Generation 1 • Board V4

Secure Wireless
Relay Control

Industrial wireless control system enabling secure, authenticated switching of solid-state relays over Sub-GHz radio links with ECDH encryption and AES-CMAC authentication.

915
MHz ISM Band
P-256
ECDH Curve
2
SSR Channels
22
dBm Max TX
TX/RX Pair System
Connected
Encrypted
PLL Lock
Core Capabilities

Industrial-Grade Features

Built for critical applications requiring secure, reliable wireless control.

Sub-GHz LoRa Radio

Long-range communication in the 915 MHz ISM band. Better penetration and range than 2.4 GHz alternatives.

Frequency 902-928 MHz
TX Power 14-22 dBm

ECDH + AES-CMAC

Hardware-accelerated P-256 key exchange. Every packet authenticated with truncated CMAC tags.

Key Exchange ECDH P-256
MAC AES-256-CMAC

PLL-Synchronized TDMA

Software phase-locked loop for precise timing synchronization. Adaptive beacon intervals based on link state.

Active Beacon 354 ms
Timing Accuracy ±1 ms

Dual SSR Outputs

Two independent solid-state relay outputs per unit. Status reported in every acknowledgment packet.

Channels 2 per unit
Control Active HIGH

PinSync Wireless I/O

Three bidirectional I/O lines for wireless level shifting. Board V4 exclusive feature.

I/O Lines 3 bidirectional
Direction Toggle switch

VISA/SCPI Ready

Desktop service with REST API, WebSocket telemetry, and native NI-MAX/LabVIEW integration.

HTTP localhost:8081
VISA localhost:5025
Technical Specifications

Built for Industrial
Reliability

Every parameter derived from firmware documentation and verified against source code. No invented specifications.

Full Specifications

Radio

Frequency 915 MHz
Bandwidth 125-500 kHz
SF 7-12
Power 14-22 dBm

Security

Key ECDH P-256
MAC AES-CMAC
Tag Size 4 bytes
Accelerator STM32WL PKA

Timing

Active 354 ms
Idle 5000 ms
Handshake 500 ms
ACK Timeout 500 ms

Physical

SSR Outputs 2
Buttons 2
LEDs 5
PinSync I/O 3
Cryptographic Security

Industrial-Grade Security

Unpaired devices cannot control SSR outputs. Every packet is cryptographically authenticated.

1

ECDH Key Exchange

One-time pairing using P-256 curve. Public keys exchanged over 11 radio packets, shared secret stored in flash.

2

Session Establishment

Previously paired devices reconnect with SESSION_START/CONFIRM handshake. Session key derived per connection.

3

Per-Packet Authentication

Every operational packet includes 4-byte truncated CMAC. 8-bit sequence numbers prevent replay attacks.

Security States

NO_KEY
Not paired with any device
PAIRING
ECDH handshake in progress
BONDED
Paired but not connected
CONNECTED
Authenticated active link
Applications

Built for Your Use Case

From button-initiated control to automated test systems, WiEPOUT-G1 adapts to your workflow.

🎛️

Wireless Relay Control

User presses button on TX unit to toggle SSR outputs on RX unit. CMAC-authenticated commands with confirmed ACK responses.

Primary Use Case • Button-initiated
💻

Host-Controlled Operation

Host PC sends UART commands to TX unit, which relays them wirelessly to RX. REST API, WebSocket, and VISA/SCPI interfaces available.

Secondary • Automated testing
🔌

Wireless I/O Sync

Toggle switch changes synchronize wirelessly between TX and RX units. Functions as a "wireless level shifter" for discrete I/O.

Board V4 • PinSync feature

Ready to Get Started?

Contact us for pricing, technical consultation, and volume discounts on WiEPOUT-G1 systems.