Auction-based task allocation with trust management for shared sensor networks.
Saved in:
| Title: | Auction-based task allocation with trust management for shared sensor networks. |
|---|---|
| Authors: | Edalat, Neda, Xiao, Wendong, Motani, Mehul, Roy, Nirmalya, Das, Sajal K. |
| Source: | Security & Communication Networks; Nov2012, Vol. 5 Issue 11, p1223-1234, 12p |
| Subject Terms: | SENSOR networks, WIRELESS sensor networks, QUALITY of service, COMBINATORICS, INFORMATION technology, PERFORMANCE evaluation, RELIABILITY in engineering |
| Abstract: | ABSTRACT Task allocation for wireless sensor networks with multiple concurrent applications (such as target tracking and event detection) requires sharing applications' tasks (such as sensing and computation) and available network resources. In this paper, we model the distributed task allocation problem for multiple concurrent applications by using a reverse combinatorial auction, in which the bidders (sensor nodes) are supposed to bid cost values (according to their available resources) for accomplishing the subset of the applications' tasks. Trust management schemes consist of a powerful tool for the detection of unexpected node behaviors (such as faulty or malicious). It is critical for participants (i.e., bidders and auctioneer) to estimate each other's trustworthiness before initiating the task allocation procedure. To address this issue, we introduce a real-time trust management module for our auction system that is able to validate the reliable bid value and determine faulty nodes and malicious entities. The main objective of our task allocation scheme is to maximize the network lifetime by sharing tasks and network resources within applications, while enhancing the overall application quality of service (e.g., deadline). We also propose a heuristic two-phase winner determination protocol to deal with the combinatorial reverse auction problem. Simulation results show that the proposed scheme offers the promising performance and efficiency. Copyright © 2012 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR] |
| Copyright of Security & Communication Networks is the property of Wiley-Blackwell and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) | |
| Database: | Complementary Index |
Be the first to leave a comment!
Nájsť tento článok vo Web of Science