wLSN: The fast way to more reliable Security

advertisement
Wireless Local Security Network (wLSN):
The fast way to more reliable Security
Authors (alphabetical order):
Jim Berube, Abtin Keshavarzian, Arati Manjashwar, Lakshmi Venkatraman
1. Introduction
The advent of wireless sensor networks has made it possible for many cablefree, easily deployable residential applications. Several different kinds of wireless
home-networking products have become available. However, challenges like
reliability, coverage area and ease of use have continued to prevail. In Europe
these concerns are augmented by factors like hard to penetrate concrete walls
and limited available bandwidth in 868MHz security band (reserved for alarm
system). Bosch Security Systems backed by the innovative power of Bosch
Research group has focused on exactly these issues for the past few years. The
result is a new extremely reliable, robust two-way wireless system, Wireless
Local SecurityNetwork: wLSN, that will let customers stop worrying once and for
all. This system provides a unique combination of performance, reliability and
ease-of-use.
wLSN System from Bosch Security System.
wLSN is proprietary solution based on state-of-the-art technology and designed
for accurate intruder detection and reliable alarm communications. The system
consists of battery operated wireless detectors, an intrusion control panel, RF
Hub, sirens and output modules. In addition to enabling communication among
stationary devices, the wLSN network supports mobile devices such as key fobs.
They can be used to remotely arm or disarm the system and inform the user of
the system status. The key fob has also two additional buttons that can be
programmed for comfort applications such as opening and closing garage doors,
operating window blinds or switching lights on and off.
The communication and networking protocol for this product is the result of few
years of research and development at Bosch Research and Technology Center
(Bosch RTC) in Palo Alto. It incorporates a combination of innovative duty cycling
techniques1, precise time synchronization, and adaptive frequency selection to
achieve high levels of reliability while operating on batteries for many years. In
1999, Bosch established Research and Technology Center (RTC), its first North
American operation outside Germany devoted exclusively to research and
development, with two offices in Palo Alto, CA and Pittsburg, PA. The strategic
location of the offices enables close collaborations between Bosch RTC
researchers with renowned US universities including Stanford, Berkeley and
Carnegie Mellon on cutting edge technologies. The Bosch RTC has currently 59
employees focusing on many different topics such as wireless technologies for
automotive, building technology, consumer goods and industrial applications,
sensor and communication technologies including integrated circuits, MEMS, RF
applications, software engineering and software intensive systems, etc.
2. Wireless Security Network Design
The security network design, like a typical sensor network, involved choice of
operating frequencies, hardware components and network protocol design. A
typical sensing device consists of a sensor, microcontroller, transceiver and
power source. The design goals were simple and clear: very high reliability, long
communication and installation range, easy and unobtrusive installation,
extended battery life and competitive cost. However the resulting challenges
were numerous. This was accentuated by the diverse requirements of global
operation: different frequency bands, regulatory mandates and market
requirements. We here focus on the protocol design aspects that were most
critical and challenging.
Components of a Wireless Sensor Device
1
Duty Cycling: Periodically switching the radio from active mode to power-save mode.
wLSN Network Configuration.
2.1 Easy Installation and System Initialization
Wireless technology enables the users to deploy the sensors almost anywhere.
Automated device discovery and system auto-configuration further facilitate easy,
fast and non-invasive installation. Devices in the network were designed with
built-in RF signal strength indicators to help the installer position them in the
optimal locations. An optional installation tool makes the process even easier by
providing more information to the installer on the signal strength and noise level,
and relative signal to noise ratio.
In addition to device discovery and configuration, practical deployments need to
adapt to different RF environments and also coexist with other adjacent wireless
deployments. This is done by an elaborate initialization scheme that learns about
the environment and makes intelligent choices for network parameters like
frequencies and thresholds that would ensure optimal and reliable network
operation. The initialization scheme requires no user involvement, however
allows setting of parameters by user when ever desired.
2.2 Reliability and Interference Immunity
Ensuring reliability is the one of the most important elements for a wireless
system. Clearly, wireless as a physical medium of communication is more prone
to errors than its wired counterpart. However, the overall reliability of the system
can be greatly enhanced through careful and good design of the higher layers of
protocol stack.
In a wireless system, packets can be missed due to many different reasons such
as noise, fading, collision, or interference from other transmitters or devices. The
network protocol design should address all these problems.
2.2.1 Interference Immunity and Coexistence via Operation in Reserved Alarm
Bands
In Europe, a small set of channels in the 868 MHz frequency range have been
reserved for alarm applications. The individual channels are only 25 kHz wide
and on-air time is highly restricted (0.1% duty cycle), which also prevents
collisions with other security systems. These reserved bands provide immunity to
interference from other wireless applications.
However, the communication data rate is very limited (4.8kbps,GFSK2) due to the
narrow band operation. This poses significant challenges as the duration for
communication increases dramatically and thereby the energy per bit and on-air
times go up. It is therefore extremely difficult to design a low power, latency
critical system that complies with the stringent regulations of these alarm bands.
wLSN system has used innovative techniques from ad hoc and wireless sensor
network design theories to make this possible. Advanced duty cycling
techniques, accurate time synchronization methods, smart channel access
schemes have been used to handle these challenges. The system incorporates
an innovative combination of Carrier Sense Multiple Access3 (CSMA) and Time
Division Multiple Access4 (TDMA) schemes to ensure long battery life while
avoiding collisions.
2.2.2 Packet loss
2
Gaussian Frequency Shift Keying (GFSK): is a form of modulation technique in which the transmitted
signal switches between two frequencies to represent a binary value of 0 or 1. This modulation uses a
Gaussian filter to form the transmitted pulse shapes.
3
CSMA is protocol in which a transmitter listens to the channel and tries to detect the presence of signal
from another source before attempting its own transmission. Simultaneous transmission by multiple nodes
results in a collision. The CSMA technique is mainly used to avoid collisions.
4
TDMA is a medium access control protocol in which multiple users share the same frequency channel by
defining a frame and dividing time into time slots, where each user transmits or receives in its own
allocated time slot.
wLSN is a fully supervised 2-way wireless network technology. Every
communication in the system is acknowledged. Whenever the acknowledgement
to a message is not received, it is retransmitted. Each message has several retry
opportunities. The retries are designed to be in different frequencies so that if a
particular frequency is being interfered, the retries are unaffected. To
demonstrate how the reliability increases by having many retransmissions,
consider the following simple example: If we assume that the packet loss rate of
a wireless link is at most 10% (which is a reasonable for a node installed within
the maximum specified installation range from the Hub), with 5 retries, the
chance of missing a message on this link over all the retransmissions will be as
small as 0.001%.
2.3 Installation Range
The wLSN transceivers use advanced error correction and detection methods for
better reception of messages with low signal to noise ratio. Narrow band
operation in 868MHz security band enables the receiver to achieve high
sensitivity and detect marginal signals. This consequently leads to an
outstanding wireless communication range. Experiments and range
measurements demonstrate an outdoor communication range of more than
1000m in open fields.
2.4 Battery Life, on-air collision and Support for High/Low Priority Data
The battery-operated devices in the network are mostly in low-power (energysaving) mode, and they become active only for very short durations for
exchanging information with other devices. A synchronized time-slotted protocol
handles all the periodic communication among the devices, such that each
device gets its own allocated time slot to communicate. This rules out any on-air
collisions of the wireless network devices. The system maintains a highly
accurate network-wide time by exchanging periodic time beacons between Hub
and remote devices.
wLSN TDMA scheme (time slot structure
In the wLSN protocol, the time is divided into frames which are further split into
time slots. Time slots are assigned to different operation of the network such as
alarm, command, synchronization, etc. The last time slot in each frame is
allocated for low-priority data.
The devices in the network need to receive user commands with a short latency.
However, it is very energy intensive to keep the nodes in the listen mode.
Therefore the protocol employs a periodic wakeup schedule. This is performed
by listening to the channel for a very short period of time and measuring the
received signal strength. If the signal strength
exceeds a pre-determined threshold, the node
remains in full receive mode in an attempt to receive a
possible command, otherwise it powers itself down to
energy-save mode. In order to transmit a command to
a node, the Hub first awakens the node by sending a
tone at the wakeup sample time of the node, and then
transmits the command message to it. This yields a
fast mechanism to send urgent commands while
keeping the average energy consumption rate of devices low.
The protocol also uses a prioritizing channel access mechanism that ensures
timely message delivery for high priority alarm messages while the less urgent
messages may incur higher latencies. The energy-efficient synchronized timeslotted protocol along with the optimized wakeup method, enable a typical battery
lifetime of up to 5 years for battery-powered wireless devices with easy available
and inexpensive AA alkaline batteries.
3. Final Comments
The wLSN system is an excellent option for residential and small commercial
systems. It has been meticulously designed to take the user experience with
regard to installation ease, reliability and maintenance-free operation to new
levels. We hope to reinvest the knowledge and experience gained into building
extremely scalable and large systems in future.
Download