Professional Documents
Culture Documents
Wireless Powered Communication Networks Assisted by Backscatter Communication
Wireless Powered Communication Networks Assisted by Backscatter Communication
Received January 18, 2017, accepted February 17, 2017, date of publication March 2, 2017, date of current version June 7, 2017.
Digital Object Identifier 10.1109/ACCESS.2017.2677521
ABSTRACT This paper proposes a backscatter-assisted wireless powered communication network that
includes a hybrid access point and multiple users. In conventional wireless powered communication networks
with only harvest-then-transmit (HTT) mode, urgent data transmission is not possible since users need
to first harvest sufficient energy before transmitting information. Backscatter communication depends on
instantaneous excitation energy such that the dedicated time for harvesting energy first is not required.
To improve the system performance, both HTT and backscatter modes are employed at the users in the
proposed model. An optimization problem is formulated to maximize the sum-throughput by finding the
optimal transmission policy, including the optimal users’ working mode permutation and time allocation.
Simulation results demonstrate the superiority of the proposed model.
2169-3536
2017 IEEE. Translations and content mining are permitted for academic research only.
7254 Personal use is also permitted, but republication/redistribution requires IEEE permission. VOLUME 5, 2017
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
B. Lyu et al.: WPCNs Assisted by Backscatter Communication
[8]–[12]. To fully exploit time, the full-duplex (FD) mode Hence, in contrast to [14], the tradeoff between HTT and
was introduced in [13] since the HAP had two antennas. backscatter modes for each user needs to be studied during its
The power and time were jointly optimized for maximizing allocated time slot, which leads to a challenging problem of
the system throughput for considering non-causal energy finding the optimal working mode permutation for multiple
scenarios. In sensor networks, the harvested energy is typi- users. Moreover, to maximize the system throughput, the
cally stored in supercapacitors, which suffer from high self- dynamic time allocation policy is further studied.
discharge [15]. Hence, during the given block, the users can The key contributions of this paper are summarized as
only use the harvested energy before its transmission slot follows:
to transmit information. Considering the energy causality, a • We propose a new model that employs both HTT and
more practical FD-WPCN was proposed in [14]. For the HTT backscatter modes for a multi-user RF-powered wire-
mode, users need to harvest energy first and then transmit less sensor network. We formulate one fundamental
information. Hence, urgent data transmission for users, par- optimization problem to maximize the sum-throughput
ticularly for users that are far from the HAP, is not possible by studying the optimal transmission policy, including
because a longer time for harvesting energy is required [16]. both the optimal working mode permutation and time
There has recently been an emerging interest in backscat- allocation.
ter communication. In a backscatter communication system, • The optimal transmission policy is first obtained for the
the users, also known as tags, receive instantaneous exci- two-user case. We also investigate the impact of users’
tation energy radiated by the HAP (known as reader) and schedule order on the system performance. The insights
reflect modulated signals to the HAP simultaneously [17]. about users’ working mode permutation are further
Hence, the time for harvesting energy before transmission discussed.
is not necessary. In [18], the authors first estimated the • For the case with K (K ≥ 3) users, based on all possi-
backscatter channels, and then studied energy transfer in ble optimal permutations of working mode, the original
the downlink based on the estimated CSI for multi-antenna optimization problem can be decomposed into K +1 sub-
backscatter communication systems. The physical layer secu- problems. By sequentially solving these sub-problems
rity in MIMO backscatter systems was studied in [19]. using convex optimization techniques [24], both the
In [17]–[19], the study focused on traditional RFID-style optimal working mode permutation and time allocation
backscatter systems, where a special-purpose power infras- policy are obtained. Moreover, a special case in which
tructure, i.e., the reader, was required. In [20], ambient all users have the same backscatter rate is discussed to
backscatter was proposed. In the ambient backscatter com- further reduce the computational complexity.
munication systems, the user harvested energy from envi-
ronmental sources, e.g., TV tower, rather than from specific The rest of this paper is organized as follows. In Section II,
energy sources. In [21], the authors first introduced ambient the system model is proposed, and the expression for the
backscatter in RF-powered overlay cognitive radio networks. sum-throughput is presented. In Section III, we formulate an
The tradeoff between HTT and backscatter modes was ana- optimization problem to maximize the sum-throughput and
lyzed, and the optimal transmission policy was derived. How- obtain the optimal transmission policy. The simulation results
ever, ambient backscatter is limited by the transmission range. are presented in Section IV. Finally, Section V concludes this
To overcome this drawback, a hybrid backscatter commu- paper.
nication scheme that includes both ambient backscatter and
bistatic scatter radio was investigated [16]. Extending to [21], II. SYSTEM MODEL
novel RF-power underlay cognitive radio networks with As shown in Figure 1, we consider a BAWPCN with one
ambient backscatter were proposed, where the secondary two-antenna HAP and K single-antenna users. This system
user could work in either HTT or backscatter mode [22]. can be used for environmental monitoring systems in wireless
Optimization problems to maximize the throughput for a sensor networks [25]. It is assumed that the HAP can work in
single secondary user by choosing the best mode were stud- the FD mode by employing perfect successive interference
ied. However, multiple users are typically deployed in sensor cancellation (SIC) techniques [26], [27]. Hence, one antenna
networks. of the HAP is used for transferring energy to the users in
Motivated by utilizing the advantages of both [14] the downlink, and the other antenna is used for receiving
and [22], in this paper, we propose a backscatter-assisted signals from the users in the uplink simultaneously. These
WPCN (BAWPCN) that includes an HAP and multiple users, users with supercapacitors for storing energy, denoted as
where both HTT and backscatter modes are employed at the Ui , i = 1, · · · , K , can switch between HTT and backscatter
users. To the best of our knowledge, no work has been con- modes adaptively and transmit or backscatter information to
ducted on the proposed multi-user model. In the downlink, the HAP in TDMA [14], [21]. The forward channel power
the HAP broadcasts energy to all users continuously, whereas gain from the HAP to Ui and the backward channel power
each user transmits or backscatters information to the HAP in gain from Ui to the HAP are denoted as hi and gi , respec-
the uplink via TDMA. As stated in [23], each user cannot tively. We assume that hi and gi are quasi-static flat fading
work in both HTT and backscatter modes simultaneously. and remain constant during one block, denoted as T , and
FIGURE 1. Backscatter-assisted wireless powered communication Based on the above analysis, the sum-throughput of all
network. users is given by
K
X K
X
R= Rhi + Rbi .
i=1 i=1
It is easy to prove Lemma 1 by contradiction. For sim- solution for Problem P4 is given as
plification, we briefly discuss the proof of Lemma 1 in the
z∗1 − 1 ¯ γ1
following remark. t0 = T̄ and β1 = T̄¯ ,
Remark 1: It can be seen that Rhi is an increasing function γ1 + z∗1 − 1 γ1 + z∗1 − 1
withP respect to t0 so that the entire block should be exploited, where z∗1 > 1 is the corresponding solution of f1 (z1 ) =
i.e., K ∗
i=0 ti = T , to maximize the sum-throughput. More- γ1 and f1 (z1 ) is defined as f1 (z1 ) = z1 ln z1 − z1 + 1.
over, αi is only used for harvesting energy. Compared with Let Bt1 = γ +z γ1 ∗
∗ −1 W log2 z1 , which is the normalized
αi 6 = 0, let αi∗ = 0 does not change the energy harvested by 1 1
throughput of U1 with the HTT mode. With the above result,
Ui , but increases Rbi−1 (i = 2, · · · , K ). Problem P3 is reduced to Problem P5, which is given by
With αi∗ = 0, i = 1, · · · , K , the sum-throughput is re-
max Bt1 T̄¯ + (T̄ − T̄¯ )Bb1
Pi−1
j=0 tj
PK
expressed as R(t, β) = β i W log (1 + βi γi ) +
PK i=1 2 T̄¯
i=1 (ti − βi )Bi . Problem P1 can be reduced to Problem P2,
b
s.t. 0 ≤ T̄¯ ≤ T̄ . (P5)
which is formulated as
max R(t, β) The solution for Problem P5 is straightforward to derive and
t,β is given as follows.
K (
T̄ , Bt1 ≥ Bb1 ,
X
s.t. ti = T , ¯
T̄ = (1)
i=0 0, Bt1 < Bb1 .
βi ≤ ti , i = 1, · · · , K ,
βi ≥ 0, i = 1, · · · , K , If T̄¯ = T̄ , then U1 works in the HTT mode; otherwise, U1
works in the backscatter mode.
ti ≥ 0, i = 0, 1, · · · , K . (P2)
Before solving Problem P2 directly, a two-user case is first 2) THE OPTIMAL SOLUTION FOR TWO-USER CASE
considered. With the working mode of U1 , Problem P2 is further studied
to find the optimal working mode of U2 . Consider two sub-
A. TWO-USER CASE cases, i.e., U1 works in the HHT mode or the backscatter
To solve Problem P2 with K = 2, we adopt a two-stage mode. If U1 works in the HTT mode, then the sum-throughput
approach. Let T̄ = t0 + t1 . From [22], we know that each user is rewritten as R(T̄ , t2 , β2 ) = Bt1 T̄ + β2 W log2 (1 + βT̄2 γ2 ) +
can work in either HTT mode or backscatter mode during the (t2 − β2 )Bb2 . With the updated R(T̄ , t2 , β2 ), Problem P2 is
given slot. First, given T̄ , we study the optimal working mode rewritten as
of U1 , corresponding to the single-user case [22]. Then, with
the derived result of U1 , we further study the working mode max R(T̄ , t2 , β2 )
T̄ ,t2 ,β2
of U2 . To facilitate the understanding of this paper, we still
present the details of solving the single-user case. s.t. T̄ + t2 = T ,
0 ≤ β2 ≤ t 2 ,
1) THE OPTIMAL SOLUTION FOR SINGLE-USER CASE T̄ ≥ 0. (P6)
With given T̄ , the optimization problem of the single-user
case is given as follows. To solve Problem P6, a method similar to that used for
t0 Problem P3 is adopted. Let T̂ = T̄ + β2 . First, we determine
max β1 W log2 (1 + γ1 ) + (t1 − β1 )Bb1 the relationship between T̄ and β2 by solving the following
t0 ,t1 ,β1 β1
problem:
s.t. t0 + t1 = T̄ ,
0 ≤ β1 ≤ t 1 , max Bt1 T̄ + β2 W log2 (1 +
T̄
γ2 )
t0 ≥ 0. (P3) T̄ ,β2 β2
s.t. T̄ + β2 = T̂ ,
To solve Problem P3, we first derive the relationship
between t0 and β1 . Let T̄¯ = t0 +β1 . The relationship between T̄ , β2 ≥ 0. (P7)
t0 and β1 can be derived by solving the following problem Using a method similar to that for Problem P4, we derive the
t0 optimal solution for Problem P7 with the given T̂ , which is
max β1 W log2 (1 + γ1 )
t0 ,β1 β1 as follows:
¯
s.t. t + β = T̄ , z∗2 − 1 γ2
0 1
T̄ = T̂ and β2 = T̂ ,
t0 , β1 ≥ 0. (P4) γ2 + z∗2 − 1 γ2 + z∗2 − 1
The solution for Problem P4 can be obtained using the where z∗2 is the corresponding solution of f2 (z2 ) = γ2 and
method presented in [8]. With the given T̄¯ , the optimal f2 (z2 ) is defined as f2 (z2 ) = z2 ln z2 − (1 + lnW2 Bt1 )z2 + 1. Let
z∗ −1 γ2
Bt2 = γ +z
2 t ∗
∗ −1 B1 + γ +z∗ −1 W log2 z2 . Hence, Problem P6 is 0, if ‘‘0B’’,
2 2 2 2
z∗−1
reduced to Problem P8, which is formulated as
3
T, if ‘‘BH’’,
t1 = γ2 + z∗3 − 1
max Bt2 T̂ + (T − T̂ )Bb2
γ1 z∗2 − 1
T , if ‘‘HH’’,
T̂
γ1 + z1 − 1 γ2 + z∗2 − 1
∗
s.t. 0 ≤ T̂ ≤ T . (P8)
0, if ‘‘0B’’,
γ2
The result for Problem P8 is easily derived and is given as
T , if ‘‘BH’’,
follows. β2 = γ2 + z∗3 − 1
( γ2
T , Bt2 ≥ Bb2 ,
T if ‘‘HH’’,
γ2 + z∗2 − 1
T̂ = (2)
0, Bt2 < Bb2 .
T,
if ‘‘0B’’
γ2
Combining the results from (1) and (2), the permutations of
T , if ‘‘BH’’,
two users’ working mode are summarized as follows. If Bt1 ≥ t2 = γ2 + z∗3 − 1
Bb1 and Bt2 ≥ Bb2 , then both U1 and U2 work in the HTT mode.
γ2
T , if ‘‘HH’’.
If Bt1 ≥ Bb1 and Bt2 < Bb2 , then U1 cannot work and U2 works γ2 + z∗2 − 1
in the backscatter mode with the entire block. To simplify the Note that Proposition 1 only provides one of the optimal
description, we define the user cannot work, the user works in transmission policies for the two-user case. This is because
the backscatter mode and the user works in the HTT mode as when one of the special conditions, i.e., Bt1 = Bb1 , Bt2 = Bb2
‘‘0’’, ‘‘B’’ and ‘‘H’’, respectively. Therefore, the permutations and B̄t2 = Bb2 is satisfied, we can also find other solutions to
of this sub-case are given by ‘‘HH’’ and ‘‘0B’’. achieve the maximum sum-throughput. However, the result
For symbol simplification, the symbols defined in the pre- given in Proposition 1 can provide us with some interesting
vious sub-case are still used in this sub-case corresponding insights. Hereinafter, without specific description, we do not
to U1 works in the backscatter mode. Since U1 works in the consider the special conditions.
backscatter mode, R is rewritten as R(T̄ , t2 , β2 ) = Bb1 T̄ + In summary, for a BAWPCN with two users, there are
β2 W log2 (1 + βT̄2 γ2 ) + (t2 − β2 )Bb2 . In this sub-case, with three possible optimal permutations of the working mode, i.e.,
‘‘0B’’, ‘‘BH’’ and ‘‘HH’’.
the updated R(T̄ , t2 , β2 ), we also solve Problem P6 to derive
With Proposition 1 and the above analysis, we can derive
the optimal solution. Hence, T̄ , β2 and T̂ in this sub-case are
the following corollaries.
rewritten as
Corollary 1: In the optimal condition, the last user could
z∗3 − 1 γ2 be scheduled and work in only one mode.
T̄ = T̂ and β2 = T̂ ,
γ2 + z3 − 1
∗ γ2 + z∗3 − 1 For simplification, we briefly discuss the proof of Corol-
lary 1 in the following remark.
(
T , B̄t2 ≥ Bb2 ,
T̂ = (3) Remark 2: For the two-user case, it has been proved that
0, B̄t2 < Bb2 , the last user could be scheduled and work in only one mode in
where z∗3 is the corresponding solution of f3 (z3 ) = γ2 and the optimal condition. Considering the three-user case, with
f3 (z3 ) is defined as f3 (z3 ) = z3 ln z3 − (1 + lnW2 Bb1 )z3 + 1, the given working modes of the first two users, it can be
z∗3 −1 γ2 seen that the time allocation between the HTT and backscatter
B̄t2 = b
γ2 +z∗3 −1 B1 + γ2 +z∗3 −1 W log2 z∗3 .
modes of the third user is a linear problem, which is similar as
Consider both (1) and (3). If Bt1 < Bb1 and Bt2 ≥ Bb2 , then Problem P8. To solve the problem, we obtain the conclusion
U1 works in the backscatter mode and U2 works in the HTT that the third user could be scheduled and work in only one
mode. If Bt1 < Bb1 and Bt2 < Bb2 , then only U2 works and stays mode in the optimal condition. Similarly, for K -user case
in the backscatter mode. The permutations of this sub-case are (K ≥ 4), the same conclusion for the K -th user can be
summarized as ‘‘BH’’ and ‘‘0B’’. obtained.
Considering the above two sub-cases, the optimal time Corollary 2: In the optimal condition, if the last user
allocation policy for the two-user case is given by the fol- works in the backscatter mode, one optimal solution is to
lowing proposition. allocate the entire block time to UK , i.e., the first K − 1 users
Proposition 1: For the two-user case, one optimal solution are not scheduled.
for Problem P2 is given by Proof: Please refer to Appendix.
From the above result, we observe that the schedule order
0, if ‘‘0B’’ or ‘‘BH’’,
t0 = z∗1 − 1 z∗2 − 1 of users may affect the time allocation policy. To explain
T , if ‘‘HH’’, this observation, the following example is given. For ‘‘0B’’
γ1 + z∗1 − 1 γ2 + z∗2 − 1
corresponding to the condition Bt1 ≥ Bb1 and Bt2 < Bb2 , it
0, if ‘‘0B’’ or ‘‘BH’’, can achieve a larger sum-throughput with a reversed schedule
β1 = γ1 z∗2 − 1 order, i.e., U2 is first scheduled. Next, we analyze the sum-
T , if ‘‘HH’’,
γ1 + z∗1 − 1 γ2 + z∗2 − 1
throughput of the reversed schedule order scheme. According
V. CONCLUSION
This paper has proposed a new WPCN system model that
integrates backscatter communication. To maximize the sum-
throughput, an optimization problem has been formulated.
The insights about permutations of users’ working mode
have been discussed, and the optimal transmission policy has
been presented. The simulation results have confirmed that
the proposed model achieves a larger sum-throughput than
traditional schemes.
APPENDIX
PROOF OF COROLLARY 2
FIGURE 5. Average sum-throughput vs. number of users with
P = 20 dBm, κ = 3, and Bb = 40 kbits/s.
Define the optimal normalized throughput for the first K − 1
i
users as BtK −1 . Additionally, define z∗K as the optimal solution
for fK (zK ) = γK and fK (zK ) = zK ln zK − (1 + lnW2 BtK −1 )
Ui , κi is the pathloss exponent, ρi is the channel short-term zK +1. We derive that if UK can work in the backscatter mode
fading, and ρi2 is an exponentially distributed random variable in the optimal condition, then the condition γK +z
z∗K −1 t
∗ −1 BK −1 +
with unit mean. Without loss of generality, let κ = κ1 = γK
K
[14] X. Kang, C. K. Ho, and S. Sun, ‘‘Full-duplex wireless-powered commu- ZHEN YANG received the B.E. and M.E. degrees
nication network with energy causality,’’ IEEE Trans. Wireless Commun., from the Nanjing University of Posts and Telecom-
vol. 14, no. 10, pp. 5539–5551, Oct. 2015. munications, China, in 1983 and 1988, respec-
[15] M. Kaus, J. Kowal, and D. U. Sauer, ‘‘Modelling the effects of charge redis- tively, and the Ph.D. degree from Shanghai Jiao
tribution during self-discharge of supercapacitors,’’ Electrochim. Acta, Tong University, China, in 1999, all in elec-
vol. 55, no. 25, pp. 7516–7523, Oct. 2010. trical engineering. He was a Lecturer with the
[16] S. H. Kim and D. I. Kim, ‘‘Hybrid backscatter communication for wireless Nanjing University of Posts and Telecommunica-
powered communication networks,’’ in Proc. ISWCS, Poznań, Poland,
tions, where he was promoted to Associate Pro-
Sep. 2016, pp. 265–269.
fessor in 1995, and then a Full Professor in 2000.
[17] C. Boyer and S. Roy, ‘‘Backscatter communication and RFID: Coding,
energy, and MIMO analysis,’’ IEEE Trans. Commun., vol. 62, no. 3, He was a Visiting Scholar with Bremen University,
pp. 770–785, Mar. 2014. Germany, from 1992 to 1993, and an Exchange Scholar with Maryland
[18] G. Yang, C. K. Ho, and Y. L. Guan, ‘‘Multi-antenna wireless energy trans- University, USA, in 2003. He has authored over 200 papers in academic
fer for backscatter communication systems,’’ IEEE J. Sel. Areas Commun., journals and conferences. His research interests include various aspects of
vol. 33, no. 12, pp. 2974–2987, Dec. 2015. signal processing and communication, such as communication systems and
[19] Q. Yang, H.-M. Wang, Y. Zhang, and Z. Han, ‘‘Physical layer security networks, cognitive radio, spectrum sensing, speech and audio processing,
in MIMO backscatter wireless systems,’’ IEEE Trans. Wireless Commun., compressive sensing, and wireless communication.
vol. 15, no. 11, pp. 7547–7560, Nov. 2016. Dr. Yang serves as the Vice Chairman and a fellow of the Chinese Institute
[20] V. Liu, A. Parks, V. Talla, S. Gollakota, D. Wetherall, and J. R. Smith, of Communications, the Chairman of the Jiangsu Institute of Internets. He is
‘‘Ambient backscatter: Wireless communication out of thin air,’’ in Proc. also a member of Editorial Board for several journals, such as the Chinese
ACM SIGCOMM, Hong Kong, Aug. 2013, pp. 39–50. Journal of Electronics, the China Communications, and the Data Collection
[21] D. T. Hoang, D. Niyato, P. Wang, D. I. Kim, and Z. Han. (Aug. 2016). ‘‘The and Processing. He was the Chair of the Asian Pacific Communication
tradeoff analysis in RF-powered backscatter cognitive radio networks.’’ Conference Steering Committee from 2013 to 2014.
[Online]. Available: https://arxiv.org/abs/1608.01789
[22] D. T. Hoang, D. Niyato, P. Wang, D. I. Kim, and Z. Han, ‘‘Ambient
backscatter: A new approach to improve network performance for
RF-powered cognitive radio networks,’’ IEEE Trans. Commun., to be
published.
[23] P. Zhang and D. Ganesan, ‘‘Enabling bit-by-bit backscatter communication GUAN GUI (M’11) received the Dr.Eng. degree in
in severe energy harvesting environments,’’ in Proc. NSDI, Seattle, WA, information and communication engineering from
USA, Apr. 2014, pp. 345–357. the University of Electronic Science and Tech-
[24] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge, U.K.: nology of China, Chengdu, China, in 2011. From
Cambridge Univ. Press, 2004. 2009 to 2012, with the financial support from the
[25] V.-H. Duong, N. X. Hieu, H.-S. Lee, and J.-W. Lee, ‘‘A battery-assisted China Scholarship Council and the Global Center
passive EPC Gen-2 RFID sensor tag IC with efficient battery power man- of Education of Tohoku University, he joined the
agement and RF energy harvesting,’’ IEEE Trans. Ind. Electron., vol. 63, Wireless Signal Processing and Network Labora-
no. 11, pp. 7112–7123, Nov. 2016. tory (Prof. Adachi’s laboratory), Department of
[26] D. Bharadia, E. McMilin, and S. Katti, ‘‘Full duplex radios,’’in Proc. ACM Communications Engineering, Graduate School of
SIGCOMM, Hong Kong, Aug. 2013, pp. 375–386. Engineering, Tohoku University, as a Research Assistant and a Post-Doctoral
[27] B. Radunovic et al., ‘‘Rethinking indoor wireless mesh design: Low
Research Fellow, where he was supported by the Japan Society for the
power, low frequency, full-duplex,’’ in Proc. WIMESH, Boston, MA, USA,
Promotion of Science Fellowship as a Post-Doctoral Research Fellow, from
Jun. 2010, pp. 1–6.
[28] B. Lyu, Z. Yang, G. Gui, and Y. Feng, ‘‘Throughput maximization in 2012 to 2014. From 2014 to 2015, he was an Assistant Professor with
backscatter assisted wireless powered communication networks,’’ IEICE the Department of Electronics and Information System, Akita Prefectural
Trans. Fundam., vol. E100-A, no. 6, pp. 1–5, Jun. 2017. University. Since 2015, he has been a Professor with the Nanjing University
[29] Lambert W-Function. [Online]. Available: http://mathworld.wolfram. of Posts and Telecommunications, Nanjing, China. He is currently involved
com/LambertW-Function.html in the research of multidimensional system control, super-resolution radar
imaging, adaptive filter, compressive sensing, sparse dictionary designing,
channel estimation, and advanced wireless techniques.
Dr. Gui received the IEEE International Conference on Communications
Best Paper Award and the IEEE Vehicular Technology Conference Best
Student Paper Award in year 2014. He has been an Associate Editor of the
Wiley Journal of Security and Communication Networks since 2012.