skip to main content
research-article

Nondeterministic Evaluation Mechanism for User Recruitment in Mobile Crowd-Sensing

Authors Info & Claims
Published:05 April 2023Publication History
Skip Abstract Section

Abstract

Based on the Internet of Behavior (IoB), mobile crowd-sensing (MCS) utilizes the Internet of Things (IoT) to recruit users by analyzing behavioral patterns. MCS is widely used in numerous large-scale and complex monitoring services, but it cannot provide stable and high-quality services due to nondeterministic user mobility and behaviors, which has a vital impact on recruiting high-quality users. In this article, a stochastic semi-algebraic hybrid system (SSAHS) model is constructed to characterize the user mobility and behaviors of the MCS systems. Based on the definition of probabilistic path and task execution rate, a nondeterministic evaluation mechanism is proposed to measure nondeterministic user mobility and behaviors and to give the probability of the user completing the MCS task under the specified time bound and space conditions. The greater the probability is, the higher the quality of the user. Furthermore, a user recruitment scheme based on a nondeterministic evaluation mechanism (NUR) is developed. The NUR employs historical user data to predict user mobility and behaviors; high-quality users are recruited to quickly upload reliable sensing data. We conduct simulation experiments based on a real-world user trace dataset, Geolife.The results show that compared with competing recruitment strategies, NUR achieves a higher quality of service for the same MCS sensing tasks.

REFERENCES

  1. [1] T. Guelzim, M. S. Obaidat, and B. Sadoun. 2016. Chapter 1 - Introduction and overview of key enabling technologies for smart cities and homes. In Smart Cities and Homes, Obaidat Mohammad S. and Nicopolitidis Petros (Eds.). Morgan Kaufmann, Boston, 116.Google ScholarGoogle ScholarCross RefCross Ref
  2. [2] Xiang Chaocan, Yang Panlong, Fan Xiaochen, and Gong. Liangyi2017. Quantifying sensing quality of crowd sensing networks with confidence interval. In IEEE SmartWorld, Ubiquitous Intelligence Computing, Advanced Trusted Computed, Scalable Computing Communications, Cloud Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI’17). IEEE, San Francisco, CA, 16. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  3. [3] Tropea Mauro and Serianni. Abdon2020. Bio-inspired drones recruiting strategy for precision agriculture domain. In IEEE/ACM 24th International Symposium on Distributed Simulation and Real Time Applications (DS-RT’20). IEEE, Ales, 14. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  4. [4] Ding Shuang, He Xin, Wang Jicheng, Dai Wenyun, and Wang. Xilong2015. Static node center hexagonal deployment in hybrid crowd sensing. In IEEE 17th International Conference on High Performance Computing and Communications, IEEE 7th International Symposium on Cyberspace Safety and Security, and IEEE 12th International Conference on Embedded Software and Systems. IEEE, New York, NY, 515520. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. [5] Kalui Dorothy Mwongeli, Zhang Dezheng, Muketha Geoffrey Muchiri, and Onsomu. Jared Okoyo2020. Simulation of trust-based mechanism for enhancing user confidence in mobile crowdsensing systems. IEEE Access 8 (2020), 2087020883. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] Zhao Cong, Yang Shusen, Yan Ping, Yang Qing, Yang Xinyu, and McCann. Julie2018. Data quality guarantee for credible caching device selection in mobile crowdsensing systems. IEEE Wireless Communications 25, 3 (2018), 5864. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  7. [7] Zhao. Xiaoyan2011. Non-termination analysis of polynomial programs by solving semi-algebraic systems. Advances in Multimedia, Software Engineering and Computing. 1 (2011), 205211.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Li Jun, Li Yi, and Feng. Yong2009. Termination of a class of nonlinear loop programs. Journal of Sichuan University (Engineering Science Edition) 14, 1 (2009), 129133.Google ScholarGoogle Scholar
  9. [9] Chen Yinghua, Xia Bican, Yang Lu, Zhan Naijun, and Zhou. Chaochen2007. Discovering non-linear ranking functions by solving semi-algebraic systems. In Proceedings of Theoretical Aspects of Computing (ICTAC’07), 4th International Colloquium, Macau, China, September 26-28, 2007. Springer, Macau, 3449. DOI: DOI: http://dx.doi.org/DOI:10.1007/978-3-540-75292-9_3Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Wu Fan, Yang Shuo, Zheng Zhenzhe, Tang Shaojie, and Chen. Guihai2021. Fine-grained user profiling for personalized task matching in mobile crowdsensing. IEEE Transactions on Mobile Computing 20, 10 (2021), 29612976. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11] Song Shiwei, Liu Zhidan, Li Zhenjiang, Xing Tianzhang, and Fang. Dingyi2020. Coverage-oriented task assignment for mobile crowdsensing. IEEE Internet of Things Journal 7, 8 (2020), 74077418. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Gao Yali, Li Xiaoyong, Li Jirui, and Gao. Yunquan2017. DTRF: A dynamic-trust-based recruitment framework for mobile crowd sensing system. In IFIP/IEEE Symposium on Integrated Network and Service Management (IM). IEEE, Lisbon, 632635. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. [13] Yucel Fatih, Yuksel Murat, and Bulut. Eyuphan2021. QoS-based budget constrained stable task assignment in mobile crowdsensing. IEEE Transactions on Mobile Computing 20, 11 (2021), 31943210. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] Yin Xiaoyan, Chen Yanjiao, Xu Cheng, Yu Sijia, and Li. Baochun2021. Matchmaker: Stable task assignment with bounded constraints for crowdsourcing platforms. IEEE Internet of Things Journal 8, 3 (2021), 15991610. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  15. [15] Wang Xiumin, Wu Weiwei, and Qi. Deyu2018. Mobility-aware participant recruitment for vehicle-based mobile crowdsensing. IEEE Transactions on Vehicular Technology 67, 5 (2018), 44154426. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Ding Shuang, He Xin, and Wang. Jicheng2017. Multiobjective optimization model for service node selection based on a tradeoff between quality of service and resource consumption in mobile crowd sensing. IEEE Internet of Things Journal 4, 1 (2017), 258268. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  17. [17] Zhang Wei, Li Zhuo, and Chen Xin. 2021. Quality-aware user recruitment based on federated learning in mobile crowd sensing. Tsinghua Science and Technology 26, 6 (2021), 869877. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  18. [18] Li Hanshang, Li Ting, and Wang. Yu2015. Dynamic participant recruitment of mobile crowd sensing for heterogeneous sensing tasks. In IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems (MASS’15). Institute of Electrical and Electronics Engineers Inc., Dallas, 136144. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. [19] Wang En, Yang Yongjian, Wu Jie, Liu Wenbin, and Wang. Xingbo2018. An efficient prediction-based user recruitment for mobile crowdsensing. IEEE Transactions on Mobile Computing 17, 1 (2018), 1628. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Truong Nguyen Binh, Lee Gyu Myoung, Um Tai-Won, and Mackay. Michael2019. Trust evaluation mechanism for user recruitment in mobile crowd-sensing in the Internet of Things. IEEE Transactions on Information Forensics and Security 14, 10 (2019), 27052719. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] Clark Allan, Gilmore Stephen, Guerriero Maria Luisa, and Hillston. Jane2013. Conservation of mass analysis for bio-PEPA. Electronic Notes in Theoretical Computer Science 296, B (2013), 107126.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22] Liu Jing, Zhang Yan, Han Jiazhen, He Jifeng, Sun Junfeng, and Zhou. Tingliang2020. Intelligent hazard-risk prediction model for train control systems. IEEE Transactions on Intelligent Transportation Systems 21, 11 (2020), 46934704. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Gaur Manish and Kant Rama. 2014. A survey on process algebraic stochastic modelling of large distributed systems for its performance analysis. In 3rd International Conference on Eco-friendly Computing and Communication Systems. IEEE, Mangalore, 206211. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  24. [24] Andrade Ermeson, Maciel Paulo, Callou Gustavo, Nogueira Bruno, and Araújo. Carlos2009. Mapping UML sequence diagram to time Petri net for requirement validation of embedded real-time systems with energy constraints. In ACM Symposium on Applied Computing. 377381.Google ScholarGoogle Scholar
  25. [25] Schaft Arjan van der and Schumacher. J. M.2015. Complementarity modeling of hybrid systems. IEEE TTransactions on Automatic Control 43, 4 (2015), 483490.Google ScholarGoogle ScholarCross RefCross Ref
  26. [26] Baier Christel, Haverkort Boudewijn, Hermanns Holger, and Katoen J.-P.. 2003. Model-checking algorithms for continuous-time Markov chains. IEEE Transactions on Software Engineering 29, 6 (2003), 524541.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Xie Ying, Wu Jinzhao, Chen Jianying, and Cui. Mengtian2019. Dynamic measurement of task scheduling algorithm in multi-processor system. Journal of Shanghai Jiaotong University (Science) 24, 3 (2019), 372380.Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] Xie Ying and Wu. Jinzhao2019. Multi-objective constraint task scheduling algorithm for multi-core processors. Cluster Computing 22, 3 (2019), 953964.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. [29] Ji Wei, Wang Farn, Wu Peng, and Lv. Yi2016. An experiment on decision diagrams for model checking probabilistic timed automata. In 21st International Conference on Engineering of Complex Computer Systems (ICECCS’16). IEEE, Dubai, 111121. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  30. [30] Peng Zhaoguang, Lu Yu, and Miller. Alice2016. Uncertainty analysis of phased mission systems with probabilistic timed automata. In IEEE International Conference on Prognostics and Health Management (ICPHM’16). IEEE, Ottawa, ON, 18. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  31. [31] Li Jun, Lefebvre Dimitri, Hadjicostis Christoforos N., and Li. Zhiwu2021. Observers for a class of timed automata based on elapsed time graphs. IEEE Transactions on Automatic Control (2021), 11. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  32. [32] Kim Jong-Hwan and Moon. Sangwoo2020. Recursive Bayesian estimation based indoor fire location by fusing rotary UV sensors. In 2020 IEEE/ASME International Conference on Advanced Intelligent Mechatronics (AIM). IEEE, Boston, MA, 528533. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. [33] Ramos Rychelly Glenneson da S., L. Paulo Ribeiro, and Cardoso. José Vinícius de M.2016. Anomalies detection in wireless sensor networks using Bayesian changepoints. In IEEE 13th International Conference on Mobile Ad Hoc and Sensor Systems (MASS’16). IEEE, Brasilia, 384385. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  34. [34] Umebayashi Kenta, Kobayashi Masanao, and Lopez-Benitez. Miguel2018. Efficient time domain deterministic-stochastic model of spectrum usage. IEEE Transactions on Wireless Communications 17, 3 (2018), 15181527. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  35. [35] Zheng Yu, Wang Longhao, Zhang Ruochi, Xie Xing, and Ma. Wei-Ying2008. GeoLife: Managing and understanding your past life over maps. In 9th International Conference on Mobile Data Management (MDM’08). IEEE, Beijing, 211212. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. [36] Das Snigdha, Roy Dibya Jyoti, Nandi Subrata, Chakraborty Sandip, and Mitra. Bivas2017. UDAT: User discrimination using activity-time information. In 2017 IEEE International Conference on Mobile Data Management (MDM’17). IEEE, Daejeon, 352355. DOI:Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Nondeterministic Evaluation Mechanism for User Recruitment in Mobile Crowd-Sensing

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Transactions on Sensor Networks
            ACM Transactions on Sensor Networks  Volume 19, Issue 2
            May 2023
            599 pages
            ISSN:1550-4859
            EISSN:1550-4867
            DOI:10.1145/3575873
            Issue’s Table of Contents

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 5 April 2023
            • Online AM: 11 July 2022
            • Accepted: 30 June 2022
            • Revised: 21 June 2022
            • Received: 29 November 2021
            Published in tosn Volume 19, Issue 2

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
          • Article Metrics

            • Downloads (Last 12 months)166
            • Downloads (Last 6 weeks)39

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Full Text

          View this article in Full Text.

          View Full Text

          HTML Format

          View this article in HTML Format .

          View HTML Format