An Incentive Mechanism in Mobile Crowdsourcing Based on Multi-Attribute Reverse Auctions
<p>The framework of a mobile crowdsourcing system.</p> "> Figure 2
<p>The processing procedure for the proposed incentive mechanism.</p> "> Figure 3
<p>Task assignment area relation map.</p> "> Figure 4
<p>The comparison results of efficiencies when <math display="inline"><semantics> <mrow> <mi>P</mi> <mo stretchy="false">(</mo> <mi>W</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math> varied from 200 to 350 with the increment of 50. (<b>a</b>) <math display="inline"><semantics> <mrow> <mi>P</mi> <mo stretchy="false">(</mo> <mi>W</mi> <mo stretchy="false">)</mo> <mo>=</mo> <mn>200</mn> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <mi>P</mi> <mo stretchy="false">(</mo> <mi>W</mi> <mo stretchy="false">)</mo> <mo>=</mo> <mn>250</mn> </mrow> </semantics></math>; (<b>c</b>) <math display="inline"><semantics> <mrow> <mi>P</mi> <mo stretchy="false">(</mo> <mi>W</mi> <mo stretchy="false">)</mo> <mo>=</mo> <mn>300</mn> </mrow> </semantics></math>; (<b>d</b>) <math display="inline"><semantics> <mrow> <mi>P</mi> <mo stretchy="false">(</mo> <mi>W</mi> <mo stretchy="false">)</mo> <mo>=</mo> <mn>350</mn> </mrow> </semantics></math>.</p> "> Figure 5
<p>The comparison results of trust degree of system when <math display="inline"><semantics> <mrow> <mi>P</mi> <mo stretchy="false">(</mo> <mi>W</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math> varied from 200 to 350 with the increment of 50. (<b>a</b>) <math display="inline"><semantics> <mrow> <mi>P</mi> <mo stretchy="false">(</mo> <mi>W</mi> <mo stretchy="false">)</mo> <mo>=</mo> <mn>200</mn> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <mi>P</mi> <mo stretchy="false">(</mo> <mi>W</mi> <mo stretchy="false">)</mo> <mo>=</mo> <mn>250</mn> </mrow> </semantics></math>; (<b>c</b>) <math display="inline"><semantics> <mrow> <mi>P</mi> <mo stretchy="false">(</mo> <mi>W</mi> <mo stretchy="false">)</mo> <mo>=</mo> <mn>300</mn> </mrow> </semantics></math>; (<b>d</b>) <math display="inline"><semantics> <mrow> <mi>P</mi> <mo stretchy="false">(</mo> <mi>W</mi> <mo stretchy="false">)</mo> <mo>=</mo> <mn>350</mn> </mrow> </semantics></math>.</p> "> Figure 6
<p>The comparison results of efficiencies when <math display="inline"><semantics> <mi>m</mi> </semantics></math> varied from 150 to 300 with the increment of 50. (<b>a</b>) <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>150</mn> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>200</mn> </mrow> </semantics></math>; (<b>c</b>) <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>250</mn> </mrow> </semantics></math>; (<b>d</b>) <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>300</mn> </mrow> </semantics></math>.</p> "> Figure 6 Cont.
<p>The comparison results of efficiencies when <math display="inline"><semantics> <mi>m</mi> </semantics></math> varied from 150 to 300 with the increment of 50. (<b>a</b>) <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>150</mn> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>200</mn> </mrow> </semantics></math>; (<b>c</b>) <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>250</mn> </mrow> </semantics></math>; (<b>d</b>) <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>300</mn> </mrow> </semantics></math>.</p> "> Figure 7
<p>The comparison results of trust degree of system when <math display="inline"><semantics> <mi>m</mi> </semantics></math> varied from 150 to 300 with the increment of 50. (<b>a</b>) <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>150</mn> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>200</mn> </mrow> </semantics></math>; (<b>c</b>) <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>250</mn> </mrow> </semantics></math>; (<b>d</b>) <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>300</mn> </mrow> </semantics></math>.</p> "> Figure 8
<p>The comparison results of efficiencies when <math display="inline"><semantics> <mi mathvariant="sans-serif">ρ</mi> </semantics></math> varied from 0 to 0.09 with the increment of 0.03. (<b>a</b>) <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">ρ</mi> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">ρ</mi> <mo>=</mo> <mn>0.03</mn> </mrow> </semantics></math>; (<b>c</b>) <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">ρ</mi> <mo>=</mo> <mn>0.06</mn> </mrow> </semantics></math>; (<b>d</b>) <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">ρ</mi> <mo>=</mo> <mn>0.09</mn> </mrow> </semantics></math>.</p> "> Figure 9
<p>The comparison results of the trust degree of system when <math display="inline"><semantics> <mi mathvariant="sans-serif">ρ</mi> </semantics></math> varied from 0 to 0.15 with the increment of 0.05. (<b>a</b>) <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">ρ</mi> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">ρ</mi> <mo>=</mo> <mn>0.03</mn> </mrow> </semantics></math>; (<b>c</b>) <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">ρ</mi> <mo>=</mo> <mn>0.06</mn> </mrow> </semantics></math>; (<b>d</b>) <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">ρ</mi> <mo>=</mo> <mn>0.09</mn> </mrow> </semantics></math>.</p> "> Figure 9 Cont.
<p>The comparison results of the trust degree of system when <math display="inline"><semantics> <mi mathvariant="sans-serif">ρ</mi> </semantics></math> varied from 0 to 0.15 with the increment of 0.05. (<b>a</b>) <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">ρ</mi> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">ρ</mi> <mo>=</mo> <mn>0.03</mn> </mrow> </semantics></math>; (<b>c</b>) <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">ρ</mi> <mo>=</mo> <mn>0.06</mn> </mrow> </semantics></math>; (<b>d</b>) <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">ρ</mi> <mo>=</mo> <mn>0.09</mn> </mrow> </semantics></math>.</p> "> Figure 10
<p>The comparison results of efficiencies when the interval of <math display="inline"><semantics> <mrow> <msub> <mi>n</mi> <mi>i</mi> </msub> </mrow> </semantics></math> varied from 1 to 13 with the increment of 4, (<b>a</b>) <math display="inline"><semantics> <mrow> <msub> <mi>n</mi> <mi>i</mi> </msub> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <msub> <mi>n</mi> <mi>i</mi> </msub> <mo>∈</mo> <mo stretchy="false">[</mo> <mn>1</mn> <mo>,</mo> <mn>5</mn> <mo stretchy="false">]</mo> </mrow> </semantics></math>; (<b>c</b>) <math display="inline"><semantics> <mrow> <msub> <mi>n</mi> <mi>i</mi> </msub> <mo>∈</mo> <mo stretchy="false">[</mo> <mn>1</mn> <mo>,</mo> <mn>9</mn> <mo stretchy="false">]</mo> </mrow> </semantics></math>; (<b>d</b>) <math display="inline"><semantics> <mrow> <msub> <mi>n</mi> <mi>i</mi> </msub> <mo>∈</mo> <mo stretchy="false">[</mo> <mn>1</mn> <mo>,</mo> <mn>13</mn> <mo stretchy="false">]</mo> </mrow> </semantics></math>.</p> "> Figure 11
<p>The comparison results of trust degree of system when the interval of <math display="inline"><semantics> <mrow> <msub> <mi>n</mi> <mi>i</mi> </msub> </mrow> </semantics></math> varied from 1 to 13 with the increment of 4. (<b>a</b>) <math display="inline"><semantics> <mrow> <msub> <mi>n</mi> <mi>i</mi> </msub> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <msub> <mi>n</mi> <mi>i</mi> </msub> <mo>∈</mo> <mo stretchy="false">[</mo> <mn>1</mn> <mo>,</mo> <mn>5</mn> <mo stretchy="false">]</mo> </mrow> </semantics></math>; (<b>c</b>) <math display="inline"><semantics> <mrow> <msub> <mi>n</mi> <mi>i</mi> </msub> <mo>∈</mo> <mo stretchy="false">[</mo> <mn>1</mn> <mo>,</mo> <mn>9</mn> <mo stretchy="false">]</mo> </mrow> </semantics></math>; (<b>d</b>) <math display="inline"><semantics> <mrow> <msub> <mi>n</mi> <mi>i</mi> </msub> <mo>∈</mo> <mo stretchy="false">[</mo> <mn>1</mn> <mo>,</mo> <mn>13</mn> <mo stretchy="false">]</mo> </mrow> </semantics></math>.</p> ">
Abstract
:1. Introduction
- (1)
- Most auction models are designed to win the auction at the lowest price. However, many researchers fail to consider the unfairness caused by malicious competition, i.e., they upload bids lower than their cost for winning the auction and improve their utility.
- (2)
- Most payments for sensing tasks are ex-ante [9,10], which means that the crowd workers are paid before they perform the sensing tasks. Due to the selfishness of individuals, some crowd workers may not perform the task truthfully after receiving payment, which is known as free-riding [11] and that will result in low quality sensing data.
- (3)
- The general auction models only consider the interests and preferences of crowd workers, however, they ignore the task requesters’ requirements of crowd workers.
- (4)
- Most researchers only consider the price attribute in the auction process, which can better ensure the budget balance. However, by only considering the price, they ignore the impact of other attributes, which cannot ensure the quality of sensing data.
- (1)
- An incentive mechanism based on the combination of reverse auction and multi-attribute auction is designed to address the crowd workers’ malicious competition behavior in price bidding. Through updating the reputation and trust degree of crowd workers based on their performance, the free-riding problem is addressed [12,13].
- (2)
- Adopt the dynamic threshold of multi-attribute reverse auction algorithm to select the qualified crowd workers. Different from other payment schemes [14], our proposed payment scheme considers both the reputation of crowd workers and the quality of sensing data, which can inspire crowd workers to submit high-quality sensing data and improve their reputations.
- (3)
- Experimental results prove that our proposed incentive mechanism can achieve computational efficiency, individual rationality, budget-balance, truthfulness, and honesty.
2. Related Works
3. The Proposed Incentive Mechanism
3.1. System Model
3.2. Online Auction
- (1)
- The platform issues tasks for crowd workers, then an interested crowd worker submits his bidding profile to the platform. After evaluating his bidding price and historical information the platform rejects this crowd worker because he is considered a malicious competitive bidder.
- (2)
- The platform issues tasks for crowd workers, then an interested crowd worker submits his bidding profile to the platform. The platform rejects this crowd worker because his attribute values do not satisfy the requirements, then updates the attribute thresholds.
- (3)
- The platform issues tasks for crowd workers, but the crowd worker is not interested in this task.
- (4)
- The platform issues tasks for crowd workers, then an interested crowd worker submits his bidding profile to the platform. The platform accepts the crowd worker, and updates the attribute thresholds, then assigns the task for him. After completing the task, the crowd worker submits his sensed data to the platform.
- (1)
- Reputation: the crowdsourcing system will give a base value of reputation for every new crowd worker, and then we use Gompertz function [41] to update the reputation scores. Gompertz function is a type of growth curve function model which describes the three stages of the occurrence, development and maturity of things, and the development speed of each stage is different. We select this function to update the value of reputation and trust degree, because it is more suitable to model the concept of reputation and trust degree in human interactions. The Gompertz function defined by Equation (6).
- (2)
- Trust degree: the crowdsourcing system will give a base value of trust degree for every new crowd worker and then we use the same idea as reputation to update the trust degree, which is shown by Equation (10)However, different from , we hope could reflect the overall situation in which the crowd worker completed tasks in the past. Therefore, needs to reflect the tasks’ quality of a crowd worker has completed. The more tasks with good-quality, the greater the and . In contrast, the trust degree of crowd worker is low if he has done many tasks with bad-quality in the past. The good-quality and bad-quality are distinguished by the system. The crowd worker should do the new task with the quality no less than before if he wants to improve his trust degree. can be calculated by Equation (11):
- (3)
- Location: the current location of a crowd worker when he submits the bidding profile, ’s location is expressed as .
- (4)
- Distance: the shortest distance that a crowd worker moves from the current location to the target area, which is expressed by .
- (5)
- The possibility that a crowd worker moves to the target area: according to the crowd worker’s historical behavior information, the probability that the crowd worker moves from the current location to the target area is computed by Equation (12):
- (6)
- Privacy sensitivity: this attribute affects the crowd worker’s choice of tasks and the payment expectations [43]. When a crowd worker selects a task, he will judge the privacy requirement based on his privacy sensitivity level. The privacy sensitivity of is represented by .
- (7)
- Sensing time: affected by the current location of a crowd worker and the device held by the crowd worker. The cost of a crowd worker increases with the increase of the sensing time. The sensing time is represented as , where indicates the start time that plans to perform the task, denotes the time when the crowd worker submits sensed data.
- (8)
- Bidding price: the reserve price that wants to sell his sensed data. The bidding price of for is expressed by .
Algorithm 1 Crowd Workers Selection |
Input:’s bidding profile , task set , ’s budget , the initial threshold set |
Output: the crowd worker set of |
1: for to do |
2: for to do //each task that is submitted by |
3: if in the target area then |
4: if then //malicious competition in bidding price |
5: continue |
6: end if |
7: if then |
8: if then //its attributes satisfy threshold requirement |
9: if then //the remaining budget of is sufficient |
10: //allocate task to crowd workers i |
11: update by Equation (4) // update the threshold of related attributes |
12: else // the remaining budget of is not sufficient |
13: update by Equation (4) |
14: end if |
else //its attributes don’t satisfy threshold requirement |
15: update by Equation (4) |
16: end if |
17: end if |
18: end if |
19: end if |
20: if is not in the target area then |
21: if //malicious competition |
22: continue |
23: end if |
24: if then |
25: return to the 4–18 steps |
26: end if |
27: end if |
28: end for |
29: end for |
Algorithm 2 Payment Determination |
Input: ’s bidding profile , each task’s quality value , the system threshold of good reputation |
Output: Payment |
1: for to do |
2: if then //’s reputation satisfies the system threshold of good reputation |
3: for to do |
4: // will get payment equal to the value of the bidding price before performing |
5: pay for |
6: if be finished then |
7: Quality certification |
8: Update and by Equations (7)–(11) |
9: end if |
10: end for |
11: end if |
12: if then //’s reputation doesn’t satisfy the system threshold of good reputation |
13: for to do |
14: if be finished then |
15: Quality certification |
16: // will get payment which determined based on the quality of sensing data after submitting sensing data and quality certification |
17: pay for |
18: Update and by Equations (7)–(11) |
19: end if |
20: end for |
21: end if |
22: end for |
3.3. Mechanism Design against Free-Riding
- (1)
- For the malicious competition on bidding prices, we give a cost estimation method for crowd workers to calculate the reasonableness of the bidding price submitted by crowd workers. In order to recruit enough crowd workers to participate the sensing tasks, this paper publishes tasks to target area and surrounding areas to encourage mobile users to perform tasks in target areas. Therefore, the cost for crowd workers to perform a sensing task contains the cost of moving and task-sensing. The farther the crowd worker is from the target area, the higher the moving cost. The moving cost of is calculated by Equation (14):In order to give crowd workers a reference for bidding and increase the likelihood of successful bidding, we will give a reference bidding price based on moving distance and sensing time of the crowd worker which is calculated by Equation (16). Then the crowd worker can determine their bidding price based on the reference value.
- (2)
- For identifying the crowd workers with other two free-ridding behaviors during the bidding process, and effectively select the high-quality crowd workers to improve the efficiency of MCSs, we divide mobile users into following types based on their locations and possible behaviors
- (A)
- Mobile users are in surrounding of the target area.
- (a)
- Mobile users who may go to the target area before task deadline:
- (i)
- the mobile users are interested in the task of target area, and submit their bidding profiles.
- (ii)
- the mobile users are not interested in the task of target area, thus, they will not participate in the auction.
- (iii)
- the mobile users are not interested in the task of target area, but they only want to try to participate in the auction or deliberately disturb the system order. Furthermore, they will submit false sensing data if they are selected.
- (b)
- Mobile users who are unlikely to go to the target area before task deadline.
- (iv)
- the mobile users are similar to (ii).
- (v)
- the mobile users are similar to (iii).
- (B)
- Mobile users in the target area.
- (vi)
- the mobile users are interested in the task, and submit their bidding profile to the platform.
- (vii)
- the mobile users are similar to (ii).
- (viii)
- the mobile users are similar to (iii).
3.4. Analysis of the Proposed Incentive Mechanism
4. System Performance Evaluations
4.1. Simulation Setup
4.2. Simulation Results
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Li, J.; Cai, Z.; Yan, M.; Li, Y. Using Crowdsourced Data in Location-based Social Networks to Explore Influence Maximization. In Proceedings of the 35th Annual IEEE International Conference on Computer Communications (INFOCOM 2016), San Francisco, CA, USA, 10–14 April 2016; pp. 1–9. [Google Scholar]
- Liang, Y.; Cai, Z.; Yu, J.; Han, Q.; Li, Y. Deep Learning Based Inference of Private Information Using Embedded Sensors in Smart Devices. IEEE Netw. 2018, 32, 8–14. [Google Scholar] [CrossRef]
- Jia, Y.H.; Chen, W.N.; Gu, T.; Zhang, H.; Yuan, H.Q.; Kwong, S.; Zhang, J. Distributed Cooperative Co-Evolution with Adaptive Computing Resource Allocation for Large Scale Optimization. IEEE Trans. Evol. Comput. 2018. [Google Scholar] [CrossRef]
- Cai, Z.; Zheng, X. A Private and Efficient Mechanism for Data Uploading in Smart Cyber-Physical Systems. IEEE Trans. Netw. Sci. Eng. 2018. [Google Scholar] [CrossRef]
- Zheng, X.; Cai, Z.; Li, Y. Data Linkage in Smart IoT Systems: A Consideration from Privacy Perspective. IEEE Commun. Mag. 2018, 56, 55–61. [Google Scholar] [CrossRef]
- Cai, Z.; He, Z.; Guan, X.; Li, Y. Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks. IEEE Trans. Dependable Secur. Comput. 2018, 15, 577–590. [Google Scholar] [CrossRef]
- Gong, Y.J.; Chen, E.; Ni, L.M.; Zhang, J. AntMapper: An Ant Colony-Based Map Matching Approach for Trajectory-Based Applications. IEEE Trans. Intell. Transp. Syst. 2018, 19, 390–401. [Google Scholar] [CrossRef]
- Duan, Z.; Li, W.; Cai, Z. Distributed Auctions for Task Assignment and Scheduling in Mobile Crowdsensing Systems. In Proceedings of the 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017), Atlanta, GA, USA, 5–8 June 2017; pp. 635–644. [Google Scholar]
- Zhang, X.; Yang, Z.; Zhou, Z.; Cai, H.; Chen, L.; Li, X. Free Market of Crowdsourcing: Incentive Mechanism Design for Mobile Sensing. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 3190–3200. [Google Scholar] [CrossRef] [Green Version]
- Yang, D.; Xue, G.; Fang, X.; Tang, J. Crowdsourcing to smartphones: Incentive mechanism design for mobile phone sensing. In Proceedings of the International Conference on Mobile Computing and Networking, Istanbul, Turkey, 22–26 August 2012; pp. 173–184. [Google Scholar]
- Zhang, Y.; Schaar, M.V.D. Reputation-based incentive protocols in crowdsourcing applications. In Proceedings of the IEEE INFOCOM, Orlando, FL, USA, 25–30 March 2012; pp. 2140–2148. [Google Scholar]
- Feldman, M.; Papadimitriou, C.; Chuang, J.; Stoica, I. Free-riding and whitewashing in peer-to-peer systems. IEEE J. Sel. Areas Commun. 2006, 24, 1010–1019. [Google Scholar] [CrossRef] [Green Version]
- Zhang, X.; Xue, G.; Yu, R.; Yang, D.; Tang, J. Keep Your Promise: Mechanism Design Against Free-Riding and False-Reporting in Crowdsourcing. IEEE Internet Things J. 2017, 2, 562–572. [Google Scholar] [CrossRef]
- Miao, C.; Yu, H.; Shen, Z.; Leung, C. Balancing Quality and Budget Considerations in Mobile Crowdsourcing. Decis. Support Syst. 2016, 90, 56–64. [Google Scholar] [CrossRef]
- Lee, J.S.; Hoh, B. Sell your experiences: A market mechanism based incentive for participatory sensing. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications, Mannheim, Germany, 29 March–2 April 2010; pp. 60–68. [Google Scholar]
- Peng, D.; Wu, F.; Chen, G. Pay as How Well You Do: A Quality Based Incentive Mechanism for Crowdsensing. In Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing, Hangzhou, China, 22–25 June 2015; pp. 177–186. [Google Scholar]
- Yang, D.; Xue, G.; Fang, X.; Tang, J. Incentive Mechanisms for Crowdsensing: Crowdsourcing with Smartphones. IEEE/ACM Trans. Netw. 2016, 24, 1732–1744. [Google Scholar] [CrossRef]
- Zhao, D.; Li, X.Y.; Ma, H. Budget-Feasible Online Incentive Mechanisms for Crowdsourcing Tasks Truthfully. IEEE/ACM Trans. Netw. 2016, 24, 647–661. [Google Scholar] [CrossRef]
- Zhao, D.; Ma, H.; Liu, L. Frugal Online Incentive Mechanisms for Crowdsourcing Tasks Truthfully. Comput. Sci. 2014, 37, 103–122. [Google Scholar]
- Zhu, X.; An, J.; Yang, M.; Xiang, L.; Yang, Q.; Gui, X. A Fair Incentive Mechanism for Crowdsourcing in Crowd Sensing. IEEE Internet Things J. 2017, 3, 1364–1372. [Google Scholar] [CrossRef]
- Krontiris, I.; Albers, A. Monetary incentives in participatory sensing using multi-attributive auctions. Int. J. Parallel Emerg. Distrib. Syst. 2012, 27, 317–336. [Google Scholar] [CrossRef]
- Albers, A.; Krontiris, I.; Sonehara, N.; Echizen, I. Coupons as Monetary Incentives in Participatory Sensing. IFIP Adv. Inf. Commun. Technol. 2017, 399, 226–237. [Google Scholar]
- Luo, T.; Das, S.K.; Tan, H.P.; Xia, L. Incentive Mechanism Design for Crowdsourcing: An All-Pay Auction Approach. ACM Trans. Intell. Syst. Technol. 2016, 7, 1–26. [Google Scholar] [CrossRef]
- Luo, T.; Kanhere, S.S.; Das, S.K.; Hwee-Pink, T.A. Incentive Mechanism Design for Heterogeneous Crowdsourcing Using All-Pay Contests. IEEE Trans. Mob. Comput. 2016, 15, 2234–2246. [Google Scholar] [CrossRef]
- Wang, Y.; Cai, Z.; Yin, G.; Gao, Y.; Tong, X.; Wu, G. An incentive mechanism with privacy protection in mobile crowdsourcing systems. Comput. Netw. 2016, 102, 157–171. [Google Scholar] [CrossRef]
- Wang, Y.; Cai, Z.; Tong, X.; Gao, Y.; Yin, G. Truthful incentive mechanism with location privacy-preserving for mobile crowdsourcing systems. Comput. Netw. 2018, 135, 32–43. [Google Scholar] [CrossRef]
- Jin, H.; Su, L.; Chen, D.; Nahrstedt, K.; Xu, J. Quality of Information Aware Incentive Mechanisms for Mobile Crowd Sensing Systems. In Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing, Hangzhou, China, 22–25 June 2015; pp. 167–176. [Google Scholar]
- Jin, H.; Su, L.; Nahrstedt, K. Centurion: Incentivizing Multi-Requester Mobile Crowd Sensing. In Proceedings of the INFOCOM, Atlanta, GA, USA, 1–4 May 2017; pp. 1–9. [Google Scholar]
- Chen, S.; Liu, M.; Chen, X. A truthful double auction for two-sided heterogeneous mobile crowdsensing markets. Comput. Commun. 2016, 81, 31–42. [Google Scholar] [CrossRef]
- Yang, D.; Fang, X.; Xue, G. Truthful incentive mechanisms for k-anonymity location privacy. In Proceedings of the INFOCOM, Turin, Italy, 14–19 April 2013; pp. 2994–3002. [Google Scholar]
- Gao, L.; Hou, F.; Huang, J. Providing long-term participation incentive in participatory sensing. In Proceedings of the Computer Communications, Kowloon, Hong Kong, China, 26 April–1 May 2015; pp. 2803–2811. [Google Scholar]
- Duan, Z.; Yan, M.; Cai, Z.; Wang, X.; Han, M.; Li, Y. Truthful Incentive Mechanisms for Social Cost Minimization in Mobile Crowdsourcing Systems. Sensors 2016, 16, 481. [Google Scholar] [CrossRef] [PubMed]
- Han, Y.; Miao, C.; Leung, C.; Chen, Y.; Fauvel, S.; Lesser, V.R.; Yang, Q. Mitigating Herding in Hierarchical Crowdsourcing Networks. Sci. Rep. 2016, 6, 4. [Google Scholar]
- Yu, H.; Miao, C.; Chen, Y.; Fauvel, S.; Li, X.; Lesser, V.R. Algorithmic Management for Improving Collective Productivity in Crowdsourcing. Sci. Rep. 2017, 7, 12541. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Zhang, Y.H.; Gong, Y.J.; Zhang, H.X.; Gu, T.L.; Zhang, J. Towards Fast Niching Evolutionary Algorithms: A Locality Sensitive Hashing-Based Approach. IEEE Trans. Evol. Comput. 2017, 21, 347–362. [Google Scholar] [CrossRef]
- Wen, X.; Chen, W.N.; Lin, Y.; Gu, T.; Zhang, H.; Li, Y.; Yin, Y.; Zhang, J. A Maximal Clique Based Multiobjective Evolutionary Algorithm for Overlapping Community Detection. IEEE Trans. Evol. Comput. 2017, 21, 363–377. [Google Scholar] [CrossRef]
- Yang, Q.; Chen, W.N.; Deng, J.D.; Li, Y.; Gu, T.; Zhang, J. A Level-based Learning Swarm Optimizer for Large Scale Optimization. IEEE Trans. Evol. Comput. 2018, 22, 578–594. [Google Scholar] [CrossRef]
- Tian, F.; Liu, B.; Sun, X.; Zhang, X.; Cao, G.; Gui, L. Movement-Based Incentive for Crowdsourcing. IEEE Trans. Veh. Technol. 2017, 66, 7223–7233. [Google Scholar] [CrossRef]
- Li, J.; Cai, Z.; Wang, J.; Han, M.; Li, Y. Truthful Incentive Mechanisms for Geographical Position Conflicting Mobile Crowdsensing Systems. IEEE Trans. Comput. Soc. Syst. 2018, 5, 1–11. [Google Scholar] [CrossRef]
- Zhan, Z.H.; Liu, X.; Zhang, H.; Yu, Z.; Weng, J.; Li, Y.; Gu, T.; Zhang, J. Cloudde: A heterogeneous differential evolution algorithm and its distributed cloud version. IEEE Trans. Parallel Distrib. Syst. 2017, 28, 704–716. [Google Scholar] [CrossRef]
- Ma, X.; Ma, J.; Li, H.; Jiang, Q.; Gao, S. RTRC: A Reputation-Based Incentive Game Model for Trustworthy Crowdsourcing Service. China Commun. 2016, 13, 199–215. [Google Scholar] [CrossRef]
- Peng, L.; Yu, X.Y.; Yang, L.; Zhang, T. Crowdsourcing Fraud Detection Algorithm Based on Ebbinghaus Forgetting Curve. Int. J. Secur. Appl. 2014, 8, 283–290. [Google Scholar] [CrossRef]
- He, Z.; Cai, Z.; Yu, J. Latent-data Privacy Preserving with Customized Data Utility for Social Network Data. IEEE Trans. Veh. Technol. 2018, 67, 665–673. [Google Scholar] [CrossRef]
- Tran, L.; To, H.; Fan, I.; Shahabi, C. A real-time framework for task assignment in hyperlocal spatial crowdsourcing. ACM Trans. Intell. Syst. Technol. 2018, 9, 37. [Google Scholar] [CrossRef]
Notation | Description |
---|---|
The crowd worker number of , the task number of | |
The reputation of , the trust degree of | |
The crowd worker set of | |
The budget of | |
The good quality task number of , the bad quality task number of , the total task number of | |
The sensed data quality of for |
n | m | ||||||||
---|---|---|---|---|---|---|---|---|---|
[1, 17] | [0, 1] | [0, 1] | [20, 25] | [25, 35] | 50 | 0.05 | [1, 12] | 100 | 300 |
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hu, Y.; Wang, Y.; Li, Y.; Tong, X. An Incentive Mechanism in Mobile Crowdsourcing Based on Multi-Attribute Reverse Auctions. Sensors 2018, 18, 3453. https://doi.org/10.3390/s18103453
Hu Y, Wang Y, Li Y, Tong X. An Incentive Mechanism in Mobile Crowdsourcing Based on Multi-Attribute Reverse Auctions. Sensors. 2018; 18(10):3453. https://doi.org/10.3390/s18103453
Chicago/Turabian StyleHu, Ying, Yingjie Wang, Yingshu Li, and Xiangrong Tong. 2018. "An Incentive Mechanism in Mobile Crowdsourcing Based on Multi-Attribute Reverse Auctions" Sensors 18, no. 10: 3453. https://doi.org/10.3390/s18103453
APA StyleHu, Y., Wang, Y., Li, Y., & Tong, X. (2018). An Incentive Mechanism in Mobile Crowdsourcing Based on Multi-Attribute Reverse Auctions. Sensors, 18(10), 3453. https://doi.org/10.3390/s18103453