Literature DB >> 35336564

Local Trust in Internet of Things Based on Contract Theory.

Georgios Fragkos1, Cyrus Minwalla2, Jim Plusquellic1, Eirini Eleni Tsiropoulou1.   

Abstract

Autonomous trust mechanisms enable Internet of Things (IoT) devices to function cooperatively in a wide range of ecosystems, from vehicle-to-vehicle communications to mesh sensor networks. A common property desired in such networks is a mechanism to construct a secure, authenticated channel between any two participating nodes to share sensitive information, nominally a challenging proposition for a large, heterogeneous network where node participation is constantly in flux. This work explores a contract-theoretic framework that exploits the principles of network economics to crowd-source trust between two arbitrary nodes based on the efforts of their neighbors. Each node in the network possesses a trust score, which is updated based on useful effort contributed to the authentication step. The scheme functions autonomously on locally adjacent nodes and is proven to converge onto an optimal solution based on the available nodes and their trust scores. Core building blocks include the use of Stochastic Learning Automata to select the participating nodes based on network and social metrics, and the formulation of a Bayesian trust belief distribution from the past behavior of the selected nodes. An effort-reward model incentivizes selected nodes to accurately report their trust scores and contribute their effort to the authentication process. Detailed numerical results obtained via simulation highlight the proposed framework's efficacy and performance. The performance achieved near-optimal results despite incomplete information regarding the IoT nodes' trust scores and the presence of malicious or misbehaving nodes. Comparison metrics demonstrate that the proposed approach maximized the overall social welfare and achieved better performance compared to the state of the art in the domain.

Entities:  

Keywords:  Bayesian model; Internet of Things; PeerTrust; contract theory; crowdsourcing; reinforcement learning

Mesh:

Year:  2022        PMID: 35336564      PMCID: PMC8949856          DOI: 10.3390/s22062393

Source DB:  PubMed          Journal:  Sensors (Basel)        ISSN: 1424-8220            Impact factor:   3.576


1. Introduction

The convergence of ubiquitous networking, cloud computing, and embedded intelligence has led to the rise of edge computing and the Internet of Things (IoT). Applications for IoT range from home to industrial automation, from local sensor network to vehicle-to-vehicle (V2V) communications. New challenges emerge as these networks evolve from local, constrained environments to large, heterogeneous ecosystems, where the cardinality and capability of individual nodes is always in flux. Maximum utility is derived if such ecosystems become capable of sharing sensitive information, such as healthcare or payments data. To achieve this, the nodes must be able to participate in a trust framework that enables secure communication channels. While centralized approaches, such as standards and certificates, solve the problem, they require an established infrastructure to function effectively. A centralized authority is needed to issue and disseminate certificates, prior registration of all participating devices is required, and all nodes must agree on a common communications protocol. Such an approach is unsuited for large, heterogeneous networks where nodes vary greatly in compute power, communications protocols and standards compliance, as certain nodes may not be registered or may be incapable of participating due to missing hardware or insufficient compute power. Decentralized approaches are far more effective in this regard, the most promising of which is the crowd-sourced trust model, where trust between two IoT devices is derived from transient neighbouring nodes available at that point in time, despite their hardware configuration, compute power and protocol support. Each device needs only to store a trust score, a normalized floating point value. The score can be bootstrapped to a default value for new devices. No special hardware or compute function is required to maintain or update the score, as integrity in the score is established through the crowd-sourcing mechanism. Robustness of the method is enhanced if differences in configuration and capability contribute to the derivation of the final trust score. Presented in this work is a contract-theoretic mechanism based on incentives for building trust between two devices (termed Alice and Bob) operating in a large, heterogeneous network of IoT nodes. The proposed approach introduces a novel trust model and trust-based management features at the protocol level. The model derives trust in an ad-hoc fashion by crowd-sourcing locally adjacent nodes while maintaining robustness against malicious behavior. There is no reliance on cryptographic primitives or connection to a central authority. The approach is distinct from traditional blockchain solutions in that the final outcome (consensus) is local to Alice and Bob and not a common state shared with all nodes in the system. Furthermore, by relying on simple metrics that all nodes possess, the model establishes independence from the underlying hardware and communications architecture, and is therefore compatible with a wide variety of applications. Crucially, the approach is compatible across network boundaries and can bind cross-network devices in a common trust framework, a property not commonly seen in other approaches. Highlights of the scheme are as follows: Use of Stochastic Learning Automata (SLA), to select crowd-sourced nodes in an autonomous and distributed manner. In particular, the selection at every iteration of the utilized Reinforcement Learning (RL) algorithm is probabilistically reinforced with respect to the network characteristics, such as delay and congestion, and social characteristics, such as trust scores. Introduction of a Bayesian trust model to probabilistically estimate the nodes’ trust scores in the absence of complete information in a realistic Internet of Things environment. Formulation of a novel PeerTrust protocol coupled with Bayesian adverse selection to model Alice’s personalized belief of node trust levels despite the nodes’ potential false individual reports of trustworthiness. Introduction of a novel contract-theoretic scheme based on the theory of labor economics that operates under the scenario of information asymmetry, yet incentivizes nodes to contribute effort and receive rewards corresponding to actual trust levels. Ergo, the trust model operates with incomplete information, where the optimal pairing of effort and reward represents the contract. Formulation of payoff functions for Alice, Bob and all participating nodes, which are maximized under certain constraints that hold true within the IoT network. The non-convex optimization problem is transformed into a convex form, with the optimal efforts-reward pairs determined accordingly. An extensive numerical and comparative evaluation to demonstrate the operation and efficiency of the proposed framework.

Related Work

Decentralized trust models are an emerging topic of interest in IoT environments. In [1], the authors present a novel framework based on the evolutionary game theory and Lyapunov optimization to qualitatively study and prove the stability and validity of the proposed IoT trust management scheme. A similar approach is followed in [2], where blockchain technology along with the Evolutionary Combination game-theoretic rule [3] are adopted. Specifically, the authors formulate a robust decentralized trust management scheme is introduced that mitigates the impact of malicious nodes that send false trust scores. In [4,5], the authors adopt a blockchain data structure to enhance the IoT capabilities and a decentralized trust management framework is introduced to enable dynamic access control policies. A K-means-based approach is proposed in [6], which assesses the trustworthiness of the IoT nodes by sharing certain information among them. In [7,8], the authors propose a fuzzy security protocol for trust management and a Beta distribution-based trust technique for information-centric-networks aiming at detecting on-off attacks or malicious nodes. The CTRUST model is proposed in [9] to study the effects of trust decay and maturity in a decentralized collaborative download application. Moreover, the authors in [10] introduce a quantifiable trust assessment model for IoT services based on the K-means and Support Vector Machine (SVM) algorithms to efficiently extract trust features from raw data and perform trustworthiness-based decision-making. The role of Artificial Social Intelligence (ASI) in the management of the IoT-enabled social relationships is discussed in [11], where the authors maintain that trust management is vital among social IoT devices for social clustering and community detection. Two blockchain-based trust management schemes for IoT nodes are adduced in [12,13]. The first one stores each node’s trust scores in the blockchain via hashed transactions and shares them with other nodes within the network, while the latter one utilizes the decentralized architecture to evaluate the process’s trustworthiness and guarantee the satisfaction of IoT nodes’ energy constraints regarding trust computation. The integration of a dynamic trust management model based on a hybrid environment consisting of industrial communities is demonstrated in [14]. In [15], the cumulative trust concept models the trust management in IoT nodes by measuring the packet drop and data rates among them. An alternative trust scheme is introduced in [16], where a recommendation filtering algorithm is proposed based on the Bayesian inference model to mitigate bad recommendations. In [17], a context-based trust evaluation system is presented to mitigate service-oriented attacks based on the Naive Bayesian method. Literature is limited on efforts to model a trust management scheme that does not have perfect knowledge of the IoT environment’s characteristics, where nodes may act in a malicious manner by exploiting the incomplete information setting to lie about their own trust levels or collude with other nodes. The problem difficulty increases dramatically in an ‘offline’ setting, where an ad-hoc network has no connectivity to a remote back-end (source or sink). A representative application example is a Wireless Mesh Network (WMN) that reliably connects multiple heterogeneous IoT nodes to a centralized Bank for transactions processing and verification. The IoT nodes enable automated e-payments by adopting wearable e-payment methods, e.g., via smartwatches, rather than carrying traditional credit cards. However, a common real-world challenge is that the IoT nodes may not have Internet connectivity. As a consequence, the respective IoT nodes form an offline ad-hoc network that is responsible for transactions processing and verification by creating a secure channel between any pair of nodes (termed Alice and Bob) based on offline trust management. Towards achieving this goal, a scheme is required to incentivize IoT nodes in reporting their trust levels truthfully and contributing effort to build trust between Alice and Bob. The rest of the paper is organized as follows. Section 2 introduces the system model, the Bayesian belief scheme, and the PeerTrust model, while Section 3 elaborates on the contract-theoretic interactions among the IoT nodes. Section 4 presents the IoT nodes’ selection by Alice based on the SLA model. Finally, the numerical and comparative evaluation is presented in Section 5 and Section 6 concludes the paper.

2. System Model

An offline IoT environment is considered, consisting of IoT nodes that are willing to participate in the crowd-sourcing process to facilitate the secure interaction between Alice and Bob. Their corresponding set is denoted as . denotes the set of nodes selected by Alice at time slot t by utilizing Reinforcement Learning (Section 4) to provide to her identification information (effort) related to Bob. Alice’s distance from each node c is and the established communication link among them experiences a normalised congestion due to the exchange of information in a peer-to-peer manner. A summary of the used key notations is provided in Table 1.
Table 1

Summary of Key Notations.

NotationDescription
t time slot
C Set of IoT nodes
c IoT node
A Alice
CAt Set of IoT nodes selected by Alice
dct Alice’s distance from an IoT node c
crct Normalised congestion of the communication link between Alice and an IoT node c
eA,ct Effort that Alice collects from the IoT node c
eA,ct Optimal effort
rA,ct Personalized reward that Alice provides to an IoT node c
rA,ct Optimal reward
μA,ct Bayesian trust belief of Alice regarding an IoT node c
μ0 Initial belief distribution
ah Probability that an IoT node provides high contribution
al Probability that an IoT node provides low contribution
Sct Number of times that an IoT node c contributed in a satisfactory manner up to time slot t
Fct Number of times that an IoT node c contributed in a unsatisfactory manner up to time slot t
pct Score of an IoT node c
T(c) Trustworthiness of an IoT node c
I(A,c) Number of interactions that an IoT node c has with Alice
TFA,c Interaction context factor
α Normalized weighting factor
Uct(eA,ct) Payoff function of an IoT node c
q(rA,ct) Evaluation function of the received reward rA,ct
UAt(e) Alice’s payoff function o
λ Alice’s cost to provide rewards to the IoT nodes
ρct Alice’s probabilistic estimation of an IoT node’s c score
SW(e) Social Welfare
Ast Alice’s discrete action space
St Set of subsets of the |C| IoT nodes with cardinality |CAt|
ite RL iteration
FA,Ast(ite,t) Alice’s RL personalized feedback
F^A,Ast(ite,t) Alice’s RL normalized personalized feedback
PrA(ite,t) Alice’s action probability vector
b RL learning parameter

2.1. The Concept of Contract

To establish a secure channel with Bob, Alice needs to initiate a mobile crowdsourcing process, where each selected IoT node provides some effort in time slot t. In the trust model, this effort can be represented as the contribution of unique identification information about Bob provided by the selected nodes. However, in order for Alice to ensure the cooperation from the IoT nodes regarding Bob’s authentication, she utilizes an incentivization mechanism by providing each node an appropriate personalized reward , such as a monetary payment or an increment to their recorded absolute trust levels to compensate them for their effort. In our analysis, the effort invested by each selected IoT node c to facilitate Alice’s interaction with Bob and the corresponding received reward are considered as normalized variables on the interval . In a real-life scenario, those variables can be mapped to realistic metrics, e.g., the amount of unique identification information for Bob that each selected IoT node offers to Alice as its effort, and respective changes in the trust levels of the nodes made by Alice as a reward. Intuitively, a labor economics-based relationship is formulated between Alice and the selected IoT nodes, where the more identification data an IoT node provides to Alice, the more its trust level will be increased as a reward for its effort. The provided reward from Alice is used to update the node’s trust level (see Section 2.3). The pair of (effort, reward) constitutes a contract among Alice and each selected IoT node, denoted as . Accordingly, payoff functions are formulated for both Alice and the selected IoT nodes (see Section 2.4) and an optimization problem is formulated where the optimality for the aforementioned payoff functions is guaranteed. The optimization problem is solved and the optimal IoT nodes’ efforts are determined.

2.2. Bayesian Trust Belief

In a realistic offline IoT environment, Alice has incomplete information regarding the quality of effort that each selected node can contribute to help with Alice establishing a secure channel with Bob. For instance, in the aforementioned WMN example, Alice stores offline her own belief regarding the potential quality of unique identification data about Bob that each IoT node can offer her, since she cannot be certain if the provided information will help her to successfully authenticate Bob. This belief is updated throughout the time horizon and exploited when Alice acts as an RL agent and selects a subset of IoT nodes to verify her transaction with Bob. Thus, we utilize the concept of Bayesian trust belief , of Alice regarding another IoT node c, , at a specific time slot t. Towards determining the trust belief of each IoT node, we deploy a Bayesian model featuring the theory of adverse selection [18] and Bayesian updating of belief [19]. Initially (), all IoT nodes have the same prior trust belief distribution, i.e., , regarding the contribution that each node can provide to the establishment of secure interactions by others. Each node can either provide a high or low contribution to the crowdsourcing process, with probabilities and , respectively, where . Given the selection of the set of IoT nodes by Alice at a time slot t, each IoT node’s contribution is evaluated as satisfactory or not if it agrees to participate in the crowdsourcing process or not, respectively. History is constructed for every IoT node throughout the time horizon, where and denote the number of times until time slot t that node c has contributed or not in the crowdsourcing process in a satisfactory manner, respectively. Alice’s posterior trust belief regarding every other IoT node c is given as follows. The posterior trust belief We denote and . It holds true that , as and . The first order partial derivatives of with respect to and are considered to examine the monotonicity of the posterior trust belief. Initially, we have , given that and . Thus, is a strictly increasing function with respect to . Similarly, we have . Thus, is a stricly decreasing function with respect to . □ The physical meaning of Theorem 1 is that each IoT node gains an increasing posterior trust belief, if its contribution to the crowdsourcing process is evaluated as satisfactory over time, e.g., if each IoT node offers to Alice an adequate quality of unique identification data for Bob in the WMN application scenario. The posterior trust belief will be further used to enable the offline contract-theoretic interaction among Alice and the selected IoT nodes (see Section 2.4).

2.3. IoT Node Score—A PeerTrust Modeling

Each IoT node is characterized by a score that captures its private information regarding how frequently and how efficiently it has participated in the crowdsourcing process throughout the time horizon. In the WMN application scenario mentioned in Section 1, the score of an IoT node could reflect how often it assists in the creation of a secure transaction channel between Alice and Bob and the offline verification of the transactions by providing high-quality identification data for Bob to Alice. The score of an IoT node is based on the theory of score within PeerTrust [20], which is a peer-to-peer (P2P) reputation-based trust supporting framework. Each IoT node’s score is defined as follows: where denotes the node’s trustworthiness. Note that in a real setting, the set C may be limited to nodes available locally as part of the ad-hoc network. Considering that each IoT node stores locally its own absolute trust score , the system is bootstrapped by having each node transmit Wi-Fi beacon frames advertising its own absolute score. Therefore, other IoT nodes, e.g., Alice, is able to use those to compute the transmitting nodes’ relative scores, i.e., her personalized belief regarding the quality of the identification data coupled with the transmitted absolute scores. Based on the PeerTrust model [20], four important factors are utilized to define the node’s trustworthiness: (a) the reward that an IoT node c receives from Alice at a certain time slot t, (b) the overall number of interactions that the IoT node has with Alice denoted as , (c) the credibility factor of Alice expressed via its posterior Bayesian trust belief , and (d) the interaction context factor , which can be used to characterize the criticality and importance of interaction among Alice and Bob. Thus, the trustworthiness of each IoT node is defined as the weighted sum of the amount of satisfaction that IoT node c receives in each crowdsourcing interaction with Alice: where is a normalized weighting factor. Equation (3) can be interpreted as the prediction of IoT node’s c likelihood of a satisfactory contribution in the crowdsourcing. For presentation purposes, we sort the nodes’ scores in an ascending order at a specific time slot t, i.e., .

2.4. Alice’s and Selected IoT Nodes’ Payoff

Each IoT node is characterized by a payoff function at a specific time slot t, which represents its benefit from the reward offered by Alice, while considering its personal cost to provide the effort to Alice. The node’s payoff is defined as follows where is the evaluation function of the received reward . The evaluation function is continuous, strictly increasing, and concave with respect to the received reward, i.e., . For demonstration purposes and without loss of generality, we consider . Alice’s payoff is defined as the overall satisfaction received by the selected IoT nodes’ invested effort while considering her personal cost to provide the corresponding rewards to the selected nodes, and it is formulated as follows where denotes Alice’s cost to provide rewards, and is the nodes’ effort vector. In a scenario where Alice is unaware of the selected nodes’ scores and their potential to provide effort in the crowdsourcing process, Alice probabilistically estimates each node’s score with probability , where . We exploit the Bayesian trust belief to determine the probability , as follows. Based on Equations (4) and (5), we define the social welfare as the net gain of all participants in the process.

3. Contract-Theoretic Crowdsourcing

The interactions among Alice and the selected IoT nodes are captured via a contract-theoretic trust-based crowdsourcing model aiming at determining the optimal contracts that facilitate the crowdsourcing process. Initially, the complete information scenario regarding the nodes’ scores (i.e., trustworthiness) is considered for benchmarking purposes. Then, the realistic scenario of incomplete information is presented, where Alice probabilistically estimates the nodes’ scores based on the probability . The probability distribution is updated, while Alice interacts with the nodes. Based on the proposed contract-theoretic model [21] Alice can deal with the information incompleteness and efficiently incentivize the selected nodes to contribute to the crowdsourcing process. Specifically, an optimization problem is solved by Alice (see Section 3.3), where she determines the optimal contracts towards her overall satisfaction (Equation (5)) as well as the selected IoT nodes’ (Equation (4)) payoff joint maximization. Thus, the contract-theoretic efforts of the IoT nodes are estimated based on the rewards provided by Alice, the reported trustworthiness scores , and the probability distribution in order for their perceived payoff to be maximized. In the following analysis, we assume that Alice has already selected the IoT nodes that will participate in the crowdsourcing process, while the detailed analysis of nodes’ selection based on the theory of Stochastic Learning Automata (SLA) is shown in Section 4.

3.1. Complete Information Scenario

In this section, we examine the ideal benchmarking scenario, where Alice has complete information of the selected IoT nodes’ trustworthiness scores, i.e., is known. Alice can fully exploit the nodes’ invested efforts and maximize her payoff while guaranteeing that their achieved benefits (Equation (4)) are optimized. The condition of individual rationality should hold true in the offered contract such that the nodes are incentivized to participate in the crowdsourcing. (Individual Rationality (IR)) A contract The following optimization problem is introduced to determine the optimal contracts among Alice and each selected node. Alice aims at maximizing her payoff by providing the minimum acceptable payoff to each IoT node c, . Thus, As a result, the constraint (9) is reduced to an equality as follows. In the complete information scenario, the optimal contract among Alice and each IoT node c, Based on the reduced constraint in Equation (10) we have: Thus, from Equation (5) we have that the following holds true: As a result, in order to find the optimal contract that Alice offers to each IoT device, we consider the first order derivative of with respect to the effort and we set it equal to 0, as follows. Based on Equations (11) and (13) we have that the following holds true: Thus, the optimal contract under the complete information setting is given by . □

3.2. Feasible Contract under Incomplete Information

In this section, we study the realistic scenario of incomplete information regarding the IoT nodes’ scores. In a real-life IoT crowdsourcing scenario, the IoT nodes may not reveal their level of trustworthiness, or even worse, they may maliciously advertise fake information regarding their scores. Thus, Alice probabilistically estimates the IoT nodes’ scores by interacting with them over time and updating her probability regarding each node’s c score via updating her posterior trust belief . Alice aims to maximize her benefit (Equation (5)) by interacting with the selected nodes, while guaranteeing their payoff maximization (Equation (4)) via determining the optimal contract . To determine the optimal efforts and rewards, the criteria of individual rationality (IR), incentive compatibility (IC), fairness, monotonicity, and rationality should hold true, as analyzed below. (Incentive Compatibility (IC)) Each IoT node must select the contract The physical meaning of the IC condition is that each node should select its personalized contract in order to optimize its benefit from participating in crowdsourcing. (Fairness) A contract must be fair: We prove that , by utilizing the IC condition: and . By adding those inequalities, we have: . Given that and is a strictly increasing function with respect to , we conclude that . Then, we prove that . It holds true that and is a strictly increasing function with respect to , thus, . Thus, from , we conclude that . Similarly, we can also show that . □ The physical meaning of Proposition 1 is that a contract should be fair in order to incentivize the nodes to participate in the crowdsourcing by providing higher rewards to the IoT nodes of higher scores, which have the potential to contribute more in the crowdsourcing process. (Monotonicity) An IoT node of higher score, i.e., We have sorted the IoT nodes as . Thus, the first part of the proof stems from Proposition 1. Based on the IC condition for and assuming , we have that . Given that is a strictly increasing function with respect to , we conclude that . Then, assuming that and based on the IC condition, we have that . Since and given that is a strictly increasing function with respect to , we conclude that . □ The physical meaning of the monotonicity condition is that a node of a higher score, i.e., trustworthiness, should receive a higher reward, as it will eventually invest a higher effort. In the following proposition, we analyze the perceived payoff of devices that are characterized by different scores. (Rationality) An IoT node of a higher score, i.e., We examine two indicative nodes c, , with with . By utilizing the IC condition, we have . Thus, . □ The physical meaning of the rationality condition is that an IoT node of a higher score, given that it invests greater effort in the crowdsourcing process by receiving a greater reward, will ultimately achieve a greater payoff. Following the above analysis, our goal is to determine the optimal contract between Alice and each selected IoT node aiming at maximizing Alice’s achieved payoff and jointly optimizing each IoT node’s payoff, while accounting for the incomplete information. The corresponding optimization problem is defined as follows where Equations (15b) and (15c) capture the IR and IC conditions, respectively, and Equation (15d) jointly represents the fairness, monotonicity, and rationality conditions. The optimization problem P1 is non-convex. In the following section, we present an analysis to reduce its constraints and determine its solution.

3.3. Optimal Contract under Incomplete Information

Towards solving the optimization problem (15a)–(15d), initially, we reduce the IR constraint in Equation (15b). Given that and based on the IC condition, we have . Thus, if the IR constraint of the IoT node with the lowest score is satisfied, then holds true for each IoT node . Given that Alice will try to exploit the maximum benefit from the nodes’ invested effort, the reduced IR constraint can be further reduced to equality, i.e., . Focusing on the reduction of the IC constraints in Equation (15c), we introduce the following terminology: (a) Downward IC (DIC) constraints between the nodes c, , , (b) Upward IC (UIC) constraints between the nodes c, , , (c) Local Downward IC (LDIC) constraints between the adjacent nodes c, , and (d) Local Upward IC (LUIC) constraints between the adjacent nodes c, . All the DIC constraints can be represented by the LDIC constraints. We consider three adjacent scores of nodes, i.e., and we can write the IC constraints as: and . We know that . Thus, for , we have . Given that , we conclude that . By recursively applying the latter outcome, we have that . Thus, all the DIC constraints can be equivalently captured by the LDIC constraint . □ All the UIC constraints can be represented by the LDIC constraints. We consider three adjacent scores of nodes, i.e., and we write the IC constraints as: and . From Proposition 1, we have , thus, from the latter inequality we derive: . Based on the latter outcome, we have: . □ Based on Propositions 4 and 5, we observe that the IC constraints defined in the original optimization problem are efficiently reduced to constraints. Based on the reduced IR and IC constraints, the optimization problem P1 can be rewritten as follows. The optimization problem P2 is convex and can be solved with standard optimization tools to determine the optimal nodes’ effort vector and Alice’s reward vector .

4. Autonomous Reinforcement Learning-Based Contributors Selection

In this section, we propose a distributed reinforcement learning (RL) model based on the theory of Stochastic Learning Automata (SLA) that enables Alice to select nodes to facilitate her interaction with Bob. Alice’s discrete action space consists of vectors , where , and where is the total number of subsets of the nodes with cardinality [22]. Alice aims at minimizing her communication delay with the selected nodes, thus, she prefers to select nodes with small physical distance and low congestion [23,24]. Moreover, she considers the nodes’ scores, as they are reported by them by transmitting respective wireless beacons (Section 2.3), while also weighing the reported values based on her probabilistic trust belief. This process leads Alice to formulate the relative scores of the IoT nodes. Thus, Alice determines the personalized feedback at the iteration of the SLA algorithm at time slot t by choosing the action vector as: The personalized feedback is engineered in such a way that enables Alice to act as an autonomous RL agent within the IoT network. Specifically, if is high then her action at the iteration of time instance t is good since the chosen subset of the IoT nodes is characterized by a good cumulative trust profile and satisfactory cumulative network characteristics. Thus, Alice chooses trustworthy IoT nodes for the crowdsourcing process in order for the interaction with Bob to be secure and successful, and at the same time not further congest the IoT network. in Equation (17) is normalized as , thus, . Given the personalized feedback, Alice determines her action probability vector , which is updated based on the SLA gradient ascent rule as follows: where is the learning parameter. For higher values of b, Alice explores less her action space, which may lead her to inefficient but faster decisions. Equation (18a) expresses the probability of Alice selecting the same action in iteration , while Equation (18b) depicts the probability of choosing a different action. It is noted that at , Alice selects an action with equal probability. The SLA algorithm enables Alice to converge to the optimal selection of nodes in an iterative manner. In Figure 1, we present the overall architecture of the proposed model.
Figure 1

General Architecture.

5. Numerical Results

In this section, we provide a detailed performance evaluation of the proposed offline contract-theoretic crowdsourcing framework via modeling and simulation. The operation of the stochastic learning automata-based nodes’ selection by Alice and the evaluation of the introduced Bayesian trust belief model, are presented in Section 5.1. A thorough evaluation of the proposed offline contract-theoretic crowdsourcing framework is discussed in Section 5.2, and a comparative analysis is provided in Section 5.3. The simulation parameters’ values are presented in Table 2, unless otherwise explicitly stated. The proposed framework’s evaluation was conducted in a MacBook Pro Laptop, 2.5 GHz Intel Core i7 with 16 GB LPDDR3 available RAM.
Table 2

Simulation parameters.

ParameterValueParameterValue
|C| 10 |CAt|,t 4
b 0.15 μ0 0.2
ah 0.51 al 0.49
Sc0cC 1 α 0.8
Fc0,cC 1 λ 0.7
dct,cC,t [10 m, 400 m] TFA,ct,t 0.5

5.1. Stochastic Learning Automata Operation & Bayesian Trust Belief Evaluation

Figure 2 illustrates the performance characteristics of the SLA algorithm. Each data point represents an aggregate of multiple simulations where congestion values for each selected IoT node are generated in a Monte Carlo fashion. Figure 2a indicates the convergence of Alice’s action probabilities to the set of nodes that will participate in the crowdsourcing process at a specific time instance. Specifically, the probability of selecting the IoT nodes 3, 4, 5, 8 converges to 1, while the probabilities of selecting any other subset of IoT nodes, i.e., a different IoT nodes combination of cardinality , converges to 0. The results reveal that the SLA algorithm converges fast (less than 400 SLA iterations, equivalent to s).
Figure 2

Stochastic Learning Automata operation and performance evaluation. (a) Action Probability vs. Iterations, (b) Average Trustworthiness & Network Overhead vs. Iterations, (c) Average Personalized Feedback vs. Iterations, (d) Average Personalized Feedback and Convergence Time vs. b.

Figure 2b presents the convergence of Alice’s achieved average trustworthiness and network overhead with respect to the number of selected nodes, where the latter is captured as . The results reveal that Alice, by acting as a Stochastic Learning Automaton, is able to autonomously select nodes that are characterized by high trustworthiness, while simultaneously possessing a low congestion rate, resulting in low average network overhead. Thus, Alice receives a high personalized feedback (Figure 2c). Figure 2d, presents the convergence time and the corresponding average received personalized feedback as a function of the learning parameter b. The results show that for increasing values of b, the convergence efficiency increases, however, the average received personalized feedback for the selected action decreases, due to under-exploration of the action space leading to sub-optimal exploitation of resources. In Figure 3, we study the operation of the proposed framework in terms of modeling the Bayesian trust belief for two indicative nodes with IDs 8 and 5 throughout the time horizon (i.e., for 250 examined interactions). Figure 3a shows that Alice has obtained higher Bayesian trust belief for IoT node 8, given that this node receives a higher number of positive evaluations, i.e., , and a lower number of negative evaluations over the examined time horizon (Figure 3b). Thus, as proven in Theorem 1, Alice trusts IoT node 8 more for her interactions within the offline environment.
Figure 3

Bayesian trust belief evaluation (S: positive, F: negative evaluations). (a) Trust Belief vs. Interactions, (b) Evaluations vs. Interactions.

5.2. Contract-Theoretic Crowdsourcing Evaluation

In this section, we evaluate the contract-theoretic crowdsourcing model, considering an indicative time slot , where Alice has already selected the set of nodes that will participate in the crowdsourcing process. Figure 4a,b present the evolution of the nodes’ scores and Alice’s Bayesian trust belief throughout the time horizon of 200 interactions. Regarding the latter ones, different distributions have been adopted for the values of and to capture the stochasticity of the IoT nodes’ contribution to the crowdsourcing.
Figure 4

Offline contract-theoretic crowdsourcing—operation and performance evaluation. (a) Nodes’ Scores vs. Interactions, (b) Alice’s Belief vs. Interactions, (c) Effort vs. Nodes, (d) Reward vs. Nodes, (e) Nodes’ Payoff vs. Nodes, (f) Nodes’ Payoff vs. Nodes IDs, (g) Alice’s Payoff vs. Nodes, (h) Social Welfare vs. Nodes.

The results reveal that Alice gains knowledge from her interactions with the nodes and builds a Bayesian trust belief that follows the same trend as the nodes’ scores, even if she operates under the incomplete information scenario. Figure 4c–e show the nodes’ efforts, their provided rewards by Alice, and their payoffs under both the complete and incomplete information scenarios. Figure 4f demonstrates the nodes’ payoff by receiving any contract designed for each IoT node. Figure 4g,h illustrates Alice’s payoff and the overall examined system’s social welfare (Equation (7)) in an aggregated manner at . The results reveal that when Alice is fully aware of the nodes’ scores (complete information), she fully exploits the nodes’ efforts (Figure 4c), by providing high rewards to them (Figure 4d). Thus, she experiences high payoffs (Figure 4g). Figure 4e shows that the experienced payoff by each node is equal to 0, as Alice knows the nodes’ exact scores and the rewards are enough to optimally satisfy their IR conditions (Definition 1). Focusing on the incomplete information scenario, the nodes experience a higher payoff (Figure 4e) given that Alice cannot precisely predict their scores. Correspondingly, Alice experiences a lower payoff compared to the complete information scenario (Figure 4g). Based on Figure 4f, we observe that the nodes achieve their highest personal payoff under the incomplete information scenario, only when they are offered a personalized contract aligned with their scores, as follows from the IC condition (Definition 2). Additionally, it is highlighted that the proposed model achieves almost the exact same social welfare for the overall examined system under the complete and incomplete information scenarios, where the incomplete information scenario concludes to a social welfare reduced only by compared to the complete information scenario. To the best of our knowledge, this is the best achieved social welfare compared to the complete information scenario in the current bibliography. This novelty stems from the introduction of the Bayesian trust belief in the overall designed framework. In Figure 5, we present a scenario, where one IoT node (ID 4) starts behaving maliciously in the crowdsourcing process (e.g., investing small effort) at a specific time slot (), in order to examine the sensitivity of the proposed framework. Figure 5a shows that Alice senses the node’s change of behavior by experiencing a decreasing Bayesian trust belief regarding this node. Thus, Alice provides a lower average reward over time to this node compared to the scenario where the node presents normal behavior (Figure 5b), i.e., invests an effort as derived from the optimization problem P2.
Figure 5

Behavioral change evaluation. (a) Alice’s belief vs. interactions, (b) average reward vs. behaviors.

5.3. Comparative Evaluation

In this section, we present a comparative evaluation for , considering six comparative scenarios: (1) the proposed offline contract-theoretic (CT) crowdsourcing, (2) Full Effort, (3) Min Effort and (4) Random Effort, where the nodes invest their maximum, minimum, and random effort, respectively, (5) Guided Effort, where the nodes invest effort, and (6) Guided Reward, where Alice provides a guided reward to each node. Figure 6 presents the cumulative social welfare as a function of the node’s ID.
Figure 6

Offline contract-theoretic crowdsourcing—a comparative evaluation.

The results reveal that the proposed framework enables the overall examined system to achieve the highest social welfare due to the joint exploitation of the Bayesian trust model and contract-theoretic crowdsourcing, which facilitate the intelligent inference of the nodes’ trust levels and their personalized treatment to invest their efforts in the crowdsourcing, respectively. The Guided Reward and Guided Effort scenarios present better social welfare compared to the myopic decision-making scenarios of Full, Min, and Random Effort, in terms of deciding the level of effort that the IoT nodes’ invest in the crowdsourcing process.

6. Conclusions

In this paper, an offline contract-theoretic crowdsourcing framework is introduced to enable two IoT nodes, Alice and Bob, to build a secure channel based on supporting information provided by selected nodes in the local ad-hoc network. Alice selects the IoT nodes by following a stochastic learning automata approach via exploiting the network characteristics and node trust levels. The trust is quantified by developing a PeerTrust model and exploiting the concept of Bayesian trust belief. A contract-theoretic approach is modeled among Alice and the selected IoT nodes, where Alice provides personalized rewards to the nodes in order for the latter ones to invest their effort in the crowdsourcing process and enable Alice to securely interact with Bob. A detailed set of numerical and comparative results is provided to illustrate the operation, performance, and benefits of the proposed framework. The results suggest that the proposed offline contract-theoretic crowdsourcing framework achieves similar social welfare for the examined system under complete and incomplete information regarding the IoT nodes’ trust levels. Part of our current and future work focuses on the deployment of the model to a real-world scenario with practical IoT network data as well as on the extension of the presented model based on the theory of Satisfaction Games to capture the satisfaction-aware resource management in terms of collecting information from the selected nodes towards facilitating the system’s resource-saving and latency improvement, as envisioned with the Tactile Internet.
  1 in total

1.  Evidence Combination From an Evolutionary Game Theory Perspective.

Authors:  Xinyang Deng; Deqiang Han; Jean Dezert; Yong Deng; Yu Shyr
Journal:  IEEE Trans Cybern       Date:  2015-08-13       Impact factor: 11.448

  1 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.