An Overview of Wireless Iot Protocol Security in the Smart Home Domain

Total Page:16

File Type:pdf, Size:1020Kb

An Overview of Wireless Iot Protocol Security in the Smart Home Domain ©2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The final, published version of this paper is available under: S. Marksteiner, V. J. Exposito´ Jimenez,´ H. Vallant, and H. Zeiner, ”An Overview of Wireless IoT Protocol Security in the Smart Home Domain,” 2017 Joint 13th CTTE and 10th CMI Conference on Internet of Things Business Models, Users, and Networks, Copenhagen, 2017, pp. 1-8. doi: 10.1109/CTTE.2017.8260940. http://ieeexplore.ieee.org/document/8260940/ arXiv:1801.07090v1 [cs.CR] 22 Jan 2018 An Overview of Wireless IoT Protocol Security in the Smart Home Domain Stefan Marksteiner, V´ıctor Juan Exposito´ Jimenez,´ Heribert Vallant, Herwig Zeiner JOANNEUM RESEARCH Forschungsgesellschaft mbH DIGITAL - Institute for Information and Communication Technologies Graz, Austria Email: [email protected] Abstract—While the application of IoT in smart technologies this fact, our research is focused on a security analysis of becomes more and more proliferated, the pandemonium of its the main wireless protocols in the smart home domain. This protocols becomes increasingly confusing. More seriously, severe publication has three main parts. The next section gives an security deficiencies of these protocols become evident, as time- to-market is a key factor, which satisfaction comes at the price overview of the different domains that can be found in the of a less thorough security design and testing. This applies Internet of Things. Section III describes the way in which especially to the smart home domain, where the consumer- the sensors can be connected as well as a brief presentation driven market demands quick and cheap solutions. This paper of the selected wireless protocols. The subsequent Section IV presents an overview of IoT application domains and discusses provides a security analysis of each protocol and Section V, the most important wireless IoT protocols for smart home, which are KNX-RF, EnOcean, Zigbee, Z-Wave and Thread. Finally, it eventually, shows the conclusion and outlook of our research. describes the security features of said protocols and compares them with each other, giving advice on whose protocols are more B. Related Work suitable for a secure smart home. Security and privacy are not simple tasks and include several Index Terms—IoT, Security, Smart Homes, Protocols, KNX- RF, EnOcean, Zigbee, Z-Wave, Thread different issues to carry out in an IoT domain, the article in [4] gives us an overview of the most common challenges in I. INTRODUCTION this field. On the other hand, Granjal et al. [5] present an A. Motivation exhaustive analysis of the security and privacy of each layer of the OSI model according to the existing protocols and their Although wireless sensor connections offer several ways to implication in the general IoT domain. Focusing on the smart increase our productivity in many fields such as smart home, home domain topic, an extended analysis of the security is smart production or smart transportation, it also introduces detailed in [6]. It contains an in-depth report of the main some risks to be aware of. The usage of a wireless physical aspects of this area, such as the most common threats and communication, which allows attackers easier interception good practices as well as a brief protocol analysis and security of communications, together with the Internet of Things implications of using of cloud platform on smart homes. One (IoT) [1] [2] or Web of Things (WoT) [3] also leads to step beyond is given from [7], in which the authors not only unprecedented opportunities for attackers to reveal confidential describe the main security and privacy threads, but introduce information and to manipulate data. It is crucial to find efficient an algorithm to secure each situation. Finally, they test them in and effective methods to counteract such attacks. Otherwise, a real-environment with successful results. Although, it seems all the benefits of the IoT will be forfeit. that these issues only concern researchers, the conclusions In order to address these challenges, first, a deep security of the research [8] present that one of the main problems analysis of the existing technologies is needed to help discover customers find to implement smart home solutions is security the root causes as well as find analysis techniques that allow followed by inflexibility, costs, and poor manageability, which verifying the security of the system. Moreover, other aspects indicates that it is also an important point for customers. also have to be considered to reach a secure environment. Unfortunately, sometimes the theoretical research is not In some cases, there are no resources to implement the enough and a practical research is needed. For example, [9] needed secure methods, for example, on sensor nodes with introduces a study about the Google Nest1 and the Nike+ limited resources that operate in adverse environments in Fuelband2, in which both hardware and software are analyzed. which very efficient methods have to be provided. On the Another interesting approach is given in [10], in which the other hand, security is not only a hardware method. For this security and privacy are tested in different IoT demos, such as reason, software attacks, for example attacks against memory a small light system. It describes detailed analysis and depicts consumption, have to be always in scope to avoid them. An analysis about the security on the IoT would be huge 1https://nest.com/ and it can not be done just in one publication. Because of 2https://www.nike.com/nike-plus the possible risks for each scenario. Moreover, a new kind Smart Home domain and an analysis of the defined security of devices to take into account are the low energy devices measures. in which a security system has to be applied but is con- strained by an extremely low power usage as the article [11] B. Smart Production describes. [12] shows why a smart home scenario cannot be Recent reports [14] [15], describe key issues for the next considered as an isolated system by proving it can be exploited generation of smart production analytic services. Relevant by using an external mobile application. applications are: digital performance management (including a Along with this related work, we have seen numerous data-driven mindset and integration across previously isolated security and privacy threads and also some possible solutions, functions); predictive maintenance (including integration of but not an extended security comparison of the available diverse data sets and using, e.g., advanced self-learning algo- protocols that can be used in the smart home domain, which rithms); yield, energy, and throughput optimization (including is the main focus of this paper. integration of process control with other data); next-level automation (including improvements in sensor technology and II. IOTAPPLICATION DOMAINS demand planning); and digital quality management (including Figure 1 displays an overview of the (smart) IoT application the use of new sensing technologies and semi-automated domains considered in this paper, including the communica- quality control). In Smart Production, wireless sensor networks tion protocols used in each respective area. will play a key role for increasing the flexibility of a data driven production lifecycle. Furthermore, for such a connected environment, it is clear that we should deal with cyber security issues described in this paper. C. Smart Transportation Smart transportation is becoming one of the biggest domains of the IoT. The implementation of the Controller Area Network (CAN) [16], that is commonly used in the automation control together with new protocols and communication technologies such as the 5G [17] or IoT-Narrow Band (IoT-NB) [18], opens new possibilities to exchange information. These new technologies are able to give smart transportation the neces- sary packet delay and data transmission rate. Moreover, new hardware implementations, specifically designed to make the right decision as fast as possible, provide a new key tool for the future of the autonomous vehicles. In this future they will have to be able to not only communicate with other cars or services, but process all information of the environment in real time to make the right choice. In consequence, the protection of all sensible information, as well as communications, has to be a mandatory point to ensure the safety and privacy of users. D. Smart Energy Fig. 1. Venn diagram of IoT application domains and included protocols In the energy domain, several standards are available for different areas ranging from generation, transmission, distribu- tion and distributed energy resources to the customers, which A. Smart Home may be also producers themselves, making them so-called pro- The smart home market is getting more and more dy- sumers. A good overview of these standards is available at the namic and, according a Smart Home Customer Survey of International Electrotechnical Commission Website3. Regard- Deloitte [13], in 2018 one million households could already be ing communication networks, the whole range beginning from smart in Germany. According to that study, the main interests home area networks, located at the customer, over the field in Smart Home are closely linked to more comfort and safety, area networks at the distribution level and wide area networks followed by savings on heating and electricity costs. The at transmission level are represented. That means wireless main barriers for customers are on the one hand the costs standards like 2G/3G/4G, WiMAX, WLAN, WirelessHART, and on the other the concerns regarding data protection and ISA100.11a, ZigBee, Z-Wave, 6LoWPAN, LoraWan, Sigfox, data security.
Recommended publications
  • Programmable Fieldbus Controllers 61
    Programmable Fieldbus Cont rollers ŻŻ Section 2 Ż Section 3.1 Prog rammable Fieldbus Cont rollers Section 3.3 Ź PERSPECTO ® Control Panels PFC200 • Decentralized intelligence based on Prog rammable Fieldbus Cont rolle r XT R fieldbus couplers • Merging control and visualization • Maximum performance in a minimum • Programmable to IEC 61131-3 For demanding applications where the • 8.9 cm ... 38.1 cm (3.5” … 15”) space • WAGO-I/O-SYSTEM 750, modular following are critical: • High processing speed • Extreme temperature stability • Additional operating controls • Immunity to interference and (e.g., start/stop switch) impulse-voltage withstand • Based on Linux® also in • Vibration and shock resistance high-level language Cont rolle rs 3 Programmable Fieldbus Controllers 61 Page General Product Information 62 Ve rsions 63 Inte rf aces and Configurations 63 Installation Inst ructions 64 Item Numbe r Keys 65 Standa rds and Rated Conditions 65 ETHERNET TCP S S Net/IP r OFIBU R BACnet/IP IP KNX P CANopen Ethe CPU MODBU Othe rs Description Item No. IEC 60870-5 750-880 66 32-bit x x IEC 61850 ETHERNET Controller IEC 61400-25 750-881 68 750-885 70 x x Media redundancy ETHERNET Controller 32-bit 750-882 72 MODBUS RTU IEC 60870-5 32-bit x x IEC 61850 Telecontrol Controller 750-872 74 IEC 61400-25 3.2 ETHERNET TCP/IP Controller, x x MODBUS RTU 76 32-bit RS-232 750-873 PFC 32-bit x x ETHERNET Controller 750-852 78 32-bit x x KNX IP Controller 750-889 80 x x BACnet/IP Controller 750-831 82 32 Bit x x BACnet/IP Controller 750-830 84 32 Bit x BACnet MS/TP
    [Show full text]
  • Accessing PI System Using OPC Unified Architecture
    Accessing PI System using OPC Unified Architecture Alisher Maksumov OPC Development Group Lead OSIsoft, Inc. Agenda • What is OPC Unified Architecture? • OPC UA Web Services • Information Modeling • Client and Sever Communication • Exposing PI System • Server and Client Demo • OPC UA Roadmap • Summary What is OPC Unified Architecture? • Next generation of OPC technology – Platform independent • Designed with SOA principles – Extensible, discoverable – Well defined message syntax • Mapped into Web Services – WSDL, XML schema, SOAP – Message exchange over HTTP/HTTPS • Supports enhanced security – Certificates, Encryption, Signature • Adopts Information Modeling concepts – Browsable and discoverable Address Space model – Objects, Nodes, Types, Data Variables, Properties OPC UA Specification • Part 1 – Concepts • Part 2 – Security • Part 3 – Address Space Generic Parts • Part 4 – Services • Part 5 – Information Model • Part 6 – Mappings Mapping to Web Services • Part 7 – Profiles Supported features • Part 8 – Data Access • Part 9 – Alarms and Conditions Parts specific to classic • Part 10 – Programs OPC mapping • Part 11 – Historical Access • Part 12 – Discovery OPC Server discovery • Part 13 – Aggregates OPC UA Web Services • Defined in OPC UA Spec (Parts 4, 6) and OPC UA WSDL • Can be group into service sets: – Discovery Service Set • FindServers, GetEndpoints, RegisterServer – Secure Channel Service Set • OpenSecureChannel, CloseSecureChannel – Session Service Set • Create, Activate, Close Session – Node Management Service Set • Add and
    [Show full text]
  • KNX the Smart Guide
    The Smart Guide KNX The Smart Guide Image disclaimer: All photographs used in this Smart Guide are of projects that have been completed by mySmartCTI. Photographs used may show installations that do not currently utilize the KNX protocol. Design » Deliver » Optimise » Guarantee The Smart Guide Contents: KNX – The worldwide STANDARD Welcome to the first edition of the 4 for building control mySmartCTI KNX Smart Guide. This guide aims to detail all of the Why open protocol? 5 information a consultant may require KNX Overview of Applications 6 when researching a KNX solution for specification in a commercial building. KNX Available Interfaces 7 This guide includes information on KNX, applications The Integrated Approach 8 for KNX, KNX topologies and interfacing KNX to other Advantages of Integration with KNX 9 building controls. It also includes common KNX solutions including fully converged buildings, also known as ‘baby Systems Layout & Installation Details 10 BMS’, lighting, façade automation, smart metering, audio- visual and HVAC. A typical KNX Bus network 11 with mixed devices We hope you find this guide beneficial and we look Standard KNX Bus Cable Specifications 12 forward to working with you to deliver many KNX projects in the future. KNX in Australia 13 Peter Garrett Converged Buildings 14 Managing Director, mySmartCTI Integrated Switching and GUIs 15 Visualisation & head-end Software 15 Lighting Control 16 Façade Automation 16 Metering 17 HVAC 17 Audio Visual 18 enGauge 18 About mySmartCTI 19 3 KNX The Smart Guide The worldwide STANDARD for building control KNX is now the world’s only truly open protocol endorsed A standard piece of manufacturer independent software by worldwide standards.
    [Show full text]
  • Cracking Channel Hopping Sequences and Graph Routes in Industrial TSCH Networks
    1 Cracking Channel Hopping Sequences and Graph Routes in Industrial TSCH Networks ∗ XIA CHENG, JUNYANG SHI, and MO SHA , State University of New York at Binghamton, USA Industrial networks typically connect hundreds or thousands of sensors and actuators in industrial facilities, such as manufacturing plants, steel mills, and oil refineries. Although the typical industrial Internet of Things (IoT) applications operate at low data rates, they pose unique challenges because of their critical demands for reliable and real-time communication in harsh industrial environments. IEEE 802.15.4-based wireless sensor-actuator networks (WSANs) technology is appealing for use to construct industrial networks because it does not require wired infrastructure and can be manufactured inexpensively. Battery-powered wireless modules easily and inexpensively retrofit existing sensors and actuators in industrial facilities without running cables for communication and power. To address the stringent real-time and reliability requirements, WSANs made a set of unique design choices such as employing the Time-Synchronized Channel Hopping (TSCH) technology. These designs distinguish WSANs from traditional wireless sensor networks (WSNs) that require only best effort services. The function-based channel hopping used in TSCH simplifies the network operations at the cost of security. Our study shows that an attacker can reverse engineer the channel hopping sequences and graph routes by silently observing the transmission activities and put the network in danger of selective jamming attacks. The cracked knowledge on the channel hopping sequences and graph routes is an important prerequisite for launching selective jamming attacks to TSCH networks. To our knowledge, this paper represents the first systematic study that investigates the security vulnerability of TSCH channel hopping and graph routing under realistic settings.
    [Show full text]
  • Wireless & Self-Powered Internet of Things
    Wireless & self-powered Internet of Things The Dolphin products are based on miniaturized energy converters, ultra-low power electronics and robust radio technology in open standards like EnOcean, zigbee and Bluetooth Low Energy for OEM product manufacturers. Building automation Smart home LED lighting M2M Our technology The Dolphin modules and white label products use the energy harvesting principle, in which energy is obtained from the surroundings, to supply self-powered wireless sensor networks. The modules are based on miniaturized energy converters that convert motion, light or temperature differences into electrical energy. Together with an efficient energy management system, the energy harvesting technology facilitates communication between maintenance-free IoT devices based on open wireless standards, such as EnOcean, zigbee and Bluetooth Low Energy. The solutions are used in building automation, smart homes, LED lighting control systems as well as industrial applications. Energy harvesting Wireless Ultra-low power The Dolphin portfolio for OEM product manufacturers The Dolphin portfolio includes the product lines “868 MHz EnOcean” for Europe, “902 MHz EnOcean” for North America and “928 MHz EnOcean” in Japan based on the EnOcean wireless standard introduced by the EnOcean Alliance (ISO/IEC 14543-3-1X) on the sub 1 GHz band, which has proven to be a resounding success in building automation and smart homes. The Dolphin porftolio also includes the “2.4 GHz zigbee” product line in the 2.4 GHz band, which can be used in smart home applications all over the world, and the “2.4 GHz BLE” portfolio for Bluetooth systems for modern lighting control. Energy converter Energy harvesting Energy harvesting Controlers Tools wireless switches wireless sensors Products in 868 MHz EnOcean for Europe Products with 868 MHz are suitable for Europe and other countries adopting RED.
    [Show full text]
  • OPC UA Server App OPC UA Server for Ctrlx CORE
    Application Manual OPC UA Server App OPC UA Server for ctrlX CORE R911403778, Edition 03 Copyright © Bosch Rexroth AG 2021 All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights. Liability The specified data is intended for product description purposes only and shall not be deemed to be a guaranteed characteristic unless expressly stipulated in the contract. All rights are reserved with respect to the content of this documentation and the availability of the product. DOK-XCORE*-OPCUA*SERV*-AP03-EN-P DC-IA/EPI5 (TaDo/MePe) f5f200cddfc773880a347e883d356b4f, 3, en_US OPC UA Server App 3 / 31 Table of contents 1 About this documentation 4 2 Important directions on use 5 2.1 Intended use. 5 2.1.1 Introduction. 5 2.1.2 Areas of use and application . 5 2.2 Unintended use. 6 3 Safety instructions 7 4 Introduction into the OPC Unified Architecture 9 4.1 General information. 9 4.2 Overview on specifications . 9 4.3 Information model . 10 4.4 Service-oriented architecture . 10 5 Rexroth ctrlX OPC UA Server 17 5.1 The ctrlX OPC UA Server in the ctrlX AUTOMATION . 17 5.2 Installation on ctrlX CORE. 17 5.3 Properties. 19 5.4 Configuration . 19 5.4.1 Certificate configuration . 20 6 Related documentation 23 6.1 Overview. 23 6.2 ctrlX AUTOMATION. 23 6.3 ctrlX WORKS. 23 6.4 ctrlX CORE. 24 6.5 ctrlX CORE Apps. 24 7 Service and support 27 8 Index 29 R911403778, Edition 03 Bosch Rexroth AG 4 / 31 OPC UA Server App 1 About this documentation Editions of this documentation Edition Release Notes date 01 2020-06 First edition 02 2021-01 Revision ctrlX CORE version UAS-V-0106 03 2021-04 Revision ctrlX CORE version UAS-V-0108 Bosch Rexroth AG R911403778, Edition 03 OPC UA Server App 5 / 31 Intended use 2 Important directions on use 2.1 Intended use 2.1.1 Introduction Rexroth products are developed and manufactured to the state-of-the-art.
    [Show full text]
  • Industrial Iot Monitoring: Technologies and Architecture Proposal
    sensors Article Industrial IoT Monitoring: Technologies and Architecture Proposal Duarte Raposo 1,* , André Rodrigues 1,2 , Soraya Sinche 1,3 , Jorge Sá Silva 1 and Fernando Boavida 1 1 Centre of Informatics and Systems of the University of Coimbra, Coimbra 3030-290, Portugal; [email protected] (A.R.); [email protected] (S.S.); [email protected] (J.S.S.); [email protected] (F.B.) 2 Polytechnic Institute of Coimbra, ISCAC, Coimbra 3040-316, Portugal 3 DETRI, Escuela Politécnica Nacional, Quito 170517, Ecuador * Correspondence: [email protected]; Tel.: +351-239-790-000 Received: 12 September 2018; Accepted: 16 October 2018; Published: 21 October 2018 Abstract: Dependability and standardization are essential to the adoption of Wireless Sensor Networks (WSN) in industrial applications. Standards such as ZigBee, WirelessHART, ISA100.11a and WIA-PA are, nowadays, at the basis of the main process-automation technologies. However, despite the success of these standards, management of WSNs is still an open topic, which clearly is an obstacle to dependability. Existing diagnostic tools are mostly application- or problem-specific, and do not support standard-based multi-network monitoring. This paper proposes a WSN monitoring architecture for process-automation technologies that addresses the mentioned limitations. Specifically, the architecture has low impact on sensor node resources, uses network metrics already available in industrial standards, and takes advantage of widely used management standards to share the monitoring information. The proposed architecture was validated through prototyping, and the obtained performance results are presented and discussed in the final part of the paper. In addition to proposing a monitoring architecture, the paper provides an in-depth insight into metrics, techniques, management protocols, and standards applicable to industrial WSNs.
    [Show full text]
  • Comtrol IO-Link to OPC UA
    FOR IMMEDIATE RELEASE CONTACT: Jordan DeGidio Marketing Specialist +1 763.957.6000 [email protected] Comtrol Implements OPC-UA connectivity with MultiLink™ on IO-Link Master family MINNEAPOLIS, Minnesota – April 21, 2017 — Comtrol Corporation, a manufacturer of industrial device connectivity products and the official North American IO-Link Competency Center, today announced the availability of OPC-UA support with its MultiLink™ technology on its IO-Link Master family of products. OPC Unified Architecture (OPC-UA) is a machine to machine communication protocol developed for industrial automation. OPC-UA allows customers to communicate with industrial equipment and systems for data connection and control, freely use an open standard, cross-platform, implement service-oriented architecture (SOA) software and utilize robust security. Comtrol’s MultiLink™ technology allows IO-Link Masters to simultaneously provide sensors Process data to PLC platforms, while also sending the sensors ISDU Service and Process data via Modbus TCP or OPC-UA upstream to IIoT/Industry 4.0 Cloud solutions or factory SCADA systems. Comtrol’s IO-Link Masters are available in three industrial Ethernet protocols: EtherNet/IP, Modbus TCP and PROFINET IO, which are all capable of running OPC UA with MultiLink™. “The OPC Foundation is very excited about the great work that Comtrol Corporation has been doing with the OPC UA technology. Their company specializes in quality networking and industrial data communication products, with the addition OPC UA to their portfolio of IO-Link Masters, factory automation users will have a seamless connection from IO-Link sensors and actuators to SCADA/HMI and cloud systems. This will add significant capability allowing seamless interoperability across the multitude of industrial networks and industrial devices says Thomas J Burke, OPC Foundation President & Executive Director.
    [Show full text]
  • Zach-2010-Monitoring for Simulation Validation-182.Pdf
    MONITORING FOR SIMULATION VALIDATION Robert Zach and Ardeshir Mahdavi Department of Building Physics and Building Ecology, Vienna University of Technology, Austria building data streams are not exploited. Such benefits ABSTRACT include: One of the key problems in building simulation is to i) Energy optimization through improved determine the accuracy of a simulation model. Due to management of technical building systems. the complexity of a building, a comprehensive and exhaustive mathematical proof is usually not ii) Increased awareness of building users possible. Therefore, an appropriate way to validate a regarding their impact on buildings’ energy building model is to compare simulation results with use. measurements obtained from real buildings. Such iii) Early detection (and treatment) of comparisons not only allow for the validation of deficiencies and malfunctions in energy simulation models used in the context of building systems and devices, thus effectively design support, but also provide calibrated simulation supporting a preventive maintenance models to be applied in the context of real-time regime. simulation-assisted building systems control. iv) Successive building performance INTRODUCTION improvement and optimization via the analyses of dynamically updated building This paper deals with the monitoring infrastructure energy and performance data bases. necessary to validate building simulation models and implement simulation-based control strategies v) Long-term accumulation of empirical (Mahdavi et al. 2009, Orehounig et al. 2010). information on buildings' energy and Required sensors are discussed and technologies for environmental performance toward different domains are compared and assessed. improving the design, construction, and Possible network infrastructures to collect the operation of existing and new buildings. measured data are discussed.
    [Show full text]
  • Network & Wireless
    NETWORK & WIRELESS HUMIDITY & WIRELESS Kele Has Doubled the Offering of Network and Wireless Solutions, NETWORK and Continues to Add to Our Options to Meet Your Needs. Babel Buster | p. 719 L-VIS Series | p. 721 BASRT-B | p. 727 Series 110A | p. 733 ValuPoint VP4-23 | p. 744 EKI Series | p. 738 Series NETWORK & WIRELESS Products manufactured MODEL/SERIES PAGE in the United States Network Display and Control Panels Wireless EnOcean and ZigBee Devices L-VIS Series — BACnet and LON Touch Panel . 721 and Systems (cont.) Products that are BBC-SD — BACnet Graphic Display . 724 E3T-SxE Series — EnOcean Wireless European new to the catalog WebOP Series — Touchscreen Operator Display Light Switches . 826 Panel . 725 E3T-S2H Series — EnOcean Wireless Handheld Remote . 827 Network Gateways EasySens Thanos — EnOcean Room Operating ETH-1000 — Provides connectivity between Ethernet Panel . .. 830 and RS-485 based networks . 713 EasySens Receiver Gateways — EnOcean Receiver XLTR-1000 — Provides Connectivity Between Two Gateways . 831 Rs-485 Based Networks . 714 EasySens SRC Receiver Controllers — EnOcean Raptor Protocol Converter — RLE Technologies Receiver Controllers . 832 Protocol Coverter . 715 EasySens Repeater — EnOcean Wireless LGATE-9xx Series — Lonworks/Bacnet And Repeater . 833 Universal Gateways . 717 EasySens Switches — EnOcean Lighting, Blinds Babel Buster Series — BACnet - Modbus - SNMP and Shutters Switches . 834 Gateways . 719 EasySens Specialty Wireless Transmitters — AddMe® Series — BACnet - Modbus Network I/O . 743 EnOcean Remote Control, Key Card Switch, Window/Door Contact . 835 Network I/O Modules EasySens Room Sensors — EnOcean Temperature, Humidity and CO2 Sensors . 836 L-IOB Series — BACnet and LON I/O Module . 739 EasySens Temperature Sensors — EnOcean i.CanDoIt Series — Embedded Network Servers 742 Surface, Duct, Remote and Outdoor AddMe® Series — BACnet - Modbus Network I/O .
    [Show full text]
  • Data Exchange in Distributed Mining Systems by OPC Unified Architec- Ture, WLAN and TTE VLF Technology
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Technische Universität Bergakademie Freiberg: Qucosa REAL TIME MINING - Conference on Innovation on Raw Material Extraction Amsterdam 2017 Data exchange in distributed mining systems by OPC Unified Architec- ture, WLAN and TTE VLF technology. David Horner1, Friedemann Grafe2, Tobias Krichler1, Helmut Mischo1, Thomas Wilsnack2) 1 TU Bergakademie Freiberg 2 IBeWa Consulting ABSTRACT Mining operations rely on effective extraction policies, which base on concerted manage- ment and technical arrangements. In addition to commodities, mining of data is the in- creasingly matter of subject in mining engineering. The Horizon 2020 project – Real-Time- Mining supports the ongoing paradigm shift of pushing mining activities from discontinuous to continuous operation. In this respect, the partners TU Bergakademie Freiberg (TU BAF) and IBeWa Consulting tackle the issue of physical and logical data acquisition in under- ground mining. The first aspect of the project addresses the ‘logical’ provision of data. Mining technology is increasingly interacting among each other and integrated into globally distributed sys- tems. At the same time, the integration of current mining devices and machineries into su- perordinated systems is still complex and costly. This means only a few number of mining operators is capable to integrate their operation technology into a Supervisory Control and Data Acquisition (SCADA) system. TU BAF presents the middleware OPC Unified Archi- tecture, which is a platform independent middleware for data exchange and technology interconnection among distributed systems. By installing a SCADA demonstrator at the research and education mine Reiche Zeche, TU BAF intends to present the technical fea- sibility of a SCADA system basing on OPC UA even for SME mining operations.
    [Show full text]
  • Maintenance and Decoding of Field Buses
    MAINTENANCE AND DECODING OF FIELD BUSES Today, most of the electrical appliances that we use include internal electronics. These circuits often need to communicate via data buses, either with ancillary systems, such Maintenance as remote sensors, or with control systems. This is particularly true in industry, where a single PLC remotely manages multiple sensors and actuators. Formerly, communication with these buses took place via an analogue signal using the “4-20 mA” network. This communication mode had many disadvantages, including Measurements the need for extensive equipment and complex wiring, thus increasing the time required for installation. For this reason, digital communication standards have been developed and are now widely used to avoid these problems. “Fieldbus” is a general term which corresponds to a method of communication between different systems. There are many standards: those specific to manufacturers Analysis and those standardized according to the equipment involved. Here are a few examples of fieldbuses used in different sectors of activity: Diagnostics The example of the automotive sector The new means of intra-system communication have allowed This provides numerous advantages: developments in the systems. The most obvious example is in the • less wiring automotive industry. In this sector, with the development of safety and • lower production costs due to savings on equipment analysis systems such as airbags, anti-lock braking systems (ABS) and • easier maintenance as there is only one communication channel electronic stability programs (ESP), the number of sensors and actuators on vehicles is constantly increasing. Each of these systems could be In addition, performance is improved because the linked directly to the vehicle’s computer via data buses, but this would data are available at all points on the require too much cable.
    [Show full text]