2019
DOI: 10.1109/jiot.2018.2869015
|View full text |Cite
|
Sign up to set email alerts
|

Design and Analysis of a Distributed and Demand-Based Backscatter MAC Protocol for Internet of Things Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 26 publications
(16 citation statements)
references
References 17 publications
0
15
0
1
Order By: Relevance
“…The backscatter tags contends for the transmission together with the Wi-Fi station for a shared channel. Reference [184] further proposed a Distributed and Demand-Based (DDB) protocol for a heterogeneous network, where backscatter tags use the Wi-Fi signals to transmit information to the AP. Unlike [183], the authors considered the AP's demand for the information of backscatter device, and let the Wi-Fi device and backscatter device perform the distributed contention in a separate manner.…”
Section: B Multiple-access Schemes and Protocolsmentioning
confidence: 99%
“…The backscatter tags contends for the transmission together with the Wi-Fi station for a shared channel. Reference [184] further proposed a Distributed and Demand-Based (DDB) protocol for a heterogeneous network, where backscatter tags use the Wi-Fi signals to transmit information to the AP. Unlike [183], the authors considered the AP's demand for the information of backscatter device, and let the Wi-Fi device and backscatter device perform the distributed contention in a separate manner.…”
Section: B Multiple-access Schemes and Protocolsmentioning
confidence: 99%
“…However, to the best of our knowledge, there is still no multiple access protocol for dedicated use in Wi-Fi backscatter communications to address the collision problem from a link layer perspective. Note that the multiple access solutions proposed in [16][17][18] aims to reduce collisions between multiple backscatter tags in conventional or monostatic backscatter system (e.g., RFID system). Nevertheless, they are difficult to be a dedicated approach for bistatic Wi-Fi backscatter communication because of the difference in their system model.…”
Section: Related Workmentioning
confidence: 99%
“…Many studies have been conducted to efficiently support multiple access for backscatter systems using multiple backscatter tags from a network perspective. Ma et al proposed a carrier sense multiple access with collision avoidance (CSMA/CA)-based solution to reduce collisions in the backscatter system, where the backscatter tags compete with each other for channel access using a binary exponential backoff (BEB) algorithm [16]. However, the carrier sensing process in CSMA/CA may require more energy than the energy harvested from ambient signals; in this case, the backscatter tag cannot operate properly due to lack of energy.…”
Section: Introductionmentioning
confidence: 99%
“…With BSC, tags first harvest energy from ambient signals, then convey information by modulating and reflecting ambient sig-nals (instead of generating signals by themselves), while readers are dedicatedly designed to receive the reflected signals from tags. As a recent advance, WiFi-based BSC (WiFi-BSC) [8][9][10][11] has been proposed. With WiFi-BSC, tags may harvest energy and convey information by utilizing ubiquitous WiFi signals, while WiFi nodes with selfinterference cancellation capability (which is called WiFi reader) may receive the reflected signals from tags.…”
Section: Introductionmentioning
confidence: 99%
“…It is worth pointing out that the PLS of BSC is out of scope of this paper. Wireless Communications and Mobile Computing [11]. In this scheme, when having a demand for collecting data from tags, the full-duplex WiFi AP ceases all WiFi transmissions and sends a period of ambient signals, and tags contend and transmit data to the AP during this period.…”
Section: Introductionmentioning
confidence: 99%