Time-hopping multiple-access for backscatter interference networks

Wanchun Liu*, Kaibin Huang, Xiangyun Zhou, Salman Durrani

*Corresponding author for this work

    Research output: Contribution to journalConference articlepeer-review

    4 Citations (Scopus)

    Abstract

    Future Internet-of-Things (IoT) is expected to wirelessly connect tens of billions of low- complexity devices. Extending the finite battery life of massive number of IoT devices is a crucial challenge. The ultra-low-power backscatter communications (BackCom) with the inherent feature of RF energy harvesting is a promising technology for tackling this challenge. Moreover, many future IoT applications will require the deployment of dense IoT devices, which induces strong interference for wireless information transfer (IT). To tackle these challenges, in this paper, we propose the design of a novel multiple-access scheme based on time-hopping spread-spectrum (TH-SS) to simultaneously suppress interference and enable both two-way wireless IT and one-way wireless energy transfer (ET) in coexisting backscatter reader-tag links. The performance analysis of the BackCom network is presented, including the bit-error rates for forward and backward IT and the expected energy-transfer rate for forward ET, which account for non-coherent and coherent detection at tags and readers, and energy harvesting at tags, respectively. Our analysis demonstrates a tradeoff between energy harvesting and interference performance. Thus, system parameters need to be chosen carefully to satisfy given BackCom system performance requirement.

    Original languageEnglish
    Pages (from-to)1-7
    Number of pages7
    JournalProceedings - IEEE Global Communications Conference, GLOBECOM
    Volume2018-January
    DOIs
    Publication statusPublished - 2017
    Event2017 IEEE Global Communications Conference, GLOBECOM 2017 - Singapore, Singapore
    Duration: 4 Dec 20178 Dec 2017

    Fingerprint

    Dive into the research topics of 'Time-hopping multiple-access for backscatter interference networks'. Together they form a unique fingerprint.

    Cite this