Font Size: a A A

The Design And Implementation Of Security Strategy In Intelligent Home Based On BACnet

Posted on:2006-03-05Degree:MasterType:Thesis
Country:ChinaCandidate:L LiuFull Text:PDF
GTID:2178360182469813Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the development of economy and informatization, the requirements of intelligent home are increasing. The security system of intelligent home becomes the important guideline of system reliability and superiority. In security system, being the core of alarm and joint-act, security strategy incarnates the stability and reliability of the security system. BACnet, the international standard communication protocol in building automation control networks, leads the developing direction of intelligent home. It is practical to introduce the BACnet protocol into the security system in itelligent home, with optimistic market forecast. First, the paper introduces the development of intelligent home, and analyzes the structure, characteristic and advantage of BACnet protocol, then explains the important meaning of introducing the BACnet protocol into the security system in itelligent home, and gives the advantage of security strategy based on BACnet. The paper gives the structure design of the intelligent home control system and security system, and explains the objects management and alarm mechanism in detail. On the basis of these, by analyzing the requirement of intelligent home security, this paper gives the framework of security strategy and analyzes the run modes of security strategy. The security strategy modules on security controller and HIC(Home Information Control) are explained in detail. Then, the detailed design of security strategy on security controller and HIC is proposed, discussing the design of strategy data structure, the detailed explanation of strategy configuration, schedule matching, downloading and update. After that, the key modules of security strategy are tested, providing the test results. These results show that the design of strategy makes it. Finally, conclusions of the study are presented, pointing out the insufficiencies in my study and giving some propositions of the further study.
Keywords/Search Tags:BACnet, Security system, Security strategy, Alarm, Joint -act
PDF Full Text Request
Related items