Sentinel is a multi-protocol network designed to access distributed resource markets. Services on the Sentinel network run on service nodes, which leverage resource nodes to operate both traditional and decentralized applications using the networks native token $DVPN. Built upon a decentralized global infrastructure with exceptional pseudonymous properties, immutability, and global consensus, Sentinel emerges as an ideal solution for transactional and data layers.
1. Project Overview
The first implementation of Sentinel on the service chain is a highly secure decentralized Virtual Private Network (VPN) service. This VPN operates based on peer-to-peer technology, meaning its functionality relies on support from individuals rather than central servers. Central servers can be monitored by governments or taken down by hackers. Sentinel’s dVPN service allows individuals to use the VPN service or contribute unused internet bandwidth to the network in exchange for rewards, facilitated through highly secure technology.
Those who share their internet connection are called Nodes. These nodes can set the price for the internet they share, transacted using our cryptocurrency, the Sentinel Token ($DVPN). For example, a node sharing its internet might charge users in $DVPNs per gigabyte of shared internet or simply $DVPNs per gigabyte (GB).
Use Cases
Distributed and without any single node storing complete data. Minimal data retention occurs across the network since no node holds complete data. What each node possesses is accessible only via hashing and viewing by the owner. User identification data is stored on a separate chain. TenderMint consensus engine is used for Byzantine Fault Tolerance (BFT)-based consensus. Any attack on the network triggers automatic scaling and network repositioning, isolating affected nodes.
Developer-friendly Software Development Kit (SDK). Unlike resource-intensive and expensive centralized servers, service nodes provide rapid testing and deployment as physical resources. They are easy to use for end purposes, allowing services and applications to be traded on the market.
Connect to all services using a single desktop/mobile client. Current single-point access simplifies service usage. Users who become service provider nodes and maintain a good reputation can be incentivized.
dVPN is the first realization of Native Services, enabling developers to implement the Sentinel SDK within their own applications. Applications and resources can also be sold and traded on the Sentinel Services Marketplace.
Tech Profile
Sentinel adopts a multi-chain architecture that ensures efficient data exchange between humans and applications (traditional, enterprise, mobile, and decentralized applications). The network addresses issues related to infrastructure and scalability, achieving production-level transaction speeds through:
Multichain Architecture
Identity Chain - Creates Anonymous User IDs (AUIDs), stored on a separate chain interacting with other chains to provide access to services on the service chain and payment processing on the transaction chain.
Service Chain - Secure data tunnels using underlying and overlay relay networks. Governance will be implemented above the service chain, where a pegged token named Sentinel Service Token ($DVPN-SST) will serve as the utility token for transactions on the service chain. Payments and associated processing sent to the Sentinel transaction pool are handled by the Sentinel Transaction Chain.
Identity Chain and Anonymous User ID (AUID)
The AUID will serve as the single source of access for all services on the Sentinel network. Reputation management will govern the network, where higher reputations make it easier to access services and become master nodes. The network incentivizes good behavior financially, with higher reputation translating into greater earning potential. Unless required and provided by the user, the AUID stores no information.
The problem of single points of failure is addressed by distributing the AUID ledger across the entire Sentinel node network. Engaging in spam or malicious activities risks lowering ones reputation. The distributed consensus mechanism of the network quickly and effectively identifies infected IDs. Automatic mitigation solutions are initiated to keep the network unaffected. Efficient application-specific identity management.
2. Commentary
A decentralized virtual private network powered by blockchain technology. dVPN (decentralized Virtual Private Network) is the first use case built on the blockchain, featuring a highly distributed network topology with nodes spread worldwide. Each node can be a desktop/portable computer, mobile phone, or even a server in the cloud. The ledger of data packets/transactions is stored on the blockchain through a "Proof of Traffic" consensus system, primarily incentivizing users based on the bandwidth they provide and monetizing any unused bandwidth they may declare on the Sentinel network.
Beyond dVPN, Sentinel plans to handle images and firmware, installing boxes that take Ethernet input and connect to home/office routers. This way, all traffic through the router will pass through the VPN. These boxes also consume a small portion of PC power, thus contributing to the effective monetization of network bandwidth.
Relevant Links:
https://sentinelgroup.io/
https://bitcointalk.org/index.php?topic=2233859.0
https://github.com/sentinel-official/sentinel/blob/master/README.md