DECT ULTRA LOW ENERGY (ULE) Technology Overview The ETSI Approach to a Mid-range Wireless Technology for IoT
Angel Bóveda CEO, Wireless Partners S.L.
ETSI Board member, co-leader of the IoT strategic group
ETSI M2M Workshop - 9-11 December 2015
© ETSI 2015. All rights reserved
DECT ULE at a glance
What is DECT ULE?
DECT ULE is a mid-range low power consumption technology intended for battery or line powered home and industrial automation devices
Developed by the ETSI Technical Committee DECT, and built on top of DECT technology, addresses a completely different market
• Different players, different distribution channels
Specifically designed for the application
• It is not a minor adaptation of DECT
• Reuses the DECT physical layer, DECT spectrum and DECT channel structure
• Significantly different MAC layer, channel selection and security algorithms
Operates over license exempt “high-quality” spectrum (1 880 1 900 MHz)
• Range 70 m (NLOS) – >500 m (LOS) (= std DECT range)
2
DECT ULE at a glance
Market positioning and value proposition
• Objective: Optimal combination of power consumption and range
• “best in town” for the specified coverage range (70m – 500m)
• Specifically designed for optimal coverage of Homes and Industry premises.
• Can also be used in Personal Area Networks due to low power consumption
• Compatibility with voice DECT and Home Gataways
• Complete reuse of radio chipset in Base Stations and Home Gateways
• Size of DECT technology: 100 M of devices / year
• DECT radios will be a commodity in European Home Gateways
• I.e. Livebox (Orange- France), Fritzbox (Germany)
3
4
DECT ULE Technology Overview
ULE Technical overview: MAC layer (I)
ULE Technical overview: MAC layer
1) Re-uses DECT spectrum and channel structure
• Technology compatible with DECT voice services (GAP or NG-DECT)
• Expected to coexist with them in base stations
2) Re-uses Physical layer and lower MAC
• Availability of low cost radio parts from the beginning
3) New MAC layer specific of ULE
• New MAC messages and ultra-fast “expedited” procedures allowing combined transmission of signaling and U-plane data in the same packets
4) MAC protected operation with “fast” ARQ • Provides reliable transmission at MAC layer and protects the integrity of the transmission
5) Reverse channel selection strategy (compared to DECT)
• Complete re-design of Channel Selection Algorithms
• The master of channel selection will now be the Fixed Part
5
ULE Technical overview: MAC layer (II)
6) New ULE pilot bearer using the B-field of current dummy bearer(s).
• This field is currently unused, therefore, no additional slots spent
- Contains the following new sub-channels • Aids for fast re-synchronization
• General static broadcast information
• Channel selection information
• Dedicated ULE paging channels
• Connectionless downlink channels (multicast)
7) New “unlocked” strategy
• PP may enter in “deep sleep” state between activity cycles with near all circuits switched off (with loss of synchronization to the base )
8) New U-plane multicast C/L channels
9) New Management algorithms for handling access collisions
6
ULE Technical overview: DLC and NWK layers
DLC layer New DLC service LU14 adding a CCM authenticated encryption layer
• See security description
• Provides sequence numbering and control, flow control, Tx/Rx window handling, and segmentation and re-assembling of higher layer packets.
• C-plane DLC (LAPC) reused from existing DECT
NWK layer Connection Oriented model including CC (Call Control) and MM (Mobility Management) entities
• Reused (with some adaptations) from existing DECT
• Provides a service similar to cellular systems
• Mobility management with Location update, authentication, etc
• Provides C/O end-points with individual virtual circuits (PDP contexts)
• Ideal solution from security point of view and for deployment of multi-cell systems
7
ULE Technical overview: Security
ULE Technical overview: Security
NWK layer authentication based on AES algorithm (128 bit) (introduced in DECT release 2010)
• Provides both PT and FT mutual authentication and Cipher Key generation.
• Split into two security processes in NWK side allowing geographic distribution in home/visited domains.
Authenticated encryption based on CCM* operating at DECT DLC layer
• Based on RFC-3610 and AES 128
• * CCM = Counter with CBC MAC
• * CBC MAC = Cipher Block Chaining Message Authentication Code
• Provides simultaneously strong encryption and continuous mutual authentication without the need of running NWK layer transactions
• Mechanism ideal for the intended application
In short: state of the art security
8
ULE Technical overview: Application layers
Interworking to Application layers
6LoWPAN (IPv6 over ULE) interface standardized by IETF
• RFC currently in draft stage • draft-ietf-6lo-dect-ule-03: Transmission of IPv6 Packets over DECT Ultra Low Energy
• Allows efficient transmission of IPv6 over ULE using 6LoWPAN mechanisms
• Similar and compatible approach to other technologies (IEEE 802.15.4)
• Provides technology transparency to application protocols
Direct Interworking to Application protocols, or transport of other NWK protocols are also possible
9
10
Physical layer and Energy consumption considerations
ULE: Understanding the Physical layer
Physical layer architecture • Physical layer design is critical for energy efficient
• DECT is FDM / TDMA with constant envelope modulation
• Low cost radios
• High efficiency in power amplifiers
• Reduced signal processing needs
• From energy perspective, it is better to use signal protection only when needed (i.e by implementing a good ARQ)
• The power needs of any signal processing should be taken into account and may be the dominant factor in power consumption
• At DECT RF power levels (250 mW) the Tx energy DECT is not the dominating factor in the energy budget.
11
ULE: Understanding the Physical layer (II)
Physical layer operation • The example in next figure is taken from a real implementation of a
sensor sending a short packet of 400 bits at full power (250 mW) and fully acknowledged mode.
• Figure measures the energy used by the implementation
• Radio success case
• It shows the different stages of ULE operation
• 1) sensor activation and internal electronics processing
• 2) The transmission pulse (at full power in the example)
• 3) The several Rx windows
• Used for synchronization, observation of FP broadcasts, channel sensing, (ULE is a “spectrum sensing” technology) and ACK
12
ULE Technical overview: Physical layer
13
ULE: Understanding the Physical layer (III)
Physical layer operation • In the example (single “burst” of 400 bits at full power 250 mW)
• Nominal energy “on the air” of the Tx burst = 0,1 mJ (mili-Joules)
• Real energy used (by this Tx implementation) to send the Tx burst = 0,5 mJ
• Total energy of the operation = 5 mJ
• Analysis:
• The Tx energy (at 24 dBm levels) is not the dominating factor for energy consumption in real implementations.
• DECT is at a transition point where further reductions in the transmission power will reduce the range but will only marginally reduce battery consumption.
• At 0,1 mJ / Tx burst, the technology is suitable for WPANs (i.e wearables), with battery duration dominated by other factors
• Additionally, DECT allows transmission with reduced power, if desired.
14
15
Markets and Applications
ULE: target phase 1 applications
smart Home and smart living applications • (All these applications are supported by current version of the standard)
1) Home automation and energy control
• Remote switches, dimmers and push buttons
• Smart Appliance control
• Smart metering and energy control
• Remote controls
2) Temperature control
• Thermostats, control modules and associated actuators
3) Security and Alarms
• Fire, Glass Break, Flood, CO2, burglary and other alarms
4) eHealth applications
• Medical Alarms / pendants (for elderly and vulnerable people)
• Medical monitor devices (I.e. Heart Rate or blood preasure Monitor)
16
DECT ULE
WiF
Smart Plug Smoke Detector
DECT
ULE Use cases examples
Use case example: fire alarm
17
ULE Use cases examples
Use case example: Home control, thermostats, energy, A/C
18
ULE Use cases examples
Use case example: Energy and appliances management
19
ULE: phase 2 and beyond applications
Additional smart Home applications • Applications with mixed data / voice capabilities
• E,g. Intercoms and pendants with audio capabilities
• Multicast communications and wireless relay stations
Office and Industry automation • Introduction of large multi-cell systems with full mobility
Smart Cities • Short range radio for local communications and metering
• Local communication for security and critical services
Personal Area Networks (WPAN) • Local communication and wearables.
Increased data-rate applications
• Extension up to 5 Mbit/s possible with current DECT technology
20
21
Summary and Conclusions
Ultra Low Energy: Summary
Summary and conclusions
DECT ULE is an state-of-the-art low power radio interface suitable for Home, Personal and Wide Area Networks
Offers an optimal combination of range and power consumption • Optimal range for Home Automation Networks, office and industry automation and
Personal Area Networks
• Reuses DECT radio interface and chipsets, already integrated in Home Gateways
Offers reliable service with MAC and DLC protection and full NWK layer with Mobility Management and Call Control • State-of-the-art security: CCM encryption with AES-128
Technology under ETSI full control: easy to expand to fulfill European needs
DECT ULE should be part of any European Large Scale Pilot project in the areas of smart living, smart Cities, Industry automation and wearables
22
THANK YOU VERY MUCH!
BACKGROUND MATERIAL
DECT worldwide deployment (I)
Current DECT worldwide deployment and frequency allocations
25
DECT worldwide deployment (II)
Current market share of DECT in residential cordless market • Source: DECTforum
26
Extra slides (technical)
MAC data transfer (example) • Single burst data transfer: PP traffic only - success use case -Source: TS 102 939-1
27
RFP PP
access_request_ready_release (BA=IP1)
B field = U-plane packet 1
exp release (Q2=1, BCK=0, BA=no Bfield)
May use a short
slot
Extra slides (technical)
MAC data transfer (example) • Multi burst Data Transfer: FP traffic only (3 U-plane packets) -Success use case -Source: TS 102 939-1
28
RFP PP
access_request release (no B-field)
Bearer_confirm (Q2=1, Q1 = 0, BA=IP1)
ready_for_release (Q2=1, Q1 = 0, BA=IP1)
release (Q2=1, Q1 = 0, BA=no Bfield)
release (Q2=1, BCK=0, BA=no Bfield)
Q1 == Q1 as previous received BA=‘no BField‘ i.e. E-Mux
other (Q2=1, BCK=1, BA= no Bfield)
other (Q2=1, Q1 = 0, BA=IP0)
other (Q2=1, BCK=0, BA= no Bfield)
Send Q1 bit meaning (Q1 or BCK) depends on previously received BA bits (E- or U-Mux Mode)
Q1 may be always
set to 0 when ‚no
BField‘ was
received. Or it
may be used to indicate sliding
collision.
DECT ULE: CCM authenticated encryption
29
U = MIC
c
O(n
)
T
AES-128
in
out
“A”
AES-128
in
out
“B”
CTR
K(128)
IV(128)
I(n) = m
B_0
X_1. X_2...X_n
Padded with ”0”s to 128 bit
multiple
S_1, S_2,...S_n
PAD
S_0
X_1. X_2...X_n
A_0, A_1,...A_n
X_i XOR B_i
* see note 1
CCM Security processes overview
-Source: EN 300 175-7 and TS 102 939-1