簡易檢索 / 詳目顯示

研究生: 陳康晏
Chen, Kang-Yan
論文名稱: 針對準確偵測應用的社群物聯網和行動用戶間之合作式感知
Collaboration Between Social Internet of Things and Mobile Users for Accuracy-Aware Detection
指導教授: 陳文村
Chen, Wen-Tsuen
許健平
Sheu, Jang-Ping
口試委員: 王志宇
Wang, Chin-Yu
楊得年
Yang, De-Nian
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 通訊工程研究所
Communications Engineering
論文出版年: 2021
畢業學年度: 109
語文別: 英文
論文頁數: 33
中文關鍵詞: 社群物聯網行動眾包準確性
外文關鍵詞: Social Internet of Things, Mobile Crowdsourcing, Accuracy
相關次數: 點閱:4下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 社交物聯網(SIoT)已成為新興的網絡範例,具有人工智慧(AI)和社群關係的物聯網設備可以自動建立合作式群組以在本地端偵測事件。另一方面,移動用戶可以充當無處不在的通用感測器,以提高物聯網事件偵測的準確性。在本篇論文中,我們探討了SIoT與眾包 (Crowdsourcing) 的合作式問題,以共同選擇社群物聯網裝置並僱用用戶來監視具有準確性要求的事件和位置,同時最大程度地減少射群物聯網的通信和計算的總成本以及用戶的僱用成本。我們證明SCC是NP-hard,除非P = NP,否則不能用任何因子近似。接著,我們提出了一個新的演算法,具有準確性和社群意識的物聯網裝置和用戶選擇(ASSUS),使用了合作式樹(CT)和準確性利潤(AP)的想法,其中CT利用用戶的社群關係來正確選擇中間的物聯網裝置。模擬結果表明,與最新的演算法相比,ASSUS可以有效地減少總成本的50%以上。


    Social Internet of Things (SIoT) has become an emerging network paradigm, where IoT devices with Artificial Intelligence (AI) and social relations can automatically establish a collaborative group to identify events locally. On the other hand, mobile users can act as ubiquitous and versatile sensors to improve the accuracy of SIoT event detection. In this thesis, we explore the SIoT Collaboration with Crowdsourcing (SCC) problem to jointly select SIoT devices and hire users to monitor events and locations with accuracy requirements, while minimizing the total SIoT communication and computation costs and the user hiring cost. We prove that SCC is NP-hard and cannot be approximated by any factor unless P = NP. Then, we propose a new algorithm, Accuracy- and Social-aware SIoT and User Selection (ASSUS), with the idea of Collaborative Tree (CT) and Accuracy Profit (AP), where CT exploits users' social relations to properly choose intermediate SIoTs. Simulation results manifest that ASSUS can effectively reduce more than $50\%$ of the total cost compared with state-of-the-art algorithms.

    1 Introduction - 1 2 Related Work - 4 2.1 Social Internet of Things - 4 2.2 Online Social Networks - 5 2.3 Mobile Crowdsourcing - 6 3 SIoT Collaboration with Crowdsourcing - 7 3.1 System Model - 7 3.2 Problem Formulation - 9 3.3 The Hardness - 10 4 Accuracy- and Social-aware SIoT and User Selection - 13 4.1 Algorithm Concept - 13 4.2 Algorithm Design - 14 4.2.1 Collaborative SIoT and User Selection (CSUS) - 14 4.2.2 SIoT Replacement(SR) - 16 4.2.3 CT Pruning and User Swapping(CTPUS) - 19 4.3 Time Complexity - 23 5 Simulation - 24 5.1 Simulation Setup - 24 5.2 Simulation Result - 25 6 Conclusion - 29

    [1] M. Lippi, M. Mamei, S. Mariani, and F. Zambonelli, “An argumentation-based perspective
    over the social iot,” IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2537–
    2547, Aug. 2018.
    [2] C. Wang, J. Kuo, D. Yang, and W. Chen, “Collaborative social internet of things in
    mobile edge networks,” IEEE Internet of Things Journal, pp. 1–1, 2020.
    [3] B. Wang, Y. Sun, T. Q. Duong, L. D. Nguyen, and L. Hanzo, “Risk-aware identification
    of highly suspected covid-19 cases in social iot: A joint graph theory and
    reinforcement learning approach,” IEEE Access, vol. 8, pp. 115 655–115 661, 2020.
    [4] B. Benreguia, H. Moumen, and M. A. Merzoug, “Tracking covid-19 by tracking
    infectious trajectories,” IEEE Access, vol. 8, pp. 145 242–145 255, 2020.
    [5] S. Zhao, Y. Gao, G. Ding, and T. Chua, “Real-time multimedia social event detection
    in microblog,” IEEE Transactions on Cybernetics, vol. 48, no. 11, pp. 3218–3231,
    Nov. 2018.
    [6] L. Shi, L. Liu, Y. Wu, L. Jiang, M. Kazim, H. Ali, and J. Panneerselvam, “Humancentric
    cyber social computing model for hot-event detection and propagation,” IEEE
    Transactions on Computational Social Systems, vol. 6, no. 5, pp. 1042–1050, Oct.
    2019.
    [7] W. Gong, B. Zhang, and C. Li, “Location-based online task assignment and path
    planning for mobile crowdsensing,” IEEE Transactions on Vehicular Technology,
    vol. 68, no. 2, pp. 1772–1783, Feb. 2019.
    [8] D. Zhao, X. Li, and H. Ma, “How to crowdsource tasks truthfully without sacrificing
    utility: Online incentive mechanisms with budget constraint,” in IEEE INFOCOM
    2014 - IEEE Conference on Computer Communications, 2014, pp. 1213–1221.
    [9] D. Zhang, D. Wang, N. Vance, Y. Zhang, and S. Mike, “On scalable and robust truth
    discovery in big data social media sensing applications,” IEEE Transactions on Big
    Data, vol. 5, no. 2, pp. 195–208, Jun. 2019.
    [10] J. Du, E. Gelenbe, C. Jiang, H. Zhang, Y. Ren, and H. V. Poor, “Peer prediction-based
    trustworthiness evaluation and trustworthy service rating in social networks,” IEEE
    Transactions on Information Forensics and Security, vol. 14, no. 6, pp. 1582–1594,
    2019.
    [11] K. Cepni, M. Ozger, and O. B. Akan, “Event estimation accuracy of social sensing
    with facebook for social internet of vehicles,” IEEE Internet of Things Journal, vol. 5,
    no. 4, pp. 2449–2456, Aug. 2018.
    [12] R. Girau, M. Anedda, M. Fadda, M. Farina, A. Floris, M. Sole, and D. Giusto,
    “Coastal monitoring system based on social internet of things platform,” IEEE Internet
    of Things Journal, vol. 7, no. 2, pp. 1260–1272, 2020.
    [13] I. Chen, F. Bao, and J. Guo, “Trust-based service management for social internet of
    things systems,” IEEE Transactions on Dependable and Secure Computing, vol. 13,
    no. 6, pp. 684–696, Nov. 2016.
    [14] W. Wang, Z. He, P. Shi, W. Wu, Y. Jiang, B. An, Z. Hao, and B. Chen, “Strategic
    social team crowdsourcing: Forming a team of truthful workers for crowdsourcing in
    social networks,” IEEE Transactions on Mobile Computing, vol. 18, no. 6, pp. 1419–
    1432, Jun. 2019.
    [15] I. Chen, F. Bao, and J. Guo, “Trust-based service management for social internet of
    things systems,” IEEE Transactions on Dependable and Secure Computing, vol. 13,
    no. 6, pp. 684–696, Nov. 2016.
    [16] C. Huang, C. Shao, S. Xu, and H. Zhou, “The social internet of thing (s-iot)-based
    mobile group handoff architecture and schemes for proximity service,” IEEE Transactions
    on Emerging Topics in Computing, vol. 5, no. 3, pp. 425–437, Jul. 2017.
    [17] Y. Chen, M. Zhou, Z. Zheng, and D. Chen, “Time-aware smart object recommendation
    in social internet of things,” IEEE Internet of Things Journal, vol. 7, no. 3,
    pp. 2014–2027, 2020.
    [18] L.Wang, H.Wu, Z. Han, P. Zhang, and H. V. Poor, “Multi-hop cooperative caching in
    social iot using matching theory,” IEEE Transactions on Wireless Communications,
    vol. 17, no. 4, pp. 2127–2145, 2018.
    [19] S. Bouyakoub, A. Belkhir, F. M. Bouyakoub, and W. Guebli, “Smart airport: An iotbased
    airport management system,” in Proceedings of the International Conference
    on Future Networks and Distributed Systems, ser. ICFNDS ’17, Cambridge, United
    Kingdom: Association for Computing Machinery, 2017.
    [20] G. Ruggeri and O. Briante, “A framework for iot and e-health systems integration
    based on the social internet of things paradigm,” in 2017 International Symposium
    on Wireless Communication Systems (ISWCS), Aug. 2017, pp. 426–431.
    [21] B. Wang, Y. Sun, Z. Sun, L. D. Nguyen, and T. Q. Duong, “Uav-assisted emergency
    communications in social iot: A dynamic hypergraph coloring approach,” IEEE Internet
    of Things Journal, vol. 7, no. 8, pp. 7663–7677, 2020.
    [22] M. Alrubaian, M. Al-Qurishi, M. M. Hassan, and A. Alamri, “A credibility analysis
    system for assessing information on twitter,” IEEE Transactions on Dependable and
    Secure Computing, vol. 15, no. 4, pp. 661–674, Jul. 2018.
    [23] J. Jiang, B. An, Y. Jiang, and D. Lin, “Context-aware reliable crowdsourcing in social
    networks,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 50,
    no. 2, pp. 617–632, 2020.
    [24] D. Y. Zhang, C. Zheng, D. Wang, D. Thain, X. Mu, G. Madey, and C. Huang, “Towards
    scalable and dynamic social sensing using a distributed computing framework,”
    in 2017 IEEE 37th International Conference on Distributed Computing Systems
    (ICDCS), Jun. 2017, pp. 966–976.
    [25] C. Huang, D. Wang, and N. Chawla, “Scalable uncertainty-aware truth discovery in
    big data social sensing applications for cyber-physical systems,” IEEE Transactions
    on Big Data, pp. 1–1, 2017.
    [26] Y.Wang, Z. Cai, Z. Zhan, Y. Gong, and X. Tong, “An optimization and auction-based
    incentive mechanism to maximize social welfare for mobile crowdsourcing,” IEEE
    Transactions on Computational Social Systems, vol. 6, no. 3, pp. 414–429, 2019.
    [27] Y. Zhang, C. Jiang, L. Song, M. Pan, Z. Dawy, and Z. Han, “Incentive mechanism
    for mobile crowdsourcing using an optimized tournament model,” IEEE Journal on
    Selected Areas in Communications, vol. 35, no. 4, pp. 880–892, 2017.
    [28] X. Gan, Y. Li, W. Wang, L. Fu, and X. Wang, “Social crowdsourcing to friends: An
    incentive mechanism for multi-resource sharing,” IEEE Journal on Selected Areas in
    Communications, vol. 35, no. 3, pp. 795–808, 2017.
    [29] C. Xu, Y. Si, L. Zhu, C. Zhang, K. Sharif, and C. Zhang, “Pay as how you behave:
    A truthful incentive mechanism for mobile crowdsensing,” IEEE Internet of Things
    Journal, vol. 6, no. 6, pp. 10 053–10 063, 2019.
    [30] Y. Li, C. A. Courcoubetis, and L. Duan, “Dynamic routing for social information
    sharing,” IEEE Journal on Selected Areas in Communications, vol. 35, no. 3, pp. 571–
    585, Mar. 2017.
    [31] S. Yang, F. Wu, S. Tang, X. Gao, B. Yang, and G. Chen, “On designing data qualityaware
    truth estimation and surplus sharing method for mobile crowdsensing,” IEEE
    Journal on Selected Areas in Communications, vol. 35, no. 4, pp. 832–847, Apr.
    2017.
    [32] J. Tang, X. Tang, and J. Yuan, “Profit maximization for viral marketing in online
    social networks: Algorithms and analysis,” IEEE Transactions on Knowledge and
    Data Engineering, vol. 30, no. 6, pp. 1095–1108, Jun. 2018.
    [33] Z. Lin and L. Dong, “Clarifying trust in social internet of things,” IEEE Transactions
    on Knowledge and Data Engineering, vol. 30, no. 2, pp. 234–248, Feb. 2018.
    [34] M. Janidarmian, A. Roshan Fekr, K. Radecka, and Z. Zilic, “Multi-objective hierarchical
    classification using wearable sensors in a health application,” IEEE Sensors
    Journal, vol. 17, no. 5, pp. 1421–1433, Mar. 2017.
    [35] C. H. Yang, C. H.Wang, D. N. Yang, andW. T. Chen, “Accuracy and precision-aware
    iot device selection in mobile edge networks,” in 2018 IEEE Wireless Communications
    and Networking Conference (WCNC), 2018.
    [36] J. Hartmanis, “Computers and intractability: A guide to the theory of np-completeness
    (michael r. garey and david s. johnson),” Siam Review, vol. 24, no. 1, p. 90, 1982.
    [37] X. Tao and W. Song, “Location-dependent task allocation for mobile crowdsensing
    with clustering effect,” IEEE Internet of Things Journal, vol. 6, no. 1, pp. 1029–1045,
    2019.
    [38] A. Rachedi and H. Badis, “Badzak: An hybrid architecture based on virtual backbone
    and software defined network for internet of vehicles,” in 2018 IEEE International
    Conference on Communications (ICC), 2018, pp. 1–7.
    [39] Y. Wang and M. S. Kankanhalli, “Tweeting cameras for event detection,” in Proceedings
    of the 24th International Conference on World Wide Web, Florence, Italy:
    International World Wide Web Conferences Steering Committee, 2015, pp. 1231–
    1241.
    [40] H. Lin and W. Chen, “An approximation algorithm for the maximum-lifetime data
    aggregation tree problem in wireless sensor networks,” IEEE Transactions on Wireless
    Communications, vol. 16, no. 6, pp. 3787–3798, 2017.
    [41] Z. Liu et al., “A 1.8mw perception chip with near-sensor processing scheme for lowpower
    aiot applications,” in Proc. IEEE ISVLSI., 2019.
    [42] W. Ren, J. Wu, X. Zhang, R. Lai, and L. Chen, “A stochastic model of cascading
    failure dynamics in communication networks,” IEEE Transactions on Circuits and
    Systems II: Express Briefs, vol. 65, no. 5, pp. 632–636, 2018.

    QR CODE