Auction-based task allocation with trust management for shared sensor networks.

Uloženo v:
Podrobná bibliografie
Název: Auction-based task allocation with trust management for shared sensor networks.
Autoři: Edalat, Neda, Xiao, Wendong, Motani, Mehul, Roy, Nirmalya, Das, Sajal K.
Zdroj: Security & Communication Networks; Nov2012, Vol. 5 Issue 11, p1223-1234, 12p
Témata: SENSOR networks, WIRELESS sensor networks, QUALITY of service, COMBINATORICS, INFORMATION technology, PERFORMANCE evaluation, RELIABILITY in engineering
Abstrakt: ABSTRACT Task allocation for wireless sensor networks with multiple concurrent applications (such as target tracking and event detection) requires sharing applications' tasks (such as sensing and computation) and available network resources. In this paper, we model the distributed task allocation problem for multiple concurrent applications by using a reverse combinatorial auction, in which the bidders (sensor nodes) are supposed to bid cost values (according to their available resources) for accomplishing the subset of the applications' tasks. Trust management schemes consist of a powerful tool for the detection of unexpected node behaviors (such as faulty or malicious). It is critical for participants (i.e., bidders and auctioneer) to estimate each other's trustworthiness before initiating the task allocation procedure. To address this issue, we introduce a real-time trust management module for our auction system that is able to validate the reliable bid value and determine faulty nodes and malicious entities. The main objective of our task allocation scheme is to maximize the network lifetime by sharing tasks and network resources within applications, while enhancing the overall application quality of service (e.g., deadline). We also propose a heuristic two-phase winner determination protocol to deal with the combinatorial reverse auction problem. Simulation results show that the proposed scheme offers the promising performance and efficiency. Copyright © 2012 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
Copyright of Security & Communication Networks is the property of Wiley-Blackwell and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
Databáze: Complementary Index
FullText Text:
  Availability: 0
CustomLinks:
  – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Edalat%20N
    Name: ISI
    Category: fullText
    Text: Nájsť tento článok vo Web of Science
    Icon: https://imagesrvr.epnet.com/ls/20docs.gif
    MouseOverText: Nájsť tento článok vo Web of Science
Header DbId: edb
DbLabel: Complementary Index
An: 82729520
RelevancyScore: 834
AccessLevel: 6
PubType: Academic Journal
PubTypeId: academicJournal
PreciseRelevancyScore: 834.351501464844
IllustrationInfo
Items – Name: Title
  Label: Title
  Group: Ti
  Data: Auction-based task allocation with trust management for shared sensor networks.
– Name: Author
  Label: Authors
  Group: Au
  Data: <searchLink fieldCode="AR" term="%22Edalat%2C+Neda%22">Edalat, Neda</searchLink><br /><searchLink fieldCode="AR" term="%22Xiao%2C+Wendong%22">Xiao, Wendong</searchLink><br /><searchLink fieldCode="AR" term="%22Motani%2C+Mehul%22">Motani, Mehul</searchLink><br /><searchLink fieldCode="AR" term="%22Roy%2C+Nirmalya%22">Roy, Nirmalya</searchLink><br /><searchLink fieldCode="AR" term="%22Das%2C+Sajal+K%2E%22">Das, Sajal K.</searchLink>
– Name: TitleSource
  Label: Source
  Group: Src
  Data: Security & Communication Networks; Nov2012, Vol. 5 Issue 11, p1223-1234, 12p
– Name: Subject
  Label: Subject Terms
  Group: Su
  Data: <searchLink fieldCode="DE" term="%22SENSOR+networks%22">SENSOR networks</searchLink><br /><searchLink fieldCode="DE" term="%22WIRELESS+sensor+networks%22">WIRELESS sensor networks</searchLink><br /><searchLink fieldCode="DE" term="%22QUALITY+of+service%22">QUALITY of service</searchLink><br /><searchLink fieldCode="DE" term="%22COMBINATORICS%22">COMBINATORICS</searchLink><br /><searchLink fieldCode="DE" term="%22INFORMATION+technology%22">INFORMATION technology</searchLink><br /><searchLink fieldCode="DE" term="%22PERFORMANCE+evaluation%22">PERFORMANCE evaluation</searchLink><br /><searchLink fieldCode="DE" term="%22RELIABILITY+in+engineering%22">RELIABILITY in engineering</searchLink>
– Name: Abstract
  Label: Abstract
  Group: Ab
  Data: ABSTRACT Task allocation for wireless sensor networks with multiple concurrent applications (such as target tracking and event detection) requires sharing applications' tasks (such as sensing and computation) and available network resources. In this paper, we model the distributed task allocation problem for multiple concurrent applications by using a reverse combinatorial auction, in which the bidders (sensor nodes) are supposed to bid cost values (according to their available resources) for accomplishing the subset of the applications' tasks. Trust management schemes consist of a powerful tool for the detection of unexpected node behaviors (such as faulty or malicious). It is critical for participants (i.e., bidders and auctioneer) to estimate each other's trustworthiness before initiating the task allocation procedure. To address this issue, we introduce a real-time trust management module for our auction system that is able to validate the reliable bid value and determine faulty nodes and malicious entities. The main objective of our task allocation scheme is to maximize the network lifetime by sharing tasks and network resources within applications, while enhancing the overall application quality of service (e.g., deadline). We also propose a heuristic two-phase winner determination protocol to deal with the combinatorial reverse auction problem. Simulation results show that the proposed scheme offers the promising performance and efficiency. Copyright © 2012 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
– Name: Abstract
  Label:
  Group: Ab
  Data: <i>Copyright of Security & Communication Networks is the property of Wiley-Blackwell and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract.</i> (Copyright applies to all Abstracts.)
PLink https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edb&AN=82729520
RecordInfo BibRecord:
  BibEntity:
    Identifiers:
      – Type: doi
        Value: 10.1002/sec.631
    Languages:
      – Code: eng
        Text: English
    PhysicalDescription:
      Pagination:
        PageCount: 12
        StartPage: 1223
    Subjects:
      – SubjectFull: SENSOR networks
        Type: general
      – SubjectFull: WIRELESS sensor networks
        Type: general
      – SubjectFull: QUALITY of service
        Type: general
      – SubjectFull: COMBINATORICS
        Type: general
      – SubjectFull: INFORMATION technology
        Type: general
      – SubjectFull: PERFORMANCE evaluation
        Type: general
      – SubjectFull: RELIABILITY in engineering
        Type: general
    Titles:
      – TitleFull: Auction-based task allocation with trust management for shared sensor networks.
        Type: main
  BibRelationships:
    HasContributorRelationships:
      – PersonEntity:
          Name:
            NameFull: Edalat, Neda
      – PersonEntity:
          Name:
            NameFull: Xiao, Wendong
      – PersonEntity:
          Name:
            NameFull: Motani, Mehul
      – PersonEntity:
          Name:
            NameFull: Roy, Nirmalya
      – PersonEntity:
          Name:
            NameFull: Das, Sajal K.
    IsPartOfRelationships:
      – BibEntity:
          Dates:
            – D: 01
              M: 11
              Text: Nov2012
              Type: published
              Y: 2012
          Identifiers:
            – Type: issn-print
              Value: 19390114
          Numbering:
            – Type: volume
              Value: 5
            – Type: issue
              Value: 11
          Titles:
            – TitleFull: Security & Communication Networks
              Type: main
ResultId 1