Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.rootkey.ai/llms.txt

Use this file to discover all available pages before exploring further.

The Problem

Industrial and IoT environments generate vast amounts of operational data - sensor readings, PLC outputs, SCADA events, energy measurements, environmental conditions. This data drives automated decisions, feeds regulatory reporting, and provides the evidence base for operational accountability. The problem is that most OT data pipelines were designed for availability and performance, not for integrity. Data travels from sensor to historian to reporting system through a chain that is mutable at every stage - values can be corrected, smoothed, or overwritten without trace. When a dispute arises - over a regulatory measurement, an insurance claim, a contractual obligation, or an incident investigation - the data in the historian is what the system says it is. There is no way to prove it hasn’t been altered. For critical infrastructure operators facing NIS2 obligations, this is increasingly a compliance gap, not just a technical inconvenience.

How ROOTKey Solves It

ROOTKey anchors sensor readings and OT events at the point of generation - before they enter any mutable storage or processing pipeline. Anchoring happens over MQTT, the native protocol of most IoT and industrial environments, which means:
  • No changes to device firmware - devices publish to their existing MQTT topics
  • No HTTP stack required - devices that cannot run REST clients can still participate
  • No latency impact - anchoring is asynchronous; device operation is unaffected
  • No OT network redesign - MQTT bridging keeps anchor traffic contained within defined network boundaries
The result is a stream of tamper-evident data points, each with a blockchain-anchored cryptographic proof, that can be verified by regulators, auditors, or counterparties independently.

Architecture

The MQTT bridge subscribes to device topics and forwards payloads through ROOTKey’s integrity pipeline. Devices are unaware of ROOTKey - they continue to publish as they always have.

Implementation

1

Configure the MQTT bridge

Deploy the ROOTKey MQTT bridge at the boundary between your OT and IT networks, or within the OT zone if network policy allows. Configure the bridge with your broker address, credentials, and the topic patterns to monitor.MQTT Deployment Guide · Contact contact@rootkey.ai for bridge configuration documentation.
2

Create vaults per device class or data category

Organise vaults by device type, measurement category, or regulatory obligation. This enables granular access control and allows you to provide regulators with scoped evidence for specific systems.Create Vault
3

Map MQTT topics to vault and asset identifiers

Configure the bridge to map each MQTT topic to a specific vault and logical asset. Each topic becomes a traceable data stream with its own integrity history.MQTT Deployment Guide
4

Validate readings on demand

At any point - during a regulatory inspection, an incident investigation, or a routine audit - retrieve the on-chain anchor for any reading and validate it against the archived value.Validate File · Get File History
5

Monitor anchoring coverage with Analytics

Use the Analytics API to verify that anchoring is continuous and complete - detect gaps that might indicate device downtime, network issues, or tampering with the bridge.Analytics - Vault Creation Over Time · Analytics - Files vs Validations

ParameterRecommendation
ProtocolRKP-2 (Off-Chain) for high-frequency telemetry; RKP-3 (Hybrid) for mixed workloads where alarms and threshold breaches require full on-chain anchoring
DeploymentMQTT - native fit for OT environments; Container for bridge deployment in Kubernetes-based IT/OT integration platforms
Broker modelClient-hosted broker within OT network, bridging to ROOTKey at the OT/IT boundary - preserves OT network isolation
Anchor granularityAnchor individual readings for measurement-level evidence; batch for archiving at reduced frequency if cost is a constraint
Critical eventsConfigure alarm events, threshold breaches, and emergency shutdowns to use RKP-1 or the on-chain path of RKP-3 - these are the events most likely to be scrutinised in an incident investigation

Key API Endpoints and Resources

ResourcePurpose
MQTT Deployment GuideBridge configuration and OT/IT integration architecture
Create VaultCreate vaults per device class or data category
Validate FileValidate individual readings on demand
Get File HistoryFull event history for a device or sensor
Analytics - Files vs ValidationsMonitor anchoring coverage and validation activity
RKP-2 ProtocolHigh-throughput anchoring for sensor data
RKP-3 ProtocolMixed critical/telemetry event anchoring

Compliance Alignment

FrameworkHow this use case addresses it
NIS2 - Critical EntitiesIntegrity and auditability of data from critical infrastructure systems (energy, water, transport, digital infrastructure)
IEC 62443Data integrity requirements for Industrial Automation and Control Systems (IACS)
ISO 27001 (in progress)A.8.15 (logging), A.5.36 (compliance), applied to OT environments
EU Energy RegulationTamper-evident smart meter data for regulatory reporting and dispute resolution
ISO 50001Energy measurement data integrity for energy management system compliance
Environmental MonitoringCryptographically verifiable sensor records for regulatory reporting (air quality, water, emissions)

Request an OT integration consultation

Our team will assess your OT network topology, MQTT infrastructure, and data classification requirements - and design a bridge architecture that fits without disruption.

Get started with the API

Create a sandbox vault and simulate sensor data anchoring before touching your production OT environment.