What do we Offer
Protocols Support
Choosing the right sensor depends on the network type, range of operation, data transfer rate, accuracy (resolution), total cost, interfacing method and documentation among other things. For this, our entire gamut of protocol services includes a unified product development portfolio enabling protocol stack selection, IO data configuration, communications configuration and pre-compliance for certification. Our extensive range of connectivity solutions and stack porting for wired and/or wireless support for HART, IO-Link, Modbus, CAN and APL help sensor system designers successfully meet the ever-increasing needs of connectivity.
Wireless Support
Software
Energy Harvesting
ATEX Support
Visualization and Analytics
Verification and Validation
Precision and reliability of sensors is of paramount importance – complete process health depends on this. Our embedded V&V services test the sensor’s adherence to the country specific directives (ex: ATEX, CE, etc.). We also provide support for pre-compliance and certification processes. Varied communication protocols and networks, diverse physical environment, integrated control and automation systems among others affect the quality, performance and calibration of sensor data. We test these with our customized tool including home-grown frameworks and simulators.
Device Integration
The present industrial automation landscape is filled with intelligent sensor devices integrated into the control and automation systems to provide industry processes with real-time optimization and self-maintenance capabilities. Handling assorted sensor data from multiple field device sources requires a clearly defined and implemented device integration strategy. At Utthunga, our sensor technology expertise is complemented by our knowledge of EDDL, DTM and FDI Device Package development and certification/registration support. Our device integration services extend to the next-gen FITS (FDT 3.0) consultation and mobile based development and support.
Security
IIoT sensors for monitoring and control are the backbone of all industrial processes. Sensor nodes are susceptible to design, implementation and deployment vulnerabilities with increased digitalization ranging from physical modification on the device itself to remote attacks via communication channels. Our security layers are purposely built into the devices, network and cloud, considering the base/runtime/software/hardware security of the nodes and other components. Adhere to IIC Endpoint Security Best Practices, OWASP Embedded Application Security & FIPS 140-2 standards. We also integrate COTS cybersecurity solutions to mitigate sensor network risks, implement Trusted Platform Module (TPM) modules via encrypted TLS for secure booting and firmware update of the sensor network.