Wi-Fi Backscatter: Internet Connectivity For RF-Powered Devices
Wi-Fi Backscatter: Internet Connectivity For RF-Powered Devices
Bryce Kellogg, Aaron Parks, Shyamnath Gollakota, Joshua R. Smith, and David Wetherall
University of Washington
{kellogg, anparks, gshyam, jrsjrs, djw}@uw.edu
0.35
5 0.3
PDF
4.5 0.25
4 0.2
0.15
3.5
0.1
3 0.05
2.5 0
0 500 1000 1500 2000 2500 3000 -3 -2 -1 0 1 2 3
Packet Number Normalized CSI
Figure 3—Raw CSI measurements for a single Wi-Fi sub- Figure 4—PDF of normalized channel values for the 30 Wi-Fi
channel in the presence of the Wi-Fi Backscatter tag 5 centime- sub-channels. The plot shows diversity between sub-channels.
ters away. The plot clearly shows a binary modulation on top of
the CSI measurements.
Wi-Fi Backscatter tag. We configure the tag to modulate an alter-
3.1 Modulating Wi-Fi Channel at the tag nating sequence of zero and one bits. The Wi-Fi reader downloads
The Wi-Fi Backscatter tag conveys information by modulating a 1 GB media file from a Linksys WRT54GL AP, which acts as a
the Wi-Fi channel. To do this, it uses a low power switch that al- Wi-Fi helper. The helper is placed 5 meters away from the Wi-Fi
lows the antenna impedance to be modulated by a transmitted bit Backscatter tag. Fig. 3 plots the CSI in Wi-Fi sub-channel 19 as
stream. The antenna’s impedance affects the amount of signal that a function of the packet number. The plot clearly shows a binary
is reflected by the tag. By modulating this impedance, the tag can modulation on top of the captured channel measurements.
convey ‘1’ and ‘0’ bits. These switches consume less than 1 µW Our decoding algorithm extracts this modulated information in
of power, which is negligible. Our prototype design optimizes the three main steps: (1) Signal conditioning to remove the variations in
choice of the switch to operate well at frequencies spanning the the channel measurements due to mobility in the environment, (2)
entire 2.4 GHz Wi-Fi band. Leveraging frequency diversity across the Wi-Fi sub-channels, and
The Wi-Fi Backscatter tag can in principle use a variety of an- (3) Decoding the backscattered bits from the channel information.
tennas including monopoles and dipoles. For our prototype, we de- (1) Signal Conditioning. The goal of this step is two-fold: 1) re-
signed a special-purpose antenna for the Wi-Fi Backscatter tag that move the natural temporal variations in the channel measurements
is capable of both impedance modulation as well as Wi-Fi energy due to mobility in the environment, and 2) normalize the chan-
harvesting. Specifically, we design a microstrip “patch” antenna, as nel measurements to map to -1 and +1 values. In particular, to re-
the gain of this antenna can be relatively high with respect to its move the temporal variations, we subtract a moving average from
size. Our antenna design takes into consideration a key factor of the channel measurements at the Wi-Fi reader; the moving aver-
system performance: the extent of radar cross section changes that age is computed over a duration of 400 ms in our experiments. The
the antenna is capable of achieving. The radar cross-section refers above operation creates zero-mean channel measurements without
to the amount of incident Wi-Fi signals that can be reflected by an the temporal variations. Next, we normalize these measurements
antenna; the contrast between the radar cross-section when the tag such that the channel corresponding to a one bit from the Wi-Fi
is reflecting versus not reflecting will determine the impact of the Backscatter tag maps to a +1 and that corresponding to a zero bit
tag on a nearby Wi-Fi receiver. To improve the radar cross-section, maps to a -1. Since we do not know the actual bits transmitted, we
we design an array of microstrip patches, each of which resonates at instead perform this normalization by computing the absolute val-
2.4 GHz, but which act together to collaboratively scatter incident ues of the zero-mean channel measurements and then taking their
RF and therefore produce a larger change in the radar cross-section. average. We then divide the zero-mean channel measurements with
Wi-Fi antenna design is a broad topic and one can use other antenna this computed average to get the normalized channel values.
topologies that can significantly reduce the size of the antenna [18].
(2) Exploiting Wi-Fi Frequency/Spatial Diversity. Wi-Fi trans-
This, however, is not in the scope of this paper.
missions span a bandwidth of 20 MHz. At such a wide bandwidth, it
Finally, the minimum period with which our tag changes its
is well known that the signals experience frequency diversity where
impedance is larger than the duration of a Wi-Fi packet. That is,
the amplitude and the phase of the channel measurements vary sig-
the duration of each transmitted bit is greater than the time it takes
nificantly with the Wi-Fi OFDM subcarriers. Similarly, multipath
to transmit a few Wi-Fi packets. This ensures that the act of modu-
issues result in similar variations across antennas. Thus, one would
lating does not change the channel within every Wi-Fi packet, thus
expect that some of the Wi-Fi subcarriers and antennas experience
allowing nearby Wi-Fi communication to proceed with minimal in-
a stronger effect due to the reflections from the Wi-Fi Backscat-
terference. We also note that the Wi-Fi Backscatter tag modulates
ter tag. To empirically check this effect, Fig. 4 plots the probabil-
the Wi-Fi channel only when queried by the reader. Further, the tag
ity density functions (PDF) of the normalized channel values for
can adapt the modulation rate by increasing the duration of each
each adjacent pair of the 60 Wi-Fi subcarriers (resulting in 30 “sub-
bit, enabling our tag to adapt the resulting data rate to the Wi-Fi
channels”) available from the Intel card. The PDF is computed over
network traffic conditions (see §5).
channel measurements taken across 42,000 Wi-Fi packets. Fig. 4
shows three main points: First, for about 30 percent of the Wi-Fi
3.2 Decoding algorithm at the Wi-Fi reader sub-channels, we see two Gaussian signals centered at +1 and -1;
Next, we describe how the Wi-Fi reader extracts the modulated these represent the two-reflection states at the tag. Secondly, the
Wi-Fi channel corresponding to the packets from the helper. To un- variance in the channel measurements, i.e., noise, changes signifi-
derstand how the reflections at a Wi-Fi Backscatter tag affect the cantly with the sub-channel being used. Finally, some of the sub-
Wi-Fi channel, we run the following experiment. We place an In- channels do not see two distinct Gaussian signals. This corresponds
tel Wi-Fi Link 5300 card, which acts as a Wi-Fi reader, next to a to frequencies where the effect of backscatter is very weak, due to
Wi-Fi Sub-Channel 30 computes the following summation:
25
XG
CSIi
20 CSIweighted =
i=1
σi2
15
15.5
15
14.5
14
13.5 Figure 7—Encoding information on the downlink. the reader en-
codes a ‘1’ bit with presence of a Wi-Fi packet and a ‘0’ bit with
13 silence (i.e., the absence of Wi-Fi packets). The duration of the si-
0 500 1000 1500 2000 2500 3000
lence period is set to be equal to that of the Wi-Fi packet. To enforce
Packet Number
other Wi-Fi devices in the vicinity to not transmit during the silence
periods, the Wi-Fi reader transmits a CTS_to_SELF packet before
Figure 6—Raw CSI measurements for a single Wi-Fi sub- transmitting the message. The message consists of both the pream-
channel in the presence of the Wi-Fi Backscatter tag one meter ble bits and the payload bits (including the CRC).
away. The figure shows that at larger ranges, there are no longer
two distinct levels in the CSI measurements. Thus, we need to de- 4.1 Encoding at the Wi-Fi reader
sign a different decoding mechanism to achieve higher ranges.
The Wi-Fi reader encodes information using the presence or ab-
sence of a Wi-Fi packet. Specifically, as shown in Fig. 7, the reader
sents all Wi-Fi sub-channels and the RSSI bit resolution is limited, encodes a ‘1’ bit with presence of a Wi-Fi packet and a ‘0’ bit with
the BER performance is better with CSI information than RSSI. silence (i.e., the absence of Wi-Fi packets). The duration of the si-
lence period is set to be equal to that of the Wi-Fi packet. To force
3.4 Increasing Uplink Communication Range other Wi-Fi devices in the vicinity to not transmit during the silence
The algorithm described so far assumes that the reflections from periods, the Wi-Fi reader transmits a CTS_to_SELF packet [10] be-
the Wi-Fi Backscatter tag create a distinctive difference in the chan- fore transmitting the encoded bits. CTS_to_SELF is a Wi-Fi mes-
nel values between a one and a zero bit. While such an algorithm sage that forces 802.11-compliant devices to refrain for a specified
is effective at small distances from the Wi-Fi reader (in our experi- time period. Wi-Fi Backscatter leverages this message to reserve
ments up to 65 centimeters), it breaks down at larger distances. To the medium for the duration of its transmission to ensure that other
see this, consider the channel measurements in Fig. 6, at a distance Wi-Fi devices, unaware of the Wi-Fi Backscatter protocol, do not
of two meters between the Wi-Fi Backscatter tag and the Wi-Fi sense the medium as idle and transmit during the silence periods.
reader. The figure shows that there are no two distinct levels in the We note the following key points:
channel measurements, which is in contrast to Fig. 3. • The current 802.11 standard only allows Wi-Fi devices to reserve
Wi-Fi Backscatter uses coding to increase its uplink communi- the channel for up to a duration of 32 ms using the CTS_to_SELF
cate range. Specifically, the tag transmits two orthogonal codes of packet. Thus, to maximize the number of bits transmitted within
length L each, to represent the one and the zero bits. The Wi-Fi this duration, the Wi-Fi reader reduces the size of each Wi-Fi
reader correlates the channel measurements with the two codes and packet and the corresponding silence period. The smallest packet
outputs the bit corresponding to the larger correlation value. size possible on a Wi-Fi device is about 40 µs at a bit rate of
• Wi-Fi Backscatter repeats the above correlation operation on all 54 Mbps. Our receiver design in §4.2 can reliably detect Wi-Fi
the frequency sub-channels and picks the Wi-Fi sub-channels packets as small as 50 µs to a distance of more than two meters.
that provide the maximum correlation peaks. Thus, the Wi-Fi reader can transmit a 64-bit payload message
• The communication range of the system can be increased by in- with a 16-bit preamble in 4.0 ms. We can transmit more bits by
creasing the code length, L. This is because correlation with a splitting them across multiple CTS_to_SELF packets.
L bit long code provides an increase in the SNR that is propor- • Since we assume a query-response model in this paper, if the Wi-
tional to L. Our evaluation shows that with a correlation length of Fi Backscatter tag does not respond to the Wi-Fi reader’s query,
20 bits, the communication range can be increased to 1.6 meters. the reader re-transmits its packet until it gets a response. More
The uplink communication range can be further increased to 2.1 generally, the Wi-Fi Backscatter tag could also transmit ACK
meters by increasing the correlation length to 150 bits.. packets back to the Wi-Fi reader using the uplink communication
• Since the tag still only transmits bits (now the bit duration ex- in §3. The Wi-Fi Backscatter tag can reduce the overhead of the
panded by L) and does not perform any decoding operations, ACK packet by dropping the preamble and the address fields, and
the power consumption of the tag does not increase. The Wi- transmitting a single bit message.
Fi reader on the other hand is a powered device and can perform • One may be worried that since Wi-Fi Backscatter’s downlink
the above correlation operations. messages occupy a considerable amount of time, they could af-
fect the efficiency of Wi-Fi networks. While this certainly is
4. W I -F I BACKSCATTER D OWNLINK a factor to be considered, there is growing evidence that Wi-
Fi networks in typical home and office scenarios are under-
Next, we describe how Wi-Fi Backscatter enables communica- utilized [24]. Thus, we believe that the spare Wi-Fi bandwidth
tion on the downlink from the Wi-Fi reader to a Wi-Fi Backscat- can be used to communicate with Wi-Fi Backscatter devices.
ter tag. The challenge in achieving this is that, on one hand, the
reader can only transmit Wi-Fi packets; on the other hand, a Wi-
Fi Backscatter tag cannot decode Wi-Fi transmissions. Instead, we 4.2 Wi-Fi Backscatter tag receiver design
design a novel circuit for the tag that can detect the energy during The goal of our receiver is to differentiate between the presence
a Wi-Fi packet from a nearby transmitter. We then have the Wi-Fi and absence of a Wi-Fi packet and decode the bits transmitted by
reader encode information in the presence and absence of Wi-Fi the Wi-Fi reader. At a high level, we design a low-power Wi-Fi en-
packets. In the rest of this section, we describe the encoding mech- ergy detection circuit that leverages the RF harvesting capabilities
anism at the Wi-Fi reader and the receiver design at the tag. of our device. Traditional energy detection approaches compute the
average energy in the received signal and use a highly sensitive re-
ceiver to detect the presence of energy on the wireless medium. This
approach however is not suitable in our scenario since the receiver
is low power in nature and hence has a very low sensitivity. Further,
Wi-Fi transmissions are modulated using OFDM, which is known
to have a high peak to average ratio [20]. Said differently, the av-
erage energy in the Wi-Fi signal is small, with occasional peaks
spread out during the transmission. Figure 8—Receiver circuit at the tag to decode the transmis-
Thus, the Wi-Fi Backscatter tag leverages a specially designed sions in Fig. 7. The receiver has four main components: an en-
RF energy detector based on peak detection to decode information velope detector to remove the 2.4 GHz carrier frequency, a peak
from the Wi-Fi Backscatter reader. As shown in Fig. 8, our receiver finder that stores the peak energy value of the Wi-Fi signals in its
circuit has four main components: an envelope detector, a peak capacitor, a set-threshold circuit that halves the threshold values,
finder, a set-threshold circuit and a comparator. The role of the en- and a comparator that outputs a one bit when the received energy is
greater than the threshold value and a zero bit otherwise.
velope detector circuit is to remove the carrier frequency (2.4 GHz)
of the Wi-Fi transmissions. This is a standard circuit design similar as framing and CRC checks for the Wi-Fi Backscatter messages
to that used in RFID systems. We however tune the circuit elements transmitted on the downlink.
to be optimal over the whole 2.4 GHz Wi-Fi frequency ranges.
The peak detector circuit captures and holds the peak amplitude
of the received signal. It uses a diode, an operational amplifier, and
5. W I -F I BACKSCATTER IN A G ENERAL W I -F I
a capacitor that can store the peak amplitudes as its charge. In order
to adapt to time-varying channel conditions, it however does not N ETWORK
hold this peak value indefinitely; the resistor network that is part of Typical Wi-Fi networks have multiple Wi-Fi devices that all
the set-threshold circuit allows the charge on the capacitor to slowly share the same wireless medium; most of these devices are likely to
dissipate, effectively “resetting” the peak detector over some rela- be unaware of the Wi-Fi Backscatter protocol. Wi-Fi Backscatter’s
tively long time interval. The output of this peak-detection circuit is downlink design addresses the problem of multiple Wi-Fi devices
halved to produce the actual threshold; this is performed by the ca- by using a CTS_to_SELF packet that prevents other Wi-Fi devices
pacitor element in the set-threshold circuit. Finally, the comparator from interfering with its transmissions. The presence of multiple
takes two inputs: the threshold value and the received signal, and Wi-Fi devices, however, is problematic for the uplink design in §3.
outputs a one bit whenever the received signal is greater than the In particular, the Wi-Fi reader uses the channel measurements
threshold value and a zero bit otherwise. from the helper’s packets to decode the information send by the Wi-
We note that the receiver circuit described above can detect pack- Fi Backscatter tag. The assumption, however, is that for every bit
ets as small as 50 µs. Thus, it can differentiate Wi-Fi packet lengths sent by the Wi-Fi Backscatter tag, the Wi-Fi reader receives channel
up to that resolution. Specifically, since longer packets can be in- measurements from at least a few helper packets. Since Wi-Fi uses
tuitively thought of as multiple small packets sent back-to-back a random access MAC protocol, the number of packets per second
without any gap, the Wi-Fi Backscatter tag outputs a continuous transmitted from the Wi-Fi helper depends on the traffic in the net-
sequence of ones corresponding to each long packet. By counting work. Ideally, if the Wi-Fi Backscatter tag can identify the helper
the number of ones, Wi-Fi Backscatter can resolve the length of a packets, it can ensure that there are an equal number of helper pack-
Wi-Fi packet to a resolution of 50µs. ets for each transmitted bit. This is however difficult since our Wi-Fi
Further, the above circuit requires only a very small amount of Backscatter tags cannot decode the Wi-Fi headers and hence cannot
power to operate (around 1 µW), and can therefore be left ON at accurately identify the helper packets.
all times. However, the microcontroller requires a relatively large Wi-Fi Backscatter addresses this problem by having the Wi-Fi
amount of power (several hundred µW) in its active mode. To re- Backscatter device adapt its transmission rate for different network
duce overall power consumption, the Wi-Fi Backscatter tag keeps traffic loads. Specifically, the Wi-Fi reader computes the average
the microcontroller in a sleep state as much as possible by operating number of packets the helper (e.g., an AP) can transmit for the cur-
under two main modes: rent network conditions. Suppose the Wi-Fi helper can transmit, on
average, N packets per second given the current network load and
suppose the Wi-Fi reader requires the channel information from M
• Preamble detection mode. The receiver spends most of its time packets to reliably decode each bit. Given these parameters, the rate
N
in this mode detecting preambles at the beginning of potential at which the Wi-Fi Backscatter tag sends bits is given by M bits per
reader transmissions. To reduce the power consumption of doing second. The Wi-Fi reader computes this bit rate and transmits this
this, we leverage that there is no information in between the tran- information in the query packet addressed to the Wi-Fi Backscatter
sitions of bits output by our receiver circuit. Thus, we keep the tag. The latter uses this bit rate while transmitting bits on the uplink
microcontroller asleep until a new transition occurs at the com- to the Wi-Fi reader. We note the following key points:
parator’s output. We then correlate the intervals between these
transitions with the reference intervals for the preamble. If the • Dealing with bursty traffic. While the above computation is based
transition intervals match the preamble, the receiver knows that on the average statistics, Internet traffic in general is known for
a packet is about to begin and thus enters the next mode. its bursty nature. Thus, it is unlikely that every bit from the Wi-
• Packet decoding mode. In this mode, the microcontroller again Fi Backscatter tag affects the same number of helper packets.
reduces the power consumption by sampling the signal only in To address this problem, the Wi-Fi reader uses the timestamp
the middle of each transmitted bit. Specifically, the microcon- information in the Wi-Fi header to bin the channel measurements
troller wakes up briefly to capture each sample, then sleeps until to the correct bit boundaries. Further, the Wi-Fi reader provides
the next bit, thus saving considerable power. After the known conservative bit rate estimates to the Wi-Fi Backscatter device
packet length has expired, the microcontroller fully wakes up to minimize the probability of not receiving channel information
and attempts to decode the packet by performing operations such for some of the transmitted bits.
0
10
30 pkts/bit
6 pkts/bit
3 pkts/bit
-1
10
-3
10
-4
Figure 9—Wi-Fi Backscatter prototype antenna. The prototype 10
0 10 20 30 40 50 60 70
antenna is designed to operate across the 2.4 GHz Wi-Fi channels
Distance between Wi-Fi reader and Wi-Fi Backscatter prototype (in cm)
and can both modulate the Wi-Fi channel as well as harvest RF
signals. Our antenna consists of an array of six small micro-strip (a) CSI
patch elements, each with dimensions 40.6 by 30.9 mm. We note 0
that in principle, one can decrease the size of this antenna by using 10
a number of other topologies that can achieve similar qualities. We
use this topology due to its fabrication simplicity. -1
10
-1
10
600
-2
10 400
-3
10 200
-4 0
10
0 10 20 30 40 50 60 70 500 1000 1500 2000 2500 3000
Distance between Wi-Fi reader and Wi-Fi Backscatter prototype (in cm) Helper Tranmission Rate (pkts/s)
Figure 11—Effect of frequency diversity on BER. The figure Figure 12—Uplink Bit rate versus transmission rate at the Wi-
shows the BER for two algorithms: one that randomly picks a Wi- Fi helper. The average achievable bit rate is the maximum bit rate,
Fi sub-channel and decodes, and the second is Wi-Fi Backscatter’s amongst the tested rates of 100, 200, 500, and 1000 bits/s, that can
algorithm that leverages frequency diversity to combine informa- be decoded at the Wi-Fi reader with a BER less than 10−2 . The plot
tion across all the sub-channels. The figure shows that leveraging shows that the bit rate is around 100 bps and 1 kbps with transmis-
frequency diversity provides substantial benefits. sion rates of 500 and 2070 packets/second.
700
150
500
100
300
50 100
12:00 PM 2:00 PM 4:00 PM 6:00 PM 8:00 PM
Time of Day
Figure 13—Testbed with the tested locations.
Figure 15—Achievable uplink bit rate using ambient Wi-Fi
Probability of Correct Packet
0 30
2 3 4 5
Helper Location
20
20
-2
10
15
-3
10
10
-4
10 5
-5 0
10
0 50 100 150 200 250 300 350 10:00 AM 12:00 PM 2:00 PM 4:00 PM 6:00 PM
Distance between Wi-Fi reader and Wi-Fi Backscatter prototype (in cm) Time of Day
Figure 17—Downlink Bit Error Rate Versus distance between Figure 18—Downlink False-positive rate. The figure shows the
Wi-Fi Backscatter tag and Wi-Fi reader. The three bit rates cor- number of false positive events where the prototype receiver con-
respond to Wi-Fi packets of length 50 µs, 100 µs, and 200 µs. The fuses normal Wi-Fi traffic for a Wi-Fi Backscatter preamble.
figure shows that at a target BER of 10−2 , the prototype device can
achieve bit rates of 20 kbps at distances of 2.13 m. The range can
be increased to 2.90 m by decreasing the bit rate to 10 kbps. the two devices. The range can be increased to 2.90 meters by
decreasing the bit rate to 10 kbps.
3 1 kbps 120
2.5 100
2 80
1.5 60
1 40
0.5 20
0 0
2 3 4 5 80 100 120 140 160 180 200 220
Helper Location Distance between Wi-Fi reader and Wi-Fi Backscatter prototype (in cm)
(a) Distance of 5 cm
Figure 20—Increasing the uplink range using the correlation
mechanism in §3.4. The figure shows that the range can be in-
4 creased to more than 2 m by using long sequences to represent each
No Device
3.5 100 bps transmitted bit and using correlation at the Wi-Fi reader.
Data Rate (MB/s)
3 1 kbps
2.5 and measure the correlation length at which the observed bit error
2 rate at the Wi-Fi reader is less than 10−2 .
1.5 Fig. 20 plots these correlation lengths as a function of the dis-
1 tance between the reader and our prototype. The figure shows
0.5 that as the correlation length increases, the range at which Wi-Fi
0 Backscatter’s uplink operates also increases. Specifically, using a
2 3 4 5
correlation length of 20 bits, we establish the uplink communica-
Helper Location
tion link at distances of about 1.6 meters between the Wi-Fi reader
(b) Distance of 30 cm and the prototype. The required correlation length increases signif-
icantly with the distances between the Wi-Fi reader and the pro-
Figure 19—Effect of Wi-Fi Backscatter Uplink on Wi-Fi data totype. Specifically, at distances of 2.1 meters, we need a correla-
rate. The figure plots the data rates for different locations for tion length of about 150 bits. While this would reduce the effective
the Wi-Fi transmitter placed in the testbed in Fig. 13. The Wi-Fi bit rates achieved on the uplink, we emphasize that establishing a
Backscatter prototype is configured to continuously modulate the communication link between Wi-Fi Backscatter tags with existing
Wi-Fi channel and the plots show the results for three scenarios:
without the prototype, with the prototype modulating at 100 bps Wi-Fi devices, albeit at a low rate, is beneficial for a large class of
and 1 kbps. The plots show that Wi-Fi rate adaptation can easily Internet-of-Things applications.
adapt to the variations caused by the prototype transmitter.
11. R ELATED W ORK
Wi-Fi Backscatter is related to work on RFID systems [8, 28,
throughput by computing the mean across the two minute dura- 29], which use dedicated powered infrastructure (RFID readers) to
tion. In each Wi-Fi transmitter location, we measure the average provide power and enable communication with battery-free tags.
throughput both in the presence and absence of our prototype. The cost of deploying and maintaining such an infrastructure has
Fig. 19 (a) and (b) shows the average data rate as a function of tempered the adoption of these systems. In contrast, the key value
the Wi-Fi transmitter location, for two different distance values be- proposition of RF-powered devices is that they can harvest ambi-
tween the prototype device and the Wi-Fi receiver. Each figure plots ent RF signals (e.g., TV, cellular, and Wi-Fi) and thus eliminate the
the data rates in three different scenarios: in the absence of the pro- need for dedicated infrastructure. Since traditional radio communi-
totype, and when the prototype transmits at 100 bps and 1 kbps. cation consumes significantly more power than is available in RF
The figures show that while there is variation in the observed data signals [23], it has thus far been challenging to connect these de-
rate across these scenarios (most notably in location 5 where the ex- vices to the Internet. Wi-Fi Backscatter addresses this problem with
periments were performed with heavy Wi-Fi utilization due to the a novel system that bridges RF-powered devices and the Internet.
presence of a class in the adjacent room), they are mostly within Wi-Fi Backscatter is also related to recent work on ambient
the variance. We believe this is because Wi-Fi uses rate adaptation backscatter communication [17] that enables two RF-powered de-
and can easily adapt for the small variations in the channel quality, vices to communicate by scattering ambient TV signals. While am-
resulting from the reflections from our prototype. bient backscatter can enable a network of RF-powered devices to
communicate with each other, it does not provide Internet connec-
tivity. A naive option is to deploy powered infrastructure devices
10. E VALUATING C ORRELATION E FFECTS ON that are equipped with both ambient backscatter communication
and traditional power-consuming radios, but this diminishes the key
W I -F I BACKSCATTER U PLINK R ANGE benefit of RF-powered systems; an ability to operate without ded-
Finally, we evaluate the feasibility of extending Wi-Fi Backscat- icated infrastructure. Wi-Fi Backscatter enables RF-powered de-
ter’s range on the uplink using the correlation technique in §3.4. vices to communicate with existing Wi-Fi infrastructure, bringing
Specifically, we place the Wi-Fi helper (an Intel Wi-Fi Link 5300 us closer to the vision of an RF-powered Internet of Things.
card) 3 meters away from the Wi-Fi reader (an Intel Wi-Fi Link Wi-Fi Backscatter also differs from both RFID and ambient
5300 card). The Wi-Fi Backscatter tag encodes zero and one bits backscatter systems in that these systems decode backscatter in-
using long code sequences of length N; the Wi-Fi reader correlates formation from a single continuous signal source, i.e., an RFID
with these code sequences to decode the bits as described in §3.4. reader or a TV tower. Further, the decoding is performed on cus-
We vary the distance between the Wi-Fi reader and the prototype tom hardware that is specially designed for this purpose. In con-
trast, this paper introduces a method to modulate the Wi-Fi channel 6th ACM Conference on Embedded Network Sensor Systems,
and demonstrates that we can perform decoding on off-the-shelf SenSys ’08, pages 393–394, New York, NY, USA, 2008. ACM.
Wi-Fi devices. Further, we show how to detect Wi-Fi packets and [9] N. Gershenfeld, R. Krikorian, and D. Cohen. The internet of things.
Scientific American.
communicate using such a capability.
[10] S. Gollakota, N. Ahmed, N. Zeldovich, and D. Katabi. Secure
Finally, recent work has demonstrated the ability to harvest in-band wireless pairing. In Proceedings of the 20th USENIX
power from ambient signals including TV [26, 19, 15, 25], and Conference on Security, SEC’11, pages 16–16, Berkeley, CA, USA,
cellular transmissions [27, 23]. More recently, researchers have 2011. USENIX Association.
demonstrated the ability to harvest energy from Wi-Fi transmis- [11] K. Gudan, S. Chemishkian, J. Hull, M. Reynolds, and S. Thomas.
sions [22, 21, 11]: [14] harvests and backscatters signals using Feasibility of wireless sensors using ambient 2.4ghz rf energy. In
Sensors, 2012 IEEE, pages 1–4, Oct 2012.
transmissions from Agilent 89600 custom 2.4 GHz transceiver
[12] J. Hagerty, F. Helmbrecht, W. McCalpin, R. Zane, and Z. Popovic.
hardware and [22, 11] show the feasibility of power harvesting us- Recycling ambient microwave energy with broad-band rectenna
ing signals from off-the-shelf Wi-Fi access points. Wi-Fi Backscat- arrays. Microwave Theory and Techniques, IEEE Transactions on,
ter builds on this work but is complimentary in that it transforms ex- 52(3):1014–1024, March 2004.
isting Wi-Fi signals into a communication medium for battery-free [13] D. Halperin, W. Hu, A. Sheth, and D. Wetherall. Tool release:
devices. Specifically, we are the first to establish a communication gathering 802.11 n traces with channel state information. ACM
SIGCOMM Computer Communication Review, 41(1):53–53, 2011.
link between RF-powered devices and commodity Wi-Fi devices.
[14] H. Ishizaki, H. Ikeda, Y. Yoshida, T. Maeda, T. Kuroda, and
M. Mizuno. A battery-less wifi-ber modulated data transmitter with
12. C ONCLUSION ambient radio-wave energy harvesting. In VLSI Circuits (VLSIC),
2011 Symposium on, pages 162–163, June 2011.
RF-powered devices hold the promise to realize a pervasive vi-
[15] Y. Kawahara, H. Lee, and M. M. Tentzeris. Sensprout: Inkjet-printed
sion of the “Internet of Things” where devices may be embedded soil moisture and leaf wetness sensor. In Proceedings of the 2012
into everyday objects and can achieve computation, sensing, and ACM Conference on Ubiquitous Computing, UbiComp ’12, pages
communication, all without the need to ever plug them in or main- 545–545, New York, NY, USA, 2012. ACM.
tain batteries. This paper provides the critical component in this [16] S. W. Kim, B.-S. Kim, and Y. Fang. Downlink and uplink resource
vision of RF-powered Internet of Things: an ability to connect RF- allocation in ieee 802.11 wireless lans. Vehicular Technology, IEEE
Transactions on, 54(1):320–327, 2005.
powered devices to the Internet.
[17] V. Liu, A. Parks, V. Talla, S. Gollakota, D. Wetherall, and J. R. Smith.
We present Wi-Fi Backscatter, a novel communication system Ambient backscatter: wireless communication out of thin air. In
that bridges RF-powered devices with the Internet. We show that it SIGCOMM, 2013.
is possible to reuse existing Wi-Fi infrastructure to provide Internet [18] D. Masotti, A. Costanzo, and S. Adami. Design and realization of a
connectivity to RF-powered devices. We show the feasibility of our wearable multi-frequency rf energy harvesting system. In Antennas
approach by building a hardware prototype and demonstrating the and Propagation (EUCAP), Proceedings of the 5th European
Conference on, pages 517–520, April 2011.
first communication link between an RF-powered device and com-
[19] C. Mikeka, H. Arai, A. Georgiadis, and A. Collado. Dtv band
modity Wi-Fi devices. We run experiments with off-the-shelf Wi-Fi micropower rf energy-harvesting circuit architecture and performance
devices and achieve communication rates of up to 1 kbps and ranges analysis. In RFID-Technologies and Applications (RFID-TA), 2011
of up to 2.1 m. We believe that this new capability is critical for the IEEE International Conference on, pages 561–567, Sept 2011.
commercial adoption of RF-powered Internet of Things. [20] H. Ochiai and H. Imai. On the distribution of the peak-to-average
power ratio in ofdm signals. Communications, IEEE Transactions on,
49(2):282–289, Feb 2001.
Acknowledgements. We would like to thank Ben Ransford, Vin-
[21] U. Olgun, C.-C. Chen, and J. Volakis. Wireless power harvesting with
cent Liu, Rajalakshmi Nandakumar, Donny Huang, our shepherd planar rectennas for 2.45 ghz rfids. In Electromagnetic Theory
Kyle Jamieson, and the anonymous SIGCOMM reviewers for their (EMTS), 2010 URSI International Symposium on, pages 329–331,
helpful comments. This research is funded in part by UW Commer- Aug 2010.
cialization Gap Fund, Qualcomm Innovation Fellowship, Washing- [22] U. Olgun, C.-C. Chen, and J. Volakis. Design of an efficient ambient
ton Research Foundation gift, NSF, and University of Washington. wifi energy harvesting system. Microwaves, Antennas Propagation,
IET, 6(11):1200–1206, August 2012.
[23] A. N. Parks, A. P. Sample, Y. Zhao, and J. R. Smith. A wireless
13. R EFERENCES sensing platform utilizing ambient RF energy. In IEEE Topical
[1] ADG902 RF switch datasheet. Meeting on Wireless Sensors and Sensor Networks (WiSNet 2013),
http://www.analog.com/static/imported- January 2013.
files/data_sheets/adg901_902.pdf. [24] R. Raghavendra, J. Padhye, R. Mahajan, and E. Belding. Wi-fi
[2] Epc class 1 generation 2 uhf rfid air interface specification. networks are underutilized. Technical report, Technical report, MSR,
http://www.gs1.org/gsmp/kc/epcglobal/uhfc1g2/uhfc1g2_1_2_0- 2009.
standard-20080511.pdf. [25] A. Sample and J. Smith. Experimental results with two wireless
[3] Pandora. www.pandora.com. power transfer systems. In Radio and Wireless Symposium, 2009.
[4] SMS7630 surface mount mixer and detector schottky diodes. RWS ’09. IEEE, pages 16 –18, jan. 2009.
http://www.skyworksinc.com/uploads/documents/Surface_Mount_ [26] R. Shigeta, T. Sasaki, D. M. Quan, Y. Kawahara, R. Vyas,
Schottky_Diodes_200041W.pdf. M. Tentzeris, and T. Asami. Ambient rf energy harvesting sensor
[5] Ieee standard for information technology– local and metropolitan device with capacitor-leakage-aware duty cycle control. Sensors
area networks– specific requirements– part 11: Wireless lan medium Journal, IEEE, 13(8):2973–2983, Aug 2013.
access control (mac)and physical layer (phy) specifications [27] H. Visser, A. Reniers, and J. Theeuwes. Ambient rf energy
amendment 5: Enhancements for higher throughput. IEEE Std scavenging: Gsm and wlan power density measurements. In
802.11n-2009 (Amendment to IEEE Std 802.11-2007 as amended by Microwave Conference, 2008. EuMC 2008. 38th European, pages
IEEE Std 802.11k-2008, IEEE Std 802.11r-2008, IEEE Std 721–724, Oct 2008.
802.11y-2008, and IEEE Std 802.11w-2009), pages 1–565, Oct 2009. [28] J. Wang, H. Hassanieh, D. Katabi, and P. Indyk. Efficient and reliable
[6] R. Barker. Group synchronizing of binary digital sequences. low-power backscatter networks. In SIGCOMM, 2012.
Communication Theory, pages 273–287, 1953. [29] P. Zhang and D. Ganesan. Enabling bit-by-bit backscatter
[7] D. Brennan. On the maximal signal-to-noise ratio realizable from communication in severe energy harvesting environments. In NSDI,
several noisy signals. Proc. IRE, 43(10):1530, 1955. Berkeley, CA, 2014. USENIX.
[8] M. Buettner, R. Prasad, A. Sample, D. Yeager, B. Greenstein, J. R.
Smith, and D. Wetherall. Rfid sensor networks with the intel wisp. In