Alternative Methods for Secure ATG Communication

By ARUME

Let’s look at what alternative methods of secure communication are available, considering the pros and cons of what is available:

Beyond TCP/IP Polling

We previously discussed the vulnerabilities of TCP/IP serial converters due to their reliance on polling (constantly asking for updates).

Alternative Communication Methods:

Simple Call-Out Devices

  • Benefits:

    • Eliminate the need for constant listening (unlike polling).
    • May not require static IP addresses or router configuration (reducing setup complexity).
    • More secure than TCP/IP polling in some cases.
  • Drawbacks:

    • Limited flexibility: Pre-programmed commands restrict what information can be retrieved or actions taken.
    • Slower communication: Updates may occur every 15 minutes or longer, limiting real-time data access.
    • Security Concerns: Information might not be encrypted, potentially vulnerable to interception (DNS spoofing).

Cellular Networks

  • Benefits:

    • Secure communication due to the nature of cellular networks, especially compared to non-secure methods like TCP/IP polling.
  • Drawbacks:

    • Rapidly Outdated Hardware: Frequent technology upgrades (2G, 3G, 4G, 5G) necessitate constant hardware replacement.
    • Inconsistent Signal Strength: Cellular reception may be weak at some tank gauge locations, especially in remote areas.
    • High Data Costs: Cellular data plans in the US are expensive compared to other countries, limiting frequent communication.
    • Smaller Potential Coverage Area: compared to other solutions that rely on existing internet connections.
    • Limited Communication Frequency: Cellular devices may only send updates every 15-30 minutes due to cost constraints.

Kachoolie Core

Kachoolie addresses the limitations of other methods by:


  • Outbound communication only: Eliminates the need for constant listening and reduces points of vulnerability.
  • Continuous communication: Sends updates every 30 seconds, enabling real-time data access.
  • Real Time two way communication: The server acknowledges each message. The acknowledgement contains instructions for the Kachoolie. Operation is dynamic and not limited to pre-programmed commands.
  • Encrypted communication: Ensures data security during transmission.
  • Server device encrypted authentication: Even more security. Only messages from authenticated Kachoolies are accepted.
  • Simple installation: Plug and play installation by anyone in 30 minutes and doesn't require complex router configuration or a public static IP address.

Cellular networks and simple call-out devices are better than TCP/IP polling, but do they fit your specific needs? Explore all your options to ensure a secure and efficient ATG communication system.