Lin 2018
Lin 2018
the online scenario provides users one more dimension of paper, i.e., SPIM-S and SPIM-M. However, these two mech-
flexibility to conduct Sybil attacks, i.e., active time window (to anisms cannot be directly applied to the online scenario.
be elaborated latter). Existing online incentive mechanisms for Several works considered the online scenario where smart-
crowdsensing [4, 5, 9, 27, 37–39] are all vulnerable to Sybil phone users come to the system in a random order. Among
attack. Among them, the VCG-based incentive mechanism [5] them, some online pricing mechanisms have been analyzed
is not Sybil-proof, since the VCG auction has been proved in [8, 40]. In addition, a number of auction-based online incen-
not Sybil-proof in [34]. The mechanism proposed in [4] is tive mechanisms have been proposed for crowdsensing. Most
not Sybil-proof, since a user can increase its critical value of them aim to design online mechanisms, which have compa-
and thus increase its payment by submitting multiple bids. For rable performance to offline mechanisms. To get the informa-
mechanisms in [9, 30, 37, 38], a user can increase its utility by tion about upcoming users, two-sage based mechanisms have
changing from a loser to a winner via Sybil attack. We will use been proposed in [9, 37]. However, these mechanisms cannot
examples to demonstrate the vulnerability of existing online guarantee the consumer sovereignty, since the first batch of
mechanisms to Sybil attack in Section IV. Therefore, the users are rejected no matter how they bid. Zhao et al. [38, 39]
problem of designing Sybil-proof online incentive mechanisms proposed two multi-stage mechanisms, which satisfy consumer
for crowdsensing remains open. sovereignty. Furthermore, Gao et al. [5] proposed a VCG-
In this paper, we focus on designing Sybil-proof online in- based mechanism to invitivize users to participate in the
centive mechanisms for crowdsensing. A mechanism is Sybil- system for a long-term. Feng et al. [4] considered a system
proof if, participating in crowdsensing using a single identity with dynamic users and dynamic tasks. The users’ privacy
is a dominant strategy of each user. The main contributions of has been considered in [27]. However, none of existing online
this paper are as follows: mechanisms take into consideration the Sybil attack.
• To the best of our knowledge, we are the first to inves- Recently, the impact of Sybil attack has been widely
tigate Sybil attack in online incentive mechanisms for analyzed in areas including virtual machine instance allo-
crowdsensing. cation [26], social networks [23] and crowdsourced mobile
• We analyze existing online incentive mechanisms and apps [25]. As pioneers, Yokoo et al. [34] analyzed the effects
demonstrate that they are all vulnerable to Sybil attack. of Sybil attack on combinatorial auctions. They proved that
• Depending on users’ flexibility on performing their tasks, VCG auction is not Sybil-proof in this paper. In addition,
we consider both the single-minded and multi-minded the price-oriented rationing-free protocols, which characterize
cases. We design SOS and SOM for these two cases, re- the Sybil-proof protocols for combinatorial auction have been
spectively. In order to design SOS, we provide a sufficient proposed in [33].
condition for an online mechanism to be Sybil-proof. The problem of designing Sybil-proof online incentive
We prove that SOS achieves computational efficiency, mechanisms for crowdsensing is still open. All existing on-
individual rationality, truthfulness, and Sybil-proofness, line incentive mechanisms are vulnerable to Sybil attack as
and that SOM achieves individual rationality, truthfulness, explained in Section I, and we will show their vulnerabilities
and Sybil-proofness. to Sybil attack in Section IV.
The remainder of this paper is organized as follows. In III. M ODEL AND P ROBLEM F ORMULATION
Section II, we review the related work. In Section III, we A. System Model
introduce the system model and the objectives. In Section IV,
In this paper, we consider a crowdsensing system con-
we analyze the vulnerability of existing online mechanisms
sisting of a platform and a crowd of smartphone users
to Sybil attack. In Section V and Section VI, we present
U = {1, 2, . . . , n}, where n is unknown. The platform first
two online mechanisms for single-minded case and multi-
publicizes a set T = {τ1 , τ2 , . . . , τm } of m sensing tasks,
minded case and prove their desired properties, respectively.
aiming at finding some users to complete these tasks before
Performance evaluations are presented in Section VII. We
a specified deadline T , which is divided into slots of equal
conclude this paper in Section VIII.
size. Each task τi ∈ T has a value vi to the platform. We
use bundle to refer to any subset of T . There is a function
II. R ELATED W ORK
V (B) to calculate
P the value of bundle B to the platform, i.e.,
In recent years, a number of auction-based incentive mecha- V (B) = τi ∈B vi , B ⊆ T . Each user i has a active time
nisms have been proposed for crowdsensing. Most of them are window within which it promises to complete the tasks if it is
offline mechanisms with different objectives e.g., maximizing assigned, and a task set Γ̃i ⊆ T , which i can complete within
the utility of the platform under a budget constraint [35], its active time window. Let ãi ∈ {1, . . . , T } denote the begin
minimizing the social cost [3, 30], and preserving users’ of active time window and d˜i ∈ {1, . . . , T }, d˜i ≥ ãi denote the
privacy [12, 14, 17]. The quality of sensing data has been end of active time window. Note that the platform has to make
considered in [11, 13, 20, 29]. Lin et al. [16] formalized the decision to each user i by d˜i . As with [16], we assume that
Sybil attack in crowdsensing and demonstrated that previous each user i has a cost function c̃i (B), which determines the
offline mechanisms are all vulnerable to Sybil attack. Two cost for i to perform all tasks in bundle B. The cost function
Sybil-proof offline incentive mechanisms are prosed in this c̃i (·) satisfies the following properties:
2439
IEEE INFOCOM 2018 - IEEE Conference on Computer Communications
2440
IEEE INFOCOM 2018 - IEEE Conference on Computer Communications
TABLE I threshold for the user selection in the next stage, where vi
N OTATIONS is user i’s marginal value and bi is its bid. In the second
Symbol Description stage, the first user i whose vi /bi value is no less than the
T , m, τj set of tasks, number of tasks, and one task
threshold will be selected as a winner. We use the example
U , n, i set of users, number of users, and one user in TABLE II. to show that these mechanisms are not Sybil-
Ut active users at time slot t proof. In this example, the value of τ1 is 1 and the value
V (B) value of bundle B to the platform
vit marginal value of user i at time slot t
of τ2 is 3. The mechanism will reject the first user (User1)
ũi , ui i’s utility and i’s utility via Sybil attack since n = 5 and b 5e c = 1. Next, assume user 1 conducts
u0 platform utility Sybil attack by submitting two bids βi0 = (1, 1, {τ1 }, 2)
T , t, t[i] deadline, each time slot, and time slot i wins
ãi , ai i’s true and submitted start of its active time window
and βi00 = (2, 2, {τ2 }, 2) under fictitious identities 10 and
d˜i , di i’s true and submitted end of its active time window 100 , respectively. In this case, the first two users (User 10
Γ̃i , Γi , Γti i’s true and submitted task set, and tasks i can perform and User 2) are rejected since n = 6 and b 6e c = 2, and
at time t the threshold is 0.5. User i00 is the third arrived user whose
c̃(·), c(·) i’s true and submitted cost function
Ati , At , A i’s and all active users’ assignment at time slot t, and
vi00 /bi00 = 1.5 > 0.5, and thus it is selected as a winner.
overall assignment profile Because these mechanisms satisfy individual rationality, user
pti , pt , p i’s and all active users’ payment at time slot t, i00 has a non-negative utility. Therefore, these mechanisms
and overall payment profile
Bti (B) set of subsets of Γti that intersect with B
are not Sybil-proof, since a user can increase its utility by
changing from a loser to a winner via Sybil attack.
IV. V ULNERABILITY OF E XISTING O NLINE M ECHANISMS The second group comprises of an improved two-
TO S YBIL ATTACK
stage mechanism [27] and a multi-stage mechanism called
OMG [38, 39]. Given the deadline T and budget B, these two
In this section, we use examples to show existing online mechanisms will set the cutoff time of the first stage by 2blnT T c
incentive mechanisms are vulnerable to Sybil attack. and 2blogT2 T c , respectively, and allocate the first stage a stage-
A. Mechanism Classification budget 2blnBT c and 2blogB2 T c , respectively. We take the OMG as
We classify existing online incentive mechanisms into three an example and show that it is still not Sybil-proof using the
categories according to their vulnerabilities to Sybil attack. example in TABLE II. In the first stage, OMG selects users
The first category is the VCG-based mechanism [5]. The iteratively according to users’ marginal density, vi /bi , where vi
second category is the critical value-based mechanism in [4] is user i’s marginal value, and bi is its bid. In each iteration, the
where each winner is paid its critical value. The third category user with the largest marginal value will be selected, and if its
consists of threshold-based mechanisms [9, 27, 37–39]. The marginal density is not less than a preset density threshold ρ∗
mechanism in the first category is not Sybil-proof since VCG and its bid does not exceed the stage-budget, it will be selected
auction is proved not Sybil-proof in [34]. Next, we analyze as a winner. In this example, density threshold ρ∗ = 0.5,
the vulnerabilities to Sybil attack for the last two categories. T = 8 and B = 16, and thus the first stage ends at time
slot 1 and the stage-budget in the first stage is 2. The value of
B. Vulnerabilities of Critical Value-based Mechanisms τ1 is 1 and the value of τ2 is 2. In this case, user 1 will not
The mechanism in [4] executes a reverse auction round by be selected since its bid is greater than the stage-budget. Next,
round. In one round of auction, the mechanism sorts all active assume user 1 conducts Sybil attack by submitting two bids
users in a non-decreasing order by their bids. The first mt βi0 = (1, 2, {τ1 }, 2) and βi00 = (2, 2, {τ2 }, 2) under fictitious
users will be selected as winners, where mt is the number of identities 10 and 100 , respectively. In this case, user 10 will win
tasks at time slot t. At last, the payment to each winner i is set with non-negative utility since OMG is individually rational.
to its critical value. Let ti denote the time slot i wins. Winner Therefore, OMG is not Sybil-proof, since a user can increase
i’s critical value is the largest of all the mt -th users’ bids at its utility by changing from a loser to a winner via Sybil attack.
each time slot t ∈ [ti , di ]. It is obvious that at any time slot
t ∈ [ti , di ] in which the mt -th user does not exist, i can submit TABLE II
a higher bid using a fictitious identity to take the mt -th place. E XAMPLE SHOWING VULNERABILITIES TO S YBIL ATTACK
Therefore, i can increase its critical value and thus increase User Bid (ai , di , Γi , bi )
its payment via Sybil attack.
1 (1,2,{τ1 , τ2 }, 4)
2 (2,2,{τ1 }, 2)
C. Vulnerabilities of Threshold-based Mechanisms 3 (3,4,{τ1 }, 3)
Within this category, we further divide the mechanisms into 4 (3,3,{τ2 }, 4)
5 (3,4,{τ1 , τ2 }, 4)
two groups. The first group comprises mechanisms in [9, 37].
These two mechanisms are two-stage mechanisms in which
the first arrived b ne c users are rejected and their bids are used V. SOS: S YBIL -P ROOF O NLINE I NCENTIVE M ECHANISM
as the sample for the next stage, where n is the number of FOR S INGLE -M INDED C ASE
participating users and e is the base of the natural logarithm. In this section, we design and analyze SOS, a Sybil-proof
In the first stage, the largest vi /bi value will be used as a online incentive mechanism for SM case.
2441
IEEE INFOCOM 2018 - IEEE Conference on Computer Communications
2442
IEEE INFOCOM 2018 - IEEE Conference on Computer Communications
Theorem 3: SOS is computationally efficient, individually that Γi0 ∪ Γi00 = Γ̃i . The second inequation is based on
rational, truthful and Sybil-proof in SM case. the 0 fourth property of the cost function. Therefore, we have
t[i ] t[i0 ] t[i00 ]
We prove this theorem with the following lemmas. vi − bi ≥ vi0 − bi0 since vi00 − bi00 ≥ 0. This implies
Lemma 1: SOS is computationally efficient. that i wins at t[i0 ] at the latest while using a single identity.
Due to space limit, we omit the proof for this lemma. Therefore, the first condition in Theorem 1 is satisfied.
Lemma 2: SOS is individually rational. We next prove that SOS satisfies the second condition in
Proof: For any winner i, assume it is selected at time Theorem 1. We know that user i wins at t[i] ≤ t[i0 ]. Let tc ,
slot t[i] with its true bid, i.e., bi = c̃(Γ̃i ). If there exists a t0c and t00c denote the time that determine the payment of i,
winner j at time slot t[i] when i is not in U t[i] , we have i0 and i00 according to (6), respectively. We know that tc ∈
t[i] t[i]
vi − bi ≥ vj − bj ≥ 0 since i was the winner at time [t[i], di ], t0c ∈ [t[i0 ], di0 ], and t00c ∈ [t[i00 ], di00 ] according to
slot t[i]. Then according to Line 7 in Algorithm 2, we have Algorithm 2. We then prove by cases. In Case 1, tc ∈ [t[i0 ], di ]
t[i] t[i] t[i] t0 0
pi ≥ vi −(vj −bj ) ≥ bi . If there is no winner at time slot and t0c ≤ t00c . According to (6), we have pi ≥ vi c − ctc ≥
t[i] 0 00 0
t t
t[i] when i is not in U t[i] , we have pi ≥ vi ≥ bi according vi0c + vi00c − ctc ≥ pi0 + pi00 . The first inequation results from
to Line 10. Therefore, ui = pi − c̃(Γ̃i ) = pi − bi ≥ 0, and 0
the fact tc ∈ [t[i], di ]. The second inequation is based on the
SOS is individually rational. fact Γi0 ∪ Γi000 = Γ̃i . The third 00inequation is based on the
t 0 t
Lemma 3: SOS is truthful. fact pi0 = vi0c − ctc and pi00 ≤ vi00c according to (6). In Case
Proof: We first prove that user i cannot increase its utility 2, tc ∈ [t[i0 ], di ] and t0c > t00c . Similar to Case 1, we can
by submitting a false task set. We then prove that user i cannot t00 00 t0 t00 00
prove that pi ≥ vi c − ctc ≥ vi0c + vi00c − ctc ≥ pi0 + pi00 .
increase its utility by submitting a false active time window In Case 3, tc ∈ [t[i], t[i0 ]). Because tc < t[i0 ], we have pi ≥
or a false cost. If user i submits a false task set Γi ⊂ Γ̃i , the t0 0 t00 00
max{vi c − ctc , vi c − ctc } ≥ pi0 + pi00 based on the proofs of
utility of i is 0 according to (1). On the contrary, if Γi \ Γ̃i 6= ∅,
Case 1 and Case 2. Therefore, we have pi ≥ pi0 + pi00 . Hence,
user i will not be paid since it cannot finish all the tasks in
the second condition in Theorem 1 is satisfied.
Γi . Thus, there is no incentive for i to submit a false task set.
Therefore, SOS is Sybil-proof according to Theorem 1. We
To prove that user i cannot increase its utility by submitting
can use a similar proof for the case where a user pretends
a false active time window or a false cost, it suffices to prove
more than two identities.
that the selection rule of SOS is monotone and the payment
to each winner is its critical value according to Theorem 2. VI. SOM: S YBIL -P ROOF O NLINE I NCENTIVE M ECHANISM
Obviously, the criterion value of a user will increase with the FOR M ULTI -M INDED C ASE
decrease of user’s cost. Meanwhile, due to the submodularity In this section, we design and analyze SOM, a Sybil-proof
of user’s marginal value, the criterion value of a user at each online incentive mechanism for MM case.
time slot will not decrease if it bids a wider active time
window. Therefore, the selection rule of SOS is monotone. A. Design Rationale
Next, we prove that the payment pi to winner i is its critical In MM case, a user is willing to perform any subset of its
value. Assume i was selected at time slot t[i] with bi , and thus task set and tries to maximize its utility by submitting multiple
t[i]
pi = pi ≥ bi . If user i bids b̃i > pi , it is obvious that i still bids under fictitious identities. To guarantee that each user
loses at any time slot t ∈ [ai , t[i]) since its criterion value is submits its true cost function, SOM gives the payment to each
less than that when i bids bi but loses in [ai , t[i]). At any time user, which is independent of its own cost function. The time-
slot t ∈ [t[i], di ], i still loses since there always exists a user truthfulness is based on the monotonic task assignment rule
ij such that vit − b̃i < vitj − bij according to (6). If user i bids and the submodularity of users’ marginal value. To achieve
b̃i < pi , i wins at least within [t[i], di ], according to (6), if not Sybil-proofness, we extend the characterization of Sybil-proof
earlier. Therefore, pi is the critical value for user i. mechanisms in [33] to the online scenario.
Lemma 4: SOS is Sybil-proof.
B. Design of Mechanism
Proof: We prove SOS is Sybil-proof by proving it satisfies
the sufficient conditions in Theorem 1. Assume user i submits The main algorithm of SOM is shown in Algorithm 4. It
(ai0 , di0 , Γi0 , bi0 ) and (ai00 , di00 , Γi00 , bi00 ) using two fictitious selects users iteratively at each time slot until all tasks are
identities i0 and i00 , respectively, where Γi0 ∪ Γi00 = Γ̃i . assigned or deadline T is reached. Given the sensing tasks T
We first prove that SOS satisfies the first condition in The- and deadline T , SOM outputs the overall assignment profile
orem 1. We assume that both i0 and i00 are selected as winner A and the overall payment profile p.
at time t[i0 ] and t[i00 ] ( w.l.o.g. t[i0 ] < t[i00 ]), respectively. It Let Γti ⊆ Γ̃i denote a set of unassigned tasks that i can
implies that Γi0 ⊂ Γ̃i and Γi0 ⊂ Γ̃i , since one0 will make perform at time slot t. Let Bti (B) = {B 0 |B 0 ⊆ Γti , B 0 ∩B 6= ∅}.
the other lose otherwise. In addition, we have vi0 ≥ bi0 and
t[i ] At each time slot t, SOM first calculates the payment pti,B
t[i00 ]
vi00 ≥ bi00 , since both i0 and i00 are winners. If user i use to each active user i for any bundle B ⊆ Γti . Note that the
payment to user i for any bundle B ⊆ Γti is independent of its
a single identity and submits its true bid (ãi , d˜i , Γ̃i , bi ). At
t[i0 ] t[i0 ] t[i00 ] cost function ci (·), i.e.,
time slot t[i0 ], we have vi − bi ≥ vi0 + vi00 − bi ≥
t[i0 ] t[i00 ] pti,B = V (B)−max{0, max (V (B 0 )−cj (B 0 ))}. (7)
vi0 + vi00 − bi0 − bi00 . The first inequation lies in the fact j6=i,B0 ∈Btj (B)
2443
IEEE INFOCOM 2018 - IEEE Conference on Computer Communications
Algorithm 4: SOM(T , T ) SOM only considers Γti for each active user i at any time slot
1 F ← ∅, At ← ∅, ∀t ∈ [1, T ], t ← 1; t. Besides, the size of Γti is non-increasing with time. Thus,
2 while F 6= T and t ≤ T do a narrow time window will not increase a user’s chance to be
3 U t ← the set of active users at time slot t; a winner. Therefore, a user has no incentive to submit a false
4 Γti ← Γi \ F , ∀i ∈ U t ;
5 foreach i ∈ U t do time window.
6 Calculate the payment to i for any bundle B ⊆ Γti , pti,B ← At last, a false cost function ci (·) 6= c̃i (·) can only affect
V (B) − max{0, maxj6=i,B0 ∈Bt (B) (V (B0 ) − cj (B0 ))}; the result of (8) according to SOM. Let Ati and Ãti denote the
j
7 end assignments to i when i submits ci (·) and the true cost function
8 foreach i ∈ U t do
9 Ati ← arg maxB⊆Γt (pti,B − ci (B)); c̃i (·), respectively. It is obvious that the utility of i will not
10 pti ← pti,At ;
i
change if Ati = Ãti . If Ati 6= Ãti , we have pi,Ãt − c̃i (Ãti ) ≥
i
i
11 F ← F ∪ Ati ; pi,Ati − c̃i (Ati ) because of both Ati and Ãti are the subset of
12 end Γti , and Ãti is the bundle maximizing i’s utility. Thus, user i
13 t ← t + 1;
14 end cannot increase its utility by submitting ci (·).
15 A = A1 , . . . AT ); Therefore, SOM is truthful.
16 p = (p1 , . . . , pT );
17 return A and p.
Lemma 7: SOM is Sybil-proof.
Proof: We assume that user i pretends two identities i0
and i00 who are assigned Ai0 and Ai00 , respectively. Let ui (Ai )
At last, SOM will assign each active user i a set of tasks Ati ,
denote the utility of user i when assigned Ai . For any time slot
which is a bundle B ⊆ Γti maximizing its utility based on the
t ∈ [ai , di ], we have ui (Ati ) ≥ ui (Ati0 ∪Ati00 ) since Ati0 ∪Ati00 ⊆
calculated payment, i.e.,
Γti and SOM assigns i the bundle that maximizes its utility.
Ati = arg maxt (pti,B − ci (B)). (8) Next, we prove that ui (Ati0 ∪ Ati00 ) ≥ pti0 + pti00 − ci (Ati0 ∪
B⊆Γi
Ati00 ). Let mi0 denote maxj6=i0 ,B∈Btj (At0 ) (V (B)− cj (B)), and
The payment pti
to each user i at time slot t for assignment i
Ati is pti,At . Note that pti = pti,At = 0, if Ati = ∅. mi00 denote maxj6=i00 ,B∈Btj (At00 ) (V (B) − cj (B)). By (7), the
i
i i payments to i0 and i00 at any time slot t are
C. Analysis of SOM
pti0 = pti0 ,At0 = V (Ati0 ) − max {0, mi0 } ,
In this section, we prove the properties of SOM in the i
its utility is negative according to the second property of the ≤ V (Ati0 ) − (V (Ati00 ) − ci (Ati00 )) − c̃i (Ati0 )
cost function. Therefore, user i has no incentive to submit a + V (Ati00 ) − (V (Ati0 ) − ci (Ati0 )) − ci (Ati00 ) = 0.
false task set.
Next, we prove that user i has no incentive to submit a It implies that Ati0 = Ati00 = ∅ since SOM is individually
false active time window, i.e., ai > ãi or di < d˜i . By (7), rational, which contradicts the assumption. Therefore, Ati0 ∩
2444
IEEE INFOCOM 2018 - IEEE Conference on Computer Communications
Ati00 = ∅. We also have V (Ãti ) = V (Ati0 ∪ Ati00 ) = V (Ati0 ) + from 100 to 300 with a step of 50. All the results are averaged
V (Ati00 ), since Ãti = Ati0 ∪ Ati00 . By (7), the payment to i is over 1000 independent runs.
pti,Ãt = V (Ãti ) − max{0, mi } B. Evaluation of Total Payment
i
≥ V (Ãti ) − (mi0 + mi00 ) The impacts of m and n on the total payment to users
= V (Ati0 ∪ Ati00 ) − (mi0 + mi00 ) are shown in Fig. 2. In Fig. 2 (a), we see that the total
payment of both offline and online mechanisms increase with
= V (Ati0 ) − mi0 + V (Ati00 ) − mi00
the increase of m. This is because the platform may recruit
≥ pti0 ,At0 + pti00 ,At00 . more users when m increase, and thus has a higher payment.
i i
In addition, we have ci (Ãti ) ≤ ci (Ati0 ) + ci (Ati00 ) because of In addition, we see that the total payment of the online
the fourth property of the cost function. By (2) and (5), the mechanisms (Greedy, SOS, SOM) are higher than that of the
utility of i when using two identities is not greater than that offline mechanisms (SPIM-S, SPIM-M). This is because the
obtained by using a single identity at any time slot t. User online mechanisms may recruit more users when users arrives
i’s utility via Sybil attack is not greater than that obtained by in different time slots, and thus has a higher payment. In
using a single identity. Fig. 2 (b), we observe that the total payment of SPIM-M
Therefore, SOM is Sybil-proof. decrease with the increase of n. This is because, with more
Remark: We can use a proof similar to that in Lemma 7 to users, SPIM-M may find more low-cost users to perform the
prove that Ai ∩ Aj = ∅ for any two users i and j. In addition, tasks. The total payment of the other four mechanisms increase
SOM does not satisfy computational efficiency, since at each slightly with the increase of n. This is because, with more
time slot t it calculates the payments to each active user i for users, these mechanisms may assign more tasks incurring a
every subset of Γti , and the time complexity is exponential to higher payment. In addition, we see that the total payment
the largest |Γti | for all i ∈ S t . In reality, however, the number of the online mechanisms are higher than that of the offline
of tasks each user can perform is very small because of various mechanisms as explained before. Note that, SOS has a similar
constraints, e.g., travel budget [21], and thus the execution time performance as Greedy, which is not Sybil-proof.
of SOM is still practical. 120 130 SOS
Total payment
Greedy
Total payment
100 SPIM-S
VII. P ERFORMANCE E VALUATION 80 100 SOM
SPIM-M
60
In this section, we compare the performances of SOS and SOS
Greedy 70
40 SPIM-S
SOM
SOM with three benchmarks. The first benchmark is an online 20
SPIM-M
40
20 30 40 50 60 100 150 200 250 300
mechanism adapted from [4] for SM case, denoted by Greedy. Number of sensing tasks Number of users
Note that, this mechanism is not Sybil-proof. The second (a) Impact of m (b) Impact of n
Fig. 2. Total payment
benchmark is SPIM-S [16], which is a Sybil-proof mechanism
for SM case. The third benchmark is SPIM-M [16], which C. Evaluation of Platform Utility
is a Sybil-proof mechanism for MM case. The performance
metrics include total payment, platform utility and Sybil- The impacts of m and n on the platform utility are shown
proofness. in Fig. 3. In both Fig. 3 (a) and Fig. 3 (b), we see that the
platform utilities achieved by the offline mechanisms (SPIM-S,
A. Evaluation Setup SPIM-M) are larger than that achieved by online mechanisms
For a fair comparison with SPIM-S and SPIM-M, we use (Greedy, SOS, SOM). This is because offline mechanisms
the same dataset, which is a real-world dataset consisting know all users’ bids before making decision, while online
of the traces of taxi drivers [1]. As in [16], we consider a mechanisms have no information of future users. In addition,
crowdsensing system in which the tasks are measuring the we see that SOM outperforms SOS in term of the platform
Wi-Fi signal strength at specific locations. In this system, tasks utility. This is because SOM assigns each task to at most one
are represented by GPS locations of the taxi drivers in the user, and thus avoids paying users to perform duplicated tasks.
dataset, and users are all the taxi drivers. 50 SOS 25 SOS
In our evaluation, we randomly select locations on taxi Greedy
Platform utility
Greedy
Platform utility
40 SPIM-S 20 SPIM-S
SOM SOM
drivers’ traces as the sensing tasks. The value of each task 30 SPIM-M
15 SPIM-M
is uniformly distributed over [1, 5], and users’ cost for each 20 10
10 5
task is uniformly distributed over [1, 5]. We set the deadline
0 0
(T ) to 60 (min), each user i’s ãi is uniformly distributed over 20 30 40 50 60 100 150 200 250 300
Number of sensing tasks Number of users
[0, 60], and the active time window (d˜i − ãi ) of each user is (a) Impact of m (b) Impact of n
uniformly distributed over [0, 5]. To evaluate the impact of the Fig. 3. Platform utility
number of sensing tasks (m) on the performance metrics, we
fix the number of users (n) at 200 and vary m from 20 to 60 D. Evaluation of Sybil-proofness
with a step of 10. To evaluate the impact of the number of Fig. 4 shows the utility of Sybil attacker and the other users
users on the performance metrics, we fix m at 150 and vary n without Sybil attack, denoted by Attacker and Other, and that
2445
IEEE INFOCOM 2018 - IEEE Conference on Computer Communications
via Sybil attack, denoted by Attacker-Sybil and Other-Sybil. In [15] I. Koutsopoulos, “Optimal incentive-driven design of participatory sens-
both Fig. 4 (a) and Fig. 4 (b), we see that the attacker increase ing systems,” in INFOCOM, 2013, pp. 1402–1410.
[16] J. Lin, M. Li, D. Yang, G. Xue, and J. Tang, “Sybil-proof incentive
its utility while decreasing the utility of others’ in Greedy. This mechanisms for crowdsensing,” in INFOCOM, 2017, pp. 2088–2096.
is because Greedy is vulnerable to Sybil attack. However, the [17] J. Lin, D. Yang, M. Li, J. Xu, and G. Xue, “BidGuard: A framework for
attacker cannot increase its utility in SPIM-S, SOS and SOM, privacy-preserving crowdsensing incentive mechanisms,” in CNS, 2016,
pp. 439–447.
since they are Sybil-proof. [18] M. Mun, S. Reddy, K. Shilton, N. Yau, J. Burke, D. Estrin, M. Hansen,
E. Howard, R. West, and P. Boda, “Peir, the personal environmental
10 Attacker
15 Attacker
impact report, as a platform for participatory sensing systems research,”
Attacker-Sybil Attacker-Sybil
8 Other Other in MobiSys, 2009, pp. 55–68.
Other-Sybil Other-Sybil
10 [19] “Opensignal,” http://opensignal.com/.
6
Utility
Utility
[20] D. Peng, F. Wu, and G. Chen, “Pay as how well you do: A quality based
4 incentive mechanism for crowdsensing,” in MobiHoc, 2015.
5
2 [21] L. Pournajaf, L. Xiong, V. Sunderam, and S. Goryczka, “Spatial task
assignment for crowd sensing with cloaked locations,” in MDM, vol. 1,
0 0
Greedy SOS SPIM-S Greedy SOM 2014, pp. 73–82.
(a) Single-minded case (b) Multi-minded case [22] R. K. Rana, C. T. Chou, S. S. Kanhere, N. Bulusu, and W. Hu, “Ear-
Fig. 4. Sybil-proofness phone: an end-to-end participatory urban noise mapping system,” in
IPSN, 2010, pp. 105–116.
VIII. C ONCLUSION [23] B. Viswanath, A. Post, K. P. Gummadi, and A. Mislove, “An analysis of
social network-based sybil defenses,” in SIGCOMM, 2010, pp. 363–374.
In this paper, we demonstrated that existing online in- [24] B. Wang, L. Zhang, and N. Z. Gong, “SybilSCAR: Sybil detection in
centive mechanisms for crowdsensing are all vulnerable to online social networks via local rule based propagation,” in INFOCOM,
2017, pp. 1099–1107.
Sybil attack. We proposed two Sybil-proof online incentive [25] G. Wang, B. Wang, T. Wang, A. Nika, H. Zheng, and B. Y. Zhao,
mechanisms SOS and SOM for single-minded case and multi- “Defending against sybil devices in crowdsourced mapping services,”
minded case, respectively. Specifically, SOS achieves computa- in MobiSys, 2016, pp. 179–191.
[26] Q. Wang, B. Ye, B. Tang, S. Guo, and S. Lu, “eBay in the clouds: False-
tional efficiency, individual rationality, truthfulness and Sybil- name-proof auctions for cloud resource allocation,” in ICDCS, 2015, pp.
proveness. SOM achieves individual rationality, truthfulness 153–162.
and Sybil-proveness. We rigorously proved the desired prop- [27] Y. Wang, Z. Cai, G. Yin, Y. Gao, X. Tong, and G. Wu, “An incentive
mechanism with privacy protection in mobile crowdsourcing systems,”
erties of the mechanisms and evaluated their performances Computer Networks, vol. 102, pp. 157–171, 2016.
through extensive simulations. [28] “Waze,” https://www.waze.com/.
[29] Y. Wen, J. Shi, Q. Zhang, X. Tian, Z. Huang, H. Yu, Y. Cheng, and
R EFERENCES X. Shen, “Quality-driven auction based incentive mechanism for mobile
[1] L. Bracciale, M. Bonola, P. Loreti, G. Bianchi, R. Amici, and A. Rabuffi, crowd sensing,” IEEE Trans. Veh. Technol., vol. 64, no. 9, pp. 4203–
“CRAWDAD data set roma/taxi (v. 2014-07-17),” Downloaded from 4214, 2015.
http://crawdad.org/roma/taxi/, Jul. 2014. [30] J. Xu, J. Xiang, and D. Yang, “Incentive mechanisms for time win-
[2] J. R. Douceur, “The sybil attack,” in IPTPS, 2002, pp. 251–260. dow dependent tasks in mobile crowdsensing,” IEEE Transactions on
[3] Z. Feng, Y. Zhu, Q. Zhang, L. M. Ni, and A. V. Vasilakos, “TRAC: Wireless Communications, vol. 14, no. 11, pp. 6353–6364, 2015.
Truthful auction for location-aware collaborative sensing in mobile [31] D. Yang, G. Xue, X. Fang, and J. Tang, “Crowdsourcing to smartphones:
crowdsourcing,” in INFOCOM, 2014, pp. 1231–1239. incentive mechanism design for mobile phone sensing,” in MobiCom,
[4] Z. Feng, Y. Zhu, Q. Zhang, H. Zhu, J. Yu, J. Cao, and L. M. Ni, 2012, pp. 173–184.
“Towards truthful mechanisms for mobile crowdsourcing with dynamic [32] D. Yang, G. Xue, X. Fang, and J. Tang, “Incentive mechanisms for
smartphones,” in ICDCS, 2014, pp. 11–20. crowdsensing: Crowdsourcing with smartphones,” IEEE/ACM Trans.
[5] L. Gao, F. Hou, and J. Huang, “Providing long-term participation Netw., vol. 24, no. 3, pp. 1732–1744, 2016.
incentive in participatory sensing,” in INFOCOM, 2015, pp. 2803–2811. [33] M. Yokoo, “Characterization of strategy/false-name proof combinatorial
[6] “Gigwalk,” http://www.gigwalk.com/. auction protocols: price-oriented, rationing-free protocol,” in IJCAI,
[7] B. Guo, Z. Wang, Z. Yu, Y. Wang, N. Y. Yen, R. Huang, and X. Zhou, 2003, pp. 733–742.
“Mobile crowd sensing and computing: The review of an emerging [34] M. Yokoo, Y. Sakurai, and S. Matsubara, “The effect of false-name bids
human-powered sensing paradigm,” ACM Computing Surveys, vol. 48, in combinatorial auctions: New fraud in internet auctions,” Games and
no. 1, p. 7, 2015. Economic Behavior, vol. 46, no. 1, pp. 174–188, 2004.
[8] K. Han, Y. He, H. Tan, S. Tang, H. Huang, and J. Luo, “Online pricing [35] Q. Zhang, Y. Wen, X. Tian, X. Gan, and X. Wang, “Incentivize crowd
for mobile crowdsourcing with multi-minded users,” in MobiHoc, 2017, labeling under budget constraint,” in INFOCOM, 2015, pp. 2812–2820.
pp. 18:1–18:10. [36] X. Zhang, G. Xue, R. Yu, D. Yang, and J. Tang, “Truthful incentive
[9] K. Han, C. Zhang, J. Luo, M. Hu, and B. Veeravalli, “Truthful scheduling mechanisms for crowdsourcing,” in INFOCOM, 2015, pp. 2830–2838.
mechanisms for powering mobile crowdsensing,” IEEE Trans. Comput., [37] X. Zhang, Z. Yang, Z. Zhou, H. Cai, L. Chen, and X. Li, “Free market of
vol. 65, no. 1, pp. 294–307, 2016. crowdsourcing: Incentive mechanism design for mobile sensing,” IEEE
[10] L. G. Jaimes, I. Vergara-Laurens, and A. Raij, “A crowd sensing incen- Trans. Parallel Distrib. Syst., vol. 25, no. 12, pp. 3190–3200, 2014.
tive algorithm for data collection for consecutive time slot problems,” [38] D. Zhao, X.-Y. Li, and H. Ma, “How to crowdsource tasks truthfully
in LATINCOM, 2014, pp. 1–5. without sacrificing utility: Online incentive mechanisms with budget
[11] H. Jin, L. Su, D. Chen, K. Nahrstedt, and J. Xu, “Quality of information constraint,” in INFOCOM, 2014, pp. 1213–1221.
aware incentive mechanisms for mobile crowd sensing systems,” in [39] D. Zhao, X.-Y. Li, and H. Ma, “Budget-feasible online incentive mech-
MobiHoc, 2015, pp. 167–176. anisms for crowdsourcing tasks truthfully,” IEEE/ACM Trans. Netw.,
[12] H. Jin, L. Su, B. Ding, K. Nahrstedt, and N. Borisov, “Enabling privacy- vol. 24, no. 2, pp. 647–661, 2016.
preserving incentives for mobile crowd sensing systems,” in ICDCS, [40] Z. Zheng, Y. Peng, F. Wu, S. Tang, and G. Chen, “An online pricing
2016, pp. 344–353. mechanism for mobile crowdsensing data markets,” in MobiHoc, 2017,
[13] H. Jin, L. Su, and K. Nahrstedt, “Theseus: Incentivizing truth discovery pp. 26:1–26:10.
in mobile crowd sensing systems,” in MobiHoc, 2017, pp. 1:1–1:10.
[14] H. Jin, L. Su, H. Xiao, and K. Nahrstedt, “INCEPTION: incentivizing
privacy-preserving data aggregation for mobile crowd sensing systems,”
in MobiHoc, 2016, pp. 341–350.
2446