wlsn: the fast way to more reliable security€¦ · web viewwlsn system from bosch security...

9
Wireless Local Security Network (wLSN): The fast way to more reliable Security Authors (alphabetical order): Jim Berube, Abtin Keshavarzian, Arati Manjashwar, Lakshmi Venkatraman 1. Introduction The advent of wireless sensor networks has made it possible for many cable-free, easily deployable residential applications. Several different kinds of wireless home- networking products have become available. However, challenges like reliability, coverage area and ease of use have continued to prevail. In Europe these concerns are augmented by factors like hard to penetrate concrete walls and limited available bandwidth in 868MHz security band (reserved for alarm system). Bosch Security Systems backed by the innovative power of Bosch Research group has focused on exactly these issues for the past few years. The result is a new extremely reliable, robust two-way wireless system, Wireless Local SecurityNetwork: wLSN, that will let customers stop worrying once and for all. This system provides a unique combination of performance, reliability and ease-of-use. wLSN System from Bosch Security System.

Upload: others

Post on 27-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: wLSN: The fast way to more reliable Security€¦ · Web viewwLSN System from Bosch Security System. wLSN is proprietary solution based on state-of-the-art technology and designed

Wireless Local Security Network (wLSN): The fast way to more reliable Security

Authors (alphabetical order): Jim Berube, Abtin Keshavarzian, Arati Manjashwar, Lakshmi Venkatraman

1. Introduction

The advent of wireless sensor networks has made it possible for many cable-free, easily deployable residential applications. Several different kinds of wireless home-networking products have become available. However, challenges like reliability, coverage area and ease of use have continued to prevail. In Europe these concerns are augmented by factors like hard to penetrate concrete walls and limited available bandwidth in 868MHz security band (reserved for alarm system). Bosch Security Systems backed by the innovative power of Bosch Research group has focused on exactly these issues for the past few years. The result is a new extremely reliable, robust two-way wireless system, Wireless Local SecurityNetwork: wLSN, that will let customers stop worrying once and for all. This system provides a unique combination of performance, reliability and ease-of-use.

wLSN System from Bosch Security System.

wLSN is proprietary solution based on state-of-the-art technology and designed for accurate intruder detection and reliable alarm communications. The system consists of battery operated wireless detectors, an intrusion control panel, RF Hub, sirens and output modules. In addition to enabling communication among stationary devices, the wLSN network supports mobile devices such as key fobs. They can be used to remotely arm or disarm the system and inform the user of the system status. The key fob has also two additional

Page 2: wLSN: The fast way to more reliable Security€¦ · Web viewwLSN System from Bosch Security System. wLSN is proprietary solution based on state-of-the-art technology and designed

buttons that can be programmed for comfort applications such as opening and closing garage doors, operating window blinds or switching lights on and off.The communication and networking protocol for this product is the result of few years of research and development at Bosch Research and Technology Center (Bosch RTC) in Palo Alto. It incorporates a combination of innovative duty cycling techniques1, precise time synchronization, and adaptive frequency selection to achieve high levels of reliability while operating on batteries for many years. In 1999, Bosch established Research and Technology Center (RTC), its first North American operation outside Germany devoted exclusively to research and development, with two offices in Palo Alto, CA and Pittsburg, PA. The strategic location of the offices enables close collaborations between Bosch RTC researchers with renowned US universities including Stanford, Berkeley and Carnegie Mellon on cutting edge technologies. The Bosch RTC has currently 59 employees focusing on many different topics such as wireless technologies for automotive, building technology, consumer goods and industrial applications, sensor and communication technologies including integrated circuits, MEMS, RF applications, software engineering and software intensive systems, etc.

2. Wireless Security Network Design

The security network design, like a typical sensor network, involved choice of operating frequencies, hardware components and network protocol design. A typical sensing device consists of a sensor, microcontroller, transceiver and power source. The design goals were simple and clear: very high reliability, long communication and installation range, easy and unobtrusive installation, extended battery life and competitive cost. However the resulting challenges were numerous. This was accentuated by the diverse requirements of global operation: different frequency bands, regulatory mandates and market requirements. We here focus on the protocol design aspects that were most critical and challenging.

1 Duty Cycling: Periodically switching the radio from active mode to power-save mode.

Page 3: wLSN: The fast way to more reliable Security€¦ · Web viewwLSN System from Bosch Security System. wLSN is proprietary solution based on state-of-the-art technology and designed

Components of a Wireless Sensor Device

wLSN Network Configuration.

2.1 Easy Installation and System Initialization

Wireless technology enables the users to deploy the sensors almost anywhere. Automated device discovery and system auto-configuration further facilitate easy, fast and non-invasive installation. Devices in the network were designed with built-in RF signal strength indicators to help the installer position them in the optimal locations. An optional installation tool makes the process even easier by providing more information to the installer on the signal strength and noise level, and relative signal to noise ratio. In addition to device discovery and configuration, practical deployments need to adapt to different RF environments and also coexist with other adjacent wireless deployments. This is done by an elaborate initialization scheme that learns about the environment and makes intelligent choices for network parameters like frequencies and thresholds that would ensure optimal and reliable network operation.

Page 4: wLSN: The fast way to more reliable Security€¦ · Web viewwLSN System from Bosch Security System. wLSN is proprietary solution based on state-of-the-art technology and designed

The initialization scheme requires no user involvement, however allows setting of parameters by user when ever desired.

2.2 Reliability and Interference Immunity

Ensuring reliability is the one of the most important elements for a wireless system. Clearly, wireless as a physical medium of communication is more prone to errors than its wired counterpart. However, the overall reliability of the system can be greatly enhanced through careful and good design of the higher layers of protocol stack.In a wireless system, packets can be missed due to many different reasons such as noise, fading, collision, or interference from other transmitters or devices. The network protocol design should address all these problems.

2.2.1 Interference Immunity and Coexistence via Operation in Reserved Alarm Bands

In Europe, a small set of channels in the 868 MHz frequency range have been reserved for alarm applications. The individual channels are only 25 kHz wide and on-air time is highly restricted (0.1% duty cycle), which also prevents collisions with other security systems. These reserved bands provide immunity to interference from other wireless applications. However, the communication data rate is very limited (4.8kbps,GFSK2) due to the narrow band operation. This poses significant challenges as the duration for communication increases dramatically and thereby the energy per bit and on-air times go up. It is therefore extremely difficult 2 Gaussian Frequency Shift Keying (GFSK): is a form of modulation technique in which the transmitted signal switches between two frequencies to represent a binary value of 0 or 1. This modulation uses a Gaussian filter to form the transmitted pulse shapes.

Page 5: wLSN: The fast way to more reliable Security€¦ · Web viewwLSN System from Bosch Security System. wLSN is proprietary solution based on state-of-the-art technology and designed

to design a low power, latency critical system that complies with the stringent regulations of these alarm bands. wLSN system has used innovative techniques from ad hoc and wireless sensor network design theories to make this possible. Advanced duty cycling techniques, accurate time synchronization methods, smart channel access schemes have been used to handle these challenges. The system incorporates an innovative combination of Carrier Sense Multiple Access3 (CSMA) and Time Division Multiple Access4 (TDMA) schemes to ensure long battery life while avoiding collisions.

2.2.2 Packet loss

wLSN is a fully supervised 2-way wireless network technology. Every communication in the system is acknowledged. Whenever the acknowledgement to a message is not received, it is retransmitted. Each message has several retry opportunities. The retries are designed to be in different frequencies so that if a particular frequency is being interfered, the retries are unaffected. To demonstrate how the reliability increases by having many retransmissions, consider the following simple example: If we assume that the packet loss rate of a wireless link is at most 10% (which is a reasonable for a node installed within the maximum specified installation range from the Hub), with 5 retries, the chance of missing a message on this link over all the retransmissions will be as small as 0.001%.

2.3 Installation Range

The wLSN transceivers use advanced error correction and detection methods for better reception of messages with low signal to noise ratio. Narrow band operation in 868MHz security band enables the receiver to achieve high sensitivity and detect marginal signals. This consequently leads to an outstanding wireless communication range. Experiments and range measurements demonstrate an outdoor communication range of more than 1000m in open fields.

2.4 Battery Life, on-air collision and Support for High/Low Priority Data

3 CSMA is protocol in which a transmitter listens to the channel and tries to detect the presence of signal from another source before attempting its own transmission. Simultaneous transmission by multiple nodes results in a collision. The CSMA technique is mainly used to avoid collisions. 4 TDMA is a medium access control protocol in which multiple users share the same frequency channel by defining a frame and dividing time into time slots, where each user transmits or receives in its own allocated time slot.

Page 6: wLSN: The fast way to more reliable Security€¦ · Web viewwLSN System from Bosch Security System. wLSN is proprietary solution based on state-of-the-art technology and designed

The battery-operated devices in the network are mostly in low-power (energy-saving) mode, and they become active only for very short durations for exchanging information with other devices. A synchronized time-slotted protocol handles all the periodic communication among the devices, such that each device gets its own allocated time slot to communicate. This rules out any on-air collisions of the wireless network devices. The system maintains a highly accurate network-wide time by exchanging periodic time beacons between Hub and remote devices.

wLSN TDMA scheme (time slot structure

In the wLSN protocol, the time is divided into frames which are further split into time slots. Time slots are assigned to different operation of the network such as alarm, command, synchronization, etc. The last time slot in each frame is allocated for low-priority data.

The devices in the network need to receive user commands with a short latency. However, it is very energy intensive to keep the nodes in the listen mode. Therefore the protocol employs a periodic wakeup schedule. This is performed by listening to the channel for a very short

period of time and measuring the received signal strength. If the signal strength exceeds a pre-determined threshold, the node remains in full receive mode in an attempt to receive a

Page 7: wLSN: The fast way to more reliable Security€¦ · Web viewwLSN System from Bosch Security System. wLSN is proprietary solution based on state-of-the-art technology and designed

possible command, otherwise it powers itself down to energy-save mode. In order to transmit a command to a node, the Hub first awakens the node by sending a tone at the wakeup sample time of the node, and then transmits the command message to it. This yields a fast mechanism to send urgent commands while keeping the average energy consumption rate of devices low. The protocol also uses a prioritizing channel access mechanism that ensures timely message delivery for high priority alarm messages while the less urgent messages may incur higher latencies. The energy-efficient synchronized time-slotted protocol along with the optimized wakeup method, enable a typical battery lifetime of up to 5 years for battery-powered wireless devices with easy available and inexpensive AA alkaline batteries.

3. Final Comments

The wLSN system is an excellent option for residential and small commercial systems. It has been meticulously designed to take the user experience with regard to installation ease, reliability and maintenance-free operation to new levels. We hope to reinvest the knowledge and experience gained into building extremely scalable and large systems in future.