Skip to main content

Introduction

In order to establish a secure and decentralized method for verifying physical Machine data within a Decentralized Physical Infrastructure Network (DePIN), peaq works on a multi-tiered approach. The following elaborates on each tier, providing an overview for each step in the verification process.

Tier 1 Verification: Machine-Origin Authentication

  • Description: Data originating directly from devices, can be verified by a shortly released SDK or by the functions outlined in the documentation. The predominant use cases within this tier primarily center around the communication capabilities of DePINs via cellular and smart devices.

  • Trust Level: Data verified under this tier is marked as the most trusted, given its direct origin and secure transmission.

  • Implementation: The system performs device detection and signs the data using a private key, ensuring its authenticity before transmitting it to the network. Integrated software solutions, including Home Assistance, will facilitate this process, maintaining the highest level of security and integrity.

Tier 2 Verification: Pattern Matching Validation

  • Description: Data not directly from the device but is relevant to existing devices on the network is validated.

  • Implementation: Validation occurs by comparing data patterns from an existing device on the network. Similar patterns indicate trustworthiness.

  • Trust Level: Tier 2 data is considered trustworthy, though less so than Tier 1.

Tier 3 Verification: Oracle-Backed Authentication

  • Description: Data is verified through an oracle, providing an additional layer of security.

  • Implementation: The oracle confirms the legitimacy of the data source, adding an extra level of validation.

  • Trust Level: Tier 3 data is considered secure, but may still be subject to potential vulnerabilities.