CIO Influence
AIOps CIO Influence News Networking

GBT is Developing an Application-Specific, Secured, Wireless Protocol for Tracking System Implementation

GBT is Developing an Application-Specific, Secured, Wireless Protocol for Tracking System Implementation
Ensuring advanced cybersecurity protection for a tracking application based on GBT’s Long Range Radio System

GBT Technologies Inc, is now commence development of an application-specific, secured, wireless protocol for tracking implementation of its Infinia Radio System. The Infinia, Long Range Radio System is operating via HF and NVIS (Near vertical incidence skywave) skywaves radio propagation. One of the efficiency factors is implementation of a smart tracking system, AI controlled as a private, secured wireless protocol to ensure high level of cybersecurity and protection against unauthorized (jamming) data access.

Infinia Radio System is aiming to deliver a high bandwidth data signals, while GBT is working to protect critical network communications data, maintaining interoperability among the system’s components at all operation levels. As any typical wireless network, by its nature, is vulnerable to security risks. The company decided to increase the cybersecurity level to protect sensitive information transmitted over the system’s communications; particularly, with tracking applications.

Top iTechnology Networking News: AttackIQ Expands Leadership Team with Appointment of Ken Schock as Chief Revenue Officer

The keys to protecting sensitive operational radio transmissions is to deploy advanced encryption system to ensure information is adequately protected from intrusions. The company will evaluate standards and compliant algorithms such as the Advanced Encryption Standard (AES) that enables maximum interoperability, while providing high levels of protection. AES technology includes cryptographically strong algorithms, and is considered to be one the most effective ways to protect sensitive information from being compromised. Although key lengths of 128-bit and 192-bit are considered highly efficient, we will evaluate the use of 256-bit key length or higher for data blocks encryption. The company plans to integrate its AI technology to manage the security protocol execution, and performing an on-going scan to detect and eliminate possible breaches.

“As we are working on designing a tracking application using our Infinia, Long Range Radio, a high level of cybersecurity technology is needed to protect its sensitive data. Along with high performance network operation requirement extra attention is needed to protect the network’s data; particularly, with tracking system implementation. We plan to evaluate few encryption methods among then is an AES based algorithm. The Infinia System is comprised of radio operated components, including base, mobile and repeater units, we plan to ensure a secured, adequate network interoperability functionality. Data encryption algorithms have the capability of preventing unauthorized disclosure of sensitive information, yet, it’s not enough. Especially, with today’s wireless networks vulnerabilities we plan to integrate our AI system to manage and supervise the security protocol. Additionally, the intelligent system will be performing on-going scanning, constantly searching for possible intrusion or unauthorized access. In light of today’s wireless networks potential security risks and interoperability challenges, a machine learning cryptography module will be protecting the internal network communication with high performance and reliability,” said Danny Rittman, the Company’s CTO.

There is no guarantee that the Company will be successful in researching, developing or implementing this system. In order to successfully implement this concept, the Company will need to raise adequate capital to support its research and, if successfully researched and developed, the Company would need to enter into a strategic relationship with a third party that has experience in manufacturing, selling and distributing this product. There is no guarantee that the Company will be successful in any or all of these critical steps.

Top iTechnology Cloud News: Tableau Pledges to Train 10 Million Data People

[To share your insights with us, please write to sghosh@martechseries.com]

Related posts

Keysight Secures First 5G RedCap Test Case Validations

Business Wire

Red Hat Expands Capabilities to Provide Streamlined Application Development and Delivery in the Cloud

iconectiv Simplifies Network Planning, Enhances Operational Efficiency for Communication Service Providers

Business Wire

Leave a Comment