This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Exploiting Constructive Interference for Backscatter Communication Systems

Bowen Gu, Student Member, IEEE, Dong Li, Senior Member, IEEE,
Ye Liu, Member, IEEE, Yongjun Xu, Senior Member, IEEE
This work was supported in part by the Science and Technology Development Fund, Macau, SAR, under Grant 0018/2019/AMJ, Grant 0110/2020/A3, and Grant 0029/2021/AGJ, in part by National Natural Science Foundation of China (62271094, U21A20448), in part by Key Fund of Natural Science Foundation of Chongqing (CSTB2022NSCQ-LZX0009), and in part by the Scientific and Technological Research Program of Chongqing Municipal Education Commission (KJZD-K202200601). (Corresponding author: Dong Li.) Bowen Gu and Dong Li are with the School of Computer Science and Engineering, Macau University of Science and Technology, Avenida Wai Long, Taipa, Macau 999078, China (e-mails: [email protected], [email protected]). Ye Liu is with the School of Computer Science and Engineering, Macau University of Science and Technology, Avenida Wai Long, Taipa, Macau 999078, China, and also with the College of Artificial Intelligence, Nanjing Agricultural University, Nanjing 210031, China (e-mail: [email protected]). Yongjun Xu is with the School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China (e-mail: [email protected]).
Abstract

Backscatter communication (BackCom), one of the core technologies to realize zero-power communication, is expected to be a pivotal paradigm for the next generation of the Internet of Things (IoT). However, the “strong” direct link (DL) interference (DLI) is traditionally assumed to be harmful, and generally drowns out the “weak” backscattered signals accordingly, thus deteriorating the performance of BackCom. In contrast to the previous efforts to eliminate the DLI, in this paper, we exploit the constructive interference (CI), in which the DLI contributes to the backscattered signal. To be specific, our objective is to maximize the received signal-to-noise ratio (SNR) by jointly optimizing the receive beamforming vectors and tag selection factors under different detection error probability (DEP) requirements, which leads to two different optimization problems. However, the resulting problems are non-convex and unanalyzable due to constraints on the DEP. To solve these problems, the Kullback-Leibler divergence is first applied to transform the DEP into a tractable form. Then, inspired by the alternating optimization, we respectively propose two successive convex approximation (SCA)-based algorithms to solve the corresponding sub-problems with beamforming design, and a greedy algorithm to solve the sub-problem with tag selection. In order to gain insight into the CI, we consider a special case with the single-antenna reader to reveal the channel angle between the backscattering link (BL) and the DL, in which the DLI will become constructive. Simulation results show that significant performance gain can always be achieved with the proposed algorithms compared to the traditional algorithms without the CI in terms of the received SNR. The derived constructive channel angle for the BackCom system with a single-antenna reader is also confirmed by simulation results.

Index Terms:
Backscastter communication, constructive interference, Kullback-Leibler divergence, resource optimization

I Introduction

As the number of connected devices has grown by leaps and bounds over the past few decades, the Internet of Things (IoT) is transforming industry, logistics, and everyday use in an unforeseen manner, ushering in a new industrial revolution [1, 2]. Recent market studies envision that the total number of connected IoT devices will reach 83 billion by 2024, rising from 35 billion connections in 2020 [3]. However, this is a mixed blessing, as further promotion of the IoT will necessitate a huge expense to maintain the operation of these ever-increasing devices. Recently, backscatter communication (BackCom) has been emerging as a promising technology that can break the gridlock of these power-hungry devices, which are replaced by passive tags without the need for active radio frequency (RF) components [4]. In the BackCom system, the externally generated carrier by a dedicated power source is utilized to carry the tag’s signal, and only the impedance loading is applied to backscatter the received signal, which can significantly reduce the hardware cost and pave the way for zero-power communication [5].

However, it should be noted that, in the BackCom system, the backscattered signal actually undergoes double-channel fading, which is to blame for the quite weak signal strength at the reader. It is challenging to recover the backscattered data from different tags due to the mutual interference caused by the concurrent transmission [6]. On the other hand, another issue ensues: when the signal from the direct link (DL) encounters these weak signals at the reader, the resulting interference is strong enough to drown out the desired signal, which significantly degrades the performance of the BackCom system, especially the signal detection and transmission rate [7]. Therefore, it is hard to overstate the importance of interference suppression for BackComs.

TABLE I: Summary of the Related Literature with Interference Processing in BackComs
Summary for interference processing Interference is constructive or not?
Ref. Main processing Method Processing result Mutual Interference DLI
[9] SIC Interference cancellation
[11]-[14] FS Interference avoidance
[15]-[17] OFDM Interference avoidance
[18]-[20] TDMA Interference avoidance
[21]-[23] Tag selection Interference avoidance
[24]-[25] Phase offset Interference utilization
[26] SLP Interference utilization
Our work KLD-based method Interference utilization

In fact, interference suppression has been fruitfully studied in BackCom systems. One of the most typical methods is the successive interference cancellation (SIC) technique [8, 9], by which the strong interference signal in the mixed signal can be stripped. However, it should be noted that the SIC may suffer from residual interference, and interference cancellation for multiple weak signals may not perform well. In this regard, the frequency shift (FS) technique has been proposed as a promising method to mitigate the interference in BackCom systems [10]. To be specific, each backscatter tag was able to shift its carrier signal to adjacent non-overlapping frequency bands and isolate the backscattered signal from the DL signal so that the mutual interference between different tags and the DL interference (DLI) could be avoided [11, 12, 13, 14]. Furthermore, BackCom systems over orthogonal frequency division multiplexing (OFDM) carriers were proposed in [15, 16, 17], which canceled out the DLI by exploiting the repeating structure of the ambient OFDM signals with the aid of the cyclic prefix. Besides, time division multiple access (TDMA) (see, [18, 19, 20]) and tag selection (see, [21, 22, 23]) have been also widely used in BackCom systems to avoid the mutual interference among different tags.

I-A Motivations and Contributions

It is noted that, most of the existing works assume that the DLI is always harmful, and thus focus on how to avoid the effect of interference for BackCom systems. However, there are several natural questions that arise: Is interference necessarily destructive in all cases? Is it possible to blaze a trail to turn the destructive interference into a constructive one? These problems have received little attention, and there have been only a few research efforts paid to answer the above questions. The constructive interference (CI) was achieved among multiple cooperative tags in centralized scenarios [24] and decentralized scenarios [25], respectively, in which several tags backscatter the same packet synchronously, which makes it possible that backscattered signals can be constructively combined, leading to an increased signal strength at the reader. Besides, a BackCom system with the symbol level precoding (SLP) technique was proposed in [26] to convert the multi-user interference into the constructive region of the desired data symbol by designing the transmit beamforming on the symbol level.

Although the CI was considered in [24] and [25] among different tags in BackCom systems, which means that CI can be found among multiple weak signals, they ignore the real protagonist, namely, the strong interference from the DL, since compared with the mutual interference among tags, the DLI is more harmful. In [26], the multi-user interference in broadcasting channels was considered to be converted into the CI, where the tag signal detection was not taken into account and there was actually no DLI. In this regard, we take up the baton in this paper to probe how to convert the DLI into a helpful interference in enhancing the backscattered signal strength, which is in contrast to most of the existing works that aim at canceling the DLI [9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 21, 20, 19, 22]. Besides, for more visualization, Table I briefly summarizes the differences between this paper and the mentioned works. To the best of our knowledge, this is the first attempt to harness the DLI for the backscattered signal for BackCom systems. Specifically, we consider a multi-tag BackCom system with a dedicated power source (PS) supplying energy to the tags, and a multi-antenna reader to enhance the reception efficiency.

In a nutshell, the contributions of this paper are summarized as follows:

  • To evaluate whether the DLI is constructive or not, the detection error probabilities (DEPs) under the cases with and without the DL are evaluated. To make our analysis tractable, a Kullback-Leibler divergence (KLD)-oriented approach is proposed, where the KLDs under these two cases are requisitioned. By doing so, the CI can be obtained. However, the mutual interference among multiple tags also hinders the exploitation of the CI, and we consider tag selection to avoid this problem. It is worth pointing out that the KLD analysis of the DLI is new, and not presently available in existing works.

  • Our objective is to maximize the received signal-to-noise ratio (SNR) under the two different CI requirements (i.e., the consensual and evolved CIs) with the single- and multi-antenna PSs, respectively, via beamforming design and tag selection, which leads to two different optimization problems in each scenario. Moreover, the formulated problems are non-convex and hard to solve. In order to circumvent this difficulty, we decompose these problems based on the alternating optimization method. Then, the corresponding sub-problems for beamforming design are respectively solved by proposing two different algorithms with successive convex approximation (SCA), and the sub-problems for tag selection are solved via greedy search.

  • In order to gain more insight into the CI, we consider a special case with one single antenna at the reader. In this case, we are able to derive the closed-form expressions for the feasible region of the input SNR and the channel angle, where the evolved CI exists. This result is new and unique in the sense of its potential to build up the CI in practice.

  • Simulation results show that significant performance gain can always be achieved with the proposed algorithms compared with the benchmark algorithms in terms of the received SNR. Besides, the CI region is demonstrated for the case with multiple antennas at the reader, and the derived angle for the case with single antenna at the reader is also confirmed by simulation results. Moreover, we also demonstrate from the derived angle that it is more likely to build up the CI for the relatively large DEP tolerance or large path loss.

I-B Organization

The remainder of the paper is organized as follows: In Section II, we present the system model and analyze the DEPs for two different cases. In Section III, we formulate two optimization problems, and two different greedy-based algorithms with SCA are proposed to solve them. Besides, a special case is also considered for more insight in Section III. Section IV gives the simulation results, and Section V concludes this paper.

I-C Notations

Throughout the paper, scalars, vectors, and matrices are denoted by lowercase, boldface lowercase, and boldface uppercase letters, respectively. |||\cdot| and ||||||\cdot|| denote the absolute value of a complex scalar and the l2l_{2}-norm of a vector, respectively. ()H(\cdot)^{H}, det()(\cdot), Rank()(\cdot), Tr()(\cdot), ||||||\cdot||_{*}, ||||1||\cdot||_{1}, and ||||2||\cdot||_{2} represent the Hermitian, the determinant, the rank, the trace, the nuclear norm, the 1\mathcal{L}_{1} norm, and the spectral norm of the matrix, respectively. 𝒞𝒩(μ,σ2)\mathcal{CN}(\mu,\sigma^{2}) is the circularly symmetric complex Gaussian (CSCG) distribution with mean μ\mu and variance σ2\sigma^{2}. λmax()\lambda^{\max}(\cdot) and λmin()\lambda^{\min}(\cdot) denote the maximum and minimum eigenvalues of the matrix, respectively. 𝑰N\bm{I}_{N} represents the N×NN\times N identity matrix. W0()W_{0}(\cdot) and W1()W_{-1}(\cdot) denote the principal branch and the bottom branch of the Lambert WW function, respectively.

II System Model And Detection Analysis

II-A System Architecture

We consider a BackCom system with single input multiple output (SIMO), as shown in Fig. 1, with a single-antenna PS, KK single-antenna tags (k𝒦={1,2,,K}k\in\mathcal{K}=\{1,2,\cdots,K\}), and a reader with MM antennas (m={1,2,,M}m\in\mathcal{M}=\{1,2,\cdots,M\}). In particular, all tags are powered by the PS so that each tag can backscatter its information to the reader. The channel coefficients of the PS-tag kk link, the PS-reader link, and the tag kk-reader link are respectively given by hSTk1×1h_{\text{ST}}^{k}\in\mathbb{C}^{1\times 1}, 𝒉SRM×1\bm{h}_{\text{SR}}\in\mathbb{C}^{M\times 1}, and 𝒉TRkM×1\bm{h}_{\text{TR}}^{k}\in\mathbb{C}^{M\times 1}. Assume that channels between the transmitter and the receiver follow a block-fading based model, namely, hSTkh_{\text{ST}}^{k}, 𝒉SR\bm{h}_{\text{SR}}, and 𝒉TRk\bm{h}_{\text{TR}}^{k} remain constant during backscattering in one time interval, but vary independently in different intervals. It is further assumed that the PS transmits NN CSCG signals s(n)s(n), n𝒩={1,2,,N}n\in\mathcal{N}=\{1,2,\cdots,N\} with the transmitted power σs2\sigma_{s}^{2} in one time interval [27]. Moreover, s(n)s(n) for n={1,2,,N}n=\{1,2,\cdots,N\} are independent and identically distributed. The signal received at the kk-th tag can be expressed as

rk(n)=hSTks(n)+zk(n),\displaystyle r_{k}(n)=h_{\text{ST}}^{k}s(n)+z_{k}(n), (1)

where zk(n)z_{k}(n) denotes the noise at kk-th tag. Then, the kk-th tag backscatters the signal rk(n)r_{k}(n) and transmits its own binary signal BkB_{k}. Note that the noise backscattered by each tag can be ignored in the backscattering process due to its poor signal strength. Consequently, the backscattered signal by the kk-th tag can be expressed as

ck(n)=αkBkhSTks(n),\displaystyle c_{k}(n)=\alpha_{k}B_{k}h_{\text{ST}}^{k}s(n), (2)

where αk[0,1]\alpha_{k}\in[0,1] represents the attenuation inside the tag, which is achieved by adjusting the load impedance at the port of the antenna, and also depends on the structure mode of the antenna [28].

Refer to caption

Figure 1: A multi-tag SIMO-based BackCom system.

In order to avoid the mutual interference among tags, only one tag can be selected to backscatter its information at one slot. Noting that the signal received by the reader is not only from the selected tag (e.g., the kk-th tag), but also from the PS. Thus, the signal received by the reader can be expressed as

𝒚k(n)=𝒉SRs(n)Direct signal+𝒉TRkck(n)Backscattering signal+𝒘(n)Noise,\displaystyle\bm{y}_{k}(n)=\underbrace{\bm{h}_{\text{SR}}s(n)}_{\text{Direct signal}}+\underbrace{\bm{h}_{\text{TR}}^{k}c_{k}(n)}_{\text{Backscattering signal}}+\underbrace{\bm{w}(n)}_{\text{Noise}}, (3)

where 𝒘(n)M×1\bm{w}(n)\in\mathbb{C}^{M\times 1} denotes the noise vector of the reader and is assumed to be an i.i.d. CSCG random vector with 𝒘(n)𝒞𝒩(0,σw2𝑰M)\bm{w}(n)\sim\mathcal{CN}(0,\sigma_{w}^{2}\bm{I}_{M}). σw2\sigma_{w}^{2} denotes the noise power. By using the receive beamforming, the received signal at the reader can be expressed as

yk(n)\displaystyle y_{k}(n) =𝒗kH𝒉SRs(n)+𝒗kH𝒉TRkck(n)+𝒗kH𝒘(n),\displaystyle{=}\bm{v}_{k}^{H}\bm{h}_{\text{SR}}s(n){+}\bm{v}_{k}^{H}\bm{h}_{\text{TR}}^{k}c_{k}(n){+}{\bm{v}_{k}^{H}\bm{w}(n)}, (4)

where 𝒗kM×1\bm{v}_{k}\in\mathbb{C}^{M\times 1} denotes the receive beamforming vector at the reader.

Note that this framework of multi-tag selection for the Backcom system is beneficial for interference-free transmission and can efficiently combat the double-fading channel, which can be well used in radio frequency identification (RFID) [29] for logistics management, wireless body area networks (WBANs) [30] for health monitoring and data sensing, etc.

II-B CSI Assumption

It is assumed that the BackCom system operates in the time-division multiplexing (TDD) mode, and thus the channel state information (CSI) can be obtained by the training-based channel estimation at the uplink transmission [31]. Specifically, the reader is designed to transmit two sets of pilots in two training phases [32]. In the first phase, the kk-th tag switches its impedance into an initial matched state, and then it receives the pilot signals from the reader as excitation and does not backscatter any signal. Thus, the PS can estimate the CSI for the DL (i.e., 𝒉SR\bm{h}_{\text{SR}}) via channel reciprocity. In the second phase, the kk-th tag switches its impedance into a fixed and known backscatter state to represent a symbol Bk0B_{k}^{0} after receiving the training signals in the first phase. Thus, the PS can estimate the composite channel 𝒉SR+Bk0hSTk𝒉TRk\bm{h}_{\text{SR}}+B_{k}^{0}h_{\text{ST}}^{k}\bm{h}_{\text{TR}}^{k} via the training pilots. Then, for the given Bk0B_{k}^{0}, the CSI of the backscattering link (BL) (i.e., hSTk𝒉TRkh_{\text{ST}}^{k}\bm{h}_{\text{TR}}^{k}) can be obtained at the PS by subtracting the estimated the DL channel component from the estimated composite channel.

II-C Signal Model

In this subsection, we give some analysis for the received signal when the DLI is available or not. Specifically, when the DL is available, the received signal of the reader can be rewritten with a binary hypothesis. In particular, the null hypothesis (0\mathcal{H}_{0}) is that the kk-tag does not backscatter the incident signal and the alternative hypothesis (1\mathcal{H}_{1}) is that the kk-tag backscatters the incident signal. In this regard, we have

yk(n)={0:𝒗kH𝒉0s(n)+𝒗kH𝒘(n),Bk=0,1:𝒗kH𝒉1ks(n)+𝒗kH𝒘(n),Bk=1,y_{k}(n)\text{=}\left\{\begin{aligned} &\mathcal{H}_{0}:\bm{v}_{k}^{H}\bm{h}_{0}s(n)+\bm{v}_{k}^{H}\bm{w}(n),~{}B_{k}=0,\\ &\mathcal{H}_{1}:\bm{v}_{k}^{H}\bm{h}_{1}^{k}s(n)+\bm{v}_{k}^{H}\bm{w}(n),~{}B_{k}=1,\\ \end{aligned}\right. (5)

where 𝒉0=𝒉SR\bm{h}_{0}=\bm{h}_{\text{SR}}, 𝒉1k=𝒉SR+𝒉STRk\bm{h}_{1}^{k}=\bm{h}_{\text{SR}}+\bm{h}_{\text{STR}}^{k}, and 𝒉STRk=αkhSTk𝒉TRk\bm{h}_{\text{STR}}^{k}=\alpha_{k}h_{\text{ST}}^{k}\bm{h}_{\text{TR}}^{k}.

Thus, the distributions of the received signal yk(n)y_{k}(n) can be expressed as

{0:yk(n)𝒞𝒩(0,δ0k),Bk=0,1:yk(n)𝒞𝒩(0,δ1k),Bk=1,\left\{\begin{aligned} &\mathcal{H}_{0}:y_{k}(n)\sim\mathcal{CN}(0,\delta_{0}^{k}),~{}B_{k}=0,\\ &\mathcal{H}_{1}:y_{k}(n)\sim\mathcal{CN}(0,\delta_{1}^{k}),~{}B_{k}=1,\\ \end{aligned}\right. (6)

where the variances under 0\mathcal{H}_{0} and 1\mathcal{H}_{1} can be expressed as

δik={|𝒗kH𝒉0|2σs2+σw2𝒗k2,i=0,|𝒗kH𝒉1k|2σs2+σw2𝒗k2,i=1.\delta_{i}^{k}=\left\{\begin{aligned} &|\bm{v}_{k}^{H}\bm{h}_{0}|^{2}\sigma_{s}^{2}+\sigma_{w}^{2}||\bm{v}_{k}||^{2},i=0,\\ &|\bm{v}_{k}^{H}\bm{h}_{1}^{k}|^{2}\sigma_{s}^{2}+\sigma_{w}^{2}||\bm{v}_{k}||^{2},i=1.\\ \end{aligned}\right. (7)

Accordingly, the received signal 𝒚k\bm{y}_{k} at the reader in one time interval obeys the following distributions

{0:𝒚k𝒞𝒩(𝟎,C0k),Bk=0,1:𝒚k𝒞𝒩(𝟎,C1k),Bk=1,\left\{\begin{aligned} &\mathcal{H}_{0}:\bm{y}_{k}\sim\mathcal{CN}(\bm{0},\textbf{C}_{0}^{k}),~{}B_{k}=0,\\ &\mathcal{H}_{1}:\bm{y}_{k}\sim\mathcal{CN}(\bm{0},\textbf{C}_{1}^{k}),~{}B_{k}=1,\\ \end{aligned}\right. (8)

where the covariance matrices under 0\mathcal{H}_{0} and 1\mathcal{H}_{1} can be expressed as Cik=δik𝑰N,i{0,1}.\textbf{C}_{i}^{k}=\delta_{i}^{k}\bm{I}_{N},i\in\{0,1\}.

Let p0(𝒚k)p_{0}(\bm{y}_{k}) and p1(𝒚k)p_{1}(\bm{y}_{k}) denote the likelihood functions of the received signal of the reader under 0\mathcal{H}_{0} and 1\mathcal{H}_{1}, respectively. Based on (8), we have

pi(𝒚k)\displaystyle p_{i}(\bm{y}_{k}) =1πNdet(Cik)exp(𝒚kH(Cik)1𝒚k)\displaystyle=\frac{1}{\pi^{N}\det(\textbf{C}_{i}^{k})}\exp(-\bm{y}_{k}^{H}({\textbf{C}_{i}^{k}})^{-1}\bm{y}_{k}) (9)
=1πN(δik)Nexp(𝒚kH𝒚kδik),i{0,1}.\displaystyle=\frac{1}{\pi^{N}(\delta_{i}^{k})^{N}}\exp(-\frac{\bm{y}_{k}^{H}\bm{y}_{k}}{\delta_{i}^{k}}),i\in\{0,1\}.

As a counterpart, assuming the DL is unavailable, the received signal at the reader can be expressed as

y¯k(n)=𝒗kH𝒉TRkck(n)+𝒗kH𝒘(n).\displaystyle\bar{y}_{k}(n)=\bm{v}_{k}^{H}\bm{h}_{\text{TR}}^{k}c_{k}(n){+}{\bm{v}_{k}^{H}\bm{w}(n)}. (10)

Accordingly, the received signal 𝒚¯k\bm{\bar{y}}_{k} in one time interval obeys the following distributions

{0:𝒚¯k𝒞𝒩(𝟎,C¯0k),Bk=0,1:𝒚¯k𝒞𝒩(𝟎,C¯1k),Bk=1,\left\{\begin{aligned} &\mathcal{H}_{0}:\bm{\bar{y}}_{k}\sim\mathcal{CN}(\bm{0},\bar{\textbf{C}}_{0}^{k}),~{}B_{k}=0,\\ &\mathcal{H}_{1}:\bm{\bar{y}}_{k}\sim\mathcal{CN}(\bm{0},\bar{\textbf{C}}_{1}^{k}),~{}B_{k}=1,\\ \end{aligned}\right. (11)

where C¯ik=δ¯ik𝑰N\bar{\textbf{C}}_{i}^{k}=\bar{\delta}_{i}^{k}\bm{I}_{N} are the covariance matrices, and

δ¯ik={|𝒗kH𝒉¯0|2σs2+σw2𝒗k2,i=0,|𝒗kH𝒉¯1k|2σs2+σw2𝒗k2,i=1,\bar{\delta}_{i}^{k}=\left\{\begin{aligned} &|\bm{v}_{k}^{H}\bm{\bar{h}}_{0}|^{2}\sigma_{s}^{2}+\sigma_{w}^{2}||\bm{v}_{k}||^{2},i=0,\\ &|\bm{v}_{k}^{H}\bm{\bar{h}}_{1}^{k}|^{2}\sigma_{s}^{2}+\sigma_{w}^{2}||\bm{v}_{k}||^{2},i=1,\\ \end{aligned}\right. (12)

where 𝒉¯0=𝟎\bm{\bar{h}}_{0}=\bm{0}, and 𝒉¯1k=𝒉STRk\bm{\bar{h}}_{1}^{k}=\bm{h}_{\text{STR}}^{k}.

In this case, the likelihood functions of the received signal of the reader under 0\mathcal{H}_{0} and 1\mathcal{H}_{1}, respectively, can be expressed as

p¯i(𝒚¯k)=1πN(δ¯ik)Nexp(𝒚¯kH𝒚¯kδ¯ik),i{0,1}.\displaystyle\bar{p}_{i}(\bm{\bar{y}}_{k})=\frac{1}{\pi^{N}(\bar{\delta}_{i}^{k})^{N}}\exp(-\frac{\bm{\bar{y}}_{k}^{H}\bm{\bar{y}}_{k}}{\bar{\delta}_{i}^{k}}),i\in\{0,1\}. (13)

II-D Detection Probability

In BackCom systems, the goal for the reader is to distinguish two different hypotheses 0\mathcal{H}_{0} or 1\mathcal{H}_{1} by applying a specific decision rule. In general, the priori probabilities of hypotheses 0\mathcal{H}_{0} and 1\mathcal{H}_{1} are assumed to be equal. As such, the detection error probability (DEP) of the reader is defined as in [33, 34]

ξ=Pr(𝒟1|0)+Pr(𝒟0|1),\displaystyle\xi={\text{Pr}}(\mathcal{D}_{1}|{\mathcal{H}}_{0})+{\text{Pr}}(\mathcal{D}_{0}|{\mathcal{H}}_{1}), (14)

where 𝒟1\mathcal{D}_{1} and 𝒟0\mathcal{D}_{0} are the binary decisions that infer whether backscattering transmission is present or not, respectively. Pr(𝒟1|0){\text{Pr}}(\mathcal{D}_{1}|{\mathcal{H}}_{0}) and Pr(𝒟0|1){\text{Pr}}(\mathcal{D}_{0}|{\mathcal{H}}_{1}) denote the false alarm and miss detection probabilities, respectively.

Taking the case with the DL as an example, for an optimal detector at the reader, the optimal DEP (ξk\xi_{k}^{*}) for detecting the backscattered signal by the kk-th tag can be obtained as [34, 35]

ξk=1𝒱T(p0,p1),\displaystyle\xi_{k}^{*}=1-\mathcal{V}_{T}(p_{0},p_{1}), (15)

where 𝒱T(p0,p1)\mathcal{V}_{T}(p_{0},p_{1}) denotes the total variation between p0(𝒚k)p_{0}(\bm{y}_{k}) and p1(𝒚k)p_{1}(\bm{y}_{k}).

Similarly, the optimal DEP (ζk\zeta_{k}^{*}) of the reader for detecting the backscattered signal by the kk-th tag under the case without the DL can be obtained as

ζk=1𝒱T(p¯0,p¯1),\displaystyle\zeta_{k}^{*}=1-\mathcal{V}_{T}(\bar{p}_{0},\bar{p}_{1}), (16)

where 𝒱T(p¯0,p¯1)\mathcal{V}_{T}(\bar{p}_{0},\bar{p}_{1}) denotes the total variation between p¯0(𝒚¯k)\bar{p}_{0}(\bm{\bar{y}}_{k}) and p¯1(𝒚¯k)\bar{p}_{1}(\bm{\bar{y}}_{k}).

III Problem Formulation and Algorithm Design

In this section, we first formulate two optimization problems for maximizing the received SNR with different CI requirements under a single-antenna PS, and propose two iterative algorithms with SCA to solve them after some designed transformation. Then, the different problems for received SNR are also studied by extending to a multi-antenna PS. Besides, a closed-form expression for the upper bound on the angle between the DL and the BL is revealed to shed light on the CI for the single-antenna reader.

III-A Problem Formulation for Consensual CI

To evaluate the enhancement of the BackCom transmission with the assistance of the DL, an optimization problem for maximizing the received SNR at the reader is formulated by the joint optimization for the receive beamforming design and the tag selection, which is given by

max𝒗k,βkk=1Kβk|𝒗kH𝒉1k|2γ\displaystyle\underset{\bm{v}_{k},\beta_{k}}{\mathop{\max}}\,\sum\limits_{k=1}^{K}\beta_{k}|\bm{v}_{k}^{H}\bm{h}_{1}^{k}|^{2}\gamma (17)
s.t.C1:k=1Kβk=1,βk{0,1},\displaystyle\text{s.t.}~{}{{C}_{1}}:\sum\limits_{k=1}^{K}{\beta_{k}}=1,\beta_{k}\in\{0,1\},
C2:𝒗k2=1,k,\displaystyle\quad~{}~{}{{C}_{2}}:||\bm{v}_{k}||^{2}=1,\forall k,
C3:k=1Kβkξkξmax,\displaystyle\quad~{}~{}{{C}_{3}}:\sum\limits_{k=1}^{K}\beta_{k}\xi_{k}^{*}\leq\xi^{\max},
C4:k=1Kβkζkζmax,\displaystyle\quad~{}~{}{{C}_{4}}:\sum\limits_{k=1}^{K}\beta_{k}\zeta_{k}^{*}\leq\zeta^{\max},

where βk\beta_{k} is the tag selection factor, i.e., βk=1\beta_{k}=1 denotes the kk-th tag is selected, otherwise βk=0\beta_{k}=0. γ=σs2σw2\gamma=\frac{\sigma_{s}^{2}}{\sigma_{w}^{2}} denotes the input SNR. ξmax\xi^{\max} and ζmax\zeta^{\max} denote the tolerated threshold of the DEPs with and without the DL for the BackCom system. For problem (17), C1C_{1} is the tag selection constraint. C2C_{2} denotes the receive beamforming constraint. C3C_{3} and C4C_{4} are the corresponding DEP constraints, which guarantee that the DEPs with and without the DL are not greater than the corresponding tolerable DEPs, respectively. It is noted that, by setting ξmaxζmax\xi^{\max}\leq\zeta^{\max}, the constructive DLI can be obtained, which is defined as the consensual CI.

As can be seen, problem (17) is challenging to solve directly due to the mixed-integer objective and the non-smooth constraints. To make it more treatable, assuming the kk-th tag has been selected, the subproblem for beamforming design can be transformed as

max𝒗k|𝒗kH𝒉1k|2γs.t.C2,C31:ξkξmax,C41:ζkζmax.\begin{split}&\underset{\bm{v}_{k}}{\mathop{\max}}\,|\bm{v}_{k}^{H}\bm{h}_{1}^{k}|^{2}\gamma\\ &\text{s.t.}~{}C_{2},{{C}_{3-1}}:\xi_{k}^{*}\leq\xi^{\max},\\ &\quad~{}~{}{{C}_{4-1}}:\zeta_{k}^{*}\leq\zeta^{\max}.\\ \end{split} (18)

III-B DEP Transformation

Unfortunately, there are still many obstacles in solving problem (18), one of which is that the total variation metrics in C31C_{3-1} and C41C_{4-1} are unwieldy and intractable for products of probability measures [36]. To deal with that, the Bretagnolle–Huber bound [37] is adopted, i.e.,

𝒱T(p0,p1)1exp(DKLk(p0||p1)),\displaystyle\mathcal{V}_{T}(p_{0},p_{1})\leq\sqrt{1-\exp(-D_{\text{KL}}^{k}(p_{0}||p_{1}))}, (19)

or

𝒱T(p0,p1)1exp(DKLk(p1||p0)),\displaystyle\mathcal{V}_{T}(p_{0},p_{1})\leq\sqrt{1-\exp(-D_{\text{KL}}^{k}(p_{1}||p_{0}))}, (20)

where DKLk(p0||p1)D_{\text{KL}}^{k}(p_{0}||p_{1}) and DKLk(p1||p0)D_{\text{KL}}^{k}(p_{1}||p_{0}) denote the KLD from p1(𝒚k)p_{1}(\bm{y}_{k}) to p0(𝒚k)p_{0}(\bm{y}_{k}) and the KLD from p0(𝒚k)p_{0}(\bm{y}_{k}) to p1(𝒚k)p_{1}(\bm{y}_{k}), respectively. Specifically, the expression of DKLk(p0||p1)D_{\text{KL}}^{k}(p_{0}||p_{1}) can be written as111It is noted that the Gaussian-distributed signal input is restrictively assumed in this paper, which is commonly used for analysis of communication systems due to its mathematical tractability. The impact of practical modulation type and order on the exploration of constructive interference will be another work, and is left for future work.

DKLk(p0||p1)\displaystyle D_{\text{KL}}^{k}(p_{0}||p_{1}) =𝒚kp0(𝒚k)lnp0(𝒚k)p1(𝒚k)d𝒚k\displaystyle=\int_{\bm{y}_{k}}p_{0}(\bm{y}_{k})\ln\frac{p_{0}(\bm{y}_{k})}{p_{1}(\bm{y}_{k})}d\bm{y}_{k} (21)
=Nlnδ1kδ0k+Nδ0kδ1kN.\displaystyle=N\ln\frac{\delta_{1}^{k}}{\delta_{0}^{k}}+N\frac{\delta_{0}^{k}}{\delta_{1}^{k}}-N.

Based on (15) and (19), we have the lower bound related to the KLD for ξk\xi_{k}^{*} under the case with the DL, which satisfies

ξk11exp(DKLk(p0||p1))ξ¯k.\displaystyle\xi_{k}^{*}\geq 1-\sqrt{1-\exp(-D_{\text{KL}}^{k}(p_{0}||p_{1}))}\triangleq\bar{\xi}_{k}. (22)

Similarly, the KLD of the corresponding likelihood functions under different hypotheses without the DL can be given by

DKLk(p¯0||p¯1)=Nlnδ¯1kδ¯0k+Nδ¯0kδ¯1kN.\displaystyle D_{\text{KL}}^{k}(\bar{p}_{0}||\bar{p}_{1})=N\ln\frac{\bar{\delta}_{1}^{k}}{\bar{\delta}_{0}^{k}}+N\frac{\bar{\delta}_{0}^{k}}{\bar{\delta}_{1}^{k}}-N. (23)

Correspondingly, the lower bound of the DEP related to the KLD in the case without the DL can be expressed as

ζk11exp(DKLk(p¯0||p¯1))ζ¯k.\displaystyle\zeta_{k}^{*}\geq 1-\sqrt{1-\exp(-D_{\text{KL}}^{k}(\bar{p}_{0}||\bar{p}_{1}))}\triangleq\bar{\zeta}_{k}. (24)

Note that the maximum value of problem (17) can be achieved when ξk\xi_{k}^{*} and ζk\zeta_{k}^{*} are equal to their lower bounds, respectively, in (22) and (24). Thus, C31C_{3-1} and C41C_{4-1} can be rewritten by, respectively,

{ξ¯kξmax,ζ¯kζmax,\left\{\begin{aligned} &\bar{\xi}_{k}\leq\xi^{\max},\\ &\bar{\zeta}_{k}\leq\zeta^{\max},\\ \end{aligned}\right. (25)

or equivalently

{DKLk(p0||p1)ln(1(1ξkmax)2Dmin,DKLk(p¯0||p¯1)ln(1(1ζmax)2Emin.\left\{\begin{aligned} &D_{\text{KL}}^{k}(p_{0}||p_{1})\geq-\ln(1-(1-\xi_{k}^{\max})^{2}\triangleq D^{\min},\\ &D_{\text{KL}}^{k}(\bar{p}_{0}||\bar{p}_{1})\geq-\ln(1-(1-\zeta^{\max})^{2}\triangleq E^{\min}.\\ \end{aligned}\right. (26)

Thus, problem (18) can be transformed into the following problem, i.e.,

max𝒗k|𝒗kH𝒉1k|2γ\displaystyle\underset{\bm{v}_{k}}{\mathop{\max}}\,|\bm{v}_{k}^{H}\bm{h}_{1}^{k}|^{2}\gamma (27)
s.t.C2,C32:DKLk(p0||p1)Dmin,\displaystyle\text{s.t.}~{}C_{2},C_{3-2}:D_{\text{KL}}^{k}(p_{0}||p_{1})\geq D^{\min},
C42:DKLk(p¯0||p¯1)Emin.\displaystyle\quad~{}~{}C_{4-2}:D_{\text{KL}}^{k}(\bar{p}_{0}||\bar{p}_{1})\geq E^{\min}.

III-C Beamforming Design for Consensual CI

However, it is difficult to solve problem (27) due to the tight coupled relationship in C32C_{3-2} and C42C_{4-2}. To deal with it, we propose Theorem 1.

Theorem 1: C32C_{3-2} and C42C_{4-2} can be transformed into the following equivalent forms, i.e.,

{(|𝒗kH𝒉1k|2|𝒗kH𝒉0|2)γ|𝒗kH𝒉0|2γ+1F(fmin)1,γ|𝒗kH𝒉¯1k|2F(gmin)1,\left\{\begin{aligned} &\frac{(|\bm{v}_{k}^{H}\bm{h}_{1}^{k}|^{2}{-}|\bm{v}_{k}^{H}\bm{h}_{0}|^{2})\gamma}{|\bm{v}_{k}^{H}\bm{h}_{0}|^{2}\gamma+1}\geq F(f^{\min})-1,\\ &\gamma{|\bm{v}_{k}^{H}\bm{\bar{h}}_{1}^{k}|^{2}}\geq F(g^{\min})-1,\\ \end{aligned}\right. (28)

where F(x)=exp(W0(exp(x))+x)F(x)=\exp(W_{0}(-\exp(-x))+x), fminDminN+1f^{\min}\triangleq\frac{D^{\min}}{N}+1, and gminEminN+1g^{\min}\triangleq\frac{E^{\min}}{N}+1.

Proof: Please see Appendix A.

Based on Theorem 1, problem (27) can be transformed into the following problem, i.e.,

max𝒗k|𝒗kH𝒉1k|2γs.t.C2,C33:(|𝒗kH𝒉1k|2|𝒗kH𝒉0|2)γ(F(fmin)1)(|𝒗kH𝒉0|2γ+1),C43:γ|𝒗kH𝒉¯1k|2F(gmin)1.\begin{split}&\underset{\bm{v}_{k}}{\mathop{\max}}\,|\bm{v}_{k}^{H}\bm{h}_{1}^{k}|^{2}\gamma\\ &\text{s.t.}~{}C_{2},C_{3-3}:{(|\bm{v}_{k}^{H}\bm{h}_{1}^{k}|^{2}{-}|\bm{v}_{k}^{H}\bm{h}_{0}|^{2})\gamma}\geq(F(f^{\min}){-}1)\\ &\quad\quad\quad\quad~{}~{}~{}~{}~{}~{}\cdot({|\bm{v}_{k}^{H}\bm{h}_{0}|^{2}\gamma+1}),\\ &\quad~{}~{}C_{4-3}:\gamma{|\bm{v}_{k}^{H}\bm{\bar{h}}_{1}^{k}|^{2}}\geq F(g^{\min})-1.\\ \end{split} (29)

However, it is still hard to solve problem (29) directly due to the non-convexity of C33C_{3-3}. To deal with this, the SCA-based method is applied [38]. In each iteration, we construct a global underestimator of the intractable term via its first-order Taylor approximation, which is given by

|𝒗kH𝒉1k|22(𝒉1k(𝒉1k)H𝒗¯k(l))H𝒗k|𝒗¯kH(l)𝒉1k|2μkBF(l),\displaystyle|\bm{v}_{k}^{H}\bm{h}_{1}^{k}|^{2}{\geq}2(\bm{h}_{1}^{k}(\bm{h}_{1}^{k})^{H}\bm{\bar{v}}_{k}{(l)})^{H}\bm{v}_{k}{-}|\bm{\bar{v}}_{k}^{H}(l)\bm{h}_{1}^{k}|^{2}{\triangleq}\mu_{k}^{\text{BF}}(l), (30)

where 𝒗¯k(l)\bm{\bar{v}}_{k}(l) is the feasible point of 𝒗k\bm{v}_{k} in the ll-th iteration of the SCA.

As a result, problem (29) can be finally expressed as

max𝒗kμkBF(l)γs.t.C2,C43,C34a:(μkBF(l)|𝒗kH𝒉0|2)γ(F(fmin)1)(|𝒗kH𝒉0|2γ+1),C34b:|𝒗kH𝒉1k|2μkBF(l).\begin{split}&\underset{\bm{v}_{k}}{\mathop{\max}}\,\mu_{k}^{\text{BF}}(l)\gamma\\ &\text{s.t.}~{}C_{2},C_{4-3},\\ &\quad~{}~{}C_{3-4}^{a}:{(\mu_{k}^{\text{BF}}(l){-}|\bm{v}_{k}^{H}\bm{h}_{0}|^{2})\gamma}\geq(F(f^{\min})-1)\\ &\quad\quad\quad\quad~{}~{}\cdot({|\bm{v}_{k}^{H}\bm{h}_{0}|^{2}\gamma+1}),\\ &\quad~{}~{}C_{3-4}^{b}:|\bm{v}_{k}^{H}\bm{h}_{1}^{k}|^{2}\geq\mu_{k}^{\text{BF}}(l).\\ \end{split} (31)

Note that problem (31) is a standard convex problem, which can be solved by CVX. The detail of this algorithm is shown in Algorithm 1. Here, the computational complexity for Algorithm 1 is evaluated. Given the number of constraints, interior point methods with a vector variable 𝒗k\bm{v}_{k} of size M×1M\times 1 will take 𝒪(Mln(1/ϵ))\mathcal{O}(\sqrt{M}\ln(1/\epsilon)) iterations, with each iteration requiring 𝒪(M3)\mathcal{O}(M^{3}) arithmetic operations for the worst case [39], where ϵ\epsilon denotes the precision of the interior point algorithm. Letting the maximum iteration number for SCA is LL, the total computation complexity for beamforming design is 𝒪(LM3.5ln(1/ϵ))\mathcal{O}(LM^{3.5}\ln(1/\epsilon)).

III-D Problem Formulation for Evolved CI

So far, we have studied the consensual CI for the BackCom system in the previous subsection. However, the relationship between ξk\xi_{k}^{*} and ζk\zeta_{k}^{*} is unknown. In this subsection, we are going to investigate another CI, i.e., evolved CI, by exploiting the following relationships between ξk\xi_{k}^{*} and ζk\zeta_{k}^{*}, i.e.,

{ξk>ζk,k,ξkζk,k.\left\{\begin{aligned} &\xi_{k}^{*}>\zeta_{k}^{*},\forall k,\\ &\xi_{k}^{*}\leq\zeta_{k}^{*},\forall k.\\ \end{aligned}\right. (32)

It is worth mentioning that when ξk>ζk\xi_{k}^{*}>\zeta_{k}^{*} holds, the dilemma will be that the involvement of the DL leads to a larger DEP than the case without the DL, which would be intolerable for perfectionists if the DL is required to have no negative impact on the BackCom system. On the contrary, when ξkζk\xi_{k}^{*}\leq\zeta_{k}^{*} holds, we can assert that introducing the DL does not destroy the detection performance compared with the case without the DL, and can even improve it.

Motivated by this observation, a new optimization problem for achieving the evolved CI can be reformulated, which is expressed as

max𝒗^k,β^kk=1Kβ^k|𝒗^kH𝒉1k|2γ\displaystyle\underset{\bm{\hat{v}}_{k},\hat{\beta}_{k}}{\mathop{\max}}\,\sum\limits_{k=1}^{K}\hat{\beta}_{k}|\bm{\hat{v}}_{k}^{H}\bm{h}_{1}^{k}|^{2}\gamma (33)
s.t.C¯1:k=1Kβ^k=1,β^k{0,1},\displaystyle\text{s.t.}~{}\bar{C}_{1}:\sum\limits_{k=1}^{K}{\hat{\beta}_{k}}=1,\hat{\beta}_{k}\in\{0,1\},
C¯2:𝒗^k2=1,k,\displaystyle\quad~{}~{}\bar{C}_{2}:||\bm{\hat{v}}_{k}||^{2}=1,\forall k,
C¯3:k=1Kβ^kξkk=1Kβ^kζk,\displaystyle\quad~{}~{}\bar{C}_{3}:\sum\limits_{k=1}^{K}{\hat{\beta}_{k}}\xi_{k}^{*}\leq\sum\limits_{k=1}^{K}{\hat{\beta}_{k}}\zeta_{k}^{*},
C¯4:k=1Kβ^kζkζmax.\displaystyle\quad~{}~{}\bar{C}_{4}:\sum\limits_{k=1}^{K}{\hat{\beta}_{k}}\zeta_{k}^{*}\leq\zeta^{\max}.
Algorithm 1 The Algotithm for Problem (31)
Input: KK, MM, NN, αk\alpha_{k}, hSTkh^{k}_{\text{ST}}, 𝒉SR\bm{h}_{\text{SR}}, 𝒉TRk\bm{h}^{k}_{\text{TR}}, σw2\sigma_{w}^{2}, σs2\sigma_{s}^{2}, ξmax\xi^{\max}, ζmax\zeta^{\max}.
Set: Set the iteration index l=1l=1, the tolerance ω\omega, the
    maximum iteration number LL.
Initialize: Set initial point 𝒗¯k(1)\bm{\bar{v}}_{k}(1).
Output: 𝒗k\bm{v}_{k}^{*}.
1: while |μkBF(l+1)μkBF(l)|ω|\mu_{k}^{\text{BF}}(l+1)-\mu_{k}^{\text{BF}}(l)|\geq\omega or lLl\leq L do
2:     Given 𝒗¯k(l)\bm{\bar{v}}_{k}(l), solve problem (31) by using CVX
   to obtain μkBF(l)\mu_{k}^{\text{BF}}(l) and 𝒗k(l)\bm{v}_{k}(l).
3:     Update l=l+1l=l+1.
4: end while
5: Obtain the solution to problem (31) as 𝒗k=𝒗k(l)\bm{v}_{k}^{*}=\bm{v}_{k}(l).

Assuming that the kk-th tag has been selected, problem (33) can be further rewritten as

max𝒗^k|𝒗^kH𝒉1k|2γ\displaystyle\underset{\bm{\hat{v}}_{k}}{\mathop{\max}}\,|\bm{\hat{v}}_{k}^{H}\bm{h}_{1}^{k}|^{2}\gamma (34)
s.t.C¯2,C¯31:ξkζk,\displaystyle\text{s.t.}~{}\bar{C}_{2},\bar{C}_{3-1}:\xi_{k}^{*}\leq\zeta_{k}^{*},
C¯41:ζkζmax.\displaystyle\quad~{}~{}\bar{C}_{4-1}:\zeta_{k}^{*}\leq\zeta^{\max}.

Based on the same approach for the DEP-to-KLD transformation, serving the purpose of maximizing the objective of problem (34), the left-hand items in C¯31\bar{C}_{3-1} and C¯41\bar{C}_{4-1} are replaced by their lower bounds, i.e.,

{ξ¯kζk,ζ¯kζmax.\left\{\begin{aligned} &\bar{\xi}_{k}\leq\zeta_{k}^{*},\\ &\bar{\zeta}_{k}\leq\zeta^{\max}.\\ \end{aligned}\right. (35)

Further, to guarantee the CI evolution, the lower-bound relaxation is applied, thus (35) is transformed into

{ξ¯kζ¯k,ζ¯kζmax.\left\{\begin{aligned} &\bar{\xi}_{k}\leq\bar{\zeta}_{k},\\ &\bar{\zeta}_{k}\leq\zeta^{\max}.\\ \end{aligned}\right. (36)

Correspondingly, problem (34) can be further rewritten as

max𝒗^k|𝒗^kH𝒉1k|2γ\displaystyle\underset{\bm{\hat{v}}_{k}}{\mathop{\max}}\,|\bm{\hat{v}}_{k}^{H}\bm{h}_{1}^{k}|^{2}\gamma (37)
s.t.C¯2,C¯32:ΔDKLk0,\displaystyle\text{s.t.}~{}\bar{C}_{2},\bar{C}_{3-2}:\Delta D_{\text{KL}}^{k}\geq 0,
C¯42:DKLk(p¯0||p¯1)Emin,\displaystyle\quad~{}~{}\bar{C}_{4-2}:D_{\text{KL}}^{k}(\bar{p}_{0}||\bar{p}_{1})\geq E^{\min},

where

ΔDKLk\displaystyle\Delta D_{\text{KL}}^{k} =DKLk(p0||p1)DKLk(p¯0||p¯1)\displaystyle=D_{\text{KL}}^{k}(p_{0}||p_{1})-D_{\text{KL}}^{k}(\bar{p}_{0}||\bar{p}_{1}) (38)
=N[lnδ1kδ0k+δ0kδ1k(lnδ¯1kδ¯0k+δ¯0kδ¯1k)].\displaystyle=N\left[\ln\frac{\delta_{1}^{k}}{\delta_{0}^{k}}{+}\frac{\delta_{0}^{k}}{\delta_{1}^{k}}-\left(\ln\frac{\bar{\delta}_{1}^{k}}{\bar{\delta}_{0}^{k}}{+}\frac{\bar{\delta}_{0}^{k}}{\bar{\delta}_{1}^{k}}\right)\right].

Remark 1: By comparing problems (27) and (37), it can be seen that the potential adverse condition that lurks in problem (27) against the construction of CI is removed in problem (37). The purpose of problem (37) is to explore whether it is always possible to create a larger KLD by using the DL compared with that without the DL, which is different from the former. For illustration, Fig. 2 is provided to portray the relationship between different KLDs. By doing so, we can effectively enhance the backscattering strength without affecting or even reducing the DEP compared with the conventional BackCom system.

Note that problem (37) can be regarded as evolving from problem (27), but the proposed algorithm for problem (27) can not suitable for problem (37) since C¯32\bar{C}_{3-2} poses different challenge in solving the receive beamforming. This motivates us to design a new algorithm for problem (37).

Refer to caption

Figure 2: A schematic manifold for the KLD.

III-E Beamforming Design for Evolved CI

In order to make problem (37) more tractable, we propose Theorem 2.

Theorem 2: C¯32\bar{C}_{3-2} can be transformed into the equivalent form, i.e.,

|𝒗^kH𝒉1k|2|𝒗^kH𝒉0|2|𝒗^kH𝒉¯1k|2γ|𝒗^kH𝒉0|2|𝒗^kH𝒉¯1k|2.\displaystyle{{|\bm{\hat{v}}_{k}^{H}\bm{h}_{1}^{k}|^{2}{-}|\bm{\hat{v}}_{k}^{H}\bm{h}_{0}|^{2}}{-}|\bm{\hat{v}}_{k}^{H}\bm{\bar{h}}_{1}^{k}|^{2}}\geq\gamma{|\bm{\hat{v}}_{k}^{H}\bm{h}_{0}|^{2}|\bm{\hat{v}}_{k}^{H}\bm{\bar{h}}_{1}^{k}|^{2}}. (39)

Proof: Please see Appendix B.

Based on Theorem 1 and Theorem 2, problem (37) can be transformed into the following problem, i.e.,

max𝒗^k|𝒗^kH𝒉1k|2γs.t.C¯2,C¯33:|𝒗^kH𝒉1k|2|𝒗^kH𝒉0|2|𝒗^kH𝒉¯1k|2γ|𝒗^kH𝒉0|2|𝒗^kH𝒉¯1k|2,C¯43:γ|𝒗^kH𝒉¯1k|2F(gmin)1.\begin{split}&\underset{\bm{\hat{v}}_{k}}{\mathop{\max}}\,|\bm{\hat{v}}_{k}^{H}\bm{h}_{1}^{k}|^{2}\gamma\\ &\text{s.t.}~{}\bar{C}_{2},\bar{C}_{3-3}:{{|\bm{\hat{v}}_{k}^{H}\bm{h}_{1}^{k}|^{2}{-}|\bm{\hat{v}}_{k}^{H}\bm{h}_{0}|^{2}}{-}|\bm{\hat{v}}_{k}^{H}\bm{\bar{h}}_{1}^{k}|^{2}}\\ &\quad\quad\quad\quad\quad~{}~{}~{}\geq\gamma{|\bm{\hat{v}}_{k}^{H}\bm{h}_{0}|^{2}|\bm{\hat{v}}_{k}^{H}\bm{\bar{h}}_{1}^{k}|^{2}},\\ &\quad~{}~{}\bar{C}_{4-3}:\gamma{|\bm{\hat{v}}_{k}^{H}\bm{\bar{h}}_{1}^{k}|^{2}}\geq F(g^{\min})-1.\\ \end{split} (40)

Then, by introducing a new variable 𝑾k=𝒗^k𝒗^kH\bm{W}_{k}=\bm{\hat{v}}_{k}\bm{\hat{v}}_{k}^{H}, C¯33\bar{C}_{3-3} and C¯43\bar{C}_{4-3} can be transformed, respectively, into

Tr(𝑯1k𝑾k)Tr(𝑯0𝑾k)Tr(𝑯¯1k𝑾k)γTr(𝑯0𝑾k)Tr(𝑯¯1k𝑾k),\begin{split}&\text{Tr}(\bm{H}_{1}^{k}\bm{W}_{k}){-}\text{Tr}(\bm{H}_{0}\bm{W}_{k}){-}\text{Tr}(\bm{\bar{H}}_{1}^{k}\bm{W}_{k})\\ &\quad\quad\quad\quad~{}~{}~{}{\geq}\gamma\text{Tr}(\bm{H}_{0}\bm{W}_{k})\text{Tr}(\bm{\bar{H}}_{1}^{k}\bm{W}_{k}),\\ \end{split} (41)

and

γTr(𝑯¯1k𝑾k)F(gmin)1,\begin{split}\gamma{\text{Tr}(\bm{\bar{H}}_{1}^{k}\bm{W}_{k})}\geq F(g^{\min})-1,\\ \end{split} (42)

where 𝑯1k=𝒉1k(𝒉1k)H\bm{H}_{1}^{k}=\bm{h}_{1}^{k}(\bm{h}_{1}^{k})^{H}, 𝑯0=𝒉0𝒉0H\bm{H}_{0}=\bm{h}_{0}\bm{h}_{0}^{H}, and 𝑯¯1k=𝒉¯1k(𝒉¯1k)H\bm{\bar{H}}_{1}^{k}=\bm{\bar{h}}_{1}^{k}(\bm{\bar{h}}_{1}^{k})^{H}.

Thus, problem (40) can be expressed as

max𝑾kTr(𝑯1k𝑾k)γs.t.C¯21:Tr(𝑾k)=1,C¯34:Tr(𝑯1k𝑾k)Tr(𝑯0𝑾k)Tr(𝑯¯1k𝑾k)γTr(𝑯0𝑾k)Tr(𝑯¯1k𝑾k),C¯44:γTr(𝑯¯1k𝑾k)F(gmin)1,C¯5:Rank(𝑾k)=1.\begin{split}&\underset{\bm{W}_{k}}{\mathop{\max}}\,\text{Tr}(\bm{H}_{1}^{k}\bm{W}_{k})\gamma\\ &\text{s.t.}~{}\bar{C}_{2-1}:\text{Tr}(\bm{W}_{k})=1,\\ &\quad~{}~{}\bar{C}_{3-4}:\text{Tr}(\bm{H}_{1}^{k}\bm{W}_{k}){-}\text{Tr}(\bm{H}_{0}\bm{W}_{k}){-}\text{Tr}(\bm{\bar{H}}_{1}^{k}\bm{W}_{k})\\ &\quad\quad\quad\quad~{}~{}{\geq}\gamma\text{Tr}(\bm{H}_{0}\bm{W}_{k})\text{Tr}(\bm{\bar{H}}_{1}^{k}\bm{W}_{k}),\\ &\quad~{}~{}\bar{C}_{4-4}:\gamma{\text{Tr}(\bm{\bar{H}}_{1}^{k}\bm{W}_{k})}\geq F(g^{\min})-1,\\ &\quad~{}~{}\bar{C}_{5}:\text{Rank}(\bm{W}_{k})=1.\end{split} (43)

However, problem (43) is still a non-convex problem caused by the non-convexity in C¯34\bar{C}_{3-4}. In general, it is difficult or even intractable to obtain the global optimal solution to such a non-convex problem. To make it more treatable, we introduce a slack variable tkt_{k} such that Tr(𝑯0𝑾k)tk\text{Tr}(\bm{H}_{0}\bm{W}_{k})\leq t_{k}, problem (43) can be transformed into the following problem, i.e.,

max𝑾k,tkTr(𝑯1k𝑾k)γs.t.C¯21,C¯44,C¯5,C¯35:Tr(𝑯1k𝑾k)tkTr(𝑯¯1k𝑾k)γtkTr(𝑯¯1k𝑾k),C¯6:Tr(𝑯0𝑾k)tk.\begin{split}&\underset{\bm{W}_{k},t_{k}}{\mathop{\max}}\,\text{Tr}(\bm{H}_{1}^{k}\bm{W}_{k})\gamma\\ &\text{s.t.}~{}\bar{C}_{2-1},\bar{C}_{4-4},\bar{C}_{5},\\ &\quad~{}~{}\bar{C}_{3-5}:\text{Tr}(\bm{H}_{1}^{k}\bm{W}_{k}){-}t_{k}{-}\text{Tr}(\bm{\bar{H}}_{1}^{k}\bm{W}_{k})\\ &\quad\quad\quad\quad~{}~{}\geq\gamma t_{k}\text{Tr}(\bm{\bar{H}}_{1}^{k}\bm{W}_{k}),\\ &\quad~{}~{}\bar{C}_{6}:\text{Tr}(\bm{H}_{0}\bm{W}_{k})\leq t_{k}.\\ \end{split} (44)

It is noted that the rank-one constraint C¯5\bar{C}_{5} is an impediment to solving problem (44). Semi-definite relaxation (SDR) has been commonly adopted to tackle the rank-one constraint, which, however, may not result in a rank-one matrix. Moreover, some approximation methods, such as Gaussian randomization, may cause performance deterioration when the number of antennas is quite large [40]. To deal with this, C¯5\bar{C}_{5} is equivalently transformed into the following difference-of-convex function [41], such as

𝑾k𝑾k2=0,\displaystyle||\bm{W}_{k}||_{*}-||\bm{W}_{k}||_{2}=0, (45)

where 𝑾k=iδi(𝑾k)||\bm{W}_{k}||_{*}=\sum\limits_{i}\delta_{i}(\bm{W}_{k}) and 𝑾k2=δ1(𝑾k)||\bm{W}_{k}||_{2}=\delta_{1}(\bm{W}_{k}). It is noted that for any 𝑿\bm{X} belonging to the positive semi-definite matrix, 𝑿𝑿2=max𝑖δi(𝑿)||\bm{X}||_{*}\geq||\bm{X}||_{2}=\underset{i}{\mathop{\max}}~{}\delta_{i}(\bm{X}) is always held. The inequality can be treated as an equation if and only if 𝑿\bm{X} is a rank-one matrix, especially, δ1(𝑿)=𝑿2\delta_{1}(\bm{X})=||\bm{X}||_{2} and δi(𝑿)=0,i=2,,M.\delta_{i}(\bm{X})=0,\forall i=2,\cdots,M. As a result, (45) can be efficiently met for the rank-one constraint C¯5\bar{C}_{5}. However, (45) is still non-convex. To deal with it, a penalty function is employed, and thus problem (44) can be equivalently transformed into the following problem, such as

max𝑾k,tkTr(𝑯1k𝑾k)γχ(𝑾k𝑾k2)s.t.C¯21,C¯35,C¯44,C¯6.\begin{split}&\underset{\bm{W}_{k},t_{k}}{\mathop{\max}}\,\text{Tr}(\bm{H}_{1}^{k}\bm{W}_{k})\gamma-\chi(||\bm{W}_{k}||_{*}-||\bm{W}_{k}||_{2})\\ &\text{s.t.}~{}\bar{C}_{2-1},\bar{C}_{3-5},\bar{C}_{4-4},\bar{C}_{6}.\end{split} (46)

where C¯5\bar{C}_{5} is relaxed to a penalty term added to the objective function, and χ\chi is a constant which penalizes the objective function for any matrix whose rank is not one.

However, problem (46) is still an intractable problem with any χ>0\chi>0 due to the non-convexity of the objective function. To deal with this, the SCA method is applied. Specifically, for a given 𝑾k(j)\bm{W}_{k}(j) in the jj-th iteration of SCA, a convex upper bound for the penalty term can be obtained by using first-order Taylor expansion, which can be expressed as

𝑾k𝑾k2𝑾k𝑾¯k(j),\displaystyle||\bm{W}_{k}||_{*}-||\bm{W}_{k}||_{2}\leq||\bm{W}_{k}||_{*}-||\bar{\bm{W}}_{k}(j)||, (47)

where 𝑾¯k(j)𝑾k(j)2+Tr[𝒖¯(𝑾k(j))(𝒖¯(𝑾k(j)))H(𝑾k𝑾k(j))]\bar{\bm{W}}_{k}(j)\triangleq||\bm{W}_{k}(j)||_{2}+{\rm Tr}\left[\bar{\bm{u}}\left(\bm{W}_{k}(j)\right)\left(\bar{\bm{u}}(\bm{W}_{k}(j))\right)^{\rm H}\left(\bm{W}_{k}-\bm{W}_{k}(j)\right)\right] and 𝒖¯(𝑾k(j))\bar{\bm{u}}\left(\bm{W}_{k}(j)\right) represents the eigenvector corresponding to the largest eigenvalue of 𝑾k(j)\bm{W}_{k}(j) [41].

Algorithm 2 The Algotithm for Problem (48)
Input: KK, MM, NN, αk\alpha_{k}, hSTkh^{k}_{\text{ST}}, 𝒉SR\bm{h}_{\text{SR}}, 𝒉TRk\bm{h}^{k}_{\text{TR}}, σw2\sigma_{w}^{2}, σs2\sigma_{s}^{2}, ξmax\xi^{\max}, ζmax\zeta^{\max}.
Set: Choose a large TT. Define Δtk=(tkubtklb)/T\Delta{t_{k}}=(t_{k}^{\text{ub}}-t_{k}^{\text{lb}})/T.
Initialize: Set initial point γINI=0\gamma^{\text{INI}}=0.
Output: 𝒗^k\bm{\hat{v}}_{k}.
1: for i=0:Ti=0:T
2:     Set tk=iΔtk+tklbt_{k}=i\Delta t_{k}+t_{k}^{\text{lb}}.
3:     Set initial point 𝑾k(1)\bm{W}_{k}(1). iteration index j=1j=1.
4:     repeat
5:        With given 𝑾k(j)\bm{W}_{k}(j), obtain the intermediate
       solution 𝑾k\bm{W}_{k}^{*} by solving problem (48).
6:        Update j=j+1j=j+1 and 𝑾k=𝑾k(j)\bm{W}_{k}^{*}=\bm{W}_{k}(j).
7:     until convergence
8:     if Tr(𝑯1k𝑾k)γγINI\text{Tr}(\bm{H}_{1}^{k}\bm{W}_{k}^{*})\gamma\geq\gamma^{\text{INI}}
9:         Update γINI=Tr(𝑯1k𝑾k)γ\gamma^{\text{INI}}=\text{Tr}(\bm{H}_{1}^{k}\bm{W}_{k}^{*})\gamma.
10:     end if
11: end for
12: Recover 𝒗^k\bm{\hat{v}}_{k}^{*} from 𝑾k\bm{W}_{k}^{*}.

Thus, problem (46) can be finally rewritten as

max𝑾k,tkTr(𝑯1k𝑾k)γχ(𝑾k𝑾¯k(j))s.t.C¯21,C¯35,C¯44,C¯6.\begin{split}&\underset{\bm{W}_{k},t_{k}}{\mathop{\max}}\,\text{Tr}(\bm{H}_{1}^{k}\bm{W}_{k})\gamma-\chi(||\bm{W}_{k}||_{*}-||\bar{\bm{W}}_{k}(j)||)\\ &\text{s.t.}~{}\bar{C}_{2-1},\bar{C}_{3-5},\bar{C}_{4-4},\bar{C}_{6}.\end{split} (48)

Although problem (48) is not jointly concave with respect to 𝑾k\bm{W}_{k} and tkt_{k}, (48) is a convex optimization problem which can be solved optimally by using some commercial solvers such as CVX for a given tkt_{k}. Then the optimal tkt_{k} can be obtained by one-dimensional exhaustive search over tkt_{k}. Specifically, the upper and lower bounds of tkt_{k} can be chosen as [42], respectively,

{tkub=max𝑾kTr(𝑯0𝑾k)=λkmax(𝑯0),tklb=min𝑾kTr(𝑯0𝑾k)=λkmin(𝑯0).\left\{\begin{aligned} &t_{k}^{\text{ub}}=\max_{\bm{W}_{k}}\text{Tr}(\bm{H}_{0}\bm{W}_{k})=\lambda_{k}^{\max}(\bm{H}_{0}),\\ &t_{k}^{\text{lb}}=\min_{\bm{W}_{k}}\text{Tr}(\bm{H}_{0}\bm{W}_{k})=\lambda_{k}^{\min}(\bm{H}_{0}).\\ \end{aligned}\right. (49)

The detail of this algorithm is shown in Algorithm 2. Here, the computational complexity for Algorithm 2 is evaluated. Before solving problem (48), it needs 𝒪(T)\mathcal{O}(T) to determine the variables tkt_{k}. Given the number of constraints, interior point methods with a matrix variable 𝑾k\bm{W}_{k} of size M×MM\times M will take 𝒪(Mln(1/ϵ))\mathcal{O}(\sqrt{M}\ln(1/\epsilon)) iterations, with each iteration requiring 𝒪(M6)\mathcal{O}(M^{6}) arithmetic operations for the worst case. Letting the maximum iteration number for SCA is JJ, the total computation complexity for beamforming design is 𝒪(TJM6.5ln(1/ϵ))\mathcal{O}(TJM^{6.5}\ln(1/\epsilon)).

In what follows, the remaining issue of tag selection for both problem (17) and problem (33) is considered, which is a 0/1 nonlinear optimization problem. There have been quite a few existing methods to solve such NP-hard problems, such as greedy algorithm, simulated annealing, penalty dual decomposition (PDD) method [43], and some compressive sensing methods like LASSO [44] and matching pursuit [45]. In this paper, the greedy algorithm is applied. The detail of the greedy-based algorithm is shown in Algorithm 3. Furthermore, when the corresponding beamforming designs are determined via Algorithm 1 and Algorithm 2, respectively, it costs 𝒪(K)\mathcal{O}(K) for tag selection in Algorithm 3.

In summary, the absolute CI can be achieved in this case, but a higher computation complexity is incurred than the the case with the consensual CI. In other words, there is a tradeoff between CI strictness and computation complexity.

Algorithm 3 The Greedy Algorithm for Tag Selection
Input: KK, MM, NN, αk\alpha_{k}, hSTkh^{k}_{\text{ST}}, 𝒉SR\bm{h}_{\text{SR}}, 𝒉TRk\bm{h}^{k}_{\text{TR}}, σw2\sigma_{w}^{2}, σs2\sigma_{s}^{2}, ξmax\xi^{\max}, ζmax\zeta^{\max}.
Output: βk\beta_{k} and β^k\hat{\beta}_{k}.
1: for k=1:Kk=1:K
2:    Solve problem (31), obtain 𝒗k\bm{v}_{k}^{*} via Algorithm 1.
3:    Update Sk=|(𝒗k)H𝒉1|2γS_{k}=|(\bm{v}_{k}^{*})^{H}\bm{h}_{1}|^{2}\gamma.
4:    Solve problem (48), obtain 𝒗^k\bm{\hat{v}}_{k}^{*} via Algorithm 2.
5:    Update Qk=|(𝒗^k)H𝒉1|2γQ_{k}=|(\bm{\hat{v}}_{k}^{*})^{H}\bm{h}_{1}|^{2}\gamma.
6: end for
7: Obtain the optimal tag selection to (31) as βk=1\beta_{k^{*}}=1, where k=argmax𝑘Skk^{*}=\arg\underset{k}{\mathop{\max}}\ S_{k}.
8: Obtain the optimal tag selection to (48) as β^k=1\hat{\beta}_{k^{*}}=1, where k=argmax𝑘Qkk^{*}=\arg\underset{k}{\mathop{\max}}\ Q_{k}.

III-F Extension to a Multi-antenna PS

We have investigated the CI availability for a BackCom system with the single-antenna PS in the previous subsections. In what follows, we plan to explore the CI availability for a multiple-input and multiple-output (MIMO)-based BsckCom system by extending the PS with QQ transmit antennas. In contrast to the previous sections, due to the implementation of the multi-antenna PS, it is necessary to take into account the handling of the transmit beams. Building on this, the received signal of the reader with and without DL can be extended to

{yk(n)=𝒗kH((𝑯SR)H+αkBk𝒉TRk(𝒉¯STk)H)𝒙ks(n)+𝒗kH𝒘(n),y¯k(n)=𝒗kH𝒉TRk(𝒉¯STk)H𝒙kαkBks(n)+𝒗kH𝒘(n),\left\{\begin{aligned} &y_{k}(n){=}\bm{v}_{k}^{H}\left((\bm{H}_{\text{SR}})^{H}{+}\alpha_{k}B_{k}\bm{h}_{\text{TR}}^{k}(\bm{\bar{h}}_{\text{ST}}^{k})^{H}\right)\bm{x}_{k}s(n){+}{\bm{v}_{k}^{H}\bm{w}(n)},\\ &\bar{y}_{k}(n){=}\bm{v}_{k}^{H}\bm{h}_{\text{TR}}^{k}(\bm{\bar{h}}_{\text{ST}}^{k})^{H}\bm{x}_{k}\alpha_{k}B_{k}s(n){+}{\bm{v}_{k}^{H}\bm{w}(n)},\\ \end{aligned}\right. (50)

where 𝒉¯STkQ×1\bm{\bar{h}}_{\text{ST}}^{k}\in\mathbb{C}^{Q\times 1}, 𝑯SRQ×M\bm{H}_{\text{SR}}\in\mathbb{C}^{Q\times M}, and 𝒙kQ×1\bm{x}_{k}\in\mathbb{C}^{Q\times 1} denotes the transmit beamforming vector, which satisfies 𝒙k2=σs2||\bm{x}_{k}||^{2}=\sigma_{s}^{2}.

Similar to the analysis in the previous subsection, by redefining δ0k\delta_{0}^{k}, δ¯0k\bar{\delta}_{0}^{k}, δ1k\delta_{1}^{k}, and δ¯1k\bar{\delta}_{1}^{k} as

δik={|𝒗kH𝒈0𝒙k|2+σw2𝒗k2,i=0,|𝒗kH𝒈1k𝒙k|2+σw2𝒗k2,i=1,\delta_{i}^{k}=\left\{\begin{aligned} &|\bm{v}_{k}^{H}\bm{g}_{0}\bm{x}_{k}|^{2}+\sigma_{w}^{2}||\bm{v}_{k}||^{2},i=0,\\ &|\bm{v}_{k}^{H}\bm{g}_{1}^{k}\bm{x}_{k}|^{2}+\sigma_{w}^{2}||\bm{v}_{k}||^{2},i=1,\\ \end{aligned}\right. (51)
δ¯ik={|𝒗kH𝒈¯0𝒙k|2+σw2𝒗k2,i=0,|𝒗kH𝒈¯1k𝒙k|2+σw2𝒗k2,i=1,\bar{\delta}_{i}^{k}=\left\{\begin{aligned} &|\bm{v}_{k}^{H}\bm{\bar{g}}_{0}\bm{x}_{k}|^{2}+\sigma_{w}^{2}||\bm{v}_{k}||^{2},i=0,\\ &|\bm{v}_{k}^{H}\bm{\bar{g}}_{1}^{k}\bm{x}_{k}|^{2}+\sigma_{w}^{2}||\bm{v}_{k}||^{2},i=1,\\ \end{aligned}\right. (52)

the KLD and the DEP under different hypotheses with the DL can still be obtained as (21) and (22). Correspondingly, the KLD and the DEP under different hypotheses without the DL can still be represented by (23) and (24), where 𝒈0=(𝑯SR)H\bm{g}_{0}=(\bm{H}_{\text{SR}})^{H}, 𝒈¯0=𝟎\bm{\bar{g}}_{0}=\bm{0}, 𝒈1k=(𝑯SR)H+αk𝒉TRk(𝒉¯STk)H\bm{g}_{1}^{k}=(\bm{H}_{\text{SR}})^{H}{+}\alpha_{k}\bm{h}_{\text{TR}}^{k}(\bm{\bar{h}}_{\text{ST}}^{k})^{H}, and 𝒈¯1k=αk𝒉TRk(𝒉¯STk)H\bm{\bar{g}}_{1}^{k}=\alpha_{k}\bm{h}_{\text{TR}}^{k}(\bm{\bar{h}}_{\text{ST}}^{k})^{H}.

III-F1 Extension for Consensual CI

Using the same transformations as (25) and (26), problem (27) can be extended to

max𝒗k,𝒙k|𝒗kH𝒈1k𝒙k|2σw2\displaystyle\underset{\bm{v}_{k},\bm{x}_{k}}{\mathop{\max}}\,\frac{|\bm{v}_{k}^{H}\bm{g}_{1}^{k}\bm{x}_{k}|^{2}}{\sigma_{w}^{2}} (53)
s.t.C2:𝒗k2=1,\displaystyle\text{s.t.}~{}C_{2}:||\bm{v}_{k}||^{2}=1,
C3:DKLk(p0||p1)Dmin,\displaystyle\quad~{}~{}C_{3}:D_{\text{KL}}^{k}(p_{0}||p_{1})\geq D^{\min},
C4:DKLk(p¯0||p¯1)Emin,\displaystyle\quad~{}~{}C_{4}:D_{\text{KL}}^{k}(\bar{p}_{0}||\bar{p}_{1})\geq E^{\min},
C5:𝒙k2=σs2.\displaystyle\quad~{}~{}C_{5}:||\bm{x}_{k}||^{2}=\sigma_{s}^{2}.

III-F2 Extension for Evolved CI

Referring to the transformation of (35) and (36), problem (37) can be extended to

max𝒗^k,𝒙^k|𝒗^kH𝒈1k𝒙^k|2σw2\displaystyle\underset{\bm{\hat{v}}_{k},\bm{\hat{x}}_{k}}{\mathop{\max}}\,\frac{|\bm{\hat{v}}_{k}^{H}\bm{g}_{1}^{k}\bm{\hat{x}}_{k}|^{2}}{\sigma_{w}^{2}} (54)
s.t.C¯2:𝒗^k2=1,\displaystyle\text{s.t.}~{}\bar{C}_{2}:||\bm{\hat{v}}_{k}||^{2}=1,
C¯3:ΔDKLk0,\displaystyle\quad~{}~{}\bar{C}_{3}:\Delta D_{\text{KL}}^{k}\geq 0,
C¯4:DKLk(p¯0||p¯1)Emin,\displaystyle\quad~{}~{}\bar{C}_{4}:D_{\text{KL}}^{k}(\bar{p}_{0}||\bar{p}_{1})\geq E^{\min},
C¯5:𝒙^k2=σs2.\displaystyle\quad~{}~{}\bar{C}_{5}:||\bm{\hat{x}}_{k}||^{2}=\sigma_{s}^{2}.

III-F3 Algorithm Design

Algorithm 4 The Alternating Iteration Algorithm
Input: KK, MM, NN, QQ, αk\alpha_{k}, 𝒉¯STk\bm{\bar{h}}^{k}_{\text{ST}}, 𝑯SR\bm{H}_{\text{SR}}, 𝒉TRk\bm{h}^{k}_{\text{TR}}, σw2\sigma_{w}^{2}, σs2\sigma_{s}^{2}, ξmax\xi^{\max},
     ζmax\zeta^{\max}.
Set: Set the alternating iteration index s=1s=1.
Initialize: Set initial points 𝒗k(1)\bm{v}_{k}(1) and 𝒗¯k(1)\bm{\bar{v}}_{k}(1).
Output: 𝒙k\bm{x}_{k}, 𝒗k\bm{v}_{k}, 𝒙^k\bm{\hat{x}}_{k} and 𝒗¯k\bm{\bar{v}}_{k}.
For consensual CI via solving problem (53)
1: repeat
2:    With given 𝒗k(s)\bm{v}_{k}(s), obtain 𝒙k(s+1)\bm{x}_{k}(s+1) by solving
    problem (53) via Algorithm 1.
3:    With given 𝒙k(s+1)\bm{x}_{k}(s+1), obtain 𝒗k(s+1)\bm{v}_{k}(s+1) by solving
    problem (53) via Algorithm 1.
4:    Update s=s+1s=s+1.
5: until convergence
For evolved CI via solving problem (54)
1: repeat
2:    With given 𝒗^k(s)\bm{\hat{v}}_{k}(s), obtain 𝒙^k(s+1)\bm{\hat{x}}_{k}(s+1) by solving
    problem (54) via Algorithm 2.
3:    With given 𝒙^k(s+1)\bm{\hat{x}}_{k}(s+1), obtain 𝒗^k(s+1)\bm{\hat{v}}_{k}(s+1) by solving
    problem (54) via Algorithm 2.
4:    Update s=s+1s=s+1.
5: until convergence

Compared with problem (27) and problem (37) in the previous subsections, problem (53) and problem (54) seem to be more thorny beyond the direct application of the proposed algorithms. A turnaround in this deadlock is possible thanks to the alternating optimization method. Taking problem (53) as an example, when 𝒙k\bm{x}_{k} is fixed, the resulting problem can be regarded as formally equivalent to that of problem (27), which can be solved using Algorithm 1. Likewise, when 𝒗k\bm{v}_{k} is fixed, the resulting problem can be solved by the same way. Then, using the alternating iteration method, problem (53) is solved when the results of the alternation converge. Not surprisingly, problem (54) can also be solved using alternating optimization. Similarly, the desired solution for problem (54) can be obtained by alternately using Algorithm 2 by fixing 𝒙^k\bm{\hat{x}}_{k} and 𝒗^k\bm{\hat{v}}_{k} separately. The detail of the proposed alternating iteration algorithm is shown in Algorithm 4.

Note that Algorithm 4 applies under the presumption that the kk-th tag has already been selected. Then, how to select the optimal tag for transmission can be done according to the proposed Algorithm 3.

III-G Feasible Region for Input SNR and CI Angle

In previous subsections, we have investigated and analyzed the CI availability for the multi-antenna BackCom system with the beamforming design. However, the ointment is that some analytical insights have not been obtained due to its intractability. In this subsection, in order to gain more insights into the CI, we consider degrading the system with SIMO/MIMO into a one with single input single output (SISO) to facilitate our analysis for the CI. In particular, according to (3) and (10), the received signal of the reader with and without the DL can be degraded into

{yk(n)=hSRs(n)+BkhSTRks(n)+w(n),y¯k(n)=BkhSTRks(n)+w(n),\left\{\begin{aligned} &y_{k}(n)=h_{\text{SR}}s(n)+B_{k}h^{k}_{\text{STR}}s(n)+w(n),\\ &\bar{y}_{k}(n)=B_{k}h^{k}_{\text{STR}}s(n)+w(n),\end{aligned}\right. (55)

where hSRh_{\text{SR}} and hSTRk=αkhSTkhTRkh_{\text{STR}}^{k}=\alpha_{k}h_{\text{ST}}^{k}h_{\text{TR}}^{k} denote the channel coefficients of the DL and the BL, respectively. hSTkh_{\text{ST}}^{k} and hTRkh_{\text{TR}}^{k} are the channel coefficients of the forward link and backward link for the kk-th tag. w(n)w(n) is the noise at the reader with zero mean and variance σw2\sigma_{w}^{2}.

Similar to the previous analysis on the KLDs under two hypotheses (i.e., 0\mathcal{H}_{0} and 1\mathcal{H}_{1}), to make the DLI constructive, the following KLD constraint for the kk-th tag need to be satisfied

ΔDKLk=N[(lnδ1kδ0+δ0δ1k)(lnδ¯1kδ¯0+δ¯0δ¯1k)]0.\displaystyle\Delta D_{\text{KL}}^{k}=N\left[\left(\ln\frac{\delta_{1}^{k}}{\delta_{0}}+\frac{\delta_{0}}{\delta_{1}^{k}}\right)-\left(\ln\frac{\bar{\delta}_{1}^{k}}{\bar{\delta}_{0}}+\frac{\bar{\delta}_{0}}{\bar{\delta}_{1}^{k}}\right)\right]\geq 0. (56)

where δ0=σs2|h0|2+σw2\delta_{0}=\sigma_{s}^{2}|h_{0}|^{2}+\sigma_{w}^{2}, δ¯0=σs2|h¯0|2+σw2\bar{\delta}_{0}=\sigma_{s}^{2}|\bar{h}_{0}|^{2}+\sigma_{w}^{2}, δ1k=σs2|h1k|2+σw2\delta_{1}^{k}=\sigma_{s}^{2}|h_{1}^{k}|^{2}+\sigma_{w}^{2}, δ¯1k=σs2|h¯1k|2+σw2\bar{\delta}_{1}^{k}=\sigma_{s}^{2}|\bar{h}_{1}^{k}|^{2}+\sigma_{w}^{2}, h0=hSRh_{0}=h_{\text{SR}}, h¯0=0\bar{h}_{0}=0, h1k=hSR+hSTRkh_{1}^{k}=h_{\text{SR}}+h^{k}_{\text{STR}}, and h¯1k=hSTRk\bar{h}_{1}^{k}=h^{k}_{\text{STR}}.

On the other hand, by degrading C42C_{4-2}, we have

N(lnδ¯1kδ¯0+δ¯0δ¯1k1)Ekmin.\displaystyle N\left(\ln\frac{\bar{\delta}_{1}^{k}}{\bar{\delta}_{0}}+\frac{\bar{\delta}_{0}}{\bar{\delta}_{1}^{k}}-1\right)\geq E^{\min}_{k}. (57)

To reveal the CI region, theorem 3 is proposed.

Theorem 3: The evolved CI can be achieved when the input SNR (γ\gamma) is satisfied, i.e.,

F(gmin)1|hSTRk|2γ(hSR)HhSTRk+hSR(hSTRk)H|hSR|2|hSTRk|2.\displaystyle\frac{F(g^{\min})-1}{|h^{k}_{\text{STR}}|^{2}}\leq\gamma\leq\frac{(h_{\text{SR}})^{H}h^{k}_{\text{STR}}+h_{\text{SR}}(h^{k}_{\text{STR}})^{H}}{|h_{\text{SR}}|^{2}|h^{k}_{\text{STR}}|^{2}}. (58)

Proof: Please see Appendix C.

Remark 2: From (LABEL:s3c), it can be seen that the evolved CI region for γ\gamma is obtained. To be specific, the introduced DLI is fully constructive for BackCom systems when γ\gamma lies within this region. Besides, as gming^{\min} becomes larger, the lower bound for γ\gamma will become more strict accordingly, and the system may not be able to achieve the desired performance with a small γ\gamma. On the other hand, when the channel gain of the BL becomes small, it will also increase the lower bound of γ\gamma, which shows that more transmit power is needed to construct the CI region with a lower BL gain. However, once the required γ\gamma exceeds its upper bound, the evolved CI will cease to exist.

To further show the relationship between the BL and the DL, we give theorem 4.

Theorem 4: Letting θkhSR,hSTRk\theta_{k}\triangleq\angle\left\langle h_{\text{SR}},h^{k}_{\text{STR}}\right\rangle denote the angle between the DL and the BL, the resulting DLI is constructive when θk\theta_{k} satisfies the following condition, i.e.,

0θk\displaystyle 0\leq\theta_{k} min{π2,arccos12γ|hSR||hSTRk|},\displaystyle\leq\min\left\{\frac{\pi}{2},\arccos\frac{1}{2}\gamma{|h_{\text{SR}}||h^{k}_{\text{STR}}|}\right\}, (59)

where γF(gmin)1|hSTRk|2\gamma\geq\frac{F(g^{\min})-1}{|h^{k}_{\text{STR}}|^{2}}.

Proof: Please see Appendix D.

Remark 3: It can be seen that the CI angle can be expressed as (59). In particular, arccos12γ|hSR||hSTRk|\arccos\frac{1}{2}\gamma{|h_{\text{SR}}||h^{k}_{\text{STR}}|} is gradually narrowing the gap with π2\frac{\pi}{2} with the decreasing γ\gamma, |hSTRk||h^{k}_{\text{STR}}|, and |hSR||h_{\text{SR}}|. When γmin=F(gmin)1|hSTRk|2\gamma^{\min}=\frac{F(g^{\min})-1}{|h^{k}_{\text{STR}}|^{2}} holds, the maximum CI angle can be achieved by substituting γ\gamma^{*} into (59), i.e., θkmax=arccos|hSR|2F(gmin)1|hSTRk|\theta_{k}^{\max}=\arccos\frac{|h_{\text{SR}}|}{2}\frac{F(g^{\min})-1}{|h^{k}_{\text{STR}}|}. It is noted that θkmax\theta_{k}^{\max} is decreased with the increasing gming^{\min} and the increasing |hSTRk||h_{\text{STR}}^{k}|. That is to say, the maximum CI angle mainly depends on the minimum KLD requirement with the determined channel gains. The simulation results below also verify what we have analysed.

IV Simulation Results

In this section, we present the simulation results of our proposed algorithms for BackCom networks. We assume that there are one PS, one reader with 4 antennas (i.e., M=4M=4), and 5 tags (i.e., K=5K=5) in the proposed system. The distances between the PS and tags, the PS and the reader, as well as the reader to tags are both within 5 meters. wkw_{k} is set to follow 𝒞𝒩(0,0.03)\mathcal{CN}(0,0.03) [46]. Other parameters include αk=0.8\alpha_{k}=0.8, ξmax=ζmax=0.5\xi^{\max}=\zeta^{\max}=0.5, and T=J=L=103T=J=L=10^{3}. The simulation results are evaluated based on the CVX package [47].

Besides, we consider the distance-dependent path loss as large scale fading, and Rician fading as small scale fading for all channels [18, 48]. For example, the channel between the PS and the reader is given by 𝒉SR=κκ+1𝒉SRLoS+1κ+1𝒉SRNLoS\bm{h}_{\text{SR}}=\sqrt{\frac{\kappa}{\kappa+1}}\bm{h}_{\text{SR}}^{\text{LoS}}+\sqrt{\frac{1}{\kappa+1}}\bm{h}_{\text{SR}}^{\text{NLoS}}, where κ=2.8\kappa=2.8 is the Rician factor, 𝒉SRLoSM×1\bm{h}_{\text{SR}}^{\text{LoS}}\in\mathbb{C}^{M\times 1} and 𝒉SRNLoSM×1\bm{h}_{\text{SR}}^{\text{NLoS}}\in\mathbb{C}^{M\times 1} are the line-of-sight (LoS) and non-line-of-sight (NLoS) components of 𝒉SR\bm{h}_{\text{SR}}, respectively. Specifically, 𝒉SRLoS=[1,ejπsin(θi),,ejπ(M1)sin(θi)]\bm{h}_{\text{SR}}^{\text{LoS}}=[1,e^{-j\pi\sin(\theta_{i})},\dots,e^{-j\pi(M-1)\sin(\theta_{i})}], where θi\theta_{i} is the the direction of the PS to the reader. 𝒉SRNLoS\bm{h}_{\text{SR}}^{\text{NLoS}} follows the standard Rayleigh fading. The average power of 𝒉SR\bm{h}_{\text{SR}} is then normalized by dSRρd_{\text{SR}}^{-\rho} , where dSRd_{\text{SR}} is the distance between the PS and the reader, and ρ=3\rho=3 is the path-loss exponent.

In what follows, we will demonstrate the superiority of the proposed schemes from the perspectives of system performance and CI existence, respectively.

Refer to caption
(a) The received SINR/SNR versus the transmit power of the PS.
Refer to caption
(b) The KLD and the DEP versus the transmit power of the PS.
Figure 3: The algorithm comparison and the evolved CI region analysis under the transmit power of the PS.

IV-A System Performance with SIMO and MIMO

In this subsection, we begin by investigating the system performance for SIMO- and MIMO-based BackComs, where the CI is guaranteed. For algorithm comparison, we define three benchmark algorithms, such as

  • The algorithm with harmful DLI

    The DL, as usual, is regarded as the harmful interference in this algorithm, which means that the DL no longer assist in enhancing the backscattering signal. This also results in a new optimization problem and a new solution, which are detailed in Appendix E.

  • The algorithm with canceled DLI

    This scheme is consistent with the existing assumption that the DLI can be perfectly canceled. That is to say, each tag can enjoy interference-free transmission. This scheme can be obtained from the proposed scheme by removing the CI constraint and the DL.

  • The algorithm with Random Tag Selection

    Different from the proposed algorithm, each tag is selected randomly under this scheme. This scheme can be obtained from the proposed scheme by replacing the greedy algorithm with a random approach, which can reduce the computation complexity.

Refer to caption
(a) The received SINR/SNR versus the channel path-loss exponent.
Refer to caption
(b) The KLD and DEP versus the channel path-loss exponent.
Figure 4: The algorithm comparison and the evolved CI region versus the channel path-loss exponent.

The purpose is to evaluate the performance and effectiveness of the proposed algorithms under different aspects by comparing them with benchmark algorithms. On the one hand, by comparing the algorithm with harmful DL, we can measure the benefit of considering CI on the system performance. On the other hand, by comparing the algorithm without the DL, we can evaluate the effectiveness of the proposed algorithms in enhancing the backscattered signal power. Besides, by comparing the algorithm with random tag selection, we can evaluate the gap between optimal and random selection. In the following, we compare the proposed algorithms with these benchmark algorithms with respect to the transmit power of the PS, the number of receive antennas, and the channel gains, respectively, to demonstrate the performance and implications of the proposed algorithms.

The algorithm comparison and CI region analysis under the transmit power of the PS (σs2\sigma_{s}^{2}) are shown in Fig. 3(a) and Fig. 3(b), respectively. From Fig. 3(a), it can be seen that, unsurprisingly, the received SINR/SNR of all algorithms increases with the increase in σs2\sigma_{s}^{2}. Noteworthy, the received SINR/SNR of both the algorithms with the canceled DL and the harmful DL is significantly smaller than that of the proposed algorithms. This behavior is due to the fact that they lose the boost from the DL to enhance the strength of the backscattered signal, thus resulting in the SINR/SNR of them is unable to be raised. However, it has to be admitted that the performance of the proposed algorithm with evolved CI is as good as that with consensual CI , but its feasible domain is restricted in a region. For the lower bound of the feasible region, it is limited by the minimum KLD threshold (or the required DEP) for all algorithms, especially, a tag with the worse BL condition needs a larger transmit power to satisfy this requirement. And For the upper bound of the feasible region, there is no limitation for other algorithms, except the proposed algorithm with evolved CI. The reason is that its upper bound is limited by the maximum evolved CI limitation (or the gap of KLDs). For a more intuitive interpretation of the CI region, Fig. 3(b) shows the KLD and the DEP versus σs2\sigma_{s}^{2}. From the perspective of DEP, the DEP without the DL only meets the preset when the transmit power reaches a certain level. On the other hand, when the transmit power is too large, the DEP with the DL will exceed the DEP without the DL, which means that the DL is not fully constructive for BackComs. Although the changes of the KLD versus the transmit power show the opposite trend to the DEP, the construction of CI regions is the same end.

Fig. 4 shows the algorithm comparison and CI region analysis under the channel path-loss exponent. Specifically, from Fig. 4(a), we can see that the received SINR/SNR of all algorithms decreases with the decreasing channel path-loss exponent. This is because the corresponding channel gains are degraded with the decrease in channel path-loss exponent. Similarly, the performance of the proposed algorithms is better than that of the other algorithms. The reason is that the DL is able to enhance the BL so that the backscattering capacity can be improved. Besides, the feasible region of the proposed algorithm with evolved CI is limited in order to meet the requirements of the evolved CI. As a supplementary for the evolved CI region, Fig. 4(b) shows the formation of the CI region from the perspective of the KLD and the DEP. It can be seen that the KLD with the DL is smaller than that without the DL when the channel path-loss exponent is less than 2.75, which means that the DL is harmful to the BackCom system. On the other hand, the KLD without the DL can not achieve the minimum threshold when the channel path-loss exponent is larger than 3.7, which means that the essential detection requirement can not be satisfied. The same analysis can apply to the DEP.

Refer to caption

Figure 5: The received SINR/SNR versus the number of receive antennas.

Fig. 5 shows the received SINR/SNR versus the number of receive antennas (MM). It is seen that as MM increases, the received SINR/SNR of all algorithms increases gradually, which is attributed to the improvement in beamforming gain due to the increase in MM. Although the algorithm with random selection has the advantage of low complexity compared to the proposed algorithm, the system performance can not be guaranteed. Moreover, the received SINR/SNR of the proposed algorithms is higher than that of both the algorithms with the canceled DL and the harmful DL since the DL can be borrowed to reinforce the backscattering transmission in this region. It is noted that the evolved CI region under the proposed algorithm can not be built when MM is too small and too large. This is because when MM is small, the DEP requirement for the proposed algorithm cannot be satisfied. On the other hand, when MM is relatively large, the signal from the DL is too strong to keep the DLI constructive, which can be explained through the same reason as Fig. 3 and Fig. 4.

Refer to caption

Figure 6: The received SINR/SNR versus the number of transmit antennas.

By extending the single-antenna PS to a multi-antenna one, as shown in Fig. 6, we numerically evaluate the system performance with MIMO. Specifically, Fig. 6 shows the received SINR/SNR versus the number of transmit antennas (QQ) with σs2=0.6\sigma_{s}^{2}=0.6 W. As QQ increases, the received SINR/SNR of all algorithms increases gradually, which can be attributed to an increase in beamforming gain. Besides, the received SINR/SNR of the proposed algorithms is higher than that of both the algorithms with canceled DL and the harmful DL, since the DL can enhance the BL. It is noted that the evolved CI region under the proposed algorithm is beingless when MM is large than 4. It is due to the strong signal from the DL that it is impossible to keep the DLI constructive when QQ is relatively large for the same reason outlined in Fig. 5.

Refer to caption
(a) The transmit power versus the acceptable DEP (ζmax\zeta^{\max}).
Refer to caption
(b) The CI angle versus the acceptable DEP (ζmax\zeta^{\max}).
Figure 7: The transmit power and the CI angle versus the acceptable DEP.
Refer to caption
(a) The transmit power versus the channel path-loss exponent.
Refer to caption
(b) The CI angle versus the channel path-loss exponent.
Figure 8: The transmit power and the CI angle versus the channel path-loss exponent.

IV-B CI Existence with SISO

In this subsection, we numerically evaluate the feasible region of the transmit power of the PS and the CI angle with N=10N=10 for the evolved CI requirement, as shown in Fig. 7 and 8, in SISO-based BackComs.

Fig. 7 shows the transmit power and the CI angle versus the acceptable DEP (ζmax\zeta^{\max}). Fig. 7(a) shows the lower and upper bounds of the transmit power for building the CI under different ζmax\zeta^{\max}. As ζmax\zeta^{\max} increases, only the lower bound of the transmit power decreases, while its upper bound is unaffected. The reason is that the increased ζmax\zeta^{\max} makes DminkD_{{\min}}^{k} lower so that a small power is enough to satisfy the required KLD. This also illustrates that the CI region of transmit power becomes wider with a higher ζmax\zeta^{\max}. Besides, it can be seen that, from Fig. 7(b), the maximum CI angle decreases with the decreasing ζmax\zeta^{\max}. This means that when the DEP requirement becomes stricter, the feasible region of the CI angle is shrunk. In combination with Fig. 6(a), it shows a trade-off between the size of the CI region and the DEP, especially for the lower bound of the CI region.

The transmit power and the CI angle under the channel path-loss exponent are shown in Fig. 8(a) and Fig. 8(b), respectively. From Fig. 8(a), both the upper and lower bounds of the transmit power increase with the channel path-loss exponent, and the gap between them becomes more significant (i.e., the CI region of the transmit power becomes larger). The reason is that when the channel path-loss exponent becomes larger, the channel gain of both the DL and the BL decreases, which not only leads to a larger transmit power needed to satisfy the minimum KLD requirement but also enlarges the upper bound of the transmit power according to (LABEL:s3c). There is a weakly increasing trend of the maximum CI angle with the growth of the channel path-loss exponent as shown in Fig. 8(b). Since according to the expression of θkmax\theta_{k}^{\max}, |hSR||h_{\text{SR}}| and |hSTRk||h^{k}_{\text{STR}}| are in conflict, which attenuates the effect on maximum CI angle. In short, when the channel path-loss exponent is larger, the construction of the CI region has higher freedom.

V Conclusions

This paper investigates and analyzes the CI region for BackComs with multiple tags and a multi-antennas reader, where tag selection and receive beamforming are taken into account. Specifically, a KLD-oriented approach is proposed to build the CI region for the DLI, and two optimization problems under different CI requirements with the single- and multi-antenna PSs, respectively, are formulated. Then, we reformulate these original problems with some transformation, and then propose the corresponding algorithms, respectively, which involve two SCA-based alternative algorithms for beamforming design, and a greedy algorithm for tag selection. Furthermore, a closed-form expression for the CI angle is derived in the BackCom system with a single-antenna reader. Simulation results show that the performance of the proposed algorithm outperforms benchmark algorithms in terms of the received SNR, and confirm the derived channel angle for the CI.

Appendix A Proof of Theorem 1

Defining f(x)=lnx+1xf(x)=\ln x+\frac{1}{x}, where x>0x>0, the first-order derivative of f(x)f(x) is

f(x)x=1x1x2={<0,0<x<1,=0,x=1,>0,x>1.\frac{\partial f(x)}{\partial x}{=}\frac{1}{x}-\frac{1}{x^{2}}=\left\{\begin{aligned} &<0,0<x<1,\\ &=0,x=1,\\ &>0,x>1.\\ \end{aligned}\right. (60)

Letting xk=δ1kδ0kx_{k}=\frac{\delta_{1}^{k}}{\delta_{0}^{k}} and x¯k=δ¯1kδ¯0k\bar{x}_{k}=\frac{\bar{\delta}_{1}^{k}}{\bar{\delta}_{0}^{k}}, we have

{xk=|𝒗kH𝒉1k|2σs2+σw2|𝒗kH𝒉0|2σs2+σw2=(|𝒗kH𝒉1k|2|𝒗kH𝒉0|2)σs2|𝒗kH𝒉0|2σs2+σw2+11,x¯k=|𝒗kH𝒉¯1k|2σs2+σw2σw2=|𝒗kH𝒉¯1k|2σs2σw2+11.\left\{\begin{aligned} &x_{k}{=}\frac{|\bm{v}_{k}^{H}\bm{h}_{1}^{k}|^{2}\sigma_{s}^{2}+\sigma_{w}^{2}}{|\bm{v}_{k}^{H}\bm{h}_{0}|^{2}\sigma_{s}^{2}+\sigma_{w}^{2}}\\ &\quad~{}{=}\frac{(|\bm{v}_{k}^{H}\bm{h}_{1}^{k}|^{2}{-}|\bm{v}_{k}^{H}\bm{h}_{0}|^{2})\sigma_{s}^{2}}{|\bm{v}_{k}^{H}\bm{h}_{0}|^{2}\sigma_{s}^{2}+\sigma_{w}^{2}}+1\geq 1,\\ &\bar{x}_{k}{=}\frac{|\bm{v}_{k}^{H}\bm{\bar{h}}_{1}^{k}|^{2}\sigma_{s}^{2}+\sigma_{w}^{2}}{\sigma_{w}^{2}}{=}\frac{|\bm{v}_{k}^{H}\bm{\bar{h}}_{1}^{k}|^{2}\sigma_{s}^{2}}{\sigma_{w}^{2}}+1\geq 1.\\ \end{aligned}\right. (61)

Thus, C32C_{3-2} can be written as

f(xk)=lnxk+1xkfmin,f(x_{k})=\ln x_{k}+\frac{1}{x_{k}}\geq f^{\min},\\ (62)

where fmin=DminN+1f^{\min}=\frac{D^{\min}}{N}+1.

Refer to caption

Figure 9: The schematic diagram for f(xk)f(x_{k}).

As shown in the Fig. 9, there are two potential solution regions for xkx_{k} satisfying (62). According to the limitation of the feasible region in (61), we can round off a solution region. However, it is still challenging to solve this inequality due to its non-convexity. To this end, taking (62) as an equivalent transformation, we have

(lnxkfmin)exp(lnxkfmin)exp(fmin).\displaystyle(\ln x_{k}{-}f^{\min})\exp(\ln x_{k}{-}f^{\min})\geq{-}\exp({-}f^{\min}). (63)

Since exp(fmin)[exp(1),0){-}\exp({-}f^{\min})\in[{-}\exp({-}1),0), based on Lambert WW function [49], we have

{lnxkfminW1(exp(fmin)),0<xk<1,(Neglect)lnxkfminW0(exp(fmin)),xk1.\left\{\begin{aligned} &\ln x_{k}{-}f^{\min}\leq W_{{-}1}({-}\exp(-f^{\min})),0{<}x_{k}{<}1,(\text{Neglect})\\ &\ln x_{k}{-}f^{\min}\geq W_{0}(-\exp(-f^{\min})),x_{k}\geq 1.\\ \end{aligned}\right. (64)

Thus, we can obtain the solutions of xkx_{k}, i.e.,

{xkF¯(fmin),0<xk<1,(Neglect)xkF(fmin),xk1,\left\{\begin{aligned} &x_{k}\leq\bar{F}(f^{\min}),0{<}x_{k}{<}1,(\text{Neglect})\\ &x_{k}\geq F(f^{\min}),x_{k}\geq 1,\\ \end{aligned}\right. (65)

where F¯(x)=exp(W1(exp(x))+x)\bar{F}(x)=\exp(W_{-1}(-\exp(-x))+x) and F(x)=exp(W0(exp(x))+x)F(x)=\exp(W_{0}(-\exp(-x))+x).

Similarly, C42C_{4-2} can be rewritten as

x¯kF(gmin),\displaystyle\bar{x}_{k}\geq F(g^{\min}), (66)

where gminEminN+1g^{\min}\triangleq\frac{E^{\min}}{N}+1. This completes the proof.

Appendix B Proof of Theorem 2

Based on (60) and (61), C¯32\bar{C}_{3-2} can be rewritten as

lnxk+1xk(lnx¯k+1x¯k)0.\ln x_{k}+\frac{1}{x_{k}}-(\ln\bar{x}_{k}+\frac{1}{\bar{x}_{k}})\geq 0.\\ (67)

According to its monotonicity, we can equivalently convert f(xk)f(x¯k)0f(x_{k})-f(\bar{x}_{k})\geq 0 into xkx¯kx_{k}\geq\bar{x}_{k} and xk<0<x¯kx_{k}<0<\bar{x}_{k} (which is neglected according to the feasible region). That is to say, C¯32\bar{C}_{3-2} can be transformed by the following form, i.e.,

|𝒗^kH𝒉1k|2|𝒗^kH𝒉0|2|𝒗^kH𝒉0|2σs2+σw2|𝒗^kH𝒉¯1k|2σw2,\frac{|\bm{\hat{v}}_{k}^{H}\bm{h}_{1}^{k}|^{2}{-}|\bm{\hat{v}}_{k}^{H}\bm{h}_{0}|^{2}}{|\bm{\hat{v}}_{k}^{H}\bm{h}_{0}|^{2}\sigma_{s}^{2}+\sigma_{w}^{2}}\geq\frac{|\bm{\hat{v}}_{k}^{H}\bm{\bar{h}}_{1}^{k}|^{2}}{\sigma_{w}^{2}},\\ (68)

or equivalently

|𝒗^kH𝒉1k|2|𝒗^kH𝒉0|2|𝒗kH𝒉¯1k|2|𝒗^kH𝒉0|2|𝒗^kH𝒉¯1k|2γ.\frac{{|\bm{\hat{v}}_{k}^{H}\bm{h}_{1}^{k}|^{2}{-}|\bm{\hat{v}}_{k}^{H}\bm{h}_{0}|^{2}}{-}|\bm{v}_{k}^{H}\bm{\bar{h}}_{1}^{k}|^{2}}{|\bm{\hat{v}}_{k}^{H}\bm{h}_{0}|^{2}|\bm{\hat{v}}_{k}^{H}\bm{\bar{h}}_{1}^{k}|^{2}}\geq\gamma.\\ (69)

This completes the proof.

Appendix C Proof of Theorems 3

According to (56), we can obtain

lnδ1kδ0+δ0δ1klnδ¯1kδ¯0+δ¯0δ¯1k.\displaystyle\ln\frac{\delta_{1}^{k}}{\delta_{0}}+\frac{\delta_{0}}{\delta_{1}^{k}}\geq\ln\frac{\bar{\delta}_{1}^{k}}{\bar{\delta}_{0}}+\frac{\bar{\delta}_{0}}{\bar{\delta}_{1}^{k}}. (70)

Based on (67) and (68), (70) can be transformed into

σs2|h1k|2+σw2σs2|h0|2+σw2σs2|h¯1k|2+σw2σs2|h¯0|2+σw2,\displaystyle\frac{\sigma_{s}^{2}|h_{1}^{k}|^{2}+\sigma_{w}^{2}}{\sigma_{s}^{2}|h_{0}|^{2}+\sigma_{w}^{2}}\geq\frac{\sigma_{s}^{2}|\bar{h}_{1}^{k}|^{2}+\sigma_{w}^{2}}{\sigma_{s}^{2}|\bar{h}_{0}|^{2}+\sigma_{w}^{2}}, (71)

or equivalently

|hSR+hSTRk|2|hSR|2σs2|hSR|2+σw2|hSTRk|2σw2\displaystyle\frac{|h_{\text{SR}}+h^{k}_{\text{STR}}|^{2}-|h_{\text{SR}}|^{2}}{\sigma_{s}^{2}|h_{\text{SR}}|^{2}+\sigma_{w}^{2}}\geq\frac{|h^{k}_{\text{STR}}|^{2}}{\sigma_{w}^{2}} (72)
\displaystyle\Leftrightarrow (|hSR+hkSTR|2|hSR|2|hSTRk|2)σw2\displaystyle(|h_{\text{SR}}+h_{k}^{\text{STR}}|^{2}-|h_{\text{SR}}|^{2}-|h^{k}_{\text{STR}}|^{2})\sigma_{w}^{2}
σs2|hSR|2|hSTRk|2\displaystyle\quad\quad\quad\geq\sigma_{s}^{2}|h^{\text{SR}}|^{2}|h^{k}_{\text{STR}}|^{2}
\displaystyle\Leftrightarrow (hSR)HhSTRk+hSR(hSTRk)H|hSR|2|hSTRk|2γ.\displaystyle\frac{(h_{\text{SR}})^{H}h^{k}_{\text{STR}}+h_{\text{SR}}(h^{k}_{\text{STR}})^{H}}{|h_{\text{SR}}|^{2}|h^{k}_{\text{STR}}|^{2}}\geq\gamma.

Besides, according to Appendix A, (57) can be transformed into

γF(gmin)1|hSTRk|2.\displaystyle\gamma\geq\frac{F(g^{\min})-1}{|h^{k}_{\text{STR}}|^{2}}. (73)

Thus, the CI region with respect to γ\gamma can be expressed as

F(gmin)1|hSTRk|2γ(hSR)HhSTRk+hSR(hSTRk)H|hSR|2|hSTRk|2.\displaystyle\frac{F(g^{\min})-1}{|h^{k}_{\text{STR}}|^{2}}\leq\gamma\leq\frac{(h_{\text{SR}})^{H}h^{k}_{\text{STR}}+h_{\text{SR}}(h^{k}_{\text{STR}})^{H}}{|h_{\text{SR}}|^{2}|h^{k}_{\text{STR}}|^{2}}. (74)

This completes the proof.

Appendix D Proof of Theorems 4

According to the definition of vectorial angle, we have

coshSR,hSTRk=|hSR,hSTRk||hSR||hSTRk|=(hSR)HhSTRk|hSR||hSTRk|.\displaystyle\cos\left\langle h_{\text{SR}},h^{k}_{\text{STR}}\right\rangle=\frac{|\left\langle h_{\text{SR}},h^{k}_{\text{STR}}\right\rangle|}{|h_{\text{SR}}||h^{k}_{\text{STR}}|}=\frac{(h_{\text{SR}})^{H}h^{k}_{\text{STR}}}{|h_{\text{SR}}||h^{k}_{\text{STR}}|}. (75)

Similarly, we can obtain

coshSTRk,hSR=(hSTRk)HhSR|hSR||hSTRk|.\displaystyle\cos\left\langle h^{k}_{\text{STR}},h_{\text{SR}}\right\rangle=\frac{(h^{k}_{\text{STR}})^{H}h_{\text{SR}}}{|h_{\text{SR}}||h^{k}_{\text{STR}}|}. (76)

According to (72), we have

coshSR,hSTRk+coshSTRk,hSRγ|hSR||hSTRk|.\displaystyle\cos\left\langle h_{\text{SR}},h^{k}_{\text{STR}}\right\rangle+\cos\left\langle h^{k}_{\text{STR}},h_{\text{SR}}\right\rangle\geq\gamma{|h_{\text{SR}}||h^{k}_{\text{STR}}|}. (77)

Due to the mutuality of angles, we have

θk=hSR,hSTRkarccos12γ|hSR||hSTRk|.\displaystyle\theta_{k}=\angle\left\langle h_{\text{SR}},h^{k}_{\text{STR}}\right\rangle\leq\arccos\frac{1}{2}\gamma{|h_{\text{SR}}||h^{k}_{\text{STR}}|}. (78)

Further, it does not make sense when θk>π2\theta_{k}>\frac{\pi}{2} holds, so we have

θk\displaystyle\theta_{k} min{π2,arccos12γ|hSR||hSTRk|},\displaystyle\leq\min\left\{\frac{\pi}{2},\arccos\frac{1}{2}\gamma{|h_{\text{SR}}||h^{k}_{\text{STR}}|}\right\}, (79)

where γF(gmin)1|hSTRk|2\gamma\geq\frac{F(g^{\min})-1}{|h^{k}_{\text{STR}}|^{2}}. This completes the proof.

Appendix E Problem Formulation and Solution

  • Problem Formulation

    By removing the CI constraint and regarding the DL as interference, the original optimization problem is transformed into one for maximizing the signal-to-interference-plus-noise ratio (SINR) under scheme I, which is expressed as

    max𝒗~k,β~kk=1Kβ~k|𝒗~kH𝒉STRk|2σs2|𝒗~kH𝒉SR|2σs2+σw2\displaystyle\underset{\bm{\tilde{v}}_{k},\tilde{\beta}_{k}}{\mathop{\max}}\,\sum\limits_{k=1}^{K}\tilde{\beta}_{k}\frac{|\bm{\tilde{v}}_{k}^{H}\bm{h}_{\text{STR}}^{k}|^{2}\sigma_{s}^{2}}{|\bm{\tilde{v}}_{k}^{H}\bm{h}_{\text{SR}}|^{2}\sigma_{s}^{2}+\sigma_{w}^{2}} (80)
    s.t.C~1:k=1Kβ~k=1,β~k{0,1},\displaystyle\text{s.t.}~{}{\tilde{C}_{1}}:\sum\limits_{k=1}^{K}{\tilde{\beta}_{k}}=1,\tilde{\beta}_{k}\in\{0,1\},
    C~2:𝒗~k2=1,k,\displaystyle\quad~{}~{}{\tilde{C}_{2}}:||\bm{\tilde{v}}_{k}||^{2}=1,\forall k,
    C~3:k=1Kβ~kγ|𝒗~kH𝒉STRk|2F(gmin)1.\displaystyle\quad~{}~{}{\tilde{C}_{3}}:\sum\limits_{k=1}^{K}\tilde{\beta}_{k}\gamma{|\bm{\tilde{v}}_{k}^{H}\bm{h}_{\text{STR}}^{k}|^{2}}\geq F(g^{\min})-1.
  • Algorithm Design

    It is obvious that the minimum-mean-square-error (MMSE) approach can be used to obtain the optimal receive beamforming vector 𝒗~k\bm{\tilde{v}}_{k}^{*} to problem (80) with fixed tag selection factor β~k\tilde{\beta}_{k}. And then, optimal β~k\tilde{\beta}_{k}^{*} can be solved by using the same greedy algorithm. In particular, the MMSE-based receive beamforming is written as

    𝒗~k=(𝒉SR(𝒉SR)H+𝒉STRk(𝒉STRk)H+σw2σs2𝑰N)1𝒉STRk(𝒉SR(𝒉SR)H+𝒉STRk(𝒉STRk)H+σw2σs2𝑰N)1𝒉STRk.\begin{array}[]{l}\!\!\bm{\tilde{v}}_{k}^{*}{=}\dfrac{\left(\bm{h}_{\text{SR}}(\bm{h}_{\text{SR}})^{H}+\bm{h}_{\text{STR}}^{k}(\bm{h}_{\text{STR}}^{k})^{H}+\frac{\sigma_{w}^{2}}{\sigma_{s}^{2}}\bm{I}_{N}\right)^{-1}\bm{h}_{\text{STR}}^{k}}{\left\|\left(\bm{h}_{\text{SR}}(\bm{h}_{\text{SR}})^{H}+\bm{h}_{\text{STR}}^{k}(\bm{h}_{\text{STR}}^{k})^{H}+\frac{\sigma_{w}^{2}}{\sigma_{s}^{2}}\bm{I}_{N}\right)^{-1}\bm{h}_{\text{STR}}^{k}\right\|}.\end{array} (81)

References

  • [1] M. Vaezi et al., “Cellular, wide-area, and non-terrestrial IoT: A survey on 5G advances and the road towards 6G,” IEEE Commun. Surveys Tuts., vol. 24, no. 2, pp. 1117–1174, 2nd Quart. 2022.
  • [2] Y. Xu, G. Gui, H. Gacanin, and F. Adachi, “A survey on resource allocation for 5G heterogeneous networks: Current research, future trends, and challenges,” IEEE Commun. Surveys Tuts., vol. 23, no. 2, pp. 668–695, 2nd Quart. 2021.
  • [3] M. Centenaro et al., “A survey on technologies, standards and open challenges in satellite IoT,” IEEE Commun. Surveys Tuts., vol. 23, no. 3, pp. 1693–1720, 3rd Quart. 2021.
  • [4] N. Van Huynh et al., “Ambient backscatter communications: A contemporary survey,” IEEE Commun. Surveys Tuts., vol. 20, no. 4, pp. 2889-2922, 4th Quart. 2018.
  • [5] U. S. Toro, K. Wu, and V. C. M. Leung, “Backscatter wireless communications and sensing in green Internet of Things,” IEEE Trans. Green Commun. Netw., vol. 6, no. 1, pp. 37–55, Mar. 2022.
  • [6] M. Jin et al., “Parallel backscatter in the wild: When burstiness and randomness play with you,” IEEE/ACM Trans. Netw., vol. 29, no. 1, pp. 65–77, Feb. 2021.
  • [7] D. Bharadia et al. “BackFi: High throughput WiFi backscatter,” in Proc. SIGCOMM, pp. 283–296, Aug. 2015.
  • [8] P. Patel and J. Holtzman, “Analysis of a simple successive interference cancellation scheme in a DS/CDMA system,” IEEE J. Select Areas Commun., vol. 12, no. 5, pp. 796–807, Jun. 1994.
  • [9] Y. Xu, Z. Qin, G. Gui, H. Gacanin, H. Sari, and F. Adachi, “Energy efficiency maximization in NOMA enabled backscatter communications with QoS guarantee,” IEEE Wireless Commun. Lett., vol. 10, no. 2, pp. 353–357, Feb. 2021.
  • [10] P. Hu, P. Zhang, M. Rostami, and D. Ganesan, “Braidio: An integrated active-passive radio for mobile devices with asymmetric energy budgets,” in Proc. ACM SIGCOMM, pp. 484–397, Aug. 2016.
  • [11] P. Zhang et al., “Enabling practical backscatter communication for on-body sensors,” in Proc. ACM SIGCOMM, pp. 370–383, Aug. 2016.
  • [12] P. Zhang et al., “ Freerider: Backscatter communication using commodity radios.” in Proc. ACM CoNEXT, pp. 389–401, Nov. 2017.
  • [13] D. Li and Y. -C. Liang, “Price-based bandwidth allocation for backscatter communication with bandwidth constraints,” IEEE Trans. Wireless Commun., vol. 18, no. 11, pp. 5170–5180, Nov. 2019.
  • [14] D. Li, “Capacity of backscatter communication with frequency shift in rician fading channels,” IEEE Wireless Commun. Lett., vol. 8, no. 6, pp. 1639–1643, Dec. 2019.
  • [15] G. Yang and Y.-C. Liang, “Backscatter communications over ambient OFDM signals: transceiver design and performance analysis,” in Proc. IEEE GLOBECOM, pp. 1–6, Dec. 2016.
  • [16] D. Darsena, “Noncoherent detection for ambient backscatter communications over OFDM signals,” IEEE Access, vol. 7, pp. 159415–159425, Oct. 2019.
  • [17] D. Darsena, G. Gelli, and F. Verde, “Joint channel estimation, interference cancellation, and data detection for ambient backscatter communications,” in Proc. IEEE SPAWC, pp. 1-5, Aug. 2018.
  • [18] Y. Xu et al., “Robust energy-efficient optimization for secure wireless-powered backscatter communications with a non-linear EH model,” IEEE Commun. Lett., vol. 25, no. 10, pp. 3209–3213, Oct. 2021.
  • [19] B. Gu et al., “Many a little makes a mickle: Probing backscattering energy recycling for backscatter communications,” IEEE Trans. Veh. Technol., vol. 72, no. 1, pp. 1343–1348, Jan. 2023.
  • [20] D. Li, “Two birds with one stone: Exploiting decode-and-forward relaying for opportunistic ambient backscattering,” IEEE Trans. Commun., vol. 68, no. 3, pp. 1405–1416, Mar. 2020.
  • [21] D. Li, W. Peng, and F. Hu, “Capacity of backscatter communication systems with tag selection,” IEEE Trans. Veh. Technol., vol. 68, no. 10, pp. 10311–10314, Oct. 2019.
  • [22] Y. Xu et al., “Joint computation offloading and radio resource allocation in MEC-based wireless-powered backscatter communication networks,” IEEE Trans. Veh. Technol., vol. 70, no. 6, pp. 6200–6205, Jun. 2021.
  • [23] Y. Zhang, F. Gao, L. Fan, X. Lei, and G. K. Karagiannidis, “Secure communications for multi-tag backscatter systems,” IEEE Wireless Commun. Lett., vol. 8, no. 4, pp. 1146–1149, Aug. 2019.
  • [24] D. M. Dobkin, T. Freed, C. Gerdom, C. Flores, E. Futak, and C. Suttner, “Cooperative tag communications,” in Proc. IEEE RFID-TA, pp. 27-32, Sept. 2015.
  • [25] C. Pérez-Penichet, F. Hermans, and T. Voigt, “On limits of constructive interference in backscatter systems,” in Proc. GIoTS, pp. 1-5, Aug. 2017.
  • [26] G. Zheng, M. Wen, Y. Chen, S. Zhao, and H. Du, “Interference exploitation for ambient backscatter communication networks via symbol level precoding,” IEEE Wireless Commun. Lett., vol. 11, no. 6, pp. 1166–1170, Jun. 2022.
  • [27] C. Liu et al., “Deep transfer learning for signal detection in ambient backscatter communications,” IEEE Trans. Wireless Commun., vol. 20, no. 3, pp. 1624–1638, Mar. 2021.
  • [28] X. Lu, D. Niyato, H. Jiang, D. I. Kim, Y. Xiao, and Z. Han, “Ambient backscatter assisted wireless powered communications,” IEEE Wireless Commun., vol. 25, no. 2, pp. 170-177, Apr. 2018.
  • [29] Y. Zhang, F. Gao, L. Fan, S. Jin, and H. Zhu, “Performance analysis for tag selection in backscatter communication systems over Nakagami-m fading channels,” in Proc. IEEE ICC, pp. 1–5, 2018.
  • [30] Z. Ling, F. Hu, D. Li, and Z. Han, “Tag selection for backscatter communication in classified wireless body area networks,” in Proc. IEEE WCNCW, pp. 1–6, 2020.
  • [31] D. Mishra and E. G. Larsson, “Optimal channel estimation for reciprocity-based backscattering with a full-duplex MIMO reader,” IEEE Trans. Signal Process., vol. 67, no. 6, pp. 1662–1677, Mar. 2019.
  • [32] R. Long, Y. -C. Liang, H. Guo, G. Yang and R. Zhang, “Symbiotic radio: A new communication paradigm for passive Internet of Things,” IEEE Internet Things J., vol. 7, no. 2, pp. 1350–1363, Feb. 2020.
  • [33] S. Ma et al., “Robust beamforming design for covert communications,” IEEE Trans. Inf. Forensics Security, vol. 16, pp. 3026–3038, 2021.
  • [34] S. Yan, Y. Cong, S. V. Hanly, and X. Zhou, “Gaussian signalling for covert communications,” IEEE Trans. Wireless Commun., vol. 18, no. 7, pp. 3542–3553, July 2019.
  • [35] Y. Li et al., “Performance analysis for covert communications under faster-than-Nyquist signaling,” IEEE Commun. Lett., vol. 26, no. 6, pp. 1240–1244, June 2022.
  • [36] B. A. Bash, D. Goeckel, and D. Towsley, “Limits of reliable communication with low probability of detection on AWGN channels,” IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1921–1930, September 2013.
  • [37] J. Bretagnolle and C. Huber. Estimation des densités: Risque minimax. Séminaire de Probabilités de Strasbourg, 12: 342–363, 1978.
  • [38] W. Wang et al., “Resource allocation for IRS-aided JP-CoMP downlink cellular networks with underlaying D2D communications,” IEEE Trans. Wireless Commun., vol. 21, no. 6, pp. 4295–4309, June 2022.
  • [39] Y. Ye, Interior Point Algorithm: Theory and Analysis. New York: Wiley, 1997.
  • [40] D. Xu et al.,“Resource allocation for IRS-assisted full-duplex cognitive radio systems,” IEEE Trans. Commun., vol. 68, no. 12, pp. 7376–7394, Dec. 2020.
  • [41] K. Yang, T. Jiang, Y. Shi, and Z. Ding, “Federated learning via over-the-air computation,” IEEE Trans. Wireless Commun., vol. 19, no. 3, pp. 2022–2035, Mar. 2020.
  • [42] Q. Li, Q. Zhang, and J. Qin, “Secure relay beamforming for SWIPT in amplify-and-forward two-way relay networks,” IEEE Trans. Veh. Technol., vol. 65, no. 11, pp. 9006–9019, Nov. 2016.
  • [43] Q. Shi and M. Hong, “Penalty dual decomposition method with application in signal processing,” in Proc. IEEE ICASSP, pp. 4059-4063, 2017.
  • [44] M. R. Osborne, B. Presnell, and B. A. Turlach, “On the LASSO and its dual,” J. Comput. Graph. Stat., vol. 9, pp. 319–337, 2000.
  • [45] A. Bereyhi, A. Vagollari, S. Asaad, R. R. Muller, W. Gerstacker, and H. V. Poor, “Matching pursuit based scheduling for over-the-air federated learning,” arXiv preprint arXiv:2206.06679, 2022.
  • [46] Y. Tao, B. Li, C. Zhao, and Y. -C. Liang, “Hardware-efficient signal detection for ambient backscattering communications,” IEEE Commun. Lett., vol. 23, no. 12, pp. 2196–2199, Dec. 2019.
  • [47] M. Grant and S. Boyd. (Apr. 2011). CVX: MATLAB Software for Disciplined Convex Programming. [Online]. Available: http://cvxr.com/cvx.
  • [48] P. Ramezani and A. Jamalipour, “Optimal resource allocation in backscatter assisted WPCN with practical energy harvesting model,” IEEE Trans. Veh. Technol., vol. 68, no. 12, pp. 12406–12410, Dec. 2019.
  • [49] F. C. Blondeau and A. Monir, “Numerical evaluation of the Lambert WW function and application to generation of generalized Gaussian noise with exponent 1/2,” IEEE Trans. Signal Process., vol. 50, no. 9, pp. 2160–2165, Sept. 2002.