MetaBlox Protocol: Standards #

MetaBlox’s global WiFi OpenRoaming network is just as secure as other OpenRoaming networks, adhering to standards from across the Web3 and telecommunications industries. In addition to implementing DID and VC standards for its user authorization protocol, MetaBlox Network follows these performance and security standards:

-WBA OpenRoaming standards


-IEEE 802.11 Extensible Authentication Protocols

-Hotspot 2.0


WBA OpenRoaming Standards #

MetaBlox Network adheres to the standards for WiFi OpenRoaming networks as established by the Wireless Broadband Alliance (WBA). Following these guidelines qualifies WiFi providers (including MetaBlox Network) to enter the WBA’s roaming federation. This federation of providers delivers WiFi OpenRoaming services: users connected to any single WBA router will automatically connect to WiFi through any of the alliance’s other routers when they move within range, enabling seamless WiFi roaming around the world.

The WBA requires WiFi providers to follow these standards in order to join its OpenRoaming federation:

-Wireless Roaming Intermediary Exchange (WRIX)

-Cyber Security

-WiFi CERTIFIED Passpoint


WRIX guidelines provide a harmonized OpenRoaming framework: it allows different types of WiFi providers to integrate with the alliance in a way that enables roaming across each members’ access points (provided by routers).

Cyber Security #

The WBA requires its OpenRoaming members to ensure secure WiFi connections. This means incorporating encrypted communications between user-devices and verifiers, as well as other measures for avoiding hacks and data exposure. The WBA’s security standards for OpenRoaming also require mechanisms that secure users’ data while they roam between different WiFi networks.

WiFi CERTIFIED Passpoint #

The WiFi Alliance’s CERTIFIED passpoint standards outline the basic features of the WiFi connection process that a provider needs to incorporate to join the WBA’s OpenRoaming federation. These features are commonly implemented by WiFi providers, and include:

-Automatic reconnection to a network after initial connection

-Automatic network discovery: the provider’s network becomes visible from a device without needing to manually input network information

-Roaming between access points

-WPA3 (WiFi Protected Access 3) security: the WiFi Alliance’s latest security standards for wireless network access

All MetaBlox Network access points include these passpoint features.

5G #

Besides the WBA’s OpenRoaming guidelines, another wireless networking standard implemented by MetaBlox Network is 5G. In addition to setting performance and security standards for network connections, 5G emphasizes network convergence and interoperability. This is because it sets standards that apply across telco services, including services from cellular, bluetooth, WiFi and Internet-of-Things (IoT) networks.

5G also uses data communication and storage technology that helps to enable the integration of WiFi and cellular services. This type of integration allows for services such as WiFi calling, where cellular users ‘offload’ their service requirements onto a 5G WiFi network. This harmony between network types also allows for cellular + WiFi OpenRoaming services, where users device’s can switch automatically between WiFi and cellular networks in order to stay connected as they move across a city or even around the world. MetaBlox Network’s 5G status enables this type of roaming between WiFi and cellular networks.

Extensible Authentication Protocol With IEEE 802.1 Security #

An Extensible Authentication Protocol (EAP) is a framework WiFi providers employ for developing user authentication mechanisms (such as DID+VC). The architectural framework provides WiFi operators with tools for modifying their existing–and creating new–authentication methods.

The framework is compatible with common WiFi access technologies, such as IEEE 802.11: a set of wireless network performance standards met by MetaBlox Network. By integrating EAPs, MetaBlox Network enables future improvements in and applications for their authentication protocol.

Trust-Over-IP #

Trust-Over-IP is a technology and protocol stack from the Linux foundation. This set of tools is designed to help developers create safe and effective digital networks by establishing trust between their users. This type of trust represents an alternative to the trust between each individual user of a network and the centralized entity that authorizes their connection, for instance.

By creating this network-wide trust, the ToIP stack can help developers achieve decentralized networks that can grow organically, without the permission of a central authority. These networks use authorization methods based not on a single authority but the entire ‘web’ of network users. While many existing networks use central servers to authenticate users by storing their passwords in a database, ToIP tools allow for decentralized authentication.

MetaBlox Network has implemented Trust-Over-IP by delivering a fully decentralized network connection protocol.