• Tidak ada hasil yang ditemukan

Potential IoT Applications by Archetype

Dalam dokumen OER000001402.pdf (Halaman 66-71)

3 Potential Applications

3.2 Potential IoT Applications by Archetype

At Taraxa, we identified three distinct categories of IoT-relevant blockchain applica- tions. Because this is a nascent and rapidly evolving space, this only represents our latest thinking at the time of writing.

3.2.1 IoT Data Anchoring

IoT devices generate a great deal of data, and when that data is shared across entities it needs to be trusted. One way to augment trust is to establish unique identities for each data-generating device and have the devices anchor the data they have collected onto the blockchain.

The anchoring process involves placing a hash (a function that maps data of arbitrary size into data of fixed size in a way that minimizes collisions—different pieces of data cannot map into the same hash) of a data set collected by the device along with its signature into say a smart contract as a record of the provenance of the data as well as proof that the data has not been tampered with. Only the hash of the data set should be stored on-chain, and not the full data set, because we want to minimize the load and cost of using the blockchain, and the signature guarantees that the data came from the device. Of course, this would also require that the device manufacturer publish the public keys embedded (preferably via secure hardware) into their devices.

Examples:

Cold chain logistics: a supermarket that is taking delivery of milk shipped via cold chain would like to have guarantees that the milk has been properly refrigerated throughout its route. If the refrigeration units were turned off during shipping for a few hours and turned back on, the supermarket would not be able to tell the difference until the milk started to spoil much earlier than expected. Location and temperature sensors could be installed on each refrigerated truck. These would intermittently upload data as well as anchor that data onto the blockchain, ensuring that the shipping company has not tampered with the data after the event.

Public infrastructure monitoring: with the advent of public–private partner- ships, many local governments are increasingly outsourcing the management and maintenance of public infrastructure such as bridges, roads, and tunnels to pri- vate companies. Once outsourced, the government has a responsibility to ensure that public infrastructure is being well maintained and that the data reported are accurate (e.g., toll income, maintenance expenditure). Sensors installed on such public infrastructure (e.g., cameras, strain gauges, moisture) will also anchor the data they collect onto the blockchain to prove to local governments that the data has not been tampered with.

3.2.2 Machine Monetization and Eventual Tokenization

Many assets being monitored by sensors are revenue-generating machines that require significant upfront capital outlay to deploy. For many new ventures, obtaining funding or loans through traditional financing channels may be challenging.

With proper data anchoring, the earning capabilities of such machines can be tracked in real time on the blockchain, providing proof and generating expectations for future income. Businesses can then solicit potential customers to invest in shares

of these machines by issuing digital tokens on the blockchain. This has the dual benefit of not only raising funds from a much wider pool of potential investors, but also that the tokens are likely to end up in the hands of customers who have interest in purchasing the services of the machine in the future.

Examples:

Shared vehicles: require the operator to not only make large upfront investments to purchase a fleet of cars but also run continuous and aggressive marketing cam- paigns to generate awareness. If each vehicle’s location, movement, mileage, and, most importantly, income data were to be released to the public (anonymized to protect driver privacy), each vehicle could be tokenized and those who purchase the tokens would receive a heavy discount when renting the shared vehicle. Not only does this alleviate the pressure of extremely large upfront investments, it also ties customers into an ecosystem that they now have a stake in and financial incentives into drive the service’s adoption, elegantly killing two birds with one stone.

Smart vending machines: vending machines are becoming increasingly popular around the world as a low-cost and highly convenient alternative to manned store- fronts, but their value remains underutilized. With so many machines deployed on every street corner, they could easily be outfitted with additional IoT infrastructure to enable them to collect data of their surroundings (e.g., foot and vehicle traffic, localized weather) which could be sold, become distribution points for humanitar- ian aid (e.g., disaster relief, charitable giving), or even serve up a far more accurate alternative geo-location service (e.g., via WiFi triangulation) in an urban environ- ment to GPS. All of which could not only help further monetize these vending machines but also provide social services far beyond their original design goals.

Machine to Machine Economy

The ultimate application is to enable machines to trade with one another autonomously. This of course would require a very high level of intelligence and autonomy on the part of the machines, but a variety of mechanisms could be designed where machines can discover and purchase resources they require to optimally complete their stated objectives.

One of the most common mechanisms is a marketplace; here we look at two potential applications.

Agricultural dronescould make real-time decisions on plant protection (e.g., insecticide) deployment across a field based on its internal models and by pur- chasing data from the surrounding sensors. It could purchase or trade data with cameras in the surrounding fields for analytics on pest detection, from local weather sensors to predict chances of rain so that the chemicals will not be washed off min- utes after deployment, from local soil moisture sensors to customize the level of dilution, etc. Once machines are automated by AI and empowered by blockchain, they can operate and interact with one another with minimal intervention.

Traffic routingfor autonomous vehicles may be very different than for vehicles operated by humans. Vehicles could, in real time, communicate their intended destination, urgency, and willingness to pay surrounding vehicles so that traffic could be routed and reshaped in real time according to supply and demand. Usual visual and audio cues created for human drivers would not be necessary (e.g., traffic lights, turn signals), and in their place would be a dynamic real time bidding market for road space as a commodity.

References

Bernanke BS (2018) The real effects of the financial crisis. In: BPEA conference draft, vol Fall Churyumov A (2016) Byteball: a decentralized system for storage and transfer of value, 1 Oct 2016

[Online]. Available:https://byteball.org/Byteball.pdf. Accessed 17 Dec 2018

Columbus L (2018) 10 charts that will challenge your perspective of IoT’s growth. Forbes, 6 June 2018 [Online]. Available: https://www.forbes.com/sites/louiscolumbus/2018/06/06/10-charts- that-will-challenge-your-perspective-of-iots-growth/#47c74fd13ecc. Accessed 15 Nov 2018 De N (2018) Smart contracts now recognized under Tennessee Law. Coindesk, 23 Mar

2018 [Online]. Available: https://www.coindesk.com/blockchain-bill-becomes-law-tennessee.

Accessed 15 Nov 2018

Ethereum White Paper (2018) 21 Aug 2018 [Online]. Available:https://github.com/ethereum/wiki/

wiki/White-Paper. Accessed 17 Dec 2018

EU GDPR.ORG (2018) GDPR FAQs. EU GDPR.ORG [Online]. Available:https://eugdpr.org/the- regulation/gdpr-faqs/. Accessed 15 Nov 2018

Graff GM (2017) How a dorm room minecraft scam brought down the internet. WIRED, 13 Dec 2017 [Online]. Available:https://www.wired.com/story/mirai-botnet-minecraft-scam-brought-down- the-internet/. Accessed 15 Nov 2018

Granville K (2018) Facebook and Cambridge analytica: what you need to know as fallout widens.

The New York Times, 19 Mar 2018 [Online]. Available:https://www.nytimes.com/2018/03/19/

technology/facebook-cambridge-analytica-explained.html. Accessed 15 Nov 2018

IBM Research Editorial Staff (2018) Elegant, disgusting cryptography. IBM, 21 Mar 2018 [Online]. Available: https://www.ibm.com/blogs/research/2018/03/elegant-disgusting- cryptography/. Accessed 15 Nov 2018

Investopedia (2018) Bitcoin. Investopedia [Online]. Available: https://www.investopedia.com/

terms/b/bitcoin.asp. Accessed 31 Oct 2018

MacMillan D, McMillan R (2018) Google exposed user data, feared repercussions of disclosing to public. Wall Street Journal, 8 Oct 2018 [Online]. Available:https://www.wsj.com/articles/google- exposed-user-data-feared-repercussions-of-disclosing-to-public-1539017194. Accessed 15 Nov 2018

Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system, 31 Oct 2008 [Online]. Available:

https://bitcoin.org/bitcoin.pdf. Accessed 31 Oct 2018

Narayanan A, Clark J (2017) Bitcoin’s academic pedigree. acmqueue 15(4)

Narula N (2017) Cryptographic vulnerabilities in IOTA. Medium, 7 Sept 2017 [Online]. Available:

https://medium.com/@neha/cryptographic-vulnerabilities-in-iota-9a6a9ddc4367. Accessed 2 Nov 2018

Popov S (2018) The tangle, 30 Apr 2018 [Online]. Available: https://assets.ctfassets.net/

r1dr6vzfxhev/2t4uxvsIqk0EUau6g2sw0g/45eae33637ca92f85dd9f4a3a218e1ec/iota1_4_3.pdf.

Accessed 17 Dec 2018

Sompolinsky Y, Zohar A (2013) Secure high-rate transaction processing in bitcoin. 2013 [Online].

Available:https://eprint.iacr.org/2013/881.pdf. Accessed 17 Dec 2018

Sompolinsky Y, Lewenberg Y, Zohar A (2016) SPECTRE: serialization of proof-of-work events:

confirming transactions via recursive elections, 2016 [Online]. Available:https://eprint.iacr.org/

2016/1159.pdf. Accessed 17 Dec 2018

Sompolinsky Y, Zohar A (2018) PHANTOM, GHOSTDAG: two scalable blockDAG protocols.

2018 [Online]. Available:https://eprint.iacr.org/2018/104.pdf. Accessed 17 Dec 2018

Tung L (2017) IoT devices will outnumber the world’s population this year for the first time. ZDNet, 7 Feb 2017 [Online]. Available:https://www.zdnet.com/article/iot-devices-will-outnumber-the- worlds-population-this-year-for-the-first-time/. Accessed 31 Oct 2018

TrueBench (2018) TrueBench, 31 Oct 2018 [Online]. Available:http://truebench.the-toffee-project.

org/

World Economic Forum (2018) Blockchain beyond the hype, World Economic Forum, Geneva

Steven Puis an entrepreneur and strategy consultant. Prior to founding Taraxa, he co-founded multiple venture-funded startups in wireless mesh networks, mobile health, and healthcare ser- vices. He was also a director at Monitor Deloitte’s China office, spearheading the firm’s digital strategy practice, advising senior executives of multinational corporations on how large organiza- tions could effectively capture innovation and respond quickly to market disruptions.

Mr. Pu holds undergraduate and master’s degrees in electrical engineering from Stanford University.

Open Access This chapter is licensed under the terms of the Creative Commons Attribution- NonCommercial-NoDerivatives 4.0 International License (http://creativecommons.org/licenses/by- nc-nd/4.0/), which permits any noncommercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if you modified the licensed material.

You do not have permission under this license to share adapted material derived from this chapter or parts of it.

The images or other third party material in this chapter are included in the chapter’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.

Theory of Money: From Ancient

Dalam dokumen OER000001402.pdf (Halaman 66-71)