KEMBAR78
IoT Network with LoRa and Iota | PDF | Art | Technology & Engineering
0% found this document useful (0 votes)
132 views18 pages

IoT Network with LoRa and Iota

Uploaded by

alvarnal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
132 views18 pages

IoT Network with LoRa and Iota

Uploaded by

alvarnal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

MESH+

MESH+
– Democratising information –
– Enabling connectivity –
– Empowering humankind –

Timothy Kravchunovsky Mircea-Teodor Raduta


Dr. Oleksandr Letychevsky Prof. Volodymyr Peshanenko

Revision 3 (11.2021)
Continuous work in progress

Page 1 of 18
MESH+

Contents
ABSTRACT 3
INTRODUCTION 3
Basic concepts 3
Wide-area Wireless Networking System 3
LoRa 3
Decentralisation 4
PROJECT OUTLINE 4
State of the IoT market 4
Mobile Cellular Networks 4
Conventional Wireless Networks 5
IoT potential & Developments in IoT 5
The money shot: the business case for Mesh+ 5
Stakeholder benefits: why should we care? 6
THE SOLUTION 6
Technical solution in simple terms 6
Implementation 10
Scalability 13
Mesh+ makes the web go round. What is the fuel? 14
TOKENOMICS 14
Democratising Network Coverage– a Utility token you’ll actually need 14
Roadmap to Enhanced versions of the platform 14
CONCLUSION 15
OVERVIEW OF THE TEAM 15
Timothy Kravchunovsky 15
Dr. Oleksandr Letychevsky 15
Professor Volodymyr Peschanenko 15
Anil Pervaiz 15
Cort Honey 15
Mircea-Teodor Raduta 16
Contact 16
References: 16

Page 2 of 18
MESH+

ABSTRACT
Mesh+ is the first crypto project designed to provide LoRa network coverage for
the IoT ecosystem using Tangle on the Iota network, capable to sustain
telecommunications on a global scale through the introduction of the 2.4GHz
frequency spectrum in addition to sub-GHz. Mesh+ was created to provide a
versatile, safe and sustainable network with scalability, low power consumption
and low computational effort enabled by a strategy involving Proof-of-
Coverage, Proof-of-Serialisation and Proof-of-Location.
and promising near-instant transfers,
INTRODUCTION with a significantly lower operating cost
Basic concepts compared to blockchain. On the Tangle
The internet-of-things (IoT) denotes a DLT (system of nodes), each transaction
wide range of technologies and confirms two previous transactions. This
applications in the service of wireless essentially assures that increasing the
interactions and communication between number of nodes based on Iota and
numerous network-enabled devices, Tangle determines an overall increase in
including unconventional examples such processing speeds for the network.
as smart appliances and wearable Additional nodes are analogous to
technology, as well as conventional additional Bitcoin miners without the high
applications such as home security energy and hardware costs. [1], [4]
systems, computer peripherals, routers,
smart speakers, etc. Technically, IoT is Wide-area Wireless Networking
enabled through the use of multiple System
connectivity infrastructure solutions Low Power Wide Area (LPWA) Network
such as Bluetooth, near-field technologies area a substratum of the
communication (NFC) or Wi-Fi. [1] wireless technologies space focused on
creating long-range low-power Internet
Iota was introduced in October 2015 as an communications. LoRa is one of the
open & feeless data and value transfer technologies that garnered widespread
protocol based on a type of distributed interest, resulting in a multitude of
ledger technology (called the Tangle) commercial products created or made
distinct from blockchain. Its impetus is to compatible with it. LPWA provides
enable a seamless integration of complementary coverage to cellular and
Internet-of-things technologies, short-range wireless technologies for IoT
supporting transactions on the network applications, and in certain cases
within a shared IoT ecosystem through supersede them for smart city and
the use of the associated cryptocurrency machine-to-machine (M2M) applications.
MIOTA. [2]–[4] [5]
Iota’s Tangle avoids some of the
LoRa
limitations of the blockchain by
LoRa is a physical layer technology,
facilitating micro-transactions between
usually in the sub-GHz ISM band through
an increasing number of devices assuring
a proprietary implementation of the
the necessary volume and availability for
spread spectrum technique. The Chirp
scaling up the number of IoT devices by
Spread Spectrum (CSS[6]–[9]) technique
optimising scalability, assuring no fees

Page 3 of 18
MESH+

enables bidirectional communications by the Iota network involved with transaction


spreading narrow band input signals over validation [13] called by the Iota
a wide bandwidth channel, creating a foundation a bootstrapping mechanism
signal with noise like properties, used to improve security and safety to
essentially protecting it from jamming or support early growth [13], [14]. Obtaining
being detected, providing resilience to decentralisation was a pain point for
interference and noise. Decoding distant adoption as a result of the fact that
signals is realised through the use of additional mechanisms had to be
receivers designed for signals several introduced to assure privacy (pseudo-
dBs below the noise floor, generated by anonymity [15], [16]) & safety [4]. These
transmitters which emit chirp signals with mechanisms are no longer needed,
time- varying frequency with no phase providing significant benefits to our first
change between adjacent symbols. LoRa implementation.
uses between 7 and 12 spreading factors
to obtain a tradeoff between range and PROJECT OUTLINE
data rate. This technique is augmented by
the use of Forward Error Correction (FEC) State of the IoT market
to obtain increases in receiver sensitivity. Most assessments of the size of the IoT
[5] Fully decentralised LoRaWAN and M2M markets provide estimates that
architectures have been proven possible may be mistaken to be in the realm of
[10], but blockchain technology has been hyperbolae. Just by taking a
particularly singled out for the high conservatory approach to approximating
power/electricity , computational costs, the size would yield a number of devices
the difficult scalability and high fees, as in the order of 30 billion, out of which more
well as the need to store a full transaction than a fourth are expected to depend on
history. Semtech, one of the founders of some form of LPWAN for connectivity. [5],
the LoRa Alliance released SX1280, the [17].
first 2.4 GHz enabled chipset. This is Mobile Cellular Networks
unique in contrast to legacy chipsets The rollout of an extended 5G network in a
through the ability to communicate high-density, low-area, low-terrain-
internationally, compared to legacy roughness country such as the
hardware which tended to be limited to a Netherlands implies minimum estimated
specific set of unlicensed frequencies costs for the best case scenario on the
(eg. 915 MHz in the USA, 868 MHz in order of billions (€1-2.6Bln). The cost per
Europe, etc.). This change was mainly lead user reaches up to 72-85€/100Mbps. [18]
by the need to standardise the Industrial,
Scientific and Medical (ISM) band in order The UK sees annual investments of 2-
to ease the need to construct custom 3Bln£, whilst only being able to provide 4G
chipsets which limit applicability. [6] coverage for 91% of geographic landmass
with only 69% of area is covered by all
Decentralisation operators. At present, the number of
As of the date of publication, the role of connected devices in the UK that make
the Coordinator was removed in the use of the cellular network is just 94.67
current implementation of the Tangle (Iota million devices, approximately 1.41
2.0) [11], making it an essential point of devices per person. [19], [20]
inflection in the development of Iota with
fundamental benefit to our Adding to the previously mentioned
implementation. Previous versions of Iota issues, the need for public-private
were accused of decentralisation due to partnerships and political, social or
the Coordinator[12], a specialised Node in regulatory capital further increase the

Page 4 of 18
MESH+

costs and difficulties associated with the The money shot: the business
prospect of mobile cellular network case for Mesh+
covering the entirety of the IoT market. Mesh+ is a revolutionary very long range
The current state of affairs shows that the base network designed to provide global
cellular network fails at providing coverage through all LoRa frequency
effective coverage to less than a 1:10 bands, including all sub-Ghz national
fraction of users to connected things in bands and the additional 2.4 Ghz
the UK [19], raising significant concerns as frequency range with worldwide
to its ability to keep up with the potential acceptance. This solution is the only
exponential scalability requirements. technology available on the market that
can provide intercommunication between
Conventional Wireless Networks
devices across the globe despite differing
Other technologies in the IoT taxonomy
national standards and roaming
such as legacy wireless local area
conditions whilst also providing a
networks (WLANs), Z-Wave, Bluetooth, Zig-
scalable and redundant physical layer
Bee, Wi-Fi, etc., present an approach to
built on top of the Iota’s Tangle, with
connectivity where a significant trade-off
privacy and security at its core and with
is required in terms of physical distance,
the capability of assuring future-proof
considering that they tend to cover, at the
telecommunications infrastructure in
largest extents, a radius of hundreds of
time for the boom in IoT applications and
meters. Furthermore, the devices
technologies. Unlike conventional
associated with these technologies
infrastructure solutions, Mesh+ can be
trade-off coverage radius for mobility.
rolled out with no need for public-private
Extending range requires a dense
partnerships or political support and with
deployment of devices and gateways
no financial bottlenecks. Instead, it is a
connected using multihop mesh
technology which may benefit, through
networking, making large deployments
the value of token transactions, mining
prohibitively expensive, or in the case of
rewards and saved material (routers,
legacy WLANs high power consumption
repeaters, etc), subscription costs
for machine-type communication [5]
(additional data roaming plans, SIM cards,
Due to the difficulty in achieving cost- etc.) and energy costs the global IoT
effective redundancy and low coverage ecosystem in accelerating the integration
as well as potential safety concerns and of future technologies in a safe and
limited potential for extensive energy conscious environment.
deployments create worries in regards
Furthermore, from an investment
with their applicability for smart city,
perspective the introduction of Proof-of-
logistics and personal health.
Location enables applications the
IoT potential & Developments in Location tracking, which has been
IoT determined as one of the most coveted
uses of low-power Devices. With uses in
Considering the range of applications of
the 6.5-13 Trillion $ Logistics industry, as
IoT and the importance and social impact
well as retail, military and smart home
of some raises awareness on the need for
use, Asset Tracking can be an essential
a platform capable of assuring
business area to focus on. By introducing
connectivity at a massive scale: Smart
the 2.4GHz frequency band the potential
Cities, Smart Healthcare, Smart
benefits for track and tracing goods
Infrastructure, Home Automation &
worldwide across different zones
Safety.
expanded significantly. In contrast to
sub-GHz devices which have a very

Page 5 of 18
MESH+

limited number of readings per hour to including Warehouse Management, Site


comply with duty-cycle limitations, the Monitoring, Smart Ports. [6], [21]–[23]
2.4Ghz range permits much higher data
The use of Mesh+ would impact the
transfer and longer communication
individual by saving them up to 1000€
distance (up to a theoretic 333km [6])
yearly in 5G/4G costs and investors up to
compared to Wi-Fi and Bluetooth, more
billions of Euros (€), assuming it replaces
accurate time-based localisation due to
it in covering many 5G or cellular-based
higher bandwidth, essentially making it
applications [18].
the ideal technology for application

Stakeholder benefits: why should we care?


1.1 USERS -> send/receive data & geolocation services through their DEVICES
1.2 USERS -> benefit from device identification, geolocation, M2M or IoT
applications
2.1 MINERS -> earn tokens by joining the network and providing coverage
2.2 MINERS -> earn rewards from transactions and for validating the network
integrity
3. Iota -> Benefits from the introduction of additional nodes capable to increase
the
processing speed for transaction validation on the main network
4.1 Telecommunication Authorities -> lower the demand for additional
telecommunications infrastructure especially for hard to reach, low
population density and expensive to cover regions such as rural areas or
highly obsolete installations, future proofing the telecommunication
infrastructure
4.2 National Authorities -> Save billions in infrastructure costs for state budgets
5. Investors -> Accelerate the potential for IoT applications and technologies
due to
quick rollout of LPWA networks & easier scalability of existing
projects

THE SOLUTION the IoT space. In addition, opting for an


Iota implementation, our building and
The Mesh+ Project is built on top of the
implementation time is significantly
Iota ecosystem rather than being
reduced, providing us with the unique
dependant on the construction of a
opportunity to expand our focus and
blockchain due to the excellent progress
concentration towards developing novel
in the development of Iota in the last 6
features and improvements as to
years, time in which the network evolved
immediately achieve a higher rate of
to provide IoT integration for numerous
business development and expansion.
projects and improving the capacity and
speed of the network whilst evolving into Through Iota’s partnership with the
a fully decentralised space. European Union, the strength of our
conviction in the use of Tangle increases,
Rather than increasing overall complexity
further cementing our aim to provide an
by generating a new unconnected
essential service for the future-proofing
blockchain, we discovered the
of the European &Global Infrastructure,
compounding effect of the synergies
especially through B2B collaborations for
created by partnering with Iota, through
improving the productivity of some of the
the shared belief in the power of
EU’s largest and most impactful sectors
innovation and the shared aim to unify

Page 6 of 18
MESH+

despite the numerous challenges faced


in recent times.

Technical solution in simple terms


Miners represent Mesh+ Nodes engaged 1. Targets inform the Challenger of the
in the provision of wireless network coverage they receive & provide data
connectivity through the Iota Tangle – on the source of the network
Mesh+ Network and consist of a single connection to establish geolocation
board computer, LoRa concentrators, a 2. The Challenger verifies the source of
GPS module and GPS Antennas. The the coverage to assure that it was
method through which Miners provide created using the wireless RF network
evidence of the LoRa coverage they and compares the geolocation data
provide is the Proof-of-Coverage. The provided by the targets with another
proof is validated for accuracy in time and source of location data (e.g. satellite)
compared to other Miners on the network
This methodology for Proof-of-Coverage
through Proof-of-Serialisation, a
allows verification of the use of RF
cryptographical method. Miners who
hardware and firmware compatible with
provide network coverage in a
the MPNP, proves that Network providers
cryptographically proven physical
make veridical claims regarding their
location at a confirmed time submit proofs
spatial coordinates and validates the
to the Mesh+ Network, and the best proofs
correct outcome when errors or conflicts
are chosen through an asynchronous
occur.
byzantine fault tolerant [24], [25]
consensus group at a fixed epoch at a This implementation for Proof-of-
very high transaction rate without relying Coverage is based on a few
on a unique centralised coordinator. characteristics of radio frequency (RF)
signals that differ from Internet
Proof-of-Coverage and the Proof-of-
communication: the limited physical
Serialisation used in its foundation are
propagation of RF and limited distance,
essential to assure protection from Sybil
the fact that it obeys the inverse-square
attacks, the risk of Miners forging false
law in regard to the strength of the signal
identities for the purpose of subverting
received and the fact that it travels at the
the Network and extracting rewards [26].
speed of light without latency. To verify
An additional threat specific to physical
the compatibility of the Miners with the
wide area coordinated groups of
MPNP (Mesh Plus Network Protocol), the
interacting devices is the alternate reality
Challenger creates a multi-layer packet
attack [27], which basically involves the
of data that is broadcasted through a
coordination of groups of Miners to
sequence of targets which are only able
simulate real Nodes in the Network
to decrypt the outermost layer. Thus, the
without providing LoRa coverage.
only Target able to decrypt it is the final
Proof-of-Coverage was inspired by the Target in the sequence, and the
Guided Tour Protocol (GTP) which denies information is only retrievable if the
service in the cases where clients don’t sequence was not interrupted at any
contact the “tour guide” computers for stage of transmission.
access to the server in the predefined
The MESH+ Network is a network built on
order and through a hash of data which
Iota’s Tangle technology designed to
reveals the location of the next tour guide
provide:
in order [28]. Proof-of-Coverage is
obtained in two stages:

Page 7 of 18
MESH+

a. Connectivity, establishing c. generating cryptographic guarantees


infrastructure for the Mesh+ Network for data transmission and authenticity
Protocol (MPNP) d. providing transaction primitives,
b. a system for authenticating and effectively facilitating the ability to
identifying devices (establishing configure enforceable agreements
identity) between users

Targets Geolocation Challenger


1. Assert the existence of 2. Targets disclose the 3. Challenge the claims of Targets on the
network coverage geolocation of the source basis of the Geolocation
of the network coverage 4. Checks whether the coverage was
generated through the wireless RF network

The MESH+ Consensus Protocol is an to collaborate in mining blocks (as


approach based on identity-matching would be the case in blockchain), but
with Proof-of-Coverage that is used to instead the scoring mechanism
establish a highly scalable, censorship promotes distributed collaboration
resistant system with high data between Nodes.
transmission rate, involving the use of 3. Byzantine Fault Tolerance: The
Directed Acyclic Graphs (DAGs) to improve protocol should provide tolerance to
feasibility in IoT Applications. Byzantine failures to allow consensus
to be achieved with a sufficient
Mesh+ aims to create a consensus
fraction of honest actors.
protocol with the following core values:
4. Usefulness: network consensus shall
1. Permissionless: Allowing Nodes to be achieved through the provision of a
freely take part in the network without useful service to participants, it should
the need for any prior approval from be practically usable for every
any other entity as long as they agree participant in the network, rather than
to follow the rules of the consensus following the manner in which the
and do not risk the integrity and safety Nakamoto Consensus only provides
of the network. useful outcomes to the stakeholders
2. Indiscriminatory: Network in a particular block. The usefulness of
Consensus shall not be designed in a achieving consensus shall not be
manner that creates incentives for strictly focused on securing the
taking advantage of macro-economic network.
factors such as cheaper electricity in 5. High transaction rate: The
certain geographies or storing larger consensus protocol must support a
processing capacities in a general high rate of transactions to achieve
area. In fact, Proof-of-Coverage the required capacity required by the
implicitly revokes privileges due to projected growth in IoT applications.
hardware by not incentivising groups The settlement times should be

Page 8 of 18
MESH+

reduced to remove delays and lag, transaction the action in which it will
hurting the potential application participate. This is both a method for
space of the technology to protecting the network from
asynchronous projects. manipulation, nefarious actions,
6. Censorship resistance: Nodes shall suppression, but also a way to prevent
not carry the power to select through fixed-fee transactions from being
prior knowledge of the contents of a introduced.

The consensus protocol was constructed channels within the spectrum


around the use of Proof-of-Coverage to continuously. MPNP supports multiple
generate verification for the Mesh+ channel bandwidths, data rates and error
network combined with the HoneyBadger correction technologies. Nodes
Byzantine Fault Tolerance (HBFT) dynamically negotiate the combination of
asynchronous protocol [25]. The latter these through signalling packets
was essential due to the lack of timing delivered at the lowest bandwidth and
assumptions and the priority of symbol rate for enhanced range.
throughput over latency.
Proof-of-Location involves the
MPNP is a wireless network protocol transmission and validation of the
designed for Low Power Wide Area (LPWA) physical coordinates of a device. This is
devices on the key metrics of availability done exclusively through MPNP with no
and accessibility. MPNP provides a GPS localisation, without any sort of power
secure, long range, low power, bi- or time intensive calibration or discovery
directional wireless network protocol procedure using other hardware.
available for use by a wide range of
DLRN (Decentralised Long Range Network)
existing transceivers in the sub-GHz and
is a network designed to provide wireless
2.4GHz unlicensed radio frequency
access to the Internet for Devices through
spectrum.
multiple Miners whilst obeying a set of
MPNP uses a narrowband wireless requirements to assure the conformity of
protocol with improved spectral efficiency the Network across a high area. CLAs
functioning on several channels that (Cloud Applications) interact with the
employs frequency hopping for switching Miners by paying for the data flow through
channels, without the need to coordinate the Internet, whilst also agreeing to allow
with Nodes since they can monitor all miners to receive the reward of new

Page 9 of 18
MESH+

tokens proportional to the coverage implementations that purchase


provided and validated and the data encrypted data from Miners. They are
delivered. Devices exchange encrypted capable of geolocating through analysis
data with the Network using any hardware of the differential time delays between
running the MPNP. Miners provide network receiving a flow of different data packets
coverage with the MESH+ Network, from different neighbouring Miners
essentially mediating the interaction of provided enough are available, process
MPNP-enabled devices and the Internet. named Proof-of-Location.
The main service provided through the
Users who may join the Network with the
Mesh+ network is provision of internet
intention of becoming Miners and
connectivity. The Miners who take part in
therefore take part in Proof-of-Coverage
supplying network coverage must
tasks by creating CLAs that conform with
demonstrate compliance with the Proof-
MPNP and staking a proportional token
of-Coverage protocol used on the MPNP
amount to the other neighbouring Miner
by other Miners to verify/audit Providers.
Nodes. CLAs are software

Implementation fraudulent miners or other activities


Proof-of-Serialisation is used to provide meant to subvert the network or access
evidence of the relationships between unjustified rewards. The algorithm is
Targets within a Network, with use in based on Google Roughtime. The
validating transactions and checking algorithms for generation and verification
identity, time and honesty of behaviour. can be seen in Table 1 and Table 2.
Proof-of-Serialisation is used in the Proof- The initial Target selection is an important
of-Coverage algorithm as an alternative case to plan due to the importance of the
for generating cryptographic Proof-of- first Challenger – Target interaction.
Location and the time of various network Assuring effective score assignment is
events. Proof-of-Serialisation is essential needed to assert the honesty and validity
in providing network safety from Sybil of the network, being highly impactful on
attacks, alternative reality attacks and
the security of the Tangle. (Table 3

Table 1. Algorithm for the generation of Proof-of-Serialization


Generating Proof-of-Serialization (based on Google Roughtime [29])
1. A miner 𝑀 selects miners 𝑀 and 𝑀 on the basis of a pseudo-random algorithm

2. M generates a nonce 𝑅 from the Proof-of-Coverage which M partially constructed

3. M generates a proof-kernel 𝐾 = (𝑅 |𝑀 | 𝑀 ) and sends it to 𝑀

4. 𝑀 replies with a signed message including the current time and 𝐾

5. 𝑀 checks ifthe reply was pre-generated by verifying the nonce 𝑅 that it generated

6. 𝑀 confirms with 𝑀 using a new nonce 𝑅 obtained by a 512-bit truncated 𝑇 𝑋𝑂𝑅ed with
a random 512-bit number

7. 𝑀 generates and sends a sub-proof kernel 𝐿 = 𝐻(𝑅||𝑇||𝐾) to 𝑀

8. 𝑀 replies with a signed message containing the current time and 𝐿

9. The signed message is a proof artifact confirming serialisation between 𝑀 & 𝑀

Page 10 of 18
MESH+

Table 2. Algorithm for the Verification of Proof-of-Serialization


Verifying Proof-of-Serialisation (based on Google Roughtime [29])
To verify the correct time, 𝑀 repeats the time syncronisation until consensus is reached.
Misbehaviour is identified by comparing the order of receiving times returned by 𝑀 and 𝑀 .
1. n miners 𝑀 … 𝑀 are randomly selected to participate in the verification

2. 𝑀 generates 𝐾 = 𝐻 𝑅 |𝑀 | 𝑀 and delivers it to 𝑀

3. 𝑀 responds with a signed message containing the current time and 𝐾

4. 𝑀 generates and sends 𝐿 = 𝐻(𝑅||𝑇||𝐾) to send to the next miner

5. The next miner replies with a signed message containing the current time and L

6. The previous steps repeat until at least three iterations are monotonic

7. 𝜃 is then confirmed to be the correct time


8. 𝑀 guarantees Proof-of-Coverage cannot be precomputed using 𝜃 in its construction
to confirm that data was obtained between the time of the previous Node and 𝜃

Table 3. Algorithm for the localization of the initial Target


Locating the initial Target 𝑇 for the Challenger 𝐶 who act as Miners in Mesh+ Network
1. 𝐶 seeds verifiable entropy 𝜂 by signing the current data packet with it’s private key

2. 𝐶 uses the probability associated with each Miner, derived from the associated
linearly decaying score, to locate 𝑇

3. The inverse cumulative distribution function is applied using a random integer


generated from 𝜂 , enabling discovery of potential targets due to their lower score

4. To mitigate for the decay of Miner Score over time, the inverse relationship is used to
give opportunity for Miners with low scores to participate in the network

5. The score decay enables all participants to send receipts to 𝐶 and broadcast the
remainder of the data packet

Generating the multi-layer packet of data without intervention a naïve


with n layers noted with 𝐷 , where each kth implementation would make stale,
layer 𝐷 consists of a three-tuple 𝐸(𝑆, 𝜏, 𝑅) exclusionary selections. To account for
of a secure encryption function 𝐸 using a this, a set of functions were constructed in
symmetric key based on Elliptic-Curve order to force the selection process to
Diffie-Hellman (ECDH) [30], a nonce 𝑆, the always assure that all contributors to the
time to broadcast the next layer 𝜏 and the network receive satisfactory scrutiny, the
reimander 𝑅 of 𝐷 in recursive three- algorithm in Table 5 has been employed.
tuples follows the subsequent algorithm
The algorithm used in the implementation
in Table 4.
of Proof-of-Coverage can be seen in
Due to the need for a decaying score that Table 6 (showing the generation) and
allows verification of every contributor to Table 7 (for verification).
the Mesh+ Network, it is possible that,
Table 4. Algorithm for the generation of the multi-layered packet of data
Generating the multi-layered packet of data
1. A contiguous radio network that contains 𝑇 is searched for candidate nodes 𝑇 for
selection

Page 11 of 18
MESH+

2. The Two targets 𝑇 and 𝑇 with highest scores from 𝑇 and farthest away from T are
selected

3. A weighted graph 𝑇 constructed from members of 𝑇 in radio range from each other
are connected with an edge weighted by the score-derived value 1 − 𝑠𝑐𝑜𝑟𝑒(𝑇 ) −
𝑠𝑐𝑜𝑟𝑒(𝑇 )

4. Shortest path between 𝑇 − 𝑇 − 𝑇 is found by Dijkstra’s algorithm based on the edge


weights

5. The set of public and private keys 𝐸 and 𝐸 are generated

6. A new layer 𝐷 is added to 𝐷 . The nonce 𝑆 is encrypted with the combination of the
public key of 𝑇 and 𝐸 as an ECDH exchange to compute a secret shared between
C and 𝑇 .

7. Step 6 is iterated to add additional layers until all 𝑇 → 𝑇 have a layer included in 𝐷

Table 5. Algorithm for the evaluation of the Miner's Selection Score


Evaluating the Miner’s Selection Score
1. The baseline score 𝜙 is assigned in the moment when the miner 𝑀 join the Mesh+
network

2. For each verification the score is modified in proportion to the height (h) since last
verification


𝛿𝑚 = {−(8ℎ ) 𝑣 =0𝑣 1− 𝑣
(0.25, 𝑣 )
> 0 𝑣 (1 − 10𝑣 ℎ ) 𝑣 <0
3. The score 𝜙 discriminates the probability of M being the target of C

𝑎𝑟𝑐𝑡𝑎𝑛 𝑎𝑟𝑐𝑡𝑎𝑛 (2𝛿𝑚) + 1.58


𝜙 =
3.16
1−𝜙
𝑃(𝑚) =
𝑛−∑ 𝜙
● Consistently failing verifications results in a negative 𝑣
● The initialisation of 𝑣 is the value of 0 which indicates no prior verifications
● To account for the default lack of verification data the steep parabolic curve was introduced
● Consistent successful verifications (𝑣 > 0) are modelled by the inverse parabola from 𝑌 = 1
● A higher number of positive verifications decreases score decay as a factor of ℎ′
● The inverse of the prior 2 points apply for 𝑣 < 0, except that positive verifications bound the
increase as a factor of 𝑣 to 0.25 whilst the inverse case is unbounded, increasing decay

Table 6. Algorithm for the generation of Proof-of-Coverage


Generating Proof-of-Coverage
1. 𝐶 listens for 𝐷 a time threshold 𝜃 until concluding that Proof-of-Coverage ends

2. 𝐶 assigns upper bounds for the packet 𝛼 and signal strength 𝑣 (bound by the speed
of light)

𝑣 = 𝑐(𝐷 + 𝜖) 𝑅𝑆𝑆𝐼 = 1/𝐷


𝑐 = speed of light; 𝐷 = geographical distance;
𝜖 = a small arbitary value 𝑅𝑆𝑆𝐼 = Received Signal Strength Indication

Page 12 of 18
MESH+

3. 𝑇 receives 𝐷 from 𝐶 through the Mesh+ network

4. 𝑇 decrypts the last layer

5. 𝑇 broadcasts the remaining data structure on the network

6. 𝑇 receives 𝐷 and decrypts it using its private key 𝑘 using 𝐸 (𝑆, 𝜏, 𝑅)

7. 𝑇 records the arrival of the packet 𝛼 and the strength of the signal 𝑣

8. When successful, 𝑇 signs the receipt 𝐾 = 𝑆 |𝛼| 𝜈 the private key 𝑘

9. 𝑇 submits 𝐾 to 𝐶, removes the last year, and broadcasts the remaining 𝐷

10. The previous steps are iterated until 𝑇 is reached as the last Target in the Mesh

Table 7. Algorithm for the verification of Proof-of-Coverage


Verifying Proof-of-Coverage
1. Verification occurs when 𝑇 delivers 𝐾 or 𝜃 elapsed

2. 𝐶 submits the proof to the network containing all 𝐾 receipts

3. A miner 𝑀 recreates the original steps to verify legitimacy of the proof

4. 𝑀 reconstructs the set of Miners 𝑁

5. 𝑀 checks whether the random seed 𝜂 could be produced at the declared time (approx.)

6. 𝑀 selects 𝑇 from 𝑁 and seeds it with the same 𝜂 to identify the same target selection

7. 𝑇 and 𝑇 are determined from the set of candidates 𝑇

8. The graph of Targets 𝑇 is reconstructed based on Dijkstra’s algorithm

9. The receipts 𝐾 are validated to have been signed by the private keys of 𝑇 … 𝑇 … 𝑇

10. If all steps are successful, Proof-of-Coverage is confirmed and the score is adjusted

known. GPS requires asset of 20 finely


synchronised satellites who provide
precise timestamped data from the orbit
Proof-of-Coverage and Proof-of- and use trilateration to generate useful
Serialisation were shown to provide proof geolocation data (a Time of Arrival or TOA
of a Miner’s location and to provide time method). A receiver requires up to 2
consensus between Miners. These proofs minutes to detect and communicate with
can be further used to extract physical sufficient satellites, draining battery life
geolocation information of devices that even when no location data is produced.
operate on the MPNP, which can be An AA battery makes the simplest GPS-
transformed into a novel type of proof based device provide at best 750
named Proof-of-Location. unencrypted geolocation datapoints, and
building render the technology useless.
Most present geolocation service The Mesh+ implementation for Proof-of-
providers are based on the use of the Location satisfies the requirements for a
Global Navigation Satellite Systems low power location detection system with
(GNSS), with GPS being the most well decent accuracy and is derived directly

Page 13 of 18
MESH+

from the Proof-of-Coverage and Proof-of-


Serialisation protocols, as seen in the
implementation from
Table 8Table 8 (generation) and Table 9 has been determined as the most
(verification). For step 6 multiple accurate but challenging implementation
alternative algorithms can be attempted, [31]–[33]. TDoA relies on the variance
including Received Signal Strength between precisely synchronised and
Indication (RSSI), Time of Arrival (ToA), recorded timing information between one
Time Differential of Arrival (TDoA). TDoA transmitter and multiple receivers. [34][35]
Table 8. Algorithm for the generation of Proof-of-Location
Generating Proof-of-Location
Proof-of-Location is achieved based on Proof-of-Coverage and Proof-of-Serialisation which
are used to achieve cryptographic proof of geolocation and cryptographic time-consensus
1. A Device 𝐷 broadcasts a packet of arbitrary data 𝑃 via the Mesh+ Network

2. Miners𝑀 … 𝑀 receive 𝑃and record the timestamp 𝜃 .. of when the packet was received

3. The nanosecond difference in time between GPS is used to obtain 𝜃 .. and then
stamped with raw radio data from the Node’s radio frontend

4. The data packet & timestamp is signed and delivered to the CLA belonging to 𝐷 by 𝑀

5. The CLA receives several copies of the packet of data each with a different timestamp

6. The time differences are transformed into a distance prediction for triangulation of 𝐷

Table 9. Algorithm for the verification of Proof-of-Location


Verifying Proof-of-Location
Proof-of-Location is achieved based on Proof-of-Coverage and Proof-of-Serialisation which
are used to achieve cryptographic proof of geolocation and cryptographic time-consensus
1. The signed packages with timestamps are used to verify which Miners were involved

2. The GPS location claimed by Miners is determined from the transaction history

3. Proof-of-Coverage and Scores are retrieved from Tangle and inspected

Scalability private key. Further defence mechanisms


Wireless hardware (Devices) are designed to prevent logical attacks on encrypted
to provide low power data exchange, so it data between the storage module and the
is feasible to use common batteries to host, in addition to physical protection &
power sensors for several years. The security. The 2.4GHz frequency enabled
MPNP was designed to allow Devices devices were released by Semtech,
manufactured using commodity hardware founding member in the LoRa Alliance, in
from a variety of low-cost, accessible 2020, providing single chipsets capable to
vendors using accessible materials. On- cover all useful frequency bands. [6]
the-market transceivers already provide Each Miner on the Mesh+ Network works
long-range network systems built with no with both an Iota Node and a Mesh+ Node
need for custom modulation schemes, installed. Since each Miner comes with an
with the cost of some being less than 10$. Iota Node, for every new Miner on the
One necessity is the compatibility with Network, the Iota Network itself gains in
ability to store, generate and provide processing speed, thus making the design
authentication using public/private NIST
P-256 ECC key pairs without leaking the

Page 14 of 18
MESH+

of Mesh+ the fastest IoT Network currently TOKENOMICS


available.
Tokenomics paper is being developed in
In addition, in terms of the storage collaborations With Hersons State
limitation for scalability, the Iota Network University od Cybernetics. Please see
excels by allowing the creation of separate document.
snapshots, so complete knowledge of the
entire Tangle history isn’t required (in Roadmap to Enhanced versions
contrast to Blockchain). This is an
of the platform
essential factor in the scalability and
Whilst already presenting itself as an
applicability of Iota for small, low power
innovative approach for providing
devices and enables applications on low
valuable, verifiable connectivity across
data rate networks on top of providing
the IoT ecosystem, with scalability, speed
great benefits at the level of simplifying
and range at its core, and with great
the implementation.
potential to supersede legacy
Mesh+ makes the web go round. technologies, multiple emergent
properties are in progress to expand the
What is the fuel?
functionality and benefits generated on
The MESH+ Consensus Protocol was
the basis of the Mesh+ project. Some of
designed with scalability and
the ongoing work is centred on the
sustainability at its core. Many of today’s
following areas:
blockchain-derived projects require
computationally and energy expensive 1. Extending the applicability of the ideas
Proof-of-Work system for validating and and methodology introduced here to
protecting the network, using the other physical layers besides LoRa,
Nakamoto Consensus. This is derived from such as legacy infrastructures
the asymmetry inherent in the distinction including WiFi, Bluetooth and Cellular
between creation and validation of to extend the reach of our work
complex cryptographical problems. This towards achieving our goal.
implies multiple bottlenecks in hardware 2. Expand and improve through
cost, power consumption, physical sustained research effort the Proof-
storage, unpredictable evolution of of-Coverage system, further
Moore’s law, computational efficiency, increasing network security.
and others. Bitcoin’s wastefulness in 3. Develop improvements to the Forward
power consumption resulted in its power Error Correction technique to increase
consumption surpassing nations, and the range and improve connectivity
degree of complexity inherent in today’s across an increased number of
mining essentially took the distribution of devices whilst maintain a low energy
mining effort out of the average person’s consumption.
reach, including the block rewards 4. Explore the impact of the incentives
associated with it. Due to the systems trialled in our current
contemporary energy transition and implementation and explore through
increasing carbon taxes and storage research alternatives and
costs [36], fewer and fewer nations will be improvements
able to take part in the crypto revolution, 5. Gain and analyse usage empirical
and fewer of those available are willing to data to determine the effectiveness of
take the volatility and regulatory risks [37]. the scoring algorithm used in Proof-of-
Coverage.
6. Generate improved MPNP wireless
specifications.

Page 15 of 18
MESH+

7. Develop proprietary hardware for use Dr. Oleksandr Letychevsky


as Nodes and Device Modules. SENIOR TECHNOLOGY OFFICER / LEAD
8. Develop proprietary dual band RESEARCHER
modules and PCB’s Oleksandr has more than 85 scientific,
mathematical publications. He is also the
CONCLUSION founder of Geruda. He does algebraic
The Internet-of-Things market has been modeling, tokenomics and cyber security of
consistently identified as one of the distributed systems. Oleksandr worked as a
highest potential growth sectors in tech. Contractor/Consultant for Motorola.
With the number of connected devices
having surpassed the Earth’s population Professor Volodymyr Peschanenko
and with the prospect of increasing LEAD DEVELOPER
expansion of technology ecosystems, Head of department of computer science and
software engineering of Kherson State
the immense growth in future devices
University. Insertion modelling, symbolic
requiring network connectivity must be
modelling, deductive systems, mathematical
addressed through a scalable, software, computer algebra algorithms,
sustainable and effective solution that tokenomics modelling.
isn’t dependant of an unique centralised
authority, and which is capable of Anil Pervaiz
surpassing infrastructure PROGRAMMER / WEB DEVELOPER
incompatibilities and national Anil is a certified web developer. Having 7
boundaries. Mesh+ offers the unique years of web programming experience, no
prospect of a truly global crypto project task is impossible. Anil is a front and back end
PHP, Python developer for Mesh+.
with the capability to provide network
connectivity on the unlicensed sub-GHz Cort Honey
and 2.4GHz spectra based on the feeless MARKETING / TECHNICAL WRITER
Iota Tangle, with a safe, reliable, design After graduating from Clarkson University,
capable of providing internet one of the top engineering schools in the
connectivity, identity matching and United States, with a combined engineering
geolocation tracking with extremely low and business degree, Cort Honey went on to
power consumption and high transaction work with cutting edge tech companies such
rate and throughput. The Mesh+ network as Klarna, PimCore, Bonitasoft.
may provide significant cost savings in Mircea-Teodor Raduta
contrast with competing solutions whilst MARKETING / TECHNICAL WRITER
democratising access to the Iota Teo’s foundation was set during his study of
ecosystem, potentially accelerating the Aerospace Engineering at the University of
development of IoT projects. Bristol, where he became involved with the
Start-up Citiblocks, followed by work on a
OVERVIEW OF THE TEAM project set by Airbus on the design of
hydrogen aircraft, followed by research of
Timothy Kravchunovsky smart shape changing biomaterials, then
FOUNDER & CHIEF TECHNOLOGY OFFICER pivoting into the Nuclear sector on the first
Tim is a network engineer with 20 years of Refurbishment of a CANDU NPP in an
experience. Tim is a graduate of University of Emerging Market (Nuclearelectrica in
Maryland (Computer Science), masters in partnership with SNC Lavalin).
management Columbia University and
completed executive management Certificate Contact
program from Cornell University. Tim has https://mesh-plus.webflow.io/contact
worked as a contractor for the World Bank,
Chemonics International and RTTV
Washington.

Page 16 of 18
MESH+

References: Security, 2018, pp. 41–51, doi:


10.5220/0006668400410051.
[1] J. Frankenfield, “Tangle (IOTA),”
2021. [Online]. Available: [9] M. Knight and B. Seeber, “Decoding
https://www.investopedia.com/term LoRa: Realizing a Modern LPWAN
s/t/tangle-cryptocurrency.asp. with SDR,” 2016.
[Accessed: 21-Nov-2021].
[10] A. Durand, P. Gremaud, and J.
[2] The IOTA Foundation, “An Pasquier, “Decentralized LPWAN
Introduction to IOTA.” [Online]. infrastructure using blockchain
Available: and digital signatures,” Concurr.
https://wiki.iota.org/learn/about- Comput. Pract. Exp., vol. 32, no. 12,
iota/an-introduction-to-iota. pp. 1–10, 2020, doi:
[Accessed: 21-Nov-2021]. 10.1002/cpe.5352.
[3] J. Frankenfield, “IOTA (MIOTA),” 2021. [11] IOTA Foundation, “IOTA 2.0 DevNet
[Online]. Available: (Nectar) - The Era of IOTA’s
https://www.investopedia.com/term Decentralization Starts Here,” 2021.
s/i/iota.asp. [Accessed: 21-Nov- [Online]. Available:
2021]. https://blog.iota.org/iotav2devnet/.
[Accessed: 27-Nov-2021].
[4] S. Popov, “The Tangle (IOTA
Whitepaper v1.4.3),” New Yorker, vol. [12] I. Ullah, G. de Roode, N. Meratnia,
81, no. 8, pp. 1–28, 2018. and P. Havinga, “Threat modeling—
how to visualize attacks on iota?,”
[5] U. Raza, P. Kulkarni, and M.
Sensors, vol. 21, no. 5, pp. 1–33,
Sooriyabandara, “Low Power Wide 2021, doi: 10.3390/s21051834.
Area Networks: An Overview,” IEEE
Commun. Surv. Tutorials, vol. 19, no. [13] S. Popov et al., “The Coordicide,”
2, pp. 855–873, 2017, doi: IOTA Found., 2020.
10.1109/COMST.2017.2652320.
[14] Q. Bramas, “The Stability and the
[6] T. Janssen, N. Bnilam, M. Aernouts, Security of the Tangle To cite this
R. Berkvens, and M. Weyn, “Lora 2.4 version : HAL Id : hal-01716111,” 2018.
ghz communication link and range,”
Sensors (Switzerland), vol. 20, no. [15] S. Popov, O. Saa, and P. Finardi,
16, pp. 1–12, 2020, doi: “Equilibria in the tangle,” Comput.
10.3390/s20164366. Ind. Eng., vol. 136, pp. 160–172, 2019,
doi: 10.1016/j.cie.2019.07.025.
[7] R. Ghanaatian, O. Afisiadis, M.
Cotting, and A. Burg, “Lora Digital [16] L. Tennant, “Improving the
Receiver Analysis and Anonymity of the IOTA
Implementation,” in ICASSP 2019 - Cryptocurrency,” pp. 1–20, 2017.
2019 IEEE International Conference [17] Nokia, “LTE evolution for IoT
on Acoustics, Speech and Signal connectivity,” pp. 1–18, 2017.
Processing (ICASSP), 2019, pp. 1498–
1502, doi: [18] E. J. Oughton, Z. Frias, S. van der
10.1109/ICASSP.2019.8683504. Gaast, and R. van der Berg,
“Assessing the capacity, coverage
[8] P. Robyns, P. Quax, W. Lamotte, and and cost of 5G infrastructure
W. Thenaers, “A Multi-Channel strategies: Analysis of the
Software Decoder for the LoRa Netherlands,” Telemat. Informatics,
Modulation Scheme,” in vol. 37, no. October 2018, pp. 50–69,
Proceedings of the 3rd 2019, doi: 10.1016/j.tele.2019.01.003.
International Conference on
Internet of Things, Big Data and [19] OFCOM, “Communications Market

Page 17 of 18
MESH+

Report 2021,” 2021. fbcabe5a49477708540f3.


[Accessed: 21-Nov-2021].
[20] OFCOM, “Connected Nations Report
2020,” 2020. [30] E. Ben-Sasson, A. Chiesa, E. Tromer,
and M. Virza, “Scalable Zero
[21] Lora Alliance, “Why LoRaWAN is the Knowledge Via Cycles of Elliptic
logical choice for asset-tracking Curves,” Algorithmica, vol. 79, no. 4,
connectivity,” 2020. pp. 1102–1160, 2017, doi:
[22] IoT ONE, “Track & Trace of Assets.” 10.1007/s00453-016-0221-0.

[23] ON World Inc, “Industrial IoT Asset [31] M. Aernouts, N. BniLam, R. Berkvens,
Tracking,” 2019. and M. Weyn, “TDAoA: A
combination of TDoA and AoA
[24] L. Lamport, R. Shostak, and M. localization with LoRaWAN,”
Pease, “The Byzantine Generals Internet of Things, vol. 11, p. 100236,
Problem,” ACM Trans. Program. Sep. 2020, doi:
Lang. Syst., vol. 4, no. 3, pp. 382– 10.1016/j.iot.2020.100236.
401, Jul. 1982, doi:
10.1145/357172.357176. [32] R. Muppala et al., “Feasibility of
Standalone TDoA-based
[25] A. Miller, Y. Xia, K. Croman, E. Shi, Localization Using LoRaWAN,” 2021.
and D. Song, “The Honey Badger of
BFT protocols,” Proc. ACM Conf. [33] I. Daramouskas, D. Mitroulias, I.
Comput. Commun. Secur., vol. 24- Perikos, and M. Paraskevas,
28-Octo, no. Section 3, pp. 31–42, “Localization in LoRa Networks
2016, doi: 10.1145/2976749.2978399. Based on Time Difference of
Arrival,” pp. 1–15.
[26] M. Möser and R. Böhme, “The price
of anonymity: empirical evidence [34] N. Patwari, A. O. Hero, M. Perkins, N.
from a market for Bitcoin S. Correal, and R. J. O’Dea, “Relative
anonymization,” J. Cybersecurity, location estimation in wireless
vol. 3, no. 2, pp. 127–135, Jun. 2017, sensor networks,” IEEE Trans.
doi: 10.1093/cybsec/tyx007. Signal Process., vol. 51, no. 8, pp.
2137–2148, 2003, doi:
[27] J. Wang, X. Ling, Y. Le, Y. Huang, and 10.1109/TSP.2003.814469.
X. You, “Blockchain-enabled
wireless communications: a new [35] M. Farooq-i-Azam and M. N. Ayyaz,
paradigm towards 6G,” Natl. Sci. “Location and position estimation
Rev., vol. 8, no. 9, 2021, doi: in wireless sensor networks,” Wirel.
10.1093/nsr/nwab069. Sens. Networks Curr. Status Futur.
Trends, pp. 179–214, 2016, doi:
[28] M. Abliz and T. Znati, “A guided tour 10.1201/b13092-8.
puzzle for denial of service
prevention,” Proc. - Annu. Comput. [36] D. Jones, “GLOBAL ELECTRICITY
Secur. Appl. Conf. ACSAC, pp. 279– REVIEW 2021,” EMBER, 2021.
288, 2009, doi: [37] R. Xie, Why China Had to Ban
10.1109/ACSAC.2009.33. Cryptocurrency but the U.S. Did
[29] A. Langley and B. Linsay, Not: A Comparative Analysis of
“Roughtime,” 2018. [Online]. Regulations on Crypto-Markets
Available: between the U.S. and China, vol. 18,
https://roughtime.googlesource.co no. 2. 2019.
m/roughtime/+/51f6971f5f06ec101e5

Page 18 of 18

You might also like