Download PDF
Helium > Case Studies > An In-Depth Look Into Helium's Decentralized Machine Network
Helium Logo

An In-Depth Look Into Helium's Decentralized Machine Network

 An In-Depth Look Into Helium's Decentralized Machine Network - IoT ONE Case Study
Technology Category
  • Application Infrastructure & Middleware - Blockchain
Use Cases
  • Track & Trace of Assets
The Challenge

The Internet of Things is an $800 billion industry, with over 8.4 billion connected devices online, and spending predicted to reach nearly $1.4 trillion by 2021 [1]. Most of these devices need to connect to the Internet to function. However, current solutions such as cellular, WiFi, and Bluetooth are suboptimal: they are too expensive, too power hungry, or too limited in range.

About The Customer
Helium is already trusted by thousands of businesses ranging from Twilio and Microsoft to Lemnos Labs and Nestle.
The Solution

Helium is a decentralized machine network that enables machines anywhere in the world to wirelessly connect to the Internet and geolocate themselves without the need for powerhungry satellite location hardware or expensive cellular plans. Powering the network is a blockchain with a native protocol token incentivizing a two-sided marketplace between coverage providers and coverage consumers.

Operational Impact
  • We present a computationally inexpensive Proof-of-Coverage that allows miners to prove they are providing wireless network coverage. We anchor these proofs using a Proof-of-Serialization that allows miners to prove they are accurately representing time relative to others on the network in a cryptographically secure way.

  • We demonstrate an entirely new purposebuilt blockchain network built to service the Wireless Protocol and provide a system for authenticating and identifying machines, providing cryptographic guarantees of data transmission and authenticity, offer transaction primitives designed around the wireless protocol, and more

  • We present a novel consensus protocol construction that creates a permissionless, high throughput, censor-resistant system by combining an asynchronous Byzantine Fault Tolerant protocol with identities presented via Proof-of-Coverage.

Related Case Studies.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.