Auction-based task allocation with trust management for shared sensor networks.
Uloženo v:
| Název: | Auction-based task allocation with trust management for shared sensor networks. |
|---|---|
| Autoři: | Edalat, Neda, Xiao, Wendong, Motani, Mehul, Roy, Nirmalya, Das, Sajal K. |
| Zdroj: | Security & Communication Networks; Nov2012, Vol. 5 Issue 11, p1223-1234, 12p |
| Témata: | SENSOR networks, WIRELESS sensor networks, QUALITY of service, COMBINATORICS, INFORMATION technology, PERFORMANCE evaluation, RELIABILITY in engineering |
| Abstrakt: | ABSTRACT Task allocation for wireless sensor networks with multiple concurrent applications (such as target tracking and event detection) requires sharing applications' tasks (such as sensing and computation) and available network resources. In this paper, we model the distributed task allocation problem for multiple concurrent applications by using a reverse combinatorial auction, in which the bidders (sensor nodes) are supposed to bid cost values (according to their available resources) for accomplishing the subset of the applications' tasks. Trust management schemes consist of a powerful tool for the detection of unexpected node behaviors (such as faulty or malicious). It is critical for participants (i.e., bidders and auctioneer) to estimate each other's trustworthiness before initiating the task allocation procedure. To address this issue, we introduce a real-time trust management module for our auction system that is able to validate the reliable bid value and determine faulty nodes and malicious entities. The main objective of our task allocation scheme is to maximize the network lifetime by sharing tasks and network resources within applications, while enhancing the overall application quality of service (e.g., deadline). We also propose a heuristic two-phase winner determination protocol to deal with the combinatorial reverse auction problem. Simulation results show that the proposed scheme offers the promising performance and efficiency. Copyright © 2012 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR] |
| Copyright of Security & Communication Networks is the property of Wiley-Blackwell and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) | |
| Databáze: | Complementary Index |
| FullText | Text: Availability: 0 CustomLinks: – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Edalat%20N Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edb DbLabel: Complementary Index An: 82729520 RelevancyScore: 834 AccessLevel: 6 PubType: Academic Journal PubTypeId: academicJournal PreciseRelevancyScore: 834.351501464844 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: Auction-based task allocation with trust management for shared sensor networks. – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Edalat%2C+Neda%22">Edalat, Neda</searchLink><br /><searchLink fieldCode="AR" term="%22Xiao%2C+Wendong%22">Xiao, Wendong</searchLink><br /><searchLink fieldCode="AR" term="%22Motani%2C+Mehul%22">Motani, Mehul</searchLink><br /><searchLink fieldCode="AR" term="%22Roy%2C+Nirmalya%22">Roy, Nirmalya</searchLink><br /><searchLink fieldCode="AR" term="%22Das%2C+Sajal+K%2E%22">Das, Sajal K.</searchLink> – Name: TitleSource Label: Source Group: Src Data: Security & Communication Networks; Nov2012, Vol. 5 Issue 11, p1223-1234, 12p – Name: Subject Label: Subject Terms Group: Su Data: <searchLink fieldCode="DE" term="%22SENSOR+networks%22">SENSOR networks</searchLink><br /><searchLink fieldCode="DE" term="%22WIRELESS+sensor+networks%22">WIRELESS sensor networks</searchLink><br /><searchLink fieldCode="DE" term="%22QUALITY+of+service%22">QUALITY of service</searchLink><br /><searchLink fieldCode="DE" term="%22COMBINATORICS%22">COMBINATORICS</searchLink><br /><searchLink fieldCode="DE" term="%22INFORMATION+technology%22">INFORMATION technology</searchLink><br /><searchLink fieldCode="DE" term="%22PERFORMANCE+evaluation%22">PERFORMANCE evaluation</searchLink><br /><searchLink fieldCode="DE" term="%22RELIABILITY+in+engineering%22">RELIABILITY in engineering</searchLink> – Name: Abstract Label: Abstract Group: Ab Data: ABSTRACT Task allocation for wireless sensor networks with multiple concurrent applications (such as target tracking and event detection) requires sharing applications' tasks (such as sensing and computation) and available network resources. In this paper, we model the distributed task allocation problem for multiple concurrent applications by using a reverse combinatorial auction, in which the bidders (sensor nodes) are supposed to bid cost values (according to their available resources) for accomplishing the subset of the applications' tasks. Trust management schemes consist of a powerful tool for the detection of unexpected node behaviors (such as faulty or malicious). It is critical for participants (i.e., bidders and auctioneer) to estimate each other's trustworthiness before initiating the task allocation procedure. To address this issue, we introduce a real-time trust management module for our auction system that is able to validate the reliable bid value and determine faulty nodes and malicious entities. The main objective of our task allocation scheme is to maximize the network lifetime by sharing tasks and network resources within applications, while enhancing the overall application quality of service (e.g., deadline). We also propose a heuristic two-phase winner determination protocol to deal with the combinatorial reverse auction problem. Simulation results show that the proposed scheme offers the promising performance and efficiency. Copyright © 2012 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR] – Name: Abstract Label: Group: Ab Data: <i>Copyright of Security & Communication Networks is the property of Wiley-Blackwell and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract.</i> (Copyright applies to all Abstracts.) |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edb&AN=82729520 |
| RecordInfo | BibRecord: BibEntity: Identifiers: – Type: doi Value: 10.1002/sec.631 Languages: – Code: eng Text: English PhysicalDescription: Pagination: PageCount: 12 StartPage: 1223 Subjects: – SubjectFull: SENSOR networks Type: general – SubjectFull: WIRELESS sensor networks Type: general – SubjectFull: QUALITY of service Type: general – SubjectFull: COMBINATORICS Type: general – SubjectFull: INFORMATION technology Type: general – SubjectFull: PERFORMANCE evaluation Type: general – SubjectFull: RELIABILITY in engineering Type: general Titles: – TitleFull: Auction-based task allocation with trust management for shared sensor networks. Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Edalat, Neda – PersonEntity: Name: NameFull: Xiao, Wendong – PersonEntity: Name: NameFull: Motani, Mehul – PersonEntity: Name: NameFull: Roy, Nirmalya – PersonEntity: Name: NameFull: Das, Sajal K. IsPartOfRelationships: – BibEntity: Dates: – D: 01 M: 11 Text: Nov2012 Type: published Y: 2012 Identifiers: – Type: issn-print Value: 19390114 Numbering: – Type: volume Value: 5 – Type: issue Value: 11 Titles: – TitleFull: Security & Communication Networks Type: main |
| ResultId | 1 |
Nájsť tento článok vo Web of Science