How is sensor data protected during wireless transmission?
  • Application data is 18 bytes in length, and the total TX packet size is 40 bytes. The wireless communication technology developed by ProTAACS provides several features to help protect your data in transit. Our proprietary sensor protocol uses very low transmit power and requires specialized radio equipment to operate.
  • Typical wireless devices that operate on non-proprietary communication protocols (Wi-Fi, Bluetooth, Zigbee) operate using different frequency bands so they can't be used to eavesdrop on the radio communications from the ProTAACS family of sensors. ProTAACS also uses a robust packet tampering evaluation routine to ensure traffic wasn't altered between sensors and gateways.
  • This enables us to check for well-formed data packets that only originated from ProTAACS enabled devices. To further protect data, we use algorithms to protect against spoofing and re-transmission of wireless data packets. This is included with best-in-class range and a power consumption protocol developed for ProTAACS wireless sensor systems.

How secure is the communications on the wireless network?
  • ProTAACS uses the same encryption methods used by websites to transmit financial data.  Secure socket layer (SSL) protocol is employed with 256-bit data encryption making data hosted on your network secure.
Proper Orientation of Wireless Antennas and Sensor Position
How To Orient Your Antennas and Sensor Position for Optimal Range and Performance ...
Optimizing Your Wireless Sensor Network
When dealing with wireless sensor networks, there are a lot of factors that affect the quality and reliability of transmission signals between your se...
Leave a comment

Please login or register to review