As the Internet of Things (IoT) becomes the key technology of the future, many studies concerning communication technologies for IoT devices have been carried out. Ambient backscatter communication is one of the communication technologies. While traditional radio frequency (RF) communication technologies generate RF signals, ambient backscatter tags reflect ambient RF signals to express bit sequences (e.g., reflection is ‘1’ and non-reflection is ‘0’). Since the tags do not generate RF signals, the backscatter tags do not need radiating circuit. Instead, the tags have switches for changing the impedances of antennas. This design reduces the power consumption of the backscatter tags. To operate the switches without a battery, the backscatter tags use energy harvesting circuit. The harvesting circuit converts ambient RF signals into DC current. Recent studies for the ambient energy harvesting increase the feasibility of the backscatter tags [1]–[5].
Typically, backscatter systems are classified into monostatic or bistatic systems. In a monostatic system, a backscatter tag modulates signals from a reader without any other RF sources. However, monostatic backscattering incurs round trip path loss on the modulated signals. To prevent the round trip path loss and increase the coverage of the backscatter tags, the ambient backscatter systems operate as bistatic mode. Bistatic systems use signals from an ambient carrier emitter to convey data by backscattering. The difference between bistatic backscatter and ambient backscatter systems is that in the bistatic systems, a dedicated carrier emitter exists but in the ambient backscatter systems, non-dedicated RF waves are used. For the past four years, various ambient backscatter systems have been presented [6]–[14].
Among the refereed ambient backscatter systems, the Wi-Fi backscatter systems have some attractive characteristics compared with other ambient backscatter systems. The characteristics are that many Wi-Fi devices already exist and only software modification is needed for application. In this paper, an improved scheme for detecting the backscattered Wi-Fi signals is proposed. When the Wi-Fi reader receives the backscattered signals, the Wi-Fi signals from the AP are also received. Since the backscattered Wi-Fi signals experience more attenuation than the direct Wi-Fi signals, the detection of the backscattered signals is performed in poor SINR environment. For improving the performance of the detection, the Wi-Fi reader uses multiple antennas and the thresholds for detecting backscattered signals are determined appropriately. The bit error rate (BER) curves of simulations show the improved detection performance and improved coverage.
In [6] and [11], the signals of TV towers were used. Liu showed that the TV signals were useful for the backscatter communication and two applications were performed [6]. Parks used $\mu $
code and multi antennas to increase coverage and data rate [11]. The proposed method by Parks achieved hundred times increase on the data rate and forty times increase on the coverage. In [13], hybrid backscatter communication was proposed. Since the ambient backscatter communication does not use dedicated RF waves, the data rate of the ambient backscatter communication depends on the environment. To overcome this problem, the hybrid communication used bistatic backscatter mode with ambient backscatter mode. In [14], the transmission of symbols containing multiple bits for ambient backscatter was analysed. The conclusion of [14] was that proper selection of containing bits per symbol increases the throughput of the ambient backscatter communication. In [7]–[10], [12], and [15], Wi-Fi backscatter systems were presented. In [7], a tag backscatters Wi-Fi signals from an AP to make changes in the channel. Then, a Wi-Fi reader receives Wi-Fi packets and checks the channel state information (CSI). If the tag reflects Wi-Fi signals, the CSI of Wi-Fi packets changes. In [15], backscatter communication operates in monostatic mode. A modified Wi-Fi AP transmits Wi-Fi signals and the AP receives the backscattered signals as a reader. To avoid the interference of the self Wi-Fi signals, the modified AP performs self interference cancellation. The system achieved throughput of 1 Mbps at 5 meter distance from the backscatter tag. However, the system needs hardware and software modification of an AP. In [12], a backscatter tag compatible with commodity 802.11b devices was proposed. The proposed tag of [12] generates 802.11b signals by backscattering to embed its information on the packets. Thus, commodity 802.11b devices can decode the embedded information. In [8]–[10], schemes for improving coverage and throughput of Wi-Fi backscatter systems were presented. Ko used a precoding method to increase received power of backscattered signals [8] and Ha presented a phase signaling method to increase throughput [10]. However, the schemes need additional channel estimation for links of backscattered signals or complex computation for training sequences. In [10], beamforming and power control methods were proposed to overcome channel fading effects in the downlink of backscatter systems.
Fig. 1 shows the Wi-Fi backscatter system. In the system, the Wi-Fi AP broadcasts Wi-Fi packets. A backscatter tag reflects the packets to transmit data. This transmission from the tag to the reader is uplink. In the Fig. 1, the uplink is expressed by using a solid arrow between the tag and the reader. In the system, the Wi-Fi reader transmits Wi-Fi signals to control the tag. This transmission from the reader to the tag is the downlink transmission. The dotted arrow between the tag and the reader presents the link. ${h_{st}}$
and ${h_{sr}}$
mean channel coefficients from the AP to the tag and the reader. ${h_{tr}}$
and $h_{rt}^{`}$
mean channel coefficients of the uplink and the downlink.
A. Uplink Transmission
In the uplink transmission, the tag changes the impedance of an antenna by switching loads which are connected to the antenna. The impedances of the loads are selected to maximize the difference for the coefficients of reflection. Since the reflection of the tag changes the ambient channel of the reader, the reader can detect the difference between reflection state and non-reflection state from the CSI of Wi-Fi packets. This detection method is efficient in that any Wi-Fi devices can detect the backscattered signals using modified software without hardware modification. In [7], to detect the modulated data, the CSI of multiple packets is processed by moving average and maximum ratio combining (MRC). However this method did not achieve BER that is less than 10−2 at long distance (over two meters). The period of the backscattered signals is determined to be longer than the period of Wi-Fi packets. Hence interference to the existing Wi-Fi communication is prevented.
The power of the backscattered signals at the reader is expressed as [16]\begin{equation} {P_{r}} = \frac {{P_{t}{G_{t}}\Delta \sigma {G_{r}}{\lambda ^{2}}}}{{{{\left ({ {4\pi } }\right )}^{3}}d_{1}^\gamma d_{2}^\gamma }}, \end{equation}
View Source
\begin{equation} {P_{r}} = \frac {{P_{t}{G_{t}}\Delta \sigma {G_{r}}{\lambda ^{2}}}}{{{{\left ({ {4\pi } }\right )}^{3}}d_{1}^\gamma d_{2}^\gamma }}, \end{equation}
where ${P_{t}}$
is the transmitted power at the AP, ${G_{t}}$
and ${G_{r}}$
are the antenna gains of the AP and the reader, ${\Delta \sigma }$
is differential radar cross section(RCS), $\lambda $
is the wavelength of the Wi-Fi signals, ${d_{1}}$
and ${d_{2}}$
are distances from the AP to the tag and from the tag to the reader, the $\gamma $
is path loss exponent. The path loss exponent is typically from 1.5 to 1.9 in indoor channel and from 3 to 6 in outdoor channel [20]–[22]. ${\Delta \sigma }$
of (1) is determined by the parameters of the tag as follows \begin{equation} \Delta \sigma = \frac {\lambda ^{2}}{4\pi }G_{tag}^{2}\left |{ {\Gamma _{1}^{*} - \Gamma _{2}^{*}} }\right |\!, \end{equation}
View Source
\begin{equation} \Delta \sigma = \frac {\lambda ^{2}}{4\pi }G_{tag}^{2}\left |{ {\Gamma _{1}^{*} - \Gamma _{2}^{*}} }\right |\!, \end{equation}
where ${G_{tag}}$
is the antenna gain of the tag, ${\Gamma }$
is the coefficient of reflection which is calculated as \begin{equation} {\Gamma ^{*}} = \frac {{Z_{a}^{*} - {Z_{L}}}}{{Z_{a} + {Z_{L}}}}, \end{equation}
View Source
\begin{equation} {\Gamma ^{*}} = \frac {{Z_{a}^{*} - {Z_{L}}}}{{Z_{a} + {Z_{L}}}}, \end{equation}
where ${Z_{L}}$
is the impedance of a load, ${Z_{a}}$
is the impedance of the antenna. The received power of (1) is weaker than the power of direct Wi-Fi signals due to two path loss of ${d_{1}}$
and ${d_{2}}$
. In [7], long code was used to overcome the poor SINR.
B. Downlink Transmission
The downlink is transmission from the Wi-Fi reader to the backscatter tag. Since the tag operates by using only harvested energy, the tag is composed of analog circuit that consumes low power [7]. Fig. 2 shows the transmission of the downlink. In the downlink, the reader encodes data with presence and absence of packets (e.g., presence of a packet is bit ‘1’ and absence of a packet is bit ‘0’). To detect the presence of the packets, the circuit of the tag performs energy detection. If multiple tags exist or other Wi-Fi devices communicate with the AP, the reader transmits a CTS_to_SELF packet of 802.11 standard to avoid collision before transmission. This packet forces other Wi-Fi devices to be silence for specific time period. Thus, the tag can detect only the packets from the reader.
C. Conventional Uplink Detection Scheme
Fig. 3 shows frame structure of IEEE 802.11a for a packet. The IEEE 802.11a standard is implemented at physical layer of Wi-Fi and the frame structure of 802.11a is also used in 802.11n and 802.11ac for compatibility. In the structure, physical layer convergence protocol (PLCP) preamble is placed at the head of the frame. At a receiver, this preamble is used for synchronization and channel estimation. The preamble is composed of short training sequence (STS) and long training sequence (LTS). In the channel estimation, received LTS is divided by transmitted LTS to take CSI. The Wi-Fi reader uses this CSI to detect the encoded data by the backscatter tag. The received LTS is expressed as \begin{align} {y_{T_{n},l}}(t)=&{h_{sr,l}}(t) * {x_{T_{n}}}(t)\notag \\&\qquad +\, {\alpha _{l}}{B_{l}}{h_{tr,l}}(t) * {h_{st,l}}(t) * {x_{T_{n}}}(t) + {w_{l}}(t),\qquad \end{align}
View Source
\begin{align} {y_{T_{n},l}}(t)=&{h_{sr,l}}(t) * {x_{T_{n}}}(t)\notag \\&\qquad +\, {\alpha _{l}}{B_{l}}{h_{tr,l}}(t) * {h_{st,l}}(t) * {x_{T_{n}}}(t) + {w_{l}}(t),\qquad \end{align}
where $l$
is an index of the Wi-Fi packets, ${x_{T_{n}}}(t)$
is the $n$
th LTS of the two repeated LTSs, ${\alpha _{l}}$
is an attenuation constant at the antenna of the tag, $B_{l}$
is the $l$
th encoded symbol by the tag and can be ‘1’ or ‘0’ according to the data, ${w_{l}}(t)$
is additive white Gaussian noise. Since 802.11a uses orthogonal frequency division multiplexing (OFDM), the frequency response of the channel is estimated to compensate the frequency domain distortion of the received signals. The received LTS of frequency domain is expressed as \begin{align} {Y_{T_{n},l}}[k]=&{H_{sr,l}}[k]{X_{T_{n}}}[k]\notag \\&\qquad +\, {\alpha _{l}}{B_{l}}{H_{tr,l}}[k]{H_{st,l}}[k]{X_{T_{n}}}[k] + {W_{l}}[k],\qquad \end{align}
View Source
\begin{align} {Y_{T_{n},l}}[k]=&{H_{sr,l}}[k]{X_{T_{n}}}[k]\notag \\&\qquad +\, {\alpha _{l}}{B_{l}}{H_{tr,l}}[k]{H_{st,l}}[k]{X_{T_{n}}}[k] + {W_{l}}[k],\qquad \end{align}
where $k$
is an index of subcarriers. (5) is the result of analog to digital conversion and fast Fourier transform (FFT). The simplified CSI from the LTS is computed as \begin{equation} CS{I_{T_{n},l}}[k] = {\alpha _{l}} B_{l}H{}_{tag,l}[k] + {\eta _{l}}[k], \end{equation}
View Source
\begin{equation} CS{I_{T_{n},l}}[k] = {\alpha _{l}} B_{l}H{}_{tag,l}[k] + {\eta _{l}}[k], \end{equation}
where \begin{align} H{}_{tag,l}[k]=&{H_{tr,l}}[k]{H_{st,l}}[k], \\ {\eta _{l}}[k]=&{H_{sr,l}}[k] + {W_{l}}[k]/{X_{T_{n}}}[k]. \end{align}
View Source
\begin{align} H{}_{tag,l}[k]=&{H_{tr,l}}[k]{H_{st,l}}[k], \\ {\eta _{l}}[k]=&{H_{sr,l}}[k] + {W_{l}}[k]/{X_{T_{n}}}[k]. \end{align}
In the 802.11a standard, the repeated CSI is averaged for gain of signal to noise power ratio (SNR). In the uplink, to distinguish if $B_{l}$
is ‘1’ or ‘0’, the distance between the averaged CSI of reference packets and data packets is computed [8], [10]. The reference packets are preamble for backscatter communication and show distorted results of encode packets. The distances are \begin{align} {D_{1}}=&\sum \limits _{k = 0}^{K - 1} {\left |{ {CS{I_{l}}[k] - CS{I_{thr1}}[k]} }\right |}, \\ {D_{0}}=&\sum \limits _{k = 0}^{K - 1} {\left |{ {CS{I_{l}}[k] - CS{I_{thr0}}[k]} }\right |}, \end{align}
View Source
\begin{align} {D_{1}}=&\sum \limits _{k = 0}^{K - 1} {\left |{ {CS{I_{l}}[k] - CS{I_{thr1}}[k]} }\right |}, \\ {D_{0}}=&\sum \limits _{k = 0}^{K - 1} {\left |{ {CS{I_{l}}[k] - CS{I_{thr0}}[k]} }\right |}, \end{align}
where $K$
is the number of subcarriers. $CS{I_{thr1}}[k]$
and $CS{I_{thr0}}[k]$
are the averaged CSI of packets for the preamble computed as \begin{align} CS{I_{thr1}}[k]=&\frac {1}{2N}\sum \limits _{l = 0,{B_{l}} = 1}^{N - 1} {CS{I_{l}}[k],} \\ CS{I_{thr0}}[k]=&\frac {1}{2N}\sum \limits _{l = 0,{B_{l}} = 0}^{N - 1} {CS{I_{l}}[k],} \end{align}
View Source
\begin{align} CS{I_{thr1}}[k]=&\frac {1}{2N}\sum \limits _{l = 0,{B_{l}} = 1}^{N - 1} {CS{I_{l}}[k],} \\ CS{I_{thr0}}[k]=&\frac {1}{2N}\sum \limits _{l = 0,{B_{l}} = 0}^{N - 1} {CS{I_{l}}[k],} \end{align}
where $N$
is the number of preamble packets. The detection is performed as \begin{equation} \begin{cases} {B_{l}} = 1,& {\text {if}}~{D_{1}} \le {D_{0}},\\ {B_{l}} = 0,& {\text {if}}~{D_{1}} > {D_{0}}. \end{cases} \end{equation}
View Source
\begin{equation} \begin{cases} {B_{l}} = 1,& {\text {if}}~{D_{1}} \le {D_{0}},\\ {B_{l}} = 0,& {\text {if}}~{D_{1}} > {D_{0}}. \end{cases} \end{equation}
For modulation of multiple bits, amplitude modulation is used. The backscatter tag has multiple loads to express multiple bits. The loads are connected to the tag antenna and determine the power levels of the backscattered signals. If ${\log _{2}}M$
bits are modulated into one symbol, the thresholds for detecting the symbol are calculated as, \begin{equation} CS{I_{thr\_{}i}}[k] = \frac {i}{M - 1}\left \{{ {CS{I_{thr1}}[k] - CS{I_{thr0}}[k]} }\right \}\!, \end{equation}
View Source
\begin{equation} CS{I_{thr\_{}i}}[k] = \frac {i}{M - 1}\left \{{ {CS{I_{thr1}}[k] - CS{I_{thr0}}[k]} }\right \}\!, \end{equation}
where $i$
is an index for the power levels and the range is from 0 to $M-1$
. The detection of the symbols is performed by calculating the distance between the thresholds and the CSI of the backscattered packets.
SECTION IV.
Determination of Thresholds Using Multiple Antennas
The conventional detection scheme of backscattered signals uses preamble packets as thresholds for detection. This detection scheme is different from traditional detection methods in that the thresholds change according to channel environment. Also the performance of the conventional detection scheme is determined by the quality of calculated thresholds. In other words, the performance of the uplink transmission is limited by the quality of the thresholds. To improve the quality of the thresholds, the determination scheme for the thresholds using multiple antennas is presented in this paper. The Wi-Fi reader for this method has multiple antennas for reception of Wi-Fi signals. Recent Wi-Fi standards support multiple input and multiple output (MIMO) technique for high data rate [17], [18]. Therefore, the requirement for the proposed method is only software modification at the Wi-Fi devices. The multiple received signals typically experience different channel and the threshold values are also different. The received signals by multiple antennas of the reader and CSI of the signals are as follows, \begin{align} {{\mathbf {Y}}_{l}}=&\left ({ {\begin{array}{*{20}{c}} {{H_{sr,l,1}}[k]}&\quad {{\alpha _{l,1}}{H_{tag,l,1}}[k]}\\ \vdots &\quad \vdots \\[6pt] {{H_{sr,l,R}}[k]}&\quad {{\alpha _{l,R}}{H_{tag,l,R}}[k]} \end{array}} }\right ){{\mathbf {S}}_{l}} + {{\mathbf {W}}_{l}},\qquad \\[6pt] {{\mathbf {S}}_{l}}=&\left ({ {\begin{array}{*{20}{c}} {{X_{T_{n}}}[k]}\\ {B_{l}{X_{T_{n}}}[k]} \end{array}} }\right )\!, \\[6pt] CS{I_{l,r}}[k]=&{Y_{l,r}}[k]/{X_{T_{n}}}[k]. \end{align}
View Source
\begin{align} {{\mathbf {Y}}_{l}}=&\left ({ {\begin{array}{*{20}{c}} {{H_{sr,l,1}}[k]}&\quad {{\alpha _{l,1}}{H_{tag,l,1}}[k]}\\ \vdots &\quad \vdots \\[6pt] {{H_{sr,l,R}}[k]}&\quad {{\alpha _{l,R}}{H_{tag,l,R}}[k]} \end{array}} }\right ){{\mathbf {S}}_{l}} + {{\mathbf {W}}_{l}},\qquad \\[6pt] {{\mathbf {S}}_{l}}=&\left ({ {\begin{array}{*{20}{c}} {{X_{T_{n}}}[k]}\\ {B_{l}{X_{T_{n}}}[k]} \end{array}} }\right )\!, \\[6pt] CS{I_{l,r}}[k]=&{Y_{l,r}}[k]/{X_{T_{n}}}[k]. \end{align}
${Y_{l,r}}[k]$
is the $r$
th element of ${{\mathbf {Y}}_{l}}$
and means the received signal by the $r$
th antenna. ${{\mathbf {W}}_{l}}$
means an AWGN vector. In the proposed determination scheme, the CSI thresholds are calculated as \begin{align} CS{I_{thr1,r}}[k]=&\frac {1}{2N}\sum \limits _{l = 0,{B_{l}} = 1}^{N - 1} {CS{I_{l,r}}[k],} \\ CS{I_{thr0,r}}[k]=&\frac {1}{2N}\sum \limits _{l = 0,{B_{l}} = 0}^{N - 1} {CS{I_{l,r}}[k],} \end{align}
View Source
\begin{align} CS{I_{thr1,r}}[k]=&\frac {1}{2N}\sum \limits _{l = 0,{B_{l}} = 1}^{N - 1} {CS{I_{l,r}}[k],} \\ CS{I_{thr0,r}}[k]=&\frac {1}{2N}\sum \limits _{l = 0,{B_{l}} = 0}^{N - 1} {CS{I_{l,r}}[k],} \end{align}
and the Wi-Fi reader determines the CSI thresholds whose distance between the thresholds of ‘1’ and ‘0’ is maximum among the thresholds of received signals. The determination of the thresholds is performed as follows, \begin{equation} {r_{M}} = \mathop {\arg \max }\limits _{r} \left |{ {CS{I_{thr1,r}}[k] - CS{I_{thr0,r}}[k]} }\right |\!, \end{equation}
View Source
\begin{equation} {r_{M}} = \mathop {\arg \max }\limits _{r} \left |{ {CS{I_{thr1,r}}[k] - CS{I_{thr0,r}}[k]} }\right |\!, \end{equation}
where ${r_{M}}$
is the antenna whose the distance of thresholds is maximum. The determined $CS{I_{thr1,{r_{M}}}}[k]$
and $CS{I_{thr0,{r_{M}}}}[k]$
are used for the detection process of (9), (10), and (13). Fig. 4 shows distance between the thresholds of $k$
subcarrier on complex plane. Fig 5. shows the complex thresholds of multiple received Wi-Fi signals. The number of used antennas is 8. Among the thresholds in Fig. 5, the thresholds of the 4th antenna have the maximum distance. Therefore, the signals of the 4th antenna are used for the subcarrier of Fig. 5. Most detection methods using multiple antennas need channel information for each received signals to get diversity gain. In case of backscatter communication, channel estimation is difficult since the power of the backscattered signals is weak. However, this method does not require additional channel estimation for ${h_{st}}$
and ${h_{tr}}$
. The same channel information with the conventional detection method is used. The performance of this proposed method increases according to the number of received signals and the SNR of the received signals. Therefore, average operation gives more chance to improve the performance of communication by the multiple received signals since the SNR of the received signals is improved by the average operation. The average operation is performed within the time period that the packets experience similar channel effect. The average operation is applied as \begin{equation} {Y_{L,r}}[k] = \frac {1}{L}\sum \limits _{l = 0}^{L - 1} {{Y_{l,r}}[k]}, \end{equation}
View Source
\begin{equation} {Y_{L,r}}[k] = \frac {1}{L}\sum \limits _{l = 0}^{L - 1} {{Y_{l,r}}[k]}, \end{equation}
where $L$
is the number of the packets which experience similar channel effect.
SECTION V.
Simulation Results and Discussion
In this section, simulation results are shown. In the simulation, BER is measured according to SNR and distance from the tag to the reader. For simulation, measured channel information and attenuation property of received power in real environment are used. The CSI is obtained by Intel link 5300 CSI tool driver and channel coefficients for simulation are made by using the obtained CSI. The channel fading effect which backscattered signals experience is similar to that of UWB channel model [21]. In Fig. 6, the BER performances of the conventional detection method using theoretical UWB channel model and the measured parameters. For the theoretical UWB channel model, CM1 channel model is used [19]. The abscissa means SNR of the received Wi-Fi signals by the Wi-Fi reader and the ordinate means BER of the backscattered signals. The distance of all links is normalized to 1. In the calculation of (1) for received power, the 2.4GHz Wi-Fi signal is considered and the path loss exponent $\gamma $
is set to 1.9. This path loss exponent value is based on the measurement of the real environment. ${\Delta \sigma }$
is normalized to 1. In Fig. 6, it is noticed that the BER performances for the two channel environments are similar. Fig. 7 shows the measured BER with SNR. The numbers of used antennas in the simulation are 1, 2, 4, and 8. The used amplitude modulations are 2-ary, 4-ary, and 8-ary amplitude modulations. Table 1 shows the used parameters. Since the backscattered signals are received in poor SINR environment, flat BER appears at SNR lower than 15dB in Fig. 7. The improvement by the proposed method increases with the number of antennas and the improvement by increasing the number of antennas increases as the number of bits modulated is reduced. In Fig. 8, the BER performance of the proposed method after average operation is shown. The measured cases are that the the numbers of used antennas are 1, 2, and 4 with averaging of 10 and 20 packets. In Fig. 7, the improvement of the proposed method is not shown at SNR lower than 15dB. However, Fig. 8 shows that the performance improvement by proposed method is possible with average operation at the low SNR. Fig. 9 presents the BER performance over distance between the tag and the reader. For simulation, the transmitted power of the AP for transmission and distance from the AP to the tag are set to 199mW and 2m respectively. The power of noise at the reader is set to −90dBW. In the simulation, maximum data rate is assumed. The maximum data rate is achieved by transmitting packets which have only the PLCP preamble and the header. For maximum data rate, the minimum short inter frame space (SIFS) of $10~\mu $
sec is selected. Thus, the calculated maximum data rate is 30kbps. The number of packets for preamble can be determined according to the frame size of backscatter communication to prevent overhead. In the simulation, the number of packets for preamble is set to 8 packets and the frame size is set to 60 packets. Table 2 shows the used parameters. In Fig 9, the improved coverage by proposed method is shown. The conventional method in Fig. 9 is the conventional detection method that uses one antenna at the reader without average operation. Fig. 9 shows that the difference between BER curves for the methods using average of 20 packets is larger than that of the methods using average of 10 packets. The results mean that the improvement of coverage by proposed method can be increased with the increase of averaged packets.
The Wi-Fi backscatter communication is a promising communication technology for IoT devices and sensors which do not have batteries since already many Wi-Fi devices exist and the backscatter technology makes the battery-free device communicate with the conventional Wi-Fi devices. In this paper, an improved detection scheme using multiple antennas for detecting backscattered Wi-Fi signals is presented. The presented scheme determines the best thresholds from multiple received signals to improve the conventional detection scheme. The improvement of the proposed scheme increases with the number of antennas at the Wi-Fi reader and the improvement by increasing the number of antennas increases as the SNR of the received Wi-Fi signals are improved. The simulation results show the improved BER performance and the increased coverage compared with the conventional detection scheme.