WABA Network
  • Backgrounds & Intro
    • 🏭An Overview of Our Current Electricity Grid System
    • ⚡What is WABA
    • 🕖Addressing the Challenges
    • 🗝️Key WABA Components
    • 🔏User Data Privacy
  • For Developers
    • ⛓️Configuration Details
    • 🔗WABA OpenAPI
      • Apply for AppID and Secret
      • Call WABA OpenAPI
      • EIP155-327126
      • Hardware APIs
  • WABA tech essence
    • 🔌Proof of Consumption (PoC)
    • WABA Infrastructure
      • Hardware Layer
      • Algorithmic Layer
      • Power System
      • Sharding Isolation Mechanism
  • Depin and stake mining
    • 🛠️DePIN Mining
    • ⛏️Mining Reward
    • 👷‍♂️Stake Mining
  • OTHER RESOURCES
  • 🔗Useful Links
Powered by GitBook
On this page
  1. WABA tech essence
  2. WABA Infrastructure

Hardware Layer

The WABA network employs a DePIN device, which provides multi-layered verification mechanisms to ensure its efficient and reliable performance. By integrating various validation mechanisms, WABA devices can effectively detect and prevent potential faults and attacks, thereby ensuring the normal operation of both the device and the system.

1. Network IP Verification

  • WABA devices verify network IP addresses to ensure data packets originate from trusted sources.

  • Advanced IP Filtering and Deep Packet Inspection (DPI) technologies are utilised to identify and filter illegal or suspicious IP traffic.

  • To further enhance security, the devices support Mutual Authentication, ensuring both client and server authenticate each other.

2. Actual Power Consumption Verification

  • Devices monitor actual power consumption to verify operational status. Dynamic Power Analysis and Power Signature Analysis techniques are employed to detect abnormal power consumption changes.

  • Additionally, devices are equipped with Real-Time Power Monitoring capabilities, ensuring operation within expected power consumption ranges and triggering alarms in case of anomalies.

3. State Determination Verification

  • WABA devices feature comprehensive state monitoring and determination mechanisms to verify operational status. State Machine Validation technology ensures devices operate within reasonable state sequences.

  • Devices also support Multiple Redundancy Validation, cross-referencing various state information to ensure accuracy.

4. Anomaly Detection and Response

  • Devices integrate various anomaly detection mechanisms, such as Anomaly Pattern Recognition and Anomaly Behaviour Analysis.

  • Adaptive Anomaly Detection technology allows devices to dynamically adjust detection parameters, enhancing sensitivity and accuracy.

  • Upon detecting anomalies, devices trigger multi-layered response mechanisms, including alarms and function restrictions.

PreviousWABA InfrastructureNextAlgorithmic Layer

Last updated 11 months ago