−α 2 1
2
(A,T0 )
+ πλ r 3T1 + 8T1 T2 + 6T2 .
2 N−k
α−2 o 6 d x̂, tx
× λt exp(−λt AT0 ). (39)
(35) (A,T0 ) 1 + ϑX
The proof is completed. Using the fact that AT0 = (A,T0 ) 1d(x̂, tx ), we have
P̄ic (λt , γR )
A PPENDIX B
M−1
i 2 i−k
P ROOF OF T HEOREM 2 σ ϑ (λt )k
= exp −σ ϑ 2
exp(−λt )
The proof of (19) follows the similar line of that in k!(i − k)!
i=0 k=0
[47, Th. 1], but here we consider a TS-PPP and further cope λt + σ 2 ϑ i
M−1
with time domain. First, let us focus on the SINR performance = exp −λt − σ 2 ϑ (40)
in a given region of area A over time T0 denoted by the domain i!
i=0
(A, T0 ) ⊆ R2 × R. We denote the number of the emerged
where
reader-tag pairs in (A, T0 ) as the random variable N with the
distribution given in (1). By applying the result in [48], the ϑX
d x̂, tx . (41)
complementary CDF of the SINRR (or namely, the information (A,T0 ) 1 + ϑX
996 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 2, APRIL 2018
Finally, by letting the formerly restricted domain (A, T0 ) go [18] G. Wang, F. Gao, R. Fan, and C. Tellambura, “Ambient backscatter com-
to infinity, the integral in (41) can be calculated as munication systems: Detection and performance analysis,” IEEE Trans.
Commun., vol. 64, no. 11, pp. 4836–4846, Nov. 2016.
∞ ∞
ϑw(t)r−α [19] K. Huang, C. Zhong, and G. Zhu, “Some new research trends in wire-
= 2π rdrdt lessly powered communications,” IEEE Wireless Commun., vol. 23,
−∞ 0 1 + ϑw(t)r−α no. 2, pp. 19–27, Apr. 2016.
∞ −δ ∞ [20] D. Arnitz and M. S. Reynolds, “Multitransmitter wireless power trans-
(a) 2π x
= dx (ϑw(t))δ dt fer optimization for backscatter RFID transponders,” IEEE Antennas
α 0 1+x −∞ Wireless Propag. Lett., vol. 12, no. 12, pp. 849–852, Jul. 2013.
T2
(b) 2π π T2 − t δ [21] G. Yang, C. K. Ho, and Y. L. Guan, “Multi-antenna wireless energy
= 2ϑ δ dt transfer for backscatter communication systems,” IEEE J. Sel. Areas
α sin(δπ ) 0 T2 Commun., vol. 33, no. 12, pp. 2974–2987, Dec. 2015.
= ϑ δ T2 (42) [22] X. Xu, L. Gu, J. Wang, G. Xing, and S.-C. Cheung, “Read more with
less: An adaptive approach to energy-efficient RFID systems,” IEEE J.
Sel. Areas Commun., vol. 29, no. 8, pp. 1684–1697, Sep. 2011.
where [4π /(2 + α)](δ)(1 − δ) =
[23] C. Bockelmann et al., “Massive machine-type communications in 5G:
(4π 2 /(2 + α) sin(δπ )), δ (2/α), step (a) follows from the Physical and MAC-layer solutions,” IEEE Commun. Mag., vol. 54, no. 9,
variable change x = ϑw(t)r−α , and equality (b) is obtained pp. 59–65, Sep. 2016.
by the use of [37, eq. (3.222.2)] and (18). Plunging (42) [24] H. Shariatmadari et al., “Machine-type communications: Current sta-
tus and future perspectives toward 5G systems,” IEEE Commun. Mag.,
into (40) yields the result shown in Theorem 2. The proof is vol. 53, no. 9, pp. 10–17, Sep. 2015.
completed. [25] W. Liu, K. Huang, X. Zhou, and S. Durrani. (Jan. 2017). Next
Generation Backscatter Communication: Theory and Applications.
[Online]. Available: http://arxiv.org/abs/1701.07588
R EFERENCES [26] W. Liu, K. Huang, X. Zhou, and S. Durrani, “Full-duplex backscatter
[1] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and interference networks based on time-hopping spread spectrum,” IEEE
M. Ayyash, “Internet of Things: A survey on enabling technologies, pro- Trans. Wireless Commun., vol. 16, no. 7, pp. 4361–4377, Jul. 2017.
tocols, and applications,” IEEE Commun. Surveys Tuts., vol. 17, no. 4, [27] M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse, and
pp. 2347–2376, 1st Quart., 2015. M. Franceschetti, “Stochastic geometry and random graphs for
[2] L. Xie, Y. Yin, A. V. Vasilakos, and S. Lu, “Managing RFID data: the analysis and design of wireless networks,” IEEE J. Sel. Areas
Challenges, opportunities and solutions,” IEEE Commun. Surveys Tuts., Commun., vol. 27, no. 7, pp. 1029–1046, Sep. 2009.
vol. 16, no. 3, pp. 1294–1311, 3rd Quart., 2014. [28] J. G. Andrews, F. Baccelli, and R. K. Ganti, “A tractable approach to
[3] D. M. Dobkin, The RF in RFID: Passive UHF RFID in Practice. coverage and rate in cellular networks,” IEEE Trans. Commun., vol. 59,
Burlington, MA, USA: Newnes, 2007. no. 11, pp. 3122–3134, Nov. 2011.
[4] V. Chawla and D. S. Ha, “An overview of passive RFID,” IEEE Commun. [29] H. ElSawy, A. Sultan-Salem, M. S. Alouini, and M. Z. Win, “Modeling
Mag., vol. 45, no. 9, pp. 11–17, Sep. 2007. and analysis of cellular networks using stochastic geometry: A tuto-
[5] A. P. Sample, D. J. Yeager, P. S. Powledge, and J. R. Smith, “Design of a rial,” IEEE Commun. Surveys Tuts., vol. 19, no. 1, pp. 167–203,
passively-powered, programmable sensing platform for UHF RFID sys- 1st Quart., 2017.
tems,” in Proc. IEEE Int. Conf. RFID, Grapevine, TX, USA, Mar. 2007, [30] S. Bi, C. K. Ho, and R. Zhang, “Wireless powered communication:
pp. 149–156. Opportunities and challenges,” IEEE Commun. Mag., vol. 53, no. 4,
[6] C. Boyer and S. Roy, “Backscatter communication and RFID: Coding, pp. 117–125, Apr. 2015.
energy, and MIMO analysis,” IEEE Trans. Commun., vol. 62, no. 3, [31] K. Huang and V. K. N. Lau, “Enabling wireless power transfer in cel-
pp. 770–785, Mar. 2014. lular networks: Architecture, modeling and deployment,” IEEE Trans.
[7] M. A. Ingram, M. F. Demirkol, and D. Kim, “Transmit diversity and spa- Wireless Commun., vol. 13, no. 2, pp. 902–912, Feb. 2014.
tial multiplexing for RF links using modulated backscatter,” in Proc. Int. [32] K. Huang, “Spatial throughput of mobile ad hoc networks powered
Symp. Signals Syst. Electron. (ISSSE), Tokyo, Japan, Jul. 2001, pp. 1–4. by energy harvesting,” IEEE Trans. Inf. Theory, vol. 59, no. 11,
[8] J. D. Griffin and G. D. Durgin, “Gains for RF tags using multiple pp. 7597–7612, Nov. 2013.
antennas,” IEEE Trans. Antennas Propag., vol. 56, no. 2, pp. 563–570, [33] Y. L. Che, L. Duan, and R. Zhang, “Spatial throughput maximiza-
Feb. 2008. tion of wireless powered communication networks,” IEEE J. Sel. Areas
[9] C. Boyer and S. Roy, “Space time coding for backscatter RFID,” IEEE Commun., vol. 33, no. 8, pp. 1534–1548, Aug. 2015.
Trans. Wireless Commun., vol. 12, no. 5, pp. 2272–2280, May 2013. [34] Y. Liu, L. Wang, S. A. R. Zaidi, M. Elkashlan, and T. Q. Duong,
[10] C. He and Z. J. Wang, “SER of orthogonal space-time block codes over “Secure D2D communication in large-scale cognitive cellular networks:
Rician and Nakagami-m RF backscattering channels,” IEEE Trans. Veh. A wireless power transfer model,” IEEE Trans. Commun., vol. 64, no. 1,
Technol., vol. 63, no. 2, pp. 654–663, Feb. 2014. pp. 329–342, Jan. 2016.
[11] C. He, Z. J. Wang, and V. C. M. Leung, “Unitary query for the M × L × [35] K. Han and K. Huang, “Wirelessly powered backscatter communica-
N MIMO backscatter RFID channel,” IEEE Trans. Wireless Commun., tion networks: Modeling, coverage, and capacity,” IEEE Trans. Wireless
vol. 14, no. 5, pp. 2613–2625, May 2015. Commun., vol. 16, no. 4, pp. 2548–2561, Apr. 2017.
[12] C. He, Z. J. Wang, C. Miao, and V. C. M. Leung, “Block-level unitary
[36] M. Bacha, B. Clerckx, and K. Huang. (Nov. 2017). Backscatter
query: Enabling orthogonal-like space-time code with query diversity
Communications for the Internet of Things: A Stochastic Geometry
for MIMO backscatter RFID,” IEEE Trans. Wireless Commun., vol. 15,
Approach. [Online]. Available: http://arxiv.org/abs/1711.07277
no. 3, pp. 1937–1949, Mar. 2016.
[13] F. Zheng and T. Kaiser, “On the transmit signal design at the reader [37] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and
for RFID MIMO systems,” in Proc. 4th Int. EURASIP Workshop RFID Products, 7th ed. New York, NY, USA: Academic Press, 2007.
Technol. (EURASIP RFID), Torino, Italy, Sep. 2012, pp. 59–64. [38] M. Haenggi, Stochastic Geometry for Wireless Networks. Cambridge,
[14] W. Saad, X. Zhou, Z. Han, and H. V. Poor, “On the physical layer secu- U.K.: Cambridge Univ. Press, 2012.
rity of backscatter wireless systems,” IEEE Trans. Wireless Commun., [39] B. Błaszczyszyn and P. Mühlethaler, “Stochastic analysis of non-
vol. 13, no. 6, pp. 3442–3451, Jun. 2014. slotted Aloha in wireless ad-hoc networks,” in Proc. IEEE INFOCOM,
[15] Q. Yang, Y. Zhang, H.-M. Wang, and Z. Han, “Transmit optimization San Diego, CA, USA, Mar. 2010, pp. 1–9.
for secure MIMO RFID wireless communication,” in Proc. IEEE Int. [40] A. Munari, P. Mähönen, and M. Petrova. (Dec. 2015). A Stochastic
Conf. Commun. (ICC), Kuala Lumpur, Malaysia, May 2016, pp. 1–6. Geometry Framework for Asynchronous Full-Duplex Networks.
[16] Q. Yang, H.-M. Wang, Y. Zhang, and Z. Han, “Physical layer security in [Online]. Available: http://arxiv.org/abs/1512.01478
MIMO backscatter wireless systems,” IEEE Trans. Wireless Commun., [41] K. Huang and X. Zhou, “Cutting the last wires for mobile communi-
vol. 15, no. 11, pp. 7547–7560, Nov. 2016. cations by microwave power transfer,” IEEE Commun. Mag., vol. 53,
[17] B. Kellogg, A. Parks, S. Gollakota, J. R. Smith, and D. Wetherall, no. 6, pp. 86–93, Jun. 2015.
“Wi-Fi backscatter: Internet connectivity for RF-powered devices,” in [42] S. N. Chiu, D. Stoyan, W. S. Kendall, and J. Mecke, Stochastic Geometry
Proc. SIGCOMM, Chicago, IL, USA, Aug. 2014, pp. 607–618. and Its Applications, 3rd ed. Chichester, U.K.: Wiley, 2013.
YANG et al.: WIRELESS POWERED ASYNCHRONOUS BACKSCATTER NETWORKS WITH SPORADIC SHORT PACKETS 997
[43] X. Lu, P. Wang, D. Niyato, D. I. Kim, and Z. Han, “Wireless networks Tong-Xing Zheng (S’14–M’16) received the B.S.
with RF energy harvesting: A contemporary survey,” IEEE Commun. and Ph.D. degrees from the School of Electronic and
Surveys Tuts., vol. 17, no. 2, pp. 757–789, May 2015. Information Engineering, Xi’an Jiaotong University,
[44] R. W. Heath, M. Kountouris, and T. Bai, “Modeling heterogeneous net- Xi’an, China, in 2010 and 2016, respectively.
work interference using poisson point processes,” IEEE Trans. Signal He is currently a Lecturer with the Department
Process., vol. 61, no. 16, pp. 4114–4126, Aug. 2013. of Information and Communications Engineering,
[45] A. W. Marshall and I. Olkin, “A one-sided inequality of the Chebyshev and the Ministry of Education Key Laboratory
type,” Ann. Math. Stat., vol. 31, no. 2, pp. 488–491, Jun. 1960. for Intelligent Networks and Network Security,
[46] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge, U.K.: Xi’an Jiaotong University. He is also a Visiting
Cambridge Univ. Press, 2004. Scholar with the School of Electrical Engineering
[47] O. B. S. Ali, C. Cardinal, and F. Gagnon, “Performance of optimum and Telecommunications, University of New South
combining in a Poisson field of interferers and Rayleigh fading chan- Wales, Sydney, NSW, Australia. He has co-authored the book entitled
nels,” IEEE Trans. Wireless Commun., vol. 9, no. 8, pp. 2461–2467, Physical Layer Security in Random Cellular Networks (Springer, 2016). His
Aug. 2010. current research interests include physical-layer security of wireless com-
[48] H. Gao, P. J. Smith, and M. V. Clark, “Theoretical reliability of munications, wireless caching, heterogeneous cellular networks, full-duplex
MMSE linear diversity combining in Rayleigh-fading additive interfer- communications, and stochastic geometry theory and its applications.
ence channels,” IEEE Trans. Commun., vol. 46, no. 5, pp. 666–672,
May 1998.