WABA Network
  • Backgrounds & Intro
    • 🏭An Overview of Our Current Electricity Grid System
    • ⚡What is WABA
    • 🕖Addressing the Challenges
    • 🗝️Key WABA Components
    • 🔏User Data Privacy
  • For Developers
    • ⛓️Configuration Details
    • 🔗WABA OpenAPI
      • Apply for AppID and Secret
      • Call WABA OpenAPI
      • EIP155-327126
      • Hardware APIs
  • WABA tech essence
    • 🔌Proof of Consumption (PoC)
    • WABA Infrastructure
      • Hardware Layer
      • Algorithmic Layer
      • Power System
      • Sharding Isolation Mechanism
  • Depin and stake mining
    • 🛠️DePIN Mining
    • ⛏️Mining Reward
    • 👷‍♂️Stake Mining
  • OTHER RESOURCES
  • 🔗Useful Links
Powered by GitBook
On this page
  1. WABA tech essence
  2. WABA Infrastructure

Algorithmic Layer

DePIN data is collected by the PoW Packer, a role jointly assumed by DePIN device providers and power suppliers. The DePIN device providers are responsible for collecting data from the Algorithm Validators' DePIN devices and making an initial assessment of the data's authenticity and reliability. Subsequently, power suppliers perform a further assessment of the data's authenticity and reliability based on the Algorithm Validators' power usage. The PoW Packer aggregates and signs the analysis results. The aggregated data is recorded on the WABA network, and based on these records, token incentives are distributed to the Algorithm Validators.The analysis includes:

1. Real-Time Verification

  • WABA devices ensure reliability in dynamic environments through real-time verification algorithms.

  • Technologies such as Sliding Window and Dynamic Threshold are employed to monitor and verify key parameters of the devices in real-time.

2. Anomaly Detection

  • To detect potential abnormal behaviours, devices integrate various anomaly detection algorithms. Utilising AI Machine Learning and Deep Learning technologies, the devices can identify and classify abnormal patterns.

  • Algorithms such as Isolation Forest and Autoencoder enable devices to automatically discover anomalies and take appropriate actions.

3. Encryption Algorithms

  • Communication between DePIN device providers and Algorithm Validators' DePIN devices employs encryption algorithms to ensure data security. Digital signatures are used for authentication to ensure that the client connects to the correct server, preventing man-in-the-middle attacks. The SSL/TLS protocol is used to encrypt data during transmission, preventing third parties from intercepting or tampering with the communication. Encryption algorithms and hash functions are also used to verify data integrity, ensuring that data is not altered during transmission.

PreviousHardware LayerNextPower System

Last updated 11 months ago