Author: IoTeX Foundation, Translation: Golden Finance xiaozou
Recently, DePIN has entered the crypto mainstream, bringing with it issues and challenges such as decentralization, scalability, verifiability, authentication management, and data trust. This article will delve into some of these issues, as well as several solutions provided by the IoTeX core team through its product W3bstream, a rollup-centric scalable architecture for off-chain data computation.
1. DePIN refresher
DePIN (Decentralized Physical Infrastructure Network) Representative It is a major change in the traditional Internet of Things system based on Web2. Traditionally, IoT systems have been either cloud-centric, with data originating from physical devices passed to the cloud for processing and storage through IoT gateways, or edge-centric, involving edge servers that process data closer to the source. . These architectures, while popular in IoT applications, are centralized or hybrid in nature. However, DePIN introduces an innovative approach by integrating three core technologies – blockchain, IoT, and token economics. This integration supports the creation of infrastructure networks and machine economies from the ground up. What makes DePIN unique is its community-driven model that encourages applications to be built for the common good, rather than being centrally deployed and maintained by a single company.
There are two main types of DePIN:
Physical Resource Network (PRN): This type of network focuses on location-related hardware to deliver unique goods or services. Examples include wireless connectivity, geospatial intelligence via area-specific sensors, and mobile applications such as car servicing.
Digital Resource Network (DRN): DRN incentivizes the hardware deployment of alternative resources (such as computing power, storage or bandwidth), supporting Enable large-scale network creation for tasks such as video/audio rendering or storage serving without the need for location-specific hardware.
DePIN has a rich and colorful ecosystem, and many startups are exploring different aspects, such as decentralized computing, storage, and bandwidth. Network and communication protocols. Regardless of which category a project falls into, DePIN faces its own inherent challenges, such as establishing system authentication, addressing privacy issues, and especially scalability.
2. DePIN scalability challenge
As mentioned before, scalability is A key challenge, which is determined by the inherent characteristics of DePIN applications. DePIN typically involves large networks with a large number of devices, generating and processing large amounts of data. At the same time, although integration with blockchain technology provides a strong foundation of trust, it also brings its own limitations. Blockchain is known for its high level of trust, but is hampered by limited processing power and expensive data storage. The contrast of this extensive network and data demand with the blockchain’s limited processing power certainly highlights the scalability challenges faced by DePIN applications.
Ethereum Rollup method
Ethereum has always adopted The solution to the scalability problem is a rollup-centric roadmap. The strategy is fundamentally a rethinking of how data is processed and transactions are executed in blockchain networks.
(1) L2 Rollup: Ethereum advocates offloading most of the data processing and execution to the L2 Rollup network, rather than relying entirely on L1 (main block chain) to do all the work. These networks run alongside the main chain but process transactions in a more efficient way.
(2) Batch transactions: The L2 network collects transactions from the L1 network and processes them in batches. By batching multiple transactions, the Rollup network can process transaction packages more efficiently than processing transactions one by one on the main chain.
(3) Proof generation and verification: The L2 network generates proofs after batch processing of transactions. This proof is a cryptographic proof that verifies that all transactions processed in the Rollup network are valid. The L1 network then verifies this proof via a smart contract. This process ensures the integrity of transactions processed on the L2 network.
(4) L1 trust anchor: Despite offloading data processing to the L2 network, the L1 blockchain retains its role as a core trust anchor. It does this by validating proofs from the L2 network, thereby maintaining the integrity and security of the entire network.
(5) Effective state transition: The L1 network receives these proofs and corresponding state transitions, and it can process this batch of transactions more efficiently. This approach reduces the burden on the L1 network, allowing it to function more effectively as a trust anchor while handling fewer but more critical tasks.
This rollup-centric approach allows Ethereum to greatly enhance scalability and can be applied to DePIN with slight adjustments.
3. W3bstream: L2 Rollup specifically for DePIN
As mentioned above, The rollup-centric approach can also be used to extend DePIN applications. This approach is the core idea behind IoTeX's W3bstream, IoTeX's L2 network created specifically for the Scaling DePIN project, capable of compressing (aggregating) large amounts of off-chain data into smaller, verifiable zero-knowledge proofs to trigger on-chain trade. Now let's look at the main components of this approach:
Sovereign Smart Devices: These are critical to the DePIN project’s data credibility. Deployed in the real physical world, these devices not only collect data but also demonstrate the trustworthiness of the data collection process.
Data availability layer: The data availability layer is responsible for temporarily storing data received from the device. It can be either on-chain or off-chain and is different from permanent storage due to its short-term nature.
Decentralized Sorting Network (DSN): DSN reaches consensus on the data collected from devices and stores it in the data availability layer. This consensus is necessary to perform any meaningful calculations.
Decentralized aggregation network: This network is responsible for computing, retrieving data in batches from the data availability layer, and serving one or more devices Generate zero-knowledge proofs of aggregates.
L1 network: Smart contracts on L1 can serve as validators to verify zero-knowledge proofs generated by off-chain aggregators. In this way, L1 serves as the trust foundation and settlement layer for DePIN applications. The high-level flow chart of this architecture is as follows:
The following sections will analyze this architecture in more detail, starting from how to collect trusted Data begins, then data preprocessing and data availability are explained, before exploring the aggregate proof generation process.
(1) Trusted data collection
In DePIN In applications, trusted data collection is crucial and is mainly achieved through two methods: based on TEE (Trusted Execution Environment) and based on zero-knowledge proof (ZKP).
Based on TEE: TEE passes Protected areas of the device isolate data collection code to ensure secure data collection. This approach also includes remote authentication, supporting external verification of device operation and code integrity.
ZKP-based: This method enables devices to prove the accuracy of their data collection without leaking the underlying data. It will vary based on device capabilities, using onboard ZKP generation for powerful devices and remote generation for more constrained devices.
The combination of TEE and ZKP increases the credibility of data collection by DePIN applications and affects the overall effectiveness of related financial systems . Future research will focus on improving ZKP efficiency, especially for devices with multiple sensors or complex data collection needs.
(2) Data preprocessing and data availability
The second major component of the DePIN architecture is data preprocessing and ensuring data availability, supported by a decentralized sequencing network. The network serves multiple DePIN projects and solves the challenges of device diversity, particularly in communication protocols.
Decentralized sorting network:
Function: Perform data preprocessing. Data comes from different devices, and the network processes the data to ensure data consistency and compatibility.
Verification process: Each node in the network verifies the data through two steps: (1) Confirm the validity of the data collection process, you can This can be confirmed by checking the certification report provided by the TEE-enabled device, or by verifying the certificate generated by the device. (2) Verify the device signature to ensure the authenticity of the data source.
Data storage and availability:
After preprocessing: After the data is preprocessed and consensus is reached within the network, it will be stored in Project-specific data availability tiers.
Custom storage solution: Projects have the flexibility to choose their preferred data availability tier. This is achieved through configurable storage adapters that enable data to be stored in selected data availability tiers.
This part of the DePIN architecture plays a key role in standardizing and protecting data flows from different devices, ensuring that the data is unified processing and efficient storage.
(3) Data proof aggregation
DePIN architecture The third component focuses on aggregate proof generation, a process essential for validating DePIN project calculations.
Aggregator nodes and computing pools:
The network consists of aggregator nodes, which Nodes form an off-chain computing resource pool that is shared among all DePIN projects. These nodes periodically select an idle aggregator to handle computing tasks for a specific DePIN project based on on-chain status monitors.
The aggregator node performs the task:
The selected node retrieves data from the data availability layer, Then perform the necessary calculations and generate proofs for the DePIN project. This proof is sent to the L1 smart contract for verification, after which the node returns to idle state.
To generate aggregation proofs, the system will utilize a hierarchical aggregation circuit consisting of the following components:
Data compression circuit: Its function is similar to a Merkle tree, verifying all collected data All come from specific Merkel tree roots.
Signature batch verification circuit: Verify the validity of data from devices in batches, and each device is associated with a signature.
DePIN computational circuits: Proof of specific computational logic for DePIN projects (such as verifying the number of steps in a healthcare project or the generation of solar power plants energy) are executed correctly.
Proof aggregation circuit: aggregates all proofs into one proof for final verification by L1 smart contract.
Data proof aggregation is crucial to ensure the integrity and verifiability of DePIN project calculations, providing a way to verify off-chain Computing and data processing provide reliable and efficient methods.
4. Conclusion
In short, W3bstream manages efficiently through its decentralized sorting network Data preprocessing contributes to DePIN’s scalability. It supports aggregate proof generation, which is critical for validating complex computations across large networks. By facilitating off-chain computation and providing powerful mechanisms for on-chain proof verification, W3bstream significantly improves the throughput and efficiency of DePIN applications. While W3bstream relies on the IoTeX blockchain (which remains a perfect choice for emerging DePIN applications due to its speed, security, and cost-effectiveness), it can support any existing DePIN project on any blockchain. Its architecture, which supports scalable security infrastructure, makes it an important part of the broader decentralized web ecosystem.