Z-Wave Automation Guide

Author: Brian Rhodes, Published on Apr 10, 2012

The smart home automation segment has exploded. Now with Axis releasing a camera integrated with Z-Wave, the technology is taking on a new wrinkle in extending I/O features with a whole category of wireless sensors.

But is this a sign of things to come for Z-Wave, or is the technology a risk? In this note, we give a brief overview of Z-Wave and describe its adoption in home security systems.

[Note: This post was significantly updated in 2018 since originally being published in 2012.]

Overview

The Z-Wave Alliance is composed of manufacturers all actively designing and producing products compliant with the network protocol. A review of member documents indicates key attributes of the 'Z-Wave' transmission medium:

  • Z-Wave is a low bandwidth, low latency ~900 MHz wireless network protocol
  • Z-Wave is licensed by Zensys/Sigma, and development permissions are exclusively granted by the company
  • Z-Wave is low power, stable, and simplified compared to 802.11. The resulting network is ideal home automation, appliance controls, and security systems.

The network is designed to be setup with one click, similar to WPS, and is source routed to prevent connections from being lost even if devices are moved. If connections are dropped, devices will automatically renegotiate with central nodes.

Z-Wave Command Structure

Given the wide applicability of Z-Wave to many different types of devices, including locks, lights, contact sensors, and environmental sensors, the data framework of structuring commands (called the command class) takes different forms. However, from a general standpoint, each command includes a single basic operation.

For example, for Door Lock Status, the Z-Wave specification requires devices return requests in the following way:

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

S2 Specification Offers Better Security

While early versions of Z-Wave devices had light security, the newest S2 specification offers heavy-duty encryption and protection against jamming and spoofing. Among the features the S2 spec claims:

  • End-to-end encryption
  • Signal jam detection
  • Device pairing steps intended to eliminate vulnerabilities such as man in the middle attacks

Z-Wave S2 is also beginning to see some use in security systems where proprietary wireless most often was used. For example, Ring has announced their DIY Alarm system based on S2. We expect to see more S2-based security systems over time.

Distance Limitations

In contrast with other consumer wireless platforms, the effective range of Z-Wave enabled devices is relatively short at 100 feet with a clear line-of-sight. Preventing cross-talk between different Z-Wave networks is a concern, and this range restriction is a function of the usage agreement with Zensys.

Z-Wave protocol places a cap on 232 devices per network, however, multiple networks can be joined together in a router to increase this maximum. This device limitation is not seen as important for most home networks, but may limit commercial deployments.

Product Conformity

Unlike other standardized security APIs like ONVIF, Z-Wave conformance is highly policed with each device given a specific conformation. For example, Axis' camera has a discrete conformance certificate:

Axis Supports Full Z-Wave Specification Data

Depending on device types, the data being communication over Z-Wave differs. For basic sensors and simple on/off devices, a binary framework applies in ~15 different command classes. However, for advanced devices like thermostats, more granular data is sent for reporting on device status (ie: temperature, set points, system status).

Axis conformance includes features that may not yet be fully implemented or used in current products.

The total number of available classes include specialized battery reporting, tamper notifications, and wireless supervision that become important considerations for intrusion and access control systems but are not vital or mandated elements of 'wireless I/O' sensors.

Product Integration

While general 'Home Automation' is the primary function of Z-Wave, home security systems have been easily adapted to make use of the network. Homeowners are able to remotely control devices like door locks, security lighting, and gate operators.

Intrusion Systems: Alarm panel keypads like the Honeywell Tuxedo Touch and the 2GIG! GC2 & GC3 alarm systems have become central controllers for many home Z-Wave networks. These panels are often configured for remote internet access, which provides an added benefit of using alarm keypads as central control for Z-Wave networks.

Door Locks: Both Schlage and ASSA ABLOY (Yale) have introduced Z-Wave enabled deadbolts and door locks. Enabled door hardware is able to be locked or unlocked through a remote interface. The following image is a Yale branded residential keypad and deadbolt:

The list of Z-Wave integrated products is growing, and has expanded to over 600 products in the last two years. The forecast of enabled products is expected to grow over the next few years because additional manufacturers have recently signed agreements to produce licensed products.

Competition

Several standards compete with Z-Wave, including ZigBee and Bluetooth Low Energy (BLE). Many of these competing standards are also positioned to be low cost, efficient, and secure technologies. However, Z-Wave has gained the support of several manufacturing members including ADT, GE, DSC, Black & Decker, Cooper, and Leviton. Competing standards do not yet have this degree of support.

Price

Z-Wave enabled sensors devices can be purchased for less than $40 USD. Enabled door locks cost around $200 USD, and security control panels can be purchased for $150 USD.

Previous attempts at home automation were expensive. Average system costs of $10,000 USD to $25,000 USD to automate a typical house. Conventional automation systems have been criticized for being unnecessarily complex to operate for many users. Aside from being easier to administrate, Z-Wave systems and components are much less costly than tradition home automation controls.

Conclusion

Z-Wave stands to be successful where older home automation technology has not been. The technology is less expensive and easier to use than previous systems. Actual system and device performance is subject to product testing and further analysis. However, manufacturer support is strong, and enabled products are becoming more common. Market acceptance of the technology will be an interesting trend to watch.

5 reports cite this report:

Axis Launches Z-Wave IP Camera on Jan 31, 2018
Z-Wave is big in home automation but not in video surveillance. Now, Axis is announcing their first camera with Z-Wave built in, the M5065, a...
Wireless Burglar Alarm Sensors Guide on Jul 21, 2017
Wireless sensors for burglar alarm sensors are an increasingly common option for the historical labor intensive wired alarm systems. However,...
ADT Sued, Claimed 'Easily Hacked' on Nov 17, 2014
A lawsuit has been filed against ADT. The class action complaint claims ADT's wireless systems are 'easily hacked', that ADT knows this and yet...
Wireless Access Control Panels on Oct 16, 2014
One company claims they can connect access control panels wirelessly with ranges up to a mile, saving big bucks and thousands of feet of cable...
'DIY' vs Professional Alarm Systems on Apr 18, 2012
A growing yet controversial trend in alarm systems is for people to do it themselves, installing their own alarm systems and monitoring it...
Comments : PRO Members only. Login. or Join.

Related Reports

Cybersecurity for IP Video Surveillance Guide on May 18, 2018
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...
Forced Entry / Duress Access Tutorial on May 17, 2018
Even though access control normally keeps people safe, tragedies have revealed a significant issue. If users are forced to unlock doors for...
Installing Cameras in Plenums Tutorial on May 15, 2018
There is often confusion about plenum ceilings, with misinformation about what is required when running cables through them and mounting cameras...
Measuring For Security Installation Guide on May 15, 2018
Accurate measurement is a fundamental skill, yet many installers do not know how to do it. Using these tools are a key skill needed for security...
Genetec Clearance Face Detection / Redaction Test on May 14, 2018
Privacy regulations such as GDPR (EU Public Privacy), HIPAA (US Medical Privacy), and FERPA (US Student Privacy) are driving video surveillance...
Access Visitor Management Systems Guide on May 11, 2018
"Who are you, and why are you here?" Facilities that implement Visitor Management Systems hope they never need to ask that question to anyone,...
S2 Access Control / 'Unified Security Management' Profile on May 08, 2018
In our 13th access control company profile, we examine S2 Security's Netbox platform: Unified Security Management Platform positioning Core...
Vivotek 12MP Fisheye Camera Tested (FE9391-EV) on May 08, 2018
Next in our 12MP fisheye camera evaluation, we bought and tested Vivotek's latest generation FE9391-EV, a new model claiming improved smart IR...
Hikvision VMD And Intrusion Analytics Tested on May 04, 2018
VMD worked poorly on Hikvision cameras, new IPVM testing found. However, Hikvision ships analytics on practically every IP camera, with intrusion...
Access Control Card Printers Guide on May 03, 2018
Card printers are a core component of professional access control systems, often used as photos IDs and prominently displayed. Modern badges put...

Most Recent Industry Reports

Dahua Intrusion Analytics And VMD Tested on May 21, 2018
Dahua ships basic analytics on practically all their cameras, ranging from low cost to high end. To see how these analytics work in real world...
Exacq Improving Technical Support, Responding To Integrator Complaints on May 21, 2018
Exacq had been a long-term favorite of integrators, but since their 2014 Tyco acquisition, Exacq has fallen in IPVM integrator studies (though...
Best Manufacturer Technical Support 2018 on May 21, 2018
While 5 manufacturers made the worst technical support 2018 list, only 3 stood out as providing the best technical support to 190+ integrators in...
Stealth / UCIT - Remote Video Monitoring Provider Profile on May 18, 2018
Can 2 remote video monitoring companies, Stealth Monitoring from the US and UCIT from Canada combine to impact the market and compete in a changing...
Cybersecurity for IP Video Surveillance Guide on May 18, 2018
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...
Forced Entry / Duress Access Tutorial on May 17, 2018
Even though access control normally keeps people safe, tragedies have revealed a significant issue. If users are forced to unlock doors for...
ADT Stock Drops 50% Since IPO on May 17, 2018
It has been a brutal 4 months for ADT. They first expected to IPO at ~$18. They IPOed at $14, dropping immediately to $12.39 And now, not even...
Dahua 12MP Fisheye Camera Tested (NK8BR4) on May 16, 2018
Continuing our coverage of 12MP sensor fisheye cameras, we bought and tested the Dahua NK8BR4, examining: Default vs. Optimized...
Worst Manufacturer Technical Support 2018 on May 16, 2018
5 manufacturers stood out as providing the worst technical support to 190+ integrators in new IPVM results. These integrators answered: In the...
Installing Cameras in Plenums Tutorial on May 15, 2018
There is often confusion about plenum ceilings, with misinformation about what is required when running cables through them and mounting cameras...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact