SpringerOpen Newsletter

Receive periodic news and updates relating to SpringerOpen.

Open Access Research

On the performance of MIMO RFID backscattering channels

Chen He1*, Xun Chen1, Zhen Jane Wang1 and Weifeng Su2

Author Affiliations

1 Department of Electrical and Computer Engineering, University of British Columbia, Vancouver, Canada

2 Department of Electrical Engineering, State University of New York (SUNY) at Buffalo, Buffalo, NY, USA

For all author emails, please log on.

EURASIP Journal on Wireless Communications and Networking 2012, 2012:357  doi:10.1186/1687-1499-2012-357


The electronic version of this article is the complete one and can be found online at: http://jwcn.eurasipjournals.com/content/2012/1/357


Received:25 August 2012
Accepted:7 November 2012
Published:29 November 2012

© 2012 He et al.; licensee Springer.

This is an Open Access article distributed under the terms of the Creative Commons Attribution License ( http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

In order to increase the reliability of data transmission, using multiple antennas in radio frequency identification (RFID) systems has been investigated by researchers, mainly through measurements and simulations. The multiple-input multiple-output (MIMO) RFID backscattering channel exhibits a special type of cascaded structure rather than that of other better-studied cascaded channels such as the keyhole fading and the double scattering fading. In this article, we analytically study the bit error rate performances of the MIMO RFID channel under two transmission schemes, the identical signaling transmission scheme and the orthogonal space–time coding scheme (OSTBC). We show that the diversity order of the MIMO RFID channel is min(N,L) under the identical transmission scheme, and the diversity order is L under the OSTBC scheme, where L is the number of tag antennas and N is the number of reader receiving antennas. A performance bottleneck is also observed in the MIMO RFID channel. Our results can provide useful guidance on designing an RFID system with multiple antennas.

Keywords:
MIMO systems; RFID; Backscattering channel; Cascaded structures; STBC; Diversity gain

Introduction

Radio frequency identification (RFID) is a wireless communication technology that allows an object to be identified remotely, which has many applications including inventory checking, access control, transport payment, electronic vehicle registration, product tracking, and secure automobile keys [1]. A typical RFID system includes major components such as readers (also known as interrogators) and tags (also known as labels), as well as RFID software or RFID middleware [2]. An RFID tag is a small electronic device which has a unique ID. The tags can be categorized into active and passive tags. An active tag has an RF transmitter and utilizes its internal battery to continuously power its RF communication circuitry, while a passive tag does not have an RF transmitter and it modulates a carrier signal received from an interrogator by its antenna load impedance. Usually, a passive tag does not have its own battery and powers its circuitry by using the carrier signal energy, but it can be battery assisted. For passive RF tags, the range increase caused by multiple RF tag antennas will be limited by the RF tag chip sensitivity [3]. The sensitivity is strongly dependent upon the design of the tag’s RF circuitry [4]. During the last couples of years, it was shown that the improved circuitry design [3,5,6] can decrease this limitation.

Most RFID applications deployed today use passive tags because they usually do not require internal batteries and have longer life expectancy. Measurements in [7,8] showed that the RFID channel in passive systems could be modeled as a cascaded channel with a forward channel and a backscattering channel, and both the sub-channels are Rayleigh distributed in rich scattering environments [9]. This cascaded channel fades deeper than the Rayleigh channel and hence can reduce the data transmission reliability.

To allow reliable data transmission, researchers [7,9-11] investigated multiple-input multiple-output (MIMO) settings in the RFID backscattering channel and both bit error rate (BER) and reading range improvements were observed. The advantages of the MIMO RFID technology over the single-antenna RFID allow many potential applications in the areas of accurate tracking, identifications, since it can significantly increase the reliability and throughput. For instance, in [12], a tracking problem was investigated for RF tags with multiple antennas and experimental results showed improved accuracy. To achieve good performance, a sufficient separation between tag antennas is needed and hence a very high-frequency band is required for operations of RF tags with multiple antennas due to the small size of an RF tag. Fortunately, the unlicensed frequency band 5.8 GHz is available for backscatter radio applications. This above ultra-high frequency band has several potential advantages for backscatter radio systems such as increased antenna gain, reduced object attachment losses [13]. It has already been used in a passive backscatter radio system for monitoring [14]. To the best of the authors’ knowledge, the current studies about the performances of the MIMO RFID channel were mostly based on the measurements and/or Monte Carlo simulations. The main purpose of this study is to provide a fundamental, analytical study of the behavior of the MIMO RFID channel, and to provide useful guidances on the design of potential RFID systems with multiple antennas.

Channel model

Passive tag signaling model

In a passive RFID system, a tag antenna simply reflects the unmodulated wave sent from the reader transmitter, as illustrated in Figure 1. The ID information of the RF tag depends on the reflection coefficient Δ(t) of the tag antenna load. The general M × L × N dyadic backscattering channel for representing a MIMO passive channel was first described in [9]. This channel consists of M reader transmitter antennas (from which a query is sent and the energy is transmitted), L RF tag antennas, and N reader receiver antennas. The baseband representation of the received signals at time t can be expressed in a matrix form as [9]

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M1','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M1">View MathML</a>

(1)

thumbnailFigure 1. To read a passive RF tag, the RF reader transmitter broadcasts an unmodulated carrier signal, and then the RF tag conveys its information (e.g., the ID of the tag) to the reader by reflecting the unmodulated carrier signal back to the reader receiver using load modulation. The reflection coefficient Δ(t) of the tag antenna load, which actually represents the tag information, can be changed by switching the RF tag antenna load between different states [9].

where the M × 1 vector x(t) represents unmodulated waves (carrier signals) sent out from the reader transmitters, r(t) is an N × 1 vector of received signals at the reader receivers, and the N × 1 vector w(t) represents corresponding noises at the reader receivers. The matrices Hf(τf;t) of size L × M and Hb(τb;t) of size N × L represent the impulse responses of the forward and backscattering links, respectively. The signaling matrix of the tag, S(t) with size L × L, describes the time-varying modulation and coding of the carrier signals by the L-antenna RF tag. Based on the different tag circuit designs, S(t) can have several forms: One form is the identical signaling matrix [9]

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M2','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M2">View MathML</a>

(2)

where Δ(t) means the reflection coefficient of the RF tag load, and I means the L × L identity matrix. In this identical case, all antennas of the RF tag have the same reflection coefficient Δ(t). Another form is the diagonal signaling matrix [9]

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M3','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M3">View MathML</a>

(3)

where Δl(t) means the load reflection coefficient of the lth tag antenna at time t. In this case, the RF tag antennas have different load reflection coefficients. A diagonal signaling matrix with unequal load reflection coefficients may result from space–time-coded tag circuit designs, where the reflection coefficients of different tag antennas are pre-designed according to a certain space–time code.

We consider a general MIMO RFID channel [9] in which the tag is equipped with L antennas, and the reader is equipped with M transmitting antennas that send query signal to the tag and N receiving antennas that receive the signals from the tag, as shown in Figure 2. Since in a passive RFID system, the coding and modulation are done by the tag circuits and the reader transmitting antennas actually act as charging devices by sending (identical) unmodulated waves to the tag, also since the channel gains from reader transmitting antennas to a tag antenna are complex Gaussian distributed, by normalizing the transmitting energy to unity, the statistical property of using a single and multiple reader transmitting antennas are exactly the same. Therefore, we focus on the 1 × N × L channel in the rest part of the article and we call it the N × L channel for simplicity. For simplicity of presentation, we also ignore the time index t in the model from now on. Now, considering that x are unmodulated waves, let s = (s1,…,sL)T = (Δ1,…,ΔL)T denote the L transmission symbols simultaneously transmitted from L tag antennas, we can simply express the received signal vector at a particular time point as

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M4','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M4">View MathML</a>

(4)

thumbnailFigure 2. An illustration of the MIMO RFID channel signaling scheme. In a passive RFID system, the coding and modulation are done by the tag circuits at the tag side and the reader transmitting antennas actually act as charging devices. The modulation and coding in the middle way of a cascaded channels make the RFID channel different from other forms of cascaded channels.

where the vector r = (r1,…,rN)T are the received signals, and each entry of the noise vector w = (w1,…,wN)T is assumed to be independent and identical distributed (i.i.d.) Gaussian with zero mean and unit variance. The channel matrix H of the N × L channel, which is with size N × L, can be expressed as

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M5','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M5">View MathML</a>

(5)

where <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M6','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M6">View MathML</a>’s (l = 1,…,L) represent forward channels of the N × L channel, <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M7','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M7">View MathML</a>’s (l = 1,…,L, n = 1,…,N) represent backscattering channels, and <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M8','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M8">View MathML</a>’s and <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M9','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M9">View MathML</a>’s are independent complex Gaussian random variables. The total channel gain at the nth receiving antenna is <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M10','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M10">View MathML</a>. Note that the channel gains hn’s, for n = 1,2,…,N, contain the common terms <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M11','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M11">View MathML</a>. It implies that the channel gains at different receiving branches at the reader are not statistically independent with each other.

Difference between the RFID channel and Other types of cascaded channels

The cascaded Rayleigh channel is also found in the propagation scenarios such as the keyhole propagation [15-17], the double scattering propagation [18] and the amplify-and-forward (AF) relay cooperative communication systems. As shown in Figure 2 we would like to emphasize that the MIMO RFID channel exhibits a different type of cascaded structure rather than that of the keyhole, double scattering, and AF channels due to the modulation and coding that are done at the tag side (middle way of a cascaded channel) rather than the reader transmission side.

For the keyhole channel, the channel matrix is given by [15,16] as

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M12','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M12">View MathML</a>

(6)

It is clear that here the rank of the above matrix Hkeyhole is 1. Comparing with the RFID channel matrix in Equation (5) which is generally full rank, we clearly note that the two channels are different in structure, although for both channels each entry of the matrices is double Rayleigh distributed. Their different channel statistics lead to different performances and diversity gains. The structure of the MIMO RFID channel is also different from that of the double scattering channel in [18], and we will see later in the result part that their performances and diversity gains are different.

Another type of cascaded channel is the AF cooperative channel. For only identical signaling scheme, theoretically it may be possible for an AF model to be reduced to the MIMO RFID model if the AF channel contains L relays and has N receiving antennas. A recently published work in [17] discusses the performance of an AF channel with such antenna setting, which is the most similar model to the MIMO RFID channel by far. However, we cannot generalize their results to infer the performance of the MIMO RFID channel. Because in [17], the model is based on a specific transmission scheme in which the relays intentionally forward messages to the destination at different time slots, and the forwarded messages are buffered at the destination, matched filtered, and then combined using maximal ratio combining (MRC). In the MIMO RFID channel, whatever the signaling schemes are used, the signals from the tag antennas (analogy to the relays) arrive at the reader (analogy to the destination) at the same time slot, and this makes the two models significantly different. We will also see differences of these two models from their performances and diversity orders. Other existing references about AF channels either do not consider multiple relays or do not consider multiple receiving antennas and thus cannot be a generalized version of the MIMO RFID channel. Some previous articles consider a single relay with multiple antennas and the model looks similar. However, the model is indeed different (e.g., the relay uses different antennas for transmitting and receiving).

The intention of this study is to analytically derive the performances of the MIMO RFID channel, a specific type of cascaded channel which exists in passive MIMO RFID systems.

Performance analysis of MIMO RFID channel under identical signaling scheme

In this section, we analytically study BER performances and diversity gains of the N × L RFID channel when the identical signaling scheme is employed.

Under the identical signaling scheme, the system employs the identical signaling matrix in Equation (2) in which each tag antenna transmits the same symbol at time t. From the channel matrix in Equation (5), the channel power at the nth receiving branch, also referred as the instantaneous signal-to-noise ratio (SNR) at the nth receiving antenna, can be given by

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M13','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M13">View MathML</a>

(7)

where <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M14','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M14">View MathML</a> means the average SNR. Each of these instantaneous SNRs follows the following distribution [9]

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M15','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M15">View MathML</a>

(8)

where KL−1(·) denotes the modified Bessel function of the second kind. Using the asymptotic approximations of the Bessel function [19], one can obtain the approximation of the PDF for high SNR (e.g., as <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M16','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M16">View MathML</a>) as,

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M17','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M17">View MathML</a>

(9)

To derive the BER performance of the N × L MIMO RFID channel where N > 1, since the N receiving branches at the reader are not statistically independent as we mentioned earlier, we cannot use the above distribution and its approximation to directly evaluate the performance of the MIMO channel by applying a widely used method as in [20,21] which assumes independency of receiving branches. Alternatively, we consider evaluating the BER using the conditional probability approach. We will see later, to analytically study the BER performance, we first need to investigate the properties of GN,L(·), a function defined by a multi-variate integration. The function GN,L(·) is defined as

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M18','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M18">View MathML</a>

(10)

Here αl is the squared magnitude of the channel gain of the lth receiving branch, N and L are the index of the function <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M19','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M19">View MathML</a>, and we define <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M20','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M20">View MathML</a>, where <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M21','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M21">View MathML</a> is the average SNR and g is a constant which is modulation dependent. For the coherent transmission case, the function <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M22','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M22">View MathML</a> is the moment generating function (MGF) of the MIMO RFID channel with L tag antennas and N receiving antennas. For the non-coherent transmission case, the form of GN,L(·) is required in deriving the BER performance. The function GN,L(·) defined in Equation (10) has the following recursive and asymptotic properties

Proposition 1

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M23','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M23">View MathML</a>

(11)

Proposition 2

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M24','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M24">View MathML</a>

(12)

Proposition 3

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M25','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M25">View MathML</a>

(13)

Proposition 4

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M26','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M26">View MathML</a>

(14)

In the above propositions, EN(·) and EL(·) are the exponential integrals defined as <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M27','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M27">View MathML</a> and <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M28','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M28">View MathML</a>[22], where N and L are positive integers. The proofs of these propositions can be found in Appendix. With the above properties, we are now ready to derive the exact and asymptotic BER performances and study how the MIMO RFID backscattering channel behaves.

Non-coherent Case

We first investigate the non-coherent transmission case, which applies non-coherent equal gain combining (EGC) at the reader receiver side.

The channel gain at the nth receiving branch of the reader is given by <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M29','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M29">View MathML</a>. When fixing the forward channel gains <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M30','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M30">View MathML</a>’s, the channel gain hn is a linear combination of i.i.d. complex Gaussian random variables, hence the conditional distribution of hn on <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M31','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M31">View MathML</a>’s is a complex Gaussian distribution with variance <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M32','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M32">View MathML</a>. Therefore, by fixing <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M33','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M33">View MathML</a>’s, the N × L channel can be viewed as a single-input multiple-output (SIMO) channel in which each receiving branch is Rayleigh distributed and has power (or variance) <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M34','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M34">View MathML</a>. Consequently using the result of the SIMO Rayleigh channel [23], we can have the conditional (on <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M35','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M35">View MathML</a>’s) BER for the N × L RFID channel using non-coherent EGC as

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M36','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M36">View MathML</a>

(15)

where <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M37','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M37">View MathML</a> and g is a constant which is modulation dependent [24]. Note that <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M38','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M38">View MathML</a>, then we have

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M39','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M39">View MathML</a>

(16)

Averaging the conditional BER over αl’s (where <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M40','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M40">View MathML</a>) yields the BER for the N × L RFID channel as

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M41','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M41">View MathML</a>

(17)

The closed-form of the above exact BER can be computed recursively using Proposition 3 with the initial knowledge <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M42','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M42">View MathML</a> and <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M43','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M43">View MathML</a>. Table 1 shows a few examples under some antenna settings.

Table 1. Non-coherent case of the identical signaling scheme: closed-form BER expressions for the N × L RFID channel (Equation 17)

While the closed-form BER can be obtained, it involves complicated recursive forms and the behavior of the studied N × L RFID channel is not easy to analyze, and we need to investigate an asymptotic form. Using Proposition 4, we can obtain an asymptotic BER of Equation (17) as

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M50','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M50">View MathML</a>

(18)

We can see that the above asymptotic BER form depends on the relation of the values of L and N. Figure 3 shows the BER performances of the N × L RFID channels when employing the binary frequency-shift keying (FSK) with EGC.

thumbnailFigure 3. BER performances (in Equations 17 and 18) of the MIMO RFID channel using non-coherent identical signaling (BPSK with EGC).

The asymptotic diversity order da can be obtained as

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M51','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M51">View MathML</a>

(19)

It means that the asymptotic diversity order of the N × L RFID channel under non-coherent transmission schemes is determined by the smaller value of N and L. For the case of L = N, compared with the case of L N, it requires a higher SNR to achieve the diversity order N, because of the logarithm function in the numerator in Equation (18) when N = L. This property means that even the diversity orders are the same the BER performances of the settings with N = L + 1 or L = N + 1 are remarkably better than the performance of the setting with N = L. The BER performance improvements from N = L + 1 to N = L + 2, or from L = N + 1 to L = N + 2, is not significant. These observations generalize the findings about the MISO case in [25].

Coherent case

We now look at the coherent detection case. We assume that the reader knows the channel state information (CSI) and MRC is applied at the reader receiver side.

Similar to our previous derivation, if we fix the forward gains <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M52','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M52">View MathML</a>’s, the MIMO RFID channel can be viewed as a SIMO Rayleigh channel in which the receiving branches are independent and have power (or variance) <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M53','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M53">View MathML</a>. Recall that the MGF for a Rayleigh fading channel is given by <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M54','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M54">View MathML</a>[20]; therefore, the conditional MGF of the N×LRFID backscattering channel is

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M55','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M55">View MathML</a>

(20)

Integrating <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M56','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M56">View MathML</a> over αl’s (where <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M57','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M57">View MathML</a>) leads to the MGF for non-independent N receiving branches as

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M58','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M58">View MathML</a>

(21)

where <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M59','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M59">View MathML</a> and GN,L(·) is defined as in Equation (10). Using the moment generating approach in [20], the BER of the N × L RFID channel for the coherent case can be expressed as

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M60','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M60">View MathML</a>

(22)

Table 2 shows a few examples of the closed form of the MGF of the channel with coherent transmission scheme. Since the closed form of <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M61','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M61">View MathML</a> can be obtained recursively using Propositions 1 to 4, the BER <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M62','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M62">View MathML</a> can be computed through the single integration in Equation (22) respective to θ. To have more insights on how the BER of the N × L RFID channel behaves, we also derive an asymptotic form of this BER expression. Using Proposition 4, the asymptotic BER for Equation (22) can be expressed as

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M63','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M63">View MathML</a>

(23)

Table 2. Coherent case of the identical signaling scheme: MGFs GN,L(θ) for the N × L RFID channel (Equation 21)

where <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M68','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M68">View MathML</a> and <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M69','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M69">View MathML</a>. Here Γ(·) means the Gamma function. Figure 4 plots the BER curves of the N × L RFID channels when employing BPSK with MRC at the reader receiver antennas.

thumbnailFigure 4. BER performances (in Equations 22 and 23) of the MIMO RFID channel using coherent identical signaling (BPSK with MRC) under perfect channel estimation.

For the N × L RFID channel under the coherent case, the asymptotic diversity order can be given by

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M70','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M70">View MathML</a>

(24)

As we can see that the asymptotic diversity order is still min(N,L) in the coherent transmission case, and the BER behavior is similar to that of the non-coherent case.

Performance analysis of MIMO RFID channel under OSTBC scheme

In this section, we analytically study BER performances and diversity gains of the N × L RFID channel when the orthogonal space-time coding scheme (OSTBC) is employed. OSTBC is one of the most attractive MIMO schemes with a very simple decoding process based on linear combining at the receiver. Because of its orthogonality, OSTBC achieves full diversity LN for L transmission antennas and N receiving antennas in i.i.d. MIMO Rayleigh fading channels [26,27]. In this section, we investigate the error rate performance of the MIMO RFID channel using the OSTBC scheme. For MIMO RFID systems, OSTBC can be implemented by applying the signaling matrix in Equation (3) for the tag antennas. We assume that CSI is known by the reader and the channel is quasi-static.

Because of its orthogonality property, OSTBC can transform from the MIMO fading channel

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M71','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M71">View MathML</a>

(25)

to the following parallel SISO channels [28]

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M72','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M72">View MathML</a>

(26)

where

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M73','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M73">View MathML</a>

(27)

is the Frobenius norm of H, <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M74','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M74">View MathML</a> is the Q incoming symbols and the entries of <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M75','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M75">View MathML</a> are i.i.d. Complex Gaussian random variables with zero mean and unit variance. Similarly, the entries of <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M76','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M76">View MathML</a> are the receiving symbols and can be detected based on a simple maximum likelihood method. The channel gain is divided by L because the transmission power should be normalized to unity. Since in real passive RFID signal transmissions, the transmission energy is from the reader and is proportional to the number of tag antennas when the reader querying energy is fixed, we instead use the following model

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M77','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M77">View MathML</a>

(28)

in which the transmission power is not normalized to unity. Let Eb denote the average energy per bit and Es denote the average energy per symbol then Es = Eb log2 K where K is the size of the signal constellation. The instantaneous SNR per symbol is therefore given by

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M78','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M78">View MathML</a>

(29)

where R means the symbol rate and we define <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M79','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M79">View MathML</a>.

Since evaluating the density of ||H||2 directly is difficult, we consider the conditional probability approach as in previous derivations. Define <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M80','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M80">View MathML</a>, where <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M81','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M81">View MathML</a> and <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M82','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M82">View MathML</a>. It is easy to check that |Hl|’s are i.i.d. random variables. Because <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M83','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M83">View MathML</a>, for the SER analysis we can view the N × LRFID channel which uses OSTBC as a virtual SIMO system with L receiving branches in which MRC is applied at the receiver side. For the lth receiving branch of this SIMO system, the squared magnitude of the channel gain is <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M84','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M84">View MathML</a>, where αl is the channel power at the lth receiving branch. We define the MGF of |Hl|2 as <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M85','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M85">View MathML</a>, where <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M86','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M86">View MathML</a>, then the BER can be evaluated via

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M87','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M87">View MathML</a>

(30)

Now we need to derive <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M88','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M88">View MathML</a>. Since the conditional channel gain <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M89','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M89">View MathML</a> given αl can be viewed as the channel gain of another virtual SIMO system (i.e., N Rayleigh distributed receiving branches with gains <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M90','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M90">View MathML</a>’s, n = 1,…,N) in which MRC is applied at the receiver side, consequently the MGF of |Hl| can be derived by averaging the conditional MGF <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M91','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M91">View MathML</a> over αl, with <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M92','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M92">View MathML</a> being the MGF of an N-branches Rayleigh channel [20]

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M93','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M93">View MathML</a>

(31)

Substituting <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M94','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M94">View MathML</a> into Equation (30) yields the BER expression of the N × L RFID channel for the OSTBC scheme

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M95','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M95">View MathML</a>

(32)

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M96','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M96">View MathML</a>

(33)

Figure 5 shows the SER/BER curves of Alamouti’s code with BPSK modulation in the N × L MIMO RFID channel (the SER and BER are exactly same for Alamouti’s code using BPSK).

thumbnailFigure 5. The SER/BER performances (in Equations 32 and 33) of the Alamouti’s code with BPSK modulation and MRC in the MIMO RFID channel under perfect channel estimation.

Accordingly, for the N × L RFID channel with the OSTBC scheme, the asymptotic diversity order can be derived as

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M97','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M97">View MathML</a>

(34)

From Equation (34) we can see that here the achievable diversity order is L (the number of tag antennas), and N (the number of reader receiving antennas) does not affect the diversity gain. However, we note that there is a significant BER improvement from N = 1 to N > 1 due to the logarithm function in Equation (33) when N = 1. This property is very different from that of traditional one-way channels in [27,29] and even very different from independent double Rayleigh channels [30], as we will see in comparisons in Table 3.

Table 3. Diversity order comparisons between different cascaded structures

Results and discussions

In this section, we compare the error rate performances of the MIMO RFID backscattering channel with other forms of cascaded channels: the keyhole channel, the double scattering channel, and the independent double Rayleigh channel. We also compare the identical signaling scheme and the OSTBC scheme in the MIMO RFID channel and discuss how much improvement can be achieved by the OSTBC scheme under different antennas settings.

The pair-wise error probability for another cascaded channel which has independent receiving branches and the channel matrix of the following form

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M98','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M98">View MathML</a>

(35)

was discussed in [30] for space–time trellis code; however, the performance of the identical signal scheme of this channel has not been studied yet. In this section, we give out its BER performance for comparison purposes. For non-coherent identical signaling transmission with EGC, the exact BER is given by

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M99','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M99">View MathML</a>

(36)

where U(abx) is the confluent hypergeometric function, and the corresponding asymptotic BER expression

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M100','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M100">View MathML</a>

(37)

For coherent identical signaling transmission with MRC under perfect channel estimation, the exact and asymptotic BERs are given by

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M101','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M101">View MathML</a>

(38)

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M102','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M102">View MathML</a>

(39)

The derivations of the above results are given in Appendix.

Accordingly, we can show that the diversity order under both transmission schemes is

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M103','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M103">View MathML</a>

(40)

Figure 6 and Figure 7 show the BER curve for the independent double Rayleigh channel with non-coherent and coherent transmission schemes, respectively. An interesting finding is that, for the coherent transmission scheme, the result of the identical signaling scheme for the MIMO double Rayleigh channel with independent branches is similar to that of the MIMO RFID channel under the OSTBC scheme, except the roles of N and L are switched. The diversity order is given as N regardless of L, but a significant BER performance improvement is observed from L = 1 to L = 2.

thumbnailFigure 6. BER performances (in Equations 36 and 37) of the MIMO independent double Rayleigh channel using non-coherent identical signaling (FSK with EGC).

thumbnailFigure 7. BER performances (in Equations 38 and 39) of the MIMO independent double Rayleigh channel using non-coherent identical signaling (BPSK with MRC) under perfect channel estimation.

Diversity comparison and performance bottleneck

Under the identical signaling scheme, one interesting observation is that the diversity order of the studied MIMO RFID channel is min(N,L), as shown in Equation (24). Equation (23) implies that if N L > 1, solely increasing the number of receiving antennas N does not enhance the BER performance significantly. Similarly, if L N > 1, solely increasing the number of tag antennas L does not enhance the BER performance significantly either. Here, we refer to this observation as the performance bottleneck. In contrast, for both the Rayleigh channel with independent receiving branches and the double Rayleigh channel with independent receiving branches, the diversity order is N, which means solely increasing the number of receiving antennas can significantly enhance the BER performance. Also there is a significant BER improvement from L = 1 to L = 2 for the double Rayleigh channel with independent receiving branches, as shown in Equation (39). It is worth mentioning that, for the AF cooperative channel in Equation (17), the diversity order is (L + N) [17].

Under the OSTBC scheme, the diversity order of the studied MIMO RFID backscattering channel is the number of tag antennas L, regardless of the number of the reader receiving antennas N, as shown in Equation (34). In contrast, for both the Rayleigh channel with independent receiving branches and the double Rayleigh channel with independent receiving branches, the diversity order is NL. The performance of the MIMO RFID channel is also significantly different from keyhole fading and double scattering fading. For the keyhole channel, the diversity order is min(N,L), and for the double scattering channel the diversity order is MLN/max(M,L,N).

Although the diversity order is always L for the MIMO RFID channel with OSTBC, a significant BER improvement can still be observed from N = 1 to N = 2, because of the logarithm function in the numerator of the BER expression in Equation (33) when N = 1. From N = 2 to N > 2, the BER improvement is not significant, meaning that increasing the number of receiving antennas helps little when N > 2. We consider this the performance bottleneck for the MIMO RFID backscattering channel under the OSTBC scheme. While for both Rayleigh channel with independent receiving branches and double Rayleigh channel with independent receiving branches, solely increasing the number of receiving or transmitting antennas can yield a higher diversity order and a significant BER performance improvement.

The above different behaviors of the MIMO RFID channel are due to the special structure of the MIMO RFID backscattering channel. All the above discussions are summarized in Table 3.

Performance improvement by employing OSTBC in RFID backscattering channel

In this section, we investigate how much performance enhancement can be brought by employing OSTBC in the studied MIMO RFID channel. Figure 8 compares the BER performances of Alamouti’s coding scheme and the identical signaling scheme in the N × L RFID channel, where the RF tag is equipped with 2 antennas (i.e., L = 2) and the number of reader receiving antennas varies from 1 to 3. A significant performance improvement (about 10 dB) is observed by Alamouti’s coding scheme for the setting N = 1. However, for the settings N = 2 and N = 3, the improvements by Alamouti’s scheme are not significant (i.e., 3 dB for N=2 and 1.5 dB for N = 3). This observation can be explained by the derived asymptotic BER expressions in Equations (24) and (34): Our analysis for the OSTBC scheme implies that for Alamouti’s code the achievable diversity gain is L (L = 2 in this example) for any N in the N × L RFID channel. Consequently for the settings with N L, Alamouti’s code yields the same diversity order as that of the identical signaling scheme in the N × L RFID channel, and the BER performance improvement is limited. In other words, when N L in a MIMO RFID system, OSTBC does not yield significant performance improvement over simpler signaling schemes.

thumbnailFigure 8. The BER performance comparison between Alamouti’s coding scheme and identical signaling scheme. A significant BER improvement by Alamouti’s code is observed for N = 1, while the improvement is much smaller when N ≥ 2. These properties can be explained by our analysis of the MIMO RFID channel under the OSTBC and identical signaling schemes.

Conclusion

In this article, we analyzed the performance of the MIMO RFID backscattering channel, a cascaded channel that has a special kind of structure. We observe several interesting properties of the channel from our analytical results. First, the diversity order is min(N,L) when employing the identical signaling scheme and the diversity order is L for the OSTBC signaling scheme. Second, the analytical results reveal that there is a performance bottleneck for the channel. More specifically, with the identical signaling scheme, when |N L| > 1 the BER performance enhancement is not significant by increasing the number of tag antennas or the number of receiving antennas alone. With the OSTBC signaling scheme, the SER performance enhancement is not significant when N > L. These properties of the MIMO RFID channel are significantly different from that of other types of cascaded channels such as keyhole and double scattering. The analytical results and observations presented in this article could provide a useful guidance for the design of RFID systems using multiple antennas.

Appendix

Proof of Proposition 1. Let <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M104','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M104">View MathML</a>, then

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M105','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M105">View MathML</a>

(41)

where <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M106','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M106">View MathML</a> and <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M107','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M107">View MathML</a> are the special functions called the exponential integral [22]. Now we have

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M108','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M108">View MathML</a>

(42)

The last step is obtained by the asymptotic property of the generalized exponential integral EL(·) [22].

Proof of Proposition 2.

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M109','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M109">View MathML</a>

(43)

where <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M110','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M110">View MathML</a>, and <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M111','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M111">View MathML</a>. The asymptotic expression is just like that in Proposition 2.

Proof for Proposition 3. Let <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M112','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M112">View MathML</a> and

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M113','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M113">View MathML</a>

(44)

where <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M114','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M114">View MathML</a> is the generalized exponential integral. Using the relation that <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M115','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M115">View MathML</a>[22] we can prove that

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M116','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M116">View MathML</a>

(45)

then

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M117','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M117">View MathML</a>

(46)

The last step is obtained by changing the index, i.e., k = Ni.

Proof of Proposition 4. Case 1: N > L We apply mathematical induction to prove this property. It is easy to show that GN,1 is valid for Equation (14), suppose for L = j the argument is valid and our goal is to show for L = j + 1 < N it is still valid. We have

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M118','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M118">View MathML</a>

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M119','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M119">View MathML</a>

(47)

Therefore, Equation (14) is valid for N > L.

Case 2: N = L For N = 1 and L = 1 it is easy to show Equation (14) is valid for N > L. Now we need to show that Equation (14) is still valid for N = L = j + 1.

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M120','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M120">View MathML</a>

(48)

Since for k < j, <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M121','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M121">View MathML</a> and for k = j<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M122','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M122">View MathML</a>, we have

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M123','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M123">View MathML</a>

(49)

Case 3: N < L A similar approach as that of Case 1 can be obtained for this case; therefore, we omit the details here.

Proof for independent double Rayleigh. For the non-coherent transmission scheme, assuming that the instantaneous SNRs for N independent receiving branches are γ1,…,γN, its BER expression with respective to the instantaneous SNRs can be expressed as

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M124','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M124">View MathML</a>

(50)

where <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M125','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M125">View MathML</a> and <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M126','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M126">View MathML</a>. Note that <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M127','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M127">View MathML</a>, where m ≜ [m1,…,mN], and <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M128','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M128">View MathML</a>; therefore, we have

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M129','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M129">View MathML</a>

(51)

Averaging the densities of γn according to Equation (8), we have the BER expression for the non-coherent transmission scheme as

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M130','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M130">View MathML</a>

(52)

where evaluation of the integral can be found in [22] and U(a,b,x) is the confluent hypergeometric function. For small values of x, the asymptotic expressions of U(a,b,x) are given by [19]

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M131','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M131">View MathML</a>

(53)

Therefore, for large value of <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M132','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M132">View MathML</a>, we can derive the following asymptotic BER expression

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M133','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M133">View MathML</a>

(54)

For the coherent transmission scheme, we apply the method introduced in [20]. For N independent receiving branches, the BER for coherent transmission can be expressed as

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M134','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M134">View MathML</a>

(55)

Here <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M135','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M135">View MathML</a>, where <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M136','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M136">View MathML</a> and fγ(·) means its density function. With <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M137','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M137">View MathML</a>, we have <a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M138','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M138">View MathML</a>. The BER for the identical signaling MIMO setting of L transmitting antennas and N receiving antennas is expressed as

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M139','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M139">View MathML</a>

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M140','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2012/1/357/mathml/M140">View MathML</a>

(56)

Competing interests

The authors declare that they have no competing interests.

Acknowledgements

This study was supported by the Natural Sciences and Engineering Research Council of Canada (NSERC) under STPGP 364962-08.

References

  1. R Want, An introduction to RFID technology. IEEE Pervasive Comput 13, 25–33 (2006)

  2. F Klaus, RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification (Wiley, Hoboken, NJ, 2003)

  3. P Nikitin, KVS Rao, Performance limitations of passive UHF RFID systems. IEEE Antennas and Propagation Society International Symposium (9–14 July 2006)

  4. GD Vita, G Iannaccone, Design criteria for the RF section of UHF and microwave passive RFID transponders. IEEE Trans. Microw. Theory Tech 53, 2978–2990 (2005)

  5. D Yeager, F Zhang, A Zarrasvand, BP Otis, A 9.2 uA gen 2 compatible UHF RFID sensing tag with -12 dBm sensitivity and 1.25 uVrms input-referred noise floor. ISSCC 2010 (San Francisco, USA, 7–11 Feb 2010)

  6. PV Nikitin, KS Rao, Gain measurement of antennas using RFID. IEEE International Symposium on Antennas and Propagation (3–8 July 2011)

  7. JD Griffin, GD Durgin, Multipath fading measurements for multi-antenna backscatter RFID at 5.8 GHz. IEEE Trans. Antennas Propagat 58, 3693–3700 (2010)

  8. D Kim, M Ingram, W Smith, Measurements of small-scale fading and path loss for long range RF tags. IEEE Trans. Antennas Propagat 51, 1740–1749 (2003). Publisher Full Text OpenURL

  9. JD Griffin, GD Durgin, Gains for RF tags using multiple antennas. IEEE Trans. Antennas Propagat 56, 563–570 (2008)

  10. JD Griffin, GD Durgin, Gains For RF tags using multiple antennas. IEEE Commun. Lett 11, 735–737 (2007)

  11. M Ingram, M Demirkol, D Kim, Transmit diversity and spatial multiplexing for RF links using modulated backscatter. International Symposium on Signals, Systems, and Electronics (Tokyo, Japan, 24–27 Jul 2001)

  12. S Sarkka, M Huusko, VV Viikari, K Jaakkola, Phase-based UHF RFID tracking with nonlinear Kalman filtering and smoothing. IEEE Sensors J 12, 904–910 (2012)

  13. JD Griffin, GD Durgin, Complete link budgets for backscatter radio and RFID systems. IEEE Antennas Propagat. Mag 51, 11–25 (2009)

  14. B Strassner, K Chang, Passive 5.8-GHz radio-frequency identification tag for monitoring oil drill pipe. IEEE Trans. Microwave Theory Tech 51, 356–363 (2003). Publisher Full Text OpenURL

  15. H Shin, JH Lee, Effect of keyholes on the symbol error rate of space-time block codes. IEEE Commun. Lett 7, 27–29 (2003)

  16. Y Gong, KB Letaief, On the error probability of orthogonal space-timeblock codes over keyhole MIMO channel. IEEE Trans. Wirel. Commun 6, 2402–2409 (2007)

  17. M Elkashlan, PL Yeoh, RHY Louie, I Collings, On the exact and asymptotic SER of receive diversity with multiple amplify-and-forward relays. IEEE Trans. Veh. Technol 59, 4602–4608 (2011)

  18. H Shin, MZ Win, MIMO diversity in the presence of double scattering. IEEE Trans. Inf. Theory 54, 2976–2996 (2008)

  19. M Abramowitz, IA Stegun, Handbook of Mathematical Functions (National Bureau of Standards, Washington, DC, 1972)

  20. M Simon, M Alouini, A unified approach to the performance analysis of digital communication over generalized fading channels. Proc. IEEE 86, 1860–1877 (1998). Publisher Full Text OpenURL

  21. DG Brennanr, Linear diversity combining techniques, Proc. IEEE 91, 331–356 (2003). Publisher Full Text OpenURL

  22. I Gradsheteyn, I Ryzhik, Table of Integrals, Series and Product (Academic Press, New York, 1994)

  23. J Proakis, Digital Communications (McGraw-Hill, New York, 2001)

  24. C Zhu, J Mietzner, R Schober, On the performance of non-coherent transmission schemes with equal-gain combining in generalized K-fading. IEEE Trans. Wirel. Commun 9, 1337–1349 (2010)

  25. C He, ZJ Wang, Closed-form BER analysis of non-coherent FSK in MISO double rayleigh fading/RFID channel. IEEE Commun. Lett 15, 848–850 (2011)

  26. SM Alamouti, A simple transmit diversity technique for wireless communications. IEEE J. Sel. Areas Commun 16, 1451–1458 (1998). Publisher Full Text OpenURL

  27. V Tarokh, H Jafarkhani, A Calderbank, Space-time block coding for wireless communications: performance results. IEEE J. Sel. Areas Commun 17, 451–460 (1999). Publisher Full Text OpenURL

  28. S Sandhu, A Paulraj, Space-time block codes: a capacity perspective. IEEE Commun. Lett 10, 384–386 (2000)

  29. V Tarokh, N Seshadri, A Calderbank, Space-time codes for high data rate wireless communication: performance criterion and code construction. IEEE Trans. Inf. Theory 44, 744–765 (1998). Publisher Full Text OpenURL

  30. M Uysal, Diversity analysis of space-time coding in cascaded Rayleigh fading channels. IEEE Commun. Lett 10, 165–167 (2006). Publisher Full Text OpenURL