18 research outputs found

    A Socially-Aware Incentive Mechanism for Mobile Crowdsensing Service Market

    Full text link
    Mobile Crowdsensing has shown a great potential to address large-scale problems by allocating sensing tasks to pervasive Mobile Users (MUs). The MUs will participate in a Crowdsensing platform if they can receive satisfactory reward. In this paper, in order to effectively and efficiently recruit sufficient MUs, i.e., participants, we investigate an optimal reward mechanism of the monopoly Crowdsensing Service Provider (CSP). We model the rewarding and participating as a two-stage game, and analyze the MUs' participation level and the CSP's optimal reward mechanism using backward induction. At the same time, the reward is designed taking the underlying social network effects amid the mobile social network into account, for motivating the participants. Namely, one MU will obtain additional benefits from information contributed or shared by local neighbours in social networks. We derive the analytical expressions for the discriminatory reward as well as uniform reward with complete information, and approximations of reward incentive with incomplete information. Performance evaluation reveals that the network effects tremendously stimulate higher mobile participation level and greater revenue of the CSP. In addition, the discriminatory reward enables the CSP to extract greater surplus from this Crowdsensing service market.Comment: 7 pages, accepted by IEEE Globecom'1

    A Stackelberg Game Approach Towards Socially-Aware Incentive Mechanisms for Mobile Crowdsensing (Online report)

    Full text link
    Mobile crowdsensing has shown a great potential to address large-scale data sensing problems by allocating sensing tasks to pervasive mobile users. The mobile users will participate in a crowdsensing platform if they can receive satisfactory reward. In this paper, to effectively and efficiently recruit sufficient number of mobile users, i.e., participants, we investigate an optimal incentive mechanism of a crowdsensing service provider. We apply a two-stage Stackelberg game to analyze the participation level of the mobile users and the optimal incentive mechanism of the crowdsensing service provider using backward induction. In order to motivate the participants, the incentive is designed by taking into account the social network effects from the underlying mobile social domain. For example, in a crowdsensing-based road traffic information sharing application, a user can get a better and accurate traffic report if more users join and share their road information. We derive the analytical expressions for the discriminatory incentive as well as the uniform incentive mechanisms. To fit into practical scenarios, we further formulate a Bayesian Stackelberg game with incomplete information to analyze the interaction between the crowdsensing service provider and mobile users, where the social structure information (the social network effects) is uncertain. The existence and uniqueness of the Bayesian Stackelberg equilibrium are validated by identifying the best response strategies of the mobile users. Numerical results corroborate the fact that the network effects tremendously stimulate higher mobile participation level and greater revenue of the crowdsensing service provider. In addition, the social structure information helps the crowdsensing service provider to achieve greater revenue gain.Comment: Submitted for possible journal publication. arXiv admin note: text overlap with arXiv:1711.0105

    From Generative AI to Generative Internet of Things: Fundamentals, Framework, and Outlooks

    Full text link
    Generative Artificial Intelligence (GAI) possesses the capabilities of generating realistic data and facilitating advanced decision-making. By integrating GAI into modern Internet of Things (IoT), Generative Internet of Things (GIoT) is emerging and holds immense potential to revolutionize various aspects of society, enabling more efficient and intelligent IoT applications, such as smart surveillance and voice assistants. In this article, we present the concept of GIoT and conduct an exploration of its potential prospects. Specifically, we first overview four GAI techniques and investigate promising GIoT applications. Then, we elaborate on the main challenges in enabling GIoT and propose a general GAI-based secure incentive mechanism framework to address them, in which we adopt Generative Diffusion Models (GDMs) for incentive mechanism designs and apply blockchain technologies for secure GIoT management. Moreover, we conduct a case study on modern Internet of Vehicle traffic monitoring, which utilizes GDMs to generate effective contracts for incentivizing users to contribute sensing data with high quality. Finally, we suggest several open directions worth investigating for the future popularity of GIoT

    Deep Anomaly Detection for Time-series Data in Industrial IoT: A Communication-Efficient On-device Federated Learning Approach

    Full text link
    Since edge device failures (i.e., anomalies) seriously affect the production of industrial products in Industrial IoT (IIoT), accurately and timely detecting anomalies is becoming increasingly important. Furthermore, data collected by the edge device may contain the user's private data, which is challenging the current detection approaches as user privacy is calling for the public concern in recent years. With this focus, this paper proposes a new communication-efficient on-device federated learning (FL)-based deep anomaly detection framework for sensing time-series data in IIoT. Specifically, we first introduce a FL framework to enable decentralized edge devices to collaboratively train an anomaly detection model, which can improve its generalization ability. Second, we propose an Attention Mechanism-based Convolutional Neural Network-Long Short Term Memory (AMCNN-LSTM) model to accurately detect anomalies. The AMCNN-LSTM model uses attention mechanism-based CNN units to capture important fine-grained features, thereby preventing memory loss and gradient dispersion problems. Furthermore, this model retains the advantages of LSTM unit in predicting time series data. Third, to adapt the proposed framework to the timeliness of industrial anomaly detection, we propose a gradient compression mechanism based on Top-\textit{k} selection to improve communication efficiency. Extensive experiment studies on four real-world datasets demonstrate that the proposed framework can accurately and timely detect anomalies and also reduce the communication overhead by 50\% compared to the federated learning framework that does not use a gradient compression scheme.Comment: IEEE Internet of Things Journa

    Privacy Attacks and Defenses for Digital Twin Migrations in Vehicular Metaverses

    Full text link
    The gradual fusion of intelligent transportation systems with metaverse technologies is giving rise to vehicular metaverses, which blend virtual spaces with physical space. As indispensable components for vehicular metaverses, Vehicular Twins (VTs) are digital replicas of Vehicular Metaverse Users (VMUs) and facilitate customized metaverse services to VMUs. VTs are established and maintained in RoadSide Units (RSUs) with sufficient computing and storage resources. Due to the limited communication coverage of RSUs and the high mobility of VMUs, VTs need to be migrated among RSUs to ensure real-time and seamless services for VMUs. However, during VT migrations, physical-virtual synchronization and massive communications among VTs may cause identity and location privacy disclosures of VMUs and VTs. In this article, we study privacy issues and the corresponding defenses for VT migrations in vehicular metaverses. We first present four kinds of specific privacy attacks during VT migrations. Then, we propose a VMU-VT dual pseudonym scheme and a synchronous pseudonym change framework to defend against these attacks. Additionally, we evaluate average privacy entropy for pseudonym changes and optimize the number of pseudonym distribution based on inventory theory. Numerical results show that the average utility of VMUs under our proposed schemes is 33.8% higher than that under the equal distribution scheme, demonstrating the superiority of our schemes.Comment: 8 pages, 6 figure

    DADFNet: Dual Attention and Dual Frequency-Guided Dehazing Network for Video-Empowered Intelligent Transportation

    Full text link
    Visual surveillance technology is an indispensable functional component of advanced traffic management systems. It has been applied to perform traffic supervision tasks, such as object detection, tracking and recognition. However, adverse weather conditions, e.g., fog, haze and mist, pose severe challenges for video-based transportation surveillance. To eliminate the influences of adverse weather conditions, we propose a dual attention and dual frequency-guided dehazing network (termed DADFNet) for real-time visibility enhancement. It consists of a dual attention module (DAM) and a high-low frequency-guided sub-net (HLFN) to jointly consider the attention and frequency mapping to guide haze-free scene reconstruction. Extensive experiments on both synthetic and real-world images demonstrate the superiority of DADFNet over state-of-the-art methods in terms of visibility enhancement and improvement in detection accuracy. Furthermore, DADFNet only takes 6.36.3 ms to process a 1,920 * 1,080 image on the 2080 Ti GPU, making it highly efficient for deployment in intelligent transportation systems.Comment: This paper is accepted by AAAI 2022 Workshop: AI for Transportatio

    Privacy-preserving Anomaly Detection in Cloud Manufacturing via Federated Transformer

    Full text link
    With the rapid development of cloud manufacturing, industrial production with edge computing as the core architecture has been greatly developed. However, edge devices often suffer from abnormalities and failures in industrial production. Therefore, detecting these abnormal situations timely and accurately is crucial for cloud manufacturing. As such, a straightforward solution is that the edge device uploads the data to the cloud for anomaly detection. However, Industry 4.0 puts forward higher requirements for data privacy and security so that it is unrealistic to upload data from edge devices directly to the cloud. Considering the above-mentioned severe challenges, this paper customizes a weakly-supervised edge computing anomaly detection framework, i.e., Federated Learning-based Transformer framework (\textit{FedAnomaly}), to deal with the anomaly detection problem in cloud manufacturing. Specifically, we introduce federated learning (FL) framework that allows edge devices to train an anomaly detection model in collaboration with the cloud without compromising privacy. To boost the privacy performance of the framework, we add differential privacy noise to the uploaded features. To further improve the ability of edge devices to extract abnormal features, we use the Transformer to extract the feature representation of abnormal data. In this context, we design a novel collaborative learning protocol to promote efficient collaboration between FL and Transformer. Furthermore, extensive case studies on four benchmark data sets verify the effectiveness of the proposed framework. To the best of our knowledge, this is the first time integrating FL and Transformer to deal with anomaly detection problems in cloud manufacturing

    3D Beamforming Based on Deep Learning for Secure Communication in 5G and beyond Wireless Networks

    Get PDF
    Three-dimensional (3D) beamforming is a potential technique to enhance communication security of new generation networks such as 5G and beyond. However, it is difficult to achieve optimal beamforming due to the challenges of nonconvex optimization problem and imperfect channel state information (CSI). To tackle this problem, this paper proposes a novel deep learning-based 3D beamforming scheme, where a deep neural network (DNN) is trained to optimize the beamforming design for wireless signals in order to guard against eavesdropper under the imperfect CSI. With our approach, the system is capable of training the DNN model offline, and the trained model can then be adopted to instantaneously select the 3D secure beamforming matrix for achieving the maximum secrecy rate of the system, which is measured by the signal received by eavesdroppers outside the path of the beam. Simulation results demonstrate that the proposed solution outperforms the classical deep learning algorithm and 2D beamforming solution in terms of the secrecy rate and robust performance.This research is supported by the National Research Foundation, Singapore under its Strategic Capability Research Centres Funding Initiative, Nanyang Technological University (NTU) Startup Grant, and SUTD SRG-ISTD-2021-165

    Towards sustainable socially-aware mobile crowdsensing : leveraging hierarchical game for incentive mechanisms

    No full text
    Traditional mobile crowdsensing has shown a great potential to address large-scale data sensing problems by allocating sensing tasks to pervasive mobile users with smart devices. As crowdsensing service provider involves data collection from mobile users, the issue of providing rewards to incentivize mobile users is fundamentally important to ensure the sustainability of crowdsensing system. Recently, socially-aware crowdsensing services have been introduced as the integration of social networks and crowdsensing platforms. For example, in health-related crowdsensing applications, a mobile user benefits from information regarding food, exercise, medicine and medical treatment collected and shared by her socially-connected friends and family members. In this thesis, incentive mechanism design is revisited in the context of socially-aware crowdsensing, where the game theory tool is used to study the interactions between crowdsensing service provider and mobile users. In the first part of the thesis, incentive mechanism is designed by considering the underlying social network effects amid mobile social networks, for motivating the participants. Namely, one MU will obtain additional benefits from information contributed or shared by local neighbors in social networks. The process of rewarding and participating is modeled as a two-stage game, and backward induction is used to analyze the mobile users' participation level and the crowdsensing service provider's optimal reward mechanism. The analytical expressions are derived for the discriminatory incentive as well as the uniform incentive mechanisms. In the second part of the thesis, information asymmetry challenges are investigated. A Bayesian Stackelberg game with incomplete information is formulated to analyze the interaction between the crowdsensing service provider and mobile users, where the social structure information, i.e., the social network effects, among mobile users is uncertain. The existence and uniqueness of the Bayesian Stackelberg equilibrium is analytically validated by identifying the best response strategies of the mobile users. To be more general and practical, different with the former two parts, incentive mechanism in presence of multiple crowdsensing service providers is studied in the third part of the thesis. Understanding the behaviors of mobile users and service providers in socially-aware crowdsensing is of paramount importance for incentive mechanisms. With this focus, a multi-leader and multi-follower Stackelberg game approach is proposed to model the strategic interactions among service providers and mobile users, where the social influence of mobile users and the strategic interconnections of service providers are jointly and formally integrated into the game modeling. Through backward induction methods, the existence and uniqueness of the Stackelberg equilibrium are theoretically proved. In summary, this thesis addresses a few urgent challenging problems with the tools of game theory in the real implementation of incentive mechanism design in the context of socially-aware crowdsensing. Extensive numerical simulations are also conducted to illustrate some important properties of the equilibrium. Finally, several promising research directions are outlined for the future work.Doctor of Philosoph
    corecore