Text or shortcode
Text or shortcode

Статьи о технологиях охраны, биографии, фото.

Blog

New technologies of intelligent objects: comfort plus safety.

0

New technologies of intelligent objects: comfort plus safety..

New technologies of intelligent objects: comfort plus safety.

UKOV Vyacheslav Sergeevich, Candidate of Technical Sciences
RYCHKOV Sergey Alekseevich

NEW TECHNOLOGIES OF INTELLIGENT OBJECTS: COMFORT PLUS SAFETY  

As the level of automation, integration and intelligence develops, the number of types of intelligent objects that have their own characteristics of building security and life support systems also grows, and the operational and technical characteristics of these objects are determined mainly by the technologies of artificial intelligence, communications and security, which are discussed in this article.

Trends in the development of intelligent objects

To effectively solve the problem of ensuring the security of objects, an appropriate modern level of technologies, technical means and security services is required, the main development trend of which is the rapidly developing process of total integration. At present, integration covers micro- and radio electronics, signals and channels, integrated technologies, multifunctional integrated devices, integrated networks and systems have appeared, and integrated security services have begun to be provided.

Today, along with the integration of functional, circuitry, network, integral security is actively making its first steps, characterizing such a state of human life, as well as the functioning of objects and technical means, in which they are reliably protected from all possible types of threats during the continuous process of life and solving the assigned tasks. In essence, integral security not only detects and blocks threats (evil), but also, mainly, prevents the possibility of their impact. It accumulates in itself all traditional types of security possible for solving this problem (security, fire, environmental, personal, information, etc.). The concept of integral security assumes mandatory continuity of the process of ensuring security both in time and in space throughout the technological cycle of activity with mandatory consideration of all possible types of threats (information leakage, unauthorized access, terrorism, fire, accidents, etc.). Therefore, for example, when ensuring the integrated security of an organization, a company, or any commercial structure, it is mandatory to simultaneously consider issues of both information security and the comprehensive protection of the facility and personnel, which, unfortunately, is rarely observed at present. Using an integrated approach, the process of integrating security, life support, and communication systems can be conventionally depicted as shown in Fig. 1.

Fig. 1. The process of integrating security and life support systems for facilities

As can be seen from the figure, the logical development of the integrated approach used in the creation of modern security systems is the creation of adaptive (or intelligent, as they are sometimes called) integrated systems for managing objects, the high efficiency of which is achieved by the highest possible level of integration of microelectronics, cybernetics, communications and the use of artificial intelligence methods.

Intelligent (adaptive) technologies

The global integration process has captured the market of services in the field of intellectualization of real estate objects. In addition to foreign ones, domestic integrators have also begun to offer their services. However, their number is clearly not enough, since in Russia there are still too few companies that can really integrate life support, communications and security systems into a single integrated complex. Therefore, despite the great interest in the problem of intellectualization of real estate objects, according to experts, the level of intellectualization achieved today is 40 – 60% lower than what is really possible.

As statistics show, a modern city dweller spends about 90% of his time in stationary and mobile objects. Perhaps this can explain the interest shown by society in the concept of an intelligent (smart, reasonable, etc.) building, which implements three basic principles – comfort, economy, safety.

In a broader sense, it would be correct to talk about the concept of an intelligent object (IO). IO can be understood as such components as an apartment, floor, office, residential and industrial building, etc. The typical structure of the integrated security and life support system of an intelligent object is shown in Fig. 2.


Fig. 2. Typical structure of the security and life support system of intelligent objects

As is known, the effectiveness of a security system directly depends on the level of its automation. Home automation is the result of the merger of various technologies and the implementation of new standards for communication systems, means of interaction and wiring in premises, and the infrastructure of wiring and communication means is also included in the concept of a home automated network.

Network technologies of communications of a “smart home”

Until recently, home networking technologies have developed quite spontaneously. However, today a reasonable set of standards is being formed, which is certainly facilitated by the emergence of a number of new network technologies, such as HomeRF, LonWorks, HomePNA, Bluetooth, USB, etc., which have begun to crowd out the previously considered promising CEBus technology. Table 1 presents the main characteristics and features of network technologies for the automation of an intelligent home.

Table 1. Features of network technologies for automation of an intelligent home

Analysis of the modern market of consumer electronics shows that currently leading companies have begun to produce household appliances with built-in means of interfacing with communication channels (in particular, with the Internet) and means of remote control. Remotely controlled air conditioners, refrigerators, washing machines, electric stoves, lighting, video cameras and other household appliances are already being produced.

When analyzing network technologies, first of all, it is necessary to focus on the standard of home automation equipment X10. This technology was developed over 10 years ago and is currently widely used abroad; it is supplied to Russia, for example, by the company Advance. The main feature of this technology is that when operating X10 equipment (interface, relay, sensor, lamp and other specialized modules), lines of a regular home electrical network of alternating current 220 V (50 or 60 Hz) can be used to transmit data and commands. Due to this, the implementation of the “smart home” concept does not require laying a huge number of wires. In addition, this technology interacts well with other communication technologies, in particular, with the Internet. Fig. 3 shows the structure of the system based on X10 standard equipment and a cell phone terminal.


Fig. 3. Structure of the control system and transmission of control commands in the X10 standard

The analysis showed that similar solutions for wireless communication-based control and monitoring systems are currently widely used and implemented by organizations and companies in various countries, including such areas as power and water supply networks, security systems, maintenance and repair, customer service, remote measurement, supply, etc. Service personnel have the ability to request the necessary parameters for objects and take readings from measuring devices using mobile phones. If necessary, personnel servicing emergency alarm devices immediately receive instructions directly to their phones, etc.

Analysis of the development of network technologies shows that up to now the main factor holding back their development has been their high cost. However, the high efficiency and optimal cost of the new Bluetooth technology allows us to hope for its rapid implementation in home automation systems, so let's consider it in more detail.

From a technical point of view, Bluetooth technology is based on a multipoint radio channel controlled by a multi-level protocol similar to the GSM cellular protocol. Devices operating in the Bluetooth protocol are combined into piconet, which can include from 2 to 8 devices. One of these devices is the master, and the rest are slaves. Based on the fact that Bluetooth uses piconet, where the interacting devices (network subscribers) are located in a limited space and do not move at high speed, the method of packet duplex transmission of information with time division of channels TDD (Time Division Duplex) was chosen when developing the protocol. This method of exchanging information over one communication line with multiplexing of transmission and reception channels in different time intervals of one frame is the most effective for this class of networks.

Bluetooth uses the Frequency Hopping Spread Spectrum (FHSS) method, i.e. a signal formation method based on the use of wideband signals with software hopping of the operating frequency according to a pseudo-random law. The entire band of used frequencies of 2400.0 – 2483.5 MHz is divided into 79 frequency subchannels 1 MHz wide, on each of which information is received or transmitted during a time frame of 625 μs. Switching of frequency subchannels is performed synchronously for all devices of one piconet. The switching order is determined by a pseudo-random sequence of length 227, determined by a unique 48-bit address of the master device of the piconet. The master device transmits packets in odd time frames, and the slave – in even ones. The length of a packet can reach a duration of 5 time frames. In the case where the packet length is greater than the duration of one time frame, the subchannel frequency does not change until the end of the packet transmission. The main technical parameters of the Bluetooth protocol are summarized in Table 2.

Table 2. Main technical parameters of the Bluetooth protocol

Characteristic

Parameter

Frequency range 2400.0 – 2483.5 MHz
Information transmission method Time-division duplex transmission TDD
Spread spectrum method Frequency hopping FHSS
Frequency subchannel bandwidth 1 MHz
Number of channels 23 or 79 (depending on the region of use)
Frequency tuning speed up to 1600 hops per second
Pseudo-random sequence cycle length 227
Time segment duration 625 μs
Modulation method two-level frequency modulation with a Gaussian filter (binary Gaussian Frequency Shift Keying)
Number of devices in a piconet up to 8
Information transfer rate:
    — in synchronous mode
    — in asynchronous mode
— 3 channels of 64 kbps in each direction;
— up to 723.2 kbps in the forward direction and 57.6 kbps in the reverse direction
Radius of operation of devices 10 m (in perspective 100 m)

A standard packet transmitted over a Bluetooth channel consists of a 72-bit access code, a 54-bit header, and an information block whose size can vary from 0 to 2745 bits. The access code is designed to synchronize devices operating in a single piconet, with simultaneous identification of data packets belonging to this network. The access code consists of a preamble (4 bits), a synchronization sequence (64 bits), and a checksum (4 bits). The header contains information for communication control. The information block is divided into fragments. Depending on the type of packet, each fragment is a data field or an information field of the voice channel, which have a different structure.

According to the specification, Bluetooth should provide radio communication within a radius of up to 10 m with the device power consumption within 100 mW. At the same time, in comparison with some other standards (for example, IrDA), Bluetooth does not require direct visibility between the transmitter and receiver of the signal. In the future, it is planned to provide the ability to organize communication at distances of up to 100 m. An important property of the Bluetooth protocol is the ability to easily integrate it with the TCP/IP protocols used on the Internet.

Bluetooth is a good tool for organizing local computer networks when placing devices equipped with Bluetooth modules at a short distance from each other. The throughput of the radio interface is quite sufficient to ensure high speed information exchange. The convenience of wireless connection of computers with peripheral devices will certainly attract the attention of many users. Sooner or later, Bluetooth technology should find application in various consumer electronics, televisions, VCRs, players, video cameras, etc. Supporters of Bluetooth paint various pictures of a bright future in which all household equipment in the house is united into a single network and controlled from a single center in the form of a personal computer or a simple organizer. Moreover, remote control of household appliances will become possible, for example, via cellular communication networks.

When they reach small dimensions, Bluetooth devices can find quite a lot of application in intelligent mobile objects. For example, it is easy to imagine automatic reading of the mileage and route of a car after the next trip when entering a garage. Bluetooth technology can find application in toll booths on toll roads. It is also quite possible to create a wireless local area network based on the Bluetooth system, which unites various devices of a vehicle. There is confidence that over time, Bluetooth technology will begin to be widely used in trade. For example, all vending machines of a certain shopping center, located in a small area, can be connected via Bluetooth to a control center. This center can transmit information about price changes to all machines and receive information about the volumes of goods sold or the technical condition of the machines.

A reliable Bluetooth radio channel, implemented on the basis of software frequency tuning, will certainly be used in security alarm and access control systems. Standard encryption and authentication measures provided in the Bluetooth protocol already allow achieving a certain level of communication security. And the structure of transmitted data packets does not prevent the implementation of proprietary original information protection algorithms to achieve any necessary level of confidentiality of transmitted messages.

Bluetooth wireless local communication technology has gained immense popularity in the last few years. More than 2,000 companies are developing devices using the Bluetooth protocol, and more than 500 million mobile phones, laptops, digital cameras, audio systems, and other devices supporting the Bluetooth protocol have been released to date. Today, we can confidently state that Bluetooth technology has received due recognition in the wireless communication device market. Considering all this, we can conclude that the technology in question is promising for use in both stationary and mobile intelligent objects.

A very promising technology, currently competing with Bluetooth, is UWB (Ultra Wideband).The idea of ​​the technology is to use an ultra-wideband signal to transmit information using pulse-code modulation. The duration of the emitted monopulse can vary within 0.2 – 2 ns, and the period of the pulse sequence is from 10 to 1000 ns. Transmission of ultra-short pulses without high-frequency filling allows us to consider UWB technology as an extreme case of “harmonic” systems in which the pulse duration is equal to one carrier period.

The main parameters characterizing UWB devices are the repetition frequency of short pulses, the average power per 1 MHz, and the peak power in any 50 MHz band. The relative bandwidth is also important, defined as the ratio of the required bandwidth to the central frequency (it is assumed that the typical value of this parameter should exceed 0.25).

For traditional means of communication, UWB signals are not only inaccessible for reception, but also for determining the fact of their existence. Since transmission in UWB systems is carried out at very low power levels, it is difficult to make the right decision based on one pulse. For this reason, long series of monocycles are used for reliable transmission of information in UWB, the high repetition rate of which allows using packets of 100 or more pulses to transmit each bit of information, which ensures their high protection against interference.

Modulation of such pulses with useful data can be carried out by any of the known methods based on changing their amplitude, duration, repetition rate, etc. However, in practice, the TM-UWD technology is most often used now, in which signals are formed using time-pulse modulation (Pulse-Position Modulation – PPM), i.e. the information parameter is the time position of the leading edge of the pulses. With PPM, depending on the instantaneous value of the modulating signal, the position of each working pulse changes in the time domain in relation to the position of the periodic reference pulses. The typical value of the time shift is 1/4 of the pulse duration. The pulse repetition period determines the data transfer rate. Thus, with a pulse repetition period of 10 ns, the maximum transfer rate will be 100 Mbit/s.

The formation of a number of independent communication channels can be carried out by the method of time jumps (Time Hopping), based on the introduction of one more additional time coding of the pulse position using a sequence of pseudo-random codes that provide a pulse shift by values ​​10 100 times greater than that provided by the modulation of the transmitted data. The same sequence of pseudo-random codes should be used to isolate the signal in the receiving part. If a different sequence is used, the receiver will open in other time intervals and the reception of information pulses will not occur. The use of known orthogonal codes for controlling time delays of pulses allows the creation of up to 1000 or more duplex communication channels in one band at one station.

In addition to time coding, other methods can be used to separate channels, such as additional subcarriers. In this case, the information signal is pre-modulated by one or another traditional modulation method (AM, FM, PM, FSK, PSK, PCM, etc.), and then the modulated subcarriers are used to perform time modulation of the working pulses.

Another interesting feature of UWB comes from radar. Namely, the potential to create networks that can determine the geometric location of participants. Phased antenna arrays can be used for this. This feature is useful for addressing. In addition, in this case it is possible to create a dynamic antenna pattern to best receive signals coming from a specific device. This approach will further increase the spatial efficiency of air use.

All the advantages of UWB technology over narrowband and wideband systems follow from the very physical essence of the formation, transmission and reception of ultra-wideband signals. The most significant advantages are listed in Table 3.

Table 3. Main advantages of UWB technology

№ Item Advantages of UWB technology Note
1 High data transfer rates Up to 500 Mbps and higher
2 High throughput Up to a thousand channels of simultaneous access to a digital duplex channel at a speed of 64 Kbps
3 High noise immunity The influence of narrowband interference is insignificant
4 Stable communication in conditions of multipath propagation of radio waves A very wide spectrum of signals is used
5 High degree of protection of communication from interception Conventional radio receivers perceive UWB signals as random interference Conventional radio receivers perceive UWB signals as random interference
6 High electromagnetic compatibility The noise-like structure and usually quite low signal levels of UWB systems create virtually no interference for other devices
7 High penetrating power Can be effectively used, for example, for subsurface radar and surveillance through walls, or communications in obstacle conditions
8 Possibility of measuring distances with very high accuracy Very short pulse duration makes it possible to determine distances with an error of up to units of centimeters
9 Ability to work with low radiated power Low energy consumption
10 Technical simplicity and relative cheapness of hardware implementation Research in this area is conducted by Fujitsu, Sony and a number of others in addition to Intel

The results of the comparison of various communication technologies are presented in Table 4.

Table 4. Comparative characteristics of network communication technologies

Name of technology (standard) Range, m Frequency, GHz Channel width, MHz Throughput, Mbit
UWB 10 3.1 – 10, 6 7500 Up to 500
802.11b 100 2.4 80 Up to 11
802.11a 50 5 200 Up to 54
Bluetooth 100 2.4 80 Up to 1

Areas of application of UWB technology. The technical and operational advantages of UWB technology allow us to confidently predict the widest possible applications for such equipment. Most current applications of UWB systems can be classified into one of two categories.

The first is short-range radio communication means for transmitting voice, data or control signals, the second is radar systems and systems for identifying and determining the location of an object. The first category, in particular, includes high-speed radio transmission lines over short distances (up to 1 km) for local and personal wireless networks. In an office, a UWB station can replace the wires connecting a computer to monitors, keyboard, mouse, speakers, printers, and a local network. UWB technology can also be used for high-speed synchronization between PDAs, laptops and mobile phones. Since UWB signals are relatively resistant to multipath attenuation, which occurs when a wave is reflected from walls, ceilings, buildings, vehicles and interferes with the direct signal. UWB technology is particularly interesting for the market of wireless mobile systems with high data transmission rates.

The next area of ​​application for short-range radio communication is security systems equipped with motion sensors, such as electronic fences and proximity warning devices. UWB can be used in medical applications, such as monitoring the work of the heart, respiratory organs, etc.

UWB sensors can be used to create vehicle security systems ranging from simple collision avoidance systems or remote lock control to much more complex intelligent applications for high-speed highways. The ability to measure distances with centimeter accuracy allows UWB systems to be widely used to determine the location of various objects.

The combination of such properties as high noise immunity, stealth, low power consumption and ease of implementation allows for the implementation of covert wireless communications and high-speed transmission of large amounts of information.

UWB devices can also be used in systems for recognizing tags, identification cards, license marks for any type of property and equipment, the movement of which for one reason or another must be tracked, as well as in location systems. In particular, location systems can be implemented that are capable of detecting shallow deposits of various minerals, determining the location of non-metallic pipes, plastic mines, archaeological treasures, cracks in bridges and road surfaces, finding people under rubble or avalanches, etc.

UWB technology can be used to create image transmission devices that ensure safety during construction and repair of buildings, elimination of the consequences of natural disasters, etc.

Prospects for the Development of UWB Technology. The first prototypes of commercial ultra-wideband equipment were demonstrated back in mid-2001. The next stage in the development of UWB technology came in February 2003, when the international Institute of Electrical and Electronics Engineers (IEEE) approved the wireless standard 802.16a, based on UWB and oriented towards use in the construction of city-scale wireless networks – Wireless Metropolitan Area Networks (WMAN).

Major manufacturers such as Intel, Cisco, Fujitsu, Motorola, Siemens, Sony, Texas Instruments, Time Domain, Xtreme Spectrum and others entered the market with equipment for UWB systems already in late 2003 – early 2004. Their appearance called into question the dominant position of the WLAN standard (802.11x). The main market sector for the implementation of ultra-wideband communications will be “Wireless home networks”.In the United States, testing is underway to explore the industrial use of UWB in the range above 10 GHz. Currently, the Ultra Wideband Working Group is developing a specification for an air interface for UWB with a transmission rate of 110 – 480 Mbps over distances of up to 10 m.

Thus, in terms of potential throughput and specific data density, UWB technology is unrivaled at distances of up to 10 m and can become an alternative to high-speed wired standards.

Security technologies

Currently, biometric, radio frequency identification (RFID, Proximity), DATA DOT, etc. security technologies are used for identification in intelligent objects and are very promising.

Due to the high operational and technical characteristics of biometric technologiesprotection have been receiving well-deserved attention from specialists for almost 20 years. These means have found application mainly in government agencies that require the highest levels of protection, in particular, in military organizations, computing and scientific centers, bank vaults, etc. However, the main restraining factor until recently was the high cost of biometric means of protection (for example, the cost of fingerprint systems is 2-5 thousand dollars), which limited their mass use.

And now, finally, what security experts have long been waiting for has happened: now, after the creation of a miniature microelectronic fingerprint scanner, the cost of biometric protection, for example, of computers, has been reduced to 50-100 US dollars, which foreshadows the widespread use of biometric security tools in the very near future. This topic is becoming especially relevant in the context of the upcoming introduction of such personal biometric identifiers as fingerprints and retina patterns into the international passport.

Today, the global biometric systems market is formed by more than 300 companies that are engaged in the development, production, sale and maintenance of security tools and systems. The structure of the global biometric security market is presented in Fig. 4.


Fig. 4. Structure of the global biometric security market

Analyzing the distribution of technical means by biometric features, one cannot help but note the high growth rates and development prospects for identification tools based on finger skin patterns, which currently occupy 34% of the biometric market, and in the near future by 2005 will reach 50%. According to experts, the overall biometric market should grow in five years from 58.4 million dollars in 1999 to 1.8 billion dollars in 2004. According to other estimates, its volume by 2003 was 1 billion dollars, and the forecast for 2005 exceeds 5 billion dollars.

Market analysis clearly shows that the main interest of buyers is in technologies and means of access control to buildings and computers, and the highest growth rates are expected in the field of scanning and verification technologies for fingerprints, voice and signatures. The average annual growth rate of biometrics is 40%, which is a high figure even for a growing economy. If this rate continues, in just 15 years the world's population will be provided with biometric identity cards, information about which will be stored in government databases united in a global international identification system.

When considering security technologies for intelligent objects, one cannot help but note such a new technology as DATA DOT. This technology uses thousands of data points that carry information similar to a barcode. A similar technique was first used in the personal protection device EIRE TEISER”, however, in DATA DOT technology, identification marks are applied by spraying and are successfully used, for example, in anti-theft systems.

The analysis shows that radio frequency identification (RFID) technology is very promising for use in intelligent objects. Systems using RFID technology, consist of electronic tags (microchips containing identification data and other information) and readers (devices that automatically read the data from the tags and decode it). The electronic tag, consisting of a silicon microchip and a flat antenna, draws energy from radio waves emitted by the reader. Once powered, the identification chip begins exchanging information with the reader. The energy received from the reader can also power built-in sensors that measure, for example, environmental parameters. One of the first applications of RFID technology for personal identification was proximity cards. The operating principle of a high-frequency RFID system is shown in more detail in Fig. 5.


Fig. 5. Diagram of interaction of elements in a high-frequency RFID system

Unlike barcodes, RFID sensors can be embedded in controlled objects (product casing, under the skin of animals and people, etc.) and allow the use of encryption and other means that make counterfeiting difficult. In addition, some labels are equipped with memory, into which readers can write new data, such as time, date, their unique number, etc.

Today, objects such as enterprises, houses, offices, stores, cottages, cars, etc. can act as intelligent objects using RFID technology. An RFID network, for example, in an office building can solve many problems. Receiving information from readers polling sensors in different rooms, the central computer will maintain the required temperature and humidity throughout the building, on a single floor, or in a certain group of rooms. Other readers will scan personnel tokens and recognize labels on laptops to provide employees with secure access to the internal computer network and connect them with colleagues in other parts of the building.

 Practical implementation of the concept of a smart home

We will consider aspects of the practical implementation of the concept of a smart home using the example of the German VIMP program (Distributed Intelligent Information Systems for the Private Sphere of Life). The goal of the program was to develop new electronic equipment and software that reduce the costs of planning, installing and commissioning smart home equipment, as well as improving the sensitivity and expanding the functionality of existing systems. During the project, devices were created to register the presence and location of a person in the house, ensure their safety, and improve the overall comfort of the home. New types of alarm subsystem sensors were created, identification algorithms were developed, and the human-machine interface was improved.

The functionality has been expanded by using multi-chip modules (MCM), which, in addition to processing circuits, also contain several types of sensors, as well as means of interfacing with the European standard EIB bus. For fast and correct classification of sensor signals, the VIMP program provides for the use of specialized fuzzy logic circuits. When the panic button is pressed, the alarm signal generator device (for example, in the form of a wristwatch) transmits a signal to the central control panel of the emergency services. A possible diagram of the life support and security system of a smart home is shown in Fig. 6.

Fig. 6. Typical diagram of the life support and security system of a smart home:

Unfortunately, at present no one has yet managed to implement the concept of a “smart” home 100%, including Bill Gates with his high-tech home worth $60 million, so today we have to state only the practical implementation of a “semi-smart” home (40 – 60%), in the good sense of the word. However, “there is hope that it will finally be complete” (see forecast in Fig. 1). The concept of a “smart” home assumes, first of all, the creation of comfortable conditions for human life (both at home and at work), which distinguishes it from the concept of cybernetic production (fully automated factories, whose robots can function in conditions harmful to humans).

Thus, summing up, we can state that in a condensed form the main concept of an intelligent object (IO) can be conditionally expressed by the formula:

where the main keywords that form the concept of an intelligent object today are Informatization, Integration and Intelligence. New information technologies, such as wireless computer access, biometric and radio frequency identification, etc., ensure the creation of intelligent objects with a high level of security (B) and comfort (K) with optimal operating costs (OC). The main restraining factor in the implementation of intelligent objects is currently only high capital costs during construction, the reduction of which is predicted in the coming years.

You might be interested in …

Добавить комментарий

Ваш адрес email не будет опубликован. Обязательные поля помечены *

15 + два =

Мы используем cookie-файлы для наилучшего представления нашего сайта. Продолжая использовать этот сайт, вы соглашаетесь с использованием cookie-файлов.
Принять