Back to overview

Trusted Wireless 2.0 technology

Areas of application

For more than 10 years, Phoenix Contact's product portfolio has included wireless technology for industrial use. The proprietary Trusted Wireless 2.0 technology was developed specially for industrial use and is especially appropriate for wireless forwarding of sensor and actuator information and transmission of small-to-medium data volumes in large-scale systems.

Distances of from several hundred meters to several kilometers between wireless devices can be bridged when a clear line of sight exists.

Trusted Wireless 2.0

Trusted Wireless 2.0 – technology the industrial wireless technology

Thus Trusted Wireless 2.0 closes the gap between WirelessHART as a special technology for sensor networks and Wireless LAN high-speed technology. Various setting options are available to adapt it optimally to the requirements of the relevant application.


Trusted Wireless 2.0 focuses on the particular requirements of industrial infrastructure applications. The essential features are:

  • Robust communication thanks to the frequency hopping spread spectrum (FHSS)
  • Automatic and manual coexistence mechanisms for reliable parallel operation of wireless systems
  • Secure data transmission with data encryption and authentication
  • Large ranges due to the high receiver sensitivity and individually adjustable data rates
  • Flexible networks with automatic connection management
  • Optimal adaptability to the relevant application and extensive diagnostic features
  • Distributed network management for accelerated data exchange


Robust and interference-free communication

Frequency hopping method (FHSS)  

Frequency hopping method (FHSS)

Trusted Wireless 2.0 uses the so-called FHSS process (frequency hopping spread spectrum) in the license-free 2.4 GHz frequency band. The technology uses a selection of up to 127 channels from the entire spectrum of the frequency band, which it hops between on the basis of a pseudo-random pattern. This increases the robustness of the communication.

Furthermore, Trusted Wireless 2.0 allows for especially good coexistence management of different wireless systems. By using different RF (radio frequency) bands, several Trusted Wireless 2.0 systems can be operated in parallel without problems. The option also exists to block particular selectively (black listing), e.g. in order to be able to operate WLAN systems in parallel without performance limitations.

The new requirements of the revised EN 300328 v1.8.1 standard for wireless systems in the 2.4 GHz range are also already implemented in Trusted Wireless 2.0.

Reliable transmission

With proprietary technology such as Trusted Wireless 2.0, the protocol is not publicly available, so the technology is fundamentally better protected against attacks. In addition, security mechanisms have been implemented: the 128-bit data encryption ensures that data packets that could be intercepted in theory can not be understood, and integrity verification checks the sender's authenticity and rejects messages that have been altered.

Flexible adaptability options

Trusted Wireless 2.0 offers the option of adjusting the data rate of the wireless interface to increase the receiver sensitivity. With a low data rate you can cover significantly greater distances than with a high data rate. Therefore, the user can choose an appropriate setting based on the application and required range.

Distributed network management

Parent-child zone  

Distributed network management in the parent-child zone

Technologies such a WirelessHART or ZigBee use a central approach to network management. That means that all messages pass through a central master, which can lead to significant wireless network traffic.

Trusted Wireless 2.0 relies on distributed network management. For this purpose, parent-child zones are constructed in the wireless network, where a higher-level wireless module is called the parent and and the modules connected to it here are called children.

All network management takes place within the parent-child zone and does not have to be directed through the central manager. That reduces message traffic throughout the whole network and accelerates data exchange.

Back to overview
Further information


A-58/2, Okhla Industrial Area, Phase - II,
New Delhi-110 020