Figures
Abstract
This paper examines the synergistic integration of uplink Device-to-Device (D2D), backscatter, and short-packet communication paradigms, highlighting their collective potential to revolutionize next-generation wireless systems. By enhancing spectral efficiency and supporting massive connectivity through diverse receiver techniques, this approach is undeniably transformative. Then, we analyze the approximation forms of average block error ratio (BLER) across three scenarios: selective combining - random selection (SC-RAN), selective combining - maximal ratio combining (SC-MRC), and full-maximal ratio combining (Full-MRC). Results indicate that the full-MRC scheme consistently outperforms the others in reducing BLER, particularly in low-latency scenarios. The findings serve as a foundation for making strategic design decisions about the system’s core operational parameters. Our numerical results strongly validate our analytical findings, clearly demonstrating that the full-MRC technique significantly outperforms others in improving BLER.
Citation: Le S-P, Minh BV, Sy VQ, Voznak M (2025) On the performance of uplink D2D-assisted backscatter employing short packet communication. PLoS One 20(11): e0336406. https://doi.org/10.1371/journal.pone.0336406
Editor: Neng Ye, Beijing Institute of Technology, CHINA
Received: August 13, 2025; Accepted: October 24, 2025; Published: November 26, 2025
Copyright: © 2025 Le et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Data Availability: All relevant data are within the paper.
Funding: This research was supported by the European Union (EU) within the REFRESH project – Research Excellence For Region Sustainability and High-tech Industries ID No. CZ.10.03.01/00/22_003/0000048 of the European Just Transition Fund, and also supported by the Ministry of Education, Youth and Sports of the Czech Republic (MEYS CZ) within a Student Grant Competition in the VSB – Technical University of Ostrava under project ID No. SGS SP2025/013.
Competing interests: The authors have declared that no competing interests exist.
1 Introduction
Device-to-Device (D2D) communication represents a contemporary advancement in wireless technology, facilitating direct interaction between two or more devices without relying on conventional network infrastructure like base stations or access points [1,2]. This direct connection among user equipment (UE) is engineered to enhance network efficiency, support novel applications, and address the increasing demand for high data rates and low latency within mobile networks [3,4]. It is commonly used in scenarios where devices need to share information quickly and securely [5], such as file sharing, multiplayer gaming, location-based services, and IoT (Internet of Things) applications [6,7]. Moreover, in uplink D2D communication as discussed in [8,9], specific, the authors in [8] assertively introduced and examined an innovative hybrid cellular and bidirectional D2D transmission scheme. This approach strategically employs cooperative non-orthogonal multiple access (NOMA) to improve communication efficiency. As detailed in [9], a semi-centralized cooperative control method is proposed with precision, incorporating two distinct cooperative schemes based on D2D communication.
Beside, Backscatter communication (BackCom) is a wireless communication technique that enables devices to transmit data by reflecting or modulating existing ambient radio frequency (RF) signals, rather than generating their own RF signals [10]. In backscatter communication, a device acts as a passive transponder, absorbing and then modulating RF signals from a nearby transmitter to convey information [11]. This allows the device to communicate with other devices or a central hub without the need for its own RF transmitter, significantly reducing power consumption and extending battery life [12]. One of the key advantages of backscatter communication is its low power consumption, making it suitable for battery-operated devices and IoT applications where energy efficiency is critical [13]. It also allows for long-range communication with minimal infrastructure requirements, as devices can leverage existing RF signals for communication [14]. In addition, the necessity for enhancing spectral and energy efficiency is becoming increasingly critical for the development of future wireless networks. In this context, Backcom technology, in conjunction with reconfigurable intelligent surfaces (RISs), has recently emerged as a promising solution to improve the performance of wireless communications [15–17]. Recently, some advance research combining with BackCom have been also introduced in [18–21]. In [18], Manzoor Ahmed et.al have utilized NOMA in conjunction with BackCom as a promising strategy to improve energy efficiency, maximize sum rates, ensure security, and optimize resource allocation. The authors in [19] proposed a framework of cognitive ambient backscatter communication (C-AmBC) networks in the presence of an unlicensed eavesdropper to investigate the reliability and security of their proposed framework by invoking the outage probability (OP) and intercept probability (IP) expressions. A mutualistic cooperative BackCom network with hardware impairments (HIs) at all the active transceivers and a non-linear energy harvesting circuit at each IoT device has been studied in [20]. Finally, the authors in [21] demonstrated the performance of BackCom over the position-flexible fluid antenna system (FAS) technology to evaluate the quality of their proposed system in terms of OP and the delay outage rate (DOR) derivations.
Another aspect in new areas of research, short packet communication (SPC) addresses the critical need for ultra-reliable low-latency transmission (URLLC) in 5G/6G applications, where blocklengths of <1,000 bits prioritize rapid delivery over traditional channel coding gains, and involves the transmission of small data packets between devices [22–24]. Finite blocklength theory reveals a fundamental trade-off: reducing packet length from 1,000 to 100 bits increases outage probability by 35–60% at 15 dB SNR, necessitating physical-layer security (PLS) mechanisms like artificial noise injection to maintain confidentiality [25,26]. In [27], the SPC is investigated by adopting the average block error ratio (BLER) under impact of co-channel interference affecting on the relays in a cooperative system where one multiple antenna transmitter communicates with one single antenna receiver with assistance of multiple relay nodes is considered. The other aspect, the authors in [28] proposed and studied performance of RISs in multi-hop communication networks employing SPC by calculating the end-to-end BLER of the proposed framework.
Furthermore, previous works have explored the combination of individual pairs of these technologies. For instance, backscatter has been integrated with D2D to enable wireless-powered relaying and energy-efficient cooperative transmission [29,30]. Meanwhile, SPC has been applied to D2D to improve reliability and latency in interference-limited scenarios [31,32]. Similarly, the combination of backscatter and SPC has been shown to enhance low-power communication efficiency while supporting hybrid operation between long and short packets [33,34]. These studies confirm the benefits of each pairwise combination, but to the best of our knowledge, no prior work has simultaneously considered D2D, BackCom, and SPC. Motivated by these promising results, in this paper we jointly integrate all three technologies. Our study leverages (i) the self-sustainability and energy efficiency of BackCom, (ii) the flexibility and proximity gains of D2D, and (iii) the low latency and high reliability of SPC. This synergy enables the design of self-sustainable, reliable, and ultra-low-latency systems for future wireless networks, which constitutes the main contribution of this manuscript. In particular, recent works have highlighted the importance of jointly considering reliability, latency, and energy efficiency when designing IoT networks. For example, studies such as [35–37] analyze energy-efficient transmission and resource allocation schemes for URLLC and demonstrate that optimizing system parameters can substantially reduce energy consumption without sacrificing reliability. Similarly, [38–40] investigate energy–latency tradeoffs and lightweight transmission strategies tailored to resource-constrained IoT devices. Moreover, the recent work [41] explicitly shows that certain resource configurations can achieve up to 80× higher energy efficiency compared to less efficient ones, while maintaining competitive latency performance. In addition, recent studies have explored related frameworks that further highlight the potential of combining backscatter and SPC. For example, the work in [42] investigates short-packet backscatter-assisted wireless-powered relaying with NOMA, providing mode-selection and performance-estimation strategies to optimize reliability and resource allocation. Likewise, cooperative and distributed multi-user detection techniques, such as those discussed in [43], demonstrate how scalable detection methods can significantly enhance system performance in densely connected scenarios. These studies emphasize the importance of incorporating both cooperative reception and backscatter–SPC integration into future wireless system designs. Despite these advances, the uplink D2D, BackCom and SPC lies in their combined potential to enhance the capabilities of connected devices. Furthermore, these technologies are further enhanced by diversity techniques such as selective combining (SC) and maximal ratio combining (MRC), which play a crucial role in improving communication reliability and performance in challenging wireless environments. SC selects the best signal path for reception, while MRC combines multiple received signals in proportion to their signal-to-noise ratios to improve the overall signal quality [44]. These diversity techniques help combat signal fading, interference, and other impairments, thereby enhancing communication performance in challenging wireless environments. However, it is worth noting that while Full-MRC provides the highest reliability, it also entails significant computational and hardware complexity, which may limit its feasibility in resource-constrained IoT deployments [45–47]. In contrast, low-complexity schemes such as SC-MRC can provide a more practical balance between performance and implementation cost, making them particularly attractive for large-scale IoT networks. On the other hands, in scenarios where devices need to communicate directly with each other while conserving energy and minimizing latency, a combination of D2D communication for local data exchange, backscatter communication for energy-efficient communication, and short packet communication for quick data transmission can offer a comprehensive solution. By leveraging the strengths of each technology, connected devices can establish efficient and reliable communication networks that cater to a wide range of applications in the IoT, smart infrastructure, and wireless sensor networks. This motivates us to conduct this research by providing a rigorous mathematical analysis framework for evaluating the average BLER with the combination of D2D, BackCom and SPC in our proposed system. The main contributions of the paper are outlined as follows:
- We proposed the uplink D2D-assisted BackCom network employing SPC to represent essential building blocks for enabling seamless connectivity among connected devices. Their synergistic relationship opens up possibilities for creating robust, energy-efficient, and low-latency communication systems that drive innovation in the realm of wireless networking and IoT applications.
- We derived the approximation-form expressions for the average BLER by using the Gaussian-Chebyshev quadrature in three cases: SC-RAN, SC-MRC and Full-MRC. To get full insights, some key parameters have been examined to bring more comprehensive solutions.
- Finally, the Monte Carlo simulation is conducted to clarify the accuracy of mathematical analysis.
Organization: The subsequent sections of this manuscript are organized as follows. Sect 2 delineates the system description and signal modeling. The channel statistics and preliminary of finite blocklength is described in Sect 3. The BLER expressions analysis are presented in Sect 4. The numerical evaluations are shown in Sect 5. Lastly, Sect 6 encapsulates the findings of this manuscript.
2 System model
2.1 System description
In this Fig 1, the short-packet uplink transmission in symbiotic IoT networks from the user (U) to the source (S) is examined, wherein both U and the backscatter device (BD) are equipped with a single antenna, while S is furnished with multiple M-antennas. In this configuration, utilizing backscatter communication, the BD reflects the user’s signal to the source. In our proposed model, we assume that the channels among U–S, U–BD, and BD–S are independent block Rayleigh fading with perfect CSI. This assumption is widely adopted in the literature since it ensures analytical tractability and allows closed-form derivations of performance metrics such as BLER. Moreover, Rayleigh fading is often regarded as a worst-case scenario (i.e., Nakagami-m fading with m = 1 or Rician fading with K = 0), thereby providing a conservative benchmark compared to more favorable fading environments (e.g., Rician with K > 0 or Nakagami-m with m > 1). The use of Rayleigh fading is further justified by the fact that IoT devices typically operate in dense urban environments, where line-of-sight (LOS) links are frequently blocked by obstacles such as buildings and walls, leading to significant scattering and multipath propagation [48,49]. This channel model effectively captures the stochastic nature of amplitude variations in such scenarios.
2.2 Signal model
Based on Fig 1, the received signal at S includes two parts: 1) signal directly x(t) satisfying from U over channel h1; and 2) reflecting signal c(t) satisfying
from BD over cascade channel
, which is a product of the channels from U to BD h2 and from BD to S h3. Therefore, the received signal at S can be expressed as:
where is the Additive Gaussian White Noise (AGWN) with zero mean and variance
,
is a reflection coefficient used to normalize c(t),
is the user transmit power. In symbiotic radio communication, S first decode x(t) with the received signal-to-interference-plus-noise ratio (SINR), denoted by
and then c(t) with the received signal-to-noise ratio (SNR)
by adopting the successive interference cancelation (SIC) technique [50,51]. As a result, the end-to-end (e2e) received SNR at source must hold the following condition
To truly enhance the effectiveness of symbiotic IoT communication in short-packet uplink transmission, it’s crucial to address the unique challenges presented by both the direct user-source link and the cascaded BD-source link. By implementing three strategic diversity techniques at the source, we can significantly boost reliability and performance across various signal directions. This approach not only tackles existing issues but also optimizes overall system efficiency, making it an essential step forward in advancing IoT technology.
- SC-RAN (Selective Combining - Random Selection): By employing SC for the user-source link in this approach, we ensure the selection of the strongest signal path for decoding x(t). This strategy significantly minimizes the impact of channel variations, making it a highly effective solution. At the same time, RAN is strategically employed for the BD-source link to effectively select the random arriving signal from the cascaded channel
for c(t).
- SC-MRC (Selective Combining - Maximal Ratio Combining): In this strategy, MRC is used for the BD-source link to smoothly blend signals coming from the cascaded channel
, which helps boost the SNR for c(t). This approach keeps things simple and works efficiently by cutting down on complexity for the direct user-source link, all while making the weaker cascaded BD-source link more reliable.
- Full-MRC (Full-Maximal Ratio Combining): This strategy decisively applies MRC to both user-source and BD-source links. By effectively integrating all available signal paths for x(t) and c(t), Full-MRC maximizes received signal strength while minimizing interference and noise throughout the system. It undeniably offers superior reliability and decoding performance over SC-RAN and SC-MRC. However, it demands higher computational complexity and resource allocation, making it ideal only for situations where energy and processing resources are not limited.
These diversity techniques are essential for tackling the performance degradation resulting from the cascaded channel in symbiotic communication. Utilizing SC-RAN, SC-MRC or Full-MRC is non-negotiable if the system is to meet the strict reliability and low-latency demands of finite blocklength communication. This approach guarantees successful decoding of both x(t) and c(t), thereby securing effective end-to-end communication. From the strategies outlined above, it is clear that the e2e received SNR at the source over M-antennas can be confidently asserted as
where , and
is the average SNR.
3 Channel statistics and preliminary of finite blocklength
In this section, we conduct a thorough examination of the proposed system’s performance. We develop approximation form expressions for the block error ratio of the three strategies outlined in Eq (3) to facilitate a detailed analysis of each strategy. This approach enables us to propose an appropriate method for enhancing the system’s quality.
3.1 Channel statistics
Based on the description of the proposed system in Sect 2, the channel gain will follow the exponential distribution. Hence, its cumulative distribution function (CDF) and probability density function (PDF) can be given as, respectively.
where is the mean of
. To take into account the impacts of the path-loss model,
can be expressed by
, where di is the distance related to
while
is the path-loss exponent.
3.2 Preliminary of finite blocklength
For a given N, i.e., the number of the information bit transmitted to S and L, i.e., the block-length (packet length) or the number of channel use, the e2e average BLER for decoding the signal x(t) can be given as [23,24]
where ,
are the Gaussian Q-function, the Shannon capacity, respectively and
is the channel dispersion, while
4 BLER analysis
Based on [52, Appendix A], the approximation expression of BLER can be claimed by
where ,
, and
.
Finally, by substituting (6) into (5), the e2e average BLER can be obtained as
By observing (7), to obtain BLER expressions of the three strategies mentioned in (3), we will try to compute the CDF of the e2e received SNR at S for these scenarios in closed-form expressions. First of all, the CDF of X as in [53], the CDF and PDF of T as in [54] can be expressed by, respectively.
where is the Gamma function and
is the incomplete gamma function.
4.1 SC-RAN
In this scenario, from (3), the CDF of can be derived as
From (9), can be given by [55]
where is the modified Bessel function of second kind with
order.
By applying (8) and (10), Eq (9) can be rewritten by
By setting , the
in (11) is formulated as
Next, by using Taylor series for and then substituting into (12), we have:
Based on [56, eq:6.592.4], can be thus reformulated by
where is the Meijer function.
Next, we can obtain the closed-form expression of by substituting (14) into (11). Then, substituting the obtaining
in (11) into (7), we claim:
Unfortunately, the integral in (15) is a tough task to figure out a closed-form expression. Therefore, by applying the Gaussian-Chebyshev quadrature as in [57], the e2e average BLER in this strategy can be given as
where .
4.2 SC-MRC
Based on (3), the CDf of can be achieved as
In order to get the closed-form expression for (17). Firstly, we compute the CDF of Z random variable (RV), which Z is the product of and
as following:
By applying (3) and (8), Eq (18) is taken by
where is the Gamma function.
Later, with the help of [56, eq:3.471.9], we gather as follows
From the above result, the PDF of Z can be attained by using as below
Next, by plugging (8) and (21) into (17), we receive:
By using the same approach as SC-RAN case, with applying the Taylor series for and then adopting [56, eq:6.592.4], the closed-form expression of
can be procured by
Finally, by replacing (23) into (7) and afterwards by utilizing Gaussian-Chebyshev quadrature as in SC-RAN case, we achieve:
4.3 Full MRC
In this final strategy, we delve into the MRC diversity technique, which is crucial for optimizing both U-S and BD-S links. By understanding and implementing this approach, we can significantly enhance link performance and reliability. This technique is not just an option; it’s a strategic necessity for achieving superior connectivity outcomes. From (3), the CDF of full-MRC scenario can be found as
By alternating (8) and (21) into (25), we get:
Next, we perform the series expansion for the incomplete gamma function by referring [56, eq:8.352.6] as following:
By substituting (27) into (26) and after doing some algebra, we obtain:
After changing variable and using Taylor series as the same in (12),
in (28) can be achieved as
Recalling [56, eq:6.592.4], is thus gathered by
Subsequently, by plugging (30) into (28), the closed-form expression of can be derived as
In the end, by surrogating (31) into (7) and then applying Gaussian-Chebyshev quadrature again, the e2e average BLER expression of full MRC scenario can be acquired by
5 Numerical results
In this section, we rigorously evaluate our theoretical findings on the performance of e2e average BLER through a comprehensive numerical assessment. We establish the mean of random variables (RVs) ,
,
as
=0.5,
=1, and
=2. The results achieved from Monte Carlo simulations [58–60] are averaged over 106 independent trials. In the subsequent figures, we denote that the dashed lines represent the Monte Carlo simulation, and the others are analytical computations.
Fig 2 compellingly illustrates the impact of different reception methods on the average BLER as the average SNR Ψ varies. The Full-MRC design stands out remarkably, demonstrating a significant reduction in BLER with increasing SNR, which clearly highlights its superior performance. This evidence strongly supports Full-MRC’s ability to effectively harness geographical diversity and optimize end-to-end reliability. Meanwhile, SC-MRC offers a balanced approach by gradually improving efficiency while maintaining manageable complexity. In contrast, SC-RAN exhibits the highest BLER due to its limited use of diversity through selective combining only. The precise alignment between analytical curves and Monte Carlo simulations further validates the accuracy of our derived closed-form formulas. These findings convincingly establish Full-MRC as the most robust system, making it an ideal choice for URLLC scenarios where reliability is paramount.
Fig 3 clearly demonstrates that as increases from 1 to 10, the average BLER decreases across the scenarios of SC-RAN, SC-MRC, and Full-MRC because of enhancing the SNR, channel capacity or energy efficiency. Moreover, this trend is due to the enhanced diversity gain at the receiver with more antennas. Notably, Fig 3 also shows that the Full-MRC method outperforms the others. However, it’s crucial to consider that increasing antenna numbers can complicate hardware implementation. Therefore, selecting an optimal
is essential for ensuring system reliability while balancing complexity and performance effectively.
Fig 4 depicts the impact of packet length on the average BLER for three methods SC-RAN, SC-MRC and Full-MRC schemes. As expected from finite blocklength theory [cf. (5)], increasing the packet length significantly reduces the BLER due to improved coding redundancy and error correction capability. This is clearly shown by the downward trend of all curves as
increases. Furthermore, the Full-MRC scheme consistently outperforms SC-MRC and SC-RAN across all scenarios, which aligns with the earlier analysis and reinforces the effectiveness of full diversity combining. The performance gap between SC-MRC and SC-RAN or SC-RAN and Full-MRC is especially notable in the moderate and high
regime, where systems must balance delay constraints and reliability, such as in URLLC applications.
Fig 5 presents the average BLER as a function of the number of information bits, , across three scenarios. As
increases, the BLER of our proposed system also increases. This occurs because transmitting more bits within a block increases the likelihood that at least one bit will be corrupted by noise, interference, or other channel impairments, which degrades decoding reliability. This trend illustrates the inherent trade-off in short-packet communications, where larger blocklengths may support higher data rates but come at the cost of higher BLER.
Fig 6 illustrates that the average BLER first decreases as β increases, thanks to stronger backscattered signals, but then rises again when β becomes too large because the backscatter device consumes excessive energy for reflection, leading to a risk of energy outage. This concave trend indicates the existence of an optimal β that balances reflection strength and energy storage capability. Specifically, SC-RAN achieves its minimum BLER around , SC-MRC around
, and Full-MRC around
, highlighting the importance of selecting an appropriate β for each scenario. Across the entire range of β values, Full-MRC consistently attains the lowest BLER, followed by SC-MRC, while SC-RAN exhibits the highest BLER and thus the lowest reliability.
Fig 7 reveals a U-shaped relationship between the average BLER and the common channel parameter , where each
represents the mean of the squared channel gain
. As λ increases from very small values, the average channel power improves and the BLER drops sharply. Notably, for
, the SC-RAN curve lies below those of SC-MRC and Full-MRC, showing that SC-RAN is advantageous under extremely weak channel conditions. As λ grows further, however, SC-RAN quickly loses this advantage, while SC-MRC and especially Full-MRC achieve lower BLER. Around moderate λ, each scheme reaches its own minimum (SC-RAN = 0.5, SC-MRC = 1.0, Full-MRC = 1.5). At large λ, the BLER of all three schemes rises again, but Full-MRC consistently remains the most reliable.
6 Conclusion
This work presents a unified framework that integrates uplink D2D communication, backscatter transmission, and short-packet communication to address the critical requirements of URLLC in emerging wireless systems. We derive approximation-form expressions for the average BLER under three diversity strategies—SC-RAN, SC-MRC, and Full-MRC—using the Gaussian-Chebyshev quadrature method and validate them through extensive Monte Carlo simulations. The results unequivocally demonstrate that Full-MRC delivers superior reliability, positioning it as a promising solution for mission-critical IoT and energy-constrained applications. Moreover, the insights gained from this analysis play a pivotal role in optimizing key parameter choices within the proposed system architecture. Beyond theoretical contributions, this study also provides practical design insights for low-latency wireless systems. In addition, this study points out the complexity–practicality trade-off in diversity combining. While Full-MRC provides the highest reliability, it also involves greater computational and hardware requirements, which may limit its practicality in IoT deployments. In contrast, SC-MRC offers a promising balance between performance and complexity, making it more attractive for resource-constrained scenarios. A more quantitative evaluation of computational complexity and hardware overhead will be considered in our future work. Future research will focus on addressing imperfect channel state information, optimizing reflection coefficients, and extending the analysis to multi-backscatter scenarios with adaptive combining techniques. While the current work considers a single backscatter device for analytical tractability, extending the framework to multiple backscatter devices is highly relevant for dense IoT deployments. Such an extension will involve new challenges, including interference coupling and resource allocation among devices, and will therefore require more elaborate modeling and simulation. We consider this an important direction and have explicitly included it as part of our future research agenda. These extensions are expected to further enhance the robustness and scalability of next-generation symbiotic networks.
References
- 1. Asadi A, Wang Q, Mancuso V. A survey on device-to-device communication in cellular networks. IEEE Commun Surv Tutorials. 2014;16(4):1801–19.
- 2. Kar UN, Sanyal DK. An overview of device-to-device communication in cellular networks. ICT Express. 2018;4(4):203–8.
- 3. Minh BV, Tran M, Phan VD, Hieu N. D2D communication network with the assistance of power beacon under the impact of co-channel interferences and eavesdropper: performance analysis. AEEE. 2023;21(4).
- 4. Le V-D, Nguyen H-N, Nguyen SQ, Bui T-T, Hien DC, Kim BS. Enabling D2D transmission mode of reconfigurable intelligent surfaces aided in wireless NOMA system. AEEE. 2025;23(1).
- 5. Haus M, Waqas M, Ding AY, Li Y, Tarkoma S, Ott J. Security and privacy in Device-to-Device (D2D) communication: a review. IEEE Commun Surv Tutorials. 2017;19(2):1054–79.
- 6. Pawar P, Trivedi A. Device-to-device communication based IoT system: benefits and challenges. IETE Technical Review. 2018;36(4):362–74.
- 7. Li F, Guo Z, Liang B, Yi X, Wang X, Li W, et al. A measurement study on device-to-device communication technologies for IIoT. Computer Networks. 2021;192:108072.
- 8. Chrysologou AP, Chatzidiamantis ND, Karagiannidis GK. Cooperative uplink NOMA in D2D communications. IEEE Commun Lett. 2022;26(11):2567–71.
- 9. Li Y, Cai L. Cooperative device-to-device communication for uplink transmission in cellular system. IEEE Trans Wireless Commun. 2018;17(6):3903–17.
- 10. Hung TC, Minh BV, Nguyen TN, Voznak M. Power beacon-assisted energy harvesting symbiotic radio networks: Outage performance. PLoS One. 2025;20(2):e0313981. pmid:39908254
- 11. Niu J-P, Li GY. An overview on backscatter communications. J Commun Inf Netw. 2019;4(2):1–14.
- 12. Xu C, Yang L, Zhang P. Practical backscatter communication systems for battery-free internet of things: a tutorial and survey of recent research. IEEE Signal Process Mag. 2018;35(5):16–27.
- 13. Zeng J, Zhang T, Mishra D, Yuan J, Seneviratne A. A survey on green designs for energy harvesting backscatter communications to enable sustainable IoT. Energies. 2025;18(4):840.
- 14. Jiang T, Zhang Y, Ma W, Peng M, Peng Y, Feng M, et al. Backscatter communication meets practical battery-free Internet of Things: a survey and outlook. IEEE Commun Surv Tutorials. 2023;25(3):2021–51.
- 15. Le A-T, Nguyen TN, Tu L-T, Tran T-P, Duy TT, Voznak M, et al. Performance analysis of RIS-assisted ambient backscatter communication systems. IEEE Wireless Commun Lett. 2024;13(3):791–5.
- 16. Loku Galappaththige D, Rezaei F, Tellambura C, Herath S. RIS-empowered ambient backscatter communication systems. IEEE Wireless Commun Lett. 2023;12(1):173–7.
- 17. Liang Y-C, Zhang Q, Wang J, Long R, Zhou H, Yang G. Backscatter communication assisted by reconfigurable intelligent surfaces. Proc IEEE. 2022;110(9):1339–57.
- 18. Ahmed M, Shahwar M, Khan F, Ullah Khan W, Ihsan A, Sadiq Khan U, et al. NOMA-based backscatter communications: fundamentals, applications, and advancements. IEEE Internet Things J. 2024;11(11):19303–27.
- 19. Li X, Zheng Y, Khan WU, Zeng M, Li D, Ragesh GK, et al. Physical layer security of cognitive ambient backscatter communications for green Internet-of-Things. IEEE Trans on Green Commun Netw. 2021;5(3):1066–76.
- 20. Ye Y, Shi L, Chu X, Lu G, Sun S. Mutualistic cooperative ambient backscatter communications under hardware impairments. IEEE Trans Commun. 2022;70(11):7656–68.
- 21. Rostami Ghadi F, Kaveh M, Wong K-K, Zhang Y. Performance analysis of FAS-aided backscatter communications. IEEE Wireless Commun Lett. 2024;13(9):2412–6.
- 22. Do QV, Minh BV, Nguyen Q-S, Kim B-S. Analysis of symbiotic backscatter empowered wireless sensors network with short-packet communications. PLoS One. 2024;19(8):e0307366. pmid:39186565
- 23. Vo D-T, Nguyen TN, Le A-T, Phan V-D, Voznak M. Holographic reconfigurable intelligent surface-aided downlink NOMA IoT networks in short-packet communication. IEEE Access. 2024;12:65266–77.
- 24. Nguyen Q-S, Le Anh U-V, Nguyen TN, Nguyen T-T, Voznak M. Short packet communications for relay systems with co-channel interference at relay: performance analysis and power control. IEEE Access. 2024;12:63452–61.
- 25. Feng C, Wang H-M, Poor HV. Reliable and secure short-packet communications. IEEE Trans Wireless Commun. 2022;21(3):1913–26.
- 26. Wang H-M, Yang Q, Ding Z, Poor HV. Secure short-packet communications for mission-critical IoT applications. IEEE Trans Wireless Commun. 2019;18(5):2565–78.
- 27. Anh U-VL, Nguyen X-P, Nguyen T-T. Joint power control and relay selection with short packet communications under co-channel interference. AEEE. 2025;23(1):52–60.
- 28. Quang PM, Kien NT, Duy TT, An NH, Tung NT, Le AV. Performance evaluation of reconfigurable intelligent surface aided multi-hop relaying schemes with short packet communication. AEEE. 2024;22(1).
- 29. Gao X, Niyato D, Yang K, An J. Cooperative scheme for backscatter-aided passive relay communications in wireless-powered D2D networks. IEEE Internet Things J. 2022;9(1):152–64.
- 30. Karattupalayam Chidambaram S, Kumar Choukiker Y, Bhowmick A. Performance of hybrid transmission of a D2D communication with energy harvesting and ambient backscattering. IEEE Access. 2024;12:177520–32.
- 31.
Zhang X, Liu J, Zhi L. Design and optimization on covert communication-oriented short packet D2D. In: 2022 14th International Conference on Wireless Communications and Signal Processing (WCSP), 2022. p. 257–63. https://doi.org/10.1109/wcsp55476.2022.10039224
- 32.
He Y, Wu G, Peng Z. Downlink power adaptation with stochastic poisson interference in short packet D2D networks. In: 2024 IEEE Middle East Conference on Communications and Networking (MECOM). 2024. p. 351–5. https://doi.org/10.1109/mecom61498.2024.10880893
- 33. Shi J, Shi L, Ye Y, Zhang Y, Chu X. Performance analysis for ambient backscatter communications with hybrid long-short packets. IEEE Wireless Commun Lett. 2024;13(5):1325–9.
- 34. Zhou W, Shi L, Ye Y, Song X, Sun H, Zheng G. Performance analysis for relay-assisted short-packet backscatter communications. IEEE Internet Things J. 2024;11(17):28988–9000.
- 35. Ma D, Shen S, Zhou H, Zhang C, Zhang Q, Murch R. Integrated sensing, identification, and backscatter communication system utilizing inverse scattering approach. IEEE Trans Antennas Propagat. 2025;73(8):5877–89.
- 36. Khoshafa MH, Ngatched TMN, Ahmed MH. Relay selection for improving physical layer security in D2D underlay communications. IEEE Access. 2022;10:95539–52.
- 37. Fang J, Zhu P, Ai B, Zheng F-C, You X. Resource allocation for eMBB/URLLC coexistence in massive MIMO industrial automation. IEEE Internet Things J. 2025;12(10):14282–96.
- 38. Pradhan A, Das S, Jalil Piran Md. Blocklength optimization and power allocation for energy-efficient and secure URLLC in industrial IoT. IEEE Internet Things J. 2024;11(6):9420–31.
- 39. Karem R, Ahmed M, Newagy F. Resource allocation in uplink NOMA-IoT based UAV for URLLC applications. Sensors (Basel). 2022;22(4):1566. pmid:35214464
- 40. Celebi HB, Pitarokoilis A, Skoglund M. A Multi-objective optimization framework for URLLC with decoding complexity constraints. IEEE Trans Wireless Commun. 2022;21(4):2786–98.
- 41. Elgarhy O, Reggiani L, Alam MM, Zoha A, Ahmad R, Kuusik A. Energy efficiency and latency optimization for IoT URLLC and mMTC use cases. IEEE Access. 2024;12:23132–48.
- 42. Lu X, Wang P, Li G, Niyato D, Li Z. Short-packet backscatter assisted wireless-powered relaying with NOMA: mode selection with performance estimation. IEEE Trans Cogn Commun Netw. 2022;8(1):216–31.
- 43. Ye N, Miao S, Pan J, Xiang Y, Mumtaz S. Dancing with chains: spaceborne distributed multi-user detection under inter-satellite link constraints. IEEE J Sel Top Signal Process. 2025;19(2):430–46.
- 44. Tran Tin P, Phan V-D, Si Thien Chau D, Nguyen TN, X. Nguyen P. Performance analysis in DF energy harvesting full-duplex relaying network with MRC and SC at the receiver under impact of eavesdropper. Journal of Electrical and Computer Engineering. 2021;2021:1–9.
- 45. Nguyen K-T, Vu T-H, Kim S. Performance analysis and deep learning design of short-packet communication in multi-RIS-aided multiantenna wireless systems. IEEE Internet Things J. 2023;10(19):17265–81.
- 46. Chen Y, Zhang Y, Yu B, Zhang T, Cai Y. Relay-assisted secure short-packet transmission in cognitive IoT with spectrum sensing. China Commun. 2021;18(12):37–50.
- 47. Zhao Y, Clerckx B. RIScatter: unifying backscatter communication and reconfigurable intelligent surface. IEEE J Select Areas Commun. 2024;42(6):1642–55.
- 48. Nguyen TN, Tran D-H, Van Chien T, Phan V-D, Nguyen N-T, Voznak M, et al. Physical layer security in AF-based cooperative SWIPT sensor networks. IEEE Sensors J. 2023;23(1):689–705.
- 49. Nguyen TN, Van Chien T, Dinh VQ, Tu L-T, Voznak M, Ding Z. Outage probability analysis for relay-aided self-energy recycling wireless sensor networks over INID rayleigh fading channels. IEEE Sensors J. 2024;24(7):11184–94.
- 50. Hung TC, Nguyen TN, Nhan NHK, Le A-T, Son PN, Pham T-HT, et al. Performance analysis of dual-hop mixed RF-FSO systems combined with NOMA. PLoS One. 2024;19(12):e0315123. pmid:39705226
- 51. Sang NQ, Kim H-Y, Nguyen TN, Vu MB, Tran PT, Duy TT, et al. Performance of RIS-secured short-packet NOMA systems with discrete phase-shifter to protect digital content and copyright against untrusted user. IEEE Access. 2025;13:21580–93.
- 52. Vu T-H, Nguyen T-V, Nguyen T-T, Kim S. Performance analysis and deep learning design of wireless powered cognitive NOMA IoT short-packet communications with imperfect CSI and SIC. IEEE Internet Things J. 2022;9(13):10464–79.
- 53. Nguyen TN, Duy TT, Tran PT, Voznak M, Li X, Poor HV. Partial and full relay selection algorithms for AF multi-relay full-duplex networks with self-energy recycling in non-identically distributed fading channels. IEEE Trans Veh Technol. 2022;71(6):6173–88.
- 54. Le A-T, Tran D-H, Le C-B, Tin PT, Nguyen TN, Ding Z, et al. Power beacon and NOMA-assisted cooperative IoT networks with co-channel interference: performance analysis and deep learning evaluation. IEEE Trans on Mobile Comput. 2024;23(6):7270–83.
- 55. Tin PT, Dinh BH, Nguyen TN, Ha DH, Trang TT. Power beacon-assisted energy harvesting wireless physical layer cooperative relaying networks: performance analysis. Symmetry. 2020;12(1):106.
- 56.
Gradshteyn IS, Ryzhik IM. Table of integrals, series, and products. Academic Press; 2014.
- 57. Nguyen SQ, Le A-T, Le C-B, Tin PT, Kim Y-H. Exploiting user clustering and fixed power allocation for multi-antenna UAV-assisted IoT systems. Sensors (Basel). 2023;23(12):5537. pmid:37420704
- 58. Le A-T, Vu T-H, Nguyen TN, Minh BV, Voznak M. On performance of cooperative satellite-AAV-secured reconfigurable intelligent surface systems with phase errors. IEEE Commun Lett. 2025;29(4):799–803.
- 59. Le S-P, Nguyen TN, Le-Tien T, Duy TT, Nguyen T-T, Ng DWK, et al. On the secrecy performance of reconfigurable intelligent surfaces-assisted satellite networks under Shadow-Rician channels. IEEE Trans Aerosp Electron Syst. 2025;61(3):6794–808.
- 60. Minh BV, Nhan NHK, Pham T-HT, Tran M, Kim S-W. Physical layer security in wireless sensors networks with friendly jammer: secrecy outage probability analysis. AEEE. 2024;22(4):387–98.