ZIGBEE EXPLOITED the Good, the Bad and the Ugly

Total Page:16

File Type:pdf, Size:1020Kb

ZIGBEE EXPLOITED the Good, the Bad and the Ugly 08 ZIGBEE EXPLOITED The good, the bad and the ugly Tobias Zillner – August 6th 2015 Cognosec © 2015 | Castellezgasse 16/2 | 1020 Vienna, Austria ZigBee Exploited Version 1.0 TABLE OF CONTENTS ABSTRACT ..................................................................................................................................................... 1 INTRODUCTION ............................................................................................................................................. 1 THE ZIGBEE STANDARD .............................................................................................................................. 1 ZIGBEE SECURITY ........................................................................................................................................ 2 Network Layer Security ................................................................................................................................ 2 Application Support Sublayer Security ......................................................................................................... 2 ZIGBEE APPLICATION PROFILES ............................................................................................................... 3 ZigBee Home Automation Public Application Profile (HAPAP) .................................................................... 3 ZigBee Light Link Profile (ZLL) ..................................................................................................................... 4 SECBEE – A NEW ZIGBEE SECURITY TESTING TOOL ............................................................................. 4 REAL WORLD ASSESSMENTS AND IDENTIFIED VULNERABILITIES ..................................................... 5 CONCLUSION ................................................................................................................................................. 5 BIBLIOGRAPHY ............................................................................................................................................. 6 Cognosec Gmbh Classification: Confidential ii ZigBee Exploited Version 1.0 which pose security risks. With the availability of ABSTRACT consumer-ready, programmable radio systems and low-cost devices with sufficient computational The Internet of Things (IoT) is an emerging power, the field of Software-defined-radio (SDR) trend. IoT involves the integration of digital is experiencing rapid growth enabling researchers and wireless technologies in physical objects to audit wireless communication beside traditional and systems, especially those historically Wifi. unconnected, which are supposed to make our everyday life easy and convenient. One of This paper highlights the main security risks in the most widespread used wireless ZigBee implementations, which devices are technologies to connect IoT devices is the affected and describes the results of a practical ZigBee standard. This emerging technology assessments of ZigBee enabled device. needs to keep pace with customer demands for cheap, long-living and available devices. One of the major challenges besides user and THE ZIGBEE STANDARD industry acceptance is security. However, ZigBee is a standard for personal-area networks security is very often sacrificed or neglected due to fear of reduced or limited usability or developed by the ZigBee Alliance (including fear of breaking backwards compatibility. companies like Samsung, Philips, Motorola, Texas Instruments and many others) with the aim This paper describes the actual applied of providing low-cost, low-power consumption, security measures in ZigBee, highlight the two-way, reliable, wireless communications included weaknesses and introduces a standard for short range applications. (ZigBee software framework that can be used to Alliance 2008, p. 29) The standard is completely automatically audit ZigBee communication open and gained ratification by the Institute of and the implementation of ZigBee security Electrical and Electronics Engineer (IEEE) in services for various vulnerabilities and exploit 2003. The protocol stack of ZigBee is based on them. IEEE 802.15.4. Advantages of choosing ZigBee are the provision of long battery lifetime, the support of a large number of nodes (up-to 65000) INTRODUCTION in a network, the easy deployment, the low costs and global usage. (Kaur & Sharma 2013)(ZigBee IoT is considered to be the next phase of the Alliance 2014) Internet revolution. Linking physical objects in the real world to the virtual world and enabling ZigBee is used for example in following areas anytime, anyplace and anything communication. (ZigBee Alliance 2014): (Santucci 2010, p. 11) Communication between devices is mainly carried out using wireless Remote Control channels, which introduces various security Input Devices issues. Some of these weaknesses are new, but most have actually been around for a long time. A Home Automation desired short time-to-market, as well as backward compatibility and future proofing considerations Building Automation lead to the persistence of known problems. The Health Care ZigBee standard is one of the dominating standards for wireless communication between Telecom Services IoT devices. Even though the ZigBee standard was created with security in mind, low per-unit- Retail Services costs and usability as well as compatibility factors lead to poor implementation of security controls, Smart Energy Cognosec Gmbh Classification: Confidential PAGE 1 OF 6 ZigBee Exploited Version 1.0 number and may be used by the NWK and APL layers of a device. A device must The ZigBee stack consists of four layers: (ZigBee acquire a network key via key-transport or Alliance 2008, p. 35) pre-installation. Physical Layer (PHY) Link key is used to secure unicast communication on Application layer. This Medium Access Control Layer (MAC) 128-bit key is shared only between two devices. Link keys are acquired either via Network Layer (NWK) key-transport, key- establishment, or pre- installation (for example, during factory Application Layer (APL) installation) and may be used only by the APS sub-layer. The IEEE 802.15.4-2003 standard is used for the two lowest layers, the physical layer (PHY) and Network Layer Security the medium access control layer (MAC). The other two layers are defined by the ZigBee The ZigBee Network Layer ensures the integrity Protocol Stack. and encryption of the transmitted frames by applying AES encryption (AES CCM mode) with a From a security perspective, the network and the key length of 128 bit, and ensures its integrity by application layer are of highest relevance and are using a cipher block chaining message therefore described in more detail in the next authentication code (CBC-MAC). (ZigBee Alliance chapter. 2008, p. 423) ZIGBEE SECURITY Application Support Sublayer Security The ZigBee standard includes complex security measures to ensure key establishment, secure If a frame originated by the APS layer needs to be networks, key transport and frame security. secured, the APS layer is responsible for the (ZigBee Alliance 2008, p. 419 f). Those services proper protection of the frame. The APS layer are implemented at the Network and the allows frame security to be based on link keys or Application Support Sublayer (APS), a sub layer the network key. If the active network key should of the Application Layer. The ZigBee protocol is be used for frame protection, the APS layer first based on an "open trust" model. This means all checks if the frame gets protected on NWK layer. protocol stack layers trust each other. Therefore If so the frame just gets passed to the NWK layer cryptographic protection only occurs between and the frame protection is performed on the devices. Every layer is responsible for the security NWK layer. The APS layer is also responsible for of their respective frames. providing applications and the ZDO with key establishment, key transport, and device The security of ZigBee networks is based on their management services. (ZigBee Alliance 2008, p. encryption keys. It is possible to distinguish 424) between two types of security keys. (ZigBee Alliance 2008, p. 422) The ZigBee standard states the following about the security of ZigBee installations: “The level of Network key is used to secure broadcast security provided by the ZigBee security communication. This 128-bit key is shared architecture depends on the safekeeping of the among all devices in the network. Usually symmetric keys, on the protection mechanisms multiple network keys are stored by the employed, and on the proper implementation of Trust Center, but only one network key is the cryptographic mechanisms and associated the active network key. The current active security policies involved. Trust in the security network key is identified by a sequence Cognosec Gmbh Classification: Confidential PAGE 2 OF 6 ZigBee Exploited Version 1.0 architecture ultimately reduces to trust in the ZigBee device might be a multi-purpose-device, secure initialisation and installation of keying different profiles are created to allow devices of material and to trust in the secure processing and various vendors to properly communicate with storage of keying material.” (ZigBee Alliance each other using those predefined profiles. 2008, p. 420). ZigBee Home Automation Public As stated above, the ZigBee Security is based on the assumption that keys are securely stored, and Application Profile (HAPAP) devices are pre-loaded with symmetric keys so An example of a profile would be
Recommended publications
  • Wireless & Self-Powered Internet of Things
    Wireless & self-powered Internet of Things The Dolphin products are based on miniaturized energy converters, ultra-low power electronics and robust radio technology in open standards like EnOcean, zigbee and Bluetooth Low Energy for OEM product manufacturers. Building automation Smart home LED lighting M2M Our technology The Dolphin modules and white label products use the energy harvesting principle, in which energy is obtained from the surroundings, to supply self-powered wireless sensor networks. The modules are based on miniaturized energy converters that convert motion, light or temperature differences into electrical energy. Together with an efficient energy management system, the energy harvesting technology facilitates communication between maintenance-free IoT devices based on open wireless standards, such as EnOcean, zigbee and Bluetooth Low Energy. The solutions are used in building automation, smart homes, LED lighting control systems as well as industrial applications. Energy harvesting Wireless Ultra-low power The Dolphin portfolio for OEM product manufacturers The Dolphin portfolio includes the product lines “868 MHz EnOcean” for Europe, “902 MHz EnOcean” for North America and “928 MHz EnOcean” in Japan based on the EnOcean wireless standard introduced by the EnOcean Alliance (ISO/IEC 14543-3-1X) on the sub 1 GHz band, which has proven to be a resounding success in building automation and smart homes. The Dolphin porftolio also includes the “2.4 GHz zigbee” product line in the 2.4 GHz band, which can be used in smart home applications all over the world, and the “2.4 GHz BLE” portfolio for Bluetooth systems for modern lighting control. Energy converter Energy harvesting Energy harvesting Controlers Tools wireless switches wireless sensors Products in 868 MHz EnOcean for Europe Products with 868 MHz are suitable for Europe and other countries adopting RED.
    [Show full text]
  • Comparison of Zigbee, Z-Wave, Wi-Fi, and Bluetooth Wireless Technologies Used in Home Automation
    Comparison of Zigbee, Z-Wave, Wi-Fi, and Bluetooth Wireless Technologies Used in Home Automation Salim Jibrin Danbatta Asaf Varol Department of Software Engineering Department of Software Engineering Firat University Firat University Elazig, Turkey Elazig, Turkey [email protected] [email protected] Abstract— Most of the home automation wireless technologies A literature review is presented in section II, home on the internet of things are based on ZigBee, Z-Wave, Wi-Fi, automation wireless technologies are discussed in section III. and Bluetooth wireless technologies. While these solutions are The research design is described in section IV while results and good enough, users of smart homes are facing challenges of discussion are presented in section V, and section VI describes selecting the best technology. This paper compares the the conclusions of the study. performance of ZigBee, Z-Wave Wi-Fi and Bluetooth technologies from the user’s perspective. Power consumption, range, cost, ease of use, scalability, and interoperability are the six indices developed as guidelines to potential users, and hence, II. LITERATURE REVIEW the results of this study. With this knowledge, the users can make the appropriate choice of wireless technology solution to use in Several studies about home automation systems have been their home automation systems. done in the past. They include experimental, descriptive, and comparative analysis involving different wired and wireless Keywords—internet of things, home automation, wireless technologies used in Home Automation. technologies, Zigbee, Z-Wave, Wi-Fi, Bluetooth Sikandar et al. [5] show how SMS (short message service) based and wireless technology enhance the controlling of home I.
    [Show full text]
  • Zigbee-Based System for Remote Monitoring and Control of Switches
    Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and private study only. The thesis may not be reproduced elsewhere without the permission of the Author. ZigBee-Based System for Remote Monitoring and Control of Switches A thesis presented in partial fulfilment of the requirements for the degree of Master of Engineering at Massey University, Albany, New Zealand. © Matthew Lyon October 2010 1 Abstract Home automation technology has existed for nearly four decades, but is nonetheless mostly absent in the average home today. The systems that do exist are often highly customised and expensive, catering to a very niche market, or overly sophisticated and complicated. Many of these also require extensive, dedicated cabling as their communications backbone and as such are only practical to install during the construction of a new house. The core aims of this project are to develop a cheap and simple home automation system that can be easily installed in new and existing houses. These aims are achieved by creating a centralised system where most of the intelligence is managed by a PC server and the end nodes are kept as simple as possible. The server is responsible for basic security, maintaining awareness of the current system state and providing the user interface. At the outer edge of the system is a ZigBee network of wall switches and, in between, a home gateway provides a protocol translation service between the two. The new, “smart” switches are designed to be entirely compatible with existing wall switches in terms of their mounting and wiring requirements, and so ZigBee is chosen to provide a reliable wireless communication channel between the end nodes and the gateway.
    [Show full text]
  • What's New in Zigbee 3.0
    White Paper SWRA615A–June 2019 What's New in Zigbee 3.0 Zigbee is an industry-proven worldwide standard for low power, self-healing, robust mesh networks offering a complete and interoperable IoT solution for home and building automation. Based on the IEEE 802.15.4 standard and providing a simplified approach to commissioning devices securely, it enables users the ability to form networks involving over 250 devices for large coverage areas. Through adherence to a profile specification and ZCP (Zigbee Compliant Platform) testing, Zigbee devices can become certified for interoperability across various platforms. Texas Instruments™ CC13x2 and CC26x2 devices are part of the SimpleLink™ microcontroller (MCU) platform. Zigbee based applications can be developed on these devices using the TI Z-Stack included with the SimpleLink™ CC13x2 and CC26x2 software development kit (SDK). This SDK includes everything needed to develop Zigbee certifiable solution including tools, application examples, documentation and source code. It uses Zigbee 3.0, the latest specification from the Zigbee Alliance which unifies former application segments under a common certification process. The following sections intend to give users an overview of all of the new features introduced in the Zigbee 3.0 specification. 1 Overview At the core of Zigbee 3.0 is the Zigbee PRO 2017 (R22). Note that previously Zigbee Pro 2015 (R21) was required for Zigbee 3.0, which has now been replaced with the newer Zigbee Pro 2017 (R22) specification. Older implementation based on the R21 specification are still compatible with the new R22 specification. The Zigbee PRO Specification adds child device management, improved security features, and new network topology options to Zigbee networks.
    [Show full text]
  • Cybersecurity of Industrial Cyber-Physical Systems: a Review
    CYBERSECURITY OF INDUSTRIAL CYBER-PHYSICAL SYSTEMS: AREVIEW Hakan Kayan Matthew Nunes School of Computer Science and Informatics School of Computer Science and Informatics Cardiff University, UK Cardiff University, UK [email protected] [email protected] Omer Rana Pete Burnap School of Computer Science and Informatics School of Computer Science and Informatics Cardiff University, UK Cardiff University, UK [email protected] [email protected] Charith Perera School of Computer Science and Informatics Cardiff University, UK [email protected] January 12, 2021 ABSTRACT Industrial cyber-physical systems (ICPSs) manage critical infrastructures by controlling the processes based on the “physics” data gathered by edge sensor networks. Recent innovations in ubiquitous computing and communication technologies have prompted the rapid integration of highly intercon- nected systems to ICPSs. Hence, the “security by obscurity” principle provided by air-gapping is no longer followed. As the interconnectivity in ICPSs increases, so does the attack surface. Industrial vulnerability assessment reports have shown that a variety of new vulnerabilities have occurred due to this transition while the most common ones are related to weak boundary protection. Although there are existing surveys in this context, very little is mentioned regarding these reports. This paper bridges this gap by defining and reviewing ICPSs from a cybersecurity perspective. In particular, multi-dimensional adaptive attack taxonomy is presented and utilized for evaluating
    [Show full text]
  • Home Automation an Introduction to Home Assistant
    Open Source Home Automation An Introduction to Home Assistant Rob Peck ([email protected]) What is Home Automation? • Using computers to control our physical world. • Controlling lighting, HVAC, appliances, etc using remote systems and automations. • Automating repetitive tasks around the home. We are humans, we shouldn’t behave like computers. My Home Automation Journey • Bought our house in 2012, it has eave lighting. Makes the house look pretty at night. Decided I wanted them to turn on and off at certain times. • Has 2 different banks of lights, with different switches on opposite sides of the house. :/ • First I used WeMo Wifi switches for this and they “worked” but were kind of a pain to use. The Z-Wave Era • After being unhappy with the WeMo Wifi switches, I decided to go deeper into the Home Automation world. Started looking at industry standards. • There are a handful of home automation standards: ZigBee and Z-Wave are the two big ones and use mesh wireless. X10 is an older protocol using power line communication, Insteon is a newer powerline and wireless mesh protocol. • I decided on Z-Wave mostly because it used the less-crowded 900mhz band with longer range. ZigBee is in the 2.4ghz band, same as wifi. Downside is Z- Wave devices are usually more expensive. • Eventually I ended up with both. SmartThings • All protocols require a hub. The hub acts as a central coordinator of messages and a source for automations. • Both ZigBee and Z-Wave are mesh protocols, meaning that some devices also act as re-transmitters so that messages can reach remote areas.
    [Show full text]
  • Onboard Monitoring and Control – Wireless Sensor Networks Systems Integration DTFR53-12-D-00003L 6
    U.S. Department of Transportation Onboard Monitoring and Control – Wireless Federal Railroad Sensor Networks Systems Integration Administration Office of Research, Development, and Technology Washington, DC 20590 DOT/FRA/ORD-21/21 Final Report July 2021 NOTICE This document is disseminated under the sponsorship of the Department of Transportation in the interest of information exchange. The United States Government assumes no liability for its contents or use thereof. NOTICE The United States Government does not endorse products or manufacturers. Trade or manufacturers’ names appear herein solely because they are considered essential to the objective of this report. REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188), Washington, DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED July 2021 Technical Report 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS Onboard Monitoring and Control – Wireless Sensor Networks Systems Integration DTFR53-12-D-00003L 6. AUTHOR(S) Task Order 0011 Tom Campbell*, Dr. Hamid Sharif** 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8.
    [Show full text]
  • Embedded Network Combining CAN, Zigbee and DC-PLC for Motorhome
    VEHICULAR 2015 : The Fourth International Conference on Advances in Vehicular Systems, Technologies and Applications Embedded Network Combining CAN, ZigBee and DC-PLC for Motorhome Fabienne Nouvel Hussein Kdouh IETR/INSA IETR/INSA Rennes, France Rennes, France e-mail : [email protected] e-mail: [email protected] Abstract— Today, the number of motorhomes increases in low to medium data rates and better reliability. However, these Europe and North America as they offer greater individual buses are placed in the motor area and mainly used for driving freedom. As motorhome users spend the most of their time in and automotive controls. Furthermore, they must be separated their confined area, it seems essential to develop new solutions from the possible camper van “home network”, due to security that make their life easier. In order to meet the new needs of levels. customers, a new centralized architecture of a control system based on ubiquitous wired and wireless solutions is studied in this If we consider it as a "mobile home", many technologies paper. The objective of this study is to verify the feasibility of have been developed to make the home smart. The ubiquitous technologies in this original environment. Different technologies include solution for building automation as well measurements have been conducted on a motorhome using as the domestic control activities [3]. Furthermore, devices Controller Area Networks (CAN), ZigBee and direct current may allow remote access. power line communications (DC-PLC). Results have shown that these technologies may be used in a future hybrid control system It seems to be interesting to combine networks used for in a motorhome.
    [Show full text]
  • ENERGY HARVESTING WIRELESS SWITCH Page 4 / 5
    BLUETOOTH FAQ’S ZF Friedrichshafen AG twitter.com/zf_konzern Graf-Zeppelin-Straße 1 facebook.com/zffriedrichshafen 91275 Auerbach youtube.com/zffriedrichshafenag Deutschland Telefon +49 9643 18-0 Telefax +49 9643 18-1720 www.switches-sensors.zf.com ENERGY HARVESTING ZF Electronic Systems Pleasant Prairie LLC 11200 88th Avenue How does the pairing of the Pleasant Prairie, Wisconsin ZF Bluetooth Low Energy components work? USA 53158 WIRELESS SWITCH Pairing of wireless device via pre-programmed MAC Phone +1 262 942 6500 Fax +1 262 942 6566 addresses, a dynamic list of connected switches or via a mobile app. According to the version pairing can also be ZF Services Hong Kong Limited realized via NFC. 2 / F Technology Plaza 29–35 Sha Tsui Road Tsuen Wan, New Territories Which smartphone app can be used to Hong Kong display the Bluetooth Low Energy telegrams Phone +852 26 15 93 53 Fax +852 26 15 96 89 of a ZF Bluetooth Low Energy Switch? The telegrams can be displayed via IOS® Bluetooth Smart ZF Electronics TVS (India) Private Limited Scanner or Android™ Bluetooth Low Energy Analyzer. Madurai – Melur Road, Vellaripatti, Madurai – 625 122 India Phone +91 452 24 202 08 Fax +91 452 24 203 82 801635; 45713730; EN; 02/2020; 1,5; FLI 1 21 Contents ENERGY HARVESTING WITH THE ENERGY HARVESTING WIRELESS SWITCH Page 4 / 5 STANDARD TRANSMITTER – COMPONENTS Page 6 STANDARD TRANSMITTER – WIRELESS SWITCH WITH HOUSING Page 7 RECEIVER PCB Page 8 RECEIVER WITH HOUSING Page 9 SMART HOME Page 10 / 11 WHETHER KNX-RF, BLUETOOTH OR ENOCEAN ‒ LIGHT SWITCH MODULES SET YOU FREE Page 12 KNX PUSHBUTTON MODULE WITH PROGRAMMING ADAPTER AND MEDIA COUPLER Page 13 ENERGY HARVESTING BLUETOOTH® LOW ENERGY PUSHBUTTON MODULE Page 14 PUSHBUTTON MODULE – FURTHER RF STANDARDS Page 15 FAQS AND ADDITIONAL INFORMATION Page 16 –21 4 ENERGY HARVESTING WIRELESS SWITCH In a world where the number of networks is increasing, requirements for information transmission are also changing.
    [Show full text]
  • Air Conditioning Technologies CONTROLS & ACCESSORIES
    Air Conditioning Technologies CONTROLS & ACCESSORIES PC_MultiV_Controls_Accessories_10_19 1 ABOUT LG About LG Electronics USA, Inc. LG Electronics USA, Inc., based in Englewood Cliffs, NJ, is the North American subsidiary of LG Electronics, Inc., a $54 billion global force and technology leader in consumer electronics, home appliances and mobile communications. LG Electronics, a proud ENERGY STAR® Partner of the Year for several consecutive years, sells a range of stylish and innovative home entertainment products, mobile phones, home appliances, commercial displays, air conditioning systems and solar energy solutions in the United States, all under LG’s “Life’s Good” marketing theme. For more news and information on LG Electronics, please visit www.LG.com LG Electronics USA Air Conditioning Technologies The LG Electronics USA Commercial Air Conditioning business is based in Alpharetta, Ga. LG is a leading player in the global air conditioning market, manufacturing both commercial and residential air conditioners and providing total sustainability and building management solutions. From consumer and individual units to industrial and specialized air conditioning systems, LG provides a wide range of products for heating, ventilating and air conditioning. For more information, please visit www.lghvac.com 1 LG Air Conditioning Technologies By utilizing advanced control strategies, LG Air Conditioning systems not only save energy, they also increase operational convenience and comfort. LG offers a variety of controls, including individual zone control, central control, and building management system integration control options that scale easily to meet the requirements of buildings small to large. User-friendly controllers from LG enable users to control and monitor their entire system at the touch of a button.
    [Show full text]
  • Automation in Railway Industry Based on Zigbee Wireless Sensor Network
    ISSN (Print) : 2320 – 3765 ISSN (Online): 2278 – 8875 International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (An ISO 3297: 2007 Certified Organization) Vol. 5, Issue 11, November 2016 Automation in Railway Industry Based on Zigbee Wireless Sensor Network Priyanka Ramdas Rathod1, Prof. Ajay S. Wadhawe2 1 Research Scholar (M.E.), Dept of ECE, SSIEMS, Parbhani, Maharashtra, India Head, Dept. of Electrical, SSIEMS, Parbhani, Maharashtra, India2 ABSTRACT: Railway is best media for transportation, travelling. Nowadays, use of sensing technology is tremendously increased and widely used in various application field. In this paper, we have proposed system for automation in railway industry with the help of zigbee technology with wireless sensor network. In the railway industry, monitoring of different structural parts rail tracks, wheels, boogies, chassis, wagons from remote location in smarter way reducing human presence in actual rail field. In this paper we proposed automation in railway industry with the help of zigbee based WSN network. By placing WSN node on each structural part which wants to monitor. These sensor data is uploaded on webpage. Using mobile internet facility, data can be easily accessed from anywhere. Proposed system is best for detecting progressively worse situation in rail structural parts before condition turns to accident. Accidents happening due to track misalignment, over weighted boogies in train have been a big problem for railways for life security and timely management of services. This bending angle of tracks required to be identified in real time before a train actually comes near to the defected track and get subjected to an accident.
    [Show full text]
  • Wiser 2 Installation Manual
    ® 5200WHC2 Wiser Home Controller 2 Installation Instructions Thank you for your purchase of the Wiser Home Controller 2. This installation document provides the configuration information needed to set up the product. Use this document in conjunction with the Setup Sheet (provided with the Wiser) and the Help files included in the software products from Schneider Electric. Be sure to follow all safety information included in the documents and on the product. © 2013 Schneider Electric. All Rights Reserved. 5200WHC2 Wiser Home Controller 2 Installation Instructions Contents Safety Notice .......................................................................................................... 3 Introduction ........................................................................................................... 4 Product Features ............................................................................................ 5 Indicator LEDs ................................................................................................ 8 Installation ............................................................................................................. 9 Download the Required Software Tools .......................................................... 9 Security ......................................................................................................... 11 Connectivity .................................................................................................. 11 Setup the PC for Configuration Tasks ..........................................................
    [Show full text]