Feeds

'POWER from AIR' backscatter tech now juices up Internet of Stuff Wi-Fi gizmos

Batteries not included required

Providing a secure and efficient Helpdesk

Researchers who last year demonstrated they could harvest stray RF signals to power RFID tags have scaled-up their technology to power Wi-Fi devices.

The University of Washington team is pitching their ultra low-power “backscatter harvesting” technology with the inevitable Internet of Things (IoT) tag, since if it could be commercialised the technology would help remove the battery from the battalions of sensors that IoT advocates imagine will one day rule our world.

In previous research, the group got RFID tags to represent binary 1 and 0 states by either absorbing or reflecting localised TV signals – something that required only minimal conversion of RF to electricity to power the device.

The latest demonstration still works within the limitations of the power that can be harvested from ambient RF signals. To get devices that could connect to the Internet, the researchers worked on creating ultra-low-power Wi-Fi-enabled tags.

Video demonstration summarising the researchers' written press release.

Apart from their own devices, the boffins say everything they used in their test was off-the-shelf: Intel Wi-Fi cards, Linksys routers, and the university's existing Wi-Fi infrastructure. Their radio-gobbling tags were able to communicate over distances of 2.1m at 1 Kbps – far enough for a sensor to chat to a nearby gateway, and fast enough to transmit basic information like temperature or whether a light is switched on.

In their paper (PDF), the researchers say the communications medium is very similar to the TV-frequency-based RFID tags they showed off last year. “At a high level, a Wi-Fi Backscatter tag communicates with a Wi-Fi device by modulating its Wi-Fi channel”, they write. “Since channel information including CSI and RSSI is widely available on commodity Wi-Fi devices, the Wi-Fi receiver can extract the modulated information by measuring the changes in its channel”.

As previously, their ultra-low-power devices signal a 1 or 0 by either absorbing or reflecting Wi-Fi signals. Commodity Wi-Fi devices like smartphones and routers act as “readers” and “helpers” to interpret the change in channel state as data.

To send data to the tag the transmitter sends short Wi-Fi packets: the presence or absence of the special packets will be interpreted by the tag as a 1 or 0.

In the university's press release, co-author of the paper Joshua Smith (UW associate professor of computer science and electrical engineering) says: “You might think, how could this possibly work when you have a low-power device making such a tiny change in the wireless signal? But the point is, if you’re looking for specific patterns, you can find it among all the other Wi-Fi reflections in an environment”. ®

Protecting against web application threats using SSL

More from The Register

next story
Brit telcos warn Scots that voting Yes could lead to HEFTY bills
BT and Co: Independence vote likely to mean 'increased costs'
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
Bonking with Apple has POUNDED mobe operators' wallets
... into submission. Weve squeals, ditches payment plans
This flashlight app requires: Your contacts list, identity, access to your camera...
Who us, dodgy? Vast majority of mobile apps fail privacy test
Apple Watch will CONQUER smartwatch world – analysts
After Applelocalypse, other wristputers will get stuck in
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.