Network Installers

To begin with, the Wittra products build on well-established IoT standards, for secure, robust, and future-proof solutions. Furthermore, they enable an Internet of Things vision where battery-powered, self-managed devices connect to the Internet directly, with the ability to sense and be tracked.

Mioty Tag

The Mioty tag implements the Mioty Alliance’s standard stack, enabling scalable long-range communication with high resilience to interference.

At the core of the technology lies the innovative Telegram Splitting Multiple Access (TSMA), defined by ETSI. Mioty tags split their messages into multiple small telegrams sent over different frequencies. This, combined with Forward Error Correction, allows for data recovery in the most challenging environments. Mioty is also mobility-friendly (able to operate at 120 km/h). Per-device AES encryption and authentication secures all communication.

WiTTRA Sense 360

The WiTTRA Sense 360 is based on a 6LoWPAN stack that enables IPv6 low-power wireless meshing. The standards involved mean that we can build the product on well-proven technology and that it can integrate into existing ecosystems.

IEEE 802.15.4. At the radio access layer, IEEE 802.15.4 provides 50 kkps connectivity over subGHz frequencies (both 868 MHz and 915 MHz) at low power.

Wi-SUN. Over IEEE 802.15.4 comes Wi-SUN, providing regulatory-compliant frequency hopping across multiple regions (EU & US). Frequency hopping is key in achieving robust communication regardless of the interference profile of any deployment.

6LoWPAN. At the network layer, IETF 6LoWPAN equips devices with IPv6 Internet connectivity. This is achieved via online compression and fragmentation, adapting IPv6 to the challenging requirements of low-power wireless links.

RPL. IETF RPL builds a mesh network where wireless mesh routers can extend connectivity beyond that of a single radio link. The protocols are self-healing and hence suitable for deeply embedded applications.

DTLS. For security, IETF DTLS establishes end-to-end AES encryption and authentication. As a result, this provides confidentiality and integrity to all sensor and position data posted to the database. DTLS is an Internet-class, state-of-the-art security protocol. 

CBOR. Finally, application data is represented as IETF CBOR, a compact binary format now widespread in Internet of Things scenarios.

Do you have any questions about our IoT standards?

Finally, feel free to get in touch with us here at Wittra if you have any questions regarding our standards. You can do so here at our contact page.