Z-Wave Automation Guide

Author: Brian Rhodes, Published on Apr 10, 2012

The smart home automation segment has exploded. Now with Axis releasing a camera integrated with Z-Wave, the technology is taking on a new wrinkle in extending I/O features with a whole category of wireless sensors.

But is this a sign of things to come for Z-Wave, or is the technology a risk? In this note, we give a brief overview of Z-Wave and describe its adoption in home security systems.

[Note: This post was significantly updated in 2018 since originally being published in 2012.]

Overview

The Z-Wave Alliance is composed of manufacturers all actively designing and producing products compliant with the network protocol. A review of member documents indicates key attributes of the 'Z-Wave' transmission medium:

  • Z-Wave is a low bandwidth, low latency ~900 MHz wireless network protocol
  • Z-Wave is licensed by Zensys/Sigma, and development permissions are exclusively granted by the company
  • Z-Wave is low power, stable, and simplified compared to 802.11. The resulting network is ideal home automation, appliance controls, and security systems.

The network is designed to be setup with one click, similar to WPS, and is source routed to prevent connections from being lost even if devices are moved. If connections are dropped, devices will automatically renegotiate with central nodes.

Z-Wave Command Structure

Given the wide applicability of Z-Wave to many different types of devices, including locks, lights, contact sensors, and environmental sensors, the data framework of structuring commands (called the command class) takes different forms. However, from a general standpoint, each command includes a single basic operation.

For example, for Door Lock Status, the Z-Wave specification requires devices return requests in the following way:

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

S2 Specification Offers Better Security

While early versions of Z-Wave devices had light security, the newest S2 specification offers heavy-duty encryption and protection against jamming and spoofing. Among the features the S2 spec claims:

  • End-to-end encryption
  • Signal jam detection
  • Device pairing steps intended to eliminate vulnerabilities such as man in the middle attacks

Z-Wave S2 is also beginning to see some use in security systems where proprietary wireless most often was used. For example, Ring has announced their DIY Alarm system based on S2. We expect to see more S2-based security systems over time.

Distance Limitations

In contrast with other consumer wireless platforms, the effective range of Z-Wave enabled devices is relatively short at 100 feet with a clear line-of-sight. Preventing cross-talk between different Z-Wave networks is a concern, and this range restriction is a function of the usage agreement with Zensys.

Z-Wave protocol places a cap on 232 devices per network, however, multiple networks can be joined together in a router to increase this maximum. This device limitation is not seen as important for most home networks, but may limit commercial deployments.

Product Conformity

Unlike other standardized security APIs like ONVIF, Z-Wave conformance is highly policed with each device given a specific conformation. For example, Axis' camera has a discrete conformance certificate:

Axis Supports Full Z-Wave Specification Data

Depending on device types, the data being communication over Z-Wave differs. For basic sensors and simple on/off devices, a binary framework applies in ~15 different command classes. However, for advanced devices like thermostats, more granular data is sent for reporting on device status (ie: temperature, set points, system status).

Axis conformance includes features that may not yet be fully implemented or used in current products.

The total number of available classes include specialized battery reporting, tamper notifications, and wireless supervision that become important considerations for intrusion and access control systems but are not vital or mandated elements of 'wireless I/O' sensors.

Product Integration

While general 'Home Automation' is the primary function of Z-Wave, home security systems have been easily adapted to make use of the network. Homeowners are able to remotely control devices like door locks, security lighting, and gate operators.

Intrusion Systems: Alarm panel keypads like the Honeywell Tuxedo Touch and the 2GIG! GC2 & GC3 alarm systems have become central controllers for many home Z-Wave networks. These panels are often configured for remote internet access, which provides an added benefit of using alarm keypads as central control for Z-Wave networks.

Door Locks: Both Schlage and ASSA ABLOY (Yale) have introduced Z-Wave enabled deadbolts and door locks. Enabled door hardware is able to be locked or unlocked through a remote interface. The following image is a Yale branded residential keypad and deadbolt:

The list of Z-Wave integrated products is growing, and has expanded to over 600 products in the last two years. The forecast of enabled products is expected to grow over the next few years because additional manufacturers have recently signed agreements to produce licensed products.

Competition

Several standards compete with Z-Wave, including ZigBee and Bluetooth Low Energy (BLE). Many of these competing standards are also positioned to be low cost, efficient, and secure technologies. However, Z-Wave has gained the support of several manufacturing members including ADT, GE, DSC, Black & Decker, Cooper, and Leviton. Competing standards do not yet have this degree of support.

Price

Z-Wave enabled sensors devices can be purchased for less than $40 USD. Enabled door locks cost around $200 USD, and security control panels can be purchased for $150 USD.

Previous attempts at home automation were expensive. Average system costs of $10,000 USD to $25,000 USD to automate a typical house. Conventional automation systems have been criticized for being unnecessarily complex to operate for many users. Aside from being easier to administrate, Z-Wave systems and components are much less costly than tradition home automation controls.

Conclusion

Z-Wave stands to be successful where older home automation technology has not been. The technology is less expensive and easier to use than previous systems. Actual system and device performance is subject to product testing and further analysis. However, manufacturer support is strong, and enabled products are becoming more common. Market acceptance of the technology will be an interesting trend to watch.

5 reports cite this report:

Axis Launches Z-Wave IP Camera on Jan 31, 2018
Z-Wave is big in home automation but not in video surveillance. Now, Axis is announcing their first camera with Z-Wave built in, the M5065, a...
Wireless Burglar Alarm Sensors Guide on Jul 21, 2017
Wireless sensors for burglar alarm sensors are an increasingly common option for the historical labor intensive wired alarm systems. However,...
ADT Sued, Claimed 'Easily Hacked' on Nov 17, 2014
A lawsuit has been filed against ADT. The class action complaint claims ADT's wireless systems are 'easily hacked', that ADT knows this and yet...
Wireless Access Control Panels on Oct 16, 2014
One company claims they can connect access control panels wirelessly with ranges up to a mile, saving big bucks and thousands of feet of cable...
'DIY' vs Professional Alarm Systems on Apr 18, 2012
A growing yet controversial trend in alarm systems is for people to do it themselves, installing their own alarm systems and monitoring it...
Comments : PRO Members only. Login. or Join.

Related Reports

Testing Bandwidth Vs. Low Light on Jan 16, 2019
Nighttime bandwidth spikes are a major concern in video surveillance. Many calculate bandwidth as a single 24/7 number, but bit rates vary...
Access Control Records Maintenance Guide on Jan 16, 2019
Weeding out old entries, turning off unused credentials, and updating who carries which credentials is as important as to maintaining security as...
Access Control Cabling Tutorial on Jan 15, 2019
Access Control is only as reliable as its cables. While this aspect lacks the sexiness of other components, it remains a vital part of every...
Winter 2019 IP Networking Course on Jan 10, 2019
Today is the last day to register for the Winter 2019 IP Networking course. This is the only networking course designed specifically for video...
CES 2019 Show Report on Jan 10, 2019
IPVM was at CES 2019 for the second year (see our CES 2018 Show Final Report) and is reporting on announcements and interesting news from the show...
NTP / Network Time Guide For Video Surveillance on Jan 10, 2019
Inaccurate time can lead to missing or inadmissible video, yet this topic is often overlooked, with cameras and servers left defaulted,...
Worst Products Tested In Past Year on Jan 09, 2019
IPVM has done over 100 tests in the past year. But which products performed the worst? Which ones should users be most aware of? In this report,...
Managed Video Services UL 827B Examined on Jan 09, 2019
Historically, UL listings for central stations have been important, with UL 827 having widespread support. However, few central stations have...
UK: Private Video Surveillance Complaints Down Since GDPR on Jan 09, 2019
The arrival of the GDPR on May 25, 2018, brought fears the law would spark a massive increase in privacy complaints about security camera use....
H.265 / HEVC Codec Tutorial on Jan 08, 2019
H.265 support improved significantly in 2018, with H.265 camera/VMS compatibility increased compared to only a year ago, and most manufacturers...

Most Recent Industry Reports

Access Control Records Maintenance Guide on Jan 16, 2019
Weeding out old entries, turning off unused credentials, and updating who carries which credentials is as important as to maintaining security as...
UK Fines Security Firms For Illegal Direct Marketing on Jan 16, 2019
Two UK security firms have paid over $200,000 in fines for illegally making hundreds of thousands of calls to people registered on a government...
Access Control Cabling Tutorial on Jan 15, 2019
Access Control is only as reliable as its cables. While this aspect lacks the sexiness of other components, it remains a vital part of every...
Avigilon Favorability Results 2019 on Jan 15, 2019
Since IPVM's 2017 Avigilon favorability results, the company was acquired by Motorola and has shifted from being an aggressive startup to a more...
Gorilla Technology AI Provider, Raises $15 Million, Profiled on Jan 15, 2019
Gorilla Technology is a Taiwanese video analytics manufacturer that recently announced a $15 million investment from SBI Group, saying this...
2019 IP Networking Book Released on Jan 14, 2019
The new IP Networking Book 2019 is a 285 page in-depth guide that teaches you how IT and telecom technologies impact modern security...
Arecont Costar Layoffs on Jan 14, 2019
Arecont Vision, a Costar Company, has laid off more than 10% of their workforce in a move the company described to IPVM as a result of "important...
The False SCMP Story on Hikvision NYC AI on Jan 14, 2019
In the past week, one of Asia's largest publications, the South China Morning Post (SCMP), posted an article about "Chinese [facial recognition]...
WDR Tutorial on Jan 11, 2019
Understanding wide dynamic range (WDR) is critical to capturing high quality images in demanding conditions. However, with no real standards, any...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact