29 research outputs found

    A survey of spatial crowdsourcing

    Get PDF

    A Survey on Mobile Crowdsensing Systems: Challenges, Solutions, and Opportunities

    Get PDF
    Mobile crowdsensing (MCS) has gained significant attention in recent years and has become an appealing paradigm for urban sensing. For data collection, MCS systems rely on contribution from mobile devices of a large number of participants or a crowd. Smartphones, tablets, and wearable devices are deployed widely and already equipped with a rich set of sensors, making them an excellent source of information. Mobility and intelligence of humans guarantee higher coverage and better context awareness if compared to traditional sensor networks. At the same time, individuals may be reluctant to share data for privacy concerns. For this reason, MCS frameworks are specifically designed to include incentive mechanisms and address privacy concerns. Despite the growing interest in the research community, MCS solutions need a deeper investigation and categorization on many aspects that span from sensing and communication to system management and data storage. In this paper, we take the research on MCS a step further by presenting a survey on existing works in the domain and propose a detailed taxonomy to shed light on the current landscape and classify applications, methodologies, and architectures. Our objective is not only to analyze and consolidate past research but also to outline potential future research directions and synergies with other research areas

    Auction-Based Efficient Online Incentive Mechanism Designs in Wireless Networks

    Get PDF
    Recently, wide use of mobile devices and applications, such as YouTube and Twitter, has facilitated every aspect of our daily lives. Meanwhile, it has also posed great challenges to enable resource-demanding users to successfully access networks. Thus, in order to enlarge network capacity and fully make use of vacant resources, new communication architectures emerge, such as D2D communications, edge computing, and crowdsourcing, all of which ask for involvement of end mobile users in assisting transmission, computation, or network management. However, end mobile users are not always willing to actively provide such sharing services if no reimbursements are provided as they need to consume their own computation and communication resources. Besides, since mobile users are not always stationary, they can opt-in and opt-out the network for their own convenience. Thus, an important practical characteristic of wireless networks, i.e., the mobility of mobile users cannot be ignored, which means that the demands of mobile users span over a period of time. As one of promising solutions, the online incentive mechanism design has been introduced in wireless networks in order to motivate the participation of more mobile users under a dynamic environment. In this thesis, with the analyses of each stakeholder's economic payoffs in wireless networks, the auction-based online incentive mechanisms are proposed to achieve resource allocations, participant selections, and payment determinations in two wireless networks, i.e., Crowdsensing and mobile edge computing. In particular, i) an online incentive mechanism is designed to guarantee Quality of Information of each arriving task in mobile crowdsensing networks, followed by an enhanced online strategy which could further improves the competitive ratio; ii) an online incentive mechanism jointly considering communication and computation resource allocations in collaborative edge computing networks is proposed based on the primal-dual theory; iii) to deal with the nonlinear issue in edge computing networks, an nonlinear online incentive mechanism under energy budget constraints of mobile users is designed based on the Maximal-in-Distributional Range framework; and iv) inspired by the recent development of deep learning techniques, a deep incentive mechanism with the budget balance of each mobile user is proposed to maximize the net revenue of service providers by leveraging the multi-task machine learning model. Both theoretical analyses and numerical results demonstrate the effectiveness of the designed mechanisms

    Location reliability and gamification mechanisms for mobile crowd sensing

    Get PDF
    People-centric sensing with smart phones can be used for large scale sensing of the physical world by leveraging the sensors on the phones. This new type of sensing can be a scalable and cost-effective alternative to deploying static wireless sensor networks for dense sensing coverage across large areas. However, mobile people-centric sensing has two main issues: 1) Data reliability in sensed data and 2) Incentives for participants. To study these issues, this dissertation designs and develops McSense, a mobile crowd sensing system which provides monetary and social incentives to users. This dissertation proposes and evaluates two protocols for location reliability as a step toward achieving data reliability in sensed data, namely, ILR (Improving Location Reliability) and LINK (Location authentication through Immediate Neighbors Knowledge). ILR is a scheme which improves the location reliability of mobile crowd sensed data with minimal human efforts based on location validation using photo tasks and expanding the trust to nearby data points using periodic Bluetooth scanning. LINK is a location authentication protocol working independent of wireless carriers, in which nearby users help authenticate each other’s location claims using Bluetooth communication. The results of experiments done on Android phones show that the proposed protocols are capable of detecting a significant percentage of the malicious users claiming false location. Furthermore, simulations with the LINK protocol demonstrate that LINK can effectively thwart a number of colluding user attacks. This dissertation also proposes a mobile sensing game which helps collect crowd sensing data by incentivizing smart phone users to play sensing games on their phones. We design and implement a first person shooter sensing game, “Alien vs. Mobile User”, which employs techniques to attract users to unpopular regions. The user study results show that mobile gaming can be a successful alternative to micro-payments for fast and efficient area coverage in crowd sensing. It is observed that the proposed game design succeeds in achieving good player engagement

    Applications

    Get PDF
    Volume 3 describes how resource-aware machine learning methods and techniques are used to successfully solve real-world problems. The book provides numerous specific application examples: in health and medicine for risk modelling, diagnosis, and treatment selection for diseases in electronics, steel production and milling for quality control during manufacturing processes in traffic, logistics for smart cities and for mobile communications

    Crowdsourcing atop blockchains

    Get PDF
    Traditional crowdsourcing systems, such as Amazon\u27s Mechanical Turk (MTurk), though once acquiring great economic successes, have to fully rely on third-party platforms to serve between the requesters and the workers for basic utilities. These third-parties have to be fully trusted to assist payments, resolve disputes, protect data privacy, manage user authentications, maintain service online, etc. Nevertheless, tremendous real-world incidents indicate how elusive it is to completely trust these platforms in reality, and the reduction of such over-reliance becomes desirable. In contrast to the arguably vulnerable centralized approaches, a public blockchain is a distributed and transparent global consensus computer that is highly robust. The blockchain is usually managed and replicated by a large-scale peer-to-peer network collectively, thus being much more robust to be fully trusted for correctness and availability. It, therefore, becomes enticing to build novel crowdsourcing applications atop blockchains to reduce the over-trust on third-party platforms. However, this new fascinating technology also brings about new challenges, which were never that severe in the conventional centralized setting. The most serious issue is that the blockchain is usually maintained in the public Internet environment with a broader attack surface open to anyone. This not only causes serious privacy and security issues, but also allows the adversaries to exploit the attack surface to hamper more basic utilities. Worse still, most existing blockchains support only light on-chain computations, and the smart contract executed atop the decentralized consensus computer must be simple, which incurs serious feasibility problems. In reality, the privacy/security issue and the feasibility problem even restrain each other and create serious tensions to hinder the broader adoption of blockchain. The dissertation goes through the non-trivial challenges to realize secure yet still practical decentralization (for urgent crowdsourcing use-cases), and lay down the foundation for this line of research. In sum, it makes the next major contributions. First, it identifies the needed security requirements in decentralized knowledge crowdsourcing (e.g., data privacy), and initiates the research of private decentralized crowdsourcing. In particular, the confidentiality of solicited data is indispensable to prevent free-riders from pirating the others\u27 submissions, thus ensuring the quality of solicited knowledge. To this end, a generic private decentralized crowdsourcing framework is dedicatedly designed, analyzed, and implemented. Furthermore, this dissertation leverages concretely efficient cryptographic design to reduce the cost of the above generic framework. It focuses on decentralizing the special use-case of Amazon MTurk, and conducts multiple specific-purpose optimizations to remove needless generality to squeeze performance. The implementation atop Ethereum demonstrates a handling cost even lower than MTurk. In addition, it focuses on decentralized crowdsourcing of computing power for specific machine learning tasks. It lets a requester place deposits in the blockchain to recruit some workers for a designated (randomized) programs. If and only if these workers contribute their resources to compute correctly, they would earn well-deserved payments. For these goals, a simple yet still useful incentive mechanism is developed atop the blockchain to deter rational workers from cheating. Finally, the research initiates the first systematic study on crowdsourcing blockchains\u27 full nodes to assist superlight clients (e.g., mobile phones and IoT devices) to read the blockchain\u27s records. This dissertation presents a novel generic solution through the powerful lens of game-theoretic treatments, which solves the long-standing open problem of designing generic superlight clients for all blockchains

    Applications

    Get PDF
    Volume 3 describes how resource-aware machine learning methods and techniques are used to successfully solve real-world problems. The book provides numerous specific application examples: in health and medicine for risk modelling, diagnosis, and treatment selection for diseases in electronics, steel production and milling for quality control during manufacturing processes in traffic, logistics for smart cities and for mobile communications

    Energy and throughput efficient strategies for heterogeneous future communication networks

    Get PDF
    As a result of the proliferation of wireless-enabled user equipment and data-hungry applications, mobile data traffic has exponentially increased in recent years.This in-crease has not only forced mobile networks to compete on the scarce wireless spectrum but also to intensify their power consumption to serve an ever-increasing number of user devices. The Heterogeneous Network (HetNet) concept, where mixed types of low-power base stations coexist with large macro base stations, has emerged as a potential solution to address power consumption and spectrum scarcity challenges. However, as a consequence of their inflexible, constrained, and hardware-based configurations, HetNets have major limitations in adapting to fluctuating traffic patterns. Moreover, for large mobile networks, the number of low-power base stations (BSs) may increase dramatically leading to sever power consumption. This can easily overwhelm the benefits of the HetNet concept. This thesis exploits the adaptive nature of Software-defined Radio (SDR) technology to design novel and optimal communication strategies. These strategies have been designed to leverage the spectrum-based cell zooming technique, the long-term evolution licensed assisted access (LTE-LAA) concept, and green energy, in order to introduce a novel communication framework that endeavors to minimize overall network on-grid power consumption and to maximize aggregated throughput, which brings significant benefits for both network operators and their customers. The proposed strategies take into consideration user data demands, BS loads, BS power consumption, and available spectrum to model the research questions as optimization problems. In addition, this thesis leverages the opportunistic nature of the cognitive radio (CR) technique and the adaptive nature of the SDR to introduce a CR-based communication strategy. This proposed CR-based strategy alleviates the power consumption of the CR technique and enhances its security measures according to the confidentiality level of the data being sent. Furthermore, the introduced strategy takes into account user-related factors, such as user battery levels and user data types, and network-related factors, such as the number of unutilized bands and vulnerability level, and then models the research question as a constrained optimization problem. Considering the time complexity of the optimum solutions for the above-mentioned strategies, heuristic solutions were proposed and examined against existing solutions. The obtained results show that the proposed strategies can save energy consumption up to 18%, increase user throughput up to 23%, and achieve better spectrum utilization. Therefore, the proposed strategies offer substantial benefits for both network operators and users
    corecore