Chipkin Newsletter November 2017 – Page 3

Previous Page – 2

Wise up in 5 minutes

Sound smart to you boss and clients.

Devices that self power and can keep transmitting for decades. Self meshing.

 

EnOcean

EnOcean Free Energy

 

Benefits of EnOcean

 

Benefits of EnOcean

 

 

Enocean Example 

Exterior Temperature Sensor – Solar Harvesting

The sensors 02LINE 10020076 are designed to measure the outside ambient temperature and transmit it wirelessly to a matched receiver. As the sensor is supplied by a solar cell, it is maintenance-free. As soon as the change in temperature exceeds +/-1°C, a signal is sent immediately. Moreover the signal is retransmitted every 15 minutes. Note: Read the operating manual carefully before initial use.

 

Exterior Temperature Sensor Solar Harvesting

Exterior Temperature Sensor – Solar Harvesting

 

Single Channel CT Clamp – Powered From the Measured Conductor

The Pressac Sensing V3 1 Channel CT Clamp is designed to measure and report the AC current flowing in a single channel. Powered from the measured conductor, the measured current in the channel is reported every 30 seconds using the industry standard, wireless EnOcean® protocol. With a maximum measurable current of 60A the Pressac Sensing V3 1 Channel CT Clamp is easily installed with no disturbance to the measured conductor.

• Simply clip around any single core cable
• Requires no batteries or wiring
• Requires no interruption to the power supply
• Transmits electrical current value (Amperes) wirelessly using EnOcean® technology
 

Single Channel CT Clamp

Single Channel CT Clamp – Powered From the Measured Conductor

 

Relay – Powered

Relay – Powered

The Wireless Relay Receiver Module allows lights and fans to be controlled by AD HOC Battery-free Wireless Light Switches, remotes and sensors (each sold separately). It is an in-line relay that is wired between the light fixture and power source and helps simplify advanced wireless lighting control. Relay receivers learn” the addresses of transmitting switches or sensors. Once programmed (using a simple single-button programming procedure), the receivers respond to ON/OFF commands sent by transmitters stored in memory. This module can be linked with up to 30 wireless transmitters.

AD HOC EZR-R12-3HOTP ENOCEAN WIRELESS RF RELAY RECEIVER MODULE, 3-WIRE

 

Harvesting Energy From Temp Differences

A temperature difference of only 2 °C delivers enough energy for electronic devices, enabled by the combination of a DC/DC converter and a peltier element.

 

Two sides of the same coin
Seebeck effect = thermal gradient energy produces electrical
Peltier effect = electrical current across a conductor junction produces cooling / heating.

 
How it works
When DC voltage is applied to the module, the positive and negative charge carriers in the pellet array absorb heat energy from one substrate surface and release it to the substrate at the opposite side. The surface where heat energy is absorbed becomes cold; the opposite surface where heat energy is released, becomes hot. Reversing the polarity will result in reversed hot and cold sides.
 
Additional Applications not related to EnOcean – Peltier Modules for Compact, Precise, suitable for sealed units since they are not dependent on air, high reliability. Suitable for medical and other challenging environments.
 
Educational Resources
Understanding and Using Peltier Modules for Thermal Management
Peltier Application Note

 

Enocean Energy Efficiency

Jelly Bean

A single Jelly Bean of approx 4 calories has enough energy to send 42 Million EnOcean Telegrams. At once per 15 minutes that’s enough to last  roughly 1000 years.
 

EnOcean And Security

When applied is based on AES128.

Unlike with wired control systems – information and control commands now flow freely over the air and are subject to external monitoring and potentially even malicious external commands. Strong security mechanisms are therefore required to mitigate these threats in sensitive applications.

 

EnOcean Security Model

All EnOcean modules have a unique 32-bit identification number (ID), which cannot be changed or copied and therefore protects against duplication. This authentication method already offers field-proven secure and reliable communication in building automation. For applications requesting additional data security, a security mode protects battery-less wireless communication with enhanced security measures. These include a maxi- mum 24-bit rolling code (RC) incremented with each telegram, which is used to calculate a maximum 32-bit cypher-based message authentication code (CMAC). The CMAC uses the AES 128 encryption algorithm. Another mechanism is the encryption of data packets by the transmitter. The data is encrypted using the AES algorithm with a 128-bit key.

 

EnOCean security model
 
The EnOcean standard 868 MHz sensor modules integrate these state-of-the-art data encryption mechanisms to meet the requirements of specific applications such as monitoring or alert sensor systems. These enhanced security mechanisms can optionally be activated to prevent different types of attacks, including replay and eavesdropping attacks or forging of messages. Shipped in standard mode, the encrypted data transmission can be activated by simply pressing the learn button for ten seconds. If needed, the security mode can be deactivated by pressing and holding the learn button again. Also a receiver that decodes encrypted telegrams can still process standard telegrams enabling OEMs to effortlessly include enhanced data security in their existing EnOcean-based portfolio.

One fundamental problem with both content protection and content authentication is that using the same input data (plain text) with the same key always yields the same encrypted data and same signature. In order to prevent this type of attack, either the data or the key must continuously change to ensure that identical input data does not create The mechanism used by the transmitter to change data or key must be known to the r ceiver in order to correctly decrypt and authenticate received data telegrams. One common approach is to use the secret key together wit to generate a dynamic key.

Summary
1. Feature: content protection – implemented with: data encryption
2. Feature: content authentication – implemented with: CMAC – cipher based message authentication
3. Feature: dynamic content modification – implemented with: RLC – rolling code

 

 14byte
 

Some EnOcean Security Concerns

 
From the SEC Consult Vulnerability Lab
 
1 Optional 2 Resynch 3 Blocking 4 Pre-shared Key

 

Security Comparison – BACnet vs EnOcean

Security Comparison – BACnet Security Comparison – EnOcean

EnOcean vs Blue Tooth vs 802 Wifi

EnOcean vs Bluetooth vs 802 Wifi

 

Learn About Blockchains

Part 1

Checksums and Hash’s

The roots of the blockchains.

blockchains

If you liked this post;
  • Please consider subscribing to our RSS feed