Changing the Landscape - Wireless intrusion makes a big splash in commercial applications

Changing the Landscape

Wireless intrusion makes a big splash in commercial applications

In the past, wireless intrusion systems typically have not been the first choice for commercial applications in North America. Wireless intrusion solutions have been perceived as complicated systems with time-consuming installs, and the possibility for strong interference and constant on-site maintenance. However, as technology continues to advance, it has changed the landscape of wireless intrusion and opened the door for commercial applications—making wireless intrusion not only a viable option, but an ideal solution.

Interference and Privacy

Reliability and interference are long-standing concerns with wireless installations for commercial users with people and assets to protect, but evolutions in the technology have addressed many of these concerns. Frequency hopping, an advancement in technology, enables for coverage of larger areas with fewer repeaters, stronger communication and better signals.

Frequency hopping allows an intrusion device, such as a motion detector, to hop around channels within the specified frequency at a constant pace to find the clearest signal, making it difficult to hack or penetrate because it’s constantly moving. It takes a large frequency band, such as the 912-918 MHz band, and divides that into 50 channels, meaning less interference and increased robustness.

Adaptive path technology then finds the most efficient path to the intrusion panel so that, together with frequency hopping, devices always communicate optimally. With adaptive path technology, if the repeater or path in which the device is talking to the panel becomes blocked or disrupted, the device will automatically find the easiest and best path to speak with the panel without third-party troubleshooting. With a high transmission range, reliable wireless communication, transmission of images and audio clips can be achieved within / up to 2km / 2187 yards-line-of-sight. These technologies work together to ensure alarm events are not missed or misread, while extending the range of the signal.

In addition, although 128-bit encryption is nothing new in the intrusion space, coupling 128-bit encryption with frequency hopping adds another line of defense when it comes to privacy, particularly for commercial applications that are concerned with hackers or other impedances. This proven frequency technology is also used by Bluetooth technology and is part of 4G, the fourth generation of mobile telecommunications technology used in mobile devices today. These technologies together mean such systems are sniff proof.

Two-way Communication

Another advancement that has made wireless intrusion systems a successful solution for the commercial market is two-way synchronous communication (TDMA). With traditional one-way devices, an alarm device sends a signal to the panel, saying it detected motion, for example. There is no communication between the two, and there is no way to know if the panel received the signal. Two-way devices allow for back and forth communication.

TDMA communication makes for an ideal commercial solution because there is less noise and each device can talk and understand each other without talking at the same time, particularly useful for applications with a significant number of devices. Ordered time slots for each device minimize collisions between signals and allow for more devices in an application.

But, not all two-way communication works flawlessly. While a stronger bond is created between devices with two-way communication, strong interference, such as created by other devices and equipment in the area, can create issues. That’s where dividing a large frequency band into multiple channels teamed with 128-bit encryption, ensures reliability and privacy.

Installation and Maintenance

Privacy and reliable communication are a must for commercial intrusion applications, but perhaps just as important is the installation and maintenance of the systems, which add to every business or location’s bottom line. Advancements in wireless intrusion have addressed these issues as well, making such systems desirable for commercial applications.

During the maintenance and troubleshooting phases of a project, full two-way communication comes in handy. The panel can give commands to each device, rather than only being able to accept a signal from it, and opens the door for powerful diagnostics and total remote management.

In addition, the adaptive path nature of cutting-edge wireless intrusion systems is a benefit not only during everyday use, but during installation and changes or renovations to a site. Installers no longer have to wait to install devices until an entire site has been completed or renovated and all equipment has been put in. In the past, problems could arise when a motion detector or other intrusion device was placed in a building and then renovations were completed or new machinery was installed that later caused disruption or interference with the alarm signals.

With new technology, intrusion systems can be installed at any phase of a construction project, because the devices will automatically troubleshoot transmission problems to speak with the panel.

Traditionally, installing large numbers of intrusion devices for a commercial application has been time-consuming and complicated, requiring the installer to go to each device, manually enroll it and determine whether the panel can hear it. Newer technology allows installers and end users to do all this remotely. Installers can adjust and check on initial settings, troubleshoot sensitivity levels and diagnose problems, without having to go to each device in person.

A quick enroll process displays a placement test right on each device during installation so that the installer can see via an LED light what the signal quality is without checking placement results on the keypad. Technology such as this saves both installer and end user time and money, as well as faster troubleshooting and less down time.

The Green Factor

A secondary benefit to the efficiency of all these advancements, including adaptive path technology and frequency hopping, is significant battery savings. Because the intelligent intrusion devices find the easiest and closest way to speak with the panel, battery power isn’t wasted on inefficient paths of communication or signals that go nowhere.

Technology allows for battery savings by using less power with standard batteries, so commercial users don’t have to spend additional money on high-capacity batteries, just to see longer battery life. Battery life ranges from five to eight years, depending on the device.

Gone are the days when commercial applications shied away from wireless intrusion because of interference issues, communication problems, complicated installations or frequent troubleshooting. All of these technology improvements, including the convenience of easier maintenance and troubleshooting, battery savings, and of course, highly reliable devices, have made wireless intrusion systems a strong contender for commercial applications.

This article originally appeared in the March 2015 issue of Security Today.

Featured

  • 2025 Security LeadHER Conference Program Announced

    ASIS International and the Security Industry Association (SIA) – the leading membership associations for the security industry – have announced details for the 2025 Security LeadHER conference, a special event dedicated to advancing, connecting and empowering women in the security profession. The third annual Security LeadHER conference will be held Monday, June 9 – Tuesday, June 10, 2025, at the Detroit Marriott Renaissance Center in Detroit, Michigan. This carefully crafted program represents a comprehensive professional development opportunity for women in security this year. To view the full lineup at this year’s event, please visit securityleadher.org. Read Now

    • Industry Events
  • Report: 82 Percent of Phishing Emails Used AI

    KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, today launched its Phishing Threat Trend Report, detailing key trends, new data, and threat intelligence insights surrounding phishing threats targeting organizations at the start of 2025. Read Now

  • NRF Supports Federal Bill to Thwart Retail Crime

    The National Retail Federation recently announced its support for the Combating Organized Retail Crime Act of 2025. The act was introduced by Chairman Chuck Grassley, R-Iowa, Senator Catherine Cortez Masto, D-Nev., and Representative Dave Joyce, R-Ohio. Read Now

  • ISC West 2025 Brings Almost 29,000 Industry Professionals to Las Vegas

    ISC West 2025, organized by RX and in collaboration with the Security Industry Association, concluded at the Venetian Expo in Las Vegas last week. The nation’s leading comprehensive and converged security event attracted nearly 29,000 industry professionals and left a lasting impression on the global security community. Over five action-packed days, ISC West welcomed more than 19,000 attendees and featured 750 exhibiting brands. Read Now

    • Industry Events
    • ISC West
  • Tradeshow Work Can Be Fun

    While at ISC West last week, I ran into numerous friends and associates all of which was a pleasant experience. The first question always seemed to be, “How many does this make for you?” Read Now

    • Industry Events
    • ISC West

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.