IoT-based Smart Home Security System
IoT-based Smart Home Security System
Abstract A smart home is a home, usually the new one that is equipped with
special structured wiring to enable occupants to remotely control or program an
array of automatic home electronic device by entering single command [1]. Smart
home technology can be seen from many things. For example in the thermal
system (air conditioner), energy management, smart home network, smart home
sensor, etc. A smart home security system offers many more benefits than the
conventional security system.
Keyword IoT, Security System, Smart Home Security
4 |
2015 IEEE 4th Global Conference on Consumer Electronics (GCCE)
A Prognostics Framework for Reliability Optimization of Mass-
Produced Vehicle Onboard Diagnostics System
B. Fong, Senior Member, IEEE, L. Situ, L. C. K. Poon, J. Liu, R. T. Mo and K. F. Tsang, Senior
Member IEEE
The Automotive Parts and Accessory Systems R&D Centre bfong@ieee.org
I. INTRODUCTION .
Fig. 1. An in-vehicle controller area network that consists of different
Modern motor vehicles equipped with numerous self- sensors for infotainment, vehicle health monitoring, passive and active
diagnostic modules possess a great challenges for optimizing safety
reliability of controller area network (CAN) that serves as a
backbone for intra-vehicular communications. Each of these III. PROGNOSTICS FOR OPTIMAL MAINTENANCE
modules may work independently with different
A. Prognostics Framework
communication protocols [1]. These modules that operate
under very different environments serve different functions The concept of prognostic and network health
are subjected to very different conditions that may have a management has been adapted in the optimization of
substantial impact on their remaining useful life (RUL) wireless telemedicine systems for life-saving
estimation [2]. Any reliability assessment of vehicle applications making it particularly suitable for
diagnostics system cannot be carried out by adopting deployment in an eCall vehicular system [6]. Such
standard practices commonly documented in traditional process entails the classifications of various precursors
reliability handbooks since these methods are unable to take
for ontology generation [7], which in turn provides the
into consideration the actual use conditions of individual
necessary information for fault diagnosis [8].
motor vehicles [3]. A prognostics approach using data
collected from sensors mounted in different parts of the B. Operation
vehicle is therefore proposed to analyze the actual use The optimization algorithm relies on a data acquisition
profile to more thoroughly address the optimization of event received under any one the following three conditions:
operational reliability [4]. The proposed framework is on checking sensors of the vehicle when the engine is started
optimized for mass-produced vehicle onboard diagnostics and no data is received from the driver’s seat (i.e. assume
systems with a focus on maximizing return-on-investment the vehicle is idle and driver is outside the vehicle); on
(ROI) for vehicle service centers. receiving data from the driver’s biosensors; on receiving
data from onboard sensors when the vehicle is started and
II. ONBOARD DIAGNOSTICS the driver’s biosensors are active. An anomaly event is the
An onboard diagnostics (OBD) system consists of a opposite case, i.e. it occurs under the following three
sensing network as shown in Fig. 1, these sensors collect conditions: on receiving no signal from biosensors when the
data for infotainment, continuous vehicle health monitoring, driver’s seat detects presence of a driver; on detecting signal
passive and active safety. This work develops a self- interruption from onboard sensors; on connecting to the
configuring and adaptive architecture based on a prognostic CAN when the OBD is already in receiving data from both
network health management model whose main purpose is to driver and vehicle. The CAN’s internal state transition
interconnection between entities within a vehicle-to- according to the occurrence of those anomaly events are
infrastructure (V2I) wireless network backbone, including detected to generate an alert. To handle uncertainties
individual vehicles, service centers and emergency response associated with the wireless network connection while the
centers, in such a way as to make them fully-compliant with vehicle is running, the OBD attempts to send a request
the EU eCall statutory regulation with enhanced security and message over a predefined period of time until an ACK is
reliability [5]. received from the response centre or timeout elapses. The
reliability optimization and control algorithm of the
prognostics system is listed in Section C.
409
Available online at www.sciencedirect.com
Abstract
Wi-Fi, ZigBee and Bluetooth wireless communication systems utilize the Industrial Scientific and Medical-(ISM) Band, which
results in a high mutual interference between these technologies since they all these systems operate at the same or very close
frequency bands. The interference problem increases with an in-device Co-existence (technologies existing on same device). This
is primarily due to the characteristics of each technology such as access mechanism, frame structure, peak transmit power and
frequency of operation. This work describes the interference between the Wi-Fi mostly as an aggressor on Bluetooth and ZigBee
wireless networks. So the experimental analysis of the coexistence of these three technologies in an assumed home environment
is studied especially when ZigBee is enabled for a Home Automation Network where there could be close proximity of Wi-Fi
and Bluetooth devices such as PDAs and mobile phones. The obtained result shows that there is severe degradation on ZigBee
and Bluetooth packet transmission of packets as well as re-transmission of ZigBee packets when Wi-Fi is operating.
Keywords: Wi-Fi, ZigBee, Bluetooth, ISM, aggressor, Home Automation Network, PDAs
1. Introduction
ZigBee (IEEE 802.15.4) is establishing an enabling place for the Wireless Sensor Network (WSN) especially in
the application of home automation network because of its low power and cost. Its lower power is vulnerable to
other wireless technology that has higher power and working in same spectrum. It’s among the wireless
technologies that share the unlicensed ISM band used purposely for Personal WANs. However, the Bluetooth (IEEE
802.15.1) and Wi-Fi (IEEE 802.11) share the same unlicensed band with the ZigBee and experience mutual
interference problem especially at close proximity. Adaptive Frequency Hopping, a spread-spectrum technique, was
introduced to Bluetooth technology to mitigate the problem of interference between it and Wi-Fi and any other
technology that exist in same spectrum [1]. According to [2], [3] IEEE 802.15.4 has a little impact on the IEEE
802.11 performance. However, IEEE 802.11 can have a serious impact on the ZigBee and Bluetooth performance if
1877-0509 © 2012 Published by Elsevier B.V. Selection and/or peer-review under responsibility of Missouri University of Science and Technology.
Open access under CC BY-NC-ND license. doi:10.1016/j.procs.2012.09.091
R. Challoo et al. / Procedia Computer Science 12 (2012) 386 – 391 387
the channels allocation is not carefully taken into account. Mutual interference among these technologies is
considered a topical issue especially among technologies that shares spectrum that are close enough to cause
interference (< 50MHz channel separation). Research has been done to find the best practice to alleviate the
interference among devices using technology in same spectrum. This paper describe existing work and experimental
results on the IEEE 802.11 Wi-Fi standards, its interference with the ZigBee and the Bluetooth technologies in a
home environment where ZigBee is enabled for a home automation while Wi-Fi and Bluetooth devises such as
PDAs and mobile phones, gaming devices co-exist with it in same home.
2. Technology Overview
A quick overview of the three technologies was discussed. Aspects of the three technologies that are necessary
for the full comprehension of this study were also discussed such as the number of channels, the transmission power,
modulation type and the access scheme.
2.1 Wi-Fi
The IEEE 802.11 network is a specification of the Wireless Local Area Network (WLAN). In its low band mode,
IEEE 802.11(b, g, n) transmit data from 11 Mbps and up to 54M bps and goes up to 32 meters indoors and 95
meters outdoor [11]. The IEEE 802.11n standard uses double the radio spectrum compared to 802.11a or 802.11g.
However, IEEE 802.11a, c transmit data is up to Gbps and can exceed range by more than two times of the b and g
technologies. Low band Wi-Fi transmits in the ISM 2.4 GHz band while the high band transmit in the 5 GHz band.
A BPSK and QPSK digital modulation technique is used to transmit data up to 54 Mbps and each channel in the
ISM band is 22 MHz wide and are overlapped. Any two channels whose channel numbers differ by five or more do
not overlap. Wi-Fi’s Enhanced Isotropic Radiated Power (EIRP) is limited to 20 dBm (100 mW) [11].
2.2 Bluetooth
The IEEE 802.15.1 standard is a proprietary open wireless technology standard for exchanging data over a short
distance. It uses the short wavelength radio transmission ISM Band in the 2400-2480 MHz. It is desired for the
Wireless Personal Area Network WPAN adopted solely to replace the cable technology. Bluetooth radio adopts the
Frequency Hopping Spread Spectrum – FHSS. It occupies the entire ISM band thereby utilizing 79 channels with
each channel at 1 MHz. A GFSK, EDR, ʌ/4-DQPSK and 8 DPSK modulation formats are employed in the
Bluetooth Technology. The transmit distance of this technology ranges with the transmit power. Class 1 device of
output power of 100 mW transmit up to 100 meters while device of 25 mW output power transmit can reach up to
10 meters [11].
2.3 ZigBee
This specification was adopted for a low cost, low power digital radios and had found application in areas like
home automation, telecommunication services, healthcare and remote control just to mention a few. Similar to the
Wi-Fi and the Bluetooth technologies, ZigBee also operates in the ISM radio band. Data transmission rates of 250
Kbps [6]. ZigBee (IEEE 802.15.4) technology specifies the physical and medium access control layers for low rate
wireless PANs and transmits up to 10 meters [7]. Sixteen channels are defined for this specification in the 2.4 GHz
band but with a narrower band of 2 MHz and also do not overlap. So, up to sixteen ZigBee network can coexist in
same area and at the same time. A latest ZigBee release supports frequency hopping in the “ZigBee Pro” Standard.
This allows a ZigBee PAN to move from one channel to the other if overloading occurs in the former channel [6].
The communication model requires it to distribute work among many different devices which resides within
individual ZigBee nodes which in turn forms a network.
could also serve as a further aspect making the coexistence of Wi-Fi and ZigBee difficult.
Figure 1: Allocation of ZigBee and Wi-Fi Channels over the ISM Band [11]
3. BLUETOOTH AND Wi-Fi INTERFERENCE CASES
If Bluetooth and Wi-Fi systems operate at the same time in close proximity as in the case of a mobile device then
they will interact (collide) with each other, introducing an undesired effect called interference which deteriorates the
overall performance of the wireless communication systems . The sidebands of each transmission must also be
accounted for. Interference between Bluetooth and Wi-Fi occurs when either of the following is true:
x A Wi-Fi receiver senses a Bluetooth signal at the same time when a Wi-Fi signal is being sent to it. The effect is
most pronounced when the Bluetooth signal is within the 22 MHz-wide passband of the Wi-Fi receiver.
x A Bluetooth receiver senses a Wi-Fi signal at the same time when a Bluetooth signal is being sent to it; the
effect is most pronounced when the Wi-Fi signal is within the passband of the Bluetooth receiver.
It is worthwhile to note that neither Bluetooth nor Wi-Fi was designed with specific mechanisms to combat the
interference that each creates for the other. As a fast frequency-hopping system, Bluetooth assumes that it will hop
away from occupied channels, minimizing its exposure to interference. The Wi-Fi MAC layer, which is based on the
Ethernet protocol, assumes that many stations share the same medium, and therefore, if a transmission fails, it is
because two Wi-Fi stations tried to transmit at the same time. This report examines how this assumption drives
system behavior that actually worsens the impact of Bluetooth interference.
sensitive receivers would allow for a reduction in the transmit power level while maintaining an acceptable signal-
to-noise ratio which would enhance the system’s co-existence performance. Adaptive power control could also
reduce the overall power consumption by a Bluetooth device.
5. 802.11 SOLUTIONS
The 802.11 solutions are also similar to the Adaptive Bluetooth techniques. As previously described in section IV,
three channels centered on channel 1, 6 and 11 are configured in figure 1 above. An 802.11 access point would
typically be assigned to a certain channel and this would not change without the intervention by the LAN
Administrator. However, dynamic channel selection would allow the access point itself to determine which channel
is best suited for communication at any time. By detecting interference on a Wi-Fi channel, a channel with high
noise content can be avoided. Multipath propagation and inter-Symbol interference are monitored and can form
basis for dynamic channel selection.
Adaptive packet fragmentation is another technique used by Wi-Fi to cope with co-existence interference. This is
because the length of 802.11b packets needed not be the maximum length for each transmission, fragmented of
shortened packets can be used to overcome the effects of coexistence interference. With shorter packet length, less
data must be retransmitted when a packet transmission fails because of interference.
Similarly, transmission power control can also minimize the interference caused to other users in the band. Here, the
optimal transmission power would be the minimum level necessary to maintain a predefined level of data integrity.
6. ZigBee SOLUTIONS
The most difficult thing when trying to remedy the interference problem between ZigBee and other devices that
share same spectrum is due to the difference in their physical layers. There are two ways for ZigBee devices to
intervene between 802.11 and Bluetooth devices that operate with it in same spectrum. The first method is
transmitting an 802.11 or a Bluetooth packet indicating that this packet would have an unusually long duration
permitting ZigBee to transmit during this period in which other 802.11 or Bluetooth device would sleep. The second
method would be the use of Request to Send (RTS) or Clear to Send (CTS) message to clear 802.11 or Bluetooth
traffic. This works on the theory that sending out a CTS message will block all 802.11 or Bluetooth devices from
transmitting for a specified period of time. Hence, the goal of the two solutions is to temporarily block out 802.11 or
Bluetooth messages for a window of time large enough that ZigBee device can successfully transmit their messages
thereby resolving interference issue [9]
7. COEXISTENCE TESTING
Since Bluetooth devices hop over 79 MHz of the ISM band, Wi-Fi devices require approximately 16 MHz of
bandwidth to operate and ZigBee has sixteen networks in the ISM Band with 2 MHz bandwidth, the possibility of
having Bluetooth, ZigBee and Wi-Fi products in same area without interference is low. Due to this interference, a
coexistence test was run with actual ZigBee, Bluetooth and Wi-Fi products to determine their level of coexistence.
390 R. Challoo et al. / Procedia Computer Science 12 (2012) 386 – 391
Figure 2: Wi-Fi Baseline Throughput [10] Figure 3: Bluetooth Baseline Throughput [10] Figure 4: ZigBee Baseline Throughput [10]
The Bluetooth and ZigBee baseline throughput is shown in figure 3 and 4 respectively. Data was transferred from
the Bluetooth master to the slave with no interference. The throughput is approximately 550 Kbps at the specified
distance and 250 Kbps for ZigBee.
8. EXPERIMENTAL RESULT
The impact of Wi-Fi on an ongoing Zigbee transmission when the ZigBee network is set up on channel 11 - 14
while the Wi-Fi network is set up on channel 1 with a payload of 64-byte payload frames is very apparent. The
frame error rate as shown in figure 5 of zigbee drops to a value of 0.45 and 0.73 with channel 13 being the less
impared and 14 the most impared [11]. Hence the prensense of Wi-Fi is not totally destructive for ZigBee network.
Very similar result would be registered for other channel combinations such as Wi-Fi channel 6 and ZigBee
channels 16-19 and Wi-Fi channel 11 and ZigBee channels 21 -24. ZigBee loses a litle percentage of its frames.
Conversely, the impact of ZigBee of a Wi-Fi connection is low. Wi-Fi is practically not affected by the activity of
the ZigBee as shown in figure 6.
Figure 5: FER of ZigBee under the interference of Wi-Fi[11] Figure 6: FER of Wi-Fi under interference of ZigBee [11]
The effect of Bluetooth over the ZigBee network is not noticeable. Its Frame Error Rate is only reduled by less
than 10% [12]. Conversely, the effect of the ZigBee over the Bluetooth shows rather an unstable network, shown in
figure 7, the degradation effect is not well noticed.
R. Challoo et al. / Procedia Computer Science 12 (2012) 386 – 391 391
Figure 7: ZigBee effect over Bluetooth [11] Figure 8: Bluetooth Effect over Wi-Fi [11]
The effect of Wi-Fi over Bluetooth shows a strong degradation of Bluetooth signal in Figure 8. Bluetooth goodput
drops from 1.12 Mbps to 0.59 Mbps for TT –RR scenario and 0.95 Mbps to 0.30 Mbps for TR –RT scenario. This
shows that the FHSS employed by the Bluetooth is less effective. As a consequence, the use of smart and adaptive
hopping patterns techniques could indeed be a major contributor towards the achievement of robust Bluetooth
connections in the vicinity of Wi-Fi devices. Wi-Fi has a great impact on both ZigBee and Bluetooth devices. The
degradation on Bluetooth occurs as soon as Wi-Fi is activated whereas it occurs only when the Wi-Fi frame rate is
increased in ZigBee.
9. CONCLUSION
To summarize, Wi-Fi devices are scarsely affected by the presence of other wireless technologies operating
concurrently such as ZigBee and Bluetooth devices Conversely, Bluetooth and ZigBee suffers conspicously from
the presence of Wi-Fi . ZigBee which was deemed to be interference free was heavily influenced by the Wi-Fi
whose spectrum covers more than the classic four ZigBee channels. Hence ZigBee cannot only rely on the
supportedly safe channels such as 15, 20, 25 and 26 [11]. The FHSS technique used by the Bluetooth did not reveal
to be very effective in contrasting Wi-Fi interference. Also, the ZigBee system is much more sensitive to the
position of the Wi-Fi transmitter than the Bluetooth. This means that while ZigBee networks can be deployed in a
shared area by having ZigBee devices placed far from Wi-Fi radios, this is not true for Bluetooth networks which
instead requires a more drastic seperation from Wi-Fi polluted areas.
REFERENCES
1. Specification of the Bluetooth System core, Version2.0 [Online]. Available: http://www.bluetooth.com.
2. I. Howitt and J. A. Guttierrez, “Low-Rate Wireless Personal Area Networks – Enabling Wireless Sensors with IEEE
802.15.4, Proc. IEEE WCNC’03, vol.3, pp. 1481-1486.
3. A. Sikora, “Coexistence of IEEE 802.15.4 with IEEE 802.11, Bluetooth and Microwave Ovens in 2.4GHz ism-Band,”
web document, http://www.ba-loerrach.de/stzedn/
4. T. Yucek and H. Arslan, “A survey of spectrum sensing algorithms for cognitive radio applications,” IEEE
Communications Surveys and Tutorials, vol. 11, no. 1, pp. 116-130, 2009.
5. A. He, K. K. Bae, T. Newman, J. Gaeddert, K. Kim, R. Menon, L. Morales-Tirrado, J. Neel, Y. Zhao, J. Reed, and W.
Tranter, “ A Survey of Artificial Intelligence for cognitive radios,” IEEE Transaction on Vehicular Technology, vol. 59,
no. 4, pp. 1578-1592, May, 2010.
6. http://en.wikipedia.org/wiki/ZigBee
7. “IEEE Standard 802.15.4-2006,”September, 2006.
8. Oren Eliezer, Matthew Shoemake, “Bluetooth and Wi-Fi co-existence schemes strive to avoid chaos” RF wireless
connectivity paper. November 2001. Pp. 66-72.
9. James H., Benjmin C., Dae-Ki C., Mario G., “ Minimizing 802.11 Interference on ZigBee Medical Sensors” Digital
Object Identifier:10.4108/ICST.BODYNETS2009.6029http://dx.doi.org/10.4108/ICST.BODYNETS2009.6029.
10. Mathew B. Shoemake “Wi-Fi (IEEE 802.11b) and Bluetooth Co-existence Issues and Solutions for the 2.4GHz ISM
Band” A white Paper of Texas Instruments. February 2001, Version 1.1
11. R.G. Garroppo, et al, “Experimental assessment of co-existence of ZigBee, Wi-Fi, and Bluetooth devices” in IEEE
2011 proceedings.
The 5th Annual IEEE International Conference on
Cyber Technology in Automation, Control and Intelligent Systems
June 8-12, 2015, Shenyang, China
Abstract—In this paper, we aim to track a human’s indoor eras have high accuracy but they raise privacy concerns and
location while estimating his/her behavioral state. We use en- are not acceptable to many in their daily life. Carrying too
vironmental PIR sensors to localize the individual and assume many terminal devices would be very uncomfortable, so we
that the position of the individual obeys the bivariate Gaussian
distribution, which can be used to improve the tracking accuracy. should use the least terminal devices while at the same time
At the same time we introduce a wearable acceleration sensor reach the maximum improve accuracy goal. Here we introduce
to estimate the human’s state. The hardware setup consists of a single terminal device, a wearable acceleration sensor, to
two types of sensor: passive infrared sensors and a three-axis obtain the human motion information. In this paper we adopt
acceleration sensor with built-in bluetooth communication. By a method that fuses data from PIR sensors with data from
comparing the tracking performance between the PIR sensor-
based algorithm and the fusion-based algorithm, we find that the wearable acceleration sensor. The PIR sensors used in
the latter has less errors. This indoor localization system can be this thesis are “ON/OFF” sensor. Hence it is suitable for the
used in future smart homes. application for indoor localization. We distribute multiple PIR
sensors throughout the home in a certain pattern. These sensors
I. INTRODUCTION along with the acceleration sensor are used to estimate whether
In recent years, youngsters become increasingly busy and he/she stands still in the test area or walks out of the test area
have no time to take care of their elder parents. On the other in addition to tracking the individual’s indoor location [6].
hand, the elderly population is growing rapidly. Some studies This paper is organized as follows. Section II presents
indicate that the elderly population had increased to almost the architecture of the indoor localization system. Section III
810 million in 2012, and predict that in 2050, the number of describes the methodology of human tracking through the
aged people (60 and above) is about to reach a staggering 2 fusion of PIR sensors and a wearable acceleration sensor.
billion [1][2]. So elderly care has become a burning problem. Section IV gives the result of the experiments. Finally, Section
Rather than moving to expensive adult care or health-care V presents the conclusion and the future work.
facility, elders would prefer to stay at their own comfortable
II. H ARDWARE P LATFORM
home [3]. In order to improve the quality of elders’ life
while young people having hectic work at daytime, under A. Overall system
the assistance of some smart home intelligent devices, elders The hardware platform used in this paper consists of multi-
would be encouraged to maintain independent in their life. In ple PIR sensor nodes and a three-axis acceleration sensor with
order to accomplish this we should firstly know the location bluetooth low energy (BLE) communication. The PIR sensor
of the elders [4], tracking their moving path and estimate node is shown in Fig.1, and it includes the following hardware
whether they walk out. GPS (Global Positioning System) plays parts.
an important role in location tracking outdoors. But since the • Arduino Mega 2560
GPS signal gets weak inside the building, it cannot be used • Xbee shield
in indoor environments [5]. Indoor human tracking methods • Xbee module
can be divided into terminal based and non-terminal based. • Panasonic PIR sensor
Terminal based approaches use RFID tags and other mobile The Arduino Mega 2560 is a microcontroller board based
devices carried along with the individual to be tracked. Non- on the ATmega2560 microcontroller, and it is the brain of
terminal based approaches use ultra sound, passive infrared the sensor node. It has 54 digital input/output pins, 16 analog
sensors, smart floors and cameras for location tracking. Cam- inputs, 4 UARTs (hardware serial ports), a 16 MHz crystal
1469
Fig. 5. The integrated framework of the PIR network
1470
4.5 4.5
s r q p o
4 4
3.5 3.5
j l m
k Book−
n 3
y−axis coordinate/m
3
case
2.5
a1 a3 b1 b3 2.5
i t B
A
2 a2 a4 b2 b4 2
1.5 g e
Desk 1.5
h f
1
1
0.5
0.5 b
a c d Chair
0
0
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5
0 1 2 3 4
x−axis coordinate/m
4
Where, (μix , μiy ) is the mean of the distribution function. For
our detection, it is the coordinate of the center point of some D
3.5
y−axis coordinate/m
stop2
covariance matrix, as the coordinate of X-axis and Y-axis is 2.5
uncorrelated, so
2
2
σxi 0 stop1
Vi = 2 (2) 1.5
0 σyi C
1
be adjusted. If the time between two adjacent data is less than (b) Tracking based on PIR sensor and acceleration sensor
α, we store the data from the PIR sensor in an array, otherwise
Fig. 8. The first tracking trajectory when α = 0.3second(the blue trajectory
we process the data in the array. Generally, if α is too large, indicates the real rough path, and the black trajectory indicates pursuit path)
realtimeness of the tracking will deteriorate and we may miss
some smaller areas which the individual may pass through. If
α is too small, the information of some PIR sensor nodes will second path is following the area marked with the alphabet
be lost. Consequently it is reasonable to set α between 0.3 “a,h,i,A(a1,a2,a3,a4),t,b1,m,o-s” as shown in Fig.7.
second and 0.5 second. When the coordinate of X-axis and Y-
axis is equal to zero it indicates that he/she stands still or out IV. E XPERIMENTAL R ESULT
of the test area. In order to classify the state of the individual, A. Sensor reading
the acceleration sensor attached to the right foot will be used. In our experiment, there are two kinds of sensor, so the
If the PIR sensors do not detect anything, or the coordinate of two serial ports (one is connected to the coordinate XBee
X-axis and Y-axis is equal to zero, the acceleration sensor will node, another is connected to CC2540 USB Dongle) must be
be read and we can use the acceleration data to predict the state read simultaneously. If we read the two serials in sequence, it
of the individual. When the acceleration data equal to zero it will lead to some data loss and affect the real-time tracking
indicates that the individual stands still somewhere in the test performance. In order to solve this problem, after many trials,
area, otherwise it indicates that the individual walks out of the an inquiry mode is found. In this mode, we read the CC2540
test area. At the same time we can use the location information USB Dongle when the PIR sensors have no data to transmit.
of the previous time to predict whether the individual walks Processing the acceleration sensor data as fast as possible is
out of the test area. For example, if the individual is in the area helpful to avoid data loss and improving the real-time tracking
marked with “a1” in Fig.7 now, it is impossible that he/she performance.
could walk out of the test area while not walking through other
edge areas in the next moment, which drastically reduces the B. Tracking walking path
chance of false positives. In this paper, we introduce two kinds The experiment includes two kinds of walking path. The
of walking path. The first path is from the area marked with first path is shown in Fig.8, where the blue trajectory indicates
“a” to the area marked with “s” in a sequence of alphabet. The the real path and the black trajectory indicates the estimated
1471
4.5 4.5
4 4
3.5 3.5
3 3
y−axis coordinate/m
y−axis coordinate/m
2.5 2.5
2 2
1.5 1.5
1 1
0.5 0.5
0 0
0 1 2 3 4 0 1 2 3 4
x−axis coordinate/m x−axis coordinate/m
(a) Tracking based on PIR sensor (a) Tracking based on PIR sensor
C
4.5 4.5
4 4
3.5 3.5
3 3
y−axis coordinate/m
y−axis coordinate/m
2.5 2.5
C
2 2
1.5 1.5
stop
1 1
0.5 0.5
0 0
0 1 2 3 4 0 1 2 3 4
x−axis coordinate/m x−axis coordinate/m
(b) Tracking based on PIR sensor and acceleration sensor (b) Tracking based on PIR sensor and acceleration sensor
Fig. 9. The second tracking trajectory when α = 0.1second(the blue trajectory Fig. 10. The second tracking trajectory when α = 0.5second (the blue
indicates the real rough path, and black trajectory indicates pursuit path) trajectory indicates the real rough path, and the black trajectory indicates
pursuit path)
1472
the individual exits and enters the test area at the point “C”. [7] N. Shrivastava, R. Mudumbai, U. Madhow, and S. Suri, “Target tracking
At the same, it also demonstrates that the individual stops at with binary proximity sensors,” ACM Trans.Sensor Netw., vol. 5, no. 4,
pp. 1–33, 2009.
the point marked with “stop”. [8] P. Bahl and V. Padmanabhan, “Radar:an in-building rf-based user
location and tracking system,” in Proc.IEEE INFOCOM, pp. 775–784,
V. C ONCLUSION AND FUTURE WORK 2000.
[9] “Bluetooth low energy cc2540/41 mini development kit users guide.”
This paper introduced the indoor localization setup which [10] R. C. Luo,and O. Chen, “Wireless and pyroelectric sensory fusion sys-
includes the PIR sensor nodes and the acceleration sensor, tem for indoor huaman/robot localization and monitoring.” IEEE/ASME
Transactions on mechatronics, vol. 18, no. 3, pp. 845–853, June. 2013.
and the fusion method of PIR sensor and acceleration sensor. [11] K. N. Ha, K. C. Lee, and S. Lee, “Development of pir sensor based
In our experiment, we have only eight PIR sensor nodes and indoor location detection system for smart home,” in SICE-ICASE
we can only detect the rough area where the individual walks International Jiont Conference., Bexco,Busan,Korea, Oct 18-21, 2006,
pp. 2162–2167.
through instead of an accurate walking path. Some measures [12] S. Lee, K. N. Ha, and K. C. Lee, “A pyroelectric infrared sensor-based
have been taken to improve the tracking accuracy, such as indoor location-aware system for the smart home.” IEEE Transactions
using the furniture distribution to limit the walking path and on Consumer Electronics., vol. 52, no. 4, pp. 1311–1317, 2006.
[13] N. Patwari, A. O. Hero, M. Perkin, N. Correal, and R. J. O’Dea,
using the coordinate obtained from the previous time and the “Relative location estimation in wireless sensor networks,” IEEE Tran-
bivariate Gaussian distribution to decrease the tracking error. s.Sig.Proc., vol. 51, no. 8, pp. 2137–2148, Aug. 2003.
Consequently, comparing the performance of the tracking only [14] N. Patwari, R. J. O’Dea, and Y. Wang, “Relative location in wireless
networks,” in Proc.IEEE VTC Conf., vol. 2, pp. 1149–1153, May. 2001.
based on PIR sensor with tracking based on the fusion of [15] H. M. La and W. H. Sheng, “Distributed sensor fusion for scalar
the PIR sensor and the acceleration sensor, the latter had field mapping using mobile sensor networks,” IEEE Transactions on
better tracking accuracy. Besides, by combining data read from cybernetics, vol. 43, no. 2, April. 2013.
[16] K. C. Lee, and H. H. Lee, “Network-based fire-detection system via
the acceleration sensor with information from the PIR sensor controller area network for smart home automation,” IEEE Transactions
nodes, we can know whether the individual walks out of the on Consumer Electronics, vol. 50, no. 4, pp. 1093–1100, Nov. 2004.
whole test area or not.
More research will be conducted to extend the current
proposed method. Smart home robot will be introduced in our
research to assist elders when they have abnormal behaviors.
In the future, the robot will be used to built the map of
complicated and dynamic environments. Combining the map
with the individual’s location which will be used as an initial
sensing modality for the robot [16], the robot can find and
assist elders in the shortest time.
ACKNOWLEDGMENT
This work was supported in part by the Nation-
al Natural Science Foundation of China under Grants
61328302,61222310,and 61174142, the Zhejiang Provin-
cial Natural Science Foundation of China under Grant
LZ14F030002,the Specialized Research Fund for the Doc-
toral Program of Higher Education of China (SRFDP) un-
der Grants 20120101110115 and 20130101110109, the Fun-
damental Research Funds for the Central Universities un-
der Grant 2014XZZX003-12, and the ASFC under Grant
20132076002.
R EFERENCES
[1] “10 facts on ageing and the life course,” World Health Organization,
May 26 2014.
[2] “ageing in the twenty- first century: A celebration and a challenge,”
UNFPA (United Nations Population Fund) and HelpAge International,
2012.
[3] “elderly care,” Wikipedia, May 19 2014.
[4] H. Koyuncu and S. H. Yan, “A survey indoor positioning and object
locating systems,” IJCSNS Int. J.Comput.Sci. Netw.Security, vol. 10,
no. 5, pp. 121–128, May. 2010.
[5] D. C. Kallur, “Human localization and activity recognition using dis-
tribute motion sensors,” Master’s thesis, Oklahoma State University, July
2014.
[6] Y. Gu, A. Lo and I. Niemegeers, “A survey indoor positioning system for
wireless personal network,” IEEE Commun.Surveys Tutorials, vol. 11,
no. 1, pp. 13–32, First Quarter. 2009.
1473
K. C. Lee and H.-H. Lee: Network-based Fire-Detection System via Controller Area Network for Smart Home Automation 1093
Abstract — This paper presents a network-based fire- and safety for occupants. Generally, in a conventional home
detection system via the controller area network (CAN) to automation system, home equipments, such as switches,
evaluate the feasibility of using such a home automation valves, or fire detectors, are directly connected to controllers
protocol in a smart home. In general, a conventional fire- for the HAVC or fire-detection systems. However, because of
detection system has several shortcomings, such as weakness the analog transmission method, which uses a 4 – 20 mA
to noise, because it uses an analog transmission with 4 – 20 current, conventional fire-detection systems detect a fire as
mA current lines. Hence, as an alternative to a conventional occurring when the current received from a fire detector
system, this paper describes the structure of a CAN-based fire- exceeds a predefined threshold. Hence, the system has
detection system and the design method of a CAN disadvantages such as a weakness to noise of various forms,
communication network. The performance of the proposed including impulses or short-circuits, and a lack of awareness of
system is evaluated through experimental tests. The CAN has the actual location of a fire. Recently, in order to solve these
several advantages, such as low cost and ease of problems, research on fire-detection systems that use digital or
implementation, as compared to other low layers of the wireless transmission instead of analog transmission has been
BACNet, such as Ethernet or ARCNET. Therefore, if the CAN conducted [5][6]. In parallel with this, research is also being
is selected for the low layer of the BACNet, a home performed on communication protocols, such as the BACNet
automation system can be implemented more effectively1. or LonWorks [7].
Recently, researchers have proposed applying the controller
Index Terms — network-based fire-detection system,
area network (CAN) [8] to the home network protocol, and
controller area network (CAN), home automation system,
attention has increasingly been centered on the CAN in
home network system, intelligent building.
automation (CiA) [9]-[11]. Especially, the price of a CAN
microcontroller, which can be integrated into one-chip by
I. INTORDUCTION semiconductor manufacturing companies, is low and many
Recently constructed buildings tend to be “intelligent” to CAN development tools are coming onto the market. Also,
enhance the convenience and safety of occupants [1][2]. Thus, many application programs had been developed in various
the requirements for home networks and automation systems fields such as automotive, robotic, and industrial automation
have increased with the demand for smart homes [3]. To systems. Therefore, a home automation system using the CAN
satisfy the needs of occupants, home appliances such as be more easily implemented, because realization at the sensor
refrigerators or microwave ovens, multimedia devices such as or actuator level is relatively straightforward as compared to a
televisions or audio systems, and Internet devices such as PCs system using an Ethernet that is the lower layer of the
have been included in intelligent buildings, as shown in Fig. 1. BACNet.
In smart homes, appliances are connected to the home network To evaluate the feasibility of the CAN for home automation
so that it becomes possible to control and monitor the protocols, this paper introduces a network-based fire-detection
appliances from inside the house or remotely using a cellular system via the CAN. The paper is organized into five sections,
telephone or PDA. To realize a home network system, several including this introduction. Section II gives the architecture of
standards, such as Echonet, Konnex, LnCP, and LonWorks, the network-based fire-detection system. Section III presents
are being developed by standards organizations and the design method of the CAN-based fire-detection system,
corporations [4]. and verifies that a CAN communication network satisfies the
In addtition, home automation systems, such as HVAC real-time requirements of a home automation system. Section
(heating, ventilation, and cooling), lighting, anti-crime, and IV describes an experimental testbed that was implemented to
fire-detection systems are being used to improve convenience verify the feasibility of the proposed system. Finally, a
summary and the conclusions are presented in Section V.
1
This work was supported (in part) by the Korea Science and Engineering II. ARCHITECTURE OF NETWORK-BASED FIRE-DETECTION
Foundation (KOSEF) through the Network-based Automation Research
Center (NARC) at University of Ulsan.
SYSTEM
H.H. Lee is with the School of Electric-Electronic Information System
Engineering, University of Ulsan, Ulsan 680-749, Korea (corresponding A. Conventional fire-detection system
author to provide phone: 82-; fax: 82-; e-mail: hhlee@main.ulsan.ac.kr). Fig. 2(a) shows the architecture of a conventional fire-
K.C. Lee is with the Network-based Automation Research Center,
University of Ulsan, Ulsan 680-749, Korea (e-mail: gclee@pnu.edu).
detection system. As shown in the figure, fire detectors (e.g.,
Contributed Paper
Manuscript received July 29, 2004 0098 3063/04/$20.00 © 2004 IEEE
1094 IEEE Transactions on Consumer Electronics, Vol. 50, No. 4, NOVEMBER 2004
HVAC control
control network
mobile computer
backbone network
Internet
home gateway
IT network AV network
H
IT audio & video lighting control fire control
cellular phone, PDA, etc.
Fig. 1. Schematic diagram of a home network system.
smoke detector, heat detector, gas detector, etc.) and actuators single analog line has sensed a fire, so the location where a fire
(e.g., guide light, fire wall, sprinkler, smoke ventilator, etc.) has occurred can not be indentified. Furthermore, because the
are connected to a receiver via a dedicated analog signal line receiver recognizes that a fire has occurred only by the
with a current of 4 – 20 mA. In particular, several fire increase in the current above a specific threshold, a
detectors that guard the same area are connected to a single conventional fire-detection system cannot process data such as
signal line. Fig. 2(b) shows the connection method used the quantity of smoke or the degree of heat detected by the fire
between the receiver and the fire detector in a conventional detectors. If there is a breakdown in the analog line owing to
fire-detection system. As shown in the figure, the receiver deterioration or corrosion before a fire occurs, the receiver will
perceives a fire based on the fact that the current increases in neither recognize the problem nor detect the fire. Therefore,
the corresponding analog connection line when a fire occurs. there is a very high probability that a conventional fire-
That is, the fire detector that perceives the fire causes the detection system may misfunction.
analog line to short-circuit so that the current increases. At this
B. Network-based fire-detection system
time, when the receiver detects that the current in a
corresponding line has increased, it relays this information Fig. 3 shows the architecture of a network-based fire-
using a bell or a signal lamp to indicate that a fire has occurred detection system that is able to overcome the shortcomings of
in the corresponding area. a conventional fire-detection system. As shown in the figure, a
Generally, the current in an analog line will be increased if fire detector, an actuator, a bell, and a display device are
any one of the fire detectors connected to that line perceives a connected by a shared transmission medium, and information
fire in the conventional fire-detection system. Hence, the is exchanged using digital communication. Using this
receiver cannot distinguish which detector connected in a connection method, the receiver can identify which fire
detector senses a fire because each fire detector has its own
bell terminator address. Also, because the receiver periodically examines the
state of the fire detectors, it can recognize a breakdown in the
B
system, such as the failure of a fire detector or an open circuit
D D ... D in the transmission medium. In addition, the number of false
sign ramp receiver fire detector alarms is less than with conventional systems because analog
...
B D D A …
fire detector
(b) Connection method of a traditional fire-detection system sign ramp bell fire detector actuator
Fig. 2. Basic structure of a traditional fire-detection system. Fig. 3. Structure of a network-based fire-detection system.
K. C. Lee and H.-H. Lee: Network-based Fire-Detection System via Controller Area Network for Smart Home Automation 1095
measured by each fire detector can be sent to the receiver. It is content-based addressing, implying that each message
z
straightforward to apply such a system to an intelligent fire packet has a unique identifier according to its content.
detection system and to apply a reasoning algorithm, because z cyclic redundancy check for error detection, and
the receiver can make use of the digitized detection values of z error confinement to block any adverse effects of a
the smoke and heat from multiple fire detectors installed in the network component failure.
same guard area. As changes in the detection signals can be A device on the network can transmit its message whenever
calculated and compared, assessment of risk can be improved the network is idle. When the network is busy, the packet
[12]. transmission has to be delayed until the on-going transmission
Besides, a PC-based receiver can be used in a network- has finished. Because electronic signals on the network have a
based fire-detection system for greater convenience. Generally, finite speed of propagation, there is always the possibility that
it is easier to install and maintain a PC-based receiver than a multiple devices will start their transmissions within a short
conventional dedicated receiver. Since man-machine interface interval. This situation, called message collision, is resolved by
(MMI) technology can be applied to a PC-based receiver, it is comparing the identifiers of the messages involved; that is, the
straightforward to create a user interface and integrate the fire- message with the lowest identifier value wins the right to use
detection system into a home network system. Recently, the network, while the other devices must stop their
several protocols, such as BACNet, LonWorks, and Bluetooth, transmissions immediately. As the identifier is located at the
have been developed to implement network-based fire- beginning of the packets and the electronic signal for zero is
detection systems in intelligent buildings [5][6]. designed to overwrite the signal for one, the message with the
lowest identifier value finishes the contention with no damage
III. DESIGN OF A CAN-BASED FIRE-DETECTION SYSTEM to the packet. The other devices will try to resend their packets
when the first transmission has finished. This arbitration
A. Overview of the CAN protocol procedure is shown in Fig. 4.
CAN 2.0B is a network protocol that was specifically
B. Design of a CAN-based fire-detection system
developed for connecting the sensors, actuators, and ECU’s of
a vehicle. CAN 2.0B supports data rates from 5 kbps to 1 This section presents the design methodology of a CAN for
Mbps, which allows the CAN network to be used to share a fire-detection system. Fig. 5(a) shows the frame exchange
status information and for real-time control. The network between the receiver and the fire detector during the normal
topology can be either a linear bus or a star. state. In the figure, the receiver inspects the state of the fire
CAN 2.0B has the following properties: detectors by sending a poll frame to each fire detector and
z distributed medium access control, meaning that each
actuator in the poll list once every TP (polling period). When it
device has the same privilege to use the shared medium. receives the poll frame, each fire detector and actuator
z contention-based and nondestructive bus access, transmits a status frame that includes its own fire detection
indicating the access to the bus has to be obtained value back to the receiver. Thus, the receiver can periodically
through some type of competition but with no loss of perceive the state of a fire-detection system such as a fire
network capacity due to the contention. detector failure or a breakdown such as an open circuit.
Power on
yes no
Is the bus free?
no
Stop Is a message Check
the transmission transmitted? the identifier
yes
Transmit
the message no
Receive a
no
transmitted
message?
Arbitration yes Collision
won? occurred? yes
yes no
Continue Receive
the transmission the message
28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0
success
00 --
receiver
detector A
11 -- failure 11 -- failure
detector B
01 1111 -- success
(b) Example of contention owing to the frame and the fire level IDs
Fig. 7. Example of contention owing to ID.
based receiver, two smoke detectors, one gas detector, and an detector did not receive an extinction frame from the receiver
additional communication module to emulate the actuator are within a period of TA, it repeated its transmission of an alarm
connected to the CAN. The transmission speed of the CAN is frame with a new detection value. Here, TA was set to 10 ms.
set to 500 kbps, and one CAN repeater is used to expand the Fig. 10 shows a transmission frame in our CAN-based fire-
transmission range of the network. Also, a PC-based receiver detection system measured by an oscilloscope. Fig. 10(a)
is programmed using CAPL by CANalyzer. The smoke shows the poll and status frames that are periodically
sensors are NEMOTO NIS-05As, and the gas sensor is a exchanged between the receiver and fire detector. If a fire
NEMOTO NAP-55A. An Atmel AT89C51CC01 occurred, the fire detector transmits an alarm frame to the
microcontroller is used as a communication module that acted receiver, as shown in Fig. 10(b). When the receiver
as a CAN 2.0B controller, and a Philips PCA82C250 is used acknowledges that a fire have occurred after receiving a fire
as the CAN transceiver for signaling. detection value beyond a threshold value, it transmits an
Fig. 9(a) shows the operation algorithm of the PC-based extinction frame to the corresponding fire detectors. Here, the
receiver in the experimental model. As shown in the figure, the response time of the fire alarm signal is 0.27 ms, which is
receiver transmits poll frames to the fire detectors in a given much smaller than the NFPA requirement of 90 s [5][17].
order, once every TP cycles. At this time, if a collision
occurred, IDs are compared, and the frame with the highest
priority ID is transmitted first. The fire level ID of the frame Power on
that lost the competition is increased, and it then waits until the
transmission medium is idle. If an alarm frame with a fire
quantity that exceeds the threshold value is detected during the yes Is alarm frame
carrier sensing, an extinction frame is transmitted to activate detected?
the corresponding actuators. In these tests, TP is set to 10 ms, no
which is sufficient because all frames generated in the
Transmit Transmit
experimental model are transmitted within this time. extinction frame poll frame
Fig. 9(b) shows the operation algorithm for a fire detector
and an actuator in the experimental model. As shown in the
Is arbitration no Increase no Is arbitration
figure, when the fire detector received a poll frame under a no-
won? fire level ID won?
fire condition, it transmitted a status frame containing its
detection value. If the fire detector perceived a fire, it yes yes
transmitted an alarm frame that included the changed detection Is status frame yes
value and waited to receive an extinction frame. If the fire detected?
no
terminator Report Report
NIS-50A fire occurrence error of node
smoke detector
smoke sensor
CAN module
(a) Operation algorithm of the PC-based receiver
actuator
CAN module Power on
no
Is extinction frame no
PC based receiver received within TA?
yes
voltage(V)
V from the smoke sensor, it judges that a fire has occurred and
transmits an extinction frame to the corresponding actuators. If
it receives a value lower than 4 V from the smoke sensor, it
judges that the fire has been extinguished.
If a sensor value is less than 4V,
In a conventional fire-detection system, when the receiver we define that a fire is occurred
receives a value greater than 4 V owing to a temporary
malfunction from noise, it decides that a fire has occurred and
activates the actuators. However, A CAN-based fire detector
transmits analog values of fire detection data to the receiver
when it detects a fire, which can be used to avoid false alarms.
Also, a CAN-based receiver receives fire detection data from time
Fig. 11. Message transmission for fire detection using an actual
several fire detectors, and can use this information to evaluate sensor value.
whether a fire has indeed occurred. Therefore, owing to its
advanced features, a CAN-based fire-detection system is more satisfies the NFPA requirements in that the fire warning
accurate than a conventional fire-detection system. In addition, response time is very short. Also, as the receiver obtains fire
if two or three fire detectors are installed at any particular detection data directly from the fire detectors, it can be said
point, a CAN-based fire-detection system can accurately detect that the system is more accurate than the conventional fire-
a fire despite of a malfunction in any one of fire detectors. detection systems. In addition, if two or three fire detectors are
installed at any particular point, the CAN-based fire-detection
V. SUMMARY AND CONCLUSIONS
system can accurately detect a fire despite of a malfunction
This paper presents a CAN-based fire-detection system and occurring in any one of fire detectors.
verifies that such a system can be used in a smart home. We Especially, the price of a CAN microcontroller, which can
describe the structure of a CAN-based fire-detection system be integrated into one-chip by semiconductor manufacturing
and the design method of the CAN. Also, an experimental companies, is low, and many CAN development tools are
model is used to evaluate the performance of the system. coming onto the market. Hence, a fire-detection system based
From several experiments, it can be said that the system on the CAN has the advantage that the implementation of
sensors or actuators is straightforward as compared to a system
using an Ethernet that is the lower layer of the BACNet. This
makes it easier to design a home automation system.
However, this paper focuses only on the basic structure of a
CAN-based fire-detection system. For practical application of
these research results, the implementation of an application
layer and a power supply should also be studied. In addition,
research into the redundancy of the communication module
will be required to obtain the necessary fault-tolerance
properties required in a CAN-based fire-detection system.
REFERENCE
(a) Normal state [1] D. Snoonian, “Smart buildings,” IEEE Spectr., vol. 40, no. 8, pp. 18-
23, Aug. 2003.
[2] R. Nunes, J. Delgado, “An Architecture for a Home Automation
System”, IEEE Intl Conf. Electron. Circuits Syst., pp. 259-262, 1998.
[3] K.S. Lee, K.C. Lee, S. Lee, K.T. Oh, and S.M. Baek, “Network
Configuration Technique for Home Appliances based on LnCP,” IEEE
Trans. Consum. Electron., vol. 49, no. 2, pp. 367-374, 2003.
[4] K. Wacks, “Home Systems Standards: Achievements and Challenges,”
IEEE Comm. Mag., vol. 40, no. 4, pp. 152-159, 2002.
[5] W.S. Song, S.H. Hong, and K.D. Song, “Performance analysis of
BACnet-based fire detection/monitoring system in the high-rise
building”, Journal of the Architectural Institute of Korea, vol. 18, no. 1,
pp. 171-178, 2002.
[6] N. Sriskanthan, F. Tan, and A. Karande, “Bluetooth based home
automation system,” Microprocessor. Microsyst., vol. 26, pp. 281-289,
(b) Fire detection
2002.
Fig. 10. Message transmission in the CAN-based fire-detection system.
1100 IEEE Transactions on Consumer Electronics, Vol. 50, No. 4, NOVEMBER 2004
[7] D. Snoonian, “Smart Buildings,” IEEE Spectr., vol. 40, no. 8, pp. 18-
23, 2003. Kyung Chang Lee (S’00-A’04) was born in Pusan,
[8] Road Vehicles-Interchange of Digital Information-Controller Area Korea, in 1971. He received the B.S., M.S. and Ph.D.
Network for High-Speed Communication, ISO 11898, 1994. degrees in mechanical engineering from Pusan National
[9] T. C. Hooi, M. Singh, Y. K. Siah, and A. R. Ahmad, “Building Low- University, Pusan, Korea, in 1996, 1998, and 2003,
Cost Intelligent Building Components with Controller Area Network respectively. He is a Researh Aassociate in the Network-
(CAN) Bus,” Proceedings of IEEE Region 10 International Conference based Automation Research Center, University of
on Electrical and Electronic Technology, pp. 466-468, 2001. Ulsan, Ulsan, Korea. From 1997 to 2003, he was a
[10] CiA DSP 416-1 V 1.0 part 1: CANopen application profile for building research assistant in the Mechanical Engineering and
door control - General definitions and basic principles, 2003. Technology Research Information Center, Pusan, Korea. His research
[11] G. Cena and A. Valenzano, “A protocol for automatic node discovery in interests are industrial network, in-vehicle network, home network, wireless
CANopen network,” IEEE Trans. Ind. Electron., vol. 50, no. 3, pp. 419- network, networked control system, network management by intelligent
430, 2003. techniques. He is a member of Institute of Electrical and Electronics
[12] D.T. Gottuk, M.J. Peatross, R.J. Roby, and C.L. Beyler, “Advanced fire Engineers, Korean Society of Precision Engineers, and Institute of Control,
detection using multi-signature alarm algorithms,” Fire Saf. J., vol. 37, Automation, and Systems Engineers.
no. 4, pp. 381-394, 2002.
[13] K. Tindell and A. Burns, Guaranteed Message Latencies for Hong Hee Lee (M’87) was born in Seoul, Korea, in
Distributed Safety-Critical Hard Real Time Control Networks, 1957. He received the B.S., M.S., and Ph.D. degrees
Technical Report YCS 94-229, Dept. Computer Science, Univ. of York, from Seoul National University, Seoul, Korea, in 1980,
York, UK, 1994. 1982, and 1990, respectively. He is a professor in the
[14] M. Ellims, S. Parker, and J. Zurlo, “Design and Analysis of a Robust School of Electric-Electronic Information System
Real-Time Engine Control Network,”IEEE Micro, vol. 22, no. 4, pp. 20- Engineering, University of Ulsan, Ulsan, Korea. He is
27, 2002. also Director of Network-based Automation Research
[15] K. Tindell, H. Hansson, and A. Wellings, “Analyzing real-time Center (NARC) which is sponsored by Ministry Of
communications: controller area network (CAN),” Proceed. IEEE Real- Science and Technology (MOST). His research interests is power electronics,
Time Syst. Sym., pp. 259-263, 1994. network-based motor control, and control network. He is a member of
[16] W. Stalling, Local and Metropolitan Area Networks, 6th Ed. Macmillan Institute of Electrical and Electronics Engineers, Korean Institute of Power
Publishing Company, 2000. Electronics, Korean Institute of Electrical Engineers, and Institute of Control,
[17] NFPA, National Fire Alarm Code, 1996. Automation, and Systems Engineers.
International Journal of Advanced Science and Technology
Vol. 15, February, 2010
Abstract
A smart home or building is a home or building, usually a new one that is equipped with
special structured wiring to enable occupants to remotely control or program an array of
automated home electronic devices by entering a single command. Conventional security
systems keep homeowners, and their property, safe from intruders. A smart home security
system, however, offers many more benefits. Home automation technology notifies
homeowners of any problems, so that they can investigate. In this paper, we discuss smart
home and security, we also review the tool related to smart home security.
1. Introduction
Smart homes connect all the devices and appliances in your home so they can
communicate with each other and with you. Anything in your home that uses electricity can
be put on the home network and at your command. Whether you give that command by voice,
remote control or computer, the home reacts. Most applications relate to lighting, home
security, home theater and entertainment and thermostat regulation. Security has been an
important issue in the smart home applications. Conventional security systems keep
homeowners, and their property, safe from intruders. A smart home security system, however,
offers many more benefits. On the following chapters, we discuss smart home, smart home
security and related tools in smart home security.
13
International Journal of Advanced Science and Technology
Vol. 15, February, 2010
signal along a home's wiring, and a receiver plugged into any electric outlet in the home could
receive that signal and operate the appliance to which it is attached. [1]
One common protocol for PCS is known as X10, a signaling technique for remotely
controlling any device plugged into an electrical power line. X10 signals, which involve short
radio frequency (RF) bursts that represent digital information, enable communication between
transmitters and receivers.
In Europe, technology to equip homes with smart devices centers on development of the
European Installation Bus, or Instabus. This embedded control protocol for digital
communication between smart devices consists of a two-wire bus line that is installed along
with normal electrical wiring. The Instabus line links all appliances to a decentralized
communication system and functions like a telephone line over which appliances can be
controlled. The European Installation Bus Association is part of Konnex, an association that
aims to standardize home and building networks in Europe.
Echelon Corp., the creator of the LonWorks system, is helping drive adoption of an open
interoperability standard among vendors in the control networks industry. LonWorks is an
open standard for network automation and control for the building, transportation, industrial
and home markets. The American National Standards Institute (ANSI) has adopted the
protocol underlying LonWorks control networks as an industry standard. The LonMark
Interoperability Association is made up of more than 200 controls companies mission
working on standard to integrate multi-vendor systems based on LonWorks networks. [2]
14
International Journal of Advanced Science and Technology
Vol. 15, February, 2010
wires of a home. All the appliances and devices are receivers, and the means of controlling
the system, such as remote controls or keypads, are transmitters. If you want to turn off a
lamp in another room, the transmitter will issue a message in numerical code that includes the
following:
An alert to the system that it's issuing a command,
An identifying unit number for the device that should receive the command and
A code that contains the actual command, such as "turn off."
All of this is designed to happen in less than a second, but X10 does have some limitations.
Communicating over electrical lines is not always reliable because the lines get "noisy" from
powering other devices. An X10 device could interpret electronic interference as a command
and react, or it might not receive the command at all. While X10 devices are still around,
other technologies have emerged to compete for your home networking dollar.
Instead of going through the power lines, some systems use radio waves to communicate,
which is also how WiFi and cell phone signals operate. However, home automation networks
don't need all the juice of a WiFi network because automation commands are short messages.
The two most prominent radio networks in home automation are ZigBee and Z-Wave. Both
of these technologies are mesh networks, meaning there's more than one way for the message
to get to its destination.
Figure 2. The dots represent devices that could be connected to your smart home
network.
Z-Wave uses a Source Routing Algorithm to determine the fastest route for messages.
Each Z-Wave device is embedded with a code, and when the device is plugged into the
system, the network controller recognizes the code, determines its location and adds it to the
network. When a command comes through, the controller uses the algorithm to determine
how the message should be sent. Because this routing can take up a lot of memory on a
15
International Journal of Advanced Science and Technology
Vol. 15, February, 2010
network, Z-Wave has developed a hierarchy between devices: Some controllers initiate
messages, and some are "slaves," which means they can only carry and respond to messages.
ZigBee's name illustrates the mesh networking concept because messages from the
transmitter zigzag like bees, looking for the best path to the receiver. While Z-Wave uses a
proprietary technology for operating its system, ZigBee's platform is based on the standard set
by the Institute for Electrical and Electronics Engineers (IEEE) for wireless personal
networks. This means any company can build a ZigBee-compatible product without paying
licensing fees for the technology behind it, which may eventually give ZigBee an advantage
in the marketplace. Like Z-Wave, ZigBee has fully functional devices (or those that route the
message) and reduced function devices (or those that don't).
Using a wireless network provides more flexibility for placing devices, but like electrical
lines, they might have interference. Insteon offers a way for your home network to
communicate over both electrical wires and radio waves, making it a dual mesh network. If
the message isn't getting through on one platform, it will try the other. Instead of routing the
message, an Insteon device will broadcast the message, and all devices pick up the message
and broadcast it until the command is performed. The devices act like peers, as opposed to
one serving as an instigator and another as a receptor. This means that the more Insteon
devices that are installed on a network, the stronger the message will be. [3]
16
International Journal of Advanced Science and Technology
Vol. 15, February, 2010
should work together despite different manufacturers, but joining up an X10 and a Z-Wave
product requires a bridging device.
In designing a smart home, you can do as much or as little home automation as you want.
You could begin with a lighting starter kit and add on security devices later. If you want to
start with a bigger system, it's a good idea to design carefully how the home will work,
particularly if rewiring or renovation will be required. In addition, you'll want to place
strategically the nodes of the wireless networks so that they have a good routing range.
The cost of a smart home varies depending on how smart the home is. One builder
estimates that his clients spend between $10,000 and $250,000 for sophisticated systems. If
you build the smart home gradually, starting with a basic lighting system, it might only be a
few hundred dollars. A more sophisticated system will be tens of thousands of dollars, and
elements of home theater systems raise the cost of a system about 50 percent. [3]
3. Security Technology
As the technology mature and the interest on the internet increases, network security has
become a major concern to companies throughout the world. The fact that the information
and tools needed to penetrate the security of corporate networks are widely available has
increased that concern. Because of this increased focus on network security, network
administrators often spend more effort protecting their networks than on actual network setup
and administration. Tools that probe for system vulnerabilities, such as the Security
Administrator Tool for Analyzing Networks, and some of the newly available scanning and
intrusion detection packages and appliances, assist in these efforts, but these tools only point
17
International Journal of Advanced Science and Technology
Vol. 15, February, 2010
out areas of weakness and may not provide a means to protect networks from all possible
attacks. Thus, as a network administrator, you must constantly try to keep abreast of the large
number of security issues confronting you in today’s world. [4]
18
International Journal of Advanced Science and Technology
Vol. 15, February, 2010
security codes allow the security system to allow residents into the home, while based on pre-
programmed information restrict access to other individuals. [5]
Whenever smart home security system detects someone who is unknown, it can provide
video of the visitor to the homeowner. Visitors that are welcome can be given clearance and
allowed in the house remotely. Unwelcome visitors can be ignored, and individuals
attempting to break in will trigger a call to the police. [5]
19
International Journal of Advanced Science and Technology
Vol. 15, February, 2010
In the user authentication phase, the authentication system uses the trained RBF network
and applies the same one-way hash function to authenticate the legality of the users. The
authentication process is described as follows: [6]
1. The system applies the same hash function on the entered username and password.
2. The system extracts an output through the trained neural network.
3. The system compares the output of the RBF network with the hashed password. If the
results are equal, the user is recognized as an authorized user. Otherwise, the user is
rejected as an illegal user.
5.2. Sentry@Home
Smart Home environments typically are equipped with different kinds of sensors and
tracking devices for context-aware service provisioning. While on the one hand, people want
to take advantage of the comfort and added value of personalized context-aware services,
privacy and traceability becomes a serious concern on the other hand. The question arises,
how we can build up trust into inherently untrusted services in a potentially hostile
environment? How can it be guaranteed that eventually all sensitive data is deleted or safely
stored away? The Sentry@HOME concept, as part of our User-centric Privacy Framework,
addresses these concerns.
Sentry@HOME is designed to become an integral part of the user’s home environment;
seamlessly embedded into the Smart Home software infrastructure.. The Smart Home itself
then can be leveraged to act as a privacy proxy for a tracked individual. On behalf of the user
it constitutes the central privacy enforcement point for all privacy-relevant accesses to private
or sensitive data. We are confident that our contribution, the combination of Smart Homes
and a privacy-aware infrastructure, substantially adds to the success of personalized pervasive
computing systems.
20
International Journal of Advanced Science and Technology
Vol. 15, February, 2010
combination of these layers provides best methodology to stop the DDoS attacks established
though spam mails.
6. Conclusion
Smart Home is a residence that uses a Home Controller to integrate the residence's various
home automation systems. The most popular Home Controllers are those that are connected
to a Windows based PC during programming only, and are then left to perform the home
control duties on a stand-alone basis. Integrating the home systems allows them to
communicate with one another through the home controller, thereby enabling single button
and voice control of the various home systems simultaneously, in preprogrammed scenarios
or operating modes. Security has been an important issue in the smart home applications. In
this paper, we discussed smart home and security, we also review the tool related to smart
home security.
References
21
International Journal of Advanced Science and Technology
Vol. 15, February, 2010
Authors
Tai-hoon Kim
22
Nama Anggota: Stefanus Willy Prasetyo (18/431117/TK/47710)
Ananda Fikri Nugroho (18/424990/TK/46685)
Andikha Wira Perkasa (18/424991/TK/46686)
Iwan Arif Setiaji (18/425004/TK/46699)
Abdul Rohman(18/431083/TK/47676)
Ikhsan Galih R.(18/428655/TK/47157)
Muhammad Rifqi A.(18/431105/TK/47698)
Zido Yuwazama (15/378802/TK/42744)