IoTeX Contributions to
Industry IoT Consortium

IoTeX Contributions to Industry IoT Consortium

Machine Economy – The New Frontier of Digital Transformation in IoT

This article covers the technologies needed for machine economy which is composed of a network of smart, connected and economically independent devices and machines acting as autonomous market participants capable of executing economic transactions with little to no human intervention.

Machine Economy – The New Frontier of Digital Transformation in IoT

This article covers the technologies needed for machine economy which is composed of a network of smart, connected and economically independent devices and machines acting as autonomous market participants capable of executing economic transactions with little to no human intervention.

Machine Economy – The New Frontier of Digital Transformation in IoT

This article covers the technologies needed for machine economy which is composed of a network of smart, connected and economically independent devices and machines acting as autonomous market participants capable of executing economic transactions with little to no human intervention.

Automated Onboarding and Device Provisioning Best Practices

The whitepaper is intended for system integrators, service providers, and those who implement industrial IoT solutions, the paper offers security best practices and guidance for automated device onboarding and provisioning.

Automated Onboarding and Device Provisioning Best Practices

The whitepaper is intended for system integrators, service providers, and those who implement industrial IoT solutions, the paper offers security best practices and guidance for automated device onboarding and provisioning.

Automated Onboarding and Device Provisioning Best Practices

The whitepaper is intended for system integrators, service providers, and those who implement industrial IoT solutions, the paper offers security best practices and guidance for automated device onboarding and provisioning.

Identification of Information Entities

The whitepaper defines identifiers and their use, provides examples of commonly used identifiers, and references associations involved in specifying identifiers. The whitepaper aims to help organizations evaluate and evolve identifier systems for interoperability in IoT systems.

Identification of Information Entities

The whitepaper defines identifiers and their use, provides examples of commonly used identifiers, and references associations involved in specifying identifiers. The whitepaper aims to help organizations evaluate and evolve identifier systems for interoperability in IoT systems.

Identification of Information Entities

The whitepaper defines identifiers and their use, provides examples of commonly used identifiers, and references associations involved in specifying identifiers. The whitepaper aims to help organizations evaluate and evolve identifier systems for interoperability in IoT systems.

Trusted and Transparent Asset Tracking on the Edge

This technical brief describes how to build a trusted and transparent asset-tracking solution by combining three technical components: secure edge devices, consortium blockchain and standardized supply chain data formats. The resulting solution facilitates collaboration among supply chain stakeholders, improves supply chain efficiency and user experience, and achieves substantial cost savings.

Trusted and Transparent Asset Tracking on the Edge

This technical brief describes how to build a trusted and transparent asset-tracking solution by combining three technical components: secure edge devices, consortium blockchain and standardized supply chain data formats. The resulting solution facilitates collaboration among supply chain stakeholders, improves supply chain efficiency and user experience, and achieves substantial cost savings.

Trusted and Transparent Asset Tracking on the Edge

This technical brief describes how to build a trusted and transparent asset-tracking solution by combining three technical components: secure edge devices, consortium blockchain and standardized supply chain data formats. The resulting solution facilitates collaboration among supply chain stakeholders, improves supply chain efficiency and user experience, and achieves substantial cost savings.

Impact of Distributed Ledgers on Provider Networks

This whitepaper analyzes the operational impact of peer-to-peer distributed ledgers on the service provider network and proposes several innovations service providers can consider to improve network efficiency and eliminate wasteful DLT communication.

Impact of Distributed Ledgers on Provider Networks

This whitepaper analyzes the operational impact of peer-to-peer distributed ledgers on the service provider network and proposes several innovations service providers can consider to improve network efficiency and eliminate wasteful DLT communication.

Impact of Distributed Ledgers on Provider Networks

This whitepaper analyzes the operational impact of peer-to-peer distributed ledgers on the service provider network and proposes several innovations service providers can consider to improve network efficiency and eliminate wasteful DLT communication.

Digital Transformation in Practice - Learning from IIC Deployments

IIC testbed and testdrive results include observations and learnings about DX. IIC testbeds are projects and platforms for experimentation that represent real-world deployments. IIC test drives are solutions deployed as pilots in real-world environments. This article represents valuable learnings about digital transformation in practice from select IIC deployments, testbeds and testdrives.

Digital Transformation in Practice - Learning from IIC Deployments

IIC testbed and testdrive results include observations and learnings about DX. IIC testbeds are projects and platforms for experimentation that represent real-world deployments. IIC test drives are solutions deployed as pilots in real-world environments. This article represents valuable learnings about digital transformation in practice from select IIC deployments, testbeds and testdrives.

Digital Transformation in Practice - Learning from IIC Deployments

IIC testbed and testdrive results include observations and learnings about DX. IIC testbeds are projects and platforms for experimentation that represent real-world deployments. IIC test drives are solutions deployed as pilots in real-world environments. This article represents valuable learnings about digital transformation in practice from select IIC deployments, testbeds and testdrives.

MOBI Trusted Trip Credential - Business Requirements & Technical Specifications

The MOBI’s Trusted Trip Business Requirements & Technical Specifications introduces MOBI Trusted Trip as the key primitive of the New Economy of Movement and outlines the fundamental components and use cases of the MOBI Trusted Trip Verifiable Credential.

MOBI Trusted Trip Credential - Business Requirements & Technical Specifications

The MOBI’s Trusted Trip Business Requirements & Technical Specifications introduces MOBI Trusted Trip as the key primitive of the New Economy of Movement and outlines the fundamental components and use cases of the MOBI Trusted Trip Verifiable Credential.

MOBI Trusted Trip Credential - Business Requirements & Technical Specifications

The MOBI’s Trusted Trip Business Requirements & Technical Specifications introduces MOBI Trusted Trip as the key primitive of the New Economy of Movement and outlines the fundamental components and use cases of the MOBI Trusted Trip Verifiable Credential.

A Technical Analysis of Confidential Computing V1.1

In classical computing, data exists in three states: in transit, at rest, and in use. Data traversing the network is “in transit”, data in storage is “at rest”, and data being processed is “in use”. In a world where we are constantly storing, consuming, and sharing sensitive data – from credit card data to medical records, from firewall configurations to our geolocation data – protecting sensitive data in all of its states is more critical than ever.

A Technical Analysis of Confidential Computing V1.1

In classical computing, data exists in three states: in transit, at rest, and in use. Data traversing the network is “in transit”, data in storage is “at rest”, and data being processed is “in use”. In a world where we are constantly storing, consuming, and sharing sensitive data – from credit card data to medical records, from firewall configurations to our geolocation data – protecting sensitive data in all of its states is more critical than ever.

A Technical Analysis of Confidential Computing V1.1

In classical computing, data exists in three states: in transit, at rest, and in use. Data traversing the network is “in transit”, data in storage is “at rest”, and data being processed is “in use”. In a world where we are constantly storing, consuming, and sharing sensitive data – from credit card data to medical records, from firewall configurations to our geolocation data – protecting sensitive data in all of its states is more critical than ever.

Decentralized Identity for Edge Computing

This tech brief describes how to create a unified, interoperable and tamper-proof device identity registry on top of the blockchain by introducing decentralized identifiers (DIDs) and verifiable credentials (VCs) into the lifecycle of IoT devices.

Decentralized Identity for Edge Computing

This tech brief describes how to create a unified, interoperable and tamper-proof device identity registry on top of the blockchain by introducing decentralized identifiers (DIDs) and verifiable credentials (VCs) into the lifecycle of IoT devices.

Decentralized Identity for Edge Computing

This tech brief describes how to create a unified, interoperable and tamper-proof device identity registry on top of the blockchain by introducing decentralized identifiers (DIDs) and verifiable credentials (VCs) into the lifecycle of IoT devices.

Distributed Ledgers in IIoT

This whitepaper investigates distributed ledger characteristics, key drivers for implementation, current deployments, future opportunities, challenges, standards, and practical guidance on how distributed ledgers may be deployed in IIoT systems.

Distributed Ledgers in IIoT

This whitepaper investigates distributed ledger characteristics, key drivers for implementation, current deployments, future opportunities, challenges, standards, and practical guidance on how distributed ledgers may be deployed in IIoT systems.

Distributed Ledgers in IIoT

This whitepaper investigates distributed ledger characteristics, key drivers for implementation, current deployments, future opportunities, challenges, standards, and practical guidance on how distributed ledgers may be deployed in IIoT systems.

DePIN + AI for Everyone

IoTeX is the only modular infrastructure in the DePIN sector that offers a comprehensive suite of tools to create fully decentralized, composable, and interoperable DePIN projects.

©2025

IoTeX, All rights reserved.

DePIN + AI for Everyone

IoTeX is the only modular infrastructure in the DePIN sector that offers a comprehensive suite of tools to create fully decentralized, composable, and interoperable DePIN projects.

©2025

IoTeX, All rights reserved.

DePIN + AI for Everyone

IoTeX is the only modular infrastructure in the DePIN sector that offers a comprehensive suite of tools to create fully decentralized, composable, and interoperable DePIN projects.

©2025

IoTeX, All rights reserved.