{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T15:07:49Z","timestamp":1764688069634,"version":"3.37.3"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,11,16]],"date-time":"2023-11-16T00:00:00Z","timestamp":1700092800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,11,16]],"date-time":"2023-11-16T00:00:00Z","timestamp":1700092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072004; 61702011","62072004; 61702011"],"award-info":[{"award-number":["62072004; 61702011","62072004; 61702011"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Backscatter communication relies on passive reflections of the existing radio frequency (RF) signals, making it suitable for low-power and low-complexity communication in IoT applications. However, the performance of existing systems severely degrades in real-life environments, due to irregular \u201con\u201d and \u201coff\u201d states of ambient signals like WiFi, which are not controllable. In this paper, we propose a joint coding and framing scheme for the backscattering physical layer to fight against the off-state in the excitation signal. We first design transmission schemes including both the Reed-Solomon (RS) codes and the frame structure, to correct the burst error caused by the off states. In order to implement the codes at the resource-constrained tag, we design a look-up table for the encoding process. We prototype our system\u00a0NuWa that could efficiently backscatter with uncontrolled traffics generated randomly. We demonstrate that\u00a0NuWa could achieve a 1\u00a0Mbps transmission throughput when the tag is over 1\u00a0<jats:italic>m<\/jats:italic> away from the receiver in high traffic load and 150\u00a0kbps in low traffic load. Finally, we evaluate the throughput with respect to the distance change between the tag and the receiver, and 950\u00a0kbps is achieved at a distance of <jats:inline-formula><jats:alternatives><jats:tex-math>$$6\\,m$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mrow>\n                    <mml:mn>6<\/mml:mn>\n                    <mml:mspace\/>\n                    <mml:mi>m<\/mml:mi>\n                  <\/mml:mrow>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula>.<\/jats:p>","DOI":"10.1186\/s13677-023-00508-5","type":"journal-article","created":{"date-parts":[[2023,11,16]],"date-time":"2023-11-16T12:02:23Z","timestamp":1700136143000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["NuWa: off-state tolerant backscattering system with uncontrolled excitation traffics"],"prefix":"10.1186","volume":"12","author":[{"given":"Zhiyi","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xin","family":"He","sequence":"additional","affiliation":[]},{"given":"Guiping","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Weiwei","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Yujun","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Jianfeng","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Panlong","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,16]]},"reference":[{"key":"508_CR1","doi-asserted-by":"crossref","unstructured":"Talla V, Kellogg B, Ransford B, Naderiparizi S, Gollakota S, Smith JR (2015) Powering the next billion devices with Wi-Fi. In: Proc. of ACM CoNEXT, ACM, New York","DOI":"10.1145\/2716281.2836089"},{"key":"508_CR2","doi-asserted-by":"crossref","unstructured":"Liu V, Parks A, Talla V, Gollakota S, Wetherall D, Smith JR (2013) Ambient backscatter: Wireless communication out of thin air. In: Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM, ACM, New York, SIGCOMM \u201913, pp 39\u201350","DOI":"10.1145\/2486001.2486015"},{"issue":"11","key":"508_CR3","doi-asserted-by":"publisher","first-page":"2608","DOI":"10.1109\/TIM.2008.925019","volume":"57","author":"AP Sample","year":"2008","unstructured":"Sample AP, Yeager DJ, Powledge PS, Mamishev AV, Smith JR (2008) Design of an rfid-based battery-free programmable sensing platform. IEEE Trans Instrum Meas 57(11):2608\u20132615. https:\/\/doi.org\/10.1109\/TIM.2008.925019","journal-title":"IEEE Trans Instrum Meas"},{"key":"508_CR4","unstructured":"Wang A, Iyer V, Talla V, Smith JR, Gollakota S (2017) FM backscatter: Enabling connected cities and smart fabrics. In: Proc. of USENIX NSDI, USENIX Association, Boston, pp 243\u2013258"},{"key":"508_CR5","doi-asserted-by":"publisher","unstructured":"Kellogg B, Parks A, Gollakota S, Smith JR, Wetherall D (2014) Wi-Fi backscatter: Internet connectivity for RF-powered devices. In: Proc. of ACM SIGCOMM, ACM, New York, pp 607\u2013618. https:\/\/doi.org\/10.1145\/2619239.2626319","DOI":"10.1145\/2619239.2626319"},{"key":"508_CR6","doi-asserted-by":"publisher","unstructured":"Bharadia D, Joshi KR, Kotaru M, Katti S (2015) BackFi: High throughput wifi backscatter. In: Proc. of ACM SIGCOMM, ACM, New York, pp 283\u2013296. https:\/\/doi.org\/10.1145\/2785956.2787490","DOI":"10.1145\/2785956.2787490"},{"key":"508_CR7","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-030-59016-1_19","volume-title":"Wireless Algorithms, Systems, and Applications","author":"P Li","year":"2020","unstructured":"Li P, He X, Freris NM, Yang P (2020) Capacity analysis of ambient backscatter system with bernoulli distributed excitation. In: Yu D, Dressler F, Yu J (eds) Wireless Algorithms, Systems, and Applications. Springer International Publishing, Cham, pp 218\u2013230"},{"key":"508_CR8","doi-asserted-by":"crossref","unstructured":"Huang J, Xing G, Zhou G, Zhou R (2010)\u00a0Beyond co-existence: Exploiting WiFi white space for Zigbee performance assurance. In: Proc. of IEEE ICNP,\u00a0IEEE, Kyoto, pp 305\u2013314","DOI":"10.1109\/ICNP.2010.5762779"},{"key":"508_CR9","doi-asserted-by":"publisher","unstructured":"Yan Y, Yang P, Li X, Tao Y, Zhang L, You L (2013) ZIMO: Building cross-technology MIMO to harmonize zigbee smog with wifi flash without intervention. In: Proc. of ACM MobiCom, ACM,\u00a0Miami, pp 465\u2013476. https:\/\/doi.org\/10.1145\/2500423.2500426","DOI":"10.1145\/2500423.2500426"},{"key":"508_CR10","doi-asserted-by":"crossref","unstructured":"Zhang P, Josephson C, Bharadia D, Katti S (2017) FreeRider: Backscatter communication using commodity radios. In: Proc. of CoNEXT, ACM, New York","DOI":"10.1145\/3143361.3143374"},{"key":"508_CR11","doi-asserted-by":"crossref","unstructured":"Kellogg B, Talla V, Smith JR, Gollakot S (2016) PASSIVE WI-FI: Bringing low power to Wi-Fi transmissions. In: Proc. of USENIX NSDI","DOI":"10.1145\/3036699.3036711"},{"key":"508_CR12","doi-asserted-by":"crossref","unstructured":"Zhang P, Bharadia D, Joshi K, Katti S (2016) HitchHike: Practical backscatter using commodity wifi. In: Proc. of ACM SenSys, ACM, New York","DOI":"10.1145\/2994551.2994565"},{"key":"508_CR13","doi-asserted-by":"crossref","unstructured":"Kim T, Lee W (2018) Exploiting residual channel for implicit Wi-Fi backscatter networks. In: Proc. of IEEE INFOCOM, pp 1\u20139","DOI":"10.1109\/INFOCOM.2018.8486273"},{"key":"508_CR14","doi-asserted-by":"publisher","unstructured":"Zhang P, Bharadia D, Joshi K, Katti S (2016) Enabling backscatter communication among commodity wifi radios. In: Proc. of ACM SIGCOMM, ACM,\u00a0Florian\u00f3polis, SIGCOMM \u201916, pp 611\u2013612. https:\/\/doi.org\/10.1145\/2934872.2959072","DOI":"10.1145\/2934872.2959072"},{"key":"508_CR15","doi-asserted-by":"publisher","unstructured":"Zhao J, Gong W, Liu J (2018) X-Tandem: Towards multi-hop backscatter communication with commodity WiFi. In: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, ACM, New York, MobiCom \u201918, pp 497\u2013511. https:\/\/doi.org\/10.1145\/3241539.3241553","DOI":"10.1145\/3241539.3241553"},{"key":"508_CR16","doi-asserted-by":"publisher","unstructured":"Mi N, Zhang X, He X, Xiong J, Xiao M, Li XY, Yang P (2019) CBMA: Coded-backscatter multiple access. In: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), pp 799\u2013809. https:\/\/doi.org\/10.1109\/ICDCS.2019.00084","DOI":"10.1109\/ICDCS.2019.00084"},{"key":"508_CR17","doi-asserted-by":"publisher","unstructured":"Talla V, Hessar M, Kellogg B, Najafi A, Smith JR, Gollakota S (2017) Lora backscatter: Enabling the vision of ubiquitous connectivity. Proc of ACM Ubicomp 1(3):105:1\u2013105:24. https:\/\/doi.org\/10.1145\/3130970","DOI":"10.1145\/3130970"},{"key":"508_CR18","doi-asserted-by":"publisher","unstructured":"Peng Y, Shangguan L, Hu Y, Qian Y, Lin X, Chen X, Fang D, Jamieson K (2018) PLoRa: A passive long-range data network from ambient loRa transmissions. In: Proc. of ACM SIGCOMM, ACM, New York, pp 147\u2013160. https:\/\/doi.org\/10.1145\/3230543.3230567","DOI":"10.1145\/3230543.3230567"},{"key":"508_CR19","doi-asserted-by":"crossref","unstructured":"Yang C, Gummeson J, Sample A (2017) Riding the airways: Ultra-wideband ambient backscatter via commercial broadcast systems. In: Proc. of IEEE INFOCOM, pp 1\u20139","DOI":"10.1109\/INFOCOM.2017.8057162"},{"key":"508_CR20","doi-asserted-by":"publisher","unstructured":"He X, Jiang W, Cheng M, Zhou X, Yang P, Kurkoski B (2020) Guardrider: Reliable WiFi backscatter using reed-Solomon codes with QoS guarantee. In: 2020 IEEE\/ACM 28th IWQoS, IEEE,\u00a0Hangzhou, pp 1\u201310. https:\/\/doi.org\/10.1109\/IWQoS49365.2020.9213057","DOI":"10.1109\/IWQoS49365.2020.9213057"},{"key":"508_CR21","doi-asserted-by":"crossref","unstructured":"Wang Q, Chen S, Zhao J, Wei G (2021) Rapidrider: Efficient wifi backscatter with uncontrolled ambient signals. In: Proc. of IEEE INFOCOM, IEEE, Virtual Conference, pp 1\u201310","DOI":"10.1109\/INFOCOM42981.2021.9488716"},{"key":"508_CR22","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-031-19211-1_5","volume-title":"Wireless Algorithms, Systems, and Applications","author":"S Xu","year":"2022","unstructured":"Xu S, He X, Wu F, Lin G, Yang P (2022) Design on rateless LDPC codes for reliable Wifi backscatter communications. In: Wang L, Segal M, Chen J, Qiu T (eds) Wireless Algorithms, Systems, and Applications. Springer Nature Switzerland, Cham, pp 59\u201371"},{"key":"508_CR23","unstructured":"(2012) IEEE standard for information technology\u2013telecommunications and information exchange between systems local and metropolitan area networks\u2013specific requirements part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. IEEE Std 80211-2012 (Revision of IEEE Std 80211-2007) pp 1\u20132793"},{"key":"508_CR24","doi-asserted-by":"crossref","unstructured":"Mattoussi F, Roca V, Sayadi B (2012) Complexity comparison of the use of vandermonde versus hankel matrices to build systematic mds reed-solomon codes. In: Proc. of SPAWC","DOI":"10.1109\/SPAWC.2012.6292924"},{"key":"508_CR25","unstructured":"Python Library for Reed-Solomon Code. https:\/\/github.com\/tomerfiliba\/reedsolomon.\u00a0Accessed 20 Dec 2022"},{"key":"508_CR26","volume-title":"Error-correcting codes","author":"WW Peterson","year":"1972","unstructured":"Peterson WW, Peterson W, Weldon E, Weldon E (1972) Error-correcting codes. MIT Press"},{"key":"508_CR27","unstructured":"MSP432P401R datasheet. https:\/\/www.ti.com\/lit\/ds\/symlink\/msp432p401r.pdf.\u00a0Accessed 17 Nov 2022"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00508-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-023-00508-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00508-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,16]],"date-time":"2023-11-16T12:04:17Z","timestamp":1700136257000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-023-00508-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,16]]},"references-count":27,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["508"],"URL":"https:\/\/doi.org\/10.1186\/s13677-023-00508-5","relation":{},"ISSN":["2192-113X"],"issn-type":[{"type":"electronic","value":"2192-113X"}],"subject":[],"published":{"date-parts":[[2023,11,16]]},"assertion":[{"value":"2 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 August 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 November 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"157"}}