Feeds

'POWER from AIR' backscatter tech now juices up Internet of Stuff Wi-Fi gizmos

Batteries not included required

Providing a secure and efficient Helpdesk

Researchers who last year demonstrated they could harvest stray RF signals to power RFID tags have scaled-up their technology to power Wi-Fi devices.

The University of Washington team is pitching their ultra low-power “backscatter harvesting” technology with the inevitable Internet of Things (IoT) tag, since if it could be commercialised the technology would help remove the battery from the battalions of sensors that IoT advocates imagine will one day rule our world.

In previous research, the group got RFID tags to represent binary 1 and 0 states by either absorbing or reflecting localised TV signals – something that required only minimal conversion of RF to electricity to power the device.

The latest demonstration still works within the limitations of the power that can be harvested from ambient RF signals. To get devices that could connect to the Internet, the researchers worked on creating ultra-low-power Wi-Fi-enabled tags.

Video demonstration summarising the researchers' written press release.

Apart from their own devices, the boffins say everything they used in their test was off-the-shelf: Intel Wi-Fi cards, Linksys routers, and the university's existing Wi-Fi infrastructure. Their radio-gobbling tags were able to communicate over distances of 2.1m at 1 Kbps – far enough for a sensor to chat to a nearby gateway, and fast enough to transmit basic information like temperature or whether a light is switched on.

In their paper (PDF), the researchers say the communications medium is very similar to the TV-frequency-based RFID tags they showed off last year. “At a high level, a Wi-Fi Backscatter tag communicates with a Wi-Fi device by modulating its Wi-Fi channel”, they write. “Since channel information including CSI and RSSI is widely available on commodity Wi-Fi devices, the Wi-Fi receiver can extract the modulated information by measuring the changes in its channel”.

As previously, their ultra-low-power devices signal a 1 or 0 by either absorbing or reflecting Wi-Fi signals. Commodity Wi-Fi devices like smartphones and routers act as “readers” and “helpers” to interpret the change in channel state as data.

To send data to the tag the transmitter sends short Wi-Fi packets: the presence or absence of the special packets will be interpreted by the tag as a 1 or 0.

In the university's press release, co-author of the paper Joshua Smith (UW associate professor of computer science and electrical engineering) says: “You might think, how could this possibly work when you have a low-power device making such a tiny change in the wireless signal? But the point is, if you’re looking for specific patterns, you can find it among all the other Wi-Fi reflections in an environment”. ®

Providing a secure and efficient Helpdesk

More from The Register

next story
Brit telcos warn Scots that voting Yes could lead to HEFTY bills
BT and Co: Independence vote likely to mean 'increased costs'
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
Bonking with Apple has POUNDED mobe operators' wallets
... into submission. Weve squeals, ditches payment plans
'Serious flaws in the Vertigan report' says broadband boffin
Report 'fails reality test' , is 'simply wrong' and offers ''convenient' justification for FTTN says Rod Tucker
This flashlight app requires: Your contacts list, identity, access to your camera...
Who us, dodgy? Vast majority of mobile apps fail privacy test
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.