 Research
 Open Access
 Published:
Exploiting joint sparsity in compressed sensingbased RFID
EURASIP Journal on Embedded Systems volumeÂ 2016, ArticleÂ number:Â 8 (2016)
Abstract
We propose a novel scheme to improve compressed sensing (CS)based radio frequency identification (RFID) by exploiting multiple measurement vectors. Multiple measurement vectors are obtained by employing multiple receive antennas at the reader or by separation into real and imaginary parts. Our problem formulation renders the corresponding signal vectors jointly sparse, which in turn enables the utilization of CS. Moreover, the joint sparsity is exploited by an appropriate algorithm.
We formulate the multiple measurement vector problem in CSbased RFID and demonstrate how a joint recovery of the signal vectors strongly improves the identification speed and noise robustness. The key insight is as follows: Multiple measurement vectors allow to shorten the CS measurement phase, which translates to shortened tag responses in RFID. Furthermore, the new approach enables robust signal support estimation and no longer requires prior knowledge of the number of activated tags.
1 Introduction
In radio frequency identification (RFID), a reader device interrogates tags for identification. A large branch of RFID deals with the identification of a multitude of tags that may identify, e.g., products in a store, parts on a conveyor belt, or items in a warehouse. Predominantly, passive tags that are powered by the field emitted by the reader are employed. Such tags are cheap and can be produced in high volumes, which has made RFID a ubiquitous technology. An overview is provided in [1, 2].
Reducing the identification time and promoting quick identification of many tags has been a major research field in recent years. The key problem in customary protocols arises from collisions during interrogation: If several tags respond simultaneously, their responses superimpose at the reader and cause collisions, resulting in loss of data. The widely adopted EPCglobal standard [3] employs a collision avoidance protocol called frame slotted ALOHA (FSA)â€”a summary of collision avoidance schemes is provided by [4, 5]. These protocols separate the tag responses in the time domain. The authors in [6â€“8] improve FSA by performing collision recovery, which is accomplished by separating tag responses in the inphase and quadraturephase plane and by employing multiple receive antennas at the reader to resolve multiple collisions.
The compressed sensing (CS)based identification protocols [9â€“14], on the other hand, cope with simultaneously responding tags and exploit collisions. This bears several advantages over FSAbased schemes, as reported in, e.g., [9, 14]. In particular, CS enables a quicker identification and provides an increased noise robustness. In this work, we demonstrate that CSbased schemes can be improved significantly if joint sparsity is exploited. To the best of the authorsâ€™ knowledge, this is truly novel in the realm of CSbased RFID, denoted as CSRFID in the sequel. We discuss how multiple receive antennas at the reader and the separation into real and imaginary parts lead to a CS problem with inherent joint sparsity.
We employ the Bayesian structured signal approximate message passing (BASSAMP) algorithm [15] in order to exploit the joint sparsity. While the number of activated tags is assumed to be known or has to be estimated in an additional step in the current stateoftheart protocols [9â€“14], we demonstrate how our approach eliminates the need for such prior knowledge by exploiting a novel signal support estimation scheme. Note that we do not present a new protocol but an improvement of the CS formulation that is applicable to all present protocols [9â€“14]. The benefits of our novel formulation comprise a strongly increased identification throughput, an increased noise robustness, and an implicit estimation of the number of activated tags.
Outline: In Section 2, we briefly summarize CS and introduce the concept of multiple measurement vectors and joint sparsity. Section 3 gives an overview of CSRFID and discusses our novel contributions. Section 4 explains the origins of joint sparsity in CSRFID and highlights the advantages of its exploitation. In Section 5, the channel model and channel coefficient distribution are introduced, and the BASSAMP algorithm is defined for the RFID scenario. Section 6 deals with the estimation of the signal support and the number of activated tags. Numerical results are provided and discussed in Section 7, and we conclude in Section 8.
Notation: Boldface letters such as A and a denote matrices and vectors, respectively. The bth column of a matrix A is denoted a _{ b }, while the nth entry of the bth column is denoted a _{ n,b }. The superscript (Â·)^{T} denotes the transposition of a matrix or vector, and (Â·)^{H} denotes the conjugate transpose. The vectorization of an MÃ—N matrix into a column vector is denoted \(\mathbf {A}(:) \equiv \left [\mathbf {a}_{1}^{{\mathrm {T}}},...,\mathbf {a}_{N}^{{\mathrm {T}}}\right ]^{{\mathrm {T}}}\).
The NÃ—N _{ B } allone matrix is denoted \(\mathbf {1}_{N\times N_{B}}\). The Frobenius norm of a matrix A is denoted \(\\mathbf {A}\_{F}=\sqrt {\text {trace}(\mathbf {A} \mathbf {A}^{\mathrm {H}})}\). Calligraphic letters such as \(\mathcal {S}\) denote sets.
The cardinality of a set \(\mathcal {S}\) is denoted by \(\mathcal {S}\). Random variables, vectors, and matrices are written in sans serif font as x, x, and X, respectively, while realizations thereof are written in serif as x, x, and X.
2 Compressed sensing and joint sparsity
CSâ€”introduced in [16, 17] and discussed in [18, 19]â€”aims at reconstructing a signal vector \(\mathbf {x} \in \mathbb {C}^{N}\) from M<N noisy linear measurements
where \(\mathbf {y} \in \mathbb {C}^{M}\) is the measurement vector, \(\mathbf {A} \in \mathbb {R}^{M \times N}\) is the fixed sensing matrix, and \(\mathbf {w} \in \mathbb {C}^{M}\) is additive measurement noise. If the signal vector x features only Kâ‰ªN nonzero entries, it is said to be Ksparse.
Using randomly generated sensing matrices with i.i.d. (sub)Gaussian entries, x can be reconstructed from (1) by [20]
measurements, with a small constant c. Most importantly for CSRFID, this holds for Rademacher distributed sensing matrices where the entries are picked from the set {âˆ’1,1} with equal probability.
While many recovery algorithms aiming at solving (1) for x have been proposed in literature [18, 19], we utilize the versatile approximate message passing (AMP) framework that was introduced in [21â€“23]. These algorithms enable efficient recovery with low computational complexity, while maintaining excellent recovery performance. Note that the CSRFID schemes presented in [9â€“11] utilize computationally demanding convex optimization algorithms, while the schemes in [12â€“14] employ an efficient AMP algorithm that iteratively solves the least absolute shrinkage and selection operator (LASSO) [24]. In this work, we utilize a powerful extension of the AMP algorithmâ€”termed BASSAMP and introduced in [15]â€”that allows to leverage prior knowledge and joint sparsity. A detailed specification follows in Section 5.
Joint sparsity is defined as having N _{ B } signal vectors \(\mathbf {x}_{b}\in \mathbb {C}^{N}\), \(b\in \mathcal {B}=\{1,...,{N_{B}}\}\), that share a common support
where \(\mathcal {S}_{\mathbf {x}_{b}}\) contains the indices of the nonzero entries in x _{ b }. Aside from having the same support, all vectors are K sparse with \(\mathcal {S}_{\mathbf {x}}=K\ll N\).
In general, we obtain N _{ B } measurement vectors similar to (1):
where \(\mathbf {y}_{b} \in \mathbb {C}^{M}\), \(\mathbf {A}^{\!(b)}\in \mathbb {R}^{M \times N}\), and \(\mathbf {w}_{b} \in \mathbb {C}^{M}\). Let us collect the data blocks in matrices: \(\mathbf {Y} = [\mathbf {y}_{1},...,\mathbf {y}_{b},..., \mathbf {y}_{{N_{B}}\phantom {\dot {i}\!}}]\), \(\mathbf {X} = [\mathbf {x}_{1},...,\mathbf {x}_{b},..., \mathbf {x}_{{N_{B}}\phantom {\dot {i}\!}}]\), and \(\mathbf {W} = [\mathbf {w}_{1},...,\mathbf {w}_{b},..., \mathbf {w}_{{N_{B}}\phantom {\dot {i}\!}}]\).
If all N _{ B } sensing matrices are identical, i.e., \(\mathbf {A} \equiv \mathbf {A}^{\!(b)}, \forall b\in \mathcal {B}\), (4) can be rewritten as Y=A X+W. This is the relevant case for our approach.
3 CSRFID: Related work and novel contributions
The emerging field of CS triggered a shift of paradigm in signal processing and digital communications that also sparked new ideas in the field of RFID. In this work, we focus on protocols where a single reader identifies a multitude of tags. It is investigated how multiple receive antennas at the reader improve the performance.
We assume commonly used passive RFID tags that employ backscatter modulation to convey information back to the reader [25]. Before going into details about the CSRFID protocols presented in [9â€“14], let us first discuss what those schemes have in common.
3.1 CSRFID problem formulation
All CSbased identification protocols [9â€“14] share a common problem formulation that can be interpreted as a compressed sensing measurement similar to (1). Let us recapitulate how this formulation is obtained.

We intend to identify K tags that are activated by the reader (i.e., are in read range).

After a query from the reader, all K tags respond simultaneously with a signature sequence.

Activated tag k responds with signature \(\mathbf {s}_{a_{k}}\), where a _{ k }âˆˆ{1,...,N} is the signature index, and there are N possible signatures in total.

Each signature entails M realvalued (ASK) symbols, i.e., \(\mathbf {s}_{a_{k}} \in \{b_{0},b_{1}\}^{M}\) (the two amplitudes of backscatter modulation).

The N signature sequences form the columns of the signature matrix S=[s _{1},...,s _{ N }]âˆˆ{b _{0},b _{1}}^{MÃ—N}. The signature sequences are generated pseudorandomly, each with a certain seed [26]. The possible seeds are known to the reader such that it can construct S.
As a response to a query, the reader receives a superposition of signature sequences \(\mathbf {s}_{a_{k}}\) that are weighted with the respective channel coefficients h _{ k }, which we formulate as CS measurement
where the nonzero entries of \(\mathbf {x}\in \mathbb {C}^{N}\) store the complexvalued channel coefficients and dictate which columns in S are selected, and with \(\mathbf {w}\in \mathbb {C}^{M}\) being additive Gaussian measurement noise with i.i.d. entries \(\mathsf {w}_{m} \sim \mathcal {CN}(0,\sigma _{\mathsf {w}}^{2})\). In our application, x is a sparse vector with Kâ‰ªN nonzero entries, i.e., there are much fewer signatures (or tags to be identified) than exist in total. Our goal is to recover x from z knowing S, because the locations of the nonzero entries in x tell us which signatures have been chosen by the tags. This information is used to directly identify the tags [12, 14] or to establish a handshake mechanism in order to read out the tag information in an additional step [9â€“11, 13].
3.2 CSRFID overview
Let us give an overview of the individual protocols. Most tag identification protocols can be separated into two subsequent phases:
Tag acquisition refers to the process of obtaining information about the activated tags in order to communicate with them. Data readout refers to the process of obtaining the data (payload) of the acquired tags. For example, the widely employed FSA protocol [3] schedules the activated tags to respond during time slots in a frame, thereby trying to avoid collisions in the acquisition phase. The tags respond with a 16bit pseudorandom sequence called RN16 [3]. The reader acquires the uncorrupted RN16 sequences from collision free slots, which enables a successful handshake mechanism with the corresponding tags. After acquisition, the data that identifies the tags is read out in a sequential manner (tag by tag). Let us discuss how these phases are handled by CSRFID protocols. Buzz: This CSbased scheme was introduced in [9].
During the acquisition phase, the tags respond simultaneously with pseudorandom sequences that are seeded by the tagâ€™s temporary identifier, which is a 16bit random number (i.e., the RN16 number a tag would have picked for FSA). This is formulated as a CS measurement (5). Because the total number of possible identifiers (signatures in S) is N=2^{16}, the CS measurement (5) features a very large sensing matrix S that renders an efficient recovery of x infeasible. The scale of the problem is reduced by hashing the identifiers into buckets [9] and eliminating the buckets that contain no energy, thereby strongly reducing the number of possible signatures (and, consequently, N). However, this requires knowledge of the number of activated tags K that has to be estimated in a prior step. An improved scale reduction that utilizes a gradient algorithm was introduced in [10]. Another improvement that does not require arbitrary restrictions of the huge initial identifier space was proposed in [11].
In the data readout phase, the tags respond simultaneously as well. Based on the temporary identifier (that is now known to the reader), each tag generates a random sequence of bits. If a bit is â€˜1â€™, the tag transmits its data, whereas it is silent if a bit is â€˜0â€™. This results in a rateless code; the superposition of the randomly encoded tag responses can be decoded by a belief propagation decoder, for details, see [9]. CSF: In [12], we introduced a scheme to quickly identify tags in applications with fixed inventory, e.g., a book store with N books, and Kâ‰ªN books are brought to the checkout to be identified. Each of the N tags features a unique signature (identifier) that is not based on a random number.
During the acquisition phase, the tags respond simultaneously with their signature sequenceâ€”this process is cast as a CS measurement (5). Recovering x from S yields complete identification because each signature corresponds to a unique item of the inventory, no data readout phase is required for identification.
Another novelty proposed in [12] was the utilization and investigation of an AMP recovery algorithm that enables efficient iterative recovery of largescale CS problems. CSR: In [13, 14], a flexible alternative to CSF was introduced that allows for arbitrary inventory sizes.
During the acquisition phase, the tags respond simultaneously with a signature sequence that is randomly chosen from a pool of N possible signatures (N is now a design parameter). Recovering x form S yields the estimated set of assigned signatures. A scale reduction as in Buzz is not required.
In the data readout phase, these signatures are enquired and the corresponding tags that recognize their signature transmit their data. In [13, 14], the data is read out in a sequential manner (tag by tag). However, it is also possible to employ the rateless code scheme from Buzz [9].
In [14], the optimal choices of signature length M and signature pool size N based on the number of tags K have been discussed.
A brief overview of the aforementioned schemes is provided in Table 1.
3.3 Novel contributions
All CSRFID protocols feature the same problem formulation (5) for tag acquisition. This is the key aspect that we build and improve upon throughout this work, i.e., we improve the CS recovery scheme for RFID applications rather than proposing a new protocol. Our novel contributions are as follows:

We identify the origins of joint sparsity in CSRFID and provide a mathematical problem formulation. In particular, a reader with multiple receive antennas features multiple jointly sparse signals, and a separation into real and imaginary parts doubles their number.

We adapt BASSAMPâ€”an algorithm used for CS recovery of jointly sparse signalsâ€”to the RFID problem formulation. This adaptation involves the calculation of several functionsâ€”used in the algorithmâ€”for a specific channel coefficient prior distribution. We perform a rigorous calculation for a dyadic channel model, where the individual channels are Gaussian distributed, and finally provide closed form expressions for those functions. This allows for a straightforward implementation of the algorithm.

We propose a relaxation of the channel prior distribution in order to obtain simpler functions and to further reduce the computational complexity (reader side) of the implementation. This relaxation is validated by experiments.

We introduce a novel approach for robust signal support estimation that utilizes joint sparsity. This enables implicit estimation of the number of activated tags K. FSA requires K for an optimal choice of the frame size, Buzz requires K to reduce the scale of the CS problem, and CSF and CSR require K to determine the ideal signature length for optimal identification throughput. With our proposed approach, K can be implicitly estimated during CS recovery.

We compare CSRFID to a FSAbased collision recovery scheme and show the superior performance of our proposed approach. It is investigated how the number of receive antennas at the reader influences the performance.
4 Exploiting joint sparsity in CSRFID
In [12â€“14], we explained how the computationally efficient AMP algorithm can be used to recover x from largescale CS problems (5). In [15, 27], it was shown that the exploitation of additional signal structureâ€”such as joint sparsityâ€”strongly improves the recovery performance of AMPbased schemes. Here are the main benefits of exploiting joint sparsity in CSRFID:

The same mean squared error (MSE) performance as standard AMP can be achieved by a significantly reduced number of CS measurements M. Consequently, shorter signature sequences (length M) can be employed for tag acquisition.

This increases the acquisition throughput and reduces the jitter sensitivity [14] (jitter refers to link frequency deviations among tags). The noise robustness is improved as well. Furthermore, passive tags require less energy during the acquisition phase.

Support estimation (location of nonzero entries) can be improved significantly by combining soft information from multiple vectors, see Section 6. This leads to fewer identification cycles [14] (i.e., fewer repetitions of the acquisition phase) and quicker identification. Furthermore, the number of activated tags K can be estimated implicitly.
In the following, we demonstrate how to obtain jointly sparse signal vectors in CSRFID. Multiple receive antennas: In Fig. 1, a reader with N _{ R } receive antennas is depicted. Each antenna receives the superposition of signatures (5) with different noise realizations and, generally, with different channel coefficients for every tag (stored in signal vector x _{ r },râˆˆ{1,...,N _{ R }}). Employing N _{ R } receive antennas provides us with N _{ R } jointly sparse signal vectors and, thus, with N _{ R } measurement vectors that are generated with the same signature matrix:
Real and imaginary parts: Having complexvalued channel coefficients in x _{ r } and a realvalued signature matrix S, we can separate the measurements into a real part \(\mathbf {z}_{r}^{(\mathfrak {R})}\) and an imaginary part \(\mathbf {z}_{r}^{(\mathfrak {I})}\), which yields two jointly sparse signal vectors, and two measurement vectors that are generated with the same sensing matrix:
We combine the two variants as depicted in Fig. 2 and obtain
jointly sparse vectors.
The CS measurement with jointly sparse vectors is illustrated by Fig. 3 and reads
The BASSAMP Algorithm 1 is applied on the reformulation
where the bth column of Y computes as
This reformulation is necessary in order to obtain an appropriate sensing matrix that is compatible with the employed recovery algorithm. Signature matrix S comprises entries from the set {b _{0},b _{1}}. Assuming signature sequences (columns in S) where b _{0} and b _{1} are equally likely, all sequences have the same mean. Consequently, the reformulation features a sensing matrix \(\mathbf {A}\in \{\overline {b},\overline {b}\}^{M\times N}\) with zero mean columns and with \(\overline {b}=b_{1}b_{0}/2\), i.e., Rademacher distributed up to a constant factor. This renders A an appropriate sensing matrix for CS recovery that satisfies (2). In order to apply BASSAMP, we have to specify the functions used in Algorithm 1 (see below). Note that we use the original algorithm from [15] without algorithmic changes but demonstrate how the utilized functions have to be specified for our application case.
5 Adaptation of BASSAMP for RFID
The BASSAMP algorithmâ€”introduced in [15] and depicted in Algorithm 1â€”aims at recovering X from Y in (10). It utilizes the knowledge of A, the signal prior, and the joint sparsity structure.
Let us briefly summarize how Algorithm 1 works.
AMP decouples each measurement vector y _{ b } of the measurement formulation (10) into N uncoupled scalar measurements of the form (using random variables, details see [15, 28])
where the noise \(\widetilde {\mathsf {w}}_{n,b}\) accounts for the measurement noise and the undersampling noise. It is assumed to be Gaussian distributed as \(\widetilde {\mathsf {w}}_{n,b} \sim \mathcal {N}(0,\beta _{b})\). This assumption is satisfied in the asymptotic case (M,Nâ†’âˆž while \(\frac {M}{N}=const.\)) and approximately satisfied in finite but high dimensions. The decoupled measurement (12) refers to line 5 of Algorithm 1. The effective noise variance Î² _{ b } is estimated in line 6, and the current estimate for x _{ b } is computed in line 7 using the minimum mean squared error (MMSE) estimator function F(Â·;Â·,Â·) that will be defined later. A residual is computed in line 8. Above points subsume the Bayesian approximate message passing (BAMP) [21â€“23] iteration that is executed for all N _{ B } blocks. In each BAMP iteration, the signal vector x _{ b } is newly estimated. The energy of the residual decreases over iterations, and so does the effective noise variance Î² _{ b } â€” the MMSE estimator F(Â·;Â·,Â·) acts as a denoiser. In line 9, the extrinsic group update function U _{ G }(Â·,Â·,Â·) enforces the joint sparsity structure. This is done via binary latent variables that indicate whether a signal entry is zero or nonzero; in a probabilistic manner, the prior probability for a specific signal entry to be zero is updated. The likelihood ratios that are generated by the extrinsic group update function are converted into new prior probabilities in line 10. After several iterations of BASSAMP, a consensus emerges. For a detailed derivation, we refer the interested reader to [15].
The algorithm assumes independently distributed signal entries for the BAMP iteration, where the prior distribution of the nth entry of the bth signal vector is denoted as \(f_{\mathsf {x}_{n,b}\phantom {\dot {i}\!}}(x_{n,b})\). This prior plays a major role in the computation of the functions F(Â·;Â·,Â·), F ^{â€²}(Â·;Â·,Â·), and U _{ G }(Â·,Â·,Â·). Therefore, let us specify the signal prior for the RFID scenario, which is essentially dictated by the channel model.
5.1 Channel model and distribution
As illustrated by Fig. 1, we employ a widely used dyadic channel model (see, e.g., [6, 8, 25]) where the channel coefficients comprise a forward channel \(h_{k}^{(\mathrm {f})}\) and a backward channel \(h_{r,k}^{(\mathrm {b})}\). The total channel from the transmit antenna to the kth tag and back to the rth receive antenna reads
We assume that the forward and backward channel coefficients are distributed according to a circularly symmetric complex normal distribution such that
In the sequel, we consider the separation of the channel coefficients into real and imaginary parts:
where the real and imaginary parts obey a zero mean normal distribution with half the original variance, respectively. The total channel (13) can now be expressed by
In order to obtain the distribution of the real and imaginary parts of h _{ r,k }, we remember the following relation ([29] Proposition 2.2.5): consider four random variables \(\mathsf {v}_{1},\mathsf {v}_{2}\sim \mathcal {N}(0,{\sigma _{a}^{2}})\) and \(\mathsf {v}_{3},\mathsf {v}_{4}\sim \mathcal {N}(0,{\sigma _{b}^{2}})\); the term v=v _{1} v _{3}âˆ’v _{2} v _{4} is Laplace distributed with probability density function (PDF)
Applying this to (18), we obtain the PDF
where h is a placeholder for the real part \(\mathsf {h}_{r,k}^{\mathfrak {(R)}}\) or imaginary part \(\mathsf {h}_{r,k}^{\mathfrak {(I)}}\) of the total channel (13).
5.2 Sparsity enforcing signal prior
The BASSAMP algorithm requires the specification of a signal prior distribution. In (20), we specified the distribution of the nonzero entries in the random matrix \(\boldsymbol {\mathsf {X}}=[\boldsymbol {\mathsf {x}}_{1},...,\boldsymbol {\mathsf {x}}_{N_{B}\phantom {\dot {i}\!}}]\). A realization thereof, X, contains the channel realizations as nonzero entries. The prior of signal entry x _{ n,b } reads
where Î³ _{ n,b } is the probability that the nth signal entry of the bth vector is zero. If the number of activated tags, K, is known a priori, the initial value computes as \(\gamma _{n,b}=1\frac {K}{N}\). In BASSAMP, this probability is adapted in each iteration, and it is sufficient to initialize it with a very coarse assumption of the number of activated tags; details follow in Section 6.
5.3 Specification of functions
Let us now discuss the computation of the functions (required in Algorithm 1, iteration index t omitted)
The conditional expectation (22) yields the MMSE estimate of x _{ n,b } given the decoupled measurement \(u_{n,b}=x_{n,b} +\widetilde {w}_{n,b}\), where \(\widetilde {\mathsf {w}}_{n,b}\sim \mathcal {N}(0,\beta _{b})\); for details, consider [15, 28]. Note that in Algorithm 1 (line 7), (22) is applied separately on the vector components u _{ n,b } of the vector input u _{ b }.
Let us calculate these functions for prior (21) (indices n and b are dropped for clarity):
with auxiliary functions
the derivative of (24) with respect to u calculates as
where
Finally, we have to specify the update functions U _{ G }(Â·,Â·,Â·) and U _{ P }(Â·). The extrinsic group update (applied entrywise) in iteration t accumulates extrinsic information about signal entry x _{ n,b } from the entries x _{ n,l } of the other signal vectors, \(l\in \mathcal {B}\backslash b\):
The prior update converts likelihood ratios into probabilities:
A detailed explanation of functions (34) and (35) can be found in [15].
5.4 Specification of functionsâ€”Gaussian relaxation
Note that the implementation of the functions above may be computationally challengingâ€”in particular, the terms k _{1}(u) and k _{2}(u) that occur in (24), (31), and (34) entail a complementary error function that is multiplied with an exponential function. This may cause numerical instabilities in the computation. In order to keep the demands on the reader hardware low and facilitate a simpler implementation, we propose to approximate the channel PDF (20) by a Gaussian distribution with zero mean and variance \(\sigma _{\mathsf {x}}^{2}=\frac {1}{2}{\sigma ^{(\text {f})}}^{2}{\sigma ^{(\text {b})}}^{2}\), i.e., with the same variance as the Laplace distribution 20. Doing so, we obtain the following functions for BASSAMP, see [15] (indices n and b are dropped for clarity):
with auxiliary functions
The extrinsic group update for the Gaussian prior reads
The prior update (35) stays the same.
To justify this approximation of the channel PDF, we conducted numerical experiments that suggest that the MSE performance is hardly affected, see Section 7.
5.5 Choice of parameters
The choice of the channel model and the forward channel variance Ïƒ ^{(f)} ^{2} and backward channel variance Ïƒ ^{(b)} ^{2} depends on the location of the reader antennas, the environment (scatterers and reflectors), and the effective read range. The variances describe the strength of the spatial fading of the forward and backward link, respectively. In order to estimate them, one would have to measure the forward and backward links separately for many prospective tag positions.
In practice, one would rather measure the total channel (13), or avoid measuring the channels and determining their distribution entirely. The AMP framework allows to perform prior estimation during recovery, i.e., the recovery algorithm can be adapted to estimate the prior over iterations. One such algorithmic extension was proposed in [30], and it was shown that the performance degradation due to unknown prior is negligible in practice.
6 Support estimation
We now present a method to estimate the signal support (3) based on [31]. The support estimation is crucial for quick tag identification as it yields

The estimated set of assigned signatures \(\widehat {\mathcal {T}}_{\mathrm {A}}\) [14] (this is the information from the acquisition phase used to communicate with the tags),

The estimated number of activated tags \(\widehat {K}\).
The schemes presented in [12â€“14] assumed to know the number of activated tags K, i.e., \(\widehat {K}=K\). Utilizing this knowledge, the estimated set of assigned signatures \(\widehat {\mathcal {T}}_{\mathrm {A}}\) is dictated by the K largest entries of signal recovery \(\widehat {\mathbf {x}}\). The newly employed BASSAMP algorithm allows for a robust support estimation by combining the soft information of all recovered vectors \(\widehat {\mathbf {x}}_{b}\).
In each BAMP iteration of the BASSAMP Algorithm 1, the decoupled measurements u _{ b } are computed; they have the form (12). The effective noise variance Î² _{ b } is decreased over the BAMP iterations, and u _{ n,b } is used as input of the MMSE estimator function F(Â·;Â·,Â·), i.e., the signal estimate in each iteration depends on this value, see line 7 of Algorithm 1. The PDF of u _{ n,b } can be computed by convolving the signal PDF (21) with the PDF of the effective noise \(\widetilde {\mathsf {w}}_{n,b}\), a normal distribution with zero mean and variance Î² _{ b }. Doing so, we obtain (indices dropped for clarity)
where
If the Gaussian relaxation (see Section 5.4) is used, we get
In order to compute the conditional probability that a signal entry was zero given u _{ n,b }, we introduce a latent binary random variable z _{ n,b } that indicates whether a signal entry x _{ n,b } in (12) was zero (z _{ n,b }=0) or nonzero (z _{ n,b }=1), also see [15, 31]. We intend to compute the overall probability that the nth entry of all N _{ B } jointly sparse vectors x _{ b } is zero respectively nonzero (since we have jointly sparse vectors, these are the only relevant cases; either all nth entries are zero, or all nth entries are nonzero). The posterior probability that all nth signal entries are zero (given u _{ n,b } and Î³ _{ n,b }, \(\forall b \in \mathcal {B}\)) computes as
while the posterior probability that all nth signal entries are nonzero computes as
where d is a common partition factor. The estimate for the signal support (3) is equivalent to the estimated set of assigned signatures and is obtained by comparing these probabilities:
Note that the estimated set of assigned signatures is of vital importance:

In Buzz [9â€“11], this set represents the seeds used in the pseudo random generator for the data readout via rateless code. An erroneous set hampers decoding, and the acquisition has to be repeated.

In CSF [12], this set directly identifies the activated tags. The reader enquires the signature indices in order to confirm the identification. An erroneous set prolongs this enquiry phase and leads to a repetition of the acquisition phase.

In CSR [13, 14], the indices of the assigned signatures are used to communicate with the tags for data readout. Again, an erroneous set prolongs the enquiry phase and leads to a repetition of the acquisition phase.
For all schemes, a wrongly estimated set of assigned signatures prolongs the identification and increases the readertotag communication overhead.
The estimated number of activated tags is defined as the cardinality of this set:
Note that the support estimation is performed after executing the BASSAMP algorithm; it considers the values u _{ n,b }, Î³ _{ n,b }, and Î² _{ b } after the last iteration t. The prior probabilities in BASSAMP Algorithm 1 are initialized with a coarse assumption of K, termed K ^{0}: \(\gamma _{n,b}^{0} = 1\frac {K^{0}}{N}\).
7 Numerical results and comparison
Let us introduce the figures of merit used in the subsequent evaluation. The signaltonoise ratio (SNR) is defined as
The normalized mean squared error (NMSE) between original signal X and its estimate (recovery) \(\widehat {\mathbf {x}}\) is defined as
it gives indication about the overall recovery performance.
For the subsequent numerical experiments, the stopping criteria of Algorithm 1 were chosen as Îµ _{tol}=10^{âˆ’5} and t _{max}=100.
7.1 Gaussian relaxation of prior
In Section 5.4, we proposed a relaxation of the prior distribution (Gaussian instead of Laplace) in order to obtain an implementation of Algorithm 1 that features a lower computational complexity and better numerical stability. To demonstrate that the performance is not significantly affected by this relaxation, we investigate the empirical phase transition curves that illustrate the recovery performance over a wide range of parameters K and M for fixed N=1 000. We chose N _{ R }=1 receive antenna.
For the empirical phase transition curves, we consider an undersampling \(\left (\frac {M}{N}\right)\) versus sparsity \(\left (\frac {K}{M}\right)\) grid, where the values range from 0.05 to 0.95 with stepsize 0.05, respectively. At each grid point, 1 000 realizations of A, X, and W are simulated. Let us introduce a success indicator for each realization r:
The average success is obtained as \(\overline {S} = \frac {1}{1\,000}\sum _{r=1}^{1\,000}S_{r}\). The empirical phase transition curves are finally obtained by plotting the 0.5 contour of \(\overline {S}\) using MATLABÂ®;function contour.
The results are shown in Fig. 4, where the AMP algorithm (with NMSE minimizing soft thresholding parameter Î»=2.678K ^{âˆ’0.181}, see [12]) is compared to the BASSAMP algorithm with two different priors. The true channel prior is the Laplace distribution obtained in (20), the signal vectors were generated accordingly in each realization, with Ïƒ ^{(f)}=Ïƒ ^{(b)}=1. The relaxed channel prior is a zero mean Gaussian distribution with \(\sigma _{\mathsf {x}}^{2}=\frac {1}{2}{\sigma ^{(\text {f})}}^{2}{\sigma ^{(\text {b})}}^{2} = 0.5\). We conclude that the NMSE performance is only aggravated slightly by the Gaussian relaxation. This also suggests that a mismatch in the channel prior does not hamper the recovery significantly, and advocates the general use of a Gaussian prior for the considered application. Furthermore, we observe that in order to achieve the same NMSE performance as AMP, we can significantly reduce the signature length M. In the sequel, we employ the Gaussian relaxation.
7.2 Support estimation
In this section, we demonstrate the capabilities of the support detection scheme that was introduced in Section 6. The BASSAMP Algorithm 1 requires an initialization of the zero probabilities, which is done with a coarse initial assumption of the number of activated tags: \(\gamma _{n,b}^{0}=1\frac {K^{0}}{N}\). We now demonstrate that the initial assumption of K _{0} can indeed be very coarse.
We consider the number of correct detections (CDs) and false alarms (FAs) [32] that partition the estimated set of assigned signatures \(\widehat {\mathcal {T}}_{\mathrm {A}}\) (47) (an index in this set either refers to a CD or a FA).
Figure 5 shows the number of CDs and FAs averaged over 1 000 realizations versus variable SNR. The true number of activated tags was K=100; for a much lower K ^{0}=50 or a much higher K ^{0}=150 to initialize BASSAMP with, the results are only changed marginally. At low SNR, the cardinality of \(\widehat {\mathcal {T}}_{\mathrm {A}}\) is lower than K, and \(\widehat {K}=\widehat {\mathcal {T}}_{\mathrm {A}}\) is underestimated. The indices in \(\widehat {\mathcal {T}}_{\mathrm {A}}\) mostly represent the true support (many CDs, few FAs). The support estimation does not flood us with many FAs which is beneficial for the RFID protocols because it reduces the overhead of the readertotag communication (the protocols do not have to deal with wrongly acquired tags). In this way, we obtain efficient identification cycles (see [12â€“14]) that feature only very few wrongly enquired tags. For the schemes presented in [12â€“14], it is important to obtain many CDs and few FAs rather than an exact estimate \(\widehat {K}\). With an increasing number of jointly sparse vectors (right plot in Fig. 5), the support estimation becomes very robust with respect to noise. In the considered example, N _{ R }=4 receive antennas result in perfect support estimation above SNR=15 dB which entails immediate identification after only one cycle.
Figure 6 shows the number of CDs and FAs averaged over 1 000 realizations versus variable M in the noiseless case. Again, three different initializations of K ^{0} are investigated, and the outcome is only marginally different. We observe that the number of CDs is hardly affected, whereas the number of FA increases (decreases) for over (under)assumptions of K ^{0} during the phase transition, but declines quickly with increasing M. The signature length M should be chosen such that the algorithm operates in the successful regime where the support estimation features only CDs and no FAs. We conclude that a very coarse assumption of K is sufficient to initialize Algorithm 1.
7.3 Improvement of acquisition phaseâ€”perfect conditions
As motivated in Section 3.2, our approach improves the tag acquisition phase of CSRFID protocols. To demonstrate this, we consider various identification schemes and compare the bit overhead for the acquisition phase, i.e., the number of bits required to acquire the activated tags. In order to facilitate a comparison of various schemes, we restrict ourselves to the number of bits transmitted by the tags and omit protocol overhead and commands from the reader. Our baseline is the widely employed FSA protocol where tags are randomly scheduled to transmit in slots of a frame in order to avoid collisions. It features following bit overhead for tag acquisition:
where T _{ps} is the throughput per slot [8], i.e., the number of tags acquired per slot, and the number 16 refers to the RN16 sequences utilized during acquisition. If the number of activated tags is known, the optimal choice of the frame size leads to a maximum average throughput of T _{ps}=e ^{âˆ’1}â‰ˆ0.368 [33]. In [6â€“8], collision recovery schemes have been proposed that allow shortened frame sizes and, thus, increased throughput numbers. A reader with N _{ R } receive antennas can resolve up to 2N _{ R } collisions [8]. Assuming perfect channel knowledge and knowledge of the number of activated tags K, a reader with N _{ R }=1 receive antenna can resolve one collision and features a maximal theoretical throughput of T _{ps}=0.841, while a reader with N _{ R }=4 receive antennas achieves a maximal theoretical throughput of T _{ps}=4.479, for details, see [8].
On the other hand, we have the CSbased schemes where all activated tags respond simultaneously with sequences of length M during the acquisition phase. This results in a CS measurement of the type (1) that needs to be solved for x utilizing the M measurements in y. Therefore, the optimal bit overhead for tag acquisition reads (cf. (2))
It was shown in [12] that an optimally tuned AMP recovery algorithm requires a measurement multiplier c=2 to yield perfect recovery results in the noiseless case. In Sections 7.1 and 7.2, we observed that our proposed scheme requires fewer measurements than the legacy AMP scheme, which enables a reduction of c that results in the same recovery quality. Scrutinizing Fig. 6, we observe that Mâ‰ˆ210 (câ‰ˆ0.9) for N _{ R }=1 and Mâ‰ˆ140 (câ‰ˆ0.6) for N _{ R }=4 lead to perfect recovery (i.e., only CDs and no FAs), respectively.
Let us collect above insights and compare the bit overhead for tag acquisition. Figure 7 depicts the bit overhead versus K for various schemes under perfect conditions, i.e., the channels are known to the FSAbased collision recovery scheme, and all schemes know the number of activated tags K. For the CSbased schemes, we assume N=1 000. We observe that the CSbased schemes strongly outperform FSA (despite its collision recovery capabilities) and that our novel approach that utilizes the BASSAMP algorithm reduces the bit overhead over the legacy AMP scheme by a factor of 2.2 (N _{ R }=1) respectively 3.3 (N _{ R }=4). Let us emphasize again that this improvement is observed in all CSbased schemes [9â€“14], as they all feature the same problem formulation in the acquisition phase.
By utilizing the channel statistics and the joint sparsity among the signal vectors, a strong improvement over previous approaches is observed. Furthermore, the novel approach already shows a significant improvement for a reader that employs only N _{ R }=1 receive antenna.
7.4 Improvement of acquisition phaseâ€”imperfect conditions
Now that we have studied the performance under perfect conditions, let us move on to the noisy case. In particular, the tag responses of FSA are corrupted by noise, and the collision recovery scheme [8] faces channel estimation errors. The CSbased schemes have to deal with noisy measurements (10). Let us describe the simulation guidelines. FSA: For the legacy FSA approach [3], the reader features one receive antenna and no collision recovery capabilities. The advanced FSA approach features collision recovery capabilities as introduced in [8]. There, the channels have to be estimated by using a set of orthogonal sequences that are transmitted prior to the RN16 sequencesâ€”note that we omit the bit overhead for the channel estimation sequences, although they will have a significant overhead in practice. The frame size is adjusted in each cycle in order to maximize the throughput [8, 33], depending on the number of remaining tags. It is assumed that the schemes know the number of tags K. The average acquisition throughput is obtained as
It is measured in acquired tags per bit, where we count the number of bits transmitted by a tag during the acquisition phase. We used the T _{ps} values from [8]. CS: For the legacy CS approach, the reader features one receive antenna, and AMP is employed as CS recovery algorithm that estimates a single complexvalued signal vector. The improved CS approach features the BASSAMP algorithm that we specified for a dyadic channel model. We simulated 1 000 random realizations of A, X, and W and averaged the results. In each realization, CS measurements of the form (5) are performed in cycles [14]. Each cycle features a CS tag acquisition, and the cycles are repeated until all tags are identified. In each cycle, the number of measurements (sequence length) M is set according to (2) based on the remaining number of unidentified tags. AMP is assumed to know K, and \(\widehat {\mathcal {T}}_{\mathrm {A}}\) is composed of the indices that correspond to the K largest entries in the recovered signal vector. BASSAMP utilizes the support estimation (47). The average acquisition throughput is obtained as
Note that here, the simulated bit overhead \(\beta _{\text {CS}}^{\text {(A)}}\) that may include several CS measurements (cycles) is used, whereas (53) refers to the optimal bit overhead of only one CS measurement.
Figure 8 shows the average identification throughput of tag acquisition versus SNR for K=100 and N=1 000. We employ N _{ R }=4 receive antennas, and for the novel CSbased scheme, the signature length M is varied (c={0.5,1,2,3}). We observe that with the proposed approach, we can shorten the signatures and thereby drastically increase the acquisition throughput of the CSRFID schemes. Compared to the legacy AMP scheme with N _{ R }=1, the new BASSAMP scheme with N _{ R }=4 features an increased noise robustness for the same signature length (c=3), i.e., the noise robustness increases with increasing N _{ R }. It was shown in [12] that c<2 generally does not admit successful AMP recoveries; with the newly utilized BASSAMP algorithm that exploits joint sparsity, smaller c and thus shorter signatures are possible. Note that shorter signatures also reduce the sensitivity to jitter [14], and the tags require less energy (shortened activation time). An advantage over collision recovery schemes is the fact that the CSbased schemes do not require channel knowledge, only coarse knowledge of the channel statistics. Overall, our proposed approach significantly improves the acquisition phase of CSbased schemes and strongly outperforms other schemes such as FSA with collision recovery.
Let us list the achieved improvements (at high SNR) by exploiting N _{ R }=4 receive antennas at the reader. The tag acquisition of the proposed CSRFID scheme is

4.3 times quicker than the legacy CS approach that employed AMP and a single receive antenna,

3 times quicker than FSA with collision recovery,

26 times quicker than legacy FSA without collision recovery capability, and a reader with a single receive antenna.
We emphasize again that our approach is applicable to all stateoftheart CSRFID schemes [9â€“14].
8 Conclusions
We proposed a novel extension to CSRFID that improves the acquisition phase of the tag identification by leveraging joint sparsity. We demonstrated how multiple receive antennas at the reader produce multiple measurement vectors and that their number can be doubled beneficially by separation into real and imaginary parts. The corresponding signal vectors are jointly sparse, i.e., they share a common support. This is exploited by the BASSAMP algorithm that we defined for a dyadic channel model.
We showed that the usage of a Gaussian prior relaxation is applicable. Simulation results suggest that an exact knowledge of the channel coefficient distribution is not required. Furthermore, the relaxation promotes a low complexity implementation of our iterative recovery algorithm.
Robust signal support estimation is facilitated by combining the soft information from multiple jointly sparse signal vectors. Support estimation is crucial for quick tag identification, as the support dictates the overhead of the readertotag communication (correct detections lead to correctly read out tags, while false alarms prolong the identification). It was shown that prior knowledge of the exact number of activated tags is not required for robust support estimation.
The main benefits of exploiting joint sparsity are the possible reduction of the sequence length (i.e., shorter tag responses) and the increased noise robustness during acquisition. This enables quicker, more reliable identification, reduces the sensitivity to jitter, and lowers the energy requirements of the tags.
References
Want, R (2006). An introduction to RFID technology. Pervasive Comput. IEEE, 5(1), 25â€“33.
Dobkin, DM. (2012). The RF in RFID, Second Edition: UHF RFID in Practice. Newnes. http://www.amazon.com/TheRFRFIDSecondEdition/dp/0123945836, accessed 1 November 2015.
EPCGlobal (2008). EPC Radiofrequency Identity Protocols Class1 Generation2 UHF RFID. http://www.gs1.org/gsmp/kc/epcglobal/uhfc1g2. accessed 1 November 2015.
Shih, DH, Sun, PL, Yen, DC, Huang, SM (2006). Taxonomy and survey of RFID anticollision protocols. Comput. Commun., 29(11), 2150â€“2166.
Klair, DK, Chin, KW, Raad, R (2010). A survey and tutorial of RFID anticollision protocols. IEEE Commun. Surv. Tutor., 12(3), 400â€“421.
Angerer, C, Langwieser, R, Rupp, M (2010). RFID Reader receivers for physical layer collision recovery. IEEE Trans. Commun., 58(12), 3526â€“3537.
Kaitovic, J, Simko, M, Langwieser, R, Rupp, M (2012). Channel Estimation in Tag Collision Scenarios. In 2012 IEEE International Conference on RFID (RFID). pp. 74â€“80. Orlando, FL, USA: IEEE (details see http://www.ieee.org/conferences_events/conferences/conferencedetails/index.htm?Conf_ID=19933).
Kaitovic, J, Langwieser, R, Rupp, M (2013). A smart collision recovery receiver for RFIDs. EURASIP J. Embedded Syst., 2013(1), 1â€“19.
Wang, J, Hassanieh, H, Katabi, D, Indyk, P (2012). Efficient and reliable lowpower backscatter networks. ACM SIGCOMM Comput. Commun. Rev., 42(4), 61â€“72.
Lai, G, Liu, Y, Lin, X, Zhang, L (2013). Collisionbased Radio Frequency Identification Using Compressive Sensing. In 15th IEEE International Conference on Communication Technology (ICCT). pp. 759â€“763. Guangxi, Guilin, China (details see http://www.ieee.org/conferences_events/conferences/conferencedetails/index.html?Conf_ID=31177).
Kaneko, M, Hu, W, Hayashi, K, Sakai, H (2014). Compressed sensingbased tag identification protocol for a passive RFID system. IEEE Commun. Lett., 18(11), 2023â€“2026.
Mayer, M, Goertz, N, Kaitovic, J (2014). RFID Tag Acquisition via Compressed Sensing. In Proceedings of IEEE RFID Technology and Applications Conference (RFIDTA). pp. 26â€“31. Tampere, Finland (details see http://www.rfidta2014.fi/).
Mayer, M, & Goertz, N (2015). RFID Tag Acquisition via Compressed Sensing: Flexibility by Random Signature Assignment. In Proceedings of the 5th International EURASIP Workshop on RFID Technology. pp. 53â€“58. Rosenheim, Germany (details see http://www.eurasiprfid.org/).
Mayer, M, & Goertz, N (2015). RFID Tag acquisition via compressed sensing: fixed vs. random signature assignment. IEEE Transactions on Wireless Communications (accepted). DOI:10.1109/TWC.2015.2498922, date: November 2015.
Mayer, M, & Goertz, N (2015). Bayesian optimal approximate message passing to recover structured sparse signals. arXiv preprint arXiv:1508.01104. date: August 2015. Details: http://arxiv.org/abs/1508.01104.
Donoho, DL (2006). Compressed sensing. IEEE Trans. Inform. Theory, 52(4), 1289â€“1306.
Candes, EJ, Romberg, J, Tao, T (2006). Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information. IEEE Trans. Inform. Theory, 52(2), 489â€“509.
Elad, M. (2010). Sparse and Redundant Representations: From Theory to Applications in Signal and Image Processing: Springer. http://www.springer.com/jp/book/9781441970107, accessed 1 November 2015.
Eldar, YC, & Kutyniok, G. (2012). Compressed Sensing: Theory and Applications: Cambridge University Press. http://www.amazon.com/CompressedSensingApplicationsYoninaEldar/dp/1107005582/, accessed 1 November 2015.
Candes, EJ, Romberg, J, Tao, T (2006). Stable signal recovery from incomplete and inaccurate measurements. Commun. Pure Appl. Math., 59(8), 1207â€“1223.
Donoho, DL, Maleki, A, Montanari, A (2009). Messagepassing algorithms for compressed sensing. Proc. Nat. Acad. Sci., 106(45), 18914â€“18919.
Maleki, MA. (2011). Approximate Message Passing Algorithms for Compressed Sensing: PhD Thesis, Stanford University. http://www.ece.rice.edu/~mam15/thesis.pdf, accessed 1 November 2015.
Donoho, DL, Maleki, A, Montanari, A. Message Passing Algorithms for Compressed Sensing: I. Motivation and Construction. In 2010 IEEE Information Theory Workshop (ITW). pp. 1â€“5. Cairo, Egypt (details see http://www2.ece.ohiostate.edu/itw10/).
Tibshirani, R (1996). Regression shrinkage and selection via the lasso. Journal of the Royal Statistical Society. Series B (Methodological), 58(1), 267â€“288. Details: http://www.jstor.org/stable/2346178?seq=1#page_scan_tab_contents.
Kim, D, Ingram, MA, JWW Smith (2003). Measurements of smallscale fading and path loss for long range RF tags. IEEE Trans. Antennas Propag., 51(8), 1740â€“1749. doi:10.1109/TAP.2003.814752.
Bardell, PH, McAnney, WH, Savir, J. (1987). Builtin Test for VLSI: Pseudorandom Techniques. New York, NY, USA: WileyInterscience.
Ziniel, J, & Schniter, P (2013). Efficient highdimensional inference in the multiple measurement vector problem. IEEE Trans. Signal Process., 61(2), 340â€“354.
Montanari, A. (2012). Graphical models concepts in compressed sensing. Compressed Sensing: Theory and Applications, (pp. 394â€“438): Cambridge University Press. http://www.amazon.com/CompressedSensingApplicationsYoninaEldar/dp/1107005582/.
Kotz, S, Kozubowski, T, Podgorski, K. (2001). The Laplace Distribution and Generalizations: a Revisit with Applications to Communications, Economics, Engineering, and Finance: Springer. http://www.springer.com/us/book/9780817641665, accessed 1 November 2015.
Guo, C, & Davies, ME (2015). Near optimal compressed sensing without priors: parametric SURE approximate message passing. IEEE Trans. Signal Process., 63(8), 2130â€“2141. doi:10.1109/TSP.2015.2408569.
Hannak, G, Mayer, M, Matz, G, Goertz, N (2015). An approach to complex Bayesianoptimal approximate message passing. arXiv preprint arXiv:1511.08238. Date: November 2015. Details: http://arxiv.org/abs/1511.08238.
Mayer, M, & Goertz, N (2015). Improving Approximate Message Passing Recovery of Sparse Binary Vectors by Post Processing. In Proceedings of 10th International ITG Conference on Systems, Communications and Coding (SCC 2015). Hamburg, Germany (details see http://www.scc2015.net/).
Nazir, MH, Xu, Y, Johansson, A (2011). Optimal Dynamic FrameSlotted Aloha. In Proceedings of 7th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). pp. 1â€“4. Wuhan, China: IEEE (details see http://www.ieee.org/conferences_events/conferences/conferencedetails/index.html?Conf_ID=16733).
Acknowledgements
This work has been funded by the Christian Doppler Laboratory for Wireless Technologies for Sustainable Mobility, and its industrial partner Infineon Technologies. The financial support by the Federal Ministry of Economy, Family and Youth and the National Foundation for Research, Technology and Development is gratefully acknowledged.
Author information
Authors and Affiliations
Corresponding author
Additional information
Competing interests
The authors declare that they have no competing interests.
Authorsâ€™ contributions
The authors propose a novel scheme to improve CSRFID by exploiting multiple measurement vectors and joint sparsity among the signal vectors. It is demonstrated how multiple measurement vectors are obtained in RFID, and an appropriate algorithm to leverage joint sparsity is defined. The algorithm utilizes prior knowledge of the channel, and a Gaussian relaxation of the channel prior is discussed and validated. This relaxation facilitates an algorithmic implementation with low computational complexity. A novel support estimation scheme that eliminates the need for prior knowledge of the number of activated tags is proposed. It is demonstrated by simulation that noise robustness and identification speed are significantly increased by the proposed scheme. All authors read and approved the final manuscript.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
About this article
Cite this article
Mayer, M., Hannak, G. & Goertz, N. Exploiting joint sparsity in compressed sensingbased RFID. J Embedded Systems 2016, 8 (2016). https://doi.org/10.1186/s136390160025y
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s136390160025y
Keywords
 Compressed sensing
 Approximate message passing
 Joint sparsity
 Multiple measurement vectors
 Backscatter communication
 Multiple access