Advertisement

Time Slot Management in Backscatter Systems for Large-Scale IoT Networks

  • Furqan JameelEmail author
  • Muhammad Nabeel
  • Wali Ullah Khan
Chapter
  • 5 Downloads
Part of the Internet of Things book series (ITTCC)

Abstract

Backscatter communication is considered as a key enabler of the Internet of Things (IoT). It has recently emerged as an alternative of active RF source transmission which enables devices to communicate at a very low power budget. This can be partly attributed to the information transmission configuration of the backscatter tags which makes use of ambient RF signals for reflecting the information to the receiver. Due to these characteristics, the backscatter communications have found many applications in smart homes and transportation systems. In this regard, passive and semi-passive radio frequency identification (RFID) backscatter tags are commonly available in the market. However, these backscatter systems not tags use ALOHA based anti-collision algorithms and make use of slots with a single tag response (singleton) only. The slots with multiple backscatter tag responses (collision) along with slots having no backscatter tag response (empty) are of no use and directly affect the overall throughput as well as the inventory time of the system. Though some anti-collision protocols have been proposed that try to eliminate the empty slots, such systems are still inefficient because of neglecting the transmission capability of other backscatter tags. Specifically, if multiple backscatter tag signals colliding in a single slot are decoded successfully, only the strongest of them proceed with the identification process and the rest of the recovered tag signals are discarded. The present protocol allows only single tag identification per slot. In this chapter, a novel technique is proposed to use some of the unreadable slots (i.e., empty and unsuccessful collision slots) by using the recovered RFID backscatter tags data from previous collision slots that have not proceeded with the identification process. The simulation results show improved throughput and reduced inventory time.

Keywords

Backscatter communications Empty slots Internet-of-Things (IoT) Smart homes 

References

  1. 1.
    Jameel, F., Ristaniemi, T., Khan, I., Lee, B.M.: Simultaneous harvest-and-transmit ambient backscatter communications under rayleigh fading. EURASIP J. Wirel. Commun. Netw. 2019(1), 166 (2019)CrossRefGoogle Scholar
  2. 2.
    Jameel, F., Duan, R., Chang, Z., Liljemark, A., Ristaniemi, T., Jantti, R.: Applications of backscatter communications for healthcare networks. IEEE Netw. 33(6), 50–57 (2019).  https://doi.org/10.1109/MNET.001.1900109CrossRefGoogle Scholar
  3. 3.
    Global, E.: EPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz–960 MHz. Version 1, 23 (2008)Google Scholar
  4. 4.
    Jameel, F., Khan, W.U., Chang, Z., Ristaniemi, T., Liu, J.: Secrecy analysis and learning-based optimization of cooperative NOMA SWIPT systems. In: 2019 IEEE International Conference on Communications Workshops (ICC Workshops), pp. 1–6. IEEE (2019)Google Scholar
  5. 5.
    Jameel, F., Butt, A., Munir, U.: Analysis of interference in body area networks over generalized fading. In: 2016 International Conference on Emerging Technologies (ICET), pp. 1–6. IEEE (2016)Google Scholar
  6. 6.
    Angerer, C., Langwieser, R., Rupp, M.: RFID reader receivers for physical layer collision recovery. IEEE Trans. Commun. 58(12), 3526–3537 (2010)CrossRefGoogle Scholar
  7. 7.
    Khasgiwale, R.S., Adyanthaya, R.U., Engels, D.W.: Extracting information from tag collisions. In: IEEE international conference on RFID, vol. 2009, pp. 131–138. IEEE (2009)Google Scholar
  8. 8.
    Kang, L., Wu, K., Zhang, J., Tan, H., Ni, L.: DDC: a novel scheme to directly decode the collisions in UHF RFID systems. IEEE Trans. Parallel Distrib. Syst. 23(2), 263–270 (2011)CrossRefGoogle Scholar
  9. 9.
    Nabeel, M., Najam, A.I., Duroc, Y., Rasool, F.: Multi-tone carrier technique for signal recovery from collisions in UHF RFID with multiple acknowledgments in a slot. In: 2013 IEEE 9th International Conference on Emerging Technologies (ICET), pp. 1–5. IEEE (2013)Google Scholar
  10. 10.
    Yihong, C., Quanyuan, F., Ma, Z., Liu, T.: Multiple-bits-slot reservation aloha protocol for tag identification. IEEE Trans. Consum. Electr. 59(1), 93–100 (2013)CrossRefGoogle Scholar
  11. 11.
    Jabeen, T., Ali, Z., Khan, W.U., Jameel, F., Khan, I., Sidhu, G.A.S., Choi, B.J.: Joint power allocation and link selection for multi-carrier buffer aided relay network. Electronics 8(6), 686 (2019)CrossRefGoogle Scholar
  12. 12.
    ElHalawany, B.M., Jameel, F., Da Costa, D.B., Dias, U.S., Wu, K.: Performance analysis of downlink NOMA systems over \(\kappa \)-\(\mu \) shadowed fading channels. IEEE Trans. Veh. Technol. 69(1), 1046-1050, Jan. (2020). doi:  https://doi.org/10.1109/TVT.2019.2953109.
  13. 13.
    Jameel, F., Kumar, S., Chang, Z., Hamalainan, T., Ristaniemi, T.: Operator revenue analysis for device-to-device communications overlaying cellular network. In: 2018 IEEE Conference on Standards for Communications and Networking (CSCN), pp. 1–6. IEEE (2018)Google Scholar
  14. 14.
    Jameel, F., Khan, F., Haider, M.A.A., Haq, A.U.: On physical layer security of two way energy harvesting relays. In: 2017 International Conference on Frontiers of Information Technology (FIT), pp. 35–40. IEEE (2017)Google Scholar
  15. 15.
    Jameel, F., Haider, M.A.A., Butt, A.A. et al.: High SNR analysis of inter-body interference in body area networks. In: 2017 International Conference on Communication, Computing and Digital Systems (C-CODE), pp. 117–121. IEEE (2017)Google Scholar
  16. 16.
    Jameel, F., Haider, M.A.A., Butt, A.A.: A technical review of simultaneous wireless information and power transfer (SWIPT). In: International Symposium on Recent Advances in Electrical Engineering (RAEE), vol. 2017, pp. 1–6. IEEE (2017)Google Scholar
  17. 17.
    Quevedo, J., Corujo, D., Aguiar, R.: A case for ICN usage in IoT environments. In: 2014 IEEE Global Communications Conference (GLOBECOM), pp. 2770–2775. IEEE (2014)Google Scholar
  18. 18.
    Trossen, D., Parisis, G.: D2. 33–Architecture definition, component descriptions, and requirements. Deliverable, PSIRP 7th FP EU-funded project. Feb, 11 (2009)Google Scholar
  19. 19.
    Khan, W.U., Jameel, F., Ristaniemi, T., Elhalawany, B.M., Liu, J.: Allocation, efficient power, for multi-cell uplink NOMA network. In: IEEE 89th Vehicular Technology Conference (VTC2019-Spring), vol. 2019, pp. 1–5. IEEE (2019)Google Scholar
  20. 20.
    Bakht, K., Jameel, F., Ali, Z., Khan, W.U., Khan, I., Sidhu, S., Ahmad, G., Lee, J.W.: Power allocation and user assignment scheme for beyond 5G heterogeneous networks. Wirel. Commun. Mob. Comput. (2019)Google Scholar
  21. 21.
    Khan, W.U., Jameel, F., Ristaniemi, T., Khan, S., Sidhu, G.A.S., Liu, J.: Joint spectral and energy efficiency optimization for downlink NOMA networks. IEEE Trans. Cogn. Commun. Netw 1–1 Oct (2019).  https://doi.org/10.1109/TCCN.2019.2945802
  22. 22.
    Jameel, F., Haider, M.A.A., Butt A.A. et al.: Robust localization in wireless sensor networks using RSSI. In: 2017 13th International Conference on Emerging Technologies (ICET), pp. 1–6. IEEE (2017)Google Scholar
  23. 23.
    Jameel, F., Javed, M.A., Jayakody, D.N.K.: Physical layer security of energy harvesting machine-to-machine communication system. In: 5G Enabled Secure Wireless Networks, pp. 123–153. Springer (2019)Google Scholar
  24. 24.
    Zhang, Y., Raychadhuri, D., Ravindran, R., Wang, G.: ICN based architecture for IoT, IRTF contribution, Oct. (2013)Google Scholar
  25. 25.
    Arachchilage, D.N.K.J., Jameel, F.. Qaraqe, M.: Secure RF energy harvesting scheme for future wireless networks. In: Qatar Foundation Annual Research Conference Proceedings, vol. 2018, no. 3, p. ICTPP179. Hamad bin Khalifa University Press (HBKU Press) (2018)Google Scholar
  26. 26.
    Jameel, F., Javed, M.A., Jayakody, D.N., Hassan, S.A.: On secrecy performance of industrial Internet of Things. Internet Technol. Lett. 1(2), e32 (2018)CrossRefGoogle Scholar
  27. 27.
    Stouffer, K., Falco, J., Scarfone, K.: Guide to industrial control systems (ICS) security. NIST Spec. Publ. 800(82), 16–16 (2011)Google Scholar
  28. 28.
    Ahlgren, B. Dannewitz, C., Imbrenda C., Kutscher, D., Ohlman, B.: A survey of information-centric networking. IEEE Commun. Mag. 50(7)Google Scholar
  29. 29.
    Amadeo, M., Campolo, C., Quevedo, J., Corujo, D., Molinaro, A., Iera, A., Aguiar, R.L., Vasilakos, A.V.: Information-centric networking for the Internet of Things: challenges and opportunities. IEEE Netw. 30(2), 92–100 (2016)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2021

Authors and Affiliations

  • Furqan Jameel
    • 1
    Email author
  • Muhammad Nabeel
    • 2
  • Wali Ullah Khan
    • 3
  1. 1.Department of Communications and NetworkingAalto UniversityEspooFinland
  2. 2.Heinz Nixdorf Institute and Department of Computer SciencePaderborn UniversityPaderbornGermany
  3. 3.School of Information Science and EngineeringShandong UniversityQingdaoChina

Personalised recommendations