This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Symbiotic Radio: Cognitive Backscattering Communications for Future Wireless Networks

Ying-Chang Liang, Fellow, IEEE, Qianqian Zhang, Erik G. Larsson, Fellow, IEEE,
and Geoffrey Ye Li, Fellow, IEEE
Y.-C. Liang is with the Center for Intelligent Networking and Communications (CINC), University of Electronic Science and Technology of China (UESTC), Chengdu 611731, China (e-mail: [email protected]). Q. Zhang is with the National Key Laboratory of Science and Technology on Communications, and the Center for Intelligent Networking and Communications (CINC), University of Electronic Science and Technology of China (UESTC), Chengdu 611731, China (e-mails: [email protected]). E. G. Larsson is with the Department of Electrical Engineering (ISY), Linköping University, SE-581 83 Linköping, Sweden (email: [email protected]). G. Y. Li is with the School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA 30332-0250 USA (e-mail: [email protected]).
Abstract

The heterogenous wireless services and exponentially growing traffic call for novel spectrum- and energy-efficient wireless communication technologies. In this paper, a new technique, called symbiotic radio (SR), is proposed to exploit the benefits and address the drawbacks of cognitive radio (CR) and ambient backscattering communications (AmBC), leading to mutualism spectrum sharing and highly reliable backscattering communications. In particular, the secondary transmitter (STx) in SR transmits messages to the secondary receiver (SRx) over the RF signals originating from the primary transmitter (PTx) based on cognitive backscattering communications, thus the secondary system shares not only the radio spectrum, but also the power, and infrastructure with the primary system. In return, the secondary transmission provides beneficial multipath diversity to the primary system, therefore the two systems form mutualism spectrum sharing. More importantly, joint decoding is exploited at SRx to achieve highly reliable backscattering communications. To exploit the full potential of SR, in this paper, we address three fundamental tasks in SR: (1) enhancing the backscattering link via active load; (2) achieving highly reliable communications through joint decoding; and (3) capturing PTx’s RF signals using reconfigurable intelligent surfaces. Emerging applications, design challenges and open research problems will also be discussed.

Index Terms:
Symbiotic radio, cognitive radio, ambient backscattering communications, spectrum management, spectrum efficiency, energy efficiency, joint decoding, reconfigurable intelligent surfaces, large intelligent antennas.

I Introduction

The development of digitalized society depends significantly on the advancements of wireless communication technologies. In order to further realize smart society, a variety of emerging wireless services need to be developed, such as holographic telepresence, Internet-of-Everything (IoE), and collaborative intelligence, which will drive the dramatic growth in data traffic, massive access, and versatile applications. According to the report from International Telecommunication Union (ITU) [1], the global mobile traffic will continue to grow exponentially and the overall mobile data traffic is estimated to reach over 50005000 EB per month in 2030. The device density will increase substantially to hundreds of devices per cubic meter and more than 125 billion mobile devices worldwide will be attached to the wireless networks by 2030 [2]. According to a study in [3], even just to support Internet-of-Things (IoT) for healthcare, utility, and motorway use, 76 GHz spectrum is required if dedicated spectrum is allocated to each service. However, most of the radio spectrum has been allocated to the existing services and applications, resulting in severe spectrum scarcity problem. The explosive growth in data traffic and device density calls for novel technologies to enhance the spectrum efficiency as well as energy-efficiency of wireless communications.

In the past two decades, cognitive radio (CR) technology has been extensively studied with the aim to enhance the utilization efficiency of the radio spectrum [4, 5, 6, 7]. This is achieved through introducing secondary spectrum access to the assigned spectrum. In particular, the secondary user in a CR system is allowed to access the radio spectrum assigned to the primary user in an opportunistic or spectrum sharing manner. The opportunistic access is assisted by spectrum sensing technologies, while in spectrum sharing model, the secondary transmission from the second transmitter (STx) to the second receiver (SRx) shares the same spectrum with the primary transmission from the primary transmitter (PTx) to the primary receiver (PRx). This is achieved by predicting the interference level from STx to PRx to ensure that the caused interference to the primary transmission is below a tolerable threshold. Despite the notable advancements, the primary and secondary transmissions in spectrum sharing model always interfere with each other, which limits the enhancement of the spectrum efficiency.

On the other hand, conventional transmitter design uses power-consuming active components, including oscillators, up-converters, and power amplifiers. Such active radio technology involves high power consumption, shortens battery life, and limits the development of the emerging services in future wireless networks [8]. Recently, backscattering radio technology has been exploited to design wireless transmitters without requiring active components, thus the power consumption of the transmitter can be greatly reduced. One example of passive radio technology is ambient backscatter communications (AmBC) [9], in which the STx embeds its message over the ambient radio frequency (RF) signals using backscattering modulation [10]. The ambient RF signals can be TV signal, WiFi signal, cellular signal, etc. In particular, by periodically varying the load impedance at the STx, the reflected signal from the STx contains different reflection coefficients representing the transmitted symbols of the STx. Thus through detecting the reflection coefficients, the SRx can decode the messages transmitted from STx. For recent development on AmBC, please refer to, e.g., [11].

In AmBC, the secondary and ambient communications form a special spectrum sharing relation, and the design objective at SRx is to recover the messages from STx only. Due to the ambient nature of the RF sources, non-coherent detectors have been extensively studied. For example, differential demodulation is proposed in [9], and energy detection has been considered in, e.g., [9, 12, 13, 14, 15, 16]. These non-coherent receivers suffer from strong direct link interference from the RF source, which degrades the detection performance significantly. While there are proposals to avoid the direct link interference using frequency shifting [17, 18, 19] or to cancel out such interference using specific waveform feature of the RF source [20, 21, 22, 23], the non-coherent nature of the receivers makes it difficult for AmBC to achieve highly reliable backscattering communications.

In this paper, a new technique, called symbiotic radio (SR), is proposed to exploit the benefits of CR and AmBC, and address the drawbacks of these two techniques effectively. Similar to CR, SR consists of two spectrum sharing systems, the primary system and secondary system. However, SR achieves mutually beneficial spectrum sharing rather than interfering spectrum sharing in CR. As compared to AmBC, SR achieves highly reliable backscattering communications through joint decoding. Thus, SR is also termed cognitive backscattering communications, which achieves enhanced spectrum- and energy-efficiency for wireless networks.

This paper is organized as follows. The SR basics and backscattering communications for SR are presented in Sections II and III, respectively. Then, in Sections IV and V, the transceiver design, and resource allocation schemes for SR are presented, respectively. Reconfigurable intelligent surface (RIS)-assisted SR and full-duplex SR are addressed in Section VI and VII, respectively. Emerging applications, design challenges, and open research problems will be discussed in the rest parts of the paper.

The list of abbreviations commonly appeared in this paper is given in Table I.

TABLE I: List of Abbreviations
Abbreviation Description
AmBC Ambient Backscatter Communications
AWGN Additive White Gaussian Noise
BER Bit-Error-Rate
BPSK Binary Phase Shift Keying
CR Cognitive Radio
DoA Direction-of-Arrival
FDSR Full-Duplex SR
IoE Internet-of-Everything
IoT Internet-of-Things
ITU International Telecommunication Union
MISO Multiple-Input-Single-Output
MMSE Minimum Mean-Squared-Error
MRC Maximum-Ratio-Combining
OFDM Orthogonal Frequency Division Multiplexing
PRx Primary Receiver
PTx Primary Transmitter
QAM Quadrature Amplitude Modulation
RF Radio Frequency
RIS Reconfigurable Intelligent Surface
RSR RIS-assisted SR
SISO Single-Input-Single-Output
SNR Signal-to-Noise-Ratio
SR Symbiotic Radio
SRx Second Receiver
STx Second Transmitter
ZF Zero-Forcing

II Symbiotic Radio Basics

SR is a cognitive backscattering communication system that exploits the benefits and addresses the drawbacks of CR and AmBC. The system model for a basic SR is shown in Fig. 1(a), which consists of two systems, the primary system and secondary system. Different from CR that uses power-consuming active RF chains at both PTx and STx shown in Fig. 1(b), the SR uses backscattering radio technology to support the secondary transmission from STx to SRx, which greatly reduces the power consumption. In particular, STx transmits its messages to SRx over the RF signals received from PTx by varying the reflection coefficients, thus the secondary system shares the spectrum, energy, and infrastructure of the primary system.

Refer to caption
(a) System model for SR.
Refer to caption
(b) System model for CR.
Figure 1: (a) System model for SR: PTx uses active radio to transmit messages to PRx, and STx exploits backscattering radio to transmit messages to SRx riding over the RF signals from PTx; and (b) System model for CR: PTx transmits messages to PRx, and STx transmits messages to SRx by sharing the same radio spectrum with the primary system. STx refrains its transmit power to ensure that the caused interference level to PRx is below a tolerable threshold. Solid lines denote transmissions from active radios, while dash lines denote reflections from backscattering radios.

More importantly, the two systems in SR operate in a collaborative manner in both the transmitter and receiver sides. By doing so, joint decoding is exploited at the SRx to decode both primary and secondary messages, thus avoiding the interference issue, and achieving highly reliable backscattering communications. In return, the secondary system provides multipath diversity to the primary system, yielding mutual benefits between the two spectrum sharing systems. Therefore, SR is also called cognitive backscattering communications which achieves two challenging goals for wireless communications:

  • (1)

    enhanced spectrum efficiency using mutualism spectrum sharing;

  • (2)

    enhanced energy efficiency through highly reliable backscattering communications.

The beneficial effect of the backscattering radio to primary system was first observed in [24, 25] and [26], and the symbiotic relation between the two systems was revealed in [27]. Later on, several studies on SR were published in, e.g., [28, 29, 30, 31]. SR has also been recently considered as a potential solution for the six generation (6G) wireless networks, especially as an energy- and spectrum-efficient massive access technology [32, 33, 34, 35].

Despite the advantages of SR, several fundamental challenges need to be tackled in order to fully exploit the potentials of SR. From Fig. 1(a), the backscattering link from PTx-STx-SRx suffers from double fading, thus its strength is much weaker than that of the direct link from PTx to SRx. It is thus important to enhance the backscattering link such that the mutual benefits to the primary and secondary systems can be improved. On the other hand, the backscattering radios can backscatter all ambient signals within a specific frequency band, thus it is essential to capture which RF signals the secondary system wants to ride on. Finally, effective transceiver designs are required in order to achieve highly reliable backscattering communications.

In this paper, we will address the following issues related to SR:

  • (1)

    enhancing the backscattering link via active load and/or multiple antenna elements;

  • (2)

    achieving highly reliable communications through joint decoding;

  • (3)

    capturing PTx’s RF signals using RIS.

When the STx is equipped with RIS, this system is called RIS-assisted SR (RSR). Note in some cases, the PRx and SRx in Fig. 1(a) can be the same node, which is to decode the primary and secondary messages simultaneously. In addition, when the PTx has full duplex functionality, it can be used to decode the messages from STx, and this model is called full-duplex SR (FDSR).

III Backscattering Communication for SR

In this section, we will introduce the backscattering principles, backscattering modulation, and schemes to enhance the backscattering link via active load, which will serve as the basis for SR.

III-A Backscattering Principles

The basic circuit for backscattering radios is shown in Fig. 2. Suppose that s(t)s(t) is baseband signal transmitted from PTx, the RF output from the PTx antenna is x0(t)=Re{ps(t)ej2πfct}x_{0}(t)={\rm{Re}}\{\sqrt{p}s(t)e^{j2\pi f_{c}t}\}, where fcf_{c} is the carrier frequency. Let x(t)x(t) be the input to the backscattering circuit at STx, and θ(t)\theta(t) be the reflection coefficient, then signal reflected from the backscattering circuit is θ(t)x(t)\theta(t)x(t).

Refer to caption
Figure 2: Basic backscattering circuits.

Let ZaZ_{a} and ZL,iZ_{L,i} be the antenna and load impedances of the backscattering circuits at STx, respectively. From the antenna scattering theory [36], the electric field of the reflected signal can be decomposed into two components, the structural mode backscattering component, and the antenna mode backscattering component. The structural mode backscattering component can be accounted into part of the environmental multipath [37], while the antenna mode backscattering component is determined by the mismatch between the antenna and load impedances, yielding the reflection coefficient given by

Γi=ZL,iZaZL,i+Za.\displaystyle\Gamma_{i}=\frac{Z_{L,i}-Z_{a}^{*}}{Z_{L,i}+Z_{a}}. (1)

Note when ZL,i=ZaZ_{L,i}=Z_{a}^{*}, Γi=0\Gamma_{i}=0. Thus, by changing the value of the load impedance with a switcher, the STx can generate the following time-varying reflection coefficient

θ(t)=Γi,\displaystyle\theta(t)=\Gamma_{i}, (2)

if load ZL,iZ_{L,i} is switched on at time instant tt.

III-B Backscattering Modulation

By changing the load impedance periodically, the STx can generate different reflection coefficients, which represent the information to be sent to the SRx. The key issue for backscattering modulation is to design an appropriate reflection coefficient set corresponding to the signal constellation set 𝒜𝖼\mathcal{A}_{\sf c}. Basically, the number of the load impedance states attributes to the modulation order. Taking binary phase shift keying (BPSK) as an example, the STx only needs two load impedance states to represent symbols ’-1’ and ’1’. In order to improve the transmission efficiency, high order modulation schemes, like quadrature amplitude modulation (QAM), can be developed. The relation between the complex constellation point ci𝒜𝖼c_{i}\in\mathcal{A}_{\sf c} and the reflection coefficient Γi\Gamma_{i} is given by [38]

Γi=αci|c|max,\Gamma_{i}=\alpha\cdot\frac{c_{i}}{|c|_{max}}, (3)

where α\alpha accounts for the reflection efficiency of the circuits [10] and its value is generally 0α10\leq\alpha\leq 1 with the passive load, and |c|max=maxc𝒜𝖼|c||c|_{max}=\max_{c\in\mathcal{A}_{\sf c}}|c| is the largest amplitude of the constellation points, which is presented in the denominator due to the limitation that the passive reflection coefficient cannot be greater than unity. Without loss of generality, we normalize the constellation points such that |c|max=1|c|_{max}=1. Once the reflection coefficient Γi\Gamma_{i} is given, the corresponding load impedance ZL,iZ_{L,i} is chosen as

ZL,i=Za+ΓiZa1Γi.Z_{L,i}=\frac{Z_{\mathrm{a}}^{*}+\Gamma_{i}Z_{\mathrm{a}}}{1-\Gamma_{i}}. (4)

III-C Enhancing Backscattering Link

From Fig. (a), the backscattering link suffers from double fading, and thus the strength of the backscattering link signal in SR is much weaker than that of the direct link signal, which will limit the performance of the secondary system and the improvement to the primary system. Typically, there are two solutions to enhance the strength of the backscattering link. One is to amplify the backscattering link by using an active load at the STx. The other is to introduce multiple antenna elements or called RIS at the STx. The use of RIS in STx can not only enhance the backscattering link, but also capture the RF signals from desired sources using passive beamforming, and its details will be discussed in Section VI. Here, we mainly describe the amplification principle based on the backscattering technology.

Recent advances in backscattering communications show that the STx can take advantages of the active load, whose resistance is negative, to amplify the incident signal [39]. Specifically, provided that the impedance of the active load is ZL,i=RL,i+jXL,i,RL,i>0Z_{L,i}=-R_{L,i}+jX_{L,i},\quad R_{L,i}>0, and the antenna impedance is ZA=RA+jXA,RA>0Z_{A}=R_{A}+jX_{A},~{}R_{A}>0, the reflection coefficient is then characterized with

|Γi|2=(RL,i+RA)2+(XL,i+XA)2(RL,iRA)2+(XL,i+XA)2>1,|\Gamma_{i}|^{2}=\frac{\left(R_{L,i}+R_{A}\right)^{2}+\left(X_{L,i}+X_{A}\right)^{2}}{\left(R_{L,i}-R_{A}\right)^{2}+\left(X_{L,i}+X_{A}\right)^{2}}>1, (5)

which implies that the STx can amplify the incident signal. Such signal amplification however needs additional biasing source to support the active load, which can be realized by Tunnel diodes [40, 39, 41, 42] or CMOS technology [43].

IV Transceiver Design for SR

Refer to caption
(a) Primary transmission.
Refer to caption
(b) Secondary transmission.
Figure 3: Illustration for SR transmissions: (a) Primary signal sk(n)s_{k}(n); (b) Secondary signal c(n)c(n). One secondary symbol period covers KK primary symbol periods.

As with every communication system, the receivers are required to recover the messages transmitted from the transmitters. In the proposed SR system, the PRx and SRx are supposed to recover the primary and secondary information messages, respectively. However, in order to fully exploit the potentials of SR, we use joint decoding to recover both primary and secondary messages in each receiver. To do so, we will first provide detailed description on the signal models and transceiver design schemes. We will also compare SR with CR, and SR with AmBC in details.

IV-A Signal Models

Denote TsT_{s} and TcT_{c} as the symbol periods for the primary transmission and the secondary transmission, respectively. In SR, we assume that each secondary symbol period covers KK (KK is an integer) primary symbol periods, i.e., Tc=KTsT_{c}=KT_{s}, as shown in Fig. 3. Denote c(n)𝒜𝖼c(n)\in\mathcal{A}_{\sf c} as the nnth symbol of the secondary transmission and sk(n)𝒜𝗌s_{k}(n)\in\mathcal{A}_{\sf s} the kkth primary symbol within the nnth secondary symbol period, where k=1,,Kk=1,\cdots,K. Note that synchronization between sk(n)s_{k}(n) and c(n)c(n) is required for K=1K=1 to avoid spectrum growth, but for large KK, the spectrum growth due to asynchronous transmission of sk(n)s_{k}(n) and c(n)c(n) becomes negligible [44, 45].

We assume that the SRx has MrM_{r} antennas and the channel remains unchanged during a secondary data frame but may vary from one frame to another. Denote by hm,1h_{m,1} the channel coefficient from the PTx to the mm-th receive antenna at the SRx, by ll the channel coefficient from the PTx to the STx, and by gmg_{m} the channel coefficient from the STx to the mm-th receive antenna at the SRx. Let pp be the average transmit power at the PTx. The received signal at the SRx can be written as

𝐲k(n)=p𝐡1sk(n)+p𝐡2sk(n)c(n)+𝐮k(n),\displaystyle\mathbf{y}_{k}(n)={\sqrt{p}\mathbf{h}_{1}s_{k}(n)}+{\sqrt{p}\mathbf{h}_{2}s_{k}(n)c(n)}+\mathbf{u}_{k}(n), (6)

for k=1,,Kk=1,\cdots,K, where 𝐡1=[h1,1,,hMr,1]T\mathbf{h}_{1}=[h_{1,1},\cdots,h_{M_{r},1}]^{T}, 𝐠=[g1,,gMr]T\mathbf{g}=[g_{1},\cdots,g_{M_{r}}]^{T}, 𝐡2=αl𝐠\mathbf{h}_{2}=\alpha l\mathbf{g}, and 𝐮k(n)𝒞𝒩(0,σ𝐈2)\mathbf{u}_{k}(n)\sim\mathcal{CN}(0,\sigma{{}^{2}}\mathbf{I}). In (6), the first and second terms of the right hand side represent the direct link and backscattering link components, respectively.

Similarly, the received signal at the PRx can be written as

𝐳k(n)=p𝐟1sk(n)+p𝐟2sk(n)c(n)+𝐯k(n),\displaystyle\mathbf{z}_{k}(n)={\sqrt{p}\mathbf{f}_{1}s_{k}(n)}+{\sqrt{p}\mathbf{f}_{2}s_{k}(n)c(n)}+\mathbf{v}_{k}(n), (7)

for k=1,,Kk=1,\cdots,K, where 𝐟1\mathbf{f}_{1} is the channel information from the PTx to the PRx, 𝐪\mathbf{q} is the channel information from the STx to the PRx, 𝐟2=αl𝐪\mathbf{f}_{2}=\alpha l\mathbf{q}, and 𝐯k(n)𝒞𝒩(0,σ𝐈2)\mathbf{v}_{k}(n)\sim\mathcal{CN}(0,\sigma{{}^{2}}\mathbf{I}). Due to the symmetry of the transmission structure in (6) and (7), we consider the signal detection at SRx only. The extension to the signal detection at PRx is straightforward.

IV-B Coherent Receiver Design

When pilot symbols for both primary and secondary transmissions are jointly designed and transmitted, the channel responses 𝐡1\mathbf{h}_{1} and 𝐡2\mathbf{h}_{2} can be estimated at the SRx. Coherent receivers [25], such as optimal maximum-likelihood (ML) detector, linear detector, and successive interference cancellation (SIC)-based detector, can be designed to jointly recover the primary and secondary signals.

IV-B1 ML Detector

Let c(n)𝒜𝖼c(n)\in\mathcal{A}_{\sf c} and sk(n)𝒜𝗌s_{k}(n)\in\mathcal{A}_{\sf s}, the ML detector recovers 𝐱^ml(n)=[s^1(n),,s^K(n),c^(n)]T\hat{\mathbf{x}}_{ml}(n)=[\hat{s}_{1}(n),\cdots,\hat{s}_{K}(n),\hat{c}(n)]^{T} by searching the candidate with minimum squared error, i.e.,

𝐱^ml(n)=\displaystyle\hat{\mathbf{x}}_{ml}(n)\!=\!
argminc(n)𝒜𝖼,sk(n)𝒜𝗌,kk=1K𝐲k(n)p𝐡1sk(n)p𝐡2sk(n)c(n)2.\displaystyle\underset{\begin{subarray}{c}c(n)\in\mathcal{A}_{\sf c},\\ s_{k}(n)\in\mathcal{A}_{\sf s},\forall k\end{subarray}}{\arg\min}\!\sum\limits_{k=1}^{K}\!\left\|\mathbf{y}_{k}(n)\!-\!\sqrt{p}\mathbf{h}_{1}s_{k}(n)\!-\!\sqrt{p}\mathbf{h}_{2}s_{k}(n)c(n)\right\|^{2}. (8)

Note the ML detector only requires to search K|𝒜𝖼||𝒜𝗌|K|\mathcal{A}_{\sf c}||\mathcal{A}_{\sf s}| possible symbol sets. This is achieved by the following steps. Firstly, we apply spatial domain maximum-ratio-combining (MRC) to decode sk(n)s_{k}(n) conditioned on each c(n)c(n) candidate in 𝒜𝖼\mathcal{A}_{\sf c} and obtain s^k(n)|c(n)\widehat{s}_{k}(n)|_{c(n)}. Then, we obtain the estimated c^(n)\widehat{c}(n) with the minimal squared error by searching all the conditional estimates s^k(n)|c(n)\widehat{s}_{k}(n)|_{c(n)} for each c(n)c(n). Finally, we obtain the estimated s^k(n)=s^k(n)|c^(n)\widehat{s}_{k}(n)=\widehat{s}_{k}(n)|_{\widehat{c}(n)} corresponding to the estimated c^(n)\widehat{c}(n).

IV-B2 Linear Detectors

The received signal at PRx can be written as 𝐲k(n)=p𝐇𝐱k(n)+𝐮k(n)\mathbf{y}_{k}(n)=\sqrt{p}\mathbf{H}\mathbf{x}_{k}(n)+\mathbf{u}_{k}(n), where 𝐇=[𝐡1,𝐡2]\mathbf{H}=[\mathbf{h}_{1},\mathbf{h}_{2}], 𝐱k(n)=[sk(n),sk(n)c(n)]T\mathbf{x}_{k}(n)=[s_{k}(n),s_{k}(n)c(n)]^{T}. Linear detectors, such as MRC, zero-forcing (ZF), and minimum mean-squared-error (MMSE) detectors, can be used to extract 𝐱k(n)\mathbf{x}_{k}(n), and then sk(n)s_{k}(n) and c(n)c(n) are recovered from 𝐱k(n)\mathbf{x}_{k}(n). Specifically, the received signal can be simplified as

𝐲~(n)=p𝐇~𝐱~(n)+𝐮~(n),\displaystyle\widetilde{\mathbf{y}}(n)=\sqrt{p}\widetilde{\mathbf{H}}\widetilde{\mathbf{x}}(n)+\widetilde{\mathbf{u}}(n), (9)

where 𝐲~(n)=[𝐲1(n),,𝐲K(n)]TMrK×1\widetilde{\mathbf{y}}(n)=[\mathbf{y}_{1}(n),\ldots,\mathbf{y}_{K(n)}]^{T}\in\mathbb{C}^{M_{r}K\times 1}, 𝐇~=diag{𝐇,,𝐇}MrK×2K\widetilde{\mathbf{H}}=\operatorname{diag}\{\mathbf{H},\ \ldots,\ \mathbf{H}\}\in\mathbb{C}^{M_{r}K\times 2K}, 𝐱~(n)=[𝐱1(n),,𝐱K(n)]T2K×1\widetilde{\mathbf{x}}(n)=[\mathbf{x}_{1}(n),\ldots,\mathbf{x}_{K}(n)]^{T}\in\mathbb{C}^{2K\times 1}, and 𝐮~(n)=[𝐮1(n),,𝐮K(n)]TMrK×1\widetilde{\mathbf{u}}(n)=[\mathbf{u}_{1}(n),\ldots,\mathbf{u}_{K}(n)]^{T}\in\mathbb{C}^{M_{r}K\times 1}. Then, the linear detectors extract 𝐱~(n)\widetilde{\mathbf{x}}(n) by

𝐱¯(n)=𝐓𝐲~(n),\displaystyle{\overline{\mathbf{x}}}(n)=\mathbf{T}\widetilde{\mathbf{y}}(n), (10)

where 𝐓=diag{𝐓1;,𝐓K}2K×MrK\mathbf{T}=\operatorname{diag}\{\mathbf{T}_{1};\ldots,\mathbf{T}_{K}\}\in\mathbb{C}^{2K\times M_{r}K}, and the corresponding 𝐓k\mathbf{T}_{k} is given as follows:

𝐓k={[𝐡1H𝐡12;𝐡2H𝐡22],for   MRC(𝐇H𝐇)1𝐇H,for   ZF, (𝐇H𝐇+σ2p𝐈2)1𝐇H,for   MMSE,\displaystyle\mathbf{T}_{k}\!=\!\left\{\!\begin{array}[]{cl}\left[\frac{\mathbf{h}_{1}^{H}}{\left\|\mathbf{h}_{1}\right\|^{2}};\frac{\mathbf{h}_{2}^{H}}{\left\|\mathbf{h}_{2}\right\|^{2}}\right],&\text{for \ \ MRC}\\ \left(\mathbf{H}^{H}\mathbf{H}\right)^{-1}\mathbf{H}^{H},&\text{for \ \ ZF, }\\ \left(\mathbf{H}^{H}\mathbf{H}+\frac{\sigma^{2}}{p}\mathbf{I}_{2}\right)^{-1}\mathbf{H}^{H},&\text{for \ \ MMSE},\end{array}\right. (14)

where 𝐈2\mathbf{I}_{2} is a two-dimensional identity matrix. After the linear detection, the primary and secondary symbols can be recovered by

s^k(n)\displaystyle\widehat{s}_{k}(n) =argminsk(n)𝒜𝗌|sk(n)x¯2k1(n)|,k\displaystyle\!=\!\underset{s_{k}(n)\in\mathcal{A}_{\sf s}}{\arg\min}\left|s_{k}(n)\!-\!\bar{x}_{2k-1}(n)\right|,\forall k (15)
c^(n)\displaystyle\widehat{c}(n) =argminc(n)𝒜𝖼k=1K|c(n)x¯2k(n)s^k(n)|,\displaystyle=\underset{c(n)\in\mathcal{A}_{\sf c}}{\arg\min}\sum\limits_{k=1}^{K}\left|c(n)-\frac{\bar{x}_{2k}(n)}{\widehat{s}_{k}(n)}\right|, (16)

where x¯k(n)\bar{x}_{k}(n) is the kk-th element of 𝐱¯(n){\overline{\mathbf{x}}}(n). Compared with the ML detector, the linear detector has lower complexity at the cost of performance degradation.

IV-B3 SIC-Based Detectors

SIC technique can be used to decode sk(n)s_{k}(n) and c(n)c(n). Firstly, the primary symbol sk(n)s_{k}(n) is estimated by using linear detector. Then the receiver subtracts the direct link signal with the estimated s^k(n)\widehat{s}_{k}(n) and detects the secondary symbol c(n)c(n) by the MRC estimator. Finally, the receiver re-estimates primary symbol sk(n)s_{k}(n) using MRC by treating estimated c^(n)\widehat{c}(n) as a part of channel. Compared with the linear detectors, the SIC-based detectors have better bit-error-rate (BER) performance at the cost of a slightly higher computational complexity.

In [25], various types of detectors mentioned above are studied for flat fading channels and frequency-selective fading channels. For both kinds of channels, the BER expressions for all detectors are derived in closed forms. Extensive numerical results have shown that the existence of the secondary transmission can enhance the BER performance of the primary transmission due to the additional multipath provided by the backscattering link. Meanwhile, the BER performance of both sk(n)s_{k}(n) and c(n)c(n) improves as KK increases. Specifically, the BER performance of c(n)c(n) achieves around 33 dB signal-to-noise-ratio (SNR) gain when KK increases by two times due to the spreading gain for the secondary transmission.

IV-C Semi-blind Receiver Design

When the SRx knows the STx pilots only and partial knowledge about the primary transmission is available, semi-blind receiver can be designed to recover the secondary message. Particularly, machine-learning detectors have been designed to recover the secondary message by using clustering frameworks [46]. The constellation learning-based signal detection scheme uses the constellation characteristic of the primary symbol to decode c(n)c(n). The received signals, 𝐲k(n)\mathbf{y}_{k}(n), naturally fall into clusters, which can be divided into two groups, corresponding to the secondary symbols “-1” or “1”. Thus, only two secondary labels are sent before secondary data transmission to map the two groups into the secondary symbols. It is worth noting that the cluster centroids can be represented by a small number of parameters, which can be learned using small sets of data. In addition, blind classification methods can be used to by SRx to recognize the modulation scheme of the primary system [47].

In [48], classification via kk-nearest neighbors is used to recover the STx symbols. The strong direct link signal is firstly eliminated through projecting the received signal at the SRx into its orthogonal space using the estimated direction-of-arrival (DoA) information of the direct link signal. Then proper beamformer at the SRx is designed to construct a test statistic, which is classified to recover the transmitted secondary symbol by using the kk-nearest neighbors classification algorithm.

IV-D Comparison of SR with CR

CR is an enabling technology to support efficient utilization of the radio spectrum, in which the secondary user is allowed to reuse the frequency bands assigned to the licensed primary user in an opportunistic or spectrum sharing manner [4, 5, 6, 7].

For the opportunistic manner of CR, the secondary user carries out spectrum sensing to detect the spectrum holes where the assigned frequency bands are not being utilized at a particular time by the primary user. After sensing the spectrum hole, the STx transmits messages to the SRx on the identified spectrum hole and simultaneously frequently monitors the operating spectrum to ensure that the PTx is not active. Once the PTx is active, the secondary user needs to vacate the operating spectrum for the primary transmission. The the activity model of the primary users can be used to assist for such operation [49]. Such model can be used to describe the coexistence between LTE and WiFi spectrum sharing system [50].

For the spectrum sharing manner of CR, as shown in Fig. 1(b), the secondary transmission coexists with the primary transmission at the same time, as long as the caused interference to the primary transmission is below a tolerable threshold. To calculate the caused interference at the the PRx, the STx is required to predict the channel information from the STx to the PRx. Moreover, the STx needs to know the tolerable threshold at the PRx to protect the primary transmission. With the above knowledge, power control is conducted at the STx to guarantee that there is no excessive interference to the PRx. The power control problem under either additive white Gaussian noise (AWGN) or fading channels with either the peak or the average interference power constraints are studied in [51, 52, 53]. The iterative water filling algorithm is commonly used to solve the optimal power allocation problem, in which the large gain channels are allocated with high power while the small gain channels are allocated with low power or no power.

Nevertheless, the primary and secondary transmissions in spectrum sharing model always interfere with each other, which limits the enhancement of the spectrum efficiency for CR. The secondary transmission in SR however can benefit the primary system due to the introduction of the multipath diversity. On the other hand, both PTx and STx in CR are with power-consuming active RF chains while SR provides power-dimensional sharing and infrastructure-dimensional sharing through backscattering radios in addition to the spectrum sharing. Therefore, compared with the CR technology, the SR technology can achieve mutual benefits and multiple dimensional resource sharing with high spectrum-, energy- and cost-efficiency.

IV-E Comparison of SR with AmBC

In AmBC, the primary and secondary systems are independently designed, thus the secondary system has no information about the primary system, such as modulation scheme, pilots, frame structure, etc. As such, the channel state information is difficult to acquire and noncoherent detection, such as energy detection that just classifies the average received energy into several categories, is commonly used to recover the secondary symbols [9, 12, 13, 14, 15, 16, 54].

In [9], the differential coding is used at the STx to avoid the channel estimation. The SRx firstly detects the STx transmitted symbols with energy detector and then uses the differential decoding to recover the transmitted information. The BER performance of the energy detector with differential coding under the signal-antenna PRx is analyzed in [12]. In [13], the joint energy detection is used to recover the STx information, in which the differential coding characteristics is combined into the energy detector for better performance. In [14], the pilots are transmitted at the STx to assist symbol recovery based on energy detection instead of using differential coding. To achieve high data rate of the secondary transmission, the high-order modulation, MM-PSK, is employed for backscattering at the STx in [15] and the optimal multilevel energy detector is used to recover the STx messages. Moreover, in [16], the STx transmits information by adjusting three states: positive and negative phase backscatter, and non-backscatter. Then, the corresponding detector at the SRx is designed to extract STx information. Manchester coding and differential Manchester coding are adopted at the STx in [54] to perform reliable detection and the corresponding detectors are proposed to recover the STx information.

Despite the above notable receiver design for AmBC, the energy detector suffers from a large performance loss since it treats the direct link signal as undesired interference. There are some proposals to avoid the direct link interference or to cancel out such interference. Specifically, in [17, 18, 19], the STx shifts the primary signal to an adjacent non-overlapping frequency band to avoid the direct link interference while this technique produces two sidebands, which may interfere with other communications. Waveform design at the STx is applied in [21, 20, 22, 23] to cancel out the direct link interference by exploiting the cyclic prefix structure when the PTx transmits orthogonal frequency division multiplexing (OFDM) signals.

While the proposals to avoid the direct link interference or to cancel out such interference can enhance the receiver performance, the non-coherent nature of the receivers makes it difficult for AmBC to achieve highly reliable backscattering communications. However, in SR, the primary and secondary systems work in collaborative manner, through which not only the PTx and the STx can be jointly designed, but also each receiver can jointly decode the primary and secondary messages. As a result, the existence of secondary transmission in SR can in return enhance the performance of the primary system.

To conclude, the detailed comparison among CR, AmBC, and SR is summarized in Table II.

TABLE II: Comparison of SR with CR and AmBC
Technology CR AmBC SR
Operating mechanism Active Backscatter-ing Backscatter-ing
Spectrum sharing Yes Yes Yes
Power sharing No Yes Yes
Transmit collaboration No No Yes
Joint decoding No No Yes
Relationship Interference Interference Mutualism

V Resource Allocation for SR

Resource allocation at the relevant nodes in SR plays an important role to fulfill the desired performance requirements for both primary and secondary transmissions. In this section, we first describe the achievable rates of the primary and secondary systems, based on which, we then address the resource allocation schemes for different setups, covering single-antenna PTx, multiple-antenna PTx, and full-duplex STx.

V-A Achievable Rates

From (7), the primary symbol, sk(n)s_{k}(n), is in both the direct and backscattering links, thus the receiver can treat the backscattering link as an additional path when decoding the primary symbols. As such, the achievable rate RsR_{s} of the primary system satisfies

Rs𝔼c[log2(1+p𝐟1+c𝐟22σ2)].R_{s}\leq\mathbb{E}_{c}\left[{{{\log}_{2}}\left(1+\frac{p\left\|\mathbf{f}_{1}+c\mathbf{f}_{2}\right\|^{2}}{\sigma^{2}}\right)}\right]. (17)

This upper bound is achieved when c(n)c(n) is perfectly decoded. For large KK, such perfect decoding for c(n)c(n) becomes possible due to the spreading gain. When K=1K=1, however, it is a challenging task to perfectly decode the secondary signal c(n)c(n) at the receiver. In this case, a worst situation happens when the backscattering link signal is thoroughly treated as interference when decoding the primary symbols. Thus we have

Rslog2(1+p𝐟12p𝐟22+σ2).R_{s}\geq\log_{2}\left(1+\frac{p\left\|\mathbf{f}_{1}\right\|^{2}}{p\left\|\mathbf{f}_{2}\right\|^{2}+\sigma^{2}}\right). (18)

For the secondary system, sk(n)s_{k}(n) is firstly decoded and then the SRx cancels the interference from the direct link signal. Thus when decoding c(n)c(n), the primary signal sk(n)s_{k}(n) can be viewed as a spread-spectrum code with length KK [21]. For K=1K=1, the achievable rate of the secondary system is given by [31]

Rc=𝔼sk(n)[log2(1+p𝐡2sk(n)2σ2)].R_{c}=\mathbb{E}_{s_{k}(n)}\left[{{{\log}_{2}}\left(1+\frac{p\left\|{\mathbf{h}}_{2}s_{k}(n)\right\|^{2}}{\sigma^{2}}\right)}\right]. (19)

For large KK, the achievable rate becomes [31]

Rc=1Klog2(1+Kp𝐡22σ2).R_{c}=\frac{1}{K}{{{\log}_{2}}\left(1+\frac{Kp\left\|{\mathbf{h}}_{2}\right\|^{2}}{\sigma^{2}}\right)}. (20)

The outage and the ergodic performance of the SR with K=1K=1 are analyzed in [28] and the analytical results show that at high SNR region, the ergodic rate of the secondary transmission increases by about 33 bit/s/Hz when the SNR increases 1010 dB. For large KK, the ergodic rate of SR under multi-antenna PTx and PRx are analyzed in [55] and the upper bound of the secondary rate increases with the number of receive antennas MrM_{r} and decreases with the transmission period KK, scaling like 1Klog2(KMr)\frac{1}{K}\log_{2}(KM_{r}) at high SNR region. The achievable rate region of SR for large KK under binary modulation at STx is analyzed in [26] and the results exhibit that the rate region of SRN is strictly larger than that of the conventional time division multiple access (TDMA) scheme.

V-B Single-Input-Single-Output (SISO) Primary Channel

For single-input-single-output (SISO) primary channel, the PTx is able to control its transmit power and the STx is able to adjust its reflection efficiency to fulfill specific performance metric requirements. The power and reflection efficiency constraints can be described as follows:

  • Peak Transmit Power Constraint: Let PpkP_{pk} be the peak power available at the transmitter, the power constraint is given by

    pPpk.p\leq P_{pk}. (21)
  • Average Transmit Power Constraint: When the long-term power budget PavP_{av} is considered, we have

    𝔼[p]Pav.\mathbb{E}[p]\leq P_{av}. (22)

    The expectation is usually taken over the channel realizations.

  • Reflection Efficiency Constraint: The reflection efficiency α\alpha can be adjusted in each fading block. It needs to satisfy the constraint:

    0α1.0\leq\alpha\leq 1. (23)

With the aforementioned constraints, the weighted sum ergodic rate maximization problem under the peak/average power constraint is considered in [30]. Specifically, by jointly optimizing the transmit power pp at the PTx and the reflection efficiency α\alpha at the STx, the ergodic weighted sum rate is maximized under either long-term or short-term transmit-power constraint over the fading states. It is shown that the larger the α\alpha is, the better performance for both systems is obtained, due to the mutualism of the two systems. Compared to the ergodic rate optimization in the CR networks [53] where the secondary system has to keep its interference level to the primary receiver below a pre-designed threshold, the STx in the SR does not need to consider the interference constraint. The power allocation problem under the average power constraint for three SR paradigms is considered in [27] and the outage probabilities for these paradigms based on the optimized α\alpha and pp are analyzed in [56]. It is shown that under different transmission schemes, there are different relationships between the achievable rates of the primary and secondary transmissions.

V-C Multiple-Input-Single-Output (MISO) Primary Channel

For multiple-input-single-output (MISO) primary channel, spatial degrees of freedom can be exploited to balance the objectives of the primary and secondary systems. Here are some constraints to be considered:

  • Transmit Beamforming Constraint: For a given power budget PtP_{t}, the transmit beamforming vector 𝐯{\mathbf{v}} should satisfy the following constraint

    𝐯2Pt.\left\|\mathbf{v}\right\|^{2}\leq P_{t}. (24)
  • Primary Transmission Rate Constraint: In the scenario where the primary system is sensitive to its transmit rate, the rate constraint should be considered, which is described as

    RsR~s,R_{s}\geq\tilde{R}_{s}, (25)

    where R~s\tilde{R}_{s} is the minimum primary transmission rate requirement.

  • Secondary Transmission Rate Constraint: The secondary transmission rate constraint is given by

    RcR~c,R_{c}\geq\tilde{R}_{c}, (26)

    where R~c\tilde{R}_{c} is the minimum secondary transmission rate requirement.

Considering the above constraints, by optimizing the transmit beamforming vector and the transmit power at the PTx, the weighted sum rate maximization problem and the transmit power minimization problem have been studied in [31]. By solving these optimization problems, the proposed SR not only enables the opportunistic transmission for the secondary system, but also enhances the primary transmission by properly exploiting the additional signal path provided by the secondary transmission. Moreover, the achievable rate of STx in finite block-length regime is considered in [57] and both of transmit power minimization and energy efficiency maximization optimization problems under the achievable throughput constraints are formulated to design the beamforming vector at the PTx.

V-D Full-duplex STx

The STx can be designed with full-duplex function [58, 29], where the STx is able to absorb a fraction of the incident signal to decode the messages from PTx, and simultaneously transmit its own information to the SRx by backscattering the remaining part of the incident signal. In [29], a full-duplex STx is considered in the SR and the achievable rates of secondary system with Gaussian and QAM codewords are derived, based on which, the power minimization problem is formulated to design the reflection efficiency at the STx as well as the beamforming vector at the PTx. The results show that the SR with full-duplex STx outperforms the optimally designed half-duplex scheme.

VI RIS-assisted SR (RSR)

RIS is a two-dimensional artificial structure including multiple reflecting elements and each reflecting element is able to reflect the incident signal with different reflection coefficients. With the assistance of RIS, the SR system can capture the direction of the signal from the PRx and enhance the strength of the backscattering link. For RSR, the STx in Fig. 1(a) is just an RIS. The PTx transmits information to the PRx, and the RIS as a STx embeds its messages over the primary RF signals to the SRx by using backscattering radio technology.

In RSR, let MbM_{b} be the number of reflecting elements at RIS, s(t)s(t) the baseband form signal transmitted from PTx, θm(t)\theta_{m}(t) the reflection coefficient at the mmth element, the backscattering link signal received at SRx in baseband form becomes

y(t)=m=1Mbgmθm(t)lms(t)+u(t),y(t)=\sum_{m=1}^{M_{b}}g_{m}\theta_{m}(t)l_{m}s(t)+u(t), (27)

where lml_{m} is the channel response from the PTx to the mth element of RIS, gmg_{m} is the one from the mth element to the SRx, and u(t)u(t) is the additive noise at the receiver. Generally, the reflecting elements are passive and both the amplitudes and phase shifts of each element can be adjusted, yielding |θm(t)|21,m|\theta_{m}(t)|^{2}\leq 1,\forall m. For some applications, constant amplitude constraint is imposed on θm(t)\theta_{m}(t) and in this case, only the phase shifts of the reflecting elements can be adjusted. Thus when the STx does not carry its own massages, the reflection coefficients can be chosen such that the objectives of the primary system are maximized. Thus the actively studied RIS [59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69] is in fact a special case of RSR.

When the reflection coefficients, θm(t)\theta_{m}(t), are time-invariant and are chosen properly, the received SNR in (27) of the backscattering link increases quadratically with the number of reflecting elements [59, 60, 61, 62]. When backscattering modulation is used, the information at the RIS can be represented by the time-varying reflection coefficients, through which beneficial performance gain to the primary transmission has also been observed [70, 71]. With reference to Fig. 1(a), even when the direct link from PTx-PRx is considered, the backscattering link from PTx-RIS-PRx can still enhance the performance of primary transmission. Thus, RSR is one solution to enhance the backscattering link signal to further enhance the performance of the primary and secondary transmissions.

On the other hand, as long as the RIS has the channel information, it can carry out passive beamforming by designing the reflection coefficients θm,m\theta_{m},\forall m, with which, the RSR system can capture the intended PTx signal instead of backscattering all the ambient signals, and thus it can avoid undesired interference at the SRx [71].

In [70] and [71], RSR is considered to enable the secondary transmission as well as to enhance the primary transmission via intelligently reconfiguring the wireless communications. By jointly designing the active transmit beamforming at the PTx and the backscattering beamforming at the RIS, the achievable rate for the secondary system is maximized with MISO primary channel under the primary rate constraint and other practical constraint in [70], and the transmit power is minimized with MIMO primary channel under some rate constraints for the SR in [71]. Both of the above studies show that with proper beamforming design, not only the secondary transmission can be successfully conducted, but also the primary performance with RIS assistance is superior to that without RIS.

VII Full-Duplex SR (FDSR)

If the PTx is with full-duplex function, as shown in Fig. 4, the PTx can not only transmit primary signal to the PRx but also receive the STx signals as a SRx, which is called FDSR system.

Refer to caption
Figure 4: System model for full-duplex SR: the PTx transmits primary signal to the PRx, and receives the STx signals as a SRx. Solid lines denote transmissions from active radios, while dash lines denote reflections from backscattering radios.

Denote by β1\beta_{1} the self-interference channel at the PTx and β2\beta_{2} the composite channel coefficient from the PTx to the STx and further to the PTx. The received signal at the PTx can be written as

yk(n)=pβ1sk(n)+pβ2sk(n)c(n)+uk(n),\displaystyle y_{k}(n)={\sqrt{p}\beta_{1}s_{k}(n)}+{\sqrt{p}\beta_{2}s_{k}(n)c(n)}+u_{k}(n), (28)

where uk(n)𝒞𝒩(0,σ)2u_{k}(n)\sim\mathcal{CN}(0,\sigma{{}^{2}}). Clearly, when the PTx recovers the STx message, it suffers from the self-interference caused by the transmitted signal. Due to the fact that the PTx has the exact information of sk(n)s_{k}(n), the first term in (28) can be canceled by using the self-interference cancellation technique. As such, the STx messages can be recovered with a high performance.

The FDSR system is firstly proposed in [72], where the WiFi AP is designed to have the full-duplex function and the WiFi AP can decode the backscatter signals from the STx in the process of transmitting data to normal WiFi users. The prototypes and experiments show that the communication rate can achieve 55 Mbps at a range of 11 m. The information-theoretic capacity of both the primary and the secondary systems of FDSR is derived in [73]. The analytical results show that the primary system can turn the backscatter signal into a form of multipath diversity under some reasonable conditions and the secondary transmission can achieve significant data rate with relatively short distances. In [74], throughput and ergodic capacity expressions are derived for the FDSR system with a full-duplex STx and the simulation results show that this FDSR system outperforms both conventional full-duplex and half-duplex. Furthermore, resource allocation at the relevant nodes are conducted to fulfill the desired performance requirements. In [75], the PTx transmits OFDM signals to the PRx and simultaneously receives the signals backscattered from multiple STxs in a TDMA manner. The backscatter time and reflection efficiency of each STx, and the subcarrier power allocation of the PTx are designed by maximizing the minimum throughput among all STxs under the primary rate constraint and other practical constraints. In addition, the single STx case with closed-form solutions is considered and the throughput region, which characterizes the Pareto-optimal throughput trade-offs among all STxs, is analyzed. In [76], the PTx transmits information to multiple PRxs by using TDMA and multiple STxs backscatter messages to the PTx by using TDMA. The sum secondary transmission rate maximization problem is studied to design the backscatter time, transmit power at the PTx, and the reflection efficiency at each STx under the primary rate constraint.

VIII Applications

The mutualism spectrum sharing and low power consumption nature of SR makes it suitable as a massive access technology for 6G and beyond [32, 33, 34, 35]. In this section, we address three emerging applications of SR, including e-health, smart home, and environmental monitoring, riding over different types of primary networks.

VIII-A E-health

Human health monitoring is one of the most promising applications for 6G. By placing a number of health monitoring sensors, such as pulse and temperature monitors, implantable devices on the body, instant health status can be transmitted to a central unit [77]. The size and power consumption for health monitoring devices are two major concerns for system design[8]. Traditional wireless sensor communication technologies, such as Bluetooth and Zigbee, are not suitable for this application since the active communication scheme will cause high power consumption and the heat generated during communications may be harmful to the body, especially for the implantable sensors.

SR is a promising technology to overcome the above challenges due to the following reasons. First, the information transmission uses a passive way and thus the power consumption is ultra-low. Second, the basic backscattering radio circuits is very simple, so the size of the health monitoring devices can be very tiny. Last but not least, the health monitoring sensors can use the existing cellular infrastructure to transmit messages, which is beneficial and economical for service providers. For example, the user’s mobile phone can act as the center for health information collection by using the uplink/downlink cellular signals.

VIII-B Smart Home

Smart home is another promising application in future wireless networks, in which almost all ubiquitous electronic devices within a house are connected to build an automatic and intelligent home environment [78]. In such a scenario, communications among different electronic devices generally feature low data rate and low power consumption, which places SR as the promising solution for smart home by backscattering the WiFi signals in the house. Specifically, a WiFi access point (AP) installed in the house or the user’s mobile phone can be the information center for monitoring the home environment status, such as air quality, room temperature, and usage of electronic devices.

VIII-C Environmental Monitoring

Environmental monitoring represents the processes for continuously monitoring the environment status, such as atmospheric and weather conditions, through deploying wireless sensors [79]. The power consumption for the wireless sensors and the transmission range are two major concerns for the system design. SR can be considered as an environmental monitoring network due to its low cost and low power-consumption. Specifically, all the monitoring devices sense the environmental conditions and then feedback them to the receivers by modulating their messages over the strong broadcast TV signals. Compared with the other wireless techniques, such as LoRa and NB-IoT, the SR technology uses the existing cellular network infrastructure with lower power consumption and low cost, and thus is easier to be widely deployed.

IX Challenges and Opportunities

SR is a promising solution to achieve spectrum-, power- and cost-efficient communications. There are however some critical limitations, challenges, and open research problems, which need to be addressed.

IX-A Channel Modeling and Estimation

It is important to establish accurate channel models to capture the essential behavior of the backscattering channels. In particular, due to the multiplicative nature of the backscattering channels, there are additional channel properties to be considered, such as rank-deficient, channel correlation and so on. There are some channel estimation schemes to estimate the cascade backscattering channels, e.g.,[80, 81, 82, 83]. However, most of them are with high complexity. It is highly desired to design low complexity algorithm or conduct joint channel estimation and signal detection. Besides, considering the massive devices, pilot symbols need to be carefully designed to support effective channel estimation, yet to avoid pilot contamination.

IX-B Hardware Design

The synchronization between the primary and secondary symbols at the STx is a considerable problem. The carrier phase and timing recovery circuitry in the traditional synchronization algorithm requires the oscillator component, which is power-consuming [84]. Thus, it is very important to design a low complexity signal synchronization algorithm for the STx to track the primary signals on the RF level . Another considerable problem at the receiver is how to capture the weak backscattering link signal from the strong direct link signal. The use of active load or multiple antennas at the STx is one solution to enhance the strength of the backscattering link signal. However, considering the fact that both active load and the use of multiple antennas consume power, it remains an open problem on how to design energy-efficient active load and multiple antenna solutions.

IX-C Security and Privacy

Security and privacy are always critical in wireless communication systems. Due to the symbiotic relationship between the primary and secondary transmissions in SR, if one attacker disrupts the primary transmissions, the secondary transmission may be affected. It is an urgent problem to design a suitable and effective policy to ensure the security and privacy of the SR.

X Conclusions

In this paper, we have provided a systematic view on SR, a cognitive backscattering communication system, and have highlighted the large potential of SR in future wireless networks to achieve: (1) enhanced spectrum efficiency using mutualism spectrum sharing; and (2) enhanced energy efficiency through highly reliable backscattering communications. Three fundamental aspects of SR are discussed, including system model, transceiver design, and resource allocation schemes. RIS-assisted SR and full-duplex SR are also presented. Emerging applications and some design challenges are discussed. SR is a communication system with hybrid active and backscattering radios, and the actively studied RIS is a special case of the SR proposed in this paper. We foresee that the future wireless networks will be having more hybrid radios in the system [85], and hope this article provide an effective guidance for the future work in this emerging and fantastic field.

References

  • [1] “IMT traffic estimates for the years 2020 to 2030,” Available: https://www.itu.int.
  • [2] M. Latva-aho and K. Leppanen, “Key drivers and research challenges for 6G ubiquitous wireless intelligence,” University of Oulu, While Paper, 2019. Available: http://urn.fi/urn:isbn:9789526223544.
  • [3] E. Union, “Identification and quantification of key socio-economic data to support strategic planning for the introduction of 5G in Europe,” 2016.
  • [4] J. Mitola III and G. Q. Maguire Jr, “Cognitive radio: making software radios more personal,” IEEE Pers. Commun., vol. 6, no. 4, pp. 13–18, 1999.
  • [5] S. Haykin, “Cognitive radio: brain-empowered wireless communications,” IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201–220, 2005.
  • [6] Y.-C. Liang, K.-C. Chen, G. Y. Li, and P. Mahonen, “Cognitive radio networking and communications: An overview,” IEEE Trans. Veh. Tech., vol. 60, no. 7, pp. 3386–3407, 2011.
  • [7] Z. Qin, X. Zhou, L. Zhang, Y. Gao, Y.-C. Liang, and G. Y. Li, “20 years of evolution from cognitive to intelligent communications,” IEEE Trans. Cogn. Commun. Netw., vol. 6, no. 1, pp. 6–20, 2020.
  • [8] “From healthcare to homecare,” Report of ericsson.com, 2020. Available: https://www.ericsson.com/en/reports-and-papers/consumerlab/reports/transforming-healthcare-homecare.
  • [9] V. Liu, A. Parks, V. Talla, S. Gollakota, D. Wetherall, and J. R. Smith, “Ambient backscatter: Wireless communication out of thin air,” in Proc. of ACM SIGCOMM, vol. 43, no. 4.   Hong Kong, China: ACM, Aug. 2013, pp. 39–50.
  • [10] C. Boyer and S. Roy, “Backscatter communication and RFID: Coding, energy, and MIMO analysis,” IEEE Trans. Commun., vol. 62, no. 3, pp. 770–785, Mar. 2014.
  • [11] N. Van Huynh, D. T. Hoang, X. Lu, D. Niyato, P. Wang, and D. I. Kim, “Ambient backscatter communications: A contemporary survey,” IEEE Commun. Surveys Tuts., vol. 20, no. 4, pp. 2889–2922, 2018.
  • [12] G. Wang, F. Gao, R. Fan, and C. Tellambura, “Ambient backscatter communication systems: Detection and performance analysis,” IEEE Trans. Commun., vol. 64, no. 11, pp. 4836–4846, Nov. 2016.
  • [13] J. Qian, F. Gao, G. Wang, S. Jin, and H. Zhu, “Noncoherent detections for ambient backscatter system,” IEEE Trans. Wireless Commun., vol. 16, no. 3, pp. 1412–1422, Mar. 2017.
  • [14] ——, “Semi-coherent detection and performance analysis for ambient backscatter system,” IEEE Trans. Commun., vol. 65, no. 12, pp. 5266–5279, Dec. 2017.
  • [15] J. Qian, A. N. Parks, J. R. Smith, F. Gao, and S. Jin, “IoT communications with M{M}-PSK modulated ambient backscatter: Algorithm, analysis, and implementation,” IEEE Internet Things J., vol. 6, no. 1, pp. 844–855, 2018.
  • [16] Y. Liu, G. Wang, Z. Dou, and Z. Zhong, “Coding and detection schemes for ambient backscatter communication systems,” IEEE Access, vol. 5, pp. 4947–4953, 2017.
  • [17] V. Iyery, V. Tallay, B. Kelloggy, S. Gollakota, and J. R. Smith, “Inter-technology backscatter: Towards internet connectivity for implanted devices,” in 2016 Proc. of ACM SIGCOMM.   Florianopolis, Brazil: ACM, August 2016, pp. 356–369.
  • [18] P. Zhang, M. Rostami, P. Hu, and D. Ganesan, “Enabling practical backscatter communication for on-body sensors,” in 2016 Proc. of ACM SIGCOMM.   Florianopolis, Brazil: ACM, August 2016, pp. 370–383.
  • [19] M. A. ElMossallamy, M. Pan, R. Jäntti, K. G. Seddik, G. Y. Li, and Z. Han, “Noncoherent backscatter communications over ambient OFDM signals,” IEEE Trans. Commun., vol. 67, no. 5, pp. 3597–3611, 2019.
  • [20] G. Yang and Y.-C. Liang, “Backscatter communications over ambient OFDM signals: Transceiver design and performance analysis,” in Proc. of IEEE Glob. Commun. Conf. (GLOBECOM).   Washington, D.C.: IEEE, Dec. 2016, pp. 1–6.
  • [21] G. Yang, Y.-C. Liang, R. Zhang, and Y. Pei, “Modulation in the air: Backscatter communication over ambient OFDM carrier,” IEEE Trans. Commun., vol. 66, no. 3, pp. 1219–1233, Mar. 2018.
  • [22] T. L. Nguyen, Y. Shin, J. Y. Kim, and D. I. Kim, “Signal detection for ambient backscatter communication with OFDM carriers,” Sensors, vol. 19, no. 3, p. 517, 2019.
  • [23] C. Zhang, G. Wang, P. D. Diamantoulakis, F. Gao, and G. K. Karagiannidis, “Interference-free transceiver design and signal detection for ambient backscatter communication systems over frequency-selective channels,” arXiv preprint arXiv:1812.11278, 2018.
  • [24] G. Yang, Y.-C. Liang, and Q. Zhang, “Cooperative receiver for ambient backscatter communications with multiple antennas,” in Proc. of IEEE Conf. Commun. (ICC).   Paris: IEEE, May 2017, pp. 1–6.
  • [25] G. Yang, Q. Zhang, and Y.-C. Liang, “Cooperative ambient backscatter communications for green Internet-of-Things,” IEEE Internet Things J., vol. 5, no. 2, pp. 1116–1130, Apr. 2018.
  • [26] W. Liu, Y.-C. Liang, Y. Li, and B. Vucetic, “Backscatter multiplicative multiple-access systems: Fundamental limits and practical design,” IEEE Trans. Wireless Commun., vol. 17, no. 9, pp. 5713–5728, 2018.
  • [27] H. Guo, Y.-C. Liang, R. Long, and Q. Zhang, “Cooperative ambient backscatter system: A symbiotic radio paradigm for passive IoT,” IEEE Wireless Commun Lett., vol. 8, no. 4, pp. 1191–1194, 2019.
  • [28] Q. Zhang, L. Zhang, Y.-C. Liang, and P. Kam, “Backscatter-NOMA: A symbiotic system of cellular and Internet-of-Things networks,” IEEE Access, vol. 7, pp. 20 000–20 013, 2019.
  • [29] R. Long, H. Guo, L. Zhang, and Y.-C. Liang, “Full-duplex backscatter communications in symbiotic radio systems,” IEEE Access, vol. 7, pp. 21 597–21 608, 2019.
  • [30] H. Guo, Y.-C. Liang, R. Long, S. Xiao, and Q. Zhang, “Resource allocation for symbiotic radio system with fading channels,” IEEE Access, vol. 7, pp. 34 333–34 347, 2019.
  • [31] R. Long, Y.-C. Liang, H. Guo, G. Yang, and R. Zhang, “Symbiotic radio: A new communication paradigm for passive internet-of-things,” IEEE Internet Things J., vol. 7, pp. 1350–1363, 2020.
  • [32] S. J. Nawaz, S. K. Sharma, B. Mansoor, M. N. Patwary, and N. M. Khan, “Non-coherent and backscatter communications: Enabling ultra-massive connectivity in 6G wireless networks,” arXiv preprint arXiv:2005.10937, 2020.
  • [33] L. Bariah, L. Mohjazi, S. Muhaidat, P. C. Sofotasios, G. K. Kurt, H. Yanikomeroglu, and O. A. Dobre, “A prospective look: Key enabling technologies, applications and open research topics in 6G networks,” arXiv preprint arXiv:2004.06049, 2020.
  • [34] S. Chen, Y.-C. Liang, S. Sun, S. Kang, W. Cheng, and M. Peng, “Vision, requirements, and technology trend of 6G: how to tackle the challenges of system coverage, capacity, user data-rate and movement speed,” IEEE Wireless Commun., vol. 27, no. 2, pp. 218–228, 2020.
  • [35] L. Zhang, Y.-C. Liang, and D. Niyato, “6G visions: Mobile ultra-broadband, super internet-of-things, and artificial intelligence,” China Commun., vol. 16, no. 8, pp. 1–14, 2019.
  • [36] R. C. Hansen, “Relationships between antennas as scatterers and as radiators,” Proc. the IEEE, vol. 77, no. 5, pp. 659–662, 1989.
  • [37] S. J. Thomas and M. S. Reynolds, “A 96 Mbit/sec, 15.5 pj/bit 16-QAM modulator for UHF backscatter communication,” in Proc. of IEEE Int. Conf. RFID (RFID).   Orlando, FL, USA: IEEE, Apr. 2012, pp. 185–190.
  • [38] S. J. Thomas, E. Wheeler, J. Teizer, and M. S. Reynolds, “Quadrature amplitude modulated backscatter in passive and semipassive uhf rfid systems,” IEEE Trans. Microw. Theory Techn., vol. 60, no. 4, pp. 1175–1182, April 2012.
  • [39] F. Amato, C. W. Peterson, B. P. Degnan, and G. D. Durgin, “Tunneling RFID tags for long-range and low-power microwave applications,” IEEE J. Radio Freq. Identif., vol. 2, no. 2, pp. 93–103, Jun. 2018.
  • [40] G. T. Munsterman, “Tunnel-diode microwave amplifiers,” APL Tech. Dig., pp. 2–10, 1965.
  • [41] F. Amato, H. M. Torun, and G. D. Durgin, “RFID backscattering in long-range scenarios,” IEEE Trans. Wireless Commun., vol. 17, no. 4, pp. 2718–2725, April 2018.
  • [42] S. Khaledian, F. Farzami, H. Soury, B. Smida, and D. Erricolo, “Active two-way backscatter modulation: An analytical study,” IEEE Trans. Wireless Commun., vol. 18, no. 3, pp. 1874–1886, Mar. 2019.
  • [43] J. Bousquet, S. Magierowski, and G. G. Messier, “A 4-GHz active scatterer in 130-nm CMOS for phase sweep amplify-and-forward,” IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 59, no. 3, pp. 529–540, Mar. 2012.
  • [44] H. Guo, R. Long, and Y.-C. Liang, “Cognitive backscatter network: A spectrum sharing paradigm for passive IoT,” IEEE Wireless Commun. Lett., vol. 8, no. 5, pp. 1423–1426, 2019.
  • [45] K. Ruttik, R. Duan, R. Jäntti, and Z. Han, “Does ambient backscatter communication need additional regulations?” in Proc. of IEEE DySPAN.   Seoul, South Korea: IEEE, Oct. 2018, pp. 1–6.
  • [46] Q. Zhang, H. Guo, Y.-C. Liang, and X. Yuan, “Constellation learning-based signal detection for ambient backscatter communication systems,” IEEE J. Sel. Areas Commun., vol. 37, no. 2, pp. 452–463, 2019.
  • [47] J. Tian, Y. Pei, Y.-D. Huang, and Y.-C. Liang, “Modulation-constrained clustering approach to blind modulation classification for MIMO systems,” IEEE Trans. Cogn. Commun. Netw., vol. 4, no. 4, pp. 894–907, 2018.
  • [48] X. Wang, R. Duan, H. Yigitler, E. Menta, and R. Jantti, “Machine learning-assisted detection for BPSK-modulated ambient backscatter communication systems,” in Proc. of IEEE Glob. Commun. Conf. (GLOBECOM).   Waikoloa, HI, USA: IEEE, Dec. 2019, pp. 1–6.
  • [49] Y. Aborahama and M. S. Hassan, “On the stochastic modeling of the holding time of SUs to PU channels in cognitive radio networks,” IEEE Trans. Cogn. Commun. Netw., vol. 6, no. 1, pp. 282–295, 2019.
  • [50] Y. Huang, Y. Chen, Y. T. Hou, and W. Lou, “Achieving fair LTE/Wi-Fi coexistence with real-time scheduling,” IEEE Trans. Cogn. Commun. Netw., vol. 6, no. 1, pp. 366–380, 2019.
  • [51] A. Ghasemi and E. S. Sousa, “Fundamental limits of spectrum-sharing in fading environments,” IEEE Trans. Wireless Commun., vol. 6, no. 2, pp. 649–658, 2007.
  • [52] L. Musavian and S. Aïssa, “Capacity and power allocation for spectrum-sharing communications in fading channels,” IEEE Trans. Wireless Commun., vol. 8, no. 1, pp. 148–156, 2009.
  • [53] X. Kang, Y.-C. Liang, A. Nallanathan, H. K. Garg, and R. Zhang, “Optimal power allocation for fading channels in cognitive radio networks: Ergodic capacity and outage capacity,” IEEE Trans. Wireless Commun., vol. 8, no. 2, pp. 940–950, 2009.
  • [54] Q. Tao, C. Zhong, H. Lin, and Z. Zhang, “Symbol detection of ambient backscatter systems with manchester coding,” IEEE Trans. Wireless Commun., vol. 17, no. 6, pp. 4028–4038, 2018.
  • [55] S. Zhou, W. Xu, K. Wang, C. Pan, M.-S. Alouini, and A. Nallanathan, “Ergodic rate analysis of cooperative ambient backscatter communication,” IEEE Wireless Commun. Lett., vol. 8, no. 6, pp. 1679–1682, 2019.
  • [56] H. Ding, D. B. da Costa, and J. Ge, “Outage analysis for cooperative ambient backscatter systems,” IEEE Wireless Commun. Lett., vol. 9, no. 5, pp. 601–605, 2019.
  • [57] Z. Chu, W. Hao, P. Xiao, M. Khalily, and R. Tafazolli, “Resource allocations for symbiotic radio with finite block length backscatter link,” IEEE Internet Things J., DOI: 10.1109/JIOT.2020.2980928, 2020.
  • [58] W. Liu, K. Huang, X. Zhou, and S. Durrani, “Full-duplex backscatter interference networks based on time-hopping spread spectrum,” IEEE Trans. Wireless Commun., vol. 16, no. 7, pp. 4361–4377, 2017.
  • [59] Y.-C. Liang, R. Long, Q. Zhang, J. Chen, H. V. Cheng, and H. Guo, “Large intelligent surface/antennas (LISA): Making reflective radios smart,” J. Commun. Inf. Netw., vol. 4, no. 2, pp. 40–50, 2019, also available at arXiv:1906.06578.
  • [60] Q. Wu and R. Zhang, “Intelligent reflecting surface enhanced wireless network via joint active and passive beamforming,” IEEE Trans. Wireless Commun., vol. 18, no. 11, pp. 5394–5409, Nov 2019.
  • [61] C. Huang, A. Zappone, G. C. Alexandropoulos, M. Debbah, and C. Yuen, “Reconfigurable intelligent surfaces for energy efficiency in wireless communication,” IEEE Trans. Wireless Commun., vol. 18, no. 8, pp. 4157–4170, Aug 2019.
  • [62] H. Guo, Y.-C. Liang, J. Chen, and E. G. Larsson, “Weighted sum-rate maximization for reconfigurable intelligent surface aided wireless networks,” IEEE Trans. Wireless Commun., vol. 19, no. 5, pp. 3064–3076, 2020.
  • [63] J. Zhao and Y. Liu, “A survey of intelligent reflecting surfaces (IRSs): Towards 6G wireless communication networks,” arXiv preprint arXiv:1907.04789, 2019.
  • [64] E. Basar, “Reconfigurable intelligent surface-based index modulation: A new beyond MIMO paradigm for 6G,” IEEE Trans. Commun., vol. 68, no. 5, pp. 3187–3196, 2020.
  • [65] A. Kammoun, A. Chaaban, M. Debbah, M.-S. Alouini et al., “Asymptotic max-min SINR analysis of reconfigurable intelligent surface assisted MISO systems,” IEEE Trans. Wireless Commun., DOI:10.1109/TWC.2020.2986438, 2020.
  • [66] M. Di Renzo, M. Debbah, D.-T. Phan-Huy, A. Zappone, M.-S. Alouini, C. Yuen, V. Sciancalepore, G. C. Alexandropoulos, J. Hoydis, H. Gacanin et al., “Smart radio environments empowered by reconfigurable AI meta-surfaces: An idea whose time has come,” EURASIP J. Wireless Commun. Netw., vol. 2019, no. 1, pp. 1–20, 2019.
  • [67] V. Jamali, A. M. Tulino, G. Fischer, R. Müller, and R. Schober, “Intelligent reflecting and transmitting surface aided millimeter wave massive MIMO,” arXiv preprint arXiv:1902.07670, 2019.
  • [68] E. Björnson, Ö. Özdogan, and E. G. Larsson, “Intelligent reflecting surface versus decode-and-forward: How large surfaces are needed to beat relaying?” IEEE Wireless Commun. Lett., vol. 9, no. 2, pp. 244–248, 2019.
  • [69] M. Jung, W. Saad, Y. Jang, G. Kong, and S. Choi, “Performance analysis of large intelligent surfaces (LISs): Asymptotic data rate and channel hardening effects,” IEEE Trans. Wireless Commun., vol. 19, no. 3, pp. 2052–2065, 2020.
  • [70] Q. Zhang, Y.-C. Liang, and H. V. Poor, “Symbiotic radio: A new application of largeintelligent surface/antennas (LISA),” Proc. of IEEE Wireless Commun. Netw. Conf. (WCNC), May 2020.
  • [71] ——, “Large intelligent surface/antennas (LISA) assisted symbiotic radio for IoT communications,” arXiv preprint arXiv:2002.00340, 2020.
  • [72] D. Bharadia, K. R. Joshi, M. Kotaru, and S. Katti, “BackFi: High throughput WiFi backscatter,” in Proc. ACM SIGCOMM, vol. 45, no. 4.   London, United Kingdom: ACM, Aug. 2015, pp. 283–296.
  • [73] D. Darsena, G. Gelli, and F. Verde, “Modeling and performance analysis of wireless networks with ambient backscatter devices,” IEEE Trans. Commun., vol. 65, no. 4, pp. 1797–1814, Apr. 2017.
  • [74] B. Smida and S. Khaledian, “ReflectFX: In-band full-duplex wireless communication by means of reflected power,” IEEE Trans. Commun., vol. 65, no. 5, pp. 2207–2219, 2017.
  • [75] G. Yang, D. Yuan, Y.-C. Liang, R. Zhang, and V. C. Leung, “Optimal resource allocation in full-duplex ambient backscatter communication networks for wireless-powered IoT,” IEEE Internet Things J., vol. 6, no. 2, pp. 2612–2625, 2018.
  • [76] S. Xiao, H. Guo, and Y.-C. Liang, “Resource allocation for full-duplex-enabled cognitive backscatter networks,” IEEE Trans. Wireless Commun., vol. 18, no. 6, pp. 3222–3235, 2019.
  • [77] C. Otto, A. Milenkovic, C. Sanders, and E. Jovanov, “System architecture of a wireless body area sensor network for ubiquitous health monitoring,” J. Mobile Multimedia, vol. 1, no. 4, pp. 307–326, 2006.
  • [78] V. Ricquebourg, D. Menga, D. Durand, B. Marhic, L. Delahoche, and C. Loge, “The smart home concept: our immediate future,” in Proc. of IEEE Int. Conf. E-Learn. Ind. Electron. (ICELIE).   Hammamet, Tunisia: IEEE, Dec. 2006, pp. 23–28.
  • [79] H. Messer, A. Zinevich, and P. Alpert, “Environmental monitoring by wireless communication networks,” Science, vol. 312, no. 5774, pp. 713–713, 2006.
  • [80] Z.-Q. He and X. Yuan, “Cascaded channel estimation for large intelligent metasurface assisted massive MIMO,” IEEE Wireless Commun. Lett., vol. 9, no. 2, pp. 210–214, 2019.
  • [81] J. Chen, Y.-C. Liang, H. V. Cheng, and W. Yu, “Channel estimation for reconfigurable intelligent surface aided multi-user MIMO systems,” arXiv preprint arXiv:1912.03619, 2019.
  • [82] A. Taha, M. Alrabeiah, and A. Alkhateeb, “Enabling large intelligent surfaces with compressive sensing and deep learning,” arXiv preprint arXiv:1904.10136, 2019.
  • [83] J. Mirza and B. Ali, “Channel estimation method and phase shift design for reconfigurable intelligent surface assisted mimo networks,” arXiv preprint arXiv:1912.10671, 2019.
  • [84] A. Goldsmith, Wireless communications.   Cambridge university press, 2005.
  • [85] L. V. d. Perre, E. G. Larsson, F. Tufvesson, L. D. Strycker, E. Björnson, and O. Edfor, “RadioWeaves for efficient connectivity: analysis andimpact of constraints in actual deployments,” arXiv preprint arXiv:2001.05779, 2020.