Exploiting Constructive Interference for Backscatter Communication Systems
Abstract
Backscatter communication (BackCom), one of the core technologies to realize zero-power communication, is expected to be a pivotal paradigm for the next generation of the Internet of Things (IoT). However, the “strong” direct link (DL) interference (DLI) is traditionally assumed to be harmful, and generally drowns out the “weak” backscattered signals accordingly, thus deteriorating the performance of BackCom. In contrast to the previous efforts to eliminate the DLI, in this paper, we exploit the constructive interference (CI), in which the DLI contributes to the backscattered signal. To be specific, our objective is to maximize the received signal-to-noise ratio (SNR) by jointly optimizing the receive beamforming vectors and tag selection factors under different detection error probability (DEP) requirements, which leads to two different optimization problems. However, the resulting problems are non-convex and unanalyzable due to constraints on the DEP. To solve these problems, the Kullback-Leibler divergence is first applied to transform the DEP into a tractable form. Then, inspired by the alternating optimization, we respectively propose two successive convex approximation (SCA)-based algorithms to solve the corresponding sub-problems with beamforming design, and a greedy algorithm to solve the sub-problem with tag selection. In order to gain insight into the CI, we consider a special case with the single-antenna reader to reveal the channel angle between the backscattering link (BL) and the DL, in which the DLI will become constructive. Simulation results show that significant performance gain can always be achieved with the proposed algorithms compared to the traditional algorithms without the CI in terms of the received SNR. The derived constructive channel angle for the BackCom system with a single-antenna reader is also confirmed by simulation results.
Index Terms:
Backscastter communication, constructive interference, Kullback-Leibler divergence, resource optimizationI Introduction
As the number of connected devices has grown by leaps and bounds over the past few decades, the Internet of Things (IoT) is transforming industry, logistics, and everyday use in an unforeseen manner, ushering in a new industrial revolution [1, 2]. Recent market studies envision that the total number of connected IoT devices will reach 83 billion by 2024, rising from 35 billion connections in 2020 [3]. However, this is a mixed blessing, as further promotion of the IoT will necessitate a huge expense to maintain the operation of these ever-increasing devices. Recently, backscatter communication (BackCom) has been emerging as a promising technology that can break the gridlock of these power-hungry devices, which are replaced by passive tags without the need for active radio frequency (RF) components [4]. In the BackCom system, the externally generated carrier by a dedicated power source is utilized to carry the tag’s signal, and only the impedance loading is applied to backscatter the received signal, which can significantly reduce the hardware cost and pave the way for zero-power communication [5].
However, it should be noted that, in the BackCom system, the backscattered signal actually undergoes double-channel fading, which is to blame for the quite weak signal strength at the reader. It is challenging to recover the backscattered data from different tags due to the mutual interference caused by the concurrent transmission [6]. On the other hand, another issue ensues: when the signal from the direct link (DL) encounters these weak signals at the reader, the resulting interference is strong enough to drown out the desired signal, which significantly degrades the performance of the BackCom system, especially the signal detection and transmission rate [7]. Therefore, it is hard to overstate the importance of interference suppression for BackComs.
Summary for interference processing | Interference is constructive or not? | |||
Ref. | Main processing Method | Processing result | Mutual Interference | DLI |
[9] | SIC | Interference cancellation | ✗ | ✗ |
[11]-[14] | FS | Interference avoidance | ✗ | ✗ |
[15]-[17] | OFDM | Interference avoidance | ✗ | ✗ |
[18]-[20] | TDMA | Interference avoidance | ✗ | ✗ |
[21]-[23] | Tag selection | Interference avoidance | ✗ | ✗ |
[24]-[25] | Phase offset | Interference utilization | ✔ | ✗ |
[26] | SLP | Interference utilization | ✔ | ✗ |
Our work | KLD-based method | Interference utilization | ✗ | ✔ |
In fact, interference suppression has been fruitfully studied in BackCom systems. One of the most typical methods is the successive interference cancellation (SIC) technique [8, 9], by which the strong interference signal in the mixed signal can be stripped. However, it should be noted that the SIC may suffer from residual interference, and interference cancellation for multiple weak signals may not perform well. In this regard, the frequency shift (FS) technique has been proposed as a promising method to mitigate the interference in BackCom systems [10]. To be specific, each backscatter tag was able to shift its carrier signal to adjacent non-overlapping frequency bands and isolate the backscattered signal from the DL signal so that the mutual interference between different tags and the DL interference (DLI) could be avoided [11, 12, 13, 14]. Furthermore, BackCom systems over orthogonal frequency division multiplexing (OFDM) carriers were proposed in [15, 16, 17], which canceled out the DLI by exploiting the repeating structure of the ambient OFDM signals with the aid of the cyclic prefix. Besides, time division multiple access (TDMA) (see, [18, 19, 20]) and tag selection (see, [21, 22, 23]) have been also widely used in BackCom systems to avoid the mutual interference among different tags.
I-A Motivations and Contributions
It is noted that, most of the existing works assume that the DLI is always harmful, and thus focus on how to avoid the effect of interference for BackCom systems. However, there are several natural questions that arise: Is interference necessarily destructive in all cases? Is it possible to blaze a trail to turn the destructive interference into a constructive one? These problems have received little attention, and there have been only a few research efforts paid to answer the above questions. The constructive interference (CI) was achieved among multiple cooperative tags in centralized scenarios [24] and decentralized scenarios [25], respectively, in which several tags backscatter the same packet synchronously, which makes it possible that backscattered signals can be constructively combined, leading to an increased signal strength at the reader. Besides, a BackCom system with the symbol level precoding (SLP) technique was proposed in [26] to convert the multi-user interference into the constructive region of the desired data symbol by designing the transmit beamforming on the symbol level.
Although the CI was considered in [24] and [25] among different tags in BackCom systems, which means that CI can be found among multiple weak signals, they ignore the real protagonist, namely, the strong interference from the DL, since compared with the mutual interference among tags, the DLI is more harmful. In [26], the multi-user interference in broadcasting channels was considered to be converted into the CI, where the tag signal detection was not taken into account and there was actually no DLI. In this regard, we take up the baton in this paper to probe how to convert the DLI into a helpful interference in enhancing the backscattered signal strength, which is in contrast to most of the existing works that aim at canceling the DLI [9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 21, 20, 19, 22]. Besides, for more visualization, Table I briefly summarizes the differences between this paper and the mentioned works. To the best of our knowledge, this is the first attempt to harness the DLI for the backscattered signal for BackCom systems. Specifically, we consider a multi-tag BackCom system with a dedicated power source (PS) supplying energy to the tags, and a multi-antenna reader to enhance the reception efficiency.
In a nutshell, the contributions of this paper are summarized as follows:
-
•
To evaluate whether the DLI is constructive or not, the detection error probabilities (DEPs) under the cases with and without the DL are evaluated. To make our analysis tractable, a Kullback-Leibler divergence (KLD)-oriented approach is proposed, where the KLDs under these two cases are requisitioned. By doing so, the CI can be obtained. However, the mutual interference among multiple tags also hinders the exploitation of the CI, and we consider tag selection to avoid this problem. It is worth pointing out that the KLD analysis of the DLI is new, and not presently available in existing works.
-
•
Our objective is to maximize the received signal-to-noise ratio (SNR) under the two different CI requirements (i.e., the consensual and evolved CIs) with the single- and multi-antenna PSs, respectively, via beamforming design and tag selection, which leads to two different optimization problems in each scenario. Moreover, the formulated problems are non-convex and hard to solve. In order to circumvent this difficulty, we decompose these problems based on the alternating optimization method. Then, the corresponding sub-problems for beamforming design are respectively solved by proposing two different algorithms with successive convex approximation (SCA), and the sub-problems for tag selection are solved via greedy search.
-
•
In order to gain more insight into the CI, we consider a special case with one single antenna at the reader. In this case, we are able to derive the closed-form expressions for the feasible region of the input SNR and the channel angle, where the evolved CI exists. This result is new and unique in the sense of its potential to build up the CI in practice.
-
•
Simulation results show that significant performance gain can always be achieved with the proposed algorithms compared with the benchmark algorithms in terms of the received SNR. Besides, the CI region is demonstrated for the case with multiple antennas at the reader, and the derived angle for the case with single antenna at the reader is also confirmed by simulation results. Moreover, we also demonstrate from the derived angle that it is more likely to build up the CI for the relatively large DEP tolerance or large path loss.
I-B Organization
The remainder of the paper is organized as follows: In Section II, we present the system model and analyze the DEPs for two different cases. In Section III, we formulate two optimization problems, and two different greedy-based algorithms with SCA are proposed to solve them. Besides, a special case is also considered for more insight in Section III. Section IV gives the simulation results, and Section V concludes this paper.
I-C Notations
Throughout the paper, scalars, vectors, and matrices are denoted by lowercase, boldface lowercase, and boldface uppercase letters, respectively. and denote the absolute value of a complex scalar and the -norm of a vector, respectively. , det, Rank, Tr, , , and represent the Hermitian, the determinant, the rank, the trace, the nuclear norm, the norm, and the spectral norm of the matrix, respectively. is the circularly symmetric complex Gaussian (CSCG) distribution with mean and variance . and denote the maximum and minimum eigenvalues of the matrix, respectively. represents the identity matrix. and denote the principal branch and the bottom branch of the Lambert function, respectively.
II System Model And Detection Analysis
II-A System Architecture
We consider a BackCom system with single input multiple output (SIMO), as shown in Fig. 1, with a single-antenna PS, single-antenna tags (), and a reader with antennas (). In particular, all tags are powered by the PS so that each tag can backscatter its information to the reader. The channel coefficients of the PS-tag link, the PS-reader link, and the tag -reader link are respectively given by , , and . Assume that channels between the transmitter and the receiver follow a block-fading based model, namely, , , and remain constant during backscattering in one time interval, but vary independently in different intervals. It is further assumed that the PS transmits CSCG signals , with the transmitted power in one time interval [27]. Moreover, for are independent and identically distributed. The signal received at the -th tag can be expressed as
(1) |
where denotes the noise at -th tag. Then, the -th tag backscatters the signal and transmits its own binary signal . Note that the noise backscattered by each tag can be ignored in the backscattering process due to its poor signal strength. Consequently, the backscattered signal by the -th tag can be expressed as
(2) |
where represents the attenuation inside the tag, which is achieved by adjusting the load impedance at the port of the antenna, and also depends on the structure mode of the antenna [28].
In order to avoid the mutual interference among tags, only one tag can be selected to backscatter its information at one slot. Noting that the signal received by the reader is not only from the selected tag (e.g., the -th tag), but also from the PS. Thus, the signal received by the reader can be expressed as
(3) |
where denotes the noise vector of the reader and is assumed to be an i.i.d. CSCG random vector with . denotes the noise power. By using the receive beamforming, the received signal at the reader can be expressed as
(4) |
where denotes the receive beamforming vector at the reader.
Note that this framework of multi-tag selection for the Backcom system is beneficial for interference-free transmission and can efficiently combat the double-fading channel, which can be well used in radio frequency identification (RFID) [29] for logistics management, wireless body area networks (WBANs) [30] for health monitoring and data sensing, etc.
II-B CSI Assumption
It is assumed that the BackCom system operates in the time-division multiplexing (TDD) mode, and thus the channel state information (CSI) can be obtained by the training-based channel estimation at the uplink transmission [31]. Specifically, the reader is designed to transmit two sets of pilots in two training phases [32]. In the first phase, the -th tag switches its impedance into an initial matched state, and then it receives the pilot signals from the reader as excitation and does not backscatter any signal. Thus, the PS can estimate the CSI for the DL (i.e., ) via channel reciprocity. In the second phase, the -th tag switches its impedance into a fixed and known backscatter state to represent a symbol after receiving the training signals in the first phase. Thus, the PS can estimate the composite channel via the training pilots. Then, for the given , the CSI of the backscattering link (BL) (i.e., ) can be obtained at the PS by subtracting the estimated the DL channel component from the estimated composite channel.
II-C Signal Model
In this subsection, we give some analysis for the received signal when the DLI is available or not. Specifically, when the DL is available, the received signal of the reader can be rewritten with a binary hypothesis. In particular, the null hypothesis () is that the -tag does not backscatter the incident signal and the alternative hypothesis () is that the -tag backscatters the incident signal. In this regard, we have
(5) |
where , , and .
Thus, the distributions of the received signal can be expressed as
(6) |
where the variances under and can be expressed as
(7) |
Accordingly, the received signal at the reader in one time interval obeys the following distributions
(8) |
where the covariance matrices under and can be expressed as
Let and denote the likelihood functions of the received signal of the reader under and , respectively. Based on (8), we have
(9) | ||||
As a counterpart, assuming the DL is unavailable, the received signal at the reader can be expressed as
(10) |
Accordingly, the received signal in one time interval obeys the following distributions
(11) |
where are the covariance matrices, and
(12) |
where , and .
In this case, the likelihood functions of the received signal of the reader under and , respectively, can be expressed as
(13) |
II-D Detection Probability
In BackCom systems, the goal for the reader is to distinguish two different hypotheses or by applying a specific decision rule. In general, the priori probabilities of hypotheses and are assumed to be equal. As such, the detection error probability (DEP) of the reader is defined as in [33, 34]
(14) |
where and are the binary decisions that infer whether backscattering transmission is present or not, respectively. and denote the false alarm and miss detection probabilities, respectively.
Taking the case with the DL as an example, for an optimal detector at the reader, the optimal DEP () for detecting the backscattered signal by the -th tag can be obtained as [34, 35]
(15) |
where denotes the total variation between and .
Similarly, the optimal DEP () of the reader for detecting the backscattered signal by the -th tag under the case without the DL can be obtained as
(16) |
where denotes the total variation between and .
III Problem Formulation and Algorithm Design
In this section, we first formulate two optimization problems for maximizing the received SNR with different CI requirements under a single-antenna PS, and propose two iterative algorithms with SCA to solve them after some designed transformation. Then, the different problems for received SNR are also studied by extending to a multi-antenna PS. Besides, a closed-form expression for the upper bound on the angle between the DL and the BL is revealed to shed light on the CI for the single-antenna reader.
III-A Problem Formulation for Consensual CI
To evaluate the enhancement of the BackCom transmission with the assistance of the DL, an optimization problem for maximizing the received SNR at the reader is formulated by the joint optimization for the receive beamforming design and the tag selection, which is given by
(17) | ||||
where is the tag selection factor, i.e., denotes the -th tag is selected, otherwise . denotes the input SNR. and denote the tolerated threshold of the DEPs with and without the DL for the BackCom system. For problem (17), is the tag selection constraint. denotes the receive beamforming constraint. and are the corresponding DEP constraints, which guarantee that the DEPs with and without the DL are not greater than the corresponding tolerable DEPs, respectively. It is noted that, by setting , the constructive DLI can be obtained, which is defined as the consensual CI.
As can be seen, problem (17) is challenging to solve directly due to the mixed-integer objective and the non-smooth constraints. To make it more treatable, assuming the -th tag has been selected, the subproblem for beamforming design can be transformed as
(18) |
III-B DEP Transformation
Unfortunately, there are still many obstacles in solving problem (18), one of which is that the total variation metrics in and are unwieldy and intractable for products of probability measures [36]. To deal with that, the Bretagnolle–Huber bound [37] is adopted, i.e.,
(19) |
or
(20) |
where and denote the KLD from to and the KLD from to , respectively. Specifically, the expression of can be written as111It is noted that the Gaussian-distributed signal input is restrictively assumed in this paper, which is commonly used for analysis of communication systems due to its mathematical tractability. The impact of practical modulation type and order on the exploration of constructive interference will be another work, and is left for future work.
(21) | ||||
Based on (15) and (19), we have the lower bound related to the KLD for under the case with the DL, which satisfies
(22) |
Similarly, the KLD of the corresponding likelihood functions under different hypotheses without the DL can be given by
(23) |
Correspondingly, the lower bound of the DEP related to the KLD in the case without the DL can be expressed as
(24) |
Note that the maximum value of problem (17) can be achieved when and are equal to their lower bounds, respectively, in (22) and (24). Thus, and can be rewritten by, respectively,
(25) |
or equivalently
(26) |
Thus, problem (18) can be transformed into the following problem, i.e.,
(27) | ||||
III-C Beamforming Design for Consensual CI
However, it is difficult to solve problem (27) due to the tight coupled relationship in and . To deal with it, we propose Theorem 1.
Theorem 1: and can be transformed into the following equivalent forms, i.e.,
(28) |
where , , and .
Proof: Please see Appendix A.
Based on Theorem 1, problem (27) can be transformed into the following problem, i.e.,
(29) |
However, it is still hard to solve problem (29) directly due to the non-convexity of . To deal with this, the SCA-based method is applied [38]. In each iteration, we construct a global underestimator of the intractable term via its first-order Taylor approximation, which is given by
(30) |
where is the feasible point of in the -th iteration of the SCA.
As a result, problem (29) can be finally expressed as
(31) |
Note that problem (31) is a standard convex problem, which can be solved by CVX. The detail of this algorithm is shown in Algorithm 1. Here, the computational complexity for Algorithm 1 is evaluated. Given the number of constraints, interior point methods with a vector variable of size will take iterations, with each iteration requiring arithmetic operations for the worst case [39], where denotes the precision of the interior point algorithm. Letting the maximum iteration number for SCA is , the total computation complexity for beamforming design is .
III-D Problem Formulation for Evolved CI
So far, we have studied the consensual CI for the BackCom system in the previous subsection. However, the relationship between and is unknown. In this subsection, we are going to investigate another CI, i.e., evolved CI, by exploiting the following relationships between and , i.e.,
(32) |
It is worth mentioning that when holds, the dilemma will be that the involvement of the DL leads to a larger DEP than the case without the DL, which would be intolerable for perfectionists if the DL is required to have no negative impact on the BackCom system. On the contrary, when holds, we can assert that introducing the DL does not destroy the detection performance compared with the case without the DL, and can even improve it.
Motivated by this observation, a new optimization problem for achieving the evolved CI can be reformulated, which is expressed as
(33) | ||||
Algorithm 1 The Algotithm for Problem (31) | |
Input: , , , , , , , , , , . | |
Set: Set the iteration index , the tolerance , the | |
maximum iteration number . | |
Initialize: Set initial point . | |
Output: . | |
1: | while or do |
2: | Given , solve problem (31) by using CVX |
to obtain and . | |
3: | Update . |
4: | end while |
5: | Obtain the solution to problem (31) as . |
Assuming that the -th tag has been selected, problem (33) can be further rewritten as
(34) | ||||
Based on the same approach for the DEP-to-KLD transformation, serving the purpose of maximizing the objective of problem (34), the left-hand items in and are replaced by their lower bounds, i.e.,
(35) |
Further, to guarantee the CI evolution, the lower-bound relaxation is applied, thus (35) is transformed into
(36) |
Remark 1: By comparing problems (27) and (37), it can be seen that the potential adverse condition that lurks in problem (27) against the construction of CI is removed in problem (37). The purpose of problem (37) is to explore whether it is always possible to create a larger KLD by using the DL compared with that without the DL, which is different from the former. For illustration, Fig. 2 is provided to portray the relationship between different KLDs. By doing so, we can effectively enhance the backscattering strength without affecting or even reducing the DEP compared with the conventional BackCom system.
Note that problem (37) can be regarded as evolving from problem (27), but the proposed algorithm for problem (27) can not suitable for problem (37) since poses different challenge in solving the receive beamforming. This motivates us to design a new algorithm for problem (37).
III-E Beamforming Design for Evolved CI
In order to make problem (37) more tractable, we propose Theorem 2.
Theorem 2: can be transformed into the equivalent form, i.e.,
(39) |
Proof: Please see Appendix B.
Based on Theorem 1 and Theorem 2, problem (37) can be transformed into the following problem, i.e.,
(40) |
Then, by introducing a new variable , and can be transformed, respectively, into
(41) |
and
(42) |
where , , and .
Thus, problem (40) can be expressed as
(43) |
However, problem (43) is still a non-convex problem caused by the non-convexity in . In general, it is difficult or even intractable to obtain the global optimal solution to such a non-convex problem. To make it more treatable, we introduce a slack variable such that , problem (43) can be transformed into the following problem, i.e.,
(44) |
It is noted that the rank-one constraint is an impediment to solving problem (44). Semi-definite relaxation (SDR) has been commonly adopted to tackle the rank-one constraint, which, however, may not result in a rank-one matrix. Moreover, some approximation methods, such as Gaussian randomization, may cause performance deterioration when the number of antennas is quite large [40]. To deal with this, is equivalently transformed into the following difference-of-convex function [41], such as
(45) |
where and . It is noted that for any belonging to the positive semi-definite matrix, is always held. The inequality can be treated as an equation if and only if is a rank-one matrix, especially, and As a result, (45) can be efficiently met for the rank-one constraint . However, (45) is still non-convex. To deal with it, a penalty function is employed, and thus problem (44) can be equivalently transformed into the following problem, such as
(46) |
where is relaxed to a penalty term added to the objective function, and is a constant which penalizes the objective function for any matrix whose rank is not one.
However, problem (46) is still an intractable problem with any due to the non-convexity of the objective function. To deal with this, the SCA method is applied. Specifically, for a given in the -th iteration of SCA, a convex upper bound for the penalty term can be obtained by using first-order Taylor expansion, which can be expressed as
(47) |
where and represents the eigenvector corresponding to the largest eigenvalue of [41].
Algorithm 2 The Algotithm for Problem (48) | |
Input: , , , , , , , , , , . | |
Set: Choose a large . Define . | |
Initialize: Set initial point . | |
Output: . | |
1: | for |
2: | Set . |
3: | Set initial point . iteration index . |
4: | repeat |
5: | With given , obtain the intermediate |
solution by solving problem (48). | |
6: | Update and . |
7: | until convergence |
8: | if |
9: | Update . |
10: | end if |
11: | end for |
12: | Recover from . |
Thus, problem (46) can be finally rewritten as
(48) |
Although problem (48) is not jointly concave with respect to and , (48) is a convex optimization problem which can be solved optimally by using some commercial solvers such as CVX for a given . Then the optimal can be obtained by one-dimensional exhaustive search over . Specifically, the upper and lower bounds of can be chosen as [42], respectively,
(49) |
The detail of this algorithm is shown in Algorithm 2. Here, the computational complexity for Algorithm 2 is evaluated. Before solving problem (48), it needs to determine the variables . Given the number of constraints, interior point methods with a matrix variable of size will take iterations, with each iteration requiring arithmetic operations for the worst case. Letting the maximum iteration number for SCA is , the total computation complexity for beamforming design is .
In what follows, the remaining issue of tag selection for both problem (17) and problem (33) is considered, which is a 0/1 nonlinear optimization problem. There have been quite a few existing methods to solve such NP-hard problems, such as greedy algorithm, simulated annealing, penalty dual decomposition (PDD) method [43], and some compressive sensing methods like LASSO [44] and matching pursuit [45]. In this paper, the greedy algorithm is applied. The detail of the greedy-based algorithm is shown in Algorithm 3. Furthermore, when the corresponding beamforming designs are determined via Algorithm 1 and Algorithm 2, respectively, it costs for tag selection in Algorithm 3.
In summary, the absolute CI can be achieved in this case, but a higher computation complexity is incurred than the the case with the consensual CI. In other words, there is a tradeoff between CI strictness and computation complexity.
Algorithm 3 The Greedy Algorithm for Tag Selection | |
Input: , , , , , , , , , , . | |
Output: and . | |
1: | for |
2: | Solve problem (31), obtain via Algorithm 1. |
3: | Update . |
4: | Solve problem (48), obtain via Algorithm 2. |
5: | Update . |
6: | end for |
7: | Obtain the optimal tag selection to (31) as , where . |
8: | Obtain the optimal tag selection to (48) as , where . |
III-F Extension to a Multi-antenna PS
We have investigated the CI availability for a BackCom system with the single-antenna PS in the previous subsections. In what follows, we plan to explore the CI availability for a multiple-input and multiple-output (MIMO)-based BsckCom system by extending the PS with transmit antennas. In contrast to the previous sections, due to the implementation of the multi-antenna PS, it is necessary to take into account the handling of the transmit beams. Building on this, the received signal of the reader with and without DL can be extended to
(50) |
where , , and denotes the transmit beamforming vector, which satisfies .
Similar to the analysis in the previous subsection, by redefining , , , and as
(51) |
(52) |
the KLD and the DEP under different hypotheses with the DL can still be obtained as (21) and (22). Correspondingly, the KLD and the DEP under different hypotheses without the DL can still be represented by (23) and (24), where , , , and .
III-F1 Extension for Consensual CI
III-F2 Extension for Evolved CI
III-F3 Algorithm Design
Algorithm 4 The Alternating Iteration Algorithm | |
Input: , , , , , , , , , , , | |
. | |
Set: Set the alternating iteration index . | |
Initialize: Set initial points and . | |
Output: , , and . | |
For consensual CI via solving problem (53) | |
1: | repeat |
2: | With given , obtain by solving |
problem (53) via Algorithm 1. | |
3: | With given , obtain by solving |
problem (53) via Algorithm 1. | |
4: | Update . |
5: | until convergence |
For evolved CI via solving problem (54) | |
1: | repeat |
2: | With given , obtain by solving |
problem (54) via Algorithm 2. | |
3: | With given , obtain by solving |
problem (54) via Algorithm 2. | |
4: | Update . |
5: | until convergence |
Compared with problem (27) and problem (37) in the previous subsections, problem (53) and problem (54) seem to be more thorny beyond the direct application of the proposed algorithms. A turnaround in this deadlock is possible thanks to the alternating optimization method. Taking problem (53) as an example, when is fixed, the resulting problem can be regarded as formally equivalent to that of problem (27), which can be solved using Algorithm 1. Likewise, when is fixed, the resulting problem can be solved by the same way. Then, using the alternating iteration method, problem (53) is solved when the results of the alternation converge. Not surprisingly, problem (54) can also be solved using alternating optimization. Similarly, the desired solution for problem (54) can be obtained by alternately using Algorithm 2 by fixing and separately. The detail of the proposed alternating iteration algorithm is shown in Algorithm 4.
Note that Algorithm 4 applies under the presumption that the -th tag has already been selected. Then, how to select the optimal tag for transmission can be done according to the proposed Algorithm 3.
III-G Feasible Region for Input SNR and CI Angle
In previous subsections, we have investigated and analyzed the CI availability for the multi-antenna BackCom system with the beamforming design. However, the ointment is that some analytical insights have not been obtained due to its intractability. In this subsection, in order to gain more insights into the CI, we consider degrading the system with SIMO/MIMO into a one with single input single output (SISO) to facilitate our analysis for the CI. In particular, according to (3) and (10), the received signal of the reader with and without the DL can be degraded into
(55) |
where and denote the channel coefficients of the DL and the BL, respectively. and are the channel coefficients of the forward link and backward link for the -th tag. is the noise at the reader with zero mean and variance .
Similar to the previous analysis on the KLDs under two hypotheses (i.e., and ), to make the DLI constructive, the following KLD constraint for the -th tag need to be satisfied
(56) |
where , , , , , , , and .
On the other hand, by degrading , we have
(57) |
To reveal the CI region, theorem 3 is proposed.
Theorem 3: The evolved CI can be achieved when the input SNR () is satisfied, i.e.,
(58) |
Proof: Please see Appendix C.
Remark 2: From (LABEL:s3c), it can be seen that the evolved CI region for is obtained. To be specific, the introduced DLI is fully constructive for BackCom systems when lies within this region. Besides, as becomes larger, the lower bound for will become more strict accordingly, and the system may not be able to achieve the desired performance with a small . On the other hand, when the channel gain of the BL becomes small, it will also increase the lower bound of , which shows that more transmit power is needed to construct the CI region with a lower BL gain. However, once the required exceeds its upper bound, the evolved CI will cease to exist.
To further show the relationship between the BL and the DL, we give theorem 4.
Theorem 4: Letting denote the angle between the DL and the BL, the resulting DLI is constructive when satisfies the following condition, i.e.,
(59) |
where .
Proof: Please see Appendix D.
Remark 3: It can be seen that the CI angle can be expressed as (59). In particular, is gradually narrowing the gap with with the decreasing , , and . When holds, the maximum CI angle can be achieved by substituting into (59), i.e., . It is noted that is decreased with the increasing and the increasing . That is to say, the maximum CI angle mainly depends on the minimum KLD requirement with the determined channel gains. The simulation results below also verify what we have analysed.
IV Simulation Results
In this section, we present the simulation results of our proposed algorithms for BackCom networks. We assume that there are one PS, one reader with 4 antennas (i.e., ), and 5 tags (i.e., ) in the proposed system. The distances between the PS and tags, the PS and the reader, as well as the reader to tags are both within 5 meters. is set to follow [46]. Other parameters include , , and . The simulation results are evaluated based on the CVX package [47].
Besides, we consider the distance-dependent path loss as large scale fading, and Rician fading as small scale fading for all channels [18, 48]. For example, the channel between the PS and the reader is given by , where is the Rician factor, and are the line-of-sight (LoS) and non-line-of-sight (NLoS) components of , respectively. Specifically, , where is the the direction of the PS to the reader. follows the standard Rayleigh fading. The average power of is then normalized by , where is the distance between the PS and the reader, and is the path-loss exponent.
In what follows, we will demonstrate the superiority of the proposed schemes from the perspectives of system performance and CI existence, respectively.


IV-A System Performance with SIMO and MIMO
In this subsection, we begin by investigating the system performance for SIMO- and MIMO-based BackComs, where the CI is guaranteed. For algorithm comparison, we define three benchmark algorithms, such as
-
•
The algorithm with harmful DLI
The DL, as usual, is regarded as the harmful interference in this algorithm, which means that the DL no longer assist in enhancing the backscattering signal. This also results in a new optimization problem and a new solution, which are detailed in Appendix E.
-
•
The algorithm with canceled DLI
This scheme is consistent with the existing assumption that the DLI can be perfectly canceled. That is to say, each tag can enjoy interference-free transmission. This scheme can be obtained from the proposed scheme by removing the CI constraint and the DL.
-
•
The algorithm with Random Tag Selection
Different from the proposed algorithm, each tag is selected randomly under this scheme. This scheme can be obtained from the proposed scheme by replacing the greedy algorithm with a random approach, which can reduce the computation complexity.


The purpose is to evaluate the performance and effectiveness of the proposed algorithms under different aspects by comparing them with benchmark algorithms. On the one hand, by comparing the algorithm with harmful DL, we can measure the benefit of considering CI on the system performance. On the other hand, by comparing the algorithm without the DL, we can evaluate the effectiveness of the proposed algorithms in enhancing the backscattered signal power. Besides, by comparing the algorithm with random tag selection, we can evaluate the gap between optimal and random selection. In the following, we compare the proposed algorithms with these benchmark algorithms with respect to the transmit power of the PS, the number of receive antennas, and the channel gains, respectively, to demonstrate the performance and implications of the proposed algorithms.
The algorithm comparison and CI region analysis under the transmit power of the PS () are shown in Fig. 3(a) and Fig. 3(b), respectively. From Fig. 3(a), it can be seen that, unsurprisingly, the received SINR/SNR of all algorithms increases with the increase in . Noteworthy, the received SINR/SNR of both the algorithms with the canceled DL and the harmful DL is significantly smaller than that of the proposed algorithms. This behavior is due to the fact that they lose the boost from the DL to enhance the strength of the backscattered signal, thus resulting in the SINR/SNR of them is unable to be raised. However, it has to be admitted that the performance of the proposed algorithm with evolved CI is as good as that with consensual CI , but its feasible domain is restricted in a region. For the lower bound of the feasible region, it is limited by the minimum KLD threshold (or the required DEP) for all algorithms, especially, a tag with the worse BL condition needs a larger transmit power to satisfy this requirement. And For the upper bound of the feasible region, there is no limitation for other algorithms, except the proposed algorithm with evolved CI. The reason is that its upper bound is limited by the maximum evolved CI limitation (or the gap of KLDs). For a more intuitive interpretation of the CI region, Fig. 3(b) shows the KLD and the DEP versus . From the perspective of DEP, the DEP without the DL only meets the preset when the transmit power reaches a certain level. On the other hand, when the transmit power is too large, the DEP with the DL will exceed the DEP without the DL, which means that the DL is not fully constructive for BackComs. Although the changes of the KLD versus the transmit power show the opposite trend to the DEP, the construction of CI regions is the same end.
Fig. 4 shows the algorithm comparison and CI region analysis under the channel path-loss exponent. Specifically, from Fig. 4(a), we can see that the received SINR/SNR of all algorithms decreases with the decreasing channel path-loss exponent. This is because the corresponding channel gains are degraded with the decrease in channel path-loss exponent. Similarly, the performance of the proposed algorithms is better than that of the other algorithms. The reason is that the DL is able to enhance the BL so that the backscattering capacity can be improved. Besides, the feasible region of the proposed algorithm with evolved CI is limited in order to meet the requirements of the evolved CI. As a supplementary for the evolved CI region, Fig. 4(b) shows the formation of the CI region from the perspective of the KLD and the DEP. It can be seen that the KLD with the DL is smaller than that without the DL when the channel path-loss exponent is less than 2.75, which means that the DL is harmful to the BackCom system. On the other hand, the KLD without the DL can not achieve the minimum threshold when the channel path-loss exponent is larger than 3.7, which means that the essential detection requirement can not be satisfied. The same analysis can apply to the DEP.
Fig. 5 shows the received SINR/SNR versus the number of receive antennas (). It is seen that as increases, the received SINR/SNR of all algorithms increases gradually, which is attributed to the improvement in beamforming gain due to the increase in . Although the algorithm with random selection has the advantage of low complexity compared to the proposed algorithm, the system performance can not be guaranteed. Moreover, the received SINR/SNR of the proposed algorithms is higher than that of both the algorithms with the canceled DL and the harmful DL since the DL can be borrowed to reinforce the backscattering transmission in this region. It is noted that the evolved CI region under the proposed algorithm can not be built when is too small and too large. This is because when is small, the DEP requirement for the proposed algorithm cannot be satisfied. On the other hand, when is relatively large, the signal from the DL is too strong to keep the DLI constructive, which can be explained through the same reason as Fig. 3 and Fig. 4.
By extending the single-antenna PS to a multi-antenna one, as shown in Fig. 6, we numerically evaluate the system performance with MIMO. Specifically, Fig. 6 shows the received SINR/SNR versus the number of transmit antennas () with W. As increases, the received SINR/SNR of all algorithms increases gradually, which can be attributed to an increase in beamforming gain. Besides, the received SINR/SNR of the proposed algorithms is higher than that of both the algorithms with canceled DL and the harmful DL, since the DL can enhance the BL. It is noted that the evolved CI region under the proposed algorithm is beingless when is large than 4. It is due to the strong signal from the DL that it is impossible to keep the DLI constructive when is relatively large for the same reason outlined in Fig. 5.




IV-B CI Existence with SISO
In this subsection, we numerically evaluate the feasible region of the transmit power of the PS and the CI angle with for the evolved CI requirement, as shown in Fig. 7 and 8, in SISO-based BackComs.
Fig. 7 shows the transmit power and the CI angle versus the acceptable DEP (). Fig. 7(a) shows the lower and upper bounds of the transmit power for building the CI under different . As increases, only the lower bound of the transmit power decreases, while its upper bound is unaffected. The reason is that the increased makes lower so that a small power is enough to satisfy the required KLD. This also illustrates that the CI region of transmit power becomes wider with a higher . Besides, it can be seen that, from Fig. 7(b), the maximum CI angle decreases with the decreasing . This means that when the DEP requirement becomes stricter, the feasible region of the CI angle is shrunk. In combination with Fig. 6(a), it shows a trade-off between the size of the CI region and the DEP, especially for the lower bound of the CI region.
The transmit power and the CI angle under the channel path-loss exponent are shown in Fig. 8(a) and Fig. 8(b), respectively. From Fig. 8(a), both the upper and lower bounds of the transmit power increase with the channel path-loss exponent, and the gap between them becomes more significant (i.e., the CI region of the transmit power becomes larger). The reason is that when the channel path-loss exponent becomes larger, the channel gain of both the DL and the BL decreases, which not only leads to a larger transmit power needed to satisfy the minimum KLD requirement but also enlarges the upper bound of the transmit power according to (LABEL:s3c). There is a weakly increasing trend of the maximum CI angle with the growth of the channel path-loss exponent as shown in Fig. 8(b). Since according to the expression of , and are in conflict, which attenuates the effect on maximum CI angle. In short, when the channel path-loss exponent is larger, the construction of the CI region has higher freedom.
V Conclusions
This paper investigates and analyzes the CI region for BackComs with multiple tags and a multi-antennas reader, where tag selection and receive beamforming are taken into account. Specifically, a KLD-oriented approach is proposed to build the CI region for the DLI, and two optimization problems under different CI requirements with the single- and multi-antenna PSs, respectively, are formulated. Then, we reformulate these original problems with some transformation, and then propose the corresponding algorithms, respectively, which involve two SCA-based alternative algorithms for beamforming design, and a greedy algorithm for tag selection. Furthermore, a closed-form expression for the CI angle is derived in the BackCom system with a single-antenna reader. Simulation results show that the performance of the proposed algorithm outperforms benchmark algorithms in terms of the received SNR, and confirm the derived channel angle for the CI.
Appendix A Proof of Theorem 1
Defining , where , the first-order derivative of is
(60) |
Letting and , we have
(61) |
Thus, can be written as
(62) |
where .
As shown in the Fig. 9, there are two potential solution regions for satisfying (62). According to the limitation of the feasible region in (61), we can round off a solution region. However, it is still challenging to solve this inequality due to its non-convexity. To this end, taking (62) as an equivalent transformation, we have
(63) |
Since , based on Lambert function [49], we have
(64) |
Thus, we can obtain the solutions of , i.e.,
(65) |
where and .
Similarly, can be rewritten as
(66) |
where . This completes the proof.
Appendix B Proof of Theorem 2
Appendix C Proof of Theorems 3
Appendix D Proof of Theorems 4
According to the definition of vectorial angle, we have
(75) |
Similarly, we can obtain
(76) |
According to (72), we have
(77) |
Due to the mutuality of angles, we have
(78) |
Further, it does not make sense when holds, so we have
(79) |
where . This completes the proof.
Appendix E Problem Formulation and Solution
-
•
Problem Formulation
By removing the CI constraint and regarding the DL as interference, the original optimization problem is transformed into one for maximizing the signal-to-interference-plus-noise ratio (SINR) under scheme I, which is expressed as
(80) -
•
Algorithm Design
It is obvious that the minimum-mean-square-error (MMSE) approach can be used to obtain the optimal receive beamforming vector to problem (80) with fixed tag selection factor . And then, optimal can be solved by using the same greedy algorithm. In particular, the MMSE-based receive beamforming is written as
(81)
References
- [1] M. Vaezi et al., “Cellular, wide-area, and non-terrestrial IoT: A survey on 5G advances and the road towards 6G,” IEEE Commun. Surveys Tuts., vol. 24, no. 2, pp. 1117–1174, 2nd Quart. 2022.
- [2] Y. Xu, G. Gui, H. Gacanin, and F. Adachi, “A survey on resource allocation for 5G heterogeneous networks: Current research, future trends, and challenges,” IEEE Commun. Surveys Tuts., vol. 23, no. 2, pp. 668–695, 2nd Quart. 2021.
- [3] M. Centenaro et al., “A survey on technologies, standards and open challenges in satellite IoT,” IEEE Commun. Surveys Tuts., vol. 23, no. 3, pp. 1693–1720, 3rd Quart. 2021.
- [4] N. Van Huynh et al., “Ambient backscatter communications: A contemporary survey,” IEEE Commun. Surveys Tuts., vol. 20, no. 4, pp. 2889-2922, 4th Quart. 2018.
- [5] U. S. Toro, K. Wu, and V. C. M. Leung, “Backscatter wireless communications and sensing in green Internet of Things,” IEEE Trans. Green Commun. Netw., vol. 6, no. 1, pp. 37–55, Mar. 2022.
- [6] M. Jin et al., “Parallel backscatter in the wild: When burstiness and randomness play with you,” IEEE/ACM Trans. Netw., vol. 29, no. 1, pp. 65–77, Feb. 2021.
- [7] D. Bharadia et al. “BackFi: High throughput WiFi backscatter,” in Proc. SIGCOMM, pp. 283–296, Aug. 2015.
- [8] P. Patel and J. Holtzman, “Analysis of a simple successive interference cancellation scheme in a DS/CDMA system,” IEEE J. Select Areas Commun., vol. 12, no. 5, pp. 796–807, Jun. 1994.
- [9] Y. Xu, Z. Qin, G. Gui, H. Gacanin, H. Sari, and F. Adachi, “Energy efficiency maximization in NOMA enabled backscatter communications with QoS guarantee,” IEEE Wireless Commun. Lett., vol. 10, no. 2, pp. 353–357, Feb. 2021.
- [10] P. Hu, P. Zhang, M. Rostami, and D. Ganesan, “Braidio: An integrated active-passive radio for mobile devices with asymmetric energy budgets,” in Proc. ACM SIGCOMM, pp. 484–397, Aug. 2016.
- [11] P. Zhang et al., “Enabling practical backscatter communication for on-body sensors,” in Proc. ACM SIGCOMM, pp. 370–383, Aug. 2016.
- [12] P. Zhang et al., “ Freerider: Backscatter communication using commodity radios.” in Proc. ACM CoNEXT, pp. 389–401, Nov. 2017.
- [13] D. Li and Y. -C. Liang, “Price-based bandwidth allocation for backscatter communication with bandwidth constraints,” IEEE Trans. Wireless Commun., vol. 18, no. 11, pp. 5170–5180, Nov. 2019.
- [14] D. Li, “Capacity of backscatter communication with frequency shift in rician fading channels,” IEEE Wireless Commun. Lett., vol. 8, no. 6, pp. 1639–1643, Dec. 2019.
- [15] G. Yang and Y.-C. Liang, “Backscatter communications over ambient OFDM signals: transceiver design and performance analysis,” in Proc. IEEE GLOBECOM, pp. 1–6, Dec. 2016.
- [16] D. Darsena, “Noncoherent detection for ambient backscatter communications over OFDM signals,” IEEE Access, vol. 7, pp. 159415–159425, Oct. 2019.
- [17] D. Darsena, G. Gelli, and F. Verde, “Joint channel estimation, interference cancellation, and data detection for ambient backscatter communications,” in Proc. IEEE SPAWC, pp. 1-5, Aug. 2018.
- [18] Y. Xu et al., “Robust energy-efficient optimization for secure wireless-powered backscatter communications with a non-linear EH model,” IEEE Commun. Lett., vol. 25, no. 10, pp. 3209–3213, Oct. 2021.
- [19] B. Gu et al., “Many a little makes a mickle: Probing backscattering energy recycling for backscatter communications,” IEEE Trans. Veh. Technol., vol. 72, no. 1, pp. 1343–1348, Jan. 2023.
- [20] D. Li, “Two birds with one stone: Exploiting decode-and-forward relaying for opportunistic ambient backscattering,” IEEE Trans. Commun., vol. 68, no. 3, pp. 1405–1416, Mar. 2020.
- [21] D. Li, W. Peng, and F. Hu, “Capacity of backscatter communication systems with tag selection,” IEEE Trans. Veh. Technol., vol. 68, no. 10, pp. 10311–10314, Oct. 2019.
- [22] Y. Xu et al., “Joint computation offloading and radio resource allocation in MEC-based wireless-powered backscatter communication networks,” IEEE Trans. Veh. Technol., vol. 70, no. 6, pp. 6200–6205, Jun. 2021.
- [23] Y. Zhang, F. Gao, L. Fan, X. Lei, and G. K. Karagiannidis, “Secure communications for multi-tag backscatter systems,” IEEE Wireless Commun. Lett., vol. 8, no. 4, pp. 1146–1149, Aug. 2019.
- [24] D. M. Dobkin, T. Freed, C. Gerdom, C. Flores, E. Futak, and C. Suttner, “Cooperative tag communications,” in Proc. IEEE RFID-TA, pp. 27-32, Sept. 2015.
- [25] C. Pérez-Penichet, F. Hermans, and T. Voigt, “On limits of constructive interference in backscatter systems,” in Proc. GIoTS, pp. 1-5, Aug. 2017.
- [26] G. Zheng, M. Wen, Y. Chen, S. Zhao, and H. Du, “Interference exploitation for ambient backscatter communication networks via symbol level precoding,” IEEE Wireless Commun. Lett., vol. 11, no. 6, pp. 1166–1170, Jun. 2022.
- [27] C. Liu et al., “Deep transfer learning for signal detection in ambient backscatter communications,” IEEE Trans. Wireless Commun., vol. 20, no. 3, pp. 1624–1638, Mar. 2021.
- [28] X. Lu, D. Niyato, H. Jiang, D. I. Kim, Y. Xiao, and Z. Han, “Ambient backscatter assisted wireless powered communications,” IEEE Wireless Commun., vol. 25, no. 2, pp. 170-177, Apr. 2018.
- [29] Y. Zhang, F. Gao, L. Fan, S. Jin, and H. Zhu, “Performance analysis for tag selection in backscatter communication systems over Nakagami-m fading channels,” in Proc. IEEE ICC, pp. 1–5, 2018.
- [30] Z. Ling, F. Hu, D. Li, and Z. Han, “Tag selection for backscatter communication in classified wireless body area networks,” in Proc. IEEE WCNCW, pp. 1–6, 2020.
- [31] D. Mishra and E. G. Larsson, “Optimal channel estimation for reciprocity-based backscattering with a full-duplex MIMO reader,” IEEE Trans. Signal Process., vol. 67, no. 6, pp. 1662–1677, Mar. 2019.
- [32] R. Long, Y. -C. Liang, H. Guo, G. Yang and R. Zhang, “Symbiotic radio: A new communication paradigm for passive Internet of Things,” IEEE Internet Things J., vol. 7, no. 2, pp. 1350–1363, Feb. 2020.
- [33] S. Ma et al., “Robust beamforming design for covert communications,” IEEE Trans. Inf. Forensics Security, vol. 16, pp. 3026–3038, 2021.
- [34] S. Yan, Y. Cong, S. V. Hanly, and X. Zhou, “Gaussian signalling for covert communications,” IEEE Trans. Wireless Commun., vol. 18, no. 7, pp. 3542–3553, July 2019.
- [35] Y. Li et al., “Performance analysis for covert communications under faster-than-Nyquist signaling,” IEEE Commun. Lett., vol. 26, no. 6, pp. 1240–1244, June 2022.
- [36] B. A. Bash, D. Goeckel, and D. Towsley, “Limits of reliable communication with low probability of detection on AWGN channels,” IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1921–1930, September 2013.
- [37] J. Bretagnolle and C. Huber. Estimation des densités: Risque minimax. Séminaire de Probabilités de Strasbourg, 12: 342–363, 1978.
- [38] W. Wang et al., “Resource allocation for IRS-aided JP-CoMP downlink cellular networks with underlaying D2D communications,” IEEE Trans. Wireless Commun., vol. 21, no. 6, pp. 4295–4309, June 2022.
- [39] Y. Ye, Interior Point Algorithm: Theory and Analysis. New York: Wiley, 1997.
- [40] D. Xu et al.,“Resource allocation for IRS-assisted full-duplex cognitive radio systems,” IEEE Trans. Commun., vol. 68, no. 12, pp. 7376–7394, Dec. 2020.
- [41] K. Yang, T. Jiang, Y. Shi, and Z. Ding, “Federated learning via over-the-air computation,” IEEE Trans. Wireless Commun., vol. 19, no. 3, pp. 2022–2035, Mar. 2020.
- [42] Q. Li, Q. Zhang, and J. Qin, “Secure relay beamforming for SWIPT in amplify-and-forward two-way relay networks,” IEEE Trans. Veh. Technol., vol. 65, no. 11, pp. 9006–9019, Nov. 2016.
- [43] Q. Shi and M. Hong, “Penalty dual decomposition method with application in signal processing,” in Proc. IEEE ICASSP, pp. 4059-4063, 2017.
- [44] M. R. Osborne, B. Presnell, and B. A. Turlach, “On the LASSO and its dual,” J. Comput. Graph. Stat., vol. 9, pp. 319–337, 2000.
- [45] A. Bereyhi, A. Vagollari, S. Asaad, R. R. Muller, W. Gerstacker, and H. V. Poor, “Matching pursuit based scheduling for over-the-air federated learning,” arXiv preprint arXiv:2206.06679, 2022.
- [46] Y. Tao, B. Li, C. Zhao, and Y. -C. Liang, “Hardware-efficient signal detection for ambient backscattering communications,” IEEE Commun. Lett., vol. 23, no. 12, pp. 2196–2199, Dec. 2019.
- [47] M. Grant and S. Boyd. (Apr. 2011). CVX: MATLAB Software for Disciplined Convex Programming. [Online]. Available: http://cvxr.com/cvx.
- [48] P. Ramezani and A. Jamalipour, “Optimal resource allocation in backscatter assisted WPCN with practical energy harvesting model,” IEEE Trans. Veh. Technol., vol. 68, no. 12, pp. 12406–12410, Dec. 2019.
- [49] F. C. Blondeau and A. Monir, “Numerical evaluation of the Lambert function and application to generation of generalized Gaussian noise with exponent 1/2,” IEEE Trans. Signal Process., vol. 50, no. 9, pp. 2160–2165, Sept. 2002.