Evaluation of Wireless Home Automation Technologies for Smart Mining Camps in Remote Western Australia

  • A. J. Dinusha Rathnayaka
  • Vidyasagar M. Podar
  • Samitha J. Kuruppu
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 12)


Remote Western Australian (WA) is featured with harsh environmental and living conditions, but extremely rich soil with large mineral deposits. Mining companies have invested immensely in those areas, and mining camps have been constructed with thousands of Single Person Quarter (SPQ) units to fulfill mining worker accommodation. Major challenge faced by SPQ suppliers is improving the quality of life of the workers, while minimizing the energy cost. In recent years, Wireless Home Automation (WHA) has become an ideal choice for SPQs to achieve these targets. In this paper we perform one of the initial steps of the feasibility study of integrating WHA to SPQs. Generally in a WHA network, wireless sensors and actuators intelligently interconnect with each other through a suitable WHA technology. This paper evaluates different WHA technologies to find out the most suitable technology to implement WHA specifically for SPQs based on the practical requirements outlined by our industry collaborator, who is an Australian mobile accommodation company, supplying smart SPQs to mining camps.


Communication Range Forward Error Correction Cyclic Redundancy Check Home Automation Western Australian 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Holroyd, P., Watten, P., Newbury, P.: Why Is My Home Not Smart? In: Lee, Y., Bien, Z.Z., Mokhtari, M., Kim, J.T., Park, M., Kim, J., Lee, H., Khalil, I. (eds.) ICOST 2010. LNCS, vol. 6159, pp. 53–59. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  2. 2.
    Garg, V.: Wireless communications and networking. Morgan Kaufmann (2007)Google Scholar
  3. 3.
    Frehill, P., Chambers, D., Rotariu, C.: Using Zigbee to Integrate Medical Devices. In: 29th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS 2007, August 22-26, pp. 6717–6720 (2007)Google Scholar
  4. 4.
    Mao-Cheng, H., Jyun-Ciang, H., Jing-Cyun, Y., Gwo-Jia, J.: The Wireless Sensor Network for Home-Care System Using ZigBee. In: Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007, November 26-28, pp. 643–646 (2007)Google Scholar
  5. 5.
    Egan, D.: The emergence of ZigBee in building automation and industrial control. Computing & Control Engineering Journal 16(2), 14–19 (2005)CrossRefGoogle Scholar
  6. 6.
    Gomez, C., Paradells, J.: Wireless home automation networks: A survey of architectures and technologies. IEEE, Communications Magazine 48(6), 92–101Google Scholar
  7. 7.
    Jin-Shyan, L., Yu-Wei, S., Chung-Chou, S.A.: Comparative Study of Wireless Protocols: Bluetooth, UWB, ZigBee, and Wi-Fi. In: 33rd Annual Conference of the IEEE Industrial Electronics Society, IECON 2007, November 5-8, pp. 46–51 (2007)Google Scholar
  8. 8.
  9. 9.
    JFR, Z-Wave Protocol Overview. Technical report. Zensys, Z-Wave (2006)Google Scholar
  10. 10.
    Sriskanthan, N., Tan, F., Karande, A.: Bluetooth based home automation system Microprocessors and Microsystems. Microprocessors and Microsystems 26, 281–289 (2002)CrossRefGoogle Scholar
  11. 11.
    Mulligan, G.: The 6LoWPAN architecture. In: 4th Workshop on Embedded Networked Sensors, CorkIreland, pp. 78–82 (2007)Google Scholar
  12. 12.
    Darbee, P.: INSTEON: The Details. Technical report (2005)Google Scholar
  13. 13.
  14. 14.
    Oppermann, I., Hämäläinen, M., Iinatti, J.: UWB theory and applications (2004)Google Scholar
  15. 15.
    Smith, R.J.: WiFi home networking. McGraw-Hill Companies (2003)Google Scholar
  16. 16.
  17. 17.
    Aboudi, M., Talevski, A.: Environmental Sustainability and Improved Quality of Life through Service Convergence Technologies. In: 24th IEEE International Conference on Advanced Information Networking and Applications, Australia, pp. 982–987 (2010)Google Scholar
  18. 18.
    Nadeem, N., Javed, M.: Performance Comparison of Data Encryption Algorithms. In: First International Conference on Information and Communication Technologies, Pakisthan, pp. 84–89 (2005)Google Scholar
  19. 19.
    Shaked, Y., Wool, A.: Cryptanalysis of the Bluetooth E0 Cipher Using OBDD’s. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 187–202. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  20. 20.
    Castagnoli, G., Brauer, S., Herrmann, M.: Optimization of cyclic redundancy-check codes with 24 and 32 parity bits. IEEE Transactions on Communications 41, 883–892 (2002)CrossRefGoogle Scholar
  21. 21.
    Castagnoli, G., Ganz, J., Graber, P.: Optimum cycle redundancy-check codes with 16-bit redundancy. IEEE Transactions on Communications 38, 111–114 (2002)CrossRefGoogle Scholar
  22. 22.
    Zorzi, M.: Performance of FEC and ARQ error control in bursty channels under delay constraints. In: 48th IEEE Vehicular Technology Conference, Vienna, pp. 1390–1394 (2007)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • A. J. Dinusha Rathnayaka
    • 1
  • Vidyasagar M. Podar
    • 1
  • Samitha J. Kuruppu
    • 1
  1. 1.Digital Ecosystems and Business Intelligence InstituteCurtin University of TechnologyPerthAustralia

Personalised recommendations