
Sensor networks for Smart Nation(homes)
出版:SG-SPRING SG

专家解读视频
This TR provides the framework and a minimum set of communication and application interface standards for the development and deployment of sensor networks for homes in Singapore. It covers the following areas:\na set of core requirements for sensor network framework for homes which enables the provision of services for Smart Nation;\na minimum set of coherent international or industry standards for interface interoperability for the various functional layers of the sensor networks for homes that supports a variety of applications across multiple agencies and industries and is suitable for deployment on a national scale:\nwired and wireless protocols between home sensor gateway and devices;\nhome sensor gateway and sensor network integration platform;\nsensor network integration platform and sensor applications; and\nsecurity considerations and recommended security controls for home sensor networks.\nAdopting a common set of communication, application interface and information security standards for the sensor network will facilitate the interoperability of the devices and sensors from different manufacturers.\nThe following are not within the scope of this TR as it:\n- is not a smart home deployment guide for setting up home sensor networks (i.e. not a how-to guide);\n- is not a functional specification for services (e.g. data fusion, data modelling, data exchange) to be provided by sensor networks for homes for Smart Nation;\n- does not recommend a specific commercial application toolkit or framework to setup home sensor networks;\n- does not attempt to list all requirements and applicable scenarios to build a smart home;\n- does not attempt to improve or resolve disparities or shortcomings among transmission, technologies, protocols, or application languages;\n- does not define the roles and responsibilities of the parties involved in setting up, utilising or managing the home sensor networks or mandate which party should take ownership of the day-to-day operations and maintenance (including security) of the networks;\n- does not address potential attacks using sophisticated electromagnetic jamming or interference techniques; and\n- does not address security controls for public, regulated telecommunications networks.