Alternative Methods for Secure ATG Communication
By ARUME
Let’s look at what alternative methods of secure communication are available, considering the pros and cons of what is available:
Beyond TCP/IP Polling
We previously discussed the vulnerabilities of TCP/IP serial converters due to their reliance on polling (constantly asking for updates).
Alternative Communication Methods:
Simple Call-Out Devices
-
Benefits:
- Eliminate the need for constant listening (unlike polling).
- May not require static IP addresses or router configuration (reducing setup complexity).
- More secure than TCP/IP polling in some cases.
-
Drawbacks:
- Limited flexibility: Pre-programmed commands restrict what information can be retrieved or actions taken.
- Slower communication: Updates may occur every 15 minutes or longer, limiting real-time data access.
- Security Concerns: Information might not be encrypted, potentially vulnerable to interception (DNS spoofing).
Cellular Networks
-
Benefits:
- Secure communication due to the nature of cellular networks, especially compared to non-secure methods like TCP/IP polling.
-
Drawbacks:
- Rapidly Outdated Hardware: Frequent technology upgrades (2G, 3G, 4G, 5G) necessitate constant hardware replacement.
- Inconsistent Signal Strength: Cellular reception may be weak at some tank gauge locations, especially in remote areas.
- High Data Costs: Cellular data plans in the US are expensive compared to other countries, limiting frequent communication.
- Smaller Potential Coverage Area: compared to other solutions that rely on existing internet connections.
- Limited Communication Frequency: Cellular devices may only send updates every 15-30 minutes due to cost constraints.
Kachoolie Core
Kachoolie addresses the limitations of other methods by:
- Outbound communication only: Eliminates the need for constant listening and reduces points of vulnerability.
- Continuous communication: Sends updates every 30 seconds, enabling real-time data access.
- Real Time two way communication: The server acknowledges each message. The acknowledgement contains instructions for the Kachoolie. Operation is dynamic and not limited to pre-programmed commands.
- Encrypted communication: Ensures data security during transmission.
- Server device encrypted authentication: Even more security. Only messages from authenticated Kachoolies are accepted.
- Simple installation: Plug and play installation by anyone in 30 minutes and doesn't require complex router configuration or a public static IP address.
Cellular networks and simple call-out devices are better than TCP/IP polling, but do they fit your specific needs? Explore all your options to ensure a secure and efficient ATG communication system.