SpringerOpen Newsletter

Receive periodic news and updates relating to SpringerOpen.

This article is part of the series RFID and near field communications in embedded systems.

Open Access Open Badges Research

A space-time coding approach for RFID MIMO systems

Feng Zheng* and Thomas Kaiser

Author Affiliations

Institute of Digital Signal Processing, University of Duisburg-Essen, Duisburg, 47057, Germany

For all author emails, please log on.

EURASIP Journal on Embedded Systems 2012, 2012:9  doi:10.1186/1687-3963-2012-9

The electronic version of this article is the complete one and can be found online at: http://jes.eurasipjournals.com/content

Received:15 June 2012
Accepted:16 August 2012
Published:29 October 2012

© 2012 Zheng and Kaiser; licensee Springer.

This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


This paper discusses the space-time coding (STC) problem for RFID MIMO systems. First, a mathematical model for this kind of system is developed from the viewpoint of signal processing, which makes it easy to design the STC schemes. Then two STC schemes, namely Scheme I and Scheme II, are proposed. Simulation results illustrate that the proposed approaches can greatly improve the symbol-error rate (SER) or bit-error rate (BER) performance of RFID systems, compared to the non space-time encoded RFID system. The SER/BER performance for Scheme I and Scheme II is thoroughly compared. It is found that Scheme II with the innate real-symbol constellation yields better SER/BER performance than Scheme I. Some design guidelines for RFID-MIMO systems are pointed out.


Radio frequency identification (RFID) is a contactless, usually short distance, wireless data transmission and reception technique for identification of objects. It is believed that RFID can substitute, in the not-far future, the widely used optical barcode technology due to the limitations of the latter in i) the barcode cannot read non-line-of-sight (NLOS) tag; ii) each barcode needs personal care to be read; and iii) limited information-carrying ability of the barcode. Currently, a single antenna is usually used at the reader and tag of RFID in the market. However, RFID research community recently started to pay attention on using multiple antennas at either the reader side or the tag side [1,2]. The reason is that using multiple antennas is an efficient approach to increasing the coverage of RFID, solving the NLOS problem, improving the reliability of data communications between the reader and tag, and thus further extending the information-carrying ability of RFID. Besides, some advanced technology in multiple transmit and receive antennas (MIMO) can be used to solve the problem of detecting multiple objects simultaneously, see e.g., [3].

There have been several studies about RFID-MIMO. In general, these studies are somehow scattered in different topics. It is difficult to find the logical relationship among these studies. Therefore, the state of the art of the studies will be reviewed in a large degree in a chronological order. The work [4] first showed the idea of using multiple antennas at the reader for both transmission and reception. In [1], the authors first proposed to use multiple antennas at the tag and showed the performance gain by equipping multiple antennas at the reader (for both transmission and reception) and the tag. In [5], the multipath fading for both single-antenna based RFID channel and RFID-MIMO channel was measured and compared. The improvement on the fading depth by using MIMO can be clearly seen from the measured power distribution (see, e.g., Figure Ten therein). In [6], the authors first proposed to apply the Alamouti space-time coding (STC) technique, which is now popularly used in wireless communication systems, to the RFID systems. The reference [6] presented a closed-form expression for the bit-error rate (BER) of the RFID system with the none-coherent frequency shift keying modulation and multiple transmit antennas at the tag and single transmit/receive antenna at the reader, where the double Rayleigh fading is assumed at the forward and backward links. In [7], the interrogation range of ultrahigh-frequency-band (UHF-band) RFID with multiple transmit/receive antennas at the reader and single antenna at the tag was analyzed, where the forward and backward channels are assumed to take the Nakagami-mdistribution. In [3], the blind source separation technique in antenna array was used to solve the multiple tag identification problem, where the reader is equipped with multiple antennas. The work [8] applied the maximal ratio combining technique to the RFID receiver, where the channel of the whole chain, including forward link, backscattering coefficient, and backward link, was estimated and used as the weighting coefficient for the combining branches. In [9], a prototype for the RFID-MIMO in the UHF-band was reported. In [10], both MIMO-based zero-forcing and minimum-mean-square-error receivers were used to deal with the multiple-tag identification problem, where the channel of the whole chain was estimated, similar to the approach in [8]. It is reported in [11] that four antennas are fabricated in a given fixed surface at the reader. The measurement results showed that an increase of 83% in area gave a 300% increase in available power to turn on a given tag load and the operational distance of the powered device is increased to 100 cm by the four-antenna setup from roughly 40 cm for the single-antenna setup. The result in [11] suggests that the MIMO technique can be very promising to the RFID technology.

In the aforementioned reports, the Alamouti STC technique has been shown to be able to extend to RFID-MIMO systems. However, it can only apply to the case where the tag has two antennas. Since implementing four antennas at the tag have been shown to be possible in experiments, it is necessary to investigate the possibility of applying other STC techniques to RFID-MIMO systems. In this paper, we will study how to apply the real orthogonal design (ROD) technique, proposed by Tarokh et al. in [12], to RFID-MIMO systems. This technique is suitable for the case where the tag is equipped up to eight antennas, which should be sufficient for the RFID technology in the near future.

The paper is organized as follows. A modified MIMO-RFID channel model will be developed in Section “Channel Modeling of RFID MIMO Wireless Systems”. The ROD in [12] and the companion of the ROD (CROD) proposed in [13] are briefly introduced in Section “A Space-Time Coding Scheme for RFID MIMO Systems”. Two space-time decoding approaches for RFID MIMO systems will be discussed in Section “Two Space-Time Decoding Approaches for RFID MIMO Systems”. Section “Simulation Results” presents the simulation results and discussions, and Section “Conclusions” concludes the paper.

Channel Modeling of RFID MIMO Wireless Systems

In this paper our discussion is confined only on narrowband RFID systems. The block diagram of the RFID MIMO system is illustrated in Figure 1, where both the reader and tag are equipped with multiple antennas.

thumbnailFigure 1. A block diagram of the RFID MIMO system.

In terms of equation (1) of [1], the narrowband RFID MIMO wireless channel can be expressed as

<a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M1','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M1">View MathML</a>


where the reader and tag are equipped with Nrd and Ntag antennas, respectively, x (an Nrd × 1 vector) is the transmitted signal at the reader, y (an Nrd × 1 vector) is the received signal at the reader, n is the receiver noise, Hf (an Ntag × Nrd matrix) is the channel matrix from the reader to the tag, Hb (an Nrd×Ntag matrix) is the channel matrix from the tag to the reader, and Sis the backscattering matrix, which is also called signaling matrix. It is assumed that the Nrd antennas at the reader are used for both reception and transmission. This assumption is just for brevity of the notation. It is straightforward to extend the approach presented in this paper to the case where the reader has different numbers of antennas for reception and transmission. The channels Hf and Hb are assumed to be complex Gaussian distributed, Hf and Hb are mutually independent, and all the entries of either Hf or Hb are independent of each other. It is also assumed that Re(Hf), Im(Hf), Re(Hb), Im(Hb) are mutually independent and of the same distribution.

In most general case where the modulated backscatter signals at the tag are transferred between the antennas, the signaling matrix Sis a full matrix [1]. However no application of the full signalling matrix has been identified up to now [1]. Therefore, we will consider the situation where the RF tag antennas modulate backscatter with different signals and no signals are transferred between the antennas. In this case, the signaling matrix is a diagonal matrix [1]

<a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M2','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M2">View MathML</a>

where Γi(t) is the backscattering coefficient of ith antenna at the tag. The ith tag identity (ID) is contained in the coefficient Γi(t).

Note that in the RFID system, the transmitted signal xis mainly used to carry the transmit power, while the information data (i.e., tag ID) is carried out by S. Therefore, the central issue for the RFID is to decode Γ1, …, <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M3','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M3">View MathML</a> from the received signal. Next we transform equation (1) to the conventional form in signal processing. Let us define

<a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M4','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M4">View MathML</a>


Then equation (1) can be rewritten as

<a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M5','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M5">View MathML</a>



<a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M6','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M6">View MathML</a>

Equation (3) converts the original system model (1) to the conventional form in signal processing: the signal to be estimated or decoded is packed in a vector, whose entries are independent of each other.

A Space-Time Coding Scheme for RFID MIMO Systems

Let us first review the real orthogonal design proposed by Tarokh et al. in [12].

Definition 1

[12] A real orthogonal design <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M7','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M7">View MathML</a> of size m is an m × k matrix with entries 0, <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M8','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M8">View MathML</a>, <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M9','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M9">View MathML</a>, …, <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M10','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M10">View MathML</a> such that <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M11','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M11">View MathML</a>, where D is a diagonal matrix with diagonal entries being <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M12','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M12">View MathML</a>, i = 1,2,…,m, and the coefficients li1, li2, …, likare strictly positive integers.

In some cases, we need to explicitly specify the arguments of <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M13','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M13">View MathML</a>. In these cases, the ROD will be denoted as <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M14','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M14">View MathML</a>( <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M15','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M15">View MathML</a>, …, <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M16','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M16">View MathML</a>, where <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M17','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M17">View MathML</a>, …, <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M18','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M18">View MathML</a> are the arguments of <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M19','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M19">View MathML</a>.

The construction of general RODs can be found in [12]. For completeness, the RODs for the cases of m = 2,3,4, denoted as <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M20','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M20">View MathML</a>, <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M21','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M21">View MathML</a>, <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M22','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M22">View MathML</a> respectively, are listed as follows:

<a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M23','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M23">View MathML</a>


<a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M24','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M24">View MathML</a>


<a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M25','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M25">View MathML</a>


For the construction of <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M26','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M26">View MathML</a>, readers are referred to [12].

To formulate the decoding algorithm for the ROD, let us define the companion of the ROD as follows.

Definition 2

A companion of a real orthogonal design <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M27','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M27">View MathML</a>, denoted as <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M28','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M28">View MathML</a>, is a matrix satisfying the following equation

<a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M29','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M29">View MathML</a>

For the RODs as shown in equations (4)-(6), their CRODs are

<a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M30','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M30">View MathML</a>


<a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M31','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M31">View MathML</a>


<a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M32','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M32">View MathML</a>


For a given ROD, the calculation of its CROD is given in [13].

For the CRODs as defined in equations (7)-(9), it can be easily shown that the following equality

<a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M33','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M33">View MathML</a>


holds true, where the superscript T stands for the transpose (without conjugate!) of a matrix or vector. As can be seen from the discussion in Section “Simulation Results”, one can remove the inter-symbol interference (ISI) by using the above property of CROD, but the diversity gain thus obtained from the multiple channels is limited when the channel is complex instead of real.

To find the decoding scheme, let us consider the property of <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M34','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M34">View MathML</a>, where the superscript H stands for the conjugate transpose of a matrix or vector. We have

<a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M35','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M35">View MathML</a>


<a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M36','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M36">View MathML</a>


<a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M37','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M37">View MathML</a>


where the entry marked with ★ means that its value can be inferred from the value of its corresponding symmetric entry. It can be checked that the structural property as shown in equations (11)-(13) also holds true for higher dimensional CRODs.

Using RODs and the corresponding CRODs, a general space-time encoding scheme and two decoding approaches for RFID-MIMO systems can be developed as follows.

Consider the equivalent RFID-MIMO channel (3). Denote by Tf a symbol period. Suppose that the channels of both forward and backward links do not change with time during a coding block period KTf. The transmit signal x at the reader is also fixed during one coding block period KTf. Therefore, the equivalent composite channel <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M38','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M38">View MathML</a> will not change with time when we only consider the signal processing for one coding block. Let us define

<a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M39','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M39">View MathML</a>

Let <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M40','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M40">View MathML</a> (of dimension Ntag × K) be a ROD in variables <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M41','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M41">View MathML</a>, <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M42','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M42">View MathML</a>, …, <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M43','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M43">View MathML</a>, where <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M44','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M44">View MathML</a>, <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M45','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M45">View MathML</a>, …, <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M46','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M46">View MathML</a> are the symbols to be transmitted at the Ntag transmit antennas in one STC frame. Define

<a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M47','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M47">View MathML</a>

where w(t)is the baseband waveform of the transmit signal at the tag. The transmitted signal across the Ntag transmit antennas at the tag can be expressed as

<a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M48','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M48">View MathML</a>


where E0 is the total power used for the transmission of one symbol per time slot. The scaling coefficient <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M49','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M49">View MathML</a> is to normalize the overall energy consumption per time slot at the tag side to be E0 no matter how many antennas are deployed at the tag.

Two Space-Time Decoding Approaches for RFID MIMO Systems

The received signal after sampling can be expressed as

<a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M50','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M50">View MathML</a>


where <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M51','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M51">View MathML</a> is the receiver noise (a matrix) at the corresponding time instant. Notice that <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M52','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M52">View MathML</a> is of dimension Nrd × K, since one frame of the transmitted signal contains the pulses of K time slots.

Denote by [M]j the jth row of a matrix M. Let us consider the jth row of the matrix <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M53','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M53">View MathML</a> which is the received signal at the jth antenna of the reader for the time instants 1, …, K respectively. Let

<a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M54','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M54">View MathML</a>

Since the transmitted signal is space-time coded, the entries in [y]j should be related with each other somehow. Right-hand multiplying both sides of equation (15) with the matrix <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M55','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M55">View MathML</a>, <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M56','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M56">View MathML</a>, we have

<a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M57','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M57">View MathML</a>


<a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M58','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M58">View MathML</a>


From equation (17) we can see that the transmitted symbols <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M59','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M59">View MathML</a> are decoupled from each other in the processed signal zj through the processing algorithm (16). However, it is not efficient to decode the symbols <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M60','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M60">View MathML</a> directly from (17) since the complex channel makes the phase of <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M61','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M61">View MathML</a> randomly change over [0, 2Π]. Define

<a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M62','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M62">View MathML</a>


Multiplying both sides of (17) by <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M63','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M63">View MathML</a> will remove the phase ambiguity of the equivalent channel. This gives

<a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M64','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M64">View MathML</a>



<a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M65','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M65">View MathML</a>

To collect all the diversities provided by multiple receive antennas at the reader, we sum up all <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M66','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M66">View MathML</a>’s. This gives

<a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M67','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M67">View MathML</a>


The symbols <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M68','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M68">View MathML</a> can be easily decoded from equation (20).

For the convenience of exposition in next section, we call the encoding and decoding scheme discussed above as Scheme I.

Another decoding scheme (hereafter it is referred to as Scheme II) is to exploit the property of the matrix <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M69','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M69">View MathML</a>, as shown in equations (11)-(13). Right-hand multiplying both sides of equation (15) with the matrix <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M70','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M70">View MathML</a>, we have

<a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M71','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M71">View MathML</a>


From equations (21) and (11)-(13) we can see that, if the symbols <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M72','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M72">View MathML</a> are real, the symbol to be decoded, say <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M73','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M73">View MathML</a> for some k, and the ISI caused by other symbols, are projected into different subspaces in the complex plane: the desired signal is in the real subspace, while the ISI is in the imaginary subspace. Therefore, a very simple decoding method for this case works in the following way: From kth entry of uj (denoted as uj,k), get the real part of uj,k [denoted as Re (uj,k)], and then decode <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M74','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M74">View MathML</a> in terms of Re (uj,k).

The diversities provided by multiple receive antennas at the reader can be collected in the following way:

<a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M75','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M75">View MathML</a>


Then <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M76','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M76">View MathML</a> can be decoded in terms of <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M77','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M77">View MathML</a>.

Simulation Results

In this section, we investigate the symbol-error rate (SER) or bit-error rate (BER) performance of both Schemes I and II. In Scheme I, the quadrature phase shift keying (QPSK) modulation is used and the constellation of transmitted symbols is <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M78','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M78">View MathML</a>. In Scheme II, the binary phase shift keying (BPSK) modulation is used and the constellation of transmitted symbols is ±1. Therefore, the SER in Scheme II reduces to BER. At the transmitter of the reader, the signal x takes the form of a random vector whose entry is uniformly distributed among <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M79','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M79">View MathML</a>. It is seen that x is of unity power. Each entry of the channels Hf and Hb is of mean zero and variance unity.

In the figures to be shown, the signal-to-noise power ratio (SNR) is defined as the <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M80','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M80">View MathML</a>, where <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M81','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M81">View MathML</a> is the variance of the each entry of noise vector <a onClick="popup('http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M82','MathML',630,470);return false;" target="_blank" href="http://www.jes.eurasipjournals.com/content/2012/1/9/mathml/M82">View MathML</a>.

Figure 2 shows the SER of Scheme I for different cases: Figures 2(a) and (b) illustrate how the SER changes with Ntag for fixed Nrd, i.e., when Nrd = 1 and 4 respectively; while Figures 2(c) and (d) demonstrate how the SER changes with Nrd for fixed Ntag, i.e., when Ntag = 1 and 4 respectively.

thumbnailFigure 2. SER of RFID MIMO systems for Scheme I with QPSK modulation.(a)SER vs Ntag for Nrd = 1(b)SER vs Ntag for Nrd = 4(c)SER vs Nrd for Ntag = 1(d) SER vs Nrd for Ntag = 4.

Figure 3 shows the BER of Scheme II for different cases: Figures 3(a) and (b) illustrate how the BER changes with Ntag for fixed Nrd, i.e., when Nrd = 1 and 4 respectively; while Figures 3(c) and (d) demonstrate how the BER changes with Nrd for fixed Ntag, i.e., when Ntag = 1 and 4 respectively.

thumbnailFigure 3. BER of RFID MIMO systems for Scheme II with BPSK modulation.(a)BER vs Ntag for Nrd = 1(b)BER vs Ntag for Nrd = 4(c)BER vs Nrd for Ntag = 1(d)BER vs Nrd for Ntag = 4.

From Figures 2 and 3 the following phenomena can be observed:

Claim 1

Comparing the dashed curves, which corresponds to the performance of the non space-time encoded RFID system with single antenna at both reader and tag sides, and the solid curves in Figures 2(b), (d), and Figures 3(b), (d), we see that deploying multiple antennas at both reader and tag can greatly improve the SER/BER performance of RFID systems.

Claim 2

When Nrd is fixed to be one, increasing Ntag considerably decreases the BER of the system in Scheme II, but only marginally decreases the SER of the system in Scheme I. For example, when SNR=18 dB and Nrd = 1, the BER of Scheme II decreases from 1.6 × 10−2 at Ntag = 1 to 2.0 × 10−3 at Ntag = 2 and 8.8 × 10−5 at Ntag = 4, respectively. For the same SNR and Nrd, the SER of Scheme I decreases from 4.7 × 10−2 at Ntag = 1 to 2.9 × 10−2 at Ntag = 2 and 3.0 × 10−2 at Ntag = 4 respectively. The reason for this phenomenon is that the channel diversity provided by Ntag antennas at the tag side is harvested by Scheme II [as seen from equations (11)-(13)], but not harvested by Scheme I [as seen from equation (17)].

Claim 3

When Ntag is fixed to be one, increasing Nrd noticeably and monotonically decreases the SER or BER of the system. This phenomenon can be clearly seen from Figure 2(c) and Figure 3(c). The reason is that only the array gain is provided by the system when Ntag = 1 and it is indeed collected by both Scheme I and Scheme II. Due to the double Rayleigh fading channel, the system performance cannot be improved conspicuously by only exploiting this array gain.

Claim 4

When Nrd (or Ntag) is fixed and greater than one, increasing Ntag (or Nrd) greatly decreases the SER or BER of the system, especially for Scheme II. For example, when SNR=18 dB and Ntag = 4, the SER of Scheme I decreases from 3.0 × 10−2 at Nrd = 1 to 2.7 × 10−3 at Nrd = 2 and 7.5 × 10−5 at Nrd = 4, respectively. For the same SNR and Ntag, the BER of Scheme II decreases from 8.8 × 10−5 at Nrd = 1 to 1.2 × 10−6 at Nrd = 2 and 2.4 × 10−8 at Ntag = 4 respectively. To achieve the BER=8.8 × 10−5 for the case of Scheme II and Ntag = 4, the SNR gain is about 7.5 dB and 10 dB, respectively, by deploying Nrd = 2 and Nrd = 4 antennas at the reader, compared to the single-antenna setup at the reader. On the other side, to achieve the BER=1.3 × 10−3 for the case of Scheme II and Nrd = 4, the SNR gain is about 9 dB and 13.5 dB, respectively, by deploying Ntag = 2 and Ntag = 4 antennas at the tag, compared to the single-antenna setup at the tag. This is dramatic improvement for the system performance.

Claim 5

Scheme II yields much better SER performance than Scheme I. There are two reasons. The first reason, which is obvious, is that different symbol constellations are used in Schemes I and II. In the above simulations, one symbol in Scheme I actually carries two bit information, while one symbol in Scheme II carries only one bit information. The second reason, which is somewhat subtle to see, is that the diversity gain harvested by Scheme I is lower than that harvested by Scheme II, even though Scheme II throw away the signal in another half signal space. This observation can be seen by comparing equations (11)-(13) and (22) (for Scheme II) and equations (17), (18) and (20) (for Scheme I). For Scheme I, it is seen from (17) and (18) that the Ntag independent channels are not coherently summed. In (20), the Nrd independent summed-channels are further summed. Thus Scheme I yields a diversity order of Nrd and the system-inherited diversity order Ntag is sacrificed. For Scheme II, it is seen from (11)-(13) that the Ntag independent channels are first coherently summed, yielding a diversity order of Ntag. From (22), the Nrd independent summed-channels are further summed, yielding a diversity order of Nrd. Thus a total diversity order of Nrd × Ntag is obtained in Scheme II.

Claim 6

Comparing Figure 2 and Figure 3, we can conclude that it is better to deploy as many antennas as possible at the reader. At least the number of antennas at the reader side should be not less than the number of antennas at the tag side. In this way, the full channel diversity generated by multiple antennas at the tag can be maximally exploited.

It may be argued that it is not fair to compare the SER performance of Scheme I and Scheme II, since the former uses QPSK modulation, while the latter uses BPSK modulation. To make the comparison complete, the BER performance of Scheme I with BPSK modulation is shown in Figure 4 for the corresponding cases. Figure 2, Figure 4 and Figure 3 show that the BER performance of Scheme I is much worse than that of Scheme II, even though the BER of Scheme I with BPSK modulation is lower than the SER of Scheme I with QPSK modulation for the same configuration of antenna numbers at the reader and tag. By comparing Figure 4 and Figure 3 we can see that Claims 1-6 obtained based on the comparison between Figure 2 and Figure 3 also holds true qualitatively.

thumbnailFigure 4. BER of RFID MIMO systems for Scheme I with BPSK modulation.(a)BER vs Ntag for Nrd = 1(b) BER vs Ntag for Nrd = 4(c) BER vs Nrd for Ntag = 1(d) BER vs Nrd for Ntag = 4.

From the above phenomena, the following conclusions can be drawn: if the required data rate is not high, it is better to use real-symbol constellation for the transmitted symbols at the tag and correspondingly to use Scheme II decoding policy at the reader receiver; by keeping the cost of the system under constraint, it is better to deploy multiple tag antennas and reader antennas, and the number of reader antennas should be at least equal to the number of tag antennas.

It is interesting to compare the ROD based STC and Alamouti STC. Figure 5 shows the comparison. It can be seen that Scheme II and Alamouti STC yield the same BER performance, both are better than Scheme I. This is due to the fact that both Scheme II and Alamouti STC collect all the available channel diversities, while Scheme I does not.

thumbnailFigure 5. A comparison among Scheme I, Scheme II and the Alamouti STC. For the curves marked with “Scheme I”, “Scheme II” and “Alamouti”, Ntag = 2 and Nrd = 1.

Finally, let us compare the complexity of Scheme I and Scheme II. Both Scheme I and Scheme II perform the same processing, as shown in equations (4)-(6), for the transmitted symbols at the tag. As seen from (4)-(6), the symbol processing at the tag is quite simple: only the sign of the symbols to be transmitted needs to be changed at some time slots for some antennas. For the processing of a block of space-time decoding at the reader, Scheme I needs Nrd(K2 + K + Ntag) complex multiplications and NrdK(K − 1) + (Nrd − 1)K + Nrd(Ntag−1) = Nrd(K2 + Ntag − 1) − K complex additions, and Scheme II needs NrdK2 complex multiplications, NrdK(K − 1) complex additions, and (Nrd − 1)K real additions. Therefore, the computational burden of Scheme II is a little less than that of Scheme I. With regard to the hardware cost of the proposed STC technique, the main increase in the cost arises from the deployment of multiple antennas. The cost increase for the involved signal processing unit is negligible at either tags or readers, since the space-time encoding is very simple, which can be easily dealt with by the embedded chip at tags, and the required computational burden for the space-time decoding at readers is also negligible compared to the relatively strong computation power of readers.


In this paper, we have discussed the space-time encoding and decoding problem for RFID MIMO systems. First, a mathematical model for this kind of system is developed from the viewpoint of signal processing, which makes it easy to design the STC schemes. Two STC schemes, namely Scheme I and Scheme II, are proposed. Simulation results illustrate that the proposed approaches can greatly improve the SER/BER performance of RFID systems, compared to non space-time encoded RFID systems. Besides, the SER/BER performance for Scheme I and Scheme II is thoroughly compared and it is found that Scheme II with the innate real-symbol constellation yields better SER/BER performance than Scheme I.

As is commonly assumed in the STC technique, the channel state information (CSI) is required to be available at the receiver side of the reader to adopt the technology of Scheme I and Scheme II. The channel estimation problem for RFID systems has been discussed in [8,10], where a method for estimating the channel of the whole chain, including forward link, backscattering coefficient, and backward link, is presented. However, to estimate the forward and backford channels Hf and Hb separately remains an open issue. On the other hand, if the CSI is also available at the transmitter side of the reader, we can combine the design for the reader transmit signal and STC for the tag to further improve the system performance. For the first step towards the optimal transmit signal design at the reader side, readers are referred to the reference [14].

Competing interests

The authors declare that they have no competing interests.


  1. JD Griffin, GD Durgin, Gains for RF tags using multiple antennas. IEEE Trans. Antennas Propag 56, 563–570 (2008)

  2. Karmakar NC (ed.), Handbook of Smart Antennas for RFID Systems ((Wiley, New Jersey, 2010)

  3. AF Mindikoglu, A-J van der Veen, Separation of overlapping RFID signals by antenna arrays. in Proc, ed. by . IEEE Int. Conf. Acoustics, Speech and Signal Processing 2008 (Las Vegas, USA), pp. 2737–2740 (31 Mar), . - 4 Apr. 2008 OpenURL

  4. MA Ingram, MF Demirkol, D Kim, Transmit diversity and spatial multiplexing for RF links using modulated backscatter. in Int, ed. by . Symp. Signals, Systems, and Electronics (Tokyo, Japan) 24-27 July 2001 OpenURL

  5. JD Griffin, GD Durgin, Multipath fading measurements for multi-antenna backscatter RFID at 5.8 GHz. in Proc, ed. by . 2009 IEEE Int. Conf. RFID (Orlando, USA), pp. 322–329 (27-28 Apr), . 2009 OpenURL

  6. C He, ZJ Wang, Gains by a space-time-code based signaling scheme for multiple-antenna RFID tags. in Proc, ed. by . 23rd Canadian Conf. Electrical and Computer Engineering (Calgary, Canada) 2-5 May 2010 OpenURL

  7. D-Y Kim, H-S Jo, H Yoon, C Mun, B-J Jang, J-G Yook, Reverse-link interrogation range of a UHF MIMO-RFID system in Nakagami-m fading channels. IEEE Trans. Industrial Electronics 57, 1468–1477 (2010)

  8. C Angerer, R Langwieser, G Maier, M Rupp, Maximal ratio combining receivers for dual antenna RFID readers. in IEEE 2009 Int, ed. by . Microwave Workshop on Wireless Sensing, Local Positioning, and RFID (Cavtat, Croatia) (24-25 Sept), . 2009 OpenURL

  9. R Langwieser, C Angerer, AL Scholtz, A UHF frontend for MIMO applications in RFID. in Proc, ed. by . IEEE 2010 Radio and Wireless Symp (New Orleans, USA), pp. 124–127 (10-14 Jan), . 2010 OpenURL

  10. C Angerer, R Langwieser, M Rupp, RFID reader receivers for physical layer collision recovery. IEEE Trans. Commun 58, 3526–3537 (2010)

  11. M Mi, MH Mickle, C Capelli, H Switf, RF energy harvesting with multiple antennas in the same space. IEEE Antennas Propagation Mag 47(5), 100–106 (2005)

  12. V Tarokh, H Jafarkhani, AR Calderbank, Spacetime block codes from orthogonal designs. IEEE Trans. Inform. Theory 45, 1456–1467 (1999). Publisher Full Text OpenURL

  13. T Kaiser, F Zheng, Ultra Wideband Systems with MIMO (Wiley, Chichester, 2010)

  14. F Zheng, T Kaiser, On the transmit signal design at the reader for RFID MIMO systems. in 4th Int, ed. by . EURASIP Workshop on RFID Technology (RFID 2012) (Turin, Italy) (27-28 Sept), . 2012 OpenURL