History of the WISP Program

Chapter

Abstract

This article describes the history of the Wireless Identification and Sensing Platform (WISP) program. It describes the research motivating the creation of the WISP, its development process, the decision to open source its design, and the creation of the WISP Challenge, a program to make WISPs available to univer-sity researchers. The article then surveys WISP-related research performed by the author’s group, by collaborators, and by others who received WISPs through the WISP Challenge or via other channels.

References

  1. 1.
    H. Ba, I. Demirkol, and W. Heinzelman. Passive RFID-based wake-up radios for wireless sensor networks. In J.R. Smith, editor, Wirelessly powered sensor networks and computational RFID (this volume), New York, 2013. Springer SBM.Google Scholar
  2. 2.
    M. Buettner and D. Wetherall. Implementing the Gen 2 MAC on the Intel-UW WISP. In J.R. Smith, editor, Wirelessly powered sensor networks and computational RFID (this volume), New York, 2013. Springer SBM.Google Scholar
  3. 3.
    M. Buettner, B. Greenstein, A. Sample, J.R. Smith, and D. Wetherall. Revisiting smart dust with RFID sensor networks. In Proceedings of the 7th ACM Workshop on Hot Topics in Networks (HotNets-VII), 2008.Google Scholar
  4. 4.
    M. Buettner, R. Prasad, A. Sample, D. Yeager, B. Greenstein, J.R. Smith, and D. Wetherall. RFID sensor networks with the Intel WISP. In Proceedings of the 6th ACM conference on Embedded network sensor systems, pages 393–394. ACM, 2008.Google Scholar
  5. 5.
    M. Buettner, R. Prasad, M. Philipose, and D. Wetherall. Recognizing daily activities with RFID-based sensors. In Proceedings of the 11th international conference on Ubiquitous computing, pages 51–60. ACM, 2009.Google Scholar
  6. 6.
    H.-J. Chae, D.J. Yeager, J.R. Smith, and K. Fu. Maximalist cryptography and computation on the WISP UHF RFID tag. In Conference on RFID Security (website), July 2007.Google Scholar
  7. 7.
    H.-J. Chae, M. Salajegheh, D.J. Yeager, J.R. Smith, and K. Fu. Maximalist cryptography and computation on the WISP UHF RFID tag. In J.R. Smith, editor, Wirelessly powered sensor networks and computational RFID (this volume), New York, 2013. Springer SBM.Google Scholar
  8. 8.
    A. Czeskis, K. Koscher, J.R. Smith, and T. Kohno. RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. In Proceedings of the 15th ACM conference on Computer and communications security, CCS ’08, pages 479–490, New York, NY, USA, 2008. ACM.Google Scholar
  9. 9.
    K. Fishkin, B. Jiang, M. Philipose, and S. Roy. I sense a disturbance in the force: Unobtrusive detection of interactions with RFID-tagged objects. UbiComp 2004: Ubiquitous Computing, pages 268–282, 2004.Google Scholar
  10. 10.
    F. Gasco, P. Feraboli, J. Braun, J. Smith, P. Stickler, and L. DeOto. Wireless strain measurement for structural testing and health monitoring of carbon fiber composites. Composites Part A: Applied Science and Manufacturing, 42(9):1263–1274, 2011.CrossRefGoogle Scholar
  11. 11.
    A. Molina-Markham, S.S. Clark, B. Ransford, and K. Fu. Bat: Backscatter anything-to-tag communication. In J.R. Smith, editor, Wirelessly powered sensor networks and computational RFID (this volume), New York, 2013. Springer SBM.Google Scholar
  12. 12.
    C. Pendl, M. Pelnar, and M. Hutter. Elliptic curve cryptography on the wisp uhf rfid tag. RFID. Security and Privacy, pages 32–47, 2012.Google Scholar
  13. 13.
    M. Philipose, K.P. Fishkin, M. Perkowitz, D.J. Patterson, D. Fox, H. Kautz, and D. Hahnel. Inferring activities from interactions with objects. Pervasive Computing, IEEE, 3(4):50–57, 2004.CrossRefGoogle Scholar
  14. 14.
    M. Philipose, J.R. Smith, B. Jiang, A. Mamishev, S. Roy, and K. Sundara-Rajan. Battery-free wireless identification and sensing. IEEE Pervasive Computing, 4(1):37–45, 2005.CrossRefGoogle Scholar
  15. 15.
    A. Sample and J.R. Smith. Experimental results with two wireless power transfer systems. In IEEE Radio and Wireless Symposium, RWS ’09, pages 16–18, Jan. 2009.Google Scholar
  16. 16.
    A. Sample and J.R. Smith. The wireless identification and sensing platform. In J.R. Smith, editor, Wirelessly powered sensor networks and computational RFID (this volume), New York, 2013. Springer SBM.Google Scholar
  17. 17.
    A.P. Sample, D.J. Yeager, P.S. Powledge, A.V. Mamishev, and J.R. Smith. Design of an RFID-based battery-free programmable sensing platform. IEEE Transactions on Instrumentation and Measurement, 57(11):2608–2615, Nov. 2008.CrossRefGoogle Scholar
  18. 18.
    A.P. Sample, D.J. Yeager, and J.R. Smith. A capacitive touch interface for passive RFID tags. In IEEE International Conference on RFID, pages 103–109, April 2009.Google Scholar
  19. 19.
    A.P. Sample, D.A. Meyer, and J.R. Smith. Analysis, experimental results, and range adaptation of magnetically coupled resonators for wireless power transfer. IEEE Transactions on Industrial Electronics, 58(2):544–554, 2011.CrossRefGoogle Scholar
  20. 20.
    A.P. Sample, J. Braun, A. Parks, and J.R. Smith. Photovoltaic enhanced UHF RFID tag antennas for dual purpose energy harvesting. In IEEE International Conference on RFID, pages 146–153, 2011.Google Scholar
  21. 21.
    A.P. Sample, C. Macomber, L.T. Jiang, and J.R. Smith. Optical localization of passive UHF RFID tags with integrated LEDs. In IEEE International Conference on RFID, pages 116–123, 2012.Google Scholar
  22. 22.
    A. Sample, A. Parks, S. Southwood, and J.R. Smith. Wireless ambient radio power. In J.R. Smith, editor, Wirelessly powered sensor networks and computational RFID (this volume), New York, 2013. Springer SBM.Google Scholar
  23. 23.
    J.R. Smith. RFID tag with accelerometer, June 7 2011. US Patent 7,956,725.Google Scholar
  24. 24.
    J.R. Smith. Range scaling of wirelessly powered sensor systems. In Joshua R. Smith, editor, Wirelessly powered sensor networks and computational RFID (this volume), New York, 2013. Springer SBM.Google Scholar
  25. 25.
    J.R. Smith and D. Haehnel. Device configuration with RFID, November 2 2010. US Patent 7,825,776.Google Scholar
  26. 26.
    J.R. Smith and J.A. Landay. Time domain embedding of application information in an RFID response stream, December 14 2005. US Patent App. 11/304,511.Google Scholar
  27. 27.
    J.R. Smith and M. Philipose. Inertially controlled switch and RFID tag, February 26 2008. US Patent 7,336,184.Google Scholar
  28. 28.
    J.R. Smith, K.P. Fishkin, B. Jiang, A. Mamishev, M. Philipose, A.D. Rea, S. Roy, and K. Sundara-Rajan. RFID-based techniques for human-activity detection. Communications of the ACM, 48(9):39–44, 2005.CrossRefGoogle Scholar
  29. 29.
    J. Smith, B. Jiang, S. Roy, M. Philipose, K. Sundara-Rajan, and A. Mamishev. ID modulation: Embedding sensor data in an RFID timeseries. In Information Hiding, pages 234–246. Springer, 2005.Google Scholar
  30. 30.
    J.R. Smith, A.P. Sample, P.S. Powledge, S. Roy, and A. Mamishev. A wirelessly-powered platform for sensing and computation. In Ubicomp, pages 495–506, 2006.Google Scholar
  31. 31.
    J.R. Smith, A. Lamarca, and M. Philipose. Switch status and RFID tag, August 12 2008. US Patent 7,411,505.Google Scholar
  32. 32.
    J.R. Smith, D. Yeager, and A. Rahimi. Radio frequency identification tags adapted for localization and state indication, July 17 2012. US Patent 8,222,996.Google Scholar
  33. 33.
    A. Szekely, M. Hofler, R. Stogbuchner, and M. Aigner. Security enhanced wisps: Implementation challenges. In J.R. Smith, editor, Wirelessly powered sensor networks and computational RFID (this volume), New York, 2013. Springer SBM.Google Scholar
  34. 34.
    B. Waters, K. Kagi, J. Reed, A. Sample, P. Bonde, and J.R. Smith. Powering a vad using the portable freed system. In J.R. Smith, editor, Wirelessly powered sensor networks and computational RFID (this volume), New York, 2013. Springer SBM.Google Scholar
  35. 35.
    D.J. Yeager, P.S. Powledge, R. Prasad, D. Wetherall, and J.R. Smith. Wirelessly-charged UHF tags for sensor data collection. In IEEE International Conference on RFID, pages 320–327, 2008.Google Scholar
  36. 36.
    D.J. Yeager, A.P. Sample, J.R. Smith, and J.R. Smith. WISP: A passively powered UHF RFID tag with sensing and computation. RFID Handbook: Applications, Technology, Security, and Privacy, pages 261–278, Boca Raton, FL, 2008. CRC Press.Google Scholar
  37. 37.
    D.J. Yeager, J. Holleman, R. Prasad, J.R. Smith, and B.P. Otis. NeuralWISP: A wirelessly powered neural interface with 1-m range. IEEE Transactions on Biomedical Circuits and Systems, 3(6):379–387, 2009.CrossRefGoogle Scholar
  38. 38.
    D. Yeager, F. Zhang, A. Zarrasvand, N. George, T. Daniel, and B. Otis. A 9μA, addressable Gen2 sensor tag for biosignal acquisition. IEEE J. Solid-State Circuits, 45(10):2198–2209, 2010.CrossRefGoogle Scholar
  39. 39.
    D. Yeager, F. Zhang, A. Zarrasvand, N. George, T. Daniel, and B. Otis. System-On-Chip WISP: A 9 μA, addressable gen 2 sensor tag for biosignal acquisition. In J.R. Smith, editor, Wirelessly powered sensor networks and computational RFID (this volume), New York, 2013. Springer SBM.Google Scholar
  40. 40.
    H. Zhang, J. Gummeson, B. Ransford, and K. Fu. Moo: A batteryless computational RFID and sensing platform. University of Massachusetts Computer Science Technical Report UM-CS-2011-020.Google Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  1. 1.Department of Computer Science and Engineering, Department of Electrical EngineeringUniversity of WashingtonSeattleUSA

Personalised recommendations