2012
DOI: 10.1145/2377677.2377685
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and reliable low-power backscatter networks

Abstract: -There is a long-standing vision of embedding backscatter nodes like RFIDs into everyday objects to build ultralow power ubiquitous networks. A major problem that has challenged this vision is that backscatter communication is neither reliable nor efficient. Backscatter nodes cannot sense each other, and hence tend to suffer from colliding transmissions. Further, they are ineffective at adapting the bit rate to channel conditions, and thus miss opportunities to increase throughput, or transmit above capacity c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

1
96
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 104 publications
(100 citation statements)
references
References 33 publications
1
96
0
Order By: Relevance
“…Generally, the existing RFID tag identification protocols can be classified into two categories [10,11]: ALOHA-based protocols [27][28][29][30] and tree-based protocols [19,31]. In ALOHA-based protocols, on average a tag needs to transmit its ID e times to the reader before being successfully identified [10,27], where e is the base of natural logarithm whose value is approximately equal to 2.72.…”
Section: Related Workmentioning
confidence: 99%
“…Generally, the existing RFID tag identification protocols can be classified into two categories [10,11]: ALOHA-based protocols [27][28][29][30] and tree-based protocols [19,31]. In ALOHA-based protocols, on average a tag needs to transmit its ID e times to the reader before being successfully identified [10,27], where e is the base of natural logarithm whose value is approximately equal to 2.72.…”
Section: Related Workmentioning
confidence: 99%
“…This bears several advantages over FSA-based schemes, as reported in, e.g., [9,14]. In particular, CS enables a quicker identification and provides an increased noise robustness.…”
Section: Introductionmentioning
confidence: 96%
“…The compressed sensing (CS)-based identification protocols [9][10][11][12][13][14], on the other hand, cope with simultaneously responding tags and exploit collisions. This bears several advantages over FSA-based schemes, as reported in, e.g., [9,14].…”
Section: Introductionmentioning
confidence: 99%
“…2) Since the backscattered sensor signal changes slowly and the low sensor data rate is mostly 10 bps order [21], it can reduce the power consumption of the sensor nodes and increase the transmission distance.…”
Section: Introductionmentioning
confidence: 99%