WO2017038693A1 - Réseau maillé sans fil et procédé permettant de commander des dispositifs par le biais d'un réseau maillé sans fil - Google Patents

Réseau maillé sans fil et procédé permettant de commander des dispositifs par le biais d'un réseau maillé sans fil Download PDF

Info

Publication number
WO2017038693A1
WO2017038693A1 PCT/JP2016/075016 JP2016075016W WO2017038693A1 WO 2017038693 A1 WO2017038693 A1 WO 2017038693A1 JP 2016075016 W JP2016075016 W JP 2016075016W WO 2017038693 A1 WO2017038693 A1 WO 2017038693A1
Authority
WO
WIPO (PCT)
Prior art keywords
wireless
packet
command
mesh network
control range
Prior art date
Application number
PCT/JP2016/075016
Other languages
English (en)
Japanese (ja)
Inventor
健 茨木
伸充 天知
Original Assignee
株式会社村田製作所
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 株式会社村田製作所 filed Critical 株式会社村田製作所
Publication of WO2017038693A1 publication Critical patent/WO2017038693A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • H04W4/04
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/20Communication route or path selection, e.g. power-based or shortest path routing based on geographic position or location
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Definitions

  • the present invention relates to a wireless mesh network and a device control method via the wireless mesh network, and more particularly to a technique for safely and efficiently controlling a plurality of devices connected by a wireless mesh network.
  • Patent Documents 1 and 2 Conventionally, techniques for connecting and controlling various devices via a wireless mesh network are known (for example, Patent Documents 1 and 2).
  • Patent Document 1 discloses a wireless mesh network in which a process control message is communicated between a host and a field device in each node of the wireless mesh network. In a wireless mesh network, it is necessary to appropriately process a delay message that does not arrive in the transmission order. In Patent Document 1, in order to reject a message that deviates from the order, a sequence number that is incremented by 1 is added to each message.
  • Patent Document 2 discloses a technique for forming a group with devices approved by a user and realizing secure communication between devices belonging to the group. Specifically, in Patent Document 2, any device belonging to the group holds encrypted communication information for performing encrypted communication within the group, and each device is associated with each encryption as the device joins and leaves the group. Update communication information.
  • the wireless mesh network has an advantage that the installation cost and the operating power can be reduced and the configuration flexibility is high as compared with, for example, a point-to-point wireless communication system and a wired communication system. Therefore, according to lighting equipment and air-conditioning equipment that are connected by a wireless mesh network and controlled under highly subdivided control conditions and control ranges, low value and high added value are easily realized.
  • an object of the present invention is to provide a wireless mesh network capable of safely and efficiently controlling a part of a plurality of connected devices and a device control method via the wireless mesh network.
  • a wireless mesh network includes a plurality of devices including a first device and a second device, and the first device is unique to the first device.
  • the command is executed when the second device is located within the control range and the security key included in the wireless packet is valid based on the control range information.
  • the device-specific security key can be used for secure communication within the control range to which the device belongs. For example, when a plurality of control ranges are set, traffic for sharing and managing keys can be confined in individual control ranges, and improvement in network utilization efficiency can be expected due to traffic reduction in the entire network. Further, by using the control range information that determines the control range by the command, it can be determined whether or not the devices are located within the control range. Therefore, it is possible to perform secure communication between devices within the control range without performing complicated group management. Furthermore, since a unique security key is used for each of the plurality of devices, the security of all the devices is not broken by a single security breakthrough against an attack from the outside. As a result, a wireless mesh network capable of safely and efficiently controlling a part of the plurality of connected devices is realized.
  • control range information defines a range in which a wireless packet is actually reached by a maximum number of wireless repeats, and the second device receives the command when the wireless packet is received and the security key is valid. May be executed.
  • control the second device it is possible to control the second device to execute the command based on a simple standard that the control range is determined by the maximum number of wireless repeats and the wireless packet simply reaches the second device.
  • the control range information defines a range relating to a difference between a first coordinate indicating an installation position of the first device and a second coordinate indicating an installation position of the second device.
  • the coordinate is held, the first coordinate is included in the wireless packet and transmitted, and the second device holds the second coordinate and is included in the wireless packet when the wireless packet is received.
  • the command may be executed when the difference between the first coordinate and the second coordinate is within the range determined by the control range information and the security key is valid.
  • the control range information defines a range related to a second coordinate indicating an installation position of the second device, and the second device holds the second coordinate, and when the wireless packet is received, The command may be executed when the second coordinates are within the range defined by the control range information included in the wireless packet and the security key is valid.
  • control for causing the second device to execute the command based on the absolute arrangement of the second device can be performed in detail even by proximity control.
  • the first device transmits the wireless packet including the number of wireless repeats to which the wireless packet is to be transferred, and the second device transmits the wireless packet when receiving the wireless packet. You may prohibit according to the said number of radio
  • the first device may encrypt the security key with the device identifier of the first device, and transmit the encrypted security key included in the wireless packet.
  • the first device may encrypt the initial value of the security key with the device identifier of the first device, and transmit the encrypted initial value of the security key in the wireless packet.
  • a device control method is a device control method via a wireless mesh network, in which a first device connected to the wireless mesh network is the first device.
  • the device-specific security key can be used for secure communication within the control range to which the device belongs. For example, when a plurality of control ranges are set, traffic for sharing and managing keys can be confined in individual control ranges, and improvement in network utilization efficiency can be expected due to traffic reduction in the entire network. Further, by using the device identifier associated with the installation position of the device, it can be determined whether the devices are located within the control range based on the comparison of the device identifiers. Therefore, it is possible to perform secure communication between devices within the control range without performing complicated group management. As a result, a device control method capable of safely and efficiently controlling a part of the plurality of connected devices is realized.
  • a unique security key is used for each of a plurality of devices. Security is not broken. As a result, a wireless mesh network that can safely and efficiently control a part of a plurality of connected devices and a device control method via the wireless mesh network are obtained.
  • FIG. 1 is a plan view showing an example of a floor layout of an office.
  • FIG. 2 is a plan view showing an example of the arrangement of ceiling lighting fixtures in the office.
  • FIG. 3 is a diagram illustrating an example of a device identifier of a ceiling luminaire.
  • FIG. 4 is a sketch showing an example of the installation situation of the ceiling lighting fixture.
  • FIG. 5 is a block diagram illustrating an example of a functional configuration of the lighting controller.
  • FIG. 6 is a block diagram illustrating an example of a functional configuration of the ceiling lighting fixture.
  • FIG. 7 is a diagram illustrating an example of a packet format used in the wireless mesh network according to the first embodiment.
  • FIG. 8A is a diagram for explaining the relationship between the interval between the installation positions of the devices and the number of wireless repeats.
  • FIG. 8A is a diagram for explaining the relationship between the interval between the installation positions of the devices and the number of wireless repeats.
  • FIG. 8B is a diagram for explaining the relationship between the interval between the installation positions of the devices and the number of wireless repeats.
  • FIG. 9 is a plan view illustrating an example of a control range according to the first embodiment.
  • FIG. 10 is a diagram illustrating an example of the proximity control information according to the first embodiment.
  • FIG. 11 is a flowchart illustrating an example of the proximity control operation according to the first embodiment.
  • FIG. 12 is a plan view illustrating an example of a control range according to the first embodiment.
  • FIG. 13 is a diagram illustrating an example of a command packet according to the first embodiment.
  • FIG. 14 is a plan view illustrating an example of a control range according to the first embodiment.
  • FIG. 15 is a diagram illustrating an example of a command packet according to the first embodiment.
  • FIG. 16 is a plan view illustrating an example of a control range according to the first embodiment.
  • FIG. 17 is a diagram illustrating an example of a command packet according to the first embodiment.
  • FIG. 18 is a plan view illustrating an example of a control range according to the first embodiment.
  • FIG. 19 is a diagram illustrating an example of a command packet according to the first embodiment.
  • FIG. 20 is a plan view showing an example of a control range according to the first embodiment.
  • FIG. 21 is a diagram illustrating an example of a command packet according to the first embodiment.
  • FIG. 22A is a diagram illustrating a configuration example of security in a wireless mesh network as a comparative example.
  • FIG. 22B is a diagram showing a configuration example of security in the wireless mesh network according to Embodiment 1.
  • FIG. 22A is a diagram illustrating a configuration example of security in a wireless mesh network as a comparative example.
  • FIG. 22B is a diagram showing a configuration example of security in the
  • FIG. 23 is a plan view showing another example of the floor layout of the office.
  • FIG. 24 is a diagram illustrating an example of the device identifier of the desk light.
  • FIG. 25 is a diagram illustrating an example of a device identifier of a ceiling luminaire.
  • FIG. 26 is a diagram illustrating an example of a device identifier of the illuminance sensor.
  • FIG. 27 is a block diagram illustrating an example of a functional configuration of a desk light.
  • FIG. 28 is a block diagram illustrating an example of a functional configuration of the illuminance sensor.
  • FIG. 29 is a flowchart illustrating an example of the proximity control operation according to the second embodiment.
  • FIG. 30 is a diagram illustrating an example of a report packet according to the second embodiment.
  • FIG. 31 is a diagram illustrating an example of a command packet according to the second embodiment.
  • FIG. 32 is a diagram illustrating an example of a report packet according to the second embodiment.
  • FIG. 33 is a diagram illustrating an example of a command packet according to the second embodiment.
  • the wireless mesh network according to Embodiment 1 is a wireless mesh network in which a plurality of devices participate, and performs autonomous control between adjacent devices via the wireless mesh network.
  • a wireless mesh network for controlling ceiling lighting in an office will be described.
  • FIG. 1 is a plan view showing an example of a floor layout of an office 100 where a wireless mesh network is installed.
  • FIG. 1 shows an arrangement of the door 101, the window 102, the desk 103, and the chair 104 in the office room 100.
  • FIG. 2 is a plan view showing an example of the arrangement of the ceiling lighting fixture 400 in the office room 100.
  • a plurality of ceiling lighting fixtures 400 are arranged in a matrix in the office room 100.
  • Each ceiling lighting fixture 400 is a node that participates in the wireless mesh network, and is identified by a device identifier associated with the installation location of the device.
  • FIG. 3 is a diagram illustrating an example of a device identifier of the ceiling lighting fixture 400.
  • the device identifier of each ceiling luminaire is represented by the xy coordinate value of the installation position, assuming that the left to right of the array is the x axis and the top to the bottom is the y axis.
  • the x-axis and y-axis can be taken arbitrarily, and for example, the x-axis and y-axis may be taken in the east-west direction and the north-south direction, respectively.
  • FIG. 4 is a sketch showing an example of the installation situation of the ceiling lighting fixture 400.
  • FIG. 4 shows a state in which the vicinity of the upper left corner (for example, the southeast corner) of FIGS. 2 and 3 is looked up from the floor.
  • the lighting controller 200 performs configuration control of the wireless mesh network (including assignment of device identifiers to the ceiling lighting fixture 400) and simultaneous control over the entire lighting floor.
  • the lighting controller 200 is assigned a device identifier 01 in the wireless mesh network.
  • FIG. 5 is a block diagram illustrating an example of a functional configuration of the lighting controller 200.
  • the lighting controller 200 includes a controller 210, a wireless circuit 220, and an antenna 230.
  • the controller 210 may be a personal computer in which predetermined control software is installed and operated, and the wireless circuit 220 may be a wireless adapter connected to the controller 210 through an interface such as USB (Universal Serial Bus). .
  • USB Universal Serial Bus
  • FIG. 6 is a block diagram illustrating an example of a functional configuration of the ceiling lighting fixture 400.
  • the ceiling lighting fixture 400 includes an LED (Light Emitting Diode) 410, an LED driving power source 420, a human sensor 430, a wireless circuit 440, an antenna 450, and a microcomputer 460 that controls the appliance.
  • the microcomputer includes a CPU (Central Processing Unit), a memory, an A / D (Analog / Digital) converter, and a D / A (Digital / Analog) converter (not shown).
  • the power supply of the lighting fixture is obtained from the electric wire (not shown).
  • FIG. 7 is a diagram showing an example of a packet format used in the wireless mesh network according to the first embodiment.
  • P preamble
  • source ID control range
  • wireless reachable range destination ID
  • key data fields
  • the order of the fields after the preamble P is not limited to this example, and may be any order that allows each device to recognize each other.
  • a parity bit, a CRC (Cyclic Redundancy Check) value, a hash value, or the like may be added in order to detect an information transmission error or falsification, and other than the preamble P may be encrypted.
  • CRC Cyclic Redundancy Check
  • P is a preamble and is a predetermined bit string indicating the start of communication.
  • the transmission source ID is information indicating the device identifier of the device that is the starting point of the packet.
  • the device identifier of the ceiling lighting fixture 400 is xy coordinates indicating the installation position of the device shown in FIG. 3 as an example, and the device identifier of the lighting controller 200 is 01.
  • the control range is information indicating the range of devices that should execute the command included in the packet.
  • the value 0 of the control range indicates that all ceiling lighting fixtures 400 that have received the packet are control targets, and the value 1 indicates that the ceiling lighting fixture 400 indicated by the destination ID is a control target.
  • the destination ID is represented in the form of an xy coordinate indicating the installation position of the device, for example, similarly to the transmission source ID. It is assumed that the control range values 0 and 1 are used to control all or a specific one of the ceiling lighting fixtures 400 under centralized control by the lighting controller 200, for example.
  • the destination ID is an example of control range information that defines a range related to coordinates indicating the installation position of the device to be controlled (second device).
  • the value 2 of the control range indicates that a device located at an adjacent coordinate is a control target with respect to the position information (x, y) of the transmission source.
  • a value of 3 indicates that the devices that are different one by one in the upper, lower, left, and right coordinates (that is, eight devices surrounding the transmission source) are the control targets.
  • a value of 4 indicates that a device located at an oblique and adjacent coordinate with respect to the position coordinate (x, y) of the transmission source is a control target. With respect to the position information (x, y) of the transmission source, the device located at the adjacent coordinates does not execute the command of the packet whose control range value is 4, and only performs the transfer.
  • a value of 5 indicates that the device located at the coordinates adjacent to the transmission source position coordinates (x, y) is the control target.
  • the specific coordinates of the device to be controlled with respect to the source position information (x, y) are as shown in FIG.
  • the control range values 6 to 15 indicate that a device located in a range of an arbitrary shape is controlled by specific position coordinates with respect to the position information (x, y) of the transmission source.
  • the range indicated by each of the control range values 6 to 15 may be notified from the lighting controller 200 to each ceiling lighting fixture 400 and shared by the ceiling lighting fixture 400.
  • Each of the control range values 2 to 15 includes coordinates (transmission source ID) indicating the installation position of the transmission source device (first device) and coordinates indicating the installation position of the control target device (second device) ( It is an example of the control range information which defines the range regarding the difference with destination ID).
  • the wireless reachable range is information indicating the reachable range of the packet and represents the maximum number of wireless repeats in the wireless mesh network. For example, it corresponds to a Radius parameter of ZigBee (registered trademark), and is represented by 8 bits here.
  • the value 00h indicates that the maximum number of wireless repeats (that is, the reachable range of packets) is not limited, and the values 01h to FFh (1 to 255) indicate that transmission up to the number of wireless repeats is allowed.
  • Each device counts down (decrements) the value of the wireless reach when transferring a packet, and discards the packet without transferring it when the countdown result is 0.
  • the wireless reachable range is effectively used to control the traffic within the wireless mesh network. For example, it is assumed that the number of repeats required for a wireless packet to reach a device to be controlled specified by the control range values 2 to 15 is two. At this time, by setting the maximum wireless repeat number 02h as an initial value in the wireless reach range of a packet whose control range value is 2 to 15, a command packet by useless radio to a device that cannot be controlled Can be prevented from occurring. On the other hand, a packet whose control range value is 0 or 1 can be distributed to all devices by setting a larger value in the wireless reachable range.
  • the number of wireless repeats required to reach a destination device depends on the interval between the device installation positions.
  • FIG. 8A and 8B are diagrams for explaining the relationship between the interval between the installation positions of the devices and the number of wireless repeats.
  • the broken-line circles schematically represent the reach ranges of the wireless packets transmitted by the devices A and B.
  • the maximum radio repeat number set as the initial value of the radio reach range may be used as control range information, and the range in which the radio packet actually reaches may be determined as the control range by the maximum radio repeat number. In this case, it is not necessary to consider the value of the control range described above, and it is possible to control the second device, which is a control target, to execute a command based on a simple criterion that the wireless packet arrives simply.
  • the destination ID is information indicating the device identifier of the device that should execute the command included in the packet.
  • the destination ID is represented in the same xy coordinate format as the transmission source ID, for example.
  • the destination ID is meaningful only in a packet whose control range value is 1.
  • the key is a security key.
  • the key may be expressed by 8 bits as an example.
  • the initial value of the key is a value calculated by a predetermined function from the transmission source ID.
  • Each device that becomes a transmission source sets, for each packet, a value generated by a predetermined function from a key set in the immediately preceding packet as a new key in the packet. That is, the key is a one-time security key (a security key used only once) unique to the device.
  • the function for calculating the initial value of the key and the function for generating a new key from the immediately preceding key are shared in advance by each device.
  • the specific content of the function is not particularly limited.
  • the function may be a function that generates a pseudo-random value, or may be a function that simply increments (increments) the immediately preceding key. .
  • the data is information that represents the device initialization command, sensor reading, illumination control command, and the like. Information such as the size of the data may be added to the head of the data.
  • a packet including report information such as a sensor reading value as data may be referred to as a report packet
  • a packet including command information such as an illumination control command as data may be referred to as a command packet.
  • the key and data may be encrypted together. As a result, it is possible to make it difficult for a malicious third party to decrypt and tamper with data using a key that is simply incremented.
  • the ceiling lighting device in which the human sensor is operated is lit brightly, and another ceiling lighting device within the first control range from the ceiling lighting device is slightly changed.
  • a lighting control that turns on a darker lamp and lights up another ceiling lighting fixture in the second control range more darkly.
  • the ceiling lighting fixture 400 in which the human sensor 430 is activated lights up brightly and transmits a packet reporting that the human sensor 430 has been activated to the lighting controller 200.
  • the lighting controller 200 transmits a packet instructing to turn on a little dark from the ceiling lighting fixture 400 that has received the report to another ceiling lighting fixture 400 in the first control range.
  • a packet instructing to light up more darkly is transmitted from the ceiling lighting fixture 400 that has received the report to another ceiling lighting fixture 400 in the second control range. Thereby, the target illumination control is performed.
  • the amount of communication increases as the number of objects to be controlled increases.
  • a wireless mesh network is employed for connection between devices, there is a problem that an increase in the number of mesh nodes causes a significant decrease in transmission speed.
  • a decrease in transmission speed with an increase in the number of wireless repeats an increase in the amount of packets for notifying all nodes that the security key has been updated, and an increase in the probability of packet collision by sharing a wireless channel
  • Increase in the number of retransmissions and increase in the listen before talk waiting time to avoid packet collision Increase in the number of retransmissions and increase in the listen before talk waiting time to avoid packet collision.
  • the security key for the entire network is assigned to each transmission source device, it is necessary to keep the transmission frequency below a certain level in order to avoid duplication of numbers, and the response speed is remarkable due to an increase in the number of devices that can be the transmission source. A decrease can occur.
  • proximity control This problem is caused by trying to realize highly subdivided control conditions and control ranges with the concept of centralized control, so the solution is to distribute locally and autonomously within the control range. (Hereinafter referred to as proximity control) is considered effective.
  • the present inventors have devised a wireless mesh network capable of safely and efficiently controlling a part of a plurality of connected devices based on such a unique problem analysis, and a device control method via the wireless mesh network. .
  • each device performs a proximity control operation while managing proximity control information for devices within the control range.
  • the proximity control information will be described.
  • a control range equivalent to such a control range is provided for each device.
  • Each device holds proximity control information indicating the device ID and key of a device in the control range of the device in association with each other.
  • the key of the entire network is used as a key of a packet whose control range value is 0 or 1 regardless of the transmission source device.
  • the proximity control information 600 is stored in a memory inside the microcomputer 460 in the ceiling lighting fixture 400 shown in FIG.
  • the memory area is secured and the device ID to be stored is set at the time of initialization, and the initial value of the key is calculated from the device ID for each device by a predetermined function.
  • the device ID stored in the proximity control information 600 may be selected and set from the arrangement information (for example, the xy coordinates indicated by the device ID) by the function of the device control software.
  • FIG. 11 is a flowchart showing an example of the proximity control operation by the first device and the second device among a plurality of devices belonging to the wireless mesh network.
  • FIG. 11 shows an example in which the second device is controlled by the command packet transmitted by the first device.
  • the first device When a trigger event (for example, activation of a human sensor) occurs (YES in S13), the first device generates a new first key with a predetermined function from the previous first key (S14). The new first key may simply be generated by incrementing the previous first key. Then, a command packet (see FIG. 7) including commands for the new first key and second device as keys and data, respectively, is constructed (S15) and transmitted to the wireless mesh network (S16). At this time, the first device may appropriately execute processing for itself, for example, lighting an LED.
  • a trigger event for example, activation of a human sensor
  • the second device When the second device receives the command packet (S21), if the number of remaining wireless repeats indicated in the wireless reachable range of the command packet is greater than 1 (YES in S22), the value of the wireless reachable range (that is, the remaining wireless repeat) The command packet decremented by (number) is transmitted again to the wireless mesh network (S23).
  • the second device determines whether it is within the control range of the first device indicated by the control range of the command packet (S24). If it is determined that it is within the control range of the first device (YES in S24), it is determined whether or not the first key is valid (S25). If it is determined that the first key is valid (YES in S25), the first key is stored in the proximity control information 600, and the command indicated in the command packet data is executed (S26).
  • the proximity control performed will be described.
  • the trigger event is that the user is seated and the human sensor immediately above the seat is activated.
  • the type of command issued by each device is set in advance.
  • Example 1 In the first embodiment, using a command packet having a control range value of 2, proximity control is performed on devices located at adjacent coordinates with respect to the source position information (x, y).
  • a sufficient number of wireless repeats (02h as an example) is set as an initial value so that the command packet can reach the devices within the control range.
  • the number of wireless repeats is not limited to 02h, and may be set to an appropriate value according to the interval between the installation positions of the devices.
  • the command packet decremented to 01h is further transferred to another device.
  • a predetermined function for example, incremented by 1
  • a key value 07h included in the command packet is generated.
  • the key collation may be performed for a set of a predetermined number of values sequentially generated from the previous value by a predetermined function (for example, a set of 11 values from the previous value + 1 to the previous value + 11). Good.
  • a predetermined function for example, a set of 11 values from the previous value + 1 to the previous value + 11.
  • a command packet that has been decremented to have a wireless reach range of 01h
  • the ID of the device referred to above is a specific example for explanation.
  • the actual command packet propagation may differ from the above depending on the interval between the installation positions of the devices, the radio wave situation at that time, and the like.
  • the device that has received the command packet executes an appropriate proximity control operation according to the flowchart of FIG.
  • a sufficient number of wireless repeats (02h as an example) is set as an initial value so that the command packet can reach the devices within the control range.
  • the number of wireless repeats is not limited to 02h, and may be set to an appropriate value according to the interval between the installation positions of the devices.
  • the command packet decremented to 01h is further transferred to another device.
  • a command packet that has been decremented to have a wireless reach range of 01h
  • the ID of the device referred to above is a specific example for explanation.
  • the actual command packet propagation may differ from the above depending on the interval between the installation positions of the devices, the radio wave situation at that time, and the like.
  • the device that has received the command packet executes an appropriate proximity control operation according to the flowchart of FIG.
  • a command packet having a control range value of 4 is used to perform proximity control of devices located at oblique and adjacent coordinates with respect to the source position information (x, y).
  • a sufficient number of wireless repeats (02h as an example) is set as an initial value so that the command packet can reach the devices within the control range.
  • the number of wireless repeats is not limited to 02h, and may be set to an appropriate value according to the interval between the installation positions of the devices.
  • the command packet decremented to 01h is further transferred to another device.
  • a command packet that has been decremented to have a wireless reach range of 01h
  • command packet forwarding is limited to a maximum of two times, reducing traffic in the network.
  • the brightness that changes stepwise around the user's seating position may be controlled by continuously transmitting a command packet instructing lighting.
  • the ID of the device referred to above is a specific example for explanation.
  • the actual command packet propagation may differ from the above depending on the interval between the installation positions of the devices, the radio wave situation at that time, and the like.
  • the device that has received the command packet executes an appropriate proximity control operation according to the flowchart of FIG.
  • Example 4 In the fourth embodiment, a command packet having a control range value of 5 is used to perform proximity control of devices located at coordinates up to the next contact with respect to the source position information (x, y).
  • a sufficient number of wireless repeats (02h as an example) is set as an initial value so that the command packet can reach the devices within the control range.
  • the number of wireless repeats is not limited to 02h, and may be set to an appropriate value according to the interval between the installation positions of the devices.
  • the command packet decremented to 01h is further transferred to another device.
  • a command packet that has been decremented to have a wireless reach range of 01h
  • the ID of the device referred to above is a specific example for explanation.
  • the actual command packet propagation may differ from the above depending on the interval between the installation positions of the devices, the radio wave situation at that time, and the like.
  • the device that has received the command packet executes an appropriate proximity control operation according to the flowchart of FIG.
  • Example 5 In the fourth embodiment, using a command packet having a control range value of 6, proximity control is performed on a device located at a specific position coordinate (hereinafter referred to as a customized range) with respect to the source position information (x, y). To do.
  • a specific position coordinate hereinafter referred to as a customized range
  • the customization range is a range set for each device in the initial setting stage.
  • the position of (x, y-1) is set as an example of the customization range.
  • Such a customized range is assumed to be used, for example, for lighting control of a total of six ceiling luminaires immediately above, right and left of the seat where the user is seated and in front.
  • a sufficient number of wireless repeats (02h as an example) is set as an initial value so that the command packet can reach the devices within the control range.
  • the number of wireless repeats is not limited to 02h, and may be set to an appropriate value according to the interval between the installation positions of the devices.
  • the command packet decremented to 01h is further transferred to another device.
  • a command packet that has been decremented to have a wireless reach range of 01h
  • the position coordinate of itself is not included in the customization range with respect to the position coordinate of the transmission source, it is determined that the position coordinate is not within the control range of the transmission source. As a result, the command is not executed.
  • the ID of the device referred to above is a specific example for explanation.
  • the actual command packet propagation may differ from the above depending on the interval between the installation positions of the devices, the radio wave situation at that time, and the like.
  • the device that has received the command packet executes an appropriate proximity control operation according to the flowchart of FIG.
  • the wireless mesh network according to the embodiment and the device control method via the wireless mesh network have been described in detail using a plurality of embodiments.
  • the amount of packet generation can be suppressed.
  • the packet collision probability can be kept low, and an increase in transmission time including retransmission can be suppressed.
  • control range and packet transmission range are narrowed down and a unique security key is used for each device (that is, an independent security key is used for an independent control range), security can be further increased. This effect is explained as follows.
  • FIG. 22A is a diagram showing a configuration example of security in a wireless mesh network as a comparative example.
  • the wireless mesh network 700 shown in FIG. 22A all the devices 701 participating in the network use the same security key, so that a single security area 702 is configured in the entire network. Therefore, if security is broken even once, the security of all devices 701 indicated by black circles is broken (so-called hijacking).
  • FIG. 22B is a diagram illustrating a configuration example of security in the wireless mesh network described in the embodiment.
  • a separate security area 712 (specified according to the value of the control range of the wireless packet) for each device 711. Corresponding to the maximum range of each device). Therefore, if the security is broken only once, the device indicated by the black circle located within the control range of the broken device 711 may be hijacked, but the security of all the devices 711 is broken. There is no.
  • security can be further strengthened by randomizing the initial value of the security key, encrypting the security key itself, and enciphering the key and the data part collectively.
  • a wireless mesh network capable of safely and efficiently controlling a part of a plurality of connected devices and a device control method via the wireless mesh network can be obtained.
  • the wireless mesh network according to the second embodiment is a wireless mesh network in which a plurality of devices having different functions participate, and is autonomous between devices having the same function and devices having different functions that are close to each other via the wireless mesh network. Control.
  • a wireless mesh network for controlling ceiling lighting in an office will be described.
  • FIG. 23 is a plan view showing an example of the floor layout of the office 105 where the wireless mesh network is installed. 23 is different from the office room 100 in FIG. 1 in that a desk light 300 is arranged on each desk 103 and an illuminance sensor 500 is arranged on each window 102. In the office room 105, the ceiling lighting fixture 400 is arranged in the same manner as in FIG.
  • the individual desk light 300 and the ceiling luminaire 400 are the nodes participating in the wireless mesh network, and the illuminance sensor 500 is identified by a device identifier associated with the installation position and function of the device.
  • the device function type is regarded as the z-axis, and the device identifier of each device is expressed as xyz using the xy coordinate related to the device installation position and the z coordinate related to the device function type. .
  • FIG. 24 is a diagram illustrating an example of a device identifier of the desk light 300.
  • the device identifier of each desk light 300 is represented by an xyz coordinate value obtained by adding the z coordinate value 1 representing the function of the desk light 300 to the xy coordinate of the installation position.
  • FIG. 25 is a diagram illustrating an example of a device identifier of the ceiling lighting fixture 400.
  • the device identifier of each ceiling lighting fixture 400 is represented by an xyz coordinate value obtained by adding a z-coordinate value 2 representing the function of the ceiling lighting fixture 400 to the xy coordinate of the installation position.
  • FIG. 26 is a diagram illustrating an example of a device identifier of the illuminance sensor 500.
  • the device identifier of each illuminance sensor 500 is represented by an xyz coordinate value obtained by adding the z coordinate value 3 representing the function of the illuminance sensor 500 to the xy coordinate of the installation position.
  • FIG. 27 is a block diagram illustrating an example of a functional configuration of the desk light 300.
  • the desk light 300 includes an LED 310, an LED driving power source 320, an encoder 330, a wireless circuit 340, an antenna 350, and a microcomputer 360 that controls the appliance.
  • the encoder 330 is used to read the angle of a knob that sets the brightness of the light.
  • the microcomputer includes a CPU, a memory, an A / D converter, and a D / A converter (not shown).
  • the power supply of the lighting fixture is obtained from the electric wire (not shown).
  • FIG. 28 is a block diagram illustrating an example of a functional configuration of the illuminance sensor 500.
  • the illuminance sensor 500 includes an illuminance sensor element 510, a wireless circuit 520, an antenna 530, and a microcomputer 540 that controls the appliance.
  • the microcomputer includes a CPU, a memory, an A / D converter, and a D / A converter (not shown).
  • the trigger event for performing proximity control of ceiling lighting is expanded.
  • a change in brightness at the window detected by the illuminance sensor 500 and a user operation (such as turning the encoder 330) on the desk light 300 can be used as a new trigger event.
  • FIG. 29 is a flowchart illustrating an example of the proximity control operation by the third device, the first device, and the second device among a plurality of devices belonging to the wireless mesh network.
  • FIG. 29 illustrates an example in which the first device performs the proximity control described in the first embodiment by receiving the report packet that notifies the occurrence of the trigger event transmitted from the third device.
  • the first device and the second device may be, for example, the ceiling lighting fixture 400
  • the third device may be, for example, the desk light 300 and the illuminance sensor 500.
  • the third device When the third device detects the occurrence of a trigger event (for example, a rotation operation of the encoder or a change in brightness) (YES in S31), the third device generates a new third key with a predetermined function from the previous third key. (S32). Then, a report packet including a report for the new third key and the first device as a key and data is formed (S33) and transmitted to the first device via the wireless mesh network (S34).
  • a trigger event for example, a rotation operation of the encoder or a change in brightness
  • the first device determines whether or not the third key is valid (S12). If it is determined that the third key is valid (YES in S12), a new first key is generated, and a command packet for proximity control is constructed and transmitted (S14 to S16). The operation performed by the second device in response to receiving the command packet is as described in the first embodiment.
  • proximity control is executed with detection of a change in brightness by an illuminance sensor as a trigger event.
  • the key and data may be encrypted in a lump as in the command packet.
  • the command packet in FIG. 31 controls the brightness of the ceiling lighting fixture in the customization range similar to the command packet in FIG.
  • the brightness of the illumination near the window is changed.
  • the ceiling luminaire can be dimmed when external light is strongly incident, thereby contributing to power saving.
  • the ceiling lighting apparatus determines the necessary lighting control according to the illuminance level indicated in the report packet.
  • the illuminance sensor may determine the necessary lighting control. In that case, the illuminance sensor stores the command representing the determined lighting control in the data of the report packet and notifies the ceiling lighting fixture, and the ceiling lighting fixture transcribes the notified command as it is to the data of the command packet. Can be sent.
  • the proximity control is executed by using the rotation operation of the encoder of the desk light by the user as a trigger event.
  • the command packet in FIG. 33 controls the brightness of the ceiling luminaire located at the adjacent coordinates.
  • the proximity control of the seventh embodiment when the user operates the desk light, the brightness of the ceiling lighting fixtures directly above and around the user is changed.
  • the ceiling luminaire can be dimmed to contribute to power saving.
  • the ceiling lighting fixture determines the necessary lighting control according to the encoder output value indicated in the report packet.
  • the desk light may determine the necessary lighting control. In that case, the desk light stores a command representing the determined lighting control in the data of the report packet and notifies the ceiling lighting device, and the ceiling lighting device directly transcribes the notified command to the data of the command packet. Can be sent.
  • a wireless mesh network capable of safely and efficiently controlling a part of a plurality of connected devices and a device control method via the wireless mesh network are obtained.
  • the wireless mesh network of the present invention is not limited to lighting control, and is also effective for air conditioning control, for example.
  • the present invention can be widely used in various control systems as a wireless mesh network and a device control method via the wireless mesh network.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Selective Calling Equipment (AREA)
  • Circuit Arrangement For Electric Light Sources In General (AREA)

Abstract

La présente invention concerne un réseau maillé sans fil ayant une pluralité de dispositifs connectés qui comprennent un premier dispositif et un second dispositif. Le premier dispositif transmet (S14 à S16) une première clé qui est une clé de sécurité à usage unique au premier dispositif, une commande à un autre dispositif et un paquet de commande qui comporte des informations de plage de commande pour régler une plage de commande en se basant sur la commande. Le second dispositif reçoit (S21) le paquet de commande et exécute (S26) la commande lorsque le second dispositif est positionné à l'intérieur de la plage de commande sur la base des informations de plage de commande incluses dans le paquet sans fil et lorsque la première clé incluse dans le paquet sans fil est valide (S24 = OUI et S25 = OUI)
PCT/JP2016/075016 2015-08-28 2016-08-26 Réseau maillé sans fil et procédé permettant de commander des dispositifs par le biais d'un réseau maillé sans fil WO2017038693A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2015169575 2015-08-28
JP2015-169575 2015-08-28

Publications (1)

Publication Number Publication Date
WO2017038693A1 true WO2017038693A1 (fr) 2017-03-09

Family

ID=58188674

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2016/075016 WO2017038693A1 (fr) 2015-08-28 2016-08-26 Réseau maillé sans fil et procédé permettant de commander des dispositifs par le biais d'un réseau maillé sans fil

Country Status (1)

Country Link
WO (1) WO2017038693A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113179507A (zh) * 2021-06-30 2021-07-27 南京沁恒微电子股份有限公司 基于蓝牙mesh的无需主设备的自配网组网方法及系统
WO2023157645A1 (fr) * 2022-02-21 2023-08-24 パナソニックIpマネジメント株式会社 Procédé de communication sans fil et système de communication sans fil

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2014501047A (ja) * 2010-10-01 2014-01-16 コーニンクレッカ フィリップス エヌ ヴェ 無線ネットワークでデータパケット送信をスケジューリングするデバイス及び方法
WO2014108786A1 (fr) * 2013-01-08 2014-07-17 Koninklijke Philips N.V. Optimisation de l'acheminement de messages dans un réseau sans fil maillé

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2014501047A (ja) * 2010-10-01 2014-01-16 コーニンクレッカ フィリップス エヌ ヴェ 無線ネットワークでデータパケット送信をスケジューリングするデバイス及び方法
WO2014108786A1 (fr) * 2013-01-08 2014-07-17 Koninklijke Philips N.V. Optimisation de l'acheminement de messages dans un réseau sans fil maillé

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
NOBUHIRO KOBAYASHI ET AL.: "Security Technologies for Wireless Mesh Network", MITSUBISHI DENKI GIHO, vol. 86, no. 11, November 2012 (2012-11-01), pages 47 - 50 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113179507A (zh) * 2021-06-30 2021-07-27 南京沁恒微电子股份有限公司 基于蓝牙mesh的无需主设备的自配网组网方法及系统
WO2023157645A1 (fr) * 2022-02-21 2023-08-24 パナソニックIpマネジメント株式会社 Procédé de communication sans fil et système de communication sans fil

Similar Documents

Publication Publication Date Title
US10743390B2 (en) Out-of-the-box commissioning of a control system
US10667111B2 (en) Virtual addressing for mesh networks
US8408727B2 (en) Lighting control system with wireless network connection
CN110460977B (zh) 一种基于蓝牙mesh的智能照明设备配网方法
KR102038571B1 (ko) 메쉬 네트워크 커미셔닝
US20160072638A1 (en) System and method for remotely controlling ir-enabled appliances via networked device
US8913746B2 (en) Wireless communication system and method
JP6742412B2 (ja) 新しいデバイスをシステムにコミッショニングするためのコミッショニングデバイス及びその方法
EP3504938B1 (fr) Configuration de luminaire sans fil
EP3637725B1 (fr) Communication sécurisée entre un dispositif hôte et un dispositif client
US20200004227A1 (en) Devices and methods for requesting and/or supplying information
WO2017038693A1 (fr) Réseau maillé sans fil et procédé permettant de commander des dispositifs par le biais d'un réseau maillé sans fil
WO2016071166A1 (fr) Amorçage dans un réseau sans fil sécurisé
EP3417679B1 (fr) Mise en service de réseau sécurisé pour systèmes d'éclairage
US11234106B2 (en) Simultaneous control of a subnet of nodes in a wireless network
CN112205080A (zh) 用于实现灯具的出厂重置的系统、方法和设备
EP3637726B1 (fr) Communication sécurisée entre des dispositifs hôtes
EP4214939A1 (fr) Approvisionnement autonome d'un réseau décentralisé
KR102259490B1 (ko) 에너지 수요 제어를 위한 이중 보안 시스템 및 그의 동작 방법
WO2020148250A1 (fr) Procédé de fonctionnement et dispositif permettant de faire fonctionner un dispositif de nœud dans un réseau de communication basé sur une technologie de blocs de données en chaîne

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16841725

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16841725

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: JP