2018
DOI: 10.1186/s13638-018-1188-0
|View full text |Cite
|
Sign up to set email alerts
|

Coherent query scheme for wireless backscatter communication systems with single tag

Abstract: An un-coded multi-transmitter query scheme is introduced for wireless backscatter communication systems in which M transmitters and N receivers are used for single-tag connectivity (M × 1 × N). The main idea is to harden the wireless communication channel with a tag device for high data rate readings. The proposed method is designed for multipath fading channels in which the backscatter channel is a multiplicative Rayleigh. A coherent transmit query scheme is used to increase the tag-reflected signals and simu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 27 publications
(27 reference statements)
0
5
0
Order By: Relevance
“…neighboring nodes; consequently, they lack information and scheduling for signal transmission [35]. In this manner, all nodes transmit data simultaneously, causing interference between the backscattered signals of different nodes, ultimately degrading the quality of the received signal [36]. c) Information Confidentiality: BC system utilizes RF signals for transmission, and these RF signals are typically vulnerable to eavesdropper attacks.…”
Section: Preliminaries Of Backscatter Communications a Overview Of Ba...mentioning
confidence: 99%
“…neighboring nodes; consequently, they lack information and scheduling for signal transmission [35]. In this manner, all nodes transmit data simultaneously, causing interference between the backscattered signals of different nodes, ultimately degrading the quality of the received signal [36]. c) Information Confidentiality: BC system utilizes RF signals for transmission, and these RF signals are typically vulnerable to eavesdropper attacks.…”
Section: Preliminaries Of Backscatter Communications a Overview Of Ba...mentioning
confidence: 99%
“…The transmitting nodes cannot receive feedback from neighboring nodes; consequently, they lack information and scheduling for signal transmission [38]. In this manner, all nodes transmit data simultaneously, causing interference between the backscattered signals of different nodes, ultimately degrading the quality of the received signal [39]. c) Information Confidentiality: BC system utilizes RF signals for transmission, and these RF signals are typically vulnerable to eavesdropper attacks.…”
Section: Preliminaries Of Backscatter Communications a Overview Of Ba...mentioning
confidence: 99%
“…Comparison of the performance of various types of basic modulation techniques is carried out in various studies to see the performance of BER, Eye diagram, and constellation diagram respectively on additive white Gaussian noise (AWGN), Rayleigh and Rician channels using MATLAB Simulink, graphical user interface (GUI), and BER tool on OFDM systems, code division multiple access (CDMA) to optical systems. The goal is to see the efforts to suppress inter symbol interference (ISI) and/or multipath fading with the simulation [6]- [13]. Performance comparison of optical fiber is found in [14], [15].…”
Section:  Issn: 1693-6930mentioning
confidence: 99%