Powering The Internet Of Things

Powering The Internet Of Things

The Internet of Things is designed on the premise that sensors can be embedded in everyday object to help monitor and track them. The scope of this is huge – for example, the sensors could monitor and track everything from the structural integrity of bridges and buildings to the health of your heart. Unfortunately, one of the biggest stumbling blocks to widespread adoption at the moment is finding a way to cheaply and easily power these devices and thus enable them to connect to the internet.

Luckily, engineers at the University of Washington have a potential solution. They have designed a new system which uses radio frequency signals as a power source and reuses existing WiFi infrastructure to provide the connectivity. The technology is called WiFi Backscatter and is believed to be the first of its kind.

Building on previous research showed how low-powered devices could run without batteries or cords by obtaining their power from radio, TV and wireless signals, the new design goes further by connecting the individual devices to the internet. Previously it wasn’t possible, the difficulty in providing WiFi connectivity was that traditional, low-power WiFi consumes significantly more power than can be gained from the wireless signals. This has been solved by developing a ultra-low power tag prototype which has the required antenna and circuitry to talk to laptops and smartphones.

“If Internet of Things devices are going to take off, we must provide connectivity to the potentially billions of battery-free devices that will be embedded in everyday objects”, said Shyam Gollakota, one of University of Washington’s Professor in the Computer Science and Engineering department. “We now have the ability to enable WiFi connectivity for devices while consuming orders of magnitude less power than what WiFi typically requires”.

The tags on the new ultra low-power prototype work by scanning for WiFi signals that are moving between the router and the laptop or smartphone. Data is encoded by either reflecting or not reflecting the WiFi router signal – thus slightly changing the signal itself. It means that WiFi enabled devices would detect the miniscule changes and thus receive data from the tag.

“You might think, how could this possibly work when you have a low-power device making such a tiny change in the wireless signal? But the point is, if you’re looking for specific patterns, you can find it among all the other Wi-Fi reflections in an environment”, said Joshua Smith, another University of Washington professor who works in the same department as Gollakota.

The technology has currently communicated with a WiFi device at a rate of 1 kilobit per second with two metres between the devices, though the range will soon be expanded to twenty metres. Patents have been filed.

By Daniel Price

Get Smarter
Higher Education A big challenge for professionals of all ages is time. Balancing the responsibilities of work and life leave little time for self-improvement in the form of education. But ongoing education is more than ...
Cybersecurity Bootcamps To Help Build Your Career
Cybersecurity Bootcamps We've discussed the importance of training and the hiring of cybersecurity professionals many times on CloudTweaks over the past 10+ years. Now more than ever as the world enters into a dark era ...
Vulnerability Scanners Cyber security vulnerabilities are a constant nuisance and it certainly doesn't help with the world in a current state of disarray and uncertainty. Vulnerabilities leave businesses and individuals subject to a wide range ...
Gary Bernstein
WordPress Website Security You've spent time, effort, and money building your website, so don't let it become outdated and run-down by not taking proper care of it. Here are tips on WordPress Website security, speed, ...
Drew Firment
Stop Focusing on Cloud Adoption and Start Focusing on Cloud Maturity For the past several years, most organizations have made it their priority to shift much of their applications and data from on-premises to the ...
Gary Bernstein
Common DevOps Misconceptions 86% of businesses say it’s important for their company to develop and produce new software fast to win market share and beat the competition, Harvard Business Review reveals. Yet, just 10% of businesses ...
John Peluso
Save Your Organization on Cloud Costs Organizations of all sizes are currently navigating their plans to avoid the recent surge in cyber-attacks and data breaches and preparing for unforeseen setbacks. Building a sensible backup and ...
Patrick Melampy
Cloud On-Ramp and Protecting Performance The expansion of remote work and the massive growth in usage of cloud-based applications have stressed existing infrastructure and put a keen focus on the performance of everyone’s network environment ...
Disaster Recovery Plan.png
Data Bed.png
Viral Infection Wearabletech
Recovery Experts.png


Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization. 


(ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees.


CYBRARY Open source Cyber Security learning. The world's largest cyber security community. Cybrary provides free IT training certificates. Courses for beginners, intermediates, and advanced users are available.