Professional Documents
Culture Documents
fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2017.2751304, IEEE Access
AbstractThe powerful smart terminals with rich set of terminal can undertake one or more simpler sensing tasks. The
embedded sensors promote the development of the Internet of most attractive properties of MCSs is that it aims at letting the
Things (IoTs). Mobile Crowdsensing system can be formed by regular mobile physical terminals work for the complicated
these mobile smart terminals from IoTs to collect and exchange
data. The main idea of MCSs is to outsource sensing tasks job, while keeping the users of these mobile physical terminals
(collecting data) to various mobile devices which are carried unconscious. In tradition, however, the job must be done by
by people or vehicles. The design of incentive mechanisms in professional experts and the sensors have to be deployed in
MCSs is one of the hottest research topics. However, most of the advance.
existing literatures focus on maximizing the utilities or social The MCSs have already been applied to our daily life. One
welfare while neglecting the practical requirements of MCSs
surveillance applications. In this paper, we discuss the importance of the best examples is the smart city project discussed in [7].
of fairness and unconsciousness of MCS surveillance applications. It can be used to collect information around the city and then
Then, we propose offline and online incentive mechanisms with contributes to the intelligent operation of public services. In
fair task scheduling based on the proportional share allocation detail, it tracks public vehicles and map bumps on the road
rules. Furthermore, to have more sensing tasks done over for the urban transportation systems in a city. The Microblogs
time dimension, we relax the truthfulness and unconsciousness
property requirements and design a (, )-unconsciousness online presented in [8], provides a mechanism where mobile physical
incentive mechanism. Real map data are used to validate these terminals can share their information (like travel, restaurants,
proposed incentive mechanisms through extensive simulations. and news) through a universal platform. Then, the center server
Index TermsOnline auction, incentive mechanism, Internet in the platform processes and analyzes the shared data and
of Things (IoTs) provides an alternative solution for problems or helps to make
decisions. MCSs can also be used in surveillance applications,
I. I NTRODUCTION such as monitoring pollution levels or traffic, measuring water
levels, and collecting wildlife habitats. Practical surveillance
The highly distributed paradigm Internet of Thing (IoT) applications include Common Sense and CreekWatch which
extends ubiquity of the Internet through integrating every can be found in [9] and [10], respectively.
terminal for interaction via embedded systems, in which all However, users of these mobile physical terminals partici-
the physical terminals can collect and exchange data [1], [2], pating in an MCS will suffer from extra resource consumption
[3], [4], [5]. IoT will be the fast-growing, largest market (battery and computing capacities) and the risk of privacy
potential and the most attractive emerging economy according exposure (location exposure). So effective and efficient in-
to the Top 10 Predictions of 2014 by Gartner [6]. In IoT, the centive mechanisms are needed in MCSs to attract enough
new emerging techniques integrate multiple types of sensors mobile physical terminals participation. A common strategy
and high-performance processors into physical terminals, e.g., designed in MCSs is to give rewards to participated users as
smartphones (iPhones, Sumsung Galaxy, etc.), tablets (iPad, compensation and stimulation. Lots of works can be found on
etc.), and vehicle-embedded sensing terminals (GPS). These incentive mechanisms and most of them are based on game
mobile terminals can be used to sense and collect data, so theory [11], [12]. We classify the existing works into two
that become data sources. All above mentioned properties categories: the offline incentive mechanisms and the online
make IoT a perfect choice for the Mobile Crowdsening System incentive mechanisms. The former will collect the information
(MCS). In an MCS, a complicated sensing job is divided of all participants before making the decision, while the
into several simpler tasks. Each participated mobile physical latter decides whether to accept a new arriving participant
Zhuojun Duan and Zhipeng Cai are with the Department of Computer sequentially without the information of next following partic-
Science, Georgia State University, Atlanta 30303, GA, USA. E-mail: zdu- ipants. After analyzing these existing works, we find they are
an2@student.gsu.edu; zcai@gsu.edu. not appropriate to surveillance applications for the following
Ling Tian is College of Computer Science and Engineering, University of
Electronic Science and Technology of China Chengdu, P.R.China 611731. reasons: i) the tasks allocation algorithms are unfair over the
E-mail: lingtian@uestc.edu.cn. time dimension. Most of the surveillance applications require
Mingyuan Yan is Department of Computer Science and Information Sys- continuous sensing information for a period of time. Taking
tems, University of North Georgia, 82 College Cir, Dahlonega 30597, GA,
USA. E-mail: mingyuan.yan@ung.edu. the noise level monitoring application as an example, if a cloud
Qilong Han and Guisheng Yin is with the College of Computer Science and center wants to surveil the noise level of a place, it expects
Technology, Harbin Engineering University, 145 Nan Tong Da Jie Nangang, to get noise data of the place for a period of time. Gener-
Haerbin 150001, Heilongjiang, China. E-mail: hanqilong@hrbeu.edu.cn; yin-
guisheng@hrbeu.edu.cn. ally speaking, more than one mobile physical terminal will
To whom correspondence should be addressed. participate in the sensing task. It is better to evenly schedule
2169-3536 (c) 2017 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2017.2751304, IEEE Access
sensing tasks among a set of mobile physical terminals over are formulated in section III. Incentive mechanisms for the
the particular period of time. However, mechanisms proposed offline and online cases are introduced in section IV and
in existing works [9][13] may lead to the situation that several section V, respectively. We evaluate the performance of these
mobile physical objects are assigned to sense the noise at proposed incentive mechanisms in section VI and conclude
the same time incidentally. ii) existing mechanisms require the paper in section VII.
deep interaction between participated users and their mobile
physical terminals. That is, sometimes participated users are II. R ELATED WORKS
required to pay lots of attention to their devices or forced to In this section, existing literature related to our research
change their own schedule when working for the MCS. For are summarized. We first present the existing research on
example, the working schedules of users are decided by the commercial MCS applications. After that, the advantages and
MCS in [14]. The significant advantage of MCSs over Wireless disadvantages of existing research on incentive mechanisms
Senor Networks (WSNs) is that we dont need to deploy in MCSs are discussed. Finally, existing online incentive
the sensors or workers in advance. However, the required mechanisms in MCSs are presented.
deep interaction will interfere participants original plan which Commercial MCS applications can be divided into three
should be avoided. The incentive mechanisms investigated in categories[15]. The first category is environmental applica-
this work try to overcome the two weaknesses. tions, where participants undertake tasks for environmental
We consider an MCS on surveillance applications from both monitoring, such as pollution level measuring, noise level
the time and space dimensions. Each sensing task published monitoring and wildlife habitats surveillance. Example ap-
by the MCS is tagged with a location requirement and a period plications include Common Sense[9] and CreekWatch[10].
of time requirement. Once being published, the sensing task The second category focuses on infrastructures. Applications
is required to be done multiple times over the time period at in this category collect information from participated users
the specific location. For fairness over the time dimension, a and then use the information to help the decision making on
time period is divided into smaller time slots and the sensing improving public services (like parking availability and traffic
task will be processed periodically over these time slots. The conditions). For example, Smart Cities introduced in [7] track
participants of the MCS are the mobile vehicles with sensors the urban environment and use the collected information to
installed and are able to work for sensing tasks. The device help improve the quality of life in or around cities. CarTel
on the vehicle will communicate with cloud servers by 3G or and Nericell, presented in [16] and [17] respectively, are also
LTE techniques. The drivers of these vehicles are general office infrastructure applications. The last category contains social
workers commuting between home and office. Their routes are applications where participants can sense their own data and
relatively stable and they will let the servers know their routes share them through social networks. A few representative
in advance. When a vehicle passes through a location where a works can be found in DietSense[18] and BikeNet[19]. All
sensing task is required, the sensors can work for the sensing these applications mentioned above demonstrate the great
task automatically. The objective of the MCS is to select a set potential of MCSs.
of qualified vehicles with devices so that as many tasks can Now, many researchers focus on incentive mechanisms
be done evenly over time. design in MCSs and most of which are based on game
In this paper, we first design an offline incentive mechanism theory[20][21][22][23]. Two types of incentive mechanisms
where the proportional share allocation rule is applied. Then are considered in [24]: the platform-centric incentive mecha-
we consider the realistic situations and propose online auction nism and the user-centric incentive mechanism. The former
mechanisms where each winner vehicle will be decided relying is based on Stackelberg game where the platform controls
on the information of the vehicle itself and the vehicles the total budget distribution, and users adjust their strategies
arriving before it. The contributions of this paper are as to satisfy the requirements requested by the platform. In the
follows: latter, users bid with a price for the services they provided
to the platform. But [24] only considers the offline case. In
We first discuss and investigate the importance of un- [25], the authors focus on the problem of distributed time-
consciousness in MCSs and get the conclusion that the sensitive and location-dependent task selection. The problem is
frequencies of interaction between participants and cloud formulated as a non-cooperative task selection game (TSG). A
center should be minimized. distributed solution is proposed based on the potential function
We introduce the MCS model on surveillance applica- [26] in game theory. However, the work scheduling algorithm
tions. After that, the design of incentive mechanisms proposed in [25] only considers the utility of each user. So
under the offline and online cases are designed. The task working for sensing tasks may disturb the normal lives of
allocation algorithms are implemented fairly considering participants. As we discussed in the last section, an attractive
practical property requirements. incentive mechanism should keep its influence on participants
In order to improve the performance of the online normal life as low as possible.
incentive mechanism, we relax the truthfulness and Literature [27][28][14] study the design of online incen-
unconsciousness requirements and propose a (, )- tive mechanisms design. [27] investigates the online task
unconsciousness online incentive mechanism. assignment problem and provide a two-phase exploration-
In the rest of the paper, we present and discuss previous exploitation assignment algorithm. Authors of [28] formu-
works in section II. Then the MCS system model and problem late the task assignment and label inference problems for
2169-3536 (c) 2017 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2017.2751304, IEEE Access
2169-3536 (c) 2017 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2017.2751304, IEEE Access
Generally speaking, the incentive mechanism should satisfy A. Offline Working Process of MCSs
several properties to guarantee its efficiency and effectiveness. In this section, we first focus on the design of offline
Individual Rationality. Because all MVDs are self-interest incentive mechanisms. The working process of an offline MCS
to benefit themselves, the utility of any v V should be non- can be divided into three stages: publishing stage, auction stage
negative: Uv 0. and working stage, as shown in Fig. 2.
Truthfulness. An auction mechanism is called truthful if all Publishing stage. In this stage, the CP decides the sensing
MVDs bid with their true value (real cost). The utility of vj tasks that it plans to finish within T . Then it publishes the
will be maximized when it reports true values in its bid and description of these sensing tasks among the MVDs.
vj cannot improve its utility through any misreport: Auction stage. After receiving requirements of sensing
Uvj (bvj , bvj ) Uvj (bvj , bvj ), (3) tasks and their description, each MVD generates location-time
points sequence according to its original scheduled route. The
where, bvj = {bv1 , ... , bvj1 , bvj+1 , ... , bvn } represents sequence of location-time points implies the set of sensing
the set of truthful bids of all MVDs excluding vj . bvj is the tasks an MVD can take. If an MVD is able to work for a
truthful bid of vvj , and bvj 6= bvj . If an auction mechanism set of sensing task , it will further evaluate the cost caused
satisfies this property, N ash Equilibrium exists.The misre- by them. An MVD calculates its cost as the base price and
ports of first value (route) in a bid can be easily detected by submits a bid to the CP. The bid submitted by an MVD consists
the CP through the submitted results of their works. Thus the of its location-time points sequence and the base price. After
truthfulness of the first value is guaranteed. We focus on the receiving bids from all participating MVDs, the CP will choose
truthfulness of the second value in a bid: asking price. a set of winner, make the work schedule, determine each
Budget Balance. The upper bound winners reward and then announce the auction result to all
P of the total payments
for all the MVD winners is B= r , and we call B as participated MVDs.
Working stage. According to the working schedules, each
the budget constraint of the CP. In other word,
P the auction MVD winner will be activated by the CP while passing
mechanism should be budget balance: B pv .
vW through a specific location at a specific time. The reward is
Unconsciousness. Participation for the MCS are subordi- given to an MVD once it finishes all allocated sensing tasks.
nate to MVDs original target. In detail, the route of each In this work, our focus is the design of efficient and effective
MVD has been scheduled before the CP publishes the sensing incentive mechanisms during the auction stage. The other two
tasks. An MVD will not change its route for the reward. On stages are omitted.
the other hand, when an MVD passes through the location of
a sensing task, the sensors installed on the MVD should work B. Modified Proportional Share Auction Mechanism
automatically without requiring operation from the driver. We
call this kind of participation as unconsciousness. The design of an offline incentive mechanism for problem
Computational Efficiency. An auction mechanism is con- (1) is more complex than our past work [29] because the
sidered computationally efficient if the task allocation and consideration of the budget balance property. We rewrite the
payment decision can be implemented in polynomial time. problem function in (1) as a new form g(W ) = | Sv |,
vW
When the above properties are all satisfied, an auction where Sv = {(, t)|(, t v , f,t = 1)} and find an
mechanism can be considered as useful. Without individual interesting point: it is a nondecreasing submodular function.
2169-3536 (c) 2017 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2017.2751304, IEEE Access
2169-3536 (c) 2017 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2017.2751304, IEEE Access
2169-3536 (c) 2017 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2017.2751304, IEEE Access
(,)
Definition 4. Candidate Route (CR). represents the set
(,)
of potential routes for . Candidate route CR in is the
(, )-Potential Route of with largest marginal contributions,
that is CR arg max(,) (,) (g(,) (W )).
bv = {v , Av , Dv }.
2169-3536 (c) 2017 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2017.2751304, IEEE Access
2000
|B|=2000
1800 |B|=4000
|B|=6000
1600 |B|=8000
Coverage of locationtime points
|B|=10000
1400 |B|=12000
1200
1000
800
600
400
200
Fig. 5. The total number of tasks covered by the offline incentive mechanism. Fig. 7. The coverage of online incentive mechanisms
22
20
18
16
14
Task index
12
10
0
0 50 100 150
Time slots
(a)
22
20
18
16
12
10
6
online incentive mechanisms proposed in this paper with the
4 secretary mechanism. The result is shown in Fig. 7. We can
2 observe that for each online incentive mechanism, its coverage
0
0 50
Time slots
100 150 increases with the increase of participating MVDs. Then, the
results of the secretary mechanism and the Simple-OIM are
(b)
almost same. However, first k MVDs is rejected in secretary
Fig. 6. (a)The location-time points coverage by offline incentive mechanism. mechanism which can not guarantee sovereignty because these
(b)The location-time points coverage by [14]. MVDs in K are excluded arbitrarily. The MCS should make
each MVD have the same opportunity to win. From this aspect,
Simple-OIM is better than the secretary mechanism. (, )-
benchmark which is based on the classical secretary algorithm OIM outperforms the other two mechanisms because it gives
[32]. That can be summarized as: the losing MVDs one more chance to win. We know that and
Secretary mechanism. Let the first k arrived MVDs as set K, are used to constrain the potential routes. Strict constraints
reject the MVDs in K, and calculate = max{ gvc(K) v
} as (larger of and smaller of ) will limit number of potential
vK
threshold. Then for each new coming MVD denoted as v 0 routes and decrease running time. But loose constraints will
which satisfies gvc0 (w)
0
, calculate its temporary payment lead to more tasks covered over time. Thus, (0.3, 20)-OIM
v
performs better than (0.7, 10)-OIM.
p0v0 = gv0(w) . v 0 will be selected as 0
P a winner (W = W v )
0
with payment pv0 = pv0 if pv0 + pv B. Then we test the performance of the four online incentive
vW mechanisms under different number of sensing tasks. The
The experimental setup of the online case is similar to the results of average running time for each MVD under different
offline case. The MVDs are required to submit bids at their setups are shown in Fig. 8. The average running time of each
starting time. We first compare the number of sensing tasks MVD in secretary mechanism and the Simple-OIM turns out
covered by winner MVDs over time obtained from the two to be negligible with the increase of the number of sensing
2169-3536 (c) 2017 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2017.2751304, IEEE Access
tasks. Because the tweaked DF S is adopted to calculate the [13] H. Jin, L. Su, D. Chen, K. Nahrstedt, and J. Xu, Quality of information
potential routes for each losing MVD, the time complexity aware incentive mechanisms for mobile crowd sensing systems, in
Proceedings of the 16th ACM International Symposium on Mobile Ad
is high in (, )-OIM. So (0.3, 20)-OIM needs more time Hoc Networking and Computing. ACM, 2015, pp. 167176.
than (0.7, 10)-OIM. In order to guarantee the computational [14] D. Zhao, X.-Y. Li, and H. Ma, How to crowdsource tasks truthfully
efficiency, the (, )-OIM should choose larger and smaller without sacrificing utility: Online incentive mechanisms with budget
constraint, in INFOCOM 2014, 2014, pp. 12131221.
even though the part of effectiveness will be sacrificed. [15] R. K. Ganti, F. Ye, and H. Lei, Mobile crowdsensing: current state and
future challenges, IEEE Communications Magazine, vol. 49, no. 11,
2011.
VII. C ONCLUSION [16] B. Hull, V. Bychkovsky, Y. Zhang, K. Chen, M. Goraczko, A. Miu,
In this paper, we focus on incentive mechanisms design in E. Shih, H. Balakrishnan, and S. Madden, Cartel: a distributed mobile
sensor computing system, in Proceedings of the 4th international
IoT-based MCSs for surveillance applications. We investigate conference on Embedded networked sensor systems, 2006, pp. 125138.
practical requirements and the importance of fairness and [17] P. Mohan, V. N. Padmanabhan, and R. Ramjee, Nericell: rich mon-
unconsciousness in winner MVDs selection. Two kinds of itoring of road and traffic conditions using mobile smartphones, in
Proceedings of the 6th ACM conference on Embedded network sensor
incentive mechanisms are proposed which can be applied in systems. ACM, 2008, pp. 323336.
realistic applications. Extensive simulations are conducted to [18] J. Burke, D. Estrin, and M. Hansen, Image browsing, processing, and
validate the performance of them. clustering for participatory sensing: Lessons from a dietsense prototype,
Retrieved October, vol. 12, p. 2013, 2007.
[19] S. B. Eisenman, E. Miluzzo, N. D. Lane, R. A. Peterson, G.-S. Ahn,
ACKNOWLEDGMENT and A. T. Campbell, Bikenet: A mobile sensing system for cyclist
experience mapping, ACM Transactions on Sensor Networks (TOSN),
This work is partly supported by the National Science vol. 6, no. 1, p. 6, 2009.
[20] N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani, Algorithmic
Foundation (NSF) under grant NOs 1252292, 1741277 and game theory. Cambridge University Press Cambridge, 2007, vol. 1.
1704287, the Foundation of Science & Technology Depart- [21] J. Sun and H. Ma, Heterogeneous-belief based incentive schemes for
ment of Sichuan Province No. 2017JY0007, 2017HH0075, crowd sensing in mobile social networks, Journal of Network and
Computer Applications, vol. 42, pp. 189196, 2014.
2017JY0073, 2017JY0027, 2016GZ0075, 2016GZ0077, and [22] Y. Wang, G. Yin, Z. Cai, Y. Dong, and H. Dong, A trust-based
the NSFC under grants No. 61373083, 61370084, and probabilistic recommendation model for social networks, Journal of
61502116. Network and Computer Applications, vol. 55, pp. 5967, 2015.
[23] M. Han, M. Yan, Z. Cai, and Y. Li, An exploration of broader influence
maximization in timeliness networks with opportunistic selection, Jour-
R EFERENCES nal of Network and Computer Applications, vol. 63, pp. 3949, 2016.
[24] D. Yang, G. Xue, X. Fang, and J. Tang, Crowdsourcing to smartphones:
[1] Z. Wang, X. Xu, K. Zhou, and H. Cai, Mobile crowd sensing: an Incentive mechanism design for mobile phone sensing, in Proceedings
emerging paradigm for internet of things, International Journal of of the 18th annual international conference on Mobile computing and
Autonomous and Adaptive Communications Systems, vol. 10, no. 2, pp. networking, 2012, pp. 173184.
174191, 2017. [25] M. H. Cheung, R. Southwell, F. Hou, and J. Huang, Distributed time-
[2] T. Qiu, X. Liu, M. Han, M. Li, and Y. Zhang, Srts: A self-recoverable sensitive task selection in mobile crowdsensing, in Proceedings of the
time synchronization for sensor networks of healthcare iot, Computer 16th ACM International Symposium on Mobile Ad Hoc Networking and
Networks, 2017. Computing, 2015, pp. 157166.
[3] T. Qiu, A. Zhao, R. Ma, V. Chang, F. Liu, and Z. Fu, A task-efficient [26] D. Monderer and L. S. Shapley, Potential games, Games and economic
sink node based on embedded multi-core soc for internet of things, behavior, vol. 14, no. 1, pp. 124143, 1996.
Future Generation Computer Systems, 2016. [27] C.-J. Ho and J. W. Vaughan, Online task assignment in crowdsourcing
[4] T. Qiu, R. Qiao, and D. Wu, Eabs: An event-aware backpressure markets. in AAAI, vol. 12, 2012, pp. 4551.
scheduling scheme for emergency internet of things, IEEE Transactions [28] C.-J. Ho, S. Jabbari, and J. W. Vaughan, Adaptive task assignment for
on Mobile Computing, vol. PP, no. 99, pp. 11, 2017. crowdsourced classification, in Proceedings of the 30th International
[5] X. Zheng, Z. Cai, J. Yu, C. Wang, and Y. Li, Follow but no track: Conference on Machine Learning (ICML-13), 2013, pp. 534542.
Privacy preserved profile publishing in cyber-physical social systems, [29] Z. Duan, M. Yan, Z. Cai, X. Wang, M. Han, and Y. Li, Truthful incen-
IEEE Internet of Things Journal, vol. PP, no. 99, pp. 11, 2017. tive mechanisms for social cost minimization in mobile crowdsourcing
[6] Top 10 strategic technology trends for 2017: A gartner trend insight systems, Sensors, vol. 16, no. 4, p. 481, 2016.
report, http://www.gartner.com, accessed: 2017-07-30. [30] Y. Singer, Budget feasible mechanisms, in Foundations of Computer
[7] r. Petkovics, V. Simon, I. Gdor, and B. Brcz, Crowdsensing solutions Science (FOCS), 2010 51st Annual IEEE Symposium on, 2010, pp. 765
in smart cities towards a networked society, vol. 1, 10 2015. 774.
[8] S. Gaonkar, J. Li, R. R. Choudhury, L. Cox, and A. Schmidt, Micro- [31] A recursive algorithm to find all paths between two giv-
blog: Sharing and querying content through mobile phones and social en nodes in c++ and c#, http://www.technical-recipes.com/2011/
participation, in Proceedings of the 6th International Conference on a-recursive-algorithm-to-find-all-paths-between-two-given-nodes/, ac-
Mobile Systems, Applications, and Services, New York, NY, USA, 2008, cessed: 2017-05-30.
pp. 174186. [32] T. S. Ferguson, Who solved the secretary problem? Statistical science,
[9] P. Dutta, P. M. Aoki, N. Kumar, A. Mainwaring, C. Myers, W. Willett, pp. 282289, 1989.
and A. Woodruff, Common sense: Participatory urban sensing using
a network of handheld air quality monitors, in Proceedings of the 7th
ACM Conference on Embedded Networked Sensor Systems, New York,
NY, USA, 2009, pp. 349350.
[10] S. Kim, C. Robson, T. Zimmerman, J. Pierce, and E. M. Haber, Creek
watch: Pairing usefulness and usability for successful citizen science, in
Proceedings of the SIGCHI Conference on Human Factors in Computing
Systems, New York, NY, USA, 2011, pp. 21252134.
[11] Z. Duan, W. Li, and Z. Cai, Distributed auctions for task assignment
and scheduling in mobile crowdsensing systems, in IEEE ICDCS, June
2017, pp. 635644.
[12] J. L. Z. Cai, M. Yan, and Y. Li, Using crowdsourced data in location-
based social networks to explore influence maximization, in IEEE
INFOCOM, 2016, pp. 19.
2169-3536 (c) 2017 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2017.2751304, IEEE Access
10
Zhuojun Duan received the MS degree from Qilong Han received the PhD degree in Computer
Shaanxi Normal University in 2011. Ms. Duan Science from Harbin Institute University, Harbin,
is currently a PhD student in the Department of China, in 2006. Dr. Han is currently a professor and
Computer Science at Georgia State University. Her Deputy Dean in the College of Computer Science
research interest is wireless network and social net- and Technology, Harbin Engineering University. His
work. research interests include data security and privacy,
mobile computing, distributed and networked sys-
tems. He has more than 70 publications as edited
books and proceedings, invited book chapters, and
technical papers in refereed journals and confer-
ences. He is a senior member of CCF, and the Chair
of CCF YOCSEF Harbin. He has served as programme committee members
and co-chairs of a number of international conferences/workshops for areas
including web intelligence, e-commerce, data mining, intelligent systems, etc.
2169-3536 (c) 2017 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.