{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:12:44Z","timestamp":1761581564448,"version":"build-2065373602"},"reference-count":24,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T00:00:00Z","timestamp":1496275200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61671252","61501251","61571233"],"award-info":[{"award-number":["61671252","61501251","61571233"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018615","name":"Key University Science Research Project of Jiangsu Province","doi-asserted-by":"publisher","award":["14KJA510003"],"award-info":[{"award-number":["14KJA510003"]}],"id":[{"id":"10.13039\/501100018615","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Innovation Program of Graduate Education of Jiangsu Province","award":["KYLX15-0828"],"award-info":[{"award-number":["KYLX15-0828"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>This paper proposes a wireless powered communication network (WPCN) assisted by backscatter communication (BackCom). This model consists of a power station, an information receiver and multiple users that can work in either BackCom mode or harvest-then-transmit (HTT) mode. The time block is mainly divided into two parts corresponding to the data backscattering and transmission periods, respectively. The users first backscatter data to the information receiver in time division multiple access (TDMA) during the data backscattering period. When one user works in the BackCom mode, the other users harvest energy from the power station. During the data transmission period, two schemes, i.e., non-orthogonal multiple access (NOMA) and TDMA, are considered. To maximize the system throughput, the optimal time allocation policies are obtained. Simulation results demonstrate the superiority of the proposed model.<\/jats:p>","DOI":"10.3390\/s17061258","type":"journal-article","created":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T10:36:36Z","timestamp":1496313396000},"page":"1258","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Optimal Time Allocation in Backscatter Assisted Wireless Powered Communication Networks"],"prefix":"10.3390","volume":"17","author":[{"given":"Bin","family":"Lyu","sequence":"first","affiliation":[{"name":"Key Laboratory of Ministry of Education in Broadband Wireless Communication and Sensor Network Technology, Nanjing University of Posts and Telecommunications, Nanjing 210003, China"}]},{"given":"Zhen","family":"Yang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Ministry of Education in Broadband Wireless Communication and Sensor Network Technology, Nanjing University of Posts and Telecommunications, Nanjing 210003, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3888-2881","authenticated-orcid":false,"given":"Guan","family":"Gui","sequence":"additional","affiliation":[{"name":"Key Laboratory of Ministry of Education in Broadband Wireless Communication and Sensor Network Technology, Nanjing University of Posts and Telecommunications, Nanjing 210003, China"}]},{"given":"Hikmet","family":"Sari","sequence":"additional","affiliation":[{"name":"Key Laboratory of Ministry of Education in Broadband Wireless Communication and Sensor Network Technology, Nanjing University of Posts and Telecommunications, Nanjing 210003, China"}]}],"member":"1968","published-online":{"date-parts":[[2017,6,1]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1109\/JIOT.2016.2517405","article-title":"RMER: Reliable and energy-efficient data collection for large-scale wireless sensor networks","volume":"3","author":"Dong","year":"2016","journal-title":"IEEE Internet Things J."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1109\/ACCESS.2016.2517321","article-title":"A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities","volume":"4","author":"Wu","year":"2016","journal-title":"IEEE Access"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"2013","DOI":"10.1109\/TIFS.2016.2570740","article-title":"ActiveTrust: Secure and trustable routing in wireless sensor networks","volume":"11","author":"Liu","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"633","DOI":"10.1109\/ACCESS.2014.2332817","article-title":"Achieving source location privacy and network lifetime maximization through tree-based diversionary routing in wireless sensor networks","volume":"2","author":"Long","year":"2014","journal-title":"IEEE Access"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"31843","DOI":"10.3390\/s151229887","article-title":"A security assessment mechanism for software-defined networking-based mobile networks","volume":"15","author":"Luo","year":"2015","journal-title":"Sensors"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"712","DOI":"10.1109\/TCAD.2016.2539327","article-title":"LSCD: A low-storage clone detection protocol for cyber-physical systems","volume":"35","author":"Dong","year":"2016","journal-title":"IEEE Trans. Comput.-Aided Design Integr. Circuits Syst."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MWC.2016.7462480","article-title":"Wireless powered communication network: An overview","volume":"23","author":"Bi","year":"2016","journal-title":"IEEE Wirel. Commun."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1109\/MCOM.2015.7081084","article-title":"Wireless powered communication: Opportunities and challenges","volume":"53","author":"Bi","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1109\/TWC.2013.112513.130760","article-title":"Throughput maximization in wireless powered communication networks","volume":"13","author":"Ju","year":"2014","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"5539","DOI":"10.1109\/TWC.2015.2439673","article-title":"Full-duplex wireless-powered communication network with energy causality","volume":"14","author":"Kang","year":"2015","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1109\/TCOMM.2013.120713.130417","article-title":"Backscatter communication and RFID: Coding, energy, and MIMO analysis","volume":"62","author":"Boyer","year":"2014","journal-title":"IEEE Trans. Commun."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Lyu, B., Yang, Z., Gui, G., and Feng, Y. (2016). Optimal resource allocation policies for multi-user backscatter communication systems. Sensors, 16.","DOI":"10.3390\/s16122016"},{"key":"ref_13","first-page":"1","article-title":"Throughput maximization in backscatter assisted wireless powered communication networks","volume":"E100-A","author":"Lyu","year":"2017","journal-title":"IEICE Trans. Fundam."},{"key":"ref_14","unstructured":"Thai, H.D., Niyato, D., Wang, P., Kim, D.I., and Han, Z. (2016, January 4\u20138). The tradeoff analysis in RF-powered backscatter cognitive radio networks. Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA."},{"key":"ref_15","unstructured":"Thai, H.D., Niyato, D., Wang, P., and Kim, D.I. (2017, January 21\u201325). Optimal time sharing in RF-powered backscatter cognitive radio networks. Proceedings of the IEEE ICC, Pairs, France."},{"key":"ref_16","unstructured":"Dobkin, D.M. (2007). The RF in RFID: Passive UHF RFID in Practice, Elsevier Inc."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Liu, V., Parks, A., Talla, V., Gollakota, S., Wetherall, D., and Smith, J.R. (2013, January 12\u201316). Ambient backscatter: Wireless communication out of thin air. Proceedings of the ACM SIGCOMM, Hong Kong, China.","DOI":"10.1145\/2486001.2486015"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1091","DOI":"10.1109\/TCOMM.2014.020314.130559","article-title":"Increased range bistatic scatter radio","volume":"62","author":"Kimionis","year":"2014","journal-title":"IEEE Trans. Commun."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Saito, Y., Benjebbour, A., Kishiyama, Y., and Nakamura, T. (2013, January 8\u201311). System-level performance evaluation of downlink non-orthogonal multiple access (NOMA). Proceedings of the PIMRC, London, UK.","DOI":"10.1109\/PIMRC.2013.6666209"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1393","DOI":"10.1109\/ACCESS.2016.2551040","article-title":"MIMO-NOMA design for small packet transmission in the Internet of Things","volume":"4","author":"Ding","year":"2016","journal-title":"IEEE Access"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"8422","DOI":"10.1109\/TWC.2016.2614937","article-title":"Wireless powered communications with non-orthogonal multiple access","volume":"15","author":"Diamantoulakis","year":"2016","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_22","unstructured":"Zhang, P., and Ganesan, D. (2014, January 2\u20134). Enabling bit-by-bit backscatter communication in severe energy harvesting environment. Proceedings of the NSDI, Seattle, WA, USA."},{"key":"ref_23","first-page":"6325","article-title":"Dynamic user clustering and power allocation for uplink and downlink non-orthogonal multiple access (NOMA) systems","volume":"4","author":"Ali","year":"2016","journal-title":"IEEE Access"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Boyd, S., and Vandenberghe, L. (2004). Convex Optimization, Cambridge University Press.","DOI":"10.1017\/CBO9780511804441"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/6\/1258\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:37:38Z","timestamp":1760207858000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/6\/1258"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,1]]},"references-count":24,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2017,6]]}},"alternative-id":["s17061258"],"URL":"https:\/\/doi.org\/10.3390\/s17061258","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2017,6,1]]}}}