WiFi & Wireless Access Lock Guide

Author: Brian Rhodes, Published on Aug 25, 2014

When it comes to access control, any chance to save money on parts or install labor is attractive.

For many doors, running network cables and hanging multiple devices can run thousands of dollars. By contrast, Wireless/WiFi locks are often a simple, less expensive way to bring doors under control. 

In our 2014 Access Survey, integrators noted that while still a distinct minority, use of WiFi/Wireless locks is sharply increasing, driven by ease of install and lower comparative costs. However, despite reporting growth in the segment, they also noted key downsides of using them:

  • Ambiguous Network: Is it Wireless or WiFi?
  • Credentials Management
  • Repinning Locks
  • Battery Costs
  • Lockdown Feature
  • Replacement Costs

**** ** ***** ** ****** *******, *** ****** ** **** money ** ***** ** ******* ***** ** **********.

*** **** *****, ******* ******* ****** *** ******* ******** ******* can *** ********* ** *******. ** ********, ********/**** ***** *** ***** a ******, **** ********* *** ** ***** ***** ***** *******. 

** *** **** ****** ******, *********** ***** **** ***** ***** a ******** ********,*** ** ****/******** ***** ** ******* **********, ****** ** **** ** ******* *** ***** *********** *****. *******, despite ********* ****** ** *** *******, **** **** ***** *** downsides ** ***** ****:

  • ********* *******: ** ** ******** ** ****?
  • *********** **********
  • ********* *****
  • ******* *****
  • ******** *******
  • *********** *****

[***************]

WiFi/Wireless ***** *******

** ****** ****/******** ***** *** * ****** ***** *********, ********** of *** * **** ****, *** *******, *** ** **** credential *******, *** ** ********** ****** ******** ** ***** *** schedules ** ** ********** ****.

** ******** ** * *********** ********* ****** ******** ** ******** pieces **** **** ************ ** **** *** ***** ** *** opening, * ****/******** **** *** ** **** ****** ******* **** existing ******** **** **** *******. *** ***** ***** ***** **** contrast:

Ambiguous *******: ** ** ******** ** ****?

*******, **** ** ***** ** ********* ********, ** ****** **** defining ******* *** ***** *** ********* ********. *** ***** ************ are ******, **** ***** *****:

  • ********: *********** ***** ********, ******* ** *** *********** **** ******** ***** ******* **** *** **** ************** *** **** ******* a ****** *** ** ** ******* ** *** ***** ** every ****. *** **** ***** ******* $*** - $*** ****, with ******** ** ***** ***' ** *** *********.
  • ****: ******** ***** **** ***.*** **** ***********, ******* ********** * lock ** ***** ** ** *******, *** ******* ******* * lock *** *** ******** **** ******** ******** *** ************. **** access ****** ********* ***** ******* $** - $*** ****, *** if ******** **** ** ******* ********* ** ********* *** ** used, **** *** ********* ******** ** * ****** **** ** typically**** **** ** ** *** ***.

******* *********** '********' ******* *** **** ********* *** ****, *** the ********** **** ** ****** ********* ****** *** * ******** ******* can ****** ***** ******** **** **** ***** **** ****. ****** ** **** doors *** ** ********* ** * ****** *** ******** ** is ****** *****:

Credential **********

** ***** *****, ********** ***** **** ** ***** ***** **** in ***** ** *********** ** **** ******* ** *****. *** all ********/**** ****** ****** '******* ********', *** ** *** **** of ********** ******** ******* **************** ***********, *** **** *** ** ********** ****** ***** **** ** updated *** ******* ** ** ***** *** ******** **** * current **********.

Repinning *****

** **** *****, ******* * ****/******** **** **** ***** ********* the ********** ***** ** ***. ** ***** ** ****** ****** with ******** ******* ****** *******, *** ***** **** ** ** ****** ** ******. 

***** *** **** ** ********* * **** *** ** **** than $** *** ****, *** ** ****** **** *** ***** of ***, **** ******* ******* ** ********** ********** *** *** be ******** ** ******* *** * ****** ** * ****** number ** *****.

Battery *****

** ***** ***********, *********** ******* ***** ** ***** *** **** hundreds ** **** ********* *** ****. ***** **** **** ******* pin ******** ******* **** ** **** ****-**-********* ** ****** (**:**,*** *** **** ****), **** ******* **** ** ********** ***** ******* ********* ********** and *****.

**** * ******** ********** ** **** **** *** ********** **** drag ** ******* ** *** **** ****. **** ********** ***** to ******** *** ******* ***** ******** *********. ***** **** *********, the ****'* ******** **** *** ***** ** *** *** **** be * ********** ****** ** ******* ****, **** ***** ******* away *** **** * ****** ****** ****** ** **-********* * connection ** **** *** ******* **** *****. 

*******, *** *********** *** *** **** ** *** **** *** greatly ****** ******* ****, **** ** ************ **** ******* ******* longer **** *** **** *******. ** *** ******** ******* ***** draws ** ******* ******* ** ******, *** ******* **** *** time ** ******* ** **** ******** ******* ******, ***** *** used ********** **** ***** ******* ******* ** ******** ***, *** also ******* *** ******** ******** ** ***** ** ************.

*** **** ** ******* ***** * **** **** *** ***** from * ********* ******* **** (** ***** ** *** ***** below), ** *** **** *** ** ******** ** *** ******** commercially ********* *********** *********, *** ** ****** **** ********* **** cost ***** *** ****** ** ******** ******* *****.'

******** ** * ****** **** ******** * ($** *****/*****) ******* pack *********** **** *** ****, * ****** ******** ** **** ten ***** **** **** $***/****.

Lockdown *******

* ****** ******* **** ********* ******* **** ***** *** * shaky ************** **** ********/**** ***** ** *** '********' ** '***** All-Lock" *******. *** ****** ** *** ******** ******* * ******* alarm ** **** ** ************** **** *** ***** ** * system, *********** *********** ****** ** ********* ******* **** ****** ****** or ***** ************ *****.

**** *** ******** ******, ******* *********** *** ***** *** * concern. **** '********', **** ******* ** ********* ******* ** ************ or **** **** *** ***** ********* ** ****. 

********** * ******** **** ****** ******** '********' ******** *** *** first ****, *** **** ********* *** ******** ******* *** *********** radios ** *** ****** *** ******* ** ***** ** ******* is *** ****.

** ****** ********* ** ******* *** * ********* ******* ** a ******** ******* ** * ******** ****, ********/**** ******** ****** not ** **** ** ***.

Replacement *****

*******, ** **** ***** *****, **** *********** ** *** ***** lock ** ********? ****** * ********* **** **** **** ******** components, ** ** ********* ****** ****** ** ************, ** *** be ******* ***. **** * ********/**** ****, ** * ******* wearing **** **** * ****** ** ******** ***** (******* **** than $*** ********), ***** ** * **** ****** *** ****** unit **** **** ** ** ********* *** **** ** $**** ** ****.

Comments (6)

On some wireless solutions, the locks must be seeded first with a PDA device before they can be recongnized by the backend system. The PDA device can cost you a few thousand dollors.

We have found that another major influence on battery life is the quality of the wireless connection back to the gateway/access point and in some cases, the position of the door has had a major impact on this. (In the open position, one lock had two more walls between it and the gateway than when it was closed.)

I would be interested in seeing a good study on the total cost of maintaining the batteries. In large installations over time, the distribution curve of when batteries run out will become flat because every battery will have a different life and usage pattern, so even if you installed all the batteries on the same day at the start, the batteries will need replacing on a bell curve. The second set will be even more distributed so the curve will be flatter and so on, leaving the customer with no good time to do a mass swap of batteries.

This will put you in a position of having to change batteries on a continueal basis, and of course those locks will be randomly distributed over the installation making it expensive from a labor perspective.

So, how many wireless locks does it take to make replacing batteries a full time job? (sounds like the lead-in to a bad joke...)

Don't get me wrong, I like wireless locks but we sell them as a way to add access control to doors you wouldn't normally secure due to cost.

I have been with this company for nearly four years. We have installed wireless access only one time and it was just recently. The doors were to testing labs sensitive to contamination and kind of a pain to run wire to. The site is roughly 80 miles away from our shop. I do not have much faith in any wireless devices as they are more problematic and simply not as full-proof as hardwired. Looking forward to future service calls!!!

Assa Abloy Aperio, SALTO and SimonVoss. Anyone has a comparison?

Not sure about the SimonVoss but with the Aperio you can at least use the latest HID credentials if that is what the customer is using.

We have integrations with three of the major providers, Allegion, Assa and Salto. In the cases of Allegion and ASSA we support both the Wireless (using a router or HUB) and the WiFi versions. We have the ability to command lock-down functions from the software and the response time is adequate. We find that battery life is largely dependent on the feature set that is turned on for operation. We have one school in MI that has deployed 3600 Allegion AD-400 locks and they are reporting battery life of roughly 6-8 months. We are seeing our partners use wireless locks on doors that were considered not critical enough for a typical maglock/strike installation and more of a people control and key replacement solution. Our trends show they are gaining more market share, we increased our sales with Allegion 35% so far this FY.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Testing Bandwidth Vs. Low Light on Jan 16, 2019
Nighttime bandwidth spikes are a major concern in video surveillance. Many calculate bandwidth as a single 24/7 number, but bit rates vary...
Access Control Records Maintenance Guide on Jan 16, 2019
Weeding out old entries, turning off unused credentials, and updating who carries which credentials is as important as to maintaining security as...
Access Control Cabling Tutorial on Jan 15, 2019
Access Control is only as reliable as its cables. While this aspect lacks the sexiness of other components, it remains a vital part of every...
Bad: Dahua Villa Video Doorbell Tested on Jan 11, 2019
Doorbells are one of the hottest segments in the residential market but Dahua's Villa Video Doorbell is the worst we have tested.   We bought and...
Winter 2019 IP Networking Course on Jan 10, 2019
Today is the last day to register for the Winter 2019 IP Networking course. This is the only networking course designed specifically for video...
NTP / Network Time Guide For Video Surveillance on Jan 10, 2019
Inaccurate time can lead to missing or inadmissible video, yet this topic is often overlooked, with cameras and servers left defaulted,...
Managed Video Services UL 827B Examined on Jan 09, 2019
Historically, UL listings for central stations have been important, with UL 827 having widespread support. However, few central stations have...
UK: Private Video Surveillance Complaints Down Since GDPR on Jan 09, 2019
The arrival of the GDPR on May 25, 2018, brought fears the law would spark a massive increase in privacy complaints about security camera use....
H.265 / HEVC Codec Tutorial on Jan 08, 2019
H.265 support improved significantly in 2018, with H.265 camera/VMS compatibility increased compared to only a year ago, and most manufacturers...
2019 Video Surveillance Cameras Overview on Jan 07, 2019
Each year, IPVM summarizes the main advances and changes for video surveillance cameras, based on our industry-leading testing and...

Most Recent Industry Reports

Access Control Records Maintenance Guide on Jan 16, 2019
Weeding out old entries, turning off unused credentials, and updating who carries which credentials is as important as to maintaining security as...
UK Fines Security Firms For Illegal Direct Marketing on Jan 16, 2019
Two UK security firms have paid over $200,000 in fines for illegally making hundreds of thousands of calls to people registered on a government...
Access Control Cabling Tutorial on Jan 15, 2019
Access Control is only as reliable as its cables. While this aspect lacks the sexiness of other components, it remains a vital part of every...
Avigilon Favorability Results 2019 on Jan 15, 2019
Since IPVM's 2017 Avigilon favorability results, the company was acquired by Motorola and has shifted from being an aggressive startup to a more...
Gorilla Technology AI Provider, Raises $15 Million, Profiled on Jan 15, 2019
Gorilla Technology is a Taiwanese video analytics manufacturer that recently announced a $15 million investment from SBI Group, saying this...
2019 IP Networking Book Released on Jan 14, 2019
The new IP Networking Book 2019 is a 285 page in-depth guide that teaches you how IT and telecom technologies impact modern security...
Arecont Costar Layoffs on Jan 14, 2019
Arecont Vision, a Costar Company, has laid off more than 10% of their workforce in a move the company described to IPVM as a result of "important...
The False SCMP Story on Hikvision NYC AI on Jan 14, 2019
In the past week, one of Asia's largest publications, the South China Morning Post (SCMP), posted an article about "Chinese [facial recognition]...
WDR Tutorial on Jan 11, 2019
Understanding wide dynamic range (WDR) is critical to capturing high quality images in demanding conditions. However, with no real standards, any...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact