top of page

Industrial IoT Router Operating System WRTOS -- A tailored router software for Industry, M2M and Rugged communications

  • Admin
  • 2 days ago
  • 10 min read

Updated: 20 hours ago

Table of Contents

  1. Introduction: Why Industrial Communication Needs a Dedicated Operating System

  2. What is WRTOS?

  3. WRTOS Core Architecture

  4. Network Features

  5. Industrial-Grade Reliability Design

  6. Security Mechanisms and Data Protection

  7. Remote Management and O&M Capabilities

  8. Industrial Protocols and Edge Computing

  9. WRTOS vs. Traditional Router Operating Systems

  10. WRTOS Applications in Typical Industries

  11. Summary

  12. FAQ


1. Introduction: Why Industrial Communication Needs a Dedicated Operating System

In the era of the Industrial Internet of Things (IIoT), network connectivity has evolved from "available" to "must be stable, secure, and controllable." Whether in smart grids, industrial automation, or intelligent transportation, a single network outage can cause enormous economic losses and even safety incidents.


Traditional consumer-grade router operating systems are designed for home and office environments and fall short in industrial settings: they cannot withstand extreme conditions such as high/low temperatures and strong electromagnetic interference; they lack network redundancy mechanisms; their security capabilities are weak and easily exploited as attack entry points; and they do not support industrial protocols or large-scale remote management.


Industrial environments require a specially optimized operating system — one that not only "connects to the network," but "connects stably, securely, and intelligently." The WRTOS (Wavetel Router Operating System), developed by Wavetel, is designed precisely to address these challenges.


Introduction-to-Industrial-Communication-Operating-Systems
Introduction-to-Industrial-Communication-Operating-Systems

2. What is WRTOS?

WRTOS is an embedded operating system built by Wavetel specifically for industrial IoT routers. It is deeply customized on a Linux kernel foundation, integrating network communication, security mechanisms, and industrial control requirements, and has been validated through long-term deployment in large-scale industrial environments.


Its core design philosophy includes: Stability First (ensuring 24/7 continuous operation), Network First (multi-link, multi-strategy communication assurance), Security First (multi-layer protection mechanisms), and O&M Friendly (supporting centralized remote management).


WRTOS is not only the software foundation of the device — it is the core control platform of the industrial communication system, fulfilling the critical mission of connecting field devices to the digital world.



3. WRTOS Core Architecture

3.1 Embedded Linux Kernel

WRTOS is built on an embedded Linux kernel, deeply trimmed and optimized for industrial IoT scenarios: system components are streamlined to reduce resource usage; the kernel scheduler is optimized for faster response; the network protocol stack is customized for higher data throughput; security modules are hardened to reduce the attack surface; and memory protection mechanisms are added to prevent performance degradation during long-term operation. This architecture ensures efficient and stable operation even under resource-constrained conditions.


3.2 Modular System Design

WRTOS adopts a modular design, splitting the system into independent functional modules: network management, VPN, security, device management, industrial protocols, and edge computing. Each module has clear responsibilities and well-defined boundaries. Functions can be enabled on demand, upgraded and maintained independently, and a failure in one module is isolated locally without cascading into a full system crash — significantly improving system flexibility and maintainability.



3.3 Multi-Process and Resource Management

Each core service runs as an independent process: network processes, VPN processes, and industrial protocol processes are mutually isolated. A daemon process continuously monitors the status of each service and automatically restarts any abnormal process within seconds. The system assigns differentiated CPU priorities to different processes — latency-sensitive tasks such as network forwarding and VPN encryption/decryption receive higher scheduling priority, ensuring the real-time performance of core communication functions.




4. Network Features

4.1 Multi-Link Access

WRTOS supports three types of network access simultaneously:

  • Cellular Mobile Network (2G/3G/4G/5G): Dual SIM card slots with independent APN configuration; 5G supports NSA/SA dual-mode; frequency bands can be manually locked; VoLTE voice is supported. See: https://www.waveteliot.com/post/industrial-router-uplink-a-comprehensive-analysis-of-4g-lte-5g-fiber-microwave-satellite

  • Wired Ethernet WAN: Supports three access protocols — static IP, DHCP, and PPPoE; dual IPv4/IPv6 stack; compatible with fiber broadband and enterprise leased lines.

  • Wi-Fi 6 (802.11ax): Supports four operating modes — AP, Client, Mesh, and Relayd; can form dual-link redundancy with wired WAN.


 Multi-link-Access-Capability
 Multi-link-Access-Capability

4.2 Intelligent Link Switching and Load Balancing



4.3 VPN Secure Communication

WRTOS includes 10 built-in VPN protocols (https://www.waveteliot.com/post/industrial-router-vpn-technology-panorama), all ready to use out of the box with no additional licensing required:

VPN Protocol

Key Features

Use Cases

DMVPN

Hub-Spoke topology, GRE over IPsec, NHRP Phase 3

Large-scale branch interconnection

IPsec

IKEv1/IKEv2, multiple encryption algorithms, XAuth, DPD detection

Site-to-site encrypted leased lines, cloud platform integration

OpenVPN

Server/Client dual mode, TLS encryption, LZO compression

Remote O&M personnel access

WireGuard

Kernel-space VPN, elliptic curve encryption, PSK post-quantum hardening

High-performance secure tunnels

ZeroTier

Decentralized SDN, P2P traversal, Network ID access control

Flexible edge computing networks

GRE / L2TP / PPTP / EoIP / SSL VPN

Covers traditional compatibility to modern zero-trust scenarios

Selected as needed


VPN-Secure-Communication-Support
VPN-Secure-Communication-Support

4.4 Advanced Network Management

  • APN Management: Independent APN and authentication configuration per SIM card, meeting carrier private network isolation requirements.

  • VLAN Segmentation: Port VLAN and 802.1Q interface VLAN to achieve secure isolation of production, office, and management networks.

  • Dynamic Routing: Supports RIP, OSPF, and BGP for seamless integration with enterprise core networks.

  • DHCP/DNS: Built-in DHCPv4/v6 server and relay; supports static IP binding and custom DNS.

  • Firewall: Security zone policies, traffic filtering rules, port forwarding, NAT, and protection against SYN Flood, port scanning, and other attacks.


5. Industrial-Grade Reliability Design

5.1 Watchdog Mechanism

WRTOS includes dual hardware and software watchdogs (https://www.waveteliot.com/post/how-does-a-watchdog-timer-wdt-work-in-an-industrial-router-iot-gateway). The hardware watchdog operates independently of the CPU and forces a reboot in the event of a system deadlock or crash. The software watchdog continuously monitors each critical service at the process level and automatically restarts any abnormal process within seconds. The two mechanisms complement each other to build a "layered self-healing" architecture — the core guarantee for WRTOS high availability.


Watchdog Mechanism
Watchdog Mechanism

5.2 Network Self-Healing and Auto-Reconnect

  • The cellular link automatically redials after disconnection.

  • The system automatically switches to the backup SIM when the primary SIM encounters weak signal, traffic limit exceeded, or network rejection.

  • An active ICMP probing mechanism detects "false connections" where the link is IP-reachable but cannot actually access the internet, and triggers a switchover.

  • VPN tunnels are quickly detected via DPD after disconnection and automatically rebuilt, preventing tunnel stagnation.



5.3 High-Availability Operation Strategy

  • After a power-loss reboot, the system automatically loads configuration and starts all services, fully recovering within tens of seconds.

  • Supports scheduled automatic reboot plans to proactively release accumulated resource usage.

  • After NTP time synchronization, the time is written to Flash to prevent time errors after reboot.

  • Real-time monitoring of device health metrics via the web interface or cloud platform, transforming reactive emergency response into proactive prevention.



6. Security Mechanisms and Data Protection

6.1 Firewall and Access Control

A multi-layer firewall based on iptables divides network interfaces into security zones with independently configured inbound, outbound, and forwarding policies. Supports fine-grained traffic filtering based on five-tuple plus time period. Port forwarding, NAT, and DMZ meet diverse network publishing needs. Built-in active attack defense including SYN Flood protection, SSH/HTTP connection rate limiting, and port scan blocking.



6.2 Data Encryption and Authentication

All outward-facing communication services support TLS/SSL encryption with optional PSK or X.509 digital certificate mutual authentication. All 10 VPN protocols support strong encryption algorithms such as AES-256 and ChaCha20; WireGuard additionally supports PSK post-quantum hardening. A built-in certificate management tool can generate CA, server, and client certificates directly on the device. SSH supports both password and public key authentication; the Web GUI has WAN-side access disabled by default to minimize the management attack surface.


6.3 Industrial Security Compliance

The security design follows the IEC 62443 industrial cybersecurity standard philosophy (https://www.waveteliot.com/post/converged-it-ot-security-with-zero-trust-architecture). VLAN segmentation and firewall zone policies enforce "zone and conduit" isolation between OT networks and IT networks. Comprehensive logging of security events — including administrator logins, configuration changes, VPN connections, and firewall blocks — meets enterprise security compliance audit and retention requirements.


Security-Mechanisms-and-Data-Protection
Security-Mechanisms-and-Data-Protection

7. Remote Management and O&M Capabilities

7.1 Cloud Platform Integration

Supports connection to the Wavetel cloud management platform for real-time display of device online status, cellular signal, traffic, and system resources. Abnormal events trigger automatic alert notifications. Supports private deployment so all data is stored within the enterprise intranet, meeting data sovereignty requirements.



7.2 Bulk Device Management

A built-in TR-069 (CWMP) client can connect to a standard ACS platform to simultaneously execute configuration delivery and parameter queries on thousands of devices — compressing work that would otherwise take days into minutes. Supports grouping devices by region, business type, and other dimensions with differentiated policy application. All remote operations are fully logged to support post-event traceability and compliance audits.



7.3 OTA Remote Upgrade

New firmware can be pushed to designated device groups with one click through the platform; devices download and upgrade silently in the background. Before upgrading, firmware integrity and signature are automatically verified to prevent malicious firmware execution. Failed upgrades automatically roll back to the stable version, ensuring upgrade safety in remote unattended scenarios. Supports configuration-preserving upgrades so no reconfiguration is needed after the upgrade. Upgrade tasks can be scheduled to execute automatically during off-peak business hours.



Remote-Management-and-Operations
Remote-Management-and-Operations

8. Industrial Protocols and Edge Computing

8.1 Industrial Protocol Support

Modbus Full Stack (https://www.waveteliot.com/post/industrial-router-modbus-protocol): Supports Modbus TCP/Serial in all four roles (Server and Client); built-in TCP over Serial Gateway bridges Modbus TCP and RTU protocols; the Client side supports alarm rules (triggering actions when register values exceed thresholds).

MQTT Full Stack: Built-in Mosquitto Broker as a local message broker; supports establishing bridge connections with public cloud platforms such as Alibaba Cloud and AWS IoT. The MQTT Modbus Gateway (https://www.waveteliot.com/post/industrial-iot-integrated-applications-of-sensors-plcs-and-modbus-gateways-routers) automatically converts Modbus data into MQTT messages, bridging the OT/IT protocol boundary.

Serial Communication (RS232/RS485): Serial Over IP transparently encapsulates serial data in TCP/UDP for transmission, supports TLS encryption and IP whitelisting, enabling secure remote access for serial devices.

SMS Channel: Receives designated keywords to trigger device operations and provides an SMS gateway service externally via HTTP API, building an emergency control channel over the cellular side.


Industrial-Protocol-Support
Industrial-Protocol-Support

8.2 Edge Data Processing

Data to Server supports periodic aggregation and reporting of multi-source data including system status, cellular signal, Modbus registers, GPS location, and I/O status. Data is cached locally during network interruptions and automatically retransmitted after recovery. GPS geofencing evaluation is performed locally, triggering alerts immediately upon boundary crossing without requiring cloud involvement. The I/O Juggler rule engine triggers local output control, MQTT publishing, HTTP requests, and other actions based on digital input states, achieving true edge automation.



8.3 Secondary Development Capabilities

  • Supports Lua scripting for custom data processing logic.

  • HTTP REST API exposes I/O control, SMS sending/receiving, status query, and other interfaces for easy third-party system integration.

  • Package Manager supports online installation of extension packages without re-flashing.

  • Enterprise users can obtain the SDK and development documentation for deep integration with proprietary platforms.



9. WRTOS vs. Traditional Router Operating Systems

Dimension

WRTOS

Consumer-Grade Router OS

Standard Open-Source OpenWrt

Stability

Industrial-grade 24/7, dual watchdog

Prone to crashes, requires manual reboot

Basically stable, no industrial hardening

Network Redundancy

Multi-link failover, load balancing

Single link, no redundancy

Limited support, complex configuration

VPN Support

10 protocols, out of the box

1–2 protocols, limited functionality

Requires manual installation and configuration

Security Protection

Multi-layer protection, attack defense, certificate management

Basic NAT firewall

Requires manual hardening

Industrial Protocols

Full-stack Modbus, MQTT Broker/Bridge

Not supported

Requires additional plugin installation

Remote O&M

TR-069, OTA, cloud platform integration

None or minimal

Requires additional development

Commercial Support

OEM technical support and warranty

Limited

Community support


10. WRTOS Applications in Typical Industries

Smart Grid and Energy: Dual-link redundancy provides high-availability communication for power DTU/FTU; IPsec VPN protects data transmission security; SMS alerts notify O&M staff even when the network is down; GPS supports location tracking for mobile inspection devices.


Industrial Automation and Smart Manufacturing: Modbus collects PLC data and publishes it to the cloud via MQTT for real-time production data visualization; I/O Juggler enables local device status interlocking to reduce cloud dependency; VLAN isolates the production network from the office network, preventing IT security incidents from impacting OT production.


Smart Transportation: Multi-link cellular switching ensures roadside devices stay continuously online; DMVPN networking securely connects all city intersection devices to the management center; TR-069 supports bulk remote configuration and firmware upgrades.


Oil, Gas, and Mining: Dual SIM automatic switching handles unstable signals in remote areas; watchdog and power-loss auto-recovery ensure unattended operation; Serial Over IP connects legacy serial devices; SMS provides an emergency control channel.


Smart City and Municipal IoT: MQTT Broker aggregates data from nearby sensing nodes to reduce direct cloud connection pressure; TR-069 + OTA bulk upgrades minimize O&M labor; geofencing supports management of mobile municipal devices.


11. Summary

WRTOS is the core competitive advantage of Wavetel industrial routers. Through a stable system architecture, comprehensive network capabilities, defense-in-depth security, rich industrial protocol support, and powerful O&M management, it provides a reliable communication foundation for the Industrial Internet of Things.


As industrial digital transformation accelerates, WRTOS will continue to evolve — helping industrial IoT move from "able to connect" to "connecting intelligently."


12. FAQ

Q1: Does WRTOS support 5G?

Yes. WRTOS fully supports both 5G NSA and SA modes. It can be manually specified or automatically adapted depending on the device model and hardware module, with support for manual frequency band locking.


Q2: Does it support remote management? What options are available?

Yes, multiple methods are supported: Wavetel cloud platform visual management; TR-069 connection to a standard ACS platform; remote access to the Web GUI through a secure VPN tunnel; and SSH remote command line. Options can be flexibly chosen based on actual needs.


Q3: Does it support private cloud deployment?

Yes. The Wavetel management platform supports private deployment on enterprise-owned servers. All data is stored within the enterprise intranet and does not pass through the public cloud, meeting data sovereignty and compliance requirements.


Q4: Can the device automatically recover after a network outage?

Yes. Cellular links automatically redial after disconnection; the primary link failure triggers automatic switchover to the backup link; VPN tunnels are automatically rebuilt after disconnection; after a power-loss reboot, configuration is automatically loaded and all services are started — no manual intervention is required throughout.


Q5: Does it support secondary development and custom integration?

Yes. Open capabilities include Lua scripting, HTTP REST API, and online Package Manager extension installation. Enterprise users can contact Wavetel for the SDK and development documentation to achieve deep integration with proprietary platforms.


Q6: How many devices can be managed?

By connecting to the Wavetel cloud platform or a standard TR-069 ACS server, hundreds to thousands of devices can be centrally managed. The scale depends on the capacity configuration of the selected management platform.


Q7: Does it support Modbus-to-MQTT protocol gateway functionality?

Yes. The MQTT Modbus Gateway automatically converts register data from Modbus TCP/RTU devices into MQTT messages published to a designated broker. It also supports issuing Modbus write commands via MQTT, enabling a bidirectional data channel.


Q8: Is WRTOS's security capability suitable for scenarios with high industrial cybersecurity requirements?

Yes. WRTOS features multi-layer security protection: firewall and zone isolation, DDoS attack defense, full-chain TLS encryption, digital certificate authentication, strong-encryption VPN tunnels, and security log auditing. The design follows the IEC 62443 industrial security standard philosophy and is suitable for high-compliance-requirement scenarios such as power, petrochemical, and transportation industries.

Comments


bottom of page