Choosing a Wireless Protocol for Secure and Smart Premises Does it Have to be One Size Fits All?

Similar documents
Advanced Technology College (ATC), Daytona, Florida

Tyco Security Products Acquires Innometriks Deal strengthens TSP s Solutions in the Government Market

PowerMaster Security Solutions

New Dimensions in Hybrid Security with PowerSeries Neo.

PowerMaster. Expanding the Boundaries of Security. PowerG. Technology. with

GX-Cubic1 Smart Care Medical Alarm Solutionon. Caring for Your Health and Personal Safety

Home automation & security system solution base on IOT

Complete Security Solution

Floor Heating Control with Homematic IP

Totally Wireless Video Security

GX-Cubic1 Smart Care Medical Alarm Solutionon. Caring for Your Health and Personal Safety

Secure Your Way of Life. Now Compa ble With. Vesta Smart Security Solution ML Series

UltraSync Modular Hub

Pennsylvania State University. University Park and Commonwealth Campuses, State College, Penn. CASE SUMMARY. Location: System Installed:

VIDEO SURVEILLANCE MARKET

Now Compa ble With. VL Touchscreen Alarm. Crafted Touchscreen Security System that Revolutionizes Your World. illi tl C

Secure Your Way of Life. Now Compa ble With. Vesta Smart Security Solution - MZ Series

THE NEXT SMART HOME GENERATION

A Complete Smart Care Solution

Smart Home Security Gateway Series

White paper Wireless monitoring and intrusion detection in banking

Corporate Presentation

Smart Home Security Gateway Series

Keeping Employees Safe

Chapter 1 Introduction

G4S Investor Presentation John Kenning, Regional CEO, North America. NYC December 2017

Secvest. The alarm system.

Common Questions & Answers

B and G Series Integrated Security Solution

E529 Smart Digital Thermostat Product Guide

ABAX two-way wireless system

Secure Your Way of Life. Home Control Gateway Series. Life-Transforming ZigBee/Z-Wave Innovations

Future Proof Your Home All Things. Be One TM

SECURITY SOLUTIONS Banking and finance

Smart Anytime, Safe Anywhere. Home Control Gateway Series. Life-Transforming ZigBee/Z-Wave Innovations

All tested. Easy Series Intrusion Control Panel Making security easy featuring wlsn* * wireless Local SecurityNetwork

status AW1 Plus WiFi Alarm System User Manual

Construction of Wireless Fire Alarm System Based on ZigBee Technology

Increase your revenue with Caséta by Lutron Simple, reliable, affordable lighting control

Introduction. deliver benefits. proficient & reliable partner. A Technological Company Netsoft Group.

Smart Buildings & The Internet of Things (IoT)

YALE SECURE CONNECT. Delivering a premium digital locking solution with flexible control and peace of mind.

A Complete Smart Care Solution

Integrated Security Solutions

EAGLE: Smart Wireless Solution. Condition monitoring installation has never been so easy. Brand of ACOEM

SHEPHERD. Smart solutions to protect and manage what matters the most to you

New generation wireless alarm systems

NEW GENERATION WIRELESS ALARM SYSTEMS

Integrated Security Solutions

Messenger Wireless Lock Access Network

ALC-PACK3. WiFi Alarm System with HD WiFi Camera. User Manual. Your Watchguard Wireless Security professional:

Oficiālais DSC pārstāvis Latvijā SIA «BK Latvia» Dārzciema ielā 60, Rīga

Connect your panel to any local area network

Smart Home Strategies and Partnerships for Energy Utilities

ThinkPro Security and Automation Panel User Guide

Comprehensive solutions for greater safety and security Answers for infrastructure.

Description Supervised Wireless Technology PRODUCT SPECIFICATION SHEET

Successful Applications Using ISA100 Wireless Technology

Secure Your Way of Life. Now Compa ble With. Climax Home Portal Platform. Enable a Connected Future

Get the latest facts about Why Mesh Radio is Better

Lone Worker Duress Security Hazard Zone Remote Area Health Care DURESS & SAFETY TECHNOLOGIES I N T E R N A T I O N A L

status AW1 WiFi Alarm System Printed in China PA : AW1-UM-EN-V1.0 User Manual 2016 Chuango. All Rights Reserved.

If you want to. grow your business expand your. expectations.

Securing Your Connected Life. Safe4 Security Group AS

Profile. For a better understanding of this product, please read this user manual thoroughly before using it.

Introducing the Digital Illumination Interface Alliance

CONSUMER BRANDS GROUP

Cold chain monitoring technologies. Facility monitoring

WiFi GSM APP Smart Home Security System

Security Alarm Systems

Wireless Indoor Lighting Control System

Copyright 2017 by Eddy Home Inc. All Rights Reserved.

Comprehensive Security for Banks and Credit Unions

Secure Your Way of Life. Home Control Gateway Series. Life-Transforming ZigBee/Z-Wave Innovations

WILDLIFE AND ASSET PROTECTION PRODUCTS

Intelligent Wireless GSM Alarm System

Innovative Access Solutions CEM Systems is a leading provider of access control and fully integrated security management systems that you can rely on

Market Intelligence & Consulting Institute

AT&T Digital Life A better way to manage life at home from almost anywhere

BUILDING SMART HOMES

BUG DETECTOR WITH ANALOG AND DIGITAL OPTIONS SKU: CDRFAD

The Leading Enterprise Internet of Things Solution. Wireless Duct Temperature Sensors. General Description. Features of Monnit ALTA Sensors

True Connectivity. True Convenience.

XHS1-TY / MP-841 ZigBee Home Automation 1.2 Wireless Digital Pet Immune PIR Detector

ENABLING MARKET ACCESS RADIO EQUIPMENT DIRECTIVE (RED) 2014/53/EU. The new radio equipment directive in detail

Arlo Wire-Free Smart Security Lights. No cords. No wires. No worries. 100% Wire-Free. Fully Customizable. Works with Arlo Camera Systems

C. The system shall be capable of turning luminaires on/off (where supported by the luminaire) as well as full range dimming.

lighting control Simple and scalable Flexible control every step of the way DESIGN INSTALL MAINTAIN

A Smart & Integrated Security solution

Wireless Lighting Control Made Easy

Your Own Smart Home Solution Present by GKB Team

ALERiTY Wide-Area Mass Notification. Mass notification. Providing industry-leading intelligibility

Intelligent Keys. A smart solution for recurring revenue

Security & Communications INTRUSION AND ALARM COMMUNICATIONS

Product catalogue. White label products for the entire IoT industry. Smart home Energy management Home security Assisted living

Smart Wireless Sensor

Moving to the Cloud: The Potential of Hosted Central Station Services

The Future of Smart Technology

2015 Honeywell Users Group Europe, Middle East and Africa

Smart control. for easy living

Transcription:

Choosing a Wireless Protocol for Secure and Smart Premises Does it Have to be One Size Fits All? www.tycosecurityproducts.com 2015 Tyco Security Products

Contents Executive Summary 2 Introduction 4 Open Protocols 4 Overview of Open Protocols 4 Proprietary Protocols 6 Overview of PowerG 6 Key Issues for Home Automation Systems 6 Key Issues for Security and Safety Systems 7 Reliability and Performance 7 Privacy and Vulnerability 10 Usability and Maintenance 10 Conclusion 11 Safer. Smarter. Tyco. TM 2

Executive Summary Selecting a wireless protocol is a fundamental step in building a multi-service offering for a home automation and/or security system, just as it is any time a consumer or professional installer is setting up such a system. There are many technology options from open wireless protocols designed for broad use, to proprietary protocols that focus on a narrower set of applications. Each wireless protocol has its strengths and weaknesses for different types of applications. In particular, the requirements for home automation applications are often quite different to those for home security and safety. Typically, wireless protocol selection is seen as a one size must fit all proposition, which inevitably results in a network optimized either for home automation or for home security and safety. But it doesn t have to be that way. Instead of either/or, it is possible to create a hybrid network that provides an optimized answer for both home automation and home security and safety. This paper evaluates the strengths and weaknesses of open vs. proprietary protocols for home automation and home security networks. It explains how open and proprietary protocols can work alongside each other, in a controlled and integrated network that delivers cost-effective and convenient home automation as well as high-performing, reliable security and safety, via a network gateway that supports multiple protocols via a single interface. Safer. Smarter. Tyco. TM 3

Introduction Selecting the most appropriate wireless protocol is critical when building a home automation or security offering and when planning such a system. However, the decision-making process is complicated by the wide variety of currently available technologies each with its strengths and weaknesses as well as by the differing requirements for home automation and security systems. Typically, wireless protocol selection has been seen as an either/or proposition, since there is currently no single protocol that adequately meets all the requirements for both home automation and security. Wireless protocols based on open technologies are typically considered more suitable for home automation, an area where price is a key concern. Proprietary wireless protocols are usually thought to be a better choice for security systems where key issues are reliability, privacy, and vulnerability. This either/or approach results in networks being optimized either for home automation or for home security and safety but not for both. Often, when a single protocol is selected for both uses, an open technology is chosen a decision that is sometimes made at the expense of the security system s performance. Open Protocols Most open wireless protocols were developed by a consortium of companies or an industry alliance in order to establish a standard for systems and devices from multiple vendors. Open protocols address applications that typically require a relatively high bit rate and less costly peripherals (and therefore can tolerate lower performance). Included among these protocols are BLE (Bluetooth Low Energy/Smart Bluetooth), DECT/DECT ULE, Thread, ZigBee, and ZWave. Overview of Open Protocols: BLE (Bluetooth Low Energy/Smart Bluetooth) BLE is based on classic Bluetooth, a wireless personal area network technology originally created in the 1990s. It was designed to reduce power consumption beyond classic Bluetooth, with a similar communication range. Low-energy applications include smart homes, health, sport and fitness. Most mobile operating systems available today support BLE. BLEbased offerings which include light bulbs and speaker docks are occasionally used in home automation, though the protocol is not suited for security and safety applications due to its limited range. Safer. Smarter. Tyco. TM 4

DECT / DECT ULE DECT (Digital Enhanced Cordless Telecommunications) is a widely used digital wireless telephone technology developed and managed by the DECT Forum. DECT ULE (Ultra-Low Energy) is a new specification designed to evolve DECT into a wireless networking technology for home automation. DECT ULE primarily targets lighting control, HVAC, healthcare and energy monitoring applications. It has a range of 50-300 m (164-984 ft). To date, there are few DECT ULE installations in the security space, and it is not yet clear whether DECT ULE will be a serious contender for security and safety applications. Thread Thread is a low-power mesh network protocol targeted to home automation, enabling smart household devices to communicate on a network, with direct Internet and cloud access. It uses standard technologies and standard radios. Launched in mid-2014, it was developed by the Thread Group, a group founded by Google s Nest Labs together with Samsung, ARM Holdings, Freescale, Silicon Labs, and others. Focused on the Internet of Things (IoT), it connects a wide range of products in the home. Using the crowded 2.4Ghz band which may cause interference, the first devices will be released in late 2015, with performance to be evaluated over time. ZWave ZWave is a mesh networking technology for home automation, allowing home devices to communicate with each other. Minimizing power consumption, it claims a range of ±100 m (330 ft), though reviewers put the range as low as 30 m (100 ft). Used in residential access control, lighting, entertainment systems, HVAC, and security, it is easily integrated into consumer devices. Developed by Zen-Sys (acquired by Sigma Designs), it is supported today by the ZWave Alliance, a group of 250+ manufacturers of ZWave-based wireless home control products. ZigBee ZigBee is a set of mesh network communication specifications for WLANs covering a large area. Designed for low-power-consumption applications primarily wireless control and monitoring it has a typical transmission range of ±50m (164 ft) and is mainly targeted to the Internet of Things (IoT) and home automation. ZigBee is scalable for up to thousands of devices, enabling large installations and easy expansion of existing systems. Developed by the ZigBee Alliance, a non-profit organization with about 400 members, there are currently two major ZigBee specifications for home automation: ZigBee PRO, for deviceto-device communications, and ZigBee IP, targeted to applications such as smart metering. Many Telcos, particularly in the USA, have adopted ZigBee as their main protocol for both home automation and security. A wide range of ZigBee-based devices for home automation from many different vendors is available. Additionally, there are some ZigBee devices for security and safety, with Tyco the leading vendor in this arena. Safer. Smarter. Tyco. TM 5

Proprietary Protocols Proprietary technologies are developed and used for specific applications usually created by a single company rather than a consortium or alliance providing a high level of performance across key parameters. For this paper, we will focus on PowerG Technology, comparing it with the above open protocols in terms of advantages and disadvantages for home automation vs. safety and security applications. Overview of PowerG: PowerG Technology is a proprietary, tree topology protocol developed by Visonic part of Tyco Security Products. It is optimized specifically for the monitoring and control of battery-operated devices for security and safety applications for homes and businesses. PowerG delivers battery life of up to 8 years, compared with the 3-5 years offered by open protocols. As the sole developer and manufacturer of PowerG devices, Tyco offers a native mobile app that provides real-time visibility and control of the security system. PowerG has numerous built-in technologies and features designed to ensure reliable, secure and efficient communication. These include: frequency hopping, which enables secure and reliable message transmission; automated route recovery; and TDMA time synchronization for energy-efficient communication with low latency a must for keypads, visual verification, sirens and panic buttons. The use of TDMA communication eliminates RF collisions. As a proprietary technology, PowerG is less likely to be hacked than open technologies, and is well-protected against malicious and accidental interference. Devices have extremely high ranges of up to ±2000 m (6565 ft) LOS. PowerG Technology was introduced in 2011 and today is used in hundreds of thousands of systems and millions of devices around the world. PowerG is not used in home automation; it is focused on security and safety delivering the high performance required for monitoring and control. Key Issues for Home Automation Systems Key considerations for home automation systems are price, interoperability, and scalability. In terms of these issues, the open source technologies are the clear winner. Unlike the open technologies, PowerG is focused on safety and security, and is specifically designed for maximum reliability. Key Issues for Security and Safety Systems The below charts compare the open source technologies with PowerG in terms of the three key issues to be considered when ensuring secure premises: reliability and performance; privacy and vulnerability; and usability and maintenance. Safer. Smarter. Tyco. TM 6

Reliability and Performance PowerG ZigBee & Thread Z-Wave DECT ULE Network topology (see diagrams below) Extended star/tree Mesh Mesh Star RF bands * 433-434 MHz 868-869 MHz 912-918 MHz 2.4 GHz 868/908 MHz 1880-1900 MHz Number of channels * 4, 8 or 50 24 1 120 Network size 250 65,536 232 (max.) ~ 400 Encryption * AES 128 and real-time key AES 128 AES 128 AES 128 Frequency hopping * Yes No No Yes Security regulations Full support Support Support Future support Safer. Smarter. Tyco. TM 7

Power consumption ** PowerG Excellent Typical battery life: 5-8 years on most devices. This is due to the two-way fully synchronized network, optimized message transmission, and real-time arm/disarm, which optimizes device sleep time. ZigBee & Thread, Z-Wave, DECT ULE Fair-Good Typical battery life: up to 5 years. This is due to synchronization being initiated by end devices only, which requires more transmissions from the devices. e.g. DECT ULE synchronous mode is achieved by each device waking up every 20 seconds and transmitting to the panel. On average it consumes 20 μa and battery life is 4 years with 2xAA Alkaline batteries (up to 5200 mah). In comparison, PowerG consumes 7.5 μa and provides at least 5 years battery life with 1xCR123 (1450 mah). Reliability Excellent There are minimum message collisions due to inherent time synchronization. RF reception is stable at all times in any location and narrowband interferences are overcome thanks to frequency hopping. Z-Wave, ZigBee Fair DECT ULE Good Because the network is not fully synchronized, there are collisions and retransmissions. Zigbee and Z-Wave can be jammed by narrowband interference due to lack of frequency hopping. DECT ULE has a dedicated band, but can be subject to interference from other DECT systems in the premises. Network range (Typical) ** Excellent 50-100 m indoor 750 m outdoor LOS urban area 2,000 m outdoor LOS non-urban area (no interference) Z-Wave, ZigBee Fair DECT ULE Good Z-wave, Zigbee: 10-30 m indoor DECT ULE: 30-70 m indoor; 600 m outdoor LOS urban area Data rate 50 kbps Although it supports 50 kbps, PowerG is optimized for intrusion applications. It supports transmission of data, voice and video files (video verification). Z-Wave Up to 40 kbps ZigBee 250 kbps DECT ULE 1152 kbps DECT ULE supports high data rates, which can be used for high bandwidth applications. Safer. Smarter. Tyco. TM 8

Installerand userfriendliness ** PowerG Excellent All devices are configured from the panel; there is no need for hardware switches or to re-open device covers. Devices can be pre-enrolled to the panel, at the factory, before arrival onsite, saving installation time. Link quality diagnostics are shown on devices, so installers do not need to be physically near the panel to perform RF-link tests. This facilitates detector placement optimization. Real-time configuration, status of all devices and the value of all devices parameters can be reviewed directly from the monitoring station. The panel uses RF diagnostics to measure all wireless connections and reports back to the dealer or monitoring station: last 24 hours; current/on-demand. Walk test mode can be initiated remotely and remote testing can be performed with the assistance of a non-technical person in the house. ZigBee & Thread, Z-Wave, DECT ULE Fair Since two-way synchronized functionality is very limited, real-time remote diagnostics and configuration are limited. Network status is limited to connected/not-connected level and no other parameters such as RF signal level are provided. Since there is no linkage between the panel and end device applications, the end device configuration (LED on/off, detection sensitivity, etc.) must be set locally in the device using jumpers or switches. Safer. Smarter. Tyco. TM 9

Mesh Topology Privacy and Vulnerability See * marked in the tables above. Additional note: The privacy requirements for an alarm system are far higher than for home automation, due to the mission-critical nature of security and safety. ZigBee, Thread, Z-Wave and DECT ULE and PowerG are all protected, due to their use of the proven AES- 128 advanced encryption algorithm. However, because of their broad implementation, ZigBee and Z-Wave are susceptible to hacking (and indeed there are already many hacks available) and interference. In contrast, PowerG is not of special interest to hackers, and is well protected from interference. Tree Topology Usability and Maintenance See ** marked in the tables above. Additional note: Usability and maintenance affect both end-users and installers. For end-users, the main issues are ease of DIY installation, battery life, mobile control, and price. For installers, ease of installation (range, interoperability) ranks highest, with ease and cost of maintenance (battery life, scalability), running a close second. In addition, low-power, low-latency downlink and time synchronization also impact usability, allowing remote link testing, remote device configuration, and detector sensitivity testing. Network coordinator Router / repeater End device Safer. Smarter. Tyco. TM 10

Conclusion Open wireless protocols such as ZigBee and others mentioned in this paper excel in the field of home automation, offering a lower upfront cost for devices, extensive scalability and interoperability, and suitability for DIY. However, they offer only a partial and limited answer for many home and business security and safety applications. They are weaker on battery life and there is only limited support of full solution and advanced features and by a single application. Since open technologies have greater tolerance for latency and lower requirements for privacy, they are less suited to home security. The current proprietary technologies such as PowerG outperform the open technologies in delivering the reliability, performance, privacy, and capabilities required to support missioncritical security and safety for today s homes and businesses. They also score higher on usability and maintenance, with a long range that enables repeater-free installations even in large projects. Extended battery life minimizes maintenance costs and hassle for both installers and end-users. However, they are not specifically designed for use in home automation networks. Given the above, choosing a single protocol for a smart home or business that requires both automation and security raises the question: is selecting either an open or a proprietary protocol the only option? An Alternative to the Either/Or Proposition: A Hybrid Network Fortunately, there is another option. Instead of either/or, it is possible to create a hybrid network that provides an optimized answer for both home automation and home security and safety. An integrated platform that supports multiple protocols via a network-specific gateway allows open and proprietary protocols to work alongside each other. In this way, the network delivers agile, cost-effective, and convenient home automation as well as a professional grade, fully protected security and safety system all with a single point of management and access. Tyco offers a PowerG gateway that supports ZigBee, ZWave, and WiFi networks. With this integrated approach, home and business owners can enjoy all the DIY, flexibility and cost advantages of an open protocol for home automation applications, while also benefitting from the rigorous reliability, privacy, and advanced capabilities of a dedicated protocol for mission-critical security and safety. And, the entire environment including both automation and security systems can be controlled via a comprehensive mobile app. This hybrid option provides end-users and installers with the best of all possible worlds enabling an Integrated Hybrid Platform optimized for BOTH security and home automation. For more information about creating a hybrid network for integrated home automation and security and safety, contact your local Tyco Security Product Representative or visit us at www.tycosecurityproducts.com Safer. Smarter. Tyco. TM 11

About Tyco Security Products Tyco Security Products and its leading brands conducts business in over 176 countries around the world, in multiple languages and employs over 2,700 employees globally, including research and development, marketing, manufacturing, sales, service and logistics teams in the Americas, Europe, the Middle East, Africa, and Asia Pacific. Our products, built by developers from all product disciplines, consistently allow customers to see more, do more, and save more across multiple industries and segments including healthcare, government, transportation, finance, retail, commercial and residential. Worldwide, Tyco Security Products helps protect 42% of Fortune 500 companies, transportation systems on five continents, 37% of the world s top 100 retailers, over two million commercial enterprises, thousands of students in more than 900 educational facilities, and over five million private residences. Learn more about Tyco Security Products at www.tycosecurityproducts.com About Tyco s Intrusion Detection Solutions Tyco is providing smarter ways to help protect people, homes and business operations with our world-class Intrusion Detection solutions. The loss of lives, goods, equipment and valuable information due to intrusion at work seriously affects businesses and negatively impacts employees. Taking a consultative approach, Tyco delivers a full range of integrated Intrusion Detection solutions that are customized for each customer. At home, the safety of family members is paramount but loss of property is also financially and emotionally damaging. Tyco customizes Intrusion Detection solutions for every kind of household. From large industrial concerns such as oil and gas or mining companies to private individuals seeking to protect their homes and families, Tyco designs, installs, maintains and upgrades Intrusion Detection solutions to fit the specific needs and budgets of each of our customers. Tyco s world-class Intrusion Detection systems help protect our customers property, assets and people 24 hours a day. Our solutions provide a crucial deterrent to criminals along with a rapid response from our Alarm Monitoring Centers. We help protect what matters most by finding smarter ways to save lives and improve business operations with the latest Intrusion Detection solutions. Copyright Tyco 2015. This document contains Tyco proprietary information, as well as publicly available information. Both may be subject to change without notice. All rights reserved. Reproduction or distribution other than for intended purposes is prohibited, without the prior written consent of Tyco. The trademarks and service marks of Tyco, including the Tyco mark and logo and PowerG are the exclusive property of Tyco, and may not be used without permission. All other marks are the property of their respective owners. Created 11/2015.