Next Article in Journal
Design and Implementation of a Hypothermic Machine Perfusion Device for Clinical Preservation of Isolated Organs
Next Article in Special Issue
An Energy-Aware Hybrid ARQ Scheme with Multi-ACKs for Data Sensing Wireless Sensor Networks
Previous Article in Journal
Structural Health Monitoring for a Z-Type Special Vehicle
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Optimal Time Allocation in Backscatter Assisted Wireless Powered Communication Networks

Key Laboratory of Ministry of Education in Broadband Wireless Communication and Sensor Network Technology, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
*
Author to whom correspondence should be addressed.
Sensors 2017, 17(6), 1258; https://doi.org/10.3390/s17061258
Submission received: 17 April 2017 / Revised: 17 May 2017 / Accepted: 22 May 2017 / Published: 1 June 2017
(This article belongs to the Special Issue New Paradigms in Data Sensing and Processing for Edge Computing)

Abstract

:
This paper proposes a wireless powered communication network (WPCN) assisted by backscatter communication (BackCom). This model consists of a power station, an information receiver and multiple users that can work in either BackCom mode or harvest-then-transmit (HTT) mode. The time block is mainly divided into two parts corresponding to the data backscattering and transmission periods, respectively. The users first backscatter data to the information receiver in time division multiple access (TDMA) during the data backscattering period. When one user works in the BackCom mode, the other users harvest energy from the power station. During the data transmission period, two schemes, i.e., non-orthogonal multiple access (NOMA) and TDMA, are considered. To maximize the system throughput, the optimal time allocation policies are obtained. Simulation results demonstrate the superiority of the proposed model.

1. Introduction

With the development of Internet of Things (IoT), wireless sensor networks (WSNs) have received a lot of attention [1,2,3,4,5,6,7,8,9,10]. There are many research directions focusing on WSNs, such as security [2,3,4,5,6] and wireless power transfer (WPT) [7,8,9,10]. The security is an important issue of WSNs since wireless sensors typically suffer from different types of attacks. To improve the security of WSNs, some novel schemes have been proposed [2,3,4,5,6]. For example, an active detection-based security and trust routing scheme was proposed in [3] to avoid black hole attack and improve the data route success probability. Moreover, due to the inherent resource-constrained characteristics of wireless sensors, how to prolong the lifetime of these sensors is also an important issue. Concurrently, WPT has been identified as a potential solution to this issue [7].
The existing WPT techniques are typically categorized into three types, i.e., inductive coupling, magnetic resonant coupling and electromagnetic (EM) radiation [8]. Due to the demand for far-field WPT, radio frequency (RF)-based WPT techniques exploiting radiative properties of EM waves have been a hot topic. With the development of RF-based WPT techniques, wireless powered communication networks (WPCNs) have been proposed [9,10]. In a WPCN, there are typically a hybrid access point (HAP) with stable energy sources and multiple users with supercapacitors. To make this network operate, the “harvest-then-transmit” (HTT) mode including energy harvesting and data transmission periods was proposed in [9]. The users first harvest energy radiated by the HAP in the downlink (DL) during the energy harvesting period and then transmit data to the HAP in the uplink (UL) using the harvested energy during the data transmission period. In [9], the WPT in the DL and wireless information transmission (WIT) in the UL work in the half duplex (HD) mode since the HAP has only one antenna. To improve the system performance, a full duplex (FD)-WPCN was proposed by employing two antennas at the HAP [10]. In [10], the HAP broadcasts energy to all users over the entire block so that the users could use the energy harvested before their data transmission. In both [9] and [10], only the HTT mode was adopted so that only a part of a time block was used for information transmission, which limited the system performance.
To extend the time for information transmission, backscatter communication (BackCom) [11,12] has received a lot of attention [13,14,15]. Typically, BackCom can be categorized into three types, i.e., monostatic backscatter, bistatic scatter and ambient backscatter [16,17,18]. In BackCom systems, the users backscatter modulated signals to the information receiver based on the instantaneous excitation signals such that the dedicated time for energy harvesting is not required. In [13], a backscatter assisted WPCN (BAWPCN) was proposed. In a BAWPCN, there are two types of users, which can work in BackCom and HTT modes, respectively. The users working in the BackCom mode are scheduled during the energy harvesting period of the HTT mode. To make the network deployment flexible, the authors in [14] assumed that a user could work in either BackCom mode or HTT mode. A single-user cognitive WPCN (a special type of WPCNs) was considered and a tradeoff between the BackCom and HTT modes was analyzed. Based on [14], the authors in [15] further considered a multi-user case and the optimal time allocation policy was studied. In [14,15], the overlay-based cognitive WPCNs were studied so that the data transmission period of the HTT mode was fixed. Moreover, the energy source was only available when the primary channel was busy, which limited the system flexibility.
Different with [14,15], in this paper, we consider a general BAWPCN, which consists of a power station, an information receiver, and multiple users that can work in either BackCom mode or HTT mode, which is shown in Figure 1. The proposed model is studied based on a time block. The time block is mainly divided into two parts corresponding to the data backscattering period of the BackCom mode and the data transmission period of the HTT mode. The power station broadcasts wireless energy to all users continuously over the entire block. During the data backscattering period, the users backscatter data to the information receiver in time division multiple access (TDMA). Note that the data backscattering period is partly overlaid with the energy harvesting period. When one user works in the BackCom mode, the other users stay in the HTT mode to harvest energy. During the data transmission period, we consider two schemes, i.e., non-orthogonal multiple access (NOMA) [19,20,21] and TDMA. We consider the NOMA scheme for the improvement of spectral efficiency and user fairness [19,21], and the TDMA scheme for the improvement of sum-throughput since the full-duplex mode is adopted [10]. The key contributions of this paper are summarized as follows. First, we propose a general WPCN assisted by BackCom, where both BackCom and HTT modes are employed at the users. The time is fully exploited for information transmission. Second, both NOMA and TDMA schemes are considered during the data transmission period of the HTT mode. It is shown that the TDMA scheme can provide higher system throughput than the NOMA scheme. Third, the optimal time allocation policies are derived to maximize the system throughput.

2. System Model

As illustrated in Figure 1, we consider a BAWPCN that consists of one power station, one information receiver, and K wireless-powered users without fixed energy supplies. Each user, denoted by U i , i = 1 , , K , has an energy harvesting module and a backscatter circuit so that it can work in either HTT mode or BackCom mode [14,15]. It is highlighted that the BackCom and HTT modes cannot be operated simultaneously [22]. The power station continuously broadcasts energy signals to all users. When the HTT mode is adopted, the users harvest energy from the power station and store the harvested energy in their supercapacitors for further data transmission. In contrast, when the BackCom mode is activated, the users can backscatter the modulated signals to the information receiver instantaneously. It is assumed that the information receiver has the perfect information of each user’s working mode and can choose the corresponding demodulators to extract useful information [14,15].
The channel power gains from the power station to U i , and from U i to the information receiver are denoted as h i and g i , respectively. We assume the channels are quasi-static flat fading and remain constant during each block with duration T. Moreover, it is assumed that all terminals perfectly know the channel power gains.
The block structure for the proposed WPCN system is shown in Figure 2. Each block is divided into two main parts corresponding to the data backscattering and transmission periods, respectively. The duration of the two periods are denoted by t 1 and t 2 . During the data backscattering period, U i backscatters data to the information receiver during its allocated time slot α i , whereas, the other users harvest energy from the power station [15]. The total time for energy harvesting of U i during the data backscattering period is given as t 1 - α i . During the data transmission period, we consider two schemes for data transmission, i.e., NOMA and TDMA.

2.1. BackCom Mode

In this paper, we consider one type of BackCom, i.e., ambient backscatter [17]. For BackCom, U i can harvest energy from the signals transmitted by the power station even if it is backscattering data to the information receiver. However, the harvested energy is not sufficient for U i to transmit data actively but can supply the operations of U i . Hence, we do not discuss the BackCom mode’s circuit energy consumption here. From [17], the rate of ambient backscatter is controlled by the setting of RC circuit elements. Denote the backscattering rate of U i as B i , which is a constant. Hence, the total transmission bits of U i during the backscattering data period is
R i b = α i B i .

2.2. HTT Mode

Since different schemes are considered during the data transmission period, the energy harvesting and data transmission periods of each scheme are different. The details are given as follows.

2.2.1. NOMA Scheme

For the NOMA scheme, all users transmit data to the information receiver simultaneously and SIC is employed at the information receiver to retrieve the users’ signals. To guarantee the performance of NOMA scheme, it is assumed that the channel power gains of users are distinct. The indices of these users are assigned in a way that h i g i are sorted in descending order, i.e., h 1 g 1 > h 2 g 2 > > h K g K [21,23]. The energy harvesting and data transmission periods of U i are given as t 1 - α i and t 2 , respectively. The total harvested energy of U i , denoted by E i , is given by
E i h = η i ( t 1 - α i ) P h i ,
where η i is the energy harvesting efficiency, P is the transmit power of the power station. Following the assumptions in [9], we assume that the main energy consumption during the data transmission period is due to the data transmission, and thus the circuit energy consumption is ignored here for simplicity. Moreover, we assume that the harvested energy will be exhausted during the data transmission period. Denote the average transmit power of U i during the data transmission period as P i t , which is given by
P i t = E i h t 2 .
The transmission bits of U i , denoted by R i n , are expressed as
R i n = t 2 W log 2 ( 1 + P i t g i j = i + 1 K P j t g j + σ 2 ) = t 2 W log 2 ( 1 + t 1 - α i t 2 γ i j = i + 1 K t 1 - α j t 2 γ j + 1 ) , i = 1 , , K - 1 ,
R K n = t 2 W log 2 ( 1 + t 1 - α K t 2 γ K ) .
where γ i = η i P h i g i σ 2 .

2.2.2. TDMA Scheme

For the TDMA scheme, the users transmit data to the information receiver sequentially. Since the power station broadcasts energy during the entire block, when U i is transmitting data to the information receiver, other users can still harvest energy from the power station. Due to the high self-discharge of the supercapacitors, we assume that U i can harvest energy before its data transmission but not after [10]. Hence, compared with the NOMA scheme, the users in this scheme can harvest more energy, which provides much larger system throughput. We denote the time for U i to transmit data as τ i . The number of total energy harvested by U i is given by
E i = η i ( t 1 - α i + j = 1 i - 1 τ j ) P h i , i = 1 , , K ,
where t 1 - α i + j = 1 i - 1 τ j is the energy harvesting time for U i , and let j = 1 0 τ j = 0 .
Since the users transmit data to the information receiver in TDMA, there is no mutual interference among these users. Hence, the transmission bits of U i are given by
(4) R i t = τ i W log 2 ( 1 + E i g i τ i σ 2 ) (5) = τ i W log 2 ( 1 + t 1 - α i + j = 1 i - 1 τ j τ i γ i ) , i = 1 , , K .
To simplify description, we refer to the NOMA scheme of the HHT mode and to the TDMA scheme of the HTT mode in a BAWPCN as NOMA-BAWPCN and TDMA-BAWPCN, respectively.

3. Sum-Throughput Maximization

In this section, we study the sum-throughput maximization problems of both NOMA-BAWPCN and TDMA-BAWPCN. The optimization problems are first formulated and the optimal time allocation policies are then studied. For the NOMA-BAWPCN, the formulation of the total transmission bits of both BackCom and HTT modes is given by
R sum = i = 1 K R i b + i = 1 K R i n = i = 1 K α i B i + t 2 W log 2 ( 1 + i = 1 K ( t 1 - α i ) γ i t 2 ) - t 2 W log 2 ( 1 + i = 2 K ( t 1 - α i ) γ i t 2 ) + t 2 W log 2 ( 1 + i = 2 K ( t 1 - α i ) γ i t 2 ) - t 2 W log 2 ( 1 + i = 3 K ( t 1 - α i ) γ i t 2 ) + + t 2 W log 2 ( 1 + i = K - 1 K ( t 1 - α i ) γ i t 2 ) - t 2 W log 2 ( 1 + ( t 1 - α K ) γ K t 2 ) + t 2 W log 2 ( 1 + ( t 1 - α K ) γ K t 2 ) = i = 1 K α i B i + t 2 W log 2 1 + i = 1 K ( t 1 - α i ) γ i t 2 .
Denote α = [ α 1 , , α K ] and t = [ t 1 , t 2 ] . From the time allocation policy given in the previous sections, we derive the following constraints
C 1 : i = 1 K α i t 1 , C 2 : t 1 + t 2 T , C 3 : α i 0 , i = 1 , , K , C 4 : t 1 , t 2 0 .
C1 limits the total time of all users in the BackCom mode, C2 ensures that two main parts cannot exceed the duration of a block, C3 and C4 are the non-negative orthant constraints for the time allocation variables.
Based on the above analysis, the optimization problem of the NOMA-BAWPCN is formulated as
( P 1 ) max α , t R sum s . t . C 1 , C 2 , C 3 , C 4 .
Lemma 1.
R s u m ( α , t ) is a concave function of α and t .
Proof. 
Please refer to Appendix A.  ☐
Moreover, all constraints of Problem P1 are affine. Hence, we derive that Problem P1 is a convex optimization problem [24]. There are many standard numerical methods which can be used to solve a convex problem. To make the implementation simple, we adopt the interior-point method [24].
For the TDMA-BAWPCN, the expression of the total transmission bits is given by
R sum = i = 1 K R i b + i = 1 K R i t = i = 1 K α i B i + τ i W log 2 1 + t 1 - α i + j = 1 i - 1 τ j τ i γ i .
In addition to the constraints given for the NOMA-BAWPCN, the TDMA-BAWPCN also follows the following constraints
C 5 : i = 1 K τ i t 2 , C 6 : τ i 0 , i = 1 , , K .
C5 limits the total time for data transmission in the HTT mode, and C6 also guarantees that the variables are non-negative. Denote τ = [ τ 1 , , τ K ] . The optimization problem for the TDMA-BAWPCN is formulated as
( P 2 ) max α , τ , t R sum s . t . C 1 , C 2 , C 3 , C 4 , C 5 , C 6 .
Taking the method used for Problem P1, we can also derive that Problem P2 is a convex optimization problem. Hence, the interior-point method is adopted.

4. Simulation Results

In this section, simulation results are presented to evaluate the performance of the proposed model. We take a similar setting of parameters as given in [9]. We set the transmission bandwidth as 100 kHz, the energy harvesting efficiency as η i = 0 . 6 , i , the noise power at the information receiver as σ 2 = - 90 dBm, and T = 1 s. The forward and backward channel power gains are modelled as h i = 10 - 3 d f i - 3 ρ f i 2 and g i = 10 - 3 d b i - 3 ρ b i 2 , where d f i is the distance between U i and the power station, d b i is the distance between U i and the information receiver, ρ f i and ρ b i are the channel short-term fadings, ρ f i 2 and ρ b i 2 are exponentially distributed random variables with unit mean. Let d f i = 4 + i K * 4 m and d b i = 3 + i K * 3 m, which can guarantee that the channel power gains of users are distinct [23]. Unless otherwise stated, the backscatter rate and transmit power are set as 300 kbps and 30 dBm, respectively. For performance comparison, the scheme that all users only work in the BackCom mode and the scheme that all users only work in the HTT mode are used as benchmarks. All simulation curves are obtained by averaging 1000 Monte Carlo runs.
We first consider a two-user BAWPCN, i.e., K = 2 . To show the effect of backscatter rate on time allocation, the following case, i.e. the backscatter rates of both two users are the same and varied from 50 kbps to 500 kbps, is studied. Let Δ t 1 = t 1 - α 1 - α 2 and Δ t 2 = t 2 - τ 1 - τ 2 , which correspond to the dedicated time for energy harvesting for both two users and the unused time for data transmission, respectively. The results of average optimal time allocation are given in Figure 3 and Figure 4. From Figure 3 and Figure 4, we observe that the total time used for data backscattering increases with the increase of backscatter rate. This result can be explained as follows. For the BackCom mode with an increasing rate, increasing the backscattering time can provide higher transmission bits and increase the energy harvested by users. In addition, since the total time for users to transmit data is reduced, users can transmit data with a higher transmit power. Overall, the total transmission bits improve. Compared with U 2 , U 1 has more time to harvest energy since it has a better channel condition. Moreover, Δ t 2 is always equal to zero since t 2 will be fully exploited to transmit data.
For the two-user case, we further show the effect of transmit power on total transmission bits in Figure 5. As the transmit power increases, the total-transmission bits of both WPCN and BAWPCN models improve. When the transmit power is small, the performance of the BAWPCNs is similar to that of the BackCom mode, but far better than that of the WPCNs. When the transmit power is large, the performance gap between the BAWPCNs and WPCNs reduces. This is because the HTT mode begins to dominate the total transmission bits with a higher transmit power. It is emphasized that the proposed model with corresponding data transmission schemes always achieves a better performance than the traditional models, e.g., the total transmission bits of the NOMA-BAWPCN are larger than that of the NOMA-WPCN. In addition, for the proposed model, the TDMA scheme can achieve larger total transmission bits than the NOMA scheme since the TDMA scheme can harvest more energy resulting in higher transmission bits for the HTT mode.
We investigate the average total transmission bits versus the number of users in Figure 6 by considering the following three cases. Case (i): All users have the same backscatter rate which is fixed as 300 kbps; Case (ii): One user’s backscatter rate is 300 kbps and the other users’ backscatter rate is 400 kbps. Case (iii): One user’s backscatter rate is 400 kbps and the other users’ backscatter rate is 300 kbps. From Figure 6, we observe the average total transmission bits of the BAWPCNs and WPCNs are increasing functions of the number of users. As the number of users increases, the total transmission bits of the TDMA-WPCN may be larger than that of the NOMA-BAWPCN. This is because the users of the TDMA-WPCN can harvest more energy, especially when the number of users is large enough. Compared with Figure 6a, the performance of BAWPCNs in Figure 6b,c is better. This is because at least one user in Case (ii) and Case (iii) has a larger backscatter rate. Moreover, the performance of BAWPCNs in Case (ii) is superior to that in Case (iii). This result implies that the performance depends on not only the largest backscatter rate but also on the number of users with the largest backscatter rate, which is different from the result in [15]. From Figure 6, we also observe that the proposed model with corresponding data transmission schemes can achieve larger total transmission bits and the total transmission bits of the TDMA-BAWPCN are the largest, which is coincident with the observation in Figure 5.

5. Conclusions

This paper has studied a backscatter assisted wireless powered communication network, where both BackCom and HTT modes are employed at the users. During the data transmission period, both NOMA and TDMA schemes have been considered. To maximize the system throughput, optimization problems have been formulated and the time allocation policies including the tradoffs between data backscattering and energy harvesting, and between data backscattering and data transmission have been studied. Simulation results have confirmed that the proposed model can achieve a better performance than that of the traditional WPCNs.

Acknowledgments

This work was supported by the National Natural Science Foundation of China (Nos. 61671252, 61501251, 61571233), the Key University Science Research Project of Jiangsu Province (No. 14KJA510003), the Innovation Program of Graduate Education of Jiangsu Province, China (KYLX15-0828).

Author Contributions

Bin Lyu and Zhen Yang conceived and designed the experiments; Bin Lyu performed the experiments; Bin Lyu and Guan Gui analyzed the data; Bin Lyu, Guan Gui and Hikmet Sari wrote the paper.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

If R sum is a concave function, its Hessian is negative semidefinite. To prove Lemma 1, we first derive the Hessian matrix, which is denoted by H and given as follows.
H = 2 R sum α 1 2 2 R sum α 1 α i 2 R sum α 1 α K 2 R sum α 1 t 1 2 R sum α 1 t 2 2 R sum α i α 1 2 R sum α i 2 2 R sum α i α K 2 R sum α i t 1 2 R sum α i t 2 2 R sum α K α 1 2 R sum α K α i 2 R sum α K 2 2 R sum α K t 1 2 R sum α K t 2 2 R sum t 1 α 1 2 R sum t 1 α i 2 R sum t 1 α K 2 R sum t 1 2 2 R sum t 1 t 2 2 R sum t 2 α 1 2 R sum t 2 α i 2 R sum t 2 α K 2 R sum t 2 t 1 2 R sum t 2 2
where the elements are given as follows
2 R sum α m 2 = - W γ m 2 t 2 ln 2 [ t 2 + i = 1 K ( t 1 - α i ) γ i ] 2 , 2 R sum α m α n = - W γ m γ n t 2 ln 2 [ t 2 + i = 1 K ( t 1 - α i ) γ i ] 2 , m n , 2 R sum α m t 1 = W γ m t 2 ( i = 1 K γ i ) ln 2 [ t 2 + i = 1 K ( t 1 - α i ) γ i ] 2 , 2 R sum α m t 2 = - W γ m ( i = 1 K ( t 1 - α i ) γ i ) ln 2 [ t 2 + i = 1 K ( t 1 - α i ) γ i ] 2 , 2 R sum t 1 2 = - W t 2 ( i = 1 K γ i ) 2 ln 2 [ t 2 + i = 1 K ( t 1 - α i ) γ i ] 2 , 2 R sum t 2 2 = - W [ i = 1 K ( t 1 - α i ) γ i ] 2 ln 2 [ t 2 + i = 1 K ( t 1 - α i ) γ i ] 2 t 2 , 2 R sum t 1 t 2 = W ( i = 1 K γ i ) [ i = 1 K ( t 1 - α i ) γ i ] ln 2 [ t 2 + i = 1 K ( t 1 - α i ) γ i ] 2 .
For any given real vector x = [ x 1 , , x K , x K + 1 , x K + 2 ] T , we derive that
x T H x = - W t 2 ( i = 1 K γ i x i ) - ( i = 1 K γ i ) x K + 1 - i = 1 K γ i ( t 1 - α i ) x K + 2 2 ln 2 [ t 2 + i = 1 K ( t 1 - α i ) γ i ] 2 t 2 0 ,
where t 2 0 . This thus proves Lemma 1.

References

  1. Dong, M.; Ota, K.; Liu, A. RMER: Reliable and energy-efficient data collection for large-scale wireless sensor networks. IEEE Internet Things J. 2016, 3, 511–519. [Google Scholar] [CrossRef]
  2. Wu, J.; Ota, K.; Dong, M.; Li, C. A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access 2016, 4, 416–424. [Google Scholar] [CrossRef]
  3. Liu, Y.; Dong, M.; Ota, K.; Liu, A. ActiveTrust: Secure and trustable routing in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 2016, 11, 2013–2027. [Google Scholar] [CrossRef]
  4. Long, J.; Dong, M.; Ota, K.; Liu, A. Achieving source location privacy and network lifetime maximization through tree-based diversionary routing in wireless sensor networks. IEEE Access 2014, 2, 633–651. [Google Scholar] [CrossRef]
  5. Luo, S.; Dong, M.; Ota, K.; Wu, J.; Li, J. A security assessment mechanism for software-defined networking-based mobile networks. Sensors 2015, 15, 31843–31858. [Google Scholar] [CrossRef] [PubMed]
  6. Dong, M.; Ota, K.; Yang, L. T.; Liu, A.; Guo, M. LSCD: A low-storage clone detection protocol for cyber-physical systems. IEEE Trans. Comput.-Aided Design Integr. Circuits Syst. 2016, 35, 712–723. [Google Scholar] [CrossRef]
  7. Bi, S.; Zeng, Y.; Zhang, R. Wireless powered communication network: An overview. IEEE Wirel. Commun. 2016, 23, 10–18. [Google Scholar] [CrossRef]
  8. Bi, S.; Ho, C.K.; Zhang, R. Wireless powered communication: Opportunities and challenges. IEEE Commun. Mag. 2015, 53, 117–125. [Google Scholar] [CrossRef]
  9. Ju, H.; Zhang, R. Throughput maximization in wireless powered communication networks. IEEE Trans. Wirel. Commun. 2014, 13, 418–428. [Google Scholar] [CrossRef]
  10. Kang, X.; Ho, C.K.; Sun, S. Full-duplex wireless-powered communication network with energy causality. IEEE Trans. Wirel. Commun. 2015, 14, 5539–5551. [Google Scholar] [CrossRef]
  11. Boyer, C.; Roy, S. Backscatter communication and RFID: Coding, energy, and MIMO analysis. IEEE Trans. Commun. 2014, 62, 770–785. [Google Scholar] [CrossRef]
  12. Lyu, B.; Yang, Z.; Gui, G.; Feng, Y. Optimal resource allocation policies for multi-user backscatter communication systems. Sensors 2016, 16, 2016. [Google Scholar] [CrossRef] [PubMed]
  13. Lyu, B.; Yang, Z.; Gui, G.; Feng, Y. Throughput maximization in backscatter assisted wireless powered communication networks. IEICE Trans. Fundam. 2017, E100-A, 1–5. [Google Scholar] [CrossRef]
  14. Thai, H.D.; Niyato, D.; Wang, P.; Kim, D.I.; Han, Z. The tradeoff analysis in RF-powered backscatter cognitive radio networks. In Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 4–8 December 2016; pp. 1–6. [Google Scholar]
  15. Thai, H.D.; Niyato, D.; Wang, P.; Kim, D.I. Optimal time sharing in RF-powered backscatter cognitive radio networks. In Proceedings of the IEEE ICC, Pairs, France, 21–25 May 2017. [Google Scholar]
  16. Dobkin, D.M. The RF in RFID: Passive UHF RFID in Practice; Elsevier Inc.: Burlington, MA, USA, 2007. [Google Scholar]
  17. Liu, V.; Parks, A.; Talla, V.; Gollakota, S.; Wetherall, D.; Smith, J.R. Ambient backscatter: Wireless communication out of thin air. In Proceedings of the ACM SIGCOMM, Hong Kong, China, 12–16 August 2013; pp. 39–50. [Google Scholar]
  18. Kimionis, J.; Bletsas, A.; Sahalos, J.N. Increased range bistatic scatter radio. IEEE Trans. Commun. 2014, 62, 1091–1104. [Google Scholar] [CrossRef]
  19. Saito, Y.; Benjebbour, A.; Kishiyama, Y.; Nakamura, T. System-level performance evaluation of downlink non-orthogonal multiple access (NOMA). In Proceedings of the PIMRC, London, UK, 8–11 September 2013; pp. 611–615. [Google Scholar]
  20. Ding, Z.; Dai, L.; Poor, H.V. MIMO-NOMA design for small packet transmission in the Internet of Things. IEEE Access 2016, 4, 1393–1405. [Google Scholar] [CrossRef]
  21. Diamantoulakis, P.D.; Pappi, K.N.; Ding, Z.; Karagiannidis, G.K. Wireless powered communications with non-orthogonal multiple access. IEEE Trans. Wirel. Commun. 2016, 15, 8422–8436. [Google Scholar] [CrossRef]
  22. Zhang, P.; Ganesan, D. Enabling bit-by-bit backscatter communication in severe energy harvesting environment. In Proceedings of the NSDI, Seattle, WA, USA, 2–4 April 2014; pp. 345–357. [Google Scholar]
  23. Ali, M.S.; Tabassum, H.; Hossain, E. Dynamic user clustering and power allocation for uplink and downlink non-orthogonal multiple access (NOMA) systems. IEEE Access 2016, 4, 6325–6343. [Google Scholar] [CrossRef]
  24. Boyd, S.; Vandenberghe, L. Convex Optimization; Cambridge University Press: New York, NY, USA, 2004. [Google Scholar]
Figure 1. Model of a backscatter assisted wireless powered communication network (BAWPCN).
Figure 1. Model of a backscatter assisted wireless powered communication network (BAWPCN).
Sensors 17 01258 g001
Figure 2. Block structure of the BAWPCNs. (a) non-orthogonal multiple access (NOMA) scheme; (b) time division multiple access (TDMA) scheme.
Figure 2. Block structure of the BAWPCNs. (a) non-orthogonal multiple access (NOMA) scheme; (b) time division multiple access (TDMA) scheme.
Sensors 17 01258 g002
Figure 3. Average optimal time allocation versus different backscatter rates for NOMA-BAWPCNs.
Figure 3. Average optimal time allocation versus different backscatter rates for NOMA-BAWPCNs.
Sensors 17 01258 g003
Figure 4. Average optimal time allocation versus different backscatter rates for TDMA-BAWPCNs.
Figure 4. Average optimal time allocation versus different backscatter rates for TDMA-BAWPCNs.
Sensors 17 01258 g004
Figure 5. Average total transmission bits versus transmit power.
Figure 5. Average total transmission bits versus transmit power.
Sensors 17 01258 g005
Figure 6. Average total transmission bits versus number of users. (a) Case (i); (b) Case (ii); (c) Case (iii).
Figure 6. Average total transmission bits versus number of users. (a) Case (i); (b) Case (ii); (c) Case (iii).
Sensors 17 01258 g006aSensors 17 01258 g006b

Share and Cite

MDPI and ACS Style

Lyu, B.; Yang, Z.; Gui, G.; Sari, H. Optimal Time Allocation in Backscatter Assisted Wireless Powered Communication Networks. Sensors 2017, 17, 1258. https://doi.org/10.3390/s17061258

AMA Style

Lyu B, Yang Z, Gui G, Sari H. Optimal Time Allocation in Backscatter Assisted Wireless Powered Communication Networks. Sensors. 2017; 17(6):1258. https://doi.org/10.3390/s17061258

Chicago/Turabian Style

Lyu, Bin, Zhen Yang, Guan Gui, and Hikmet Sari. 2017. "Optimal Time Allocation in Backscatter Assisted Wireless Powered Communication Networks" Sensors 17, no. 6: 1258. https://doi.org/10.3390/s17061258

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop