Trust-based Multi-Objective Optimization for Node-to-Task Assignment in Coalition Networks 1 Jin-Hee Cho, Ing-Ray Chen, Yating Wang, and Kevin S. Chan.

Slides:



Advertisements
Similar presentations
Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Presented by: Vijay Kumar.
Advertisements

Supporting Cooperative Caching in Disruption Tolerant Networks
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
ECE 667 Synthesis and Verification of Digital Circuits
Hadi Goudarzi and Massoud Pedram
Resource Management §A resource can be a logical, such as a shared file, or physical, such as a CPU (a node of the distributed system). One of the functions.
Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
1 Performance Char’ of Region- Based Group Key Management --- in Mobile Ad Hoc Networks --- by Ing-Ray Chen, Jin-Hee Cho and Ding-Chau Wang Presented by.
Seminar In Game Theory Algorithms, TAU, Agenda  Introduction  Computational Complexity  Incentive Compatible Mechanism  LP Relaxation & Walrasian.
Gossip Scheduling for Periodic Streams in Ad-hoc WSNs Ercan Ucan, Nathanael Thompson, Indranil Gupta Department of Computer Science University of Illinois.
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
OPTIMIZATION Lecture 24. Optimization Uses sophisticated mathematical modeling techniques for the analysis Multi-step process Provides improved benefit.
1 Sensor Relocation in Mobile Sensor Networks Guiling Wang, Guohong Cao, Tom La Porta, and Wensheng Zhang Department of Computer Science & Engineering.
1 Stochastic Event Capture Using Mobile Sensors Subject to a Quality Metric Nabhendra Bisnik, Alhussein A. Abouzeid, and Volkan Isler Rensselaer Polytechnic.
1 Prediction-based Strategies for Energy Saving in Object Tracking Sensor Networks Yingqi Xu, Wang-Chien Lee Proceedings of the 2004 IEEE International.
Improving Market-Based Task Allocation with Optimal Seed Schedules IAS-11, Ottawa. September 1, 2010 G. Ayorkor Korsah 1 Balajee Kannan 1, Imran Fanaswala.
GridFlow: Workflow Management for Grid Computing Kavita Shinde.
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
Three heuristics for transmission scheduling in sensor networks with multiple mobile sinks Damla Turgut and Lotzi Bölöni University of Central Florida.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
© 2008 Prentice Hall11-1 Introduction to Project Management Chapter 11 Managing Project Execution Information Systems Project Management: A Process and.
Project Execution.
Effect of Intrusion Detection on Reliability Jin-Hee Cho, Member, IEEE, Ing-Ray Chen, Member, IEEE, and Phu-Gui Feng IEEE TRANSACTIONS ON RELIABILITY,
Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho Communications.
MAXIMIZING SPECTRUM UTILIZATION OF COGNITIVE RADIO NETWORKS USING CHANNEL ALLOCATION AND POWER CONTROL Anh Tuan Hoang and Ying-Chang Liang Vehicular Technology.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Wei Gao1 and Qinghua Li2 1The University of Tennessee, Knoxville
Topology aggregation and Multi-constraint QoS routing Presented by Almas Ansari.
ANTs PI Meeting, Nov. 29, 2000W. Zhang, Washington University1 Flexible Methods for Multi-agent distributed resource Allocation by Exploiting Phase Transitions.
Lecture 11 Managing Project Execution. Project Execution The phase of a project in which work towards direct achievement of the project’s objectives and.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Cardei, M.; Jie Wu; Mingming Lu; Pervaiz, M.O.; Wireless And Mobile.
1 Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Fenye Bao, Ing-Ray Chen,
Energy Efficient Phone-to-Phone Communication Based on WiFi Hotspots in PSN En Wang 1,2, Yongjian Yang 1, and Jie Wu 2 1 Dept. of Computer Science and.
1 Exploring Custom Instruction Synthesis for Application-Specific Instruction Set Processors with Multiple Design Objectives Lin, Hai Fei, Yunsi ACM/IEEE.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
A Distributed Coordination Framework for Wireless Sensor and Actor Networks Tommaso Melodia, Dario Pompili, Vehbi C.Gungor, Ian F.Akyildiz (MobiHoc 2005)
1 S ystems Analysis Laboratory Helsinki University of Technology Flight Time Allocation Using Reinforcement Learning Ville Mattila and Kai Virtanen Systems.
Resource Mapping and Scheduling for Heterogeneous Network Processor Systems Liang Yang, Tushar Gohad, Pavel Ghosh, Devesh Sinha, Arunabha Sen and Andrea.
Mobile Agent Migration Problem Yingyue Xu. Energy efficiency requirement of sensor networks Mobile agent computing paradigm Data fusion, distributed processing.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
Introducing Project Management Update December 2011.
Real-Time Support for Mobile Robotics K. Ramamritham (+ Li Huan, Prashant Shenoy, Rod Grupen)
STUMP: Exploiting Position Diversity in the Staggered TDMA Underwater MAC Protocol Kurtis Kredo II, Petar Djukic, Prasant Mohapatra IEEE INFOCOM 2009.
J.-H. Cho, I.-R. Chen, M. Eltoweissy ACM/Springer Wireless Networks, 2007 Presented by: Mwaffaq Otoom CS5214 – Spring © 2007 On optimal batch re-keying.
Ahmad Salam AlRefai.  Introduction  System Features  General Overview (general process)  Details of each component  Simulation Results  Considerations.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
MITRE 7 April 2009 CS 5214 Presenter: Phu-Gui Feng Performance Analysis of Distributed IDS Protocols for Mobile GCS Dr. Jin-Hee Cho, Dr. Ing-Ray Chen MITRE.
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
Authors: Ing-Ray Chen and Ding-Chau Wang Presented by Chaitanya,Geetanjali and Bavani Modeling and Analysis of Regional Registration Based Mobile Service.
DEPARTMENT/SEMESTER ME VII Sem COURSE NAME Operation Research Manav Rachna College of Engg.
Learning for Physically Diverse Robot Teams Robot Teams - Chapter 7 CS8803 Autonomous Multi-Robot Systems 10/3/02.
Multi-Objective Optimization for Topology Control in Hybrid FSO/RF Networks Jaime Llorca December 8, 2004.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Efficient Point Coverage in Wireless Sensor Networks Jie Wang and Ning Zhong Department of Computer Science University of Massachusetts Journal of Combinatorial.
Certificate IV in Project Management Assessment Outline Course Number Qualification Code BSB41507.
Certificate IV in Project Management Assessment Outline Course Number Qualification Code BSB41507.
Optimally Modifying Software for Safety and Functionality Sampath Kannan U.Penn (with Arvind Easwaran & Insup Lee)
Chapter 3 Project Management Parts of this presentation is extracted from Ian Sommerville’s slides located at
Mingze Zhang, Mun Choon Chan and A. L. Ananda School of Computing
Presented by Edith Ngai MPhil Term 3 Presentation
Trust-based Service Composition and Binding with Multiple Objective Optimization in Service- Oriented Mobile Ad Hoc Networks Yating Wang†, Ing-Ray Chen†,
A Study of Group-Tree Matching in Large Scale Group Communications
System Control based Renewable Energy Resources in Smart Grid Consumer
Market-based Dynamic Task Allocation in Mobile Surveillance Systems
Presentation transcript:

Trust-based Multi-Objective Optimization for Node-to-Task Assignment in Coalition Networks 1 Jin-Hee Cho, Ing-Ray Chen, Yating Wang, and Kevin S. Chan Presented by Jia Guo

Outline Introduction System Model Task Assignment Protocol Task Assignment Problem Numerical Results And Analysis Conclusions 2

Introduction –Scenario –Objective –Contributions 3

Introduction Scenario –Tactical networks deployed to support military missions, disaster management, and/or emergency situations, often require forming a temporary coalition in order to execute a given mission where effective and efficient asset-task assignment is critical to mission success. –Under a global objective of completing the mission successfully, the network or system may have multiple objectives to achieve, with participating parties seeking to maximize their own utilities. –Multi-objective optimization (MOO) problems 4

Introduction Objective –Identify an optimal solution of multiple task assignments to entities with diverse capabilities/characteristics to meet the multiple objectives. Identifying the optimal set of members for each task team is the key to solving this problem. 5

Introduction Contribution the first to solve a MOO problem dealing with multiple, concurrent and dynamic coalition formations (task assignments) using a composite trust metric based on multiple trust dimensions. this work proposes and analyzes a new design concept of trust-based MOO by computing risk based on assessed trust levels to screen task team members for node-to-task assignment. the three objectives preserve both individual welfare in terms of maximizing utilization, and global welfare in terms of maximizing mission completion ratio and minimizing extra delay to task completion. perform a comparative analysis of heuristic ranking-based member selection strategy with both a non-trust baseline scheme through simulation study as well as an optimal solution implemented with the Integer Linear Programming (ILP) technique, to demonstrate the effectiveness of their approach. 6

System Model Node Model Trust Metric Network Model Task Model System Objectives 7

System Model Node Model –M node types, NT 1, …, NT M, ordered such that a higher node type has more capability than a lower node type. –A node with a higher node type involving human also has more trust dimensions than a node with a lower type node. –When not involved in a task, random mobility model. –Each node can monitor its neighboring nodes, with detection error specified by false positive and false negative probabilities. –Nodes may be malicious, 8

System Model Trust Metric –Social Connectedness (SC) –Reciprocity (R) –Competence (C) –Integrity (I) 9

System Model –the indirect trust which is computed by the average of valid recommendations (trust values) received in that interval. –If no fresh evidence is available, the trust component is merely the discounted prior estimate, –optimal trust parameter setting to minimize the discrepancy between measured trust and actual trust. 10

System Model Network Model a mission-oriented tactical network where stationary (i.e., sensors) and/or mobile nodes communicate through multiple hops. a hierarchical structure to execute a mission consisting of multiple tasks. –A commander node (CN) governs the mission team. Under the CN, multiple task leaders (TLs) lead task teams. –The CN selects TLs at the beginning of network deployment based on the trustworthiness of nodes known to CN a priori and the TLs recruit regular members (RMs) based on periodic dynamic trust assessment. –A group key is used for communications among members to prevent outside attackers. 11

System Model Task Model –Required node type (NT m ) –Required number of nodes (N m ) –Minimum trust threshold –Importance (I m ) –Urgency (UR m ) –Difficulty (DF m ) A task is regarded as successful if it is completed within its deadline, defined by: 12

System Model System Objectives (1) 13

System Model System Objectives (2) 14

System Model System Objectives (3) 15

System Model System Objectives 16

Task Assignment Protocol Advertisement of Task Specification Member Selection Task Failure Trust Reward and Penalty 17

Task Assignment Protocol Advertisement of Task Specification –The task specification disseminated during the auction process includes a set of requirements for task execution specified by: 18

Task Assignment Protocol –An individual node aims to maximize its privilege to access network resources by maintaining its trusted status as a member of the mission team. –The payoff considers the busy time for executing a task (i.e., utilization), the task importance and the role of a node (i.e., a TL role gives a higher role score than a RM). 19

Task Assignment Protocol Member Selection –The inclusion of node j in task m involves a risk, that is linear in urgency but exponential in the trust factor. –If sufficient members are not found, TL can re-advertise the task at the next trust update interval when the node’s trust values are updated, assuming that the task can be scheduled to execute to completion before deadline. Otherwise, the task is assumed to have failed. 20

Task Assignment Protocol Task Failure –an appropriate team could not be formed. –the team has too many untrustworthy nodes 21

Task Assignment Protocol Trust Reward and Penalty –Based on result of task completion or failure 22

Task Assignment Problem The node-task optimization problem to maximize P MOO is combinatorial and NP-complete. This means that the optimization problem is not polynomially solvable in runtime. Suppose that all tasks are known a priori – what is the best possible performance? We can formulate this as ILP problem [1] which searches for the best solution that satisfies the constraints and maximizes P MOO for node-to-task assignment. 23

Task Assignment Problem 24

Task Assignment Problem 25

Task Assignment Problem The ILP will try all possible combinations of w j,m for all j, m’s such that is maximized. The first constraint specifies that for any two concurrent tasks, a node can only be assigned to one of them for execution. However, a node needs not at all be assigned to either task. The second constraint specifies that the required number of qualified nodes must be assigned to task m. The third constraint specifies that a node assigned to task m must be of the required type or higher (more capable). 26

Task Assignment Problem Two other member selection strategies compared with ILP. –Non-trust-based selection: TLs do not use any trust/risk analysis to select members. The TL of task m selects N m members randomly among all bidders with qualified node type. –Ranking-based selection: TLs select members based on trust-based risk analysis discussed in Section IV.B. Top nodes with the lowest risk are selected as members. 27

Numerical Results And Analysis 28

Numerical Results And Analysis 29

Numerical Results And Analysis 30

Numerical Results And Analysis 31

Numerical Results And Analysis 32

Numerical Results And Analysis 33

Numerical Results And Analysis 34

Conclusions We developed a ranking-based member selection scheme which trades off complexity for performance. The results demonstrate that our scheme has low complexity and yet can achieve performance comparable to that of the optimal solution by ILP and can significantly outperform random selection. 35