<div dir="ltr">That's a good start. I would suggest the following for specialised use cases (where people are possibly happy to pay more):<div><br></div><div>3) Have some sort of movement detection so that the sensor can send an event if it is moved. This can be essential for sensors in industrial environments where it is essential to ensure that once the sensor is installed it is not moved. The typical example we've seen is industrial cold storage where sensors are installed to prove that the temperature in the fridge is always within legal limits. One typical tampering in such cases is to move the sensor from one "problematic" fridge to a less problematic one.</div><div><br></div><div>4) Have a way to keep the device powered for a few seconds when batteries are removed so that a "battery removed" event can be sent before dying altogether. The concentrator itself could auto-detect sensors that stop sending data but when that happens it can be for a number of reasons, some of them completely legit.</div><div><br></div><div>In addition, the following metrics could help a concentrator / data platform identify sensors that need attention before something bad happens:</div><div>- battery voltage: can then be used to predict when replacement is needed,</div><div>- data link quality: can then be used to identify sensors with weak connections that are at risk of disconnection.</div><div><br></div><div>Bruno</div><div><br></div></div><div class="gmail_extra"><br><div class="gmail_quote">On 12 June 2015 at 08:50, Damon Hart-Davis <span dir="ltr"><<a href="mailto:dhd@exnet.com" target="_blank">dhd@exnet.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Hi,<br>
<br>
My current thought, where we need to verify at some future point that sensor data points have not been tampered with, that we do the following:<br>
<br>
1) Use the authentication mechanism between leaf/sensor and concentrator to confirm that data got to the concentrator intact.<br>
<br>
2) Have the concentrator by default sign with a private key (for which the public part is retained) any incoming data that it has authenticated as above.<br>
<br>
So the leaf does not have to support keys good enough for long-term use for example.<br>
<br>
Rgds<br>
<br>
Damon<br>
_______________________________________________<br>
OpenTRV-dev mailing list<br>
<a href="mailto:OpenTRV-dev@lists.opentrv.org.uk">OpenTRV-dev@lists.opentrv.org.uk</a><br>
<a href="http://lists.opentrv.org.uk/listinfo/opentrv-dev" rel="noreferrer" target="_blank">http://lists.opentrv.org.uk/listinfo/opentrv-dev</a><br>
</blockquote></div><br></div>