Frequently Asked Question

How is sensor data protected during wireless transmission?
Last Updated 3 years ago

ProTAACS’s X-Series wireless products use ProTAACS’s new Encrypt-RF bank level security, featuring a 256-bit exchange to establish a global unique key, and an AES-128 CTR for all data messages. So security is maintained at all communication points from sensor to gateway, gateway to software, and back again.

ProTAACS’s standard wireless products use several features to help protect sensor data in transit. Our proprietary sensor protocol uses very low transmit power and requires specialized radio equipment to operate. Typical wireless devices that operate on non-proprietary communication protocols (Wi-Fi, Bluetooth, Zigbee) operate using different frequency bands so they can’t be used to eavesdrop on the radio communications from the ProTAACS family of sensors. In addition we use a robust packet tampering evaluation routine to ensure that traffic wasn’t altered between the sensors and the gateways. This enables us to check for well-formed data packets that only originated from ProTAACS enabled devices. To further protect data we have algorithms that protect against spoofing and re-transmission of wireless data packets. This is included with the best in class range and power consumption protocol developed for ProTAACS wireless sensor systems.

Please Wait!

Please wait... it will take a second!