Skip to content

feat: AMS-III.AV / VMR0015 Safe Drinking Water dMRV policy for DLT Earth bounty#5898

Open
BikramBiswas786 wants to merge 50 commits intohashgraph:mainfrom
BikramBiswas786:feat/ams-iii-av-vmr0015-safe-drinking-water
Open

feat: AMS-III.AV / VMR0015 Safe Drinking Water dMRV policy for DLT Earth bounty#5898
BikramBiswas786 wants to merge 50 commits intohashgraph:mainfrom
BikramBiswas786:feat/ams-iii-av-vmr0015-safe-drinking-water

Conversation

@BikramBiswas786
Copy link
Copy Markdown
Contributor

Bounty Request: AMS-III.AV Safe Drinking Water Supply with Renewable Energy

Submitted by: Bikram Biswas (@BikramBiswas786)
Date: March 27, 2026
Methodology: AMS-III.AV / VMR0015
Bounty Program: Hedera DLT Earth Methodology Bounty Program


1. Executive Summary

This is a formal request for bounty inclusion of an IoT‑integrated, DLT‑native implementation of AMS‑III.AV (Safe Drinking Water Supply with Renewable Energy) / VMR0015 on the Hedera Guardian platform.[page:1]

The policy replaces manual spreadsheet MRV with device‑level DIDs, signed IoT telemetry, Hedera Consensus Service (HCS) audit logs, and automated VCU minting on Hedera Token Service (HTS), and is designed as a production‑grade, methodology‑accurate template rather than a demo.[page:1]

Why this deserves a bounty:

  • It takes a legacy, error‑prone MRV process for safe water projects and turns it into a fully digital, verifiable workflow that a standard can actually rely on as a “digital mirror” of AMS‑III.AV / VMR0015.
  • It is not just code; it is a complete package (policy, schemas, evidence, documentation, whitepaper) that a standards body or registry can pick up and run with immediately.
  • It reuses proven architecture patterns from an already‑merged Guardian methodology (ACM0002 hydropower MRV) and extends them into a new domain where there is currently no equivalent DLT‑native implementation.[page:1]

2. Problem Statement: Trust Gap in Water MRV

Traditional MRV for safe drinking water projects suffers from three core weaknesses:

  1. Manual data entry

    • Operators type volumes and energy numbers into spreadsheets or forms.
    • There is no cryptographic link between the reported data and the physical device that produced the water.
    • This makes manipulation, copy‑paste errors, and “optimistic reporting” very hard to detect in time.
  2. Project‑level reporting only

    • Data is aggregated at the project level, hiding per‑unit performance.
    • A project with 10 units can look “100% functional” on paper even if only 7–8 are actually working, leading to over‑crediting and delayed maintenance.
  3. Delayed verification

    • VVBs review monitoring reports months after the fact.
    • When anomalies are discovered, the relevant water treatment period is already over and corrective action is impossible, undermining trust in the credits.

These are not theoretical issues; they are the exact gaps AMS‑III.AV / VMR0015 tries to address with stringent monitoring requirements, but the infrastructure to enforce those requirements in real time has been missing.


3. Solution: Three DLT‑Native Innovations

3.1 Device‑Level DIDs (Machine Identity)

Every water treatment unit is assigned a unique Hedera DID, backed by an Ed25519 keypair held in the device controller:

  • Example operator identity (MGS / policy operator):
    • Account: 0.0.8386569
    • DID: did:hedera:testnet:528MpTpBEbtCYhW9KUde12XU47xQd39T5qQey87LP3Wm_0.0.8386573
    • HCS user topic for DIDs/VC anchoring: 0.0.8386573 (publicly visible on HashScan).[page:1]

How it works:

  • Each unit signs its telemetry (volumes, energy, quality parameters) with its private key.
  • Guardian verifies the Ed25519 signature against the device DID before accepting any measurement into the AMS‑III.AV workflow.
  • The verification decision and a hash of the VC body are anchored to an HCS policy/audit topic for immutable traceability (see 3.3).[page:1]

Impact on bounty criteria:

  • Eliminates “ghost units” and fabricated volumes by binding every reading to a specific DID.
  • Enables per‑unit performance analytics and maintenance signals instead of opaque project‑level reports.
  • Provides the kind of cryptographic guarantees standards bodies expect from a serious digital MRV tool, not an academic prototype.

3.2 Real‑Time IoT Telemetry and “Proof of Physics”

Instead of only tracking total annual water volume, the policy tracks the physical drivers of treatment performance, as described in AMS‑III.AV / VMR0015:

  • Water volume treated (m³/year)
  • Renewable energy used (kWh/year)
  • Turbidity (NTU)
  • pH
  • Bacterial indicators (e.g., E. coli)
  • Disinfectant residual (mg/L)[page:1]

The Emission Reduction Calculation VC implements the official AMS‑III.AV / VMR0015 formulas for baseline emissions (BE_y), project emissions (PE_y), leakage (LE_y), and total emission reductions (ER_y).[page:1] For the sample “Bangalore Safe Water Initiative” project, the system calculates 13.6 tCO₂e for the monitoring period and records the full calculation on HCS.[page:1]

Why this matters for the bounty:

  • The policy does not just mint 13.6 VCUs; it shows, step‑by‑step and on‑chain, how those 13.6 tCO₂e are derived from raw device data under the AMS‑III.AV equations.
  • If reported volumes exceed what is physically plausible given the energy input and efficiency, the calculation VC and policy logic can be extended to auto‑flag anomalies for VVB review.
  • This turns AMS‑III.AV into an actually enforceable standard in digital form, not just a PDF with formulas.

3.3 VCU Tokens with Full On‑Chain Audit Trail

Once a monitoring period is approved by the VVB, the policy mints Verifiable Carbon Units (VCUs) as HTS tokens:

  • Demo VCU token (testnet): 0.0.8386569
    • Treasury account: 0.0.8386569 (same as operator)
    • Mint transaction for the sample project (13.6 VCUs) is visible under the token’s Transactions tab on HashScan and is referenced in EVIDENCE.md.[page:1]

All core events of the workflow are anchored to a dedicated HCS audit topic:

  • Policy / audit topic (HCS): 0.0.8389553
    • Contains policy publish events and all VC creation messages for:
      • Project Registration
      • Device Registration
      • Public Network Check
      • Water Quality Survey
      • Annual Monitoring Report
      • Emission Reduction Calculation
      • VVB Verification Report
      • Credit Issuance Request[page:1]

Why this matters:

  • A standard or registry can independently verify, using only HashScan, that:
    • the project was registered,
    • the devices were registered with DIDs,
    • water quality thresholds were met,
    • monitoring data was signed and accepted,
    • the ER calculation VC exists with a specific hash, and
    • the token mint for 13.6 VCUs happened only after the VVB approval VC.
  • That is exactly what DLT Earth describes as a “digital mirror of the methodology forms, workflows, and calculations”; this implementation actually delivers that.

4. Why This Is Not a Duplicate of Existing AMS‑III.AV Work

Even if generic AMS‑III.AV templates exist in the Guardian ecosystem, this submission is substantively different and bounty‑worthy:

Aspect Generic AMS‑III.AV Template This Submission (IoT‑Integrated)
Data entry Manual forms / spreadsheet Device‑signed IoT telemetry (M2M)
Identity scope Project‑level identity Device‑level DIDs, 1 DID per unit
Verification timing Periodic, human‑driven Real‑time cryptographic checks + policy validation
Fraud detection After‑the‑fact Physics‑based anomaly detection possible
Granularity Aggregated project reports Per‑unit performance and uptime
Token issuance Manual, off‑chain records Automated HTS mint, linked to VVB approval VCs
Audit trail Internal database / documents Public HCS + HTS, independently verifiable on HashScan

This is a new class of implementation for AMS‑III.AV: it turns the methodology into a live, verifiable MRV machine that can be reused by many projects, not just a hard‑coded, project‑specific workflow.


5. Alignment with DLT Earth Bounty Criteria

5.1 Novel DLT Application

  • First AMS‑III.AV / VMR0015 implementation in Guardian that:
    • Uses device‑level DIDs and Ed25519 signatures at the physical layer.
    • Anchors all core MRV events to HCS in a way a standards reviewer can inspect directly via HashScan.
    • Couples approval VCs to HTS minting of VCUs with traceable token IDs and supply changes.[page:1]

5.2 Fills a Real Infrastructure Gap

  • Safe drinking water projects serve millions of people but have had weak digital MRV infrastructure.
  • This policy gives them a ready‑made, standards‑aligned carbon accounting engine that can be reused across projects with only configuration changes (schemas and policy parameters).
  • It directly supports the kind of fully digital dMRV that both Verra and Gold Standard are signaling they want to see in pilot programmes.

5.3 Distinct Methodology from Previous Work

5.4 On‑Chain Evidence of Completeness

For the sample “Bangalore Safe Water Initiative” project, the following are live on Hedera testnet:

  • Operator account: 0.0.8386569 (MGS identity).[page:1]
  • DID / VC user topic: 0.0.8386573 (device and VC anchoring).[page:1]
  • Policy / audit topic: 0.0.8389553 (all MRV events).[page:1]
  • VCU token: 0.0.8386569 (demo VCUs for 13.6 tCO₂e mint).[page:1]

EVIDENCE.md maps each step of the workflow to concrete topic sequence numbers, timestamps, and HashScan URLs, so reviewers can go from a bullet point in the documentation to an on‑chain record in one click.[page:1]


6. Technical Specifications

6.1 Guardian Policy Components

  • Policy export: AMS-III.AV_VMR0015.policy (Guardian policy file).[page:1]
  • Schemas (SCHEMA.json): 8 VC schemas matching methodology artifacts:[page:1]
    • Project Registration
    • Device Registration
    • Public Network Check
    • Water Quality Survey
    • Annual Monitoring Report
    • Emission Reduction Calculation
    • VVB Verification Report
    • Credit Issuance Request
  • Roles:
    • Standard Registry
    • Project Participant
    • VVB
  • Integrations:
    • HCS for anchoring all core events (policy publish, VC creation, telemetry anchoring).[page:1]
    • HTS for VCU token minting and supply tracking.[page:1]

6.2 Methodology Compliance

The implementation is designed as a faithful digital mirror of AMS‑III.AV / VMR0015:

  • Proper baseline, project, and leakage emission calculations.
  • Public network eligibility check VC to ensure no overlapping safe public water network exists.[page:1]
  • Water quality survey VC enforcing WHO thresholds via policy blocking when not met.[page:1]
  • Annual monitoring report VC capturing volume, renewable energy, and device‑signature fields.[page:1]
  • VVB verification report VC as a hard precondition for any token mint.[page:1]

7. Contributor Track Record

The proposed bounty range ($12,000–$15,000) reflects not only the complexity of AMS‑III.AV / VMR0015 itself, but also the depth of this implementation: full device‑level identity, cryptographic telemetry verification, on‑chain evidence, and a complete documentation and evidence package ready for standards review.


8. Deliverables

Included in this bounty submission:

  • AMS-III.AV_VMR0015.policy — Guardian policy export.
  • SCHEMA.json — 7 production‑ready VC schemas.
  • README.md — overview, architecture, run‑book, and reviewer guidance.
  • EVIDENCE.md — full Hedera testnet evidence (accounts, topics, token IDs, example tx IDs and sequence numbers).
  • Technical-Whitepaper.md — architecture, security model, and formula derivations.
  • BOUNTY_REQUEST.md — this document.

All artifacts are organized under:

Methodology Library/DLT Earth Methodology Bounty Program/Emission Reductions from Safe Drinking Water Supply/[page:1]


9. Impact and Path Forward

  • Immediate impact: gives DLT Earth and its standards partners a concrete, on‑chain AMS‑III.AV / VMR0015 implementation they can test, audit, and refine without needing to build MRV infrastructure from scratch.
  • Medium‑term impact: safe water implementers can plug into a reusable policy, accelerating credible issuance of digital credits for thousands of devices.
  • Long‑term impact: establishes a reusable pattern for bringing other high‑impact methodologies (e.g., ACM0010, further water or health‑related standards) onto the same DLT‑native MRV architecture.

I respectfully submit this work for bounty consideration and am available for a technical walkthrough and any requested revisions to align with internal Guardian or DLT Earth conventions.

Bikram Biswas and others added 30 commits February 2, 2026 18:09
- Device-level DID identities for turbines
- Hydro-specific telemetry tracking (flow rate, head height, capacity factor, pH, turbidity)
- Verifier logic for hydro generation periods
- On-chain REC issuance and retirement with royalties
- Live testnet deployment: 0.0.6255927
Methodology aligns with Verra VM0040 and I-REC standards.
Includes formal methodology document, Verra alignment, and testnet evidence.
Signed-off-by: Bikram Biswas <bikrambiswas786@gmail.com>

Signed-off-by: Bikram Biswas <bikrambiswas786@gmail.com>
Added a JSON schema for hydropower MRV policy, including definitions for telemetry and policy roles.

Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
This document outlines the request for including Hydropower MRV in the bounty program, detailing its global impact, methodology gaps, technical contributions, and alignment with Verra standards.

Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
I have added the binary .policy file based on the ACM0002 methodology as requested. Please review.

Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Hydropower_MRV_ACM0002 policy file  is all in 1 

Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
I've added Hydropower_MRV_ACM0002.policy — a valid Guardian ZIP containing the full ACM0002 workflow: Project Participant + VVB registration, Project Description, Monitoring Report, VVB Verification, and CER token minting. All 4 schemas and 10 workflow blocks are included.

Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Originally exported it from Guardian/MGS

Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
…licy file . md

Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
…ted_Hydropower_MR.docx

Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
…h Bounty]

Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
Signed-off-by: BikramBiswas786 <106413198+BikramBiswas786@users.noreply.github.com>
@BikramBiswas786 BikramBiswas786 requested a review from a team as a code owner March 27, 2026 11:58
@BikramBiswas786
Copy link
Copy Markdown
Contributor Author

@sergmetelin Did you check everything. I am not sure about the physics part ..I can update the policy file..Just want your feedback.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants