Monday, February 6, 2017

Using SDR to Take Control of Your Home Security System

[Dan Englender] was working on implementing a home automation and security system, and while his house was teeming with sensors, they used a proprietary protocol which was not supported by the open source system he was trying to implement. The problem with home automation and security systems is the lack of standardization – or rather, the large number of (often incompatible) standards used to ensure consumers get tied in to one specific system. He has shared the result of his efforts at getting the two to talk to each other via his project decode345.

The result enabled him to receive signals from Honeywell’s 5800 series of wireless products and interface them with OpenHAB — a vendor and technology agnostic open source automation software. OpenHAB offers “bindings” that allow a wide variety of systems and hardware to be integrated. Unfortunately for [Dan], this exhaustive list does not yet include support for the (not very popular) 345MHz protocol used by the Honeywell 5800 system, hence his project.

The hardware used is plain vanilla – a cheap SDR dongle connected to a Raspberry Pi 3. His code, available on Github, along with OpenHAB, are lightweight enough to run comfortably on the Pi 3. The software side is a bit involved, and his blog post walks you through the code as well as the process he used to accomplish this. The Python- and C-based decoder captures the sensor signals. The sensors states are then sent to OpenHAB (in his case), but can probably be used with other systems too.

And since he wasn’t familiar with RF, SDR’s, Python, GNUradio and all the other bits that he used, he ended up in a lot of blind alleys. This is useful because his resulting blog is a nice walk through for anyone attempting something similar, providing handy tips and pointing out potential pitfalls. Despite trying a lot, he could not get gnuradio to demodulate the transmissions received from his sensors, so he rolled out his own decoder in Python, which makes for some interesting reading about how he reverse-engineered the protocol. Once over the hill, the final part of sending the received data via the Paho MQTT broker to OpenHAB was pretty simple.

If you have some suggestions on how he can optimise his code or use an embedded device such as the Texas CC1101 instead of the SDR, he’s all ears.


Filed under: radio hacks, security hacks

via radio hacks – Hackaday http://ift.tt/2jWmKnh

No comments:

Post a Comment