Abstract

The fifth-generation-enabled Internet of Things (5G-enabled IoT) has been considered as a key enabler for the automation of almost all industries. In 5G-enabled IoT, resource-limited passive devices are expected to join the IoT using the WiFi backscatter communication (WiFi-BSC) technology. However, WiFi-BSC deployment is currently limited due to high equipment cost and short transmission range. To address these two drawbacks, in this paper, we propose a low-cost and long-range node-assisted WiFi backscatter communication scheme. In our scheme, a WiFi node can receive backscatter signals using two cheap regular half-duplex antennas (instead of using expensive full-duplex technique or collaborating with multiple other nodes), thereby reducing the equipment cost. Besides, WiFi nodes can help relay backscatter signals to remote 5G infrastructure, greatly extending the backscatter’s transmission range. We then develop a theoretical model to analyze the throughput of WiFi-BSC. Extensive simulations verify the effectiveness of our scheme and the accuracy of our model.

1. Introduction

The fifth-generation-enabled Internet of Things (5G-enabled IoT) is considered to be a key enabler for automation of almost all industries [15]. In a typical 5G-enabled IoT, a 5G customer premise equipment (5G-CPE) is introduced to bridge a WiFi-based IoT network and a 5G base station [6], as shown in Figure 1. In this solution, the 5G-CPE may first use its WiFi module to collect data from the WiFi-based IoT devices and then upload these data to a remote cloud server timely using its 5G module. Hence, this solution can take full advantage of 5G’s high bandwidth and low latency, as well as WiFi’s ubiquity.

Besides WiFi, backscatter communication (BSC) is another popular wireless technology in IoT [7]. BSC is designed for communications between tags (which are severely resource-limited and battery-free) and readers. With BSC, tags first harvest energy from ambient signals, then convey information by modulating and reflecting ambient signals (instead of generating signals by themselves), while readers are dedicatedly designed to receive the reflected signals from tags. As a recent advance, WiFi-based BSC (WiFi-BSC) [811] has been proposed. With WiFi-BSC, tags may harvest energy and convey information by utilizing ubiquitous WiFi signals, while WiFi nodes with self-interference cancellation capability (which is called WiFi reader) may receive the reflected signals from tags. WiFi-BSC opens up a promising opportunity for tags to join WiFi-based IoT networks, but WiFi readers are expensive because they are required to support costly full-duplex techniques or collaborate with other WiFi nodes to implement the self-interference cancellation. On the other hand, the transmission range of WiFi-BSC is very short (say, 1 m to 54 m [9, 10]). As a result, current WiFi-BSC deployment is very limited.

1.1. Motivation

In recent years, the multiuser, multi-input, and multioutput (MU-MIMO) technology has been introduced to WiFi. With MU-MIMO, a WiFi node can use regular half-duplex antennas to receive different signals from multiple nodes simultaneously and then distinguish these signals for further processing. This feature motivates us to apply MU-MIMO in WiFi-BSC for enabling conventional WiFi nodes to act as WiFi readers, without utilizing costly full-duplex technique and collaborating with other nodes.

In addition, the transmission range of WiFi (up to 1000 m [12, 13]) is much longer than that of WiFi-BSC. This motivates us to let WiFi nodes relay tags’ information toward 5G-CPE, greatly extending the transmission range of the WiFi-BSC.

1.2. Contribution

In this paper, we propose a low-cost and long-range node-assisted WiFi-BSC scheme. Our contributions can be summarized as follows.(1)Propose a low-cost WiFi-BSC design. Our design only requires a conventional WiFi node to be equipped with two regular half-duplex antennas, so as to adopt MU-MIMO to decode the reflected signals from tags. This avoids adopting costly full-duplex technique and collaborating with other nodes for extracting reflected signals of tags, thereby saving equipment cost greatly(2)Propose a long-range node-assisted WiFi-BSC design. Our design lets WiFi nodes relay tags’ information to a remote 5G-CPE, hence extending the transmission range of the tags significantly(3)Develop a theoretical model to analyze the throughput of our scheme, and verify the accuracy of our model via extensive simulations. The results show that our design significantly outperforms existing WiFi-BSC schemes in terms of throughput

1.3. Related Works

In recent years, BSC has quickly become a key technology for low-power wireless communication systems [14] and therefore has received lots of attention in the research community. Below, we present related works of BSC in terms of physical (PHY) layer and medium access control (MAC) layer schemes.

1.3.1. PHY Layer Schemes

In the PHY layer, many works are dedicated to achieving feasible BSC. For example, Liu et al. proposed ambient backscatter that enables two tags to communicate with each other by reflecting ambient TV signals [7]. However, in practical IoT systems, tags are more commonly covered by WiFi signals instead of TV signals. To this end, WiFi backscatter [10] enables tags to reflect ambient WiFi signals in their transmissions and uses an off-the-shelf WiFi device to receive and decode reflected signals. However, the decoding accuracy of this approach is low, because the WiFi node receives both the reflected signal and the ambient signal and has a difficulty in separating these two signals. To improve the decoding accuracy, BackFi [8] is proposed to enable the reader to have prior knowledge of the ambient signal. In this approach, a WiFi node equipped with a full-duplex transceiver is introduced to perform regular WiFi transmission and backscatter reception simultaneously. When decoding the reflected signals, the node adopts the self-interference cancellation (SIC) technique to cancel the ambient signals sent by itself. Nevertheless, deploying a full-duplex transceiver is costly. To avoid deploying a full-duplex transceiver, HitchHike [9] lets tags reflect ambient WiFi signals from a WiFi band to a dedicated band. At the receiving end, there are two WiFi nodes connecting to the same backend server. One node receives the reflected signal over the dedicated band, while the other node receives the regular signal over the WiFi band. Then, the server collects these two signals and extracts tags’ data from the reflected signal by comparing these two signals. This design requires collaborations between multiple WiFi nodes, which is still expensive. Different from the above approaches, without deploying a full-duplex transceiver and assigning a dedicated band for BSC in our design, we enable a half-duplex WiFi node to receive and decode the backscatter signals using only two regular antennas.

Besides, some works focus on improving the PHY layer security (PLS) of BSC. For example, in [15], Li et al. investigated the impact of in-phase and quadrature-phase imbalance on the security performance of BSC systems and found out that there exists a trade-off between reliability and security. Further, they proposed a system parameter adjustment scheme to prevent BSC from being eavesdropped. Reference [16] investigated the joint effects of residual hardware impairments, channel estimation errors, and imperfect successive interference cancellation on the PLS of BSC and proposed an artificial noise scheme to prevent BSC form being eavesdropped. Reference [17] studied the PLS of BSC in the case where cognitive radio is introduced in conjunction with BSC. The authors also optimized the performance trade-off between reliability and security of BSC by adjusting system parameters. It is worth pointing out that the PLS of BSC is out of scope of this paper.

1.3.2. MAC Layer Schemes

Along with PHY layer achievements, some works focus on proposing efficient medium access control (MAC) protocol for BSC. For example, [18] proposed a distributed MAC protocol for tag-to-tag communications. When ambient signals exist, tags contend for transmissions, and the loser tags harvest energy while the winner tag performs transmissions. There are also MAC designs for tag-to-WiFi communications. Most of them assumed a full-duplex WiFi access point (AP) that can emit ambient signals and receive the reflected signals from tags simultaneously. For example, Ma et al. proposed a demand-based MAC scheme for WiFi backscatter communication [11]. In this scheme, when having a demand for collecting data from tags, the full-duplex WiFi AP ceases all WiFi transmissions and sends a period of ambient signals, and tags contend and transmit data to the AP during this period. Reference [19] proposed a rendezvous scheme for sporadic BSC. In this scheme, a full-duplex WiFi AP divides the time into frames with equal length; each frame is further divided into subperiods for coordination, WiFi transmission, and BSC, respectively. Tags perform contentions in the coordination subperiods and perform transmissions (to the AP) in the BSC subperiods. Then, this idea is extended by [20], where the full-duplex WiFi AP adopts the deep reinforcement learning technique to learn the optimal time-division strategy. Different from the above approaches, we focus on extending the range of BSC, with the assistance of regular half-duplex WiFi nodes.

The rest of this paper is organized as follows. Section 2 details our design. In Section 3, we theoretically analyze the performance of our design. Section 4 validates the accuracy of our theoretical model. Section 5 concludes this paper.

2. Our Design

In this section, we detail our low-cost and long-range node-assisted WiFi backscatter communication scheme for 5G-enabled IoT. The scheme consists of a physical (PHY) layer design and a MAC layer design. Below, we first present an overview of the scheme and then detail two designs.

2.1. Design Overview

In our design, we consider a 5G-enabled IoT network, which consists of one 5G-CPE, multiple WiFi nodes, and multiple backscatter tags. Adopting off-the-shelf hardware only, we propose a design to achieve an objective as follows. Backscatter tags first transmit data to their nearby WiFi nodes; then, the WiFi node forwards the backscatter data to the remote 5G-CPE.

In the PHY layer, whenever a WiFi signal is sent, the tag uses the signal as an excitation signal to perform a tag-to-tag communication or a tag-to-WiFi communication. During the tag-to-WiFi communication, a WiFi node can extract backscatter data from ambient WiFi signals using only two regular half-duplex antennas, instead of being equipped with expensive full-duplex receivers or collaborating with multiple nodes.

In the MAC layer, we divide the IoT network into multiple subcells (as shown in Figure 2), where each subcell consists of a WiFi node and multiple tags. We propose a MAC layer protocol as follows. First, WiFi nodes follow the WiFi standard to contend for the channel. Then, the WiFi winner node starts a WiFi transmission, while the tags in its subcell harvest energy from the transmission signal. At the same time, other tags adopt our proposed scheme to contend and transmit data to the WiFi nodes in their subcells.

Below, we detail our PHY layer design and our MAC layer design in sequence.

2.2. PHY Layer Design

In our PHY layer design, we assume that each WiFi node has two antennas: antenna 1 (AT1) and antenna 2 (AT2). When a WiFi node transmits signals, it only activates its AT1. When a WiFi node receives signals, it activates both AT1 and AT2.

As shown in Figure 3, when a node (say, Node1) sends a WiFi signal to 5G-CPE, other nodes (say, Node2) and the tags (say, Tag2-1 and Tag2-2) can sense this signal. Using the WiFi signal as an excitation signal, a tag (say, Tag2-1) can adopt the Manchester technology to send information to other tags (say, Tag2-2). It can also adopt the -ary phase shift keying (M-PSK) technology to perform a high-rate transmission to a WiFi node (say, Node2). Below, we detail the tag-to-tag communication and the tag-to-WiFi communication.

2.2.1. Tag-to-Tag Communication

We adopt the Manchester technology in tag-to-tag communication. Below, we introduce the Manchester modulation and demodulation under the ambient WiFi signals, respectively.

(1) Modulation. When performing the Manchester modulation, a tag changes the amplitude of its received WiFi signal and then reflects the signal. Therefore, the backscatter signal reflected by the tag can be expressed as follows:whereis the backscatter baseband signal and

(2) Demodulation. Each tag uses energy detection technique to demodulate a backscatter signal (ignoring noise) received from other tags, where is the impulse response of the channel between tags. We define

When , the tag regards that carries a bit “0”; otherwise, it regards that carries a bit “1.”

2.2.2. Tag-to-WiFi Communication

We adopt the M-PSK technology in tag-to-WiFi communication. Below, we explain M-PSK modulation on tags and the demodulation on nodes sequentially.

(1) Modulation. In the M-PSK scheme, bits are represented by phases of symbols. We take the 4-PSK scheme (i.e., ) as an example to explain the modulation process. As shown in Figure 4, 4-PSK has 4 valid constellation points ; these constellation points correspond to bit pairs . When performing modulation, in (1) is set according to the mapping relationship between and . For example, because “10” corresponds to , when modulating “10,” we set .

(2) Demodulation. In the case shown in Figure 2, Node2 receives regular WiFi signals from Node1 and reflected signals from Tag2-1 simultaneously. Because Node2 activates its AT1 and AT2 during its receptions, a MU-MIMO system is formed, as shown in Figure 5. In this system, Node1’s AT1 and the Tag2-1 are the inputs, while Node2’s AT1 and AT2 are outputs. Benefitting from this system, Node2 can easily extract from and then can decode backscatter data from as follows.

Step 1. Extracting the backscatter baseband signal.
Because Node2 activates two antennas in its reception, we can use a vector to represent Node2’s received signal:where is the signal received by ATi and .

Taking into account the signal fading of and in the MU-MIMO system, (5) can be expanded as follows:

In (6), is the impulse response of the channel between Node1’s AT1 and Node2’s ATi, , and is the impulse response of the channel between the tag and Node2’s ATi, . According to (1), we transform ① to ②. Then, we have ③ from ②, because is received at the tag, where and is impulse response of the channel between Node1’s AT1 and the tag. Next, because the symbol period is much longer than the typical propagation delay in IoT (e.g., 50 ns in WiFi [8]), we can consider to be a constant [8] and hence have ③ to ④. Finally, if and in equation ④ are known, we can obtain and by combining these equations. Fortunately, benefitting from MAC layer design (see Section 2.3), and, can be estimated before demodulations.

At the receiver end, analog signals are sampled before being further processed. Hence, we can write (6) in the discrete domain as follows:

Step 2. Decoding backscatter data.
Upon extracting , we perform the following operations to decode bits from it. First, we, respectively, compute the distance between and each of valid constellation points in . Then, we regard as the constellation point that results in the shortest distance and decode as the corresponding bits. For example, if is closest to and “10” corresponds to , we decode as “10.”

2.3. MAC Layer Design

To better describe our MAC layer design, we assume an IoT network with the topology shown in Figure 2. In this topology, the IoT network comprises two subcells, i.e., ,. In , there are one WiFi node (i.e., ) and two tags (i.e., and ).

Further, we describe the MAC layer design using the example shown in Figure 6. In this example, Node1 and Node2 perform carrier sense multiple access/collision avoidance (CSMA/CA) mechanism to contend for their transmissions. Then, Node1 wins the contention and the whole network starts a process that can be divided into four periods as follows.

2.3.1. Period ①: Header Transmission

In this period, Node1 sends a WiFi PHY header (including WiFi preamble) and a MAC header. All tags (i.e., Tag1-1, Tag1-2, Tag2-1, and Tag2-2) harvest energy from the WiFi signal carrying headers. Node2 receives the PHY header and uses the WiFi preamble in the header to evaluate , in Equation (6).

2.3.2. Period ②: Asynchronous Block ACK (AB-ACK)

In this period, Node1 sends an asynchronous block ACK (AB-ACK) shown in Figure 7, which comprises a Start field (i.e., the start of the tag and WiFi transmission), a Transmit address field (TA for short, i.e., the signature of Node1), a Duration field (i.e., the number of Receive address), and Receive address fields (RA for short, i.e., the signature of the sender of the backscattered data buffered in Node1). The length of each field is 1 microslot. In the example of Figure 6, the RA only contains the signature of Tag1-1 (i.e., ), indicating that Node1 has only successfully received and buffered the backscatter data from Tag1-1 between its last and current transmission.

All tags receive the AB-ACK and detect the TA field in it. Tag2-1 and Tag2-2 learn from TA that the current sender node does not belong to the same subcell (i.e., is not Node2), so they read from the duration field and then perform energy harvesting operation for a time of sending RAs (i.e., microslots). Meanwhile, Tag1-1 and Tag1-2 learn from TA that Node1 is the current sender node, so they continue to check the Duration and RA fields. Then, Tag1-1 detects its signature in RA and knows that its previous transmission is successful. Meanwhile, Tag1-2 does not detect its signature in RA and hence knows that its previous transmission is unsuccessful. Later, it will perform a retransmission to Node1.

Node2 keeps silent.

2.3.3. Period ③: Backscatter Contention

This period is further divided into microslots. In each microslot, Node1 sends a predefined busy tone.

Tag1-1 and Tag1-2 perform energy harvesting and do not send data to Node1, because Node1 is performing transmission instead of reception. Meanwhile, Tag2-1 and Tag2-2 attempt to send packet to Node2; hence, they perform a contention as follows. First, they generate a random backoff counter uniformly distributed in . Then, they sense the channel and decrease their counters by 1 if there is no backscatter preamble (B-preamble) being transmitted. The B-preamble is a predefined special sequence transmitted using our tag-to-tag communication scheme and its length is 1 microslot. Then, Tag2-1’s counter first reaches 0 and Tag2-1 starts to broadcast B-preamble repeatedly until the th microslot. Tag2-2 detects Tag2-1’s B-preambles, stops its backoff and transmission attempt, and performs energy harvesting.

Node2 receives a busy tone from Node1 and a B-preamble from Tag2-1 in the th microslot. Then, it substitutes them and the obtained in period ① into (4) to estimate .

2.3.4. Period ④: Backscatter Transmission

In this period, Node1 follows the WiFi standard to send its data and the buffered Tag1-1’s data to 5G-CPE. Tag1-1, Tag1-2, and Tag2-2 perform energy harvesting. Tag2-1 sends a packet to Node2 using our tag-to-WiFi communication scheme, where the packet consists of the tag’s address and a data payload. Node2 buffers this packet and records the tag’s address, and then, it forwards the packet to the 5G-CPE in its next transmission.

3. Performance Analysis

In this section, we analyze the MAC layer performance of the proposed backscatter system (namely, throughput). We consider a saturated network (i.e., all WiFi nodes and backscatter tags always have a packet to send) consisting of 1 5G-CPE and subcells. Each subcell consists of 1 node and tags. That is, there are nodes and tags in total, where . We also assume that the nodes have the same packet size and the tags have another same packet size . In the following, we express the throughput in terms of WiFi and backscatter.

3.1. Throughput of WiFi

In the following, we first calculate the generic slot and then express the throughput of WiFi.

3.1.1. Calculation of the Generic Slot

Let denote the attempt rate of each WiFi node. In 802.11 networks, can be achieved through setting the minimum contention windows () and the maximum backoff stage () [21]. We havewhere is the collision probability of each WiFi node and can be expressed as

Let denote time duration of the generic slot that elapses for one decrement of the backoff counter. depends on whether a slot is idle or interrupted by a successful or an unsuccessful WiFi transmission [22, 23]. So, can be expressed aswhere is the probability of a busy slot; is the probability of a successful WiFi transmission from any of contending nodes; is the duration of one time slot; and and are the mean time for a successful transmission and an unsuccessful transmission, respectively.

Let denote the mean value of. We have

3.1.2. Calculation of WiFi’s Throughput

We define the throughput,, as the number of bits that the WiFi nodes successfully transmit in [2123]. We have

3.2. Throughput of Backscatter

Here, we first calculate the probability of a successful backscatter transmission and then calculate the throughput of backscatter.

3.2.1. Calculation of the Probability of a Successful Backscatter Transmission

In a subcell, when there is only one tag that wins the contention, the winner tag performs a successful backscatter transmission. Let denote the probability of a successful backscatter transmission. We have

In (13), the denominator represents the number of tags’ all possible contention results, while the numerator represents the number of that only one tag wins the contention. In the numerator, is the backoff counter of the winner; is the maximum backoff counter that the winner can select. represents that any one of contending tags wins the contention, where its backoff counter equals to . represents that the other tags fail the contention, where their backoff counters are greater than .

3.2.2. Calculation of Backscatter’s Throughput

Each successful WiFi transmission can provide a backscatter Transmission Opportunity (TXOP) for all winner tags in other subcells (except the subcell of the WiFi transmitter), and then, the winners can transmit their backscatter data to the neighbouring WiFi nodes in parallel. Note that we have the same in all subcells, because the number of tags in all subcells is the same. Therefore, we express the throughput of backscatter, , by

Finally, we also define the total throughput, , as the sum of WiFi’s throughput and backscatter’s throughput, which can be expressed as

4. Performance Evaluation

In this section, we verify the accuracy of our theoretical model and make comparisons with BackFi [8].

In our design, we consider an IoT network consisting of 1 5G-CPE, nodes, and tags, where each subcell consists of 1 node and tags. The WiFi nodes contend to upload their data to 5G-CPE, where each WiFi transmission activates backscatter transmissions in other subcells.

In BackFi, the IoT network comprises 1 5G-CPE, nodes, and tags, where all tags surround the 5G-CPE in the transmission range of backscatter. The 5G-CPE of BackFi contends for the channel to obtain the backscatter data. When the 5G-CPE wins the channel, it sends the excitation signal to a target tag. Then, the tag modulates the excitation signal and reflects the signal back to the 5G-CPE.

In simulation, we consider a saturated network (in both our design and BackFi). The PHY and MAC layer’s default parameter settings of our design and BackFi are set according to IEEE 802.11ah [13] and listed in Table 1. The other default parameter settings of our design are shown in Table 2.

Here, we verify the accuracy of our model in terms of throughputs (which are calculated by (12) and (14)). Figure 8 plots the WiFi’s throughput and backscatter’s throughput, when ; ; and . From Figure 8, we have the following observations:(i)The theoretical curves closely match the simulation curves. This manifests that our performance model is very accurate(ii)As increases, the throughput of WiFi decreases slightly, while the throughput of backscatter increases significantly. For example, the throughput of backscatter when (0.68 Mb/s) is 0.7 times more than that of when (0.4 Mb/s)

Here, we compare our design with BackFi in terms of WiFi’s throughput, backscatter’s throughput, and total throughput. Figure 9 plots the throughput of our design and BackFi as the number of nodes, , varies, where and . From Figure 9, we have the following observations:(i)As increases from 1 to 20, the total throughput of our design is steady at 3.0 Mb/s, while that of BackFi decreases from 3.1 Mb/s to 2.5 Mb/s(ii)The backscatter’s throughput of our design is much higher than that of BackFi. The reasons are as follows. In our design, each WiFi transmission (whether transmitted by the 5G-CPE or the WiFi nodes) can activate backscatter transmissions. However, in BackFi, only each 5G-CPE’s transmission can activate one backscatter transmission(iii)The WiFi’s throughput of our design is always 0.3 Mb/s lower than that of BackFi. This is because our design introduces the AB-ACK and the backscatter contention, which increases redundancy of WiFi packet

5. Conclusions

In this paper, we propose a low-cost and long-range node-assisted WiFi-BSC for 5G-enabled IoT. First, in the PHY layer, we enable the off-the-shelf WiFi devices to receive and decode backscatter signals using only two regular antennas, which reduces the deployment cost of WiFi-BSC significantly. Then, in the MAC layer, we enable WiFi nodes to relay WiFi-BSC data toward the 5G-CPE, extending the communication range of WiFi-BSC greatly. Next, we model our scheme. Finally, we run extensive simulations to verify the accuracy of our model and the effectiveness of our scheme. This study shows that the WiFi-BSC has a great potential in 5G-enabled IoT.

Data Availability

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Acknowledgments

This work is funded in part by the National Nature Science Foundation of China (File no. 61872451 and 61872452) and in part by the Science and Technology Development Fund, Macau SAR (File nos. 0098/2018/A3, 0037/2020/A1, and 0062/2020/A2).