Abstract

Federated learning (FL) has shown promise in smart industries as a means of training machine-learning models while preserving privacy. However, it contradicts FL’s low communication latency requirement to rely on the cloud to transmit information with data owners in model training tasks. Furthermore, data owners may not be willing to contribute their resources for free. To address this, we propose a single contract to dual contract approach to incentivize both model owners and workers to participate in FL-based machine learning tasks. The single-contract incentivizes model owners to contribute their model parameters, and the dual contract incentivizes workers to use their latest data to participate in the training task. The latest data draw out the trade-off between data quantity and data update frequency. Performance evaluation shows that our dual contract satisfies different preferences for data quantity and update frequency, and validates that the proposed incentive mechanism is incentive compatible and flexible.

1. Introduction

In recent years, the rise of the Industrial Internet of Things (IIoT) [1] and relevant intelligent technologies such as deep learning (DL) [2] algorithms have ushered in innovative changes and development opportunities for smart industries. Consequently, the deployment of the IIoT is becoming increasingly popular for various applications, e.g., smart grid [3], logistics [4], and healthcare [5].

IIoT integrates various technologies to digitally transform manufacturing and service operations. In 2020, Liu et al. [6] proposed a novel tracker based on response region reliability with edge computing, which achieved accurate and fast tracking with high reliability in IIoT applications. Then, considering security concerns while bringing computing power to the edge of industrial systems, Houda et al. [7] designed a novel MEC-based framework to secure IIoT applications using FL. Feng et al. [8] proposed a trustworthy self-healing scheme based on blockchain and digital twin and implemented trustworthy self-healing in the edge AI-enabled IIoT environment. Recently, IIoT has become a core component of smart applications, which can capture various valuable events and objects. Rahman et al. [9] proposed an AI-enabled IIoT to automate event management in smart cities. Farahani and Monsefi [10] combined multiparty technologies, privacy-enhancing techniques, and AI to further facilitate the industrial data economy and innovation process.

DL algorithms require substantial amounts of data to outperform traditional methods in model training. Furthermore, restricted by regulations such as the General Data Protection Regulation (GDPR) [11], they are also reluctant to share data. Federated learning (FL) [12] as an emerging technology came into being in IIoT, where different model owners collaborate by sharing their gradients instead of raw data, thereby preserving privacy. FL is a technique that can train statistical models using data distributed over remote devices or siloed data centers while keeping data localized and preserving privacy. By leveraging the diversity and heterogeneity of data from different parties, FL can train a model that has more generalization ability and adaptability, thus improving the model’s performance and reliability. Additionally, the hierarchical computing architecture [13] has been proposed to enhance data transmission efficiency between the cloud and the terminal. In the hierarchical computing architecture, edge devices transmit data to the cloud through the nearest edge node, thereby reducing the number of communications for global aggregation and updates between terminal devices and remote cloud servers, energy consumption during communication, and latency.

Traditionally, FL research usually involves the model owner issuing model training tasks to workers and motivating them to participate through a single contract, i.e., the user contribution in the contract is related to only one independent variable. Workers only collect information when requested, and their contributions are only relevant to the data quantity. However, in many real-time tasks, service latency may be unbearable, requiring frequent data caching and updates to maintain data freshness. This trade-off between data quantity and data update frequency is under-explored. For example, disaster prediction in the mining industry relies on up-to-date information to prevent safety hazards [14].

In addition, when a model owner manages the trade-off between data quantity and data update frequency, it can create an incentive mismatch with the worker. For example, the model owner may prefer a large data quantity to ensure optimal model performance, but the collection expense such as energy consumption incurred in data collection and data storage in caching may be prohibitive for the worker. So, a uniform reward allocation may not result in optimal utility for both parties, as the model owner may lack information about the worker’s unit cost of data collection.

Therefore, we propose an FL-based hierarchical incentive mechanism that utilizes a single contract to dual contract task-aware model. Our mechanism utilizes a single contract to incentivize model owners to collect gradients and a dual contract to motivate workers to perform both data collection and updates. We design the dual contract to flexibly adjust the different preferences of requesters regarding data quantity and update frequency. When data quantity is more important, the contract can be designed to motivate workers to collect more data. When data update frequency is more important, the contract can be designed to encourage more frequent updates. Through the self-revealing mechanism of contract theory, workers and model owners can maximize their utility by choosing the contract that best suits their needs. The contributions of this paper can be summarized as follows:(i)We propose a new approach for federated learning that addresses the challenges of data quality in the context of edge computing. Specifically, we use a single contract to dual contract structure that enables a three-way collaboration between model owners, workers, and requesters. This approach assesses data quality through two different aspects: data quantity and data update frequency.(ii)We utilize the self-revealing and weighting characteristics of the dual contract-theoretic incentive mechanism design to incentive worker. Specifically, the model owners can adjust the proportion of data quantity and data update frequency in their dual contracts according to their preferences of single-contract requesters. The self-revealing mechanism of the contract allows workers to maximize their benefits when choosing a contract that suits them. So the approach can justly compensate workers for the costs associated with data collection and updating.(iii)We show that model owners can calibrate to suit the varying preferences for data quantity and data update frequency in the dual contract according to their willingness to participate in the single contract. This flexibility in calibration enables model owners to strike a balance between maximizing the quality of the data set and minimizing their own resource usage and workload, ultimately promoting a more effective and efficient federated learning process.

The paper is structured as follows. Section 2 discusses the related works, Section 3 presents the system model and problem formulation, Section 4 formulates the contract design, Section 5 discusses the performance evaluation, and Section 6 concludes the paper.

The percentage of studies involving Industrial Internet of Things (IIoT) applications has significantly increased in recent years, including in the areas of smart grids [15] and supply chains [16]. The former investigates the use of IIoT to improve task resilience in the event of accidents, while the latter explores the potential of IIoT to enhance task efficiency. In particular, the study presented in [17] proposes a cloud-based solution for detecting patients in their homes.

The above studies usually assume that machine learning models are trained in an ideal environment, which is not always the case. Thus, it is necessary to investigate decentralized learning schemes, such as federated learning (FL), for industrial applications. FL was designed to enable efficient machine learning among multiple computing nodes while ensuring data owner privacy and security. In the context of FL, a privacy-preserving Byzantine-robust federated learning (PBFL) scheme based on blockchain was proposed in [18], which achieves convergence and provides privacy protection on different datasets. Additionally, a compressed and privacy-preserving FL scheme in deep neural network (DNN) architecture was proposed in [19] to address the curse of dimensionality in FL.

FL has developed successful applications in various fields, including autonomous driving car [20] and smart home [21]. In particular, the study in [22] enabled the FL-based differential privacy algorithm to enhance the privacy level of the feature in smart healthcare. Influenced by transmission efficiency, the implementation of the data transmission architecture has changed from the initial central server to the edge server, which provides edge computing [23] services locally to meet the demands of real time, security, and privacy preservation. As such, the study in [24] proposes a hierarchical edge-cloud framework to reduce the system resource requirements and data transmission time, to satisfy efficient storage and rapid response.

However, existing works have primarily focused on user privacy preservation or efficient problem-solving, rather than incentive mechanism design. With the popularization of FL tasks, designing an incentive mechanism to encourage data owners to participate in FL has become increasingly important. He et al. [25] propose a game theory-based incentive mechanism for collaborative security of FL in an energy blockchain environment, which can discourage nodes from taking malicious behaviors in iterative training of FL. Chen et al. [26] devise a multifactor reward function based on reputation, model accuracy, and reward rate, which ensures that data owners with a high reputation and high model accuracy will receive more rewards. The study in [27] selected users with bids and contributions through a reverse auction mechanism. Reputation was integrated into incentives in studies such as [28]. The study in [29] used deep reinforcement learning to design a learning-based incentive mechanism.

Currently, the contract theory approach of FL has been well explored in the literature. Xu et al. [30] present a contract-based dynamically federated learning optimized personal deep learning scheme, which enabled edge devices to reach a consensus on the optimal weights of personalized models. Also, the study in [31] designed a multidimensional contract approach. The study in [32] jointly considered data quality and computation effort. Privacy concerns have led to the emergence of contracts that incorporate privacy cost considerations, such as in the study presented in [33]. The study in [34] designed a two-period incentive mechanism that allowed for extension to multi-periods. Li et al. [35] develop a novel incentive-based federated learning framework, where a contract-based reputation mechanism and a Stackelberg-based interclient incentive mechanism are incorporated. Chen et al. [36] propose a contract-based edge-assisted federated learning model-sharing incentive mechanism, which maximize the EFL model consumers’ profit and ensure the quality of training services. Feng et al. [37] incorporate local differential privacy into contract theory-based private data trading to support personalized privacy preferences. However, most of these incentive mechanisms consider worker contribution based on the data quantity without focusing on data updates in FL.

According to the work of [38], the age of information (AoI) has been considered in FL tasks, and a hierarchical incentive mechanism framework has been proposed in [39] to improve the efficiency between cloud and terminal. In this paper, we propose an FL-based single contract to dual contract hierarchical incentive mechanism that introduces a dual contract to solve the worker data multifaceted issue contribution problem. We model data quantity along with data update frequency to design incentives that take into account worker effort and appropriate profit. By adding the hierarchical framework, we aim to improve the efficiency of the federated learning task.

Table 1 provides a comparison of the prominent features of this paper’s incentive mechanism with other studies discussed in this paper.

3. System Model and Problem Formulation

3.1. System Model

Our system model consists of requester, model owner, and worker. The requester publishes its model training task requirements to the model owner through the corresponding platform and associates with them by the contract. The model owner completes the tasks by collecting relevant gradients from the worker who has signed contracts with them, and workers train the model on data in response to tasks. The specific details are given in Figure 1.

Our federated learning model is based on a three-tiered architecture of terminal-to-edge-to-cloud. When uploading parameters at the terminal, they are not directly transmitted to the cloud server. Instead, the parameters are first subjected to edge aggregation on the edge server located at the network edge and close to the terminal device. Among these, the edge nodes in the blockchain will select the most reputable ones as the consensus committee to check the gradient parameters uploaded by the edge devices, and a leader is responsible for collecting qualified gradient parameters. Then, the edge-aggregated parameters are uploaded to the cloud server for global model aggregation and updating. When uploading global parameters to the cloud, they are not directly transmitted to the terminal. Instead, the global parameters are first subjected to edge on the edge server located at the network edge and close to the terminal device. Subsequently, the global parameters are transmitted from the edge server to the terminal. Unlike the traditional terminal-to-cloud architecture, our architecture performs edge aggregation at the edge layer, reducing unnecessary updates and communications, thereby reducing the number of communications for global aggregation and updates between terminals and remote cloud servers, energy consumption during communication and latency. This improves the computational and communication efficiency of the federated learning model.

We assume that the requester initiates a task that involves a set of model owners. As tasks are initiated, each model owner initiates a task that involves a set of workers in a synchronous task that spans a fixed duration , with multiple instances of model training requests. In this scenario, the tasks issued by the model owner follow the Poisson process [38]. Unlike in conventional FL studies where workers collect data after request arrival, we now consider the possibility of data caching due to service delays. Workers periodically update the cached data and proceed to train the model on the gateway. In a privacy-preserving FL method adopting differential privacy encryption, only the model parameters are sent to their corresponding model owners for aggregation. The model owners generate a consensus committee and leader based on their reputation with the requester and proceed to verify the legal gradient and perform on-chain operations. Finally, the leader submits the aggregation gradient to the requester.

3.2. Problem Formulation

In the FL network, the single contract of the incentive mechanism is comprised of , which represents types of willingness to participate for model owners. Each model owner type can be characterized by a probability mass function , where the types are indexed in nondecreasing order such that . Similarly, the quality of gradient contribution is represented by , where the quality of gradient types is indexed in nondecreasing order such that . The model owner type reflects each model owner’s level of willingness to participate and determines the quality of the collected gradient, whereby model owners who are more willing to participate collect higher-quality data. We define the utility function of the requester for a model owner with type as follows:where represents the reward paid by the requester to the model owner and is the conversion parameter from gradient performance to profits. The function represents the diminishing returns of gradient quality on model accuracy and is concave.

The dual contract of the incentive mechanism has of unit data collection cost types belonging to model owner . The worker type can be characterized by a probability mass function , where the worker types are indexed in a nondecreasing order . The data quantity contribution is denoted as , where the data quantity types are indexed in a decreasing order . Immediately after, there has of data update cost type belonging to the unit data collection cost type , where the data update cost types are indexed in a nondecreasing order . Similarly, the data update frequency is denoted as , where the data update frequency types are indexed in a decreasing order . The type of unit data collection cost reflects each worker’s level of data collection willingness to participate and determines the quantity of data collected, i.e., workers with lower unit data collection costs are more willing to collect data. The cost of data update is also not the same, leading to different data update willingness, i.e., workers with lower data update cost are more willing to update data.

The type cost of data update type belonging to the unit data collection cost type denoted by can be expressed as follows:where refers to the energy consumed for unit data transmission from the IIoT network to the gateway and refers to the energy consumed for unit data caching [40].

The type worker utility of data quantity denoted by can be expressed as follows:where and represent the amounts of data used to train the model and reward from the model owner of worker , respectively. Moreover, and represent the conversion parameter from data quantity performance to profits. The diminishing returns of data quantity are represented by a concave function.

The type worker utility of data update frequency denoted by can be expressed as follows:where and refer to the weighted preference for the data freshness and service delays, respectively. In addition, and . represents calibratable system model parameters that determine the data freshness on model accuracy. and are calibratable system model parameters that determine the service delays on model accuracy. represents the conversion parameter from update frequency performance to profits. The data freshness is fit by a monotonically increasing concave function showing incremental return decreases with the data update frequency. The service delay is fit by a monotonically decreasing concave function showing the decline rate of return decreases with the data update frequency.

In our hierarchical incentive mechanism design, we take into account the contract formulated by the requester to obtain an FL-based model from the model owner. In order to gather gradients for the relevant data quality, the model owner has the flexibility to adjust and to accommodate varying preferences for data quantity and update frequency, as well as and to cater to varying preferences for data freshness and service delays. These adjustments are crucial to incentivize workers to participate in the task.

4. Contract-Theoretic Incentive Mechanism Design

In this section, the requester incentivizes the model owner to collect models with a single contract that takes into account data quality, while the model owner incentivizes workers to train the model with a dual contract that considers both data quantity and freshness. We begin by studying the single contract of a representative model owner and then studying the dual contract of a representative worker. Then, we discuss the conditions for contract feasibility and relax the constraints to derive the optimal contract.

4.1. Single Contract

For ease of notation, we study one of the model owners as a representative for now. The model owner of type utility maximize problem is denoted by as follows:where refers to the quality of the gradient collected, refers to the contract rewards from the requester, and represents the cost incurred per unit quality of the gradient collected. In the formulation of contract theory, each model owner has a bundle that maximizes its utility .

From (1), the requester utility maximization function denoted by can be expressed as follows:where refers to the proportion of model owner type , , refers to the number of model owners, and refers to the reward to each model owner of type m for its gradient collection efforts. For ease of reference, we refer the readers to Table 2 for commonly used notations.

To ensure the feasibility of the contract, if and only if satisfy the following constraints.

Definition 1 (individual rationality (IR)). Each model owner participates in the task when they can get the positive utility, i.e.,

Definition 2 (incentive compatibility (IC)). The utility of each model owner can be maximized if and only if they choose the contract design for its type, i.e.,

To guarantee a feasible contract, we have to deal with IR constraint and IC constraint to reduce and relax conditions.

Lemma 3. For any feasible contract, we have if and only if , , .

Proof. Using the IC constraint in Definition 2, we first prove if , it follows .
As such, we haveThen, we add these two inequalitiesBy swapping left and right, we can obtainWhen , it follows . Likewise, from the IC constraints, we haveWhen , it follows . Lemma 3 is proven.

Lemma 3 implies that model owners with a higher willingness to participate to collect the higher quality of gradient , and the more rewards will be obtained. As such, the contract bundles are designed such that higher gradient quality contributed translate to higher rewards. As such, a feasible contract establishment must have the necessary condition for the following monotonicity conditions.

Theorem 4 (monotonicity). A feasible contract must satisfy the following conditions:

Next, we further relax the IR and IC constraints. Intuitively, the maximum utility model owner incurs the highest quality of data, i.e., the type model owner.

Lemma 5 (reduce single-contract IR constraints). If the IR constraints of model owner type 1 are satisfied, the other IR constraints will also remain the same.

Proof. According to the IC constraints and conditions , we haveAs such, if the IR constraint of model owner type 1 is satisfied, the type m, , IR constraints are automatically satisfied.

Lemma 6 (reduce single-contract IC constraints). The constraints can be reduced to local down incentive constraints (LDIC).

Proof. Consider three model owner types, where . The two LDICs, i.e., constraints between type and type model owners, are as follows:It can be obtained from Lemma 3 that when , it follows , and we can rewrite LDICs as follows:As such, we haveAs such, if the IC constraint applies to model owners of type , it will also apply to model owners of type . This process can be extended down from type to model owners of type 1, i.e., all LDICs remain the same, so we can rewrite that as follows:We can find that if the local upward incentive constraint (LUIC) holds, all UICs are also satisfied. From the monotonicity condition in Theorem 4, LDIC also implies a local upward incentive constraint (LUIC) as follows:As such, the IC constraints can be reduced to LDIC constraints, and it also guarantees that all UIC and DIC constraints hold.
With the constraints relaxed, we can derive a tractable set of sufficient conditions for the feasible contract.

Theorem 7. A feasible contract must meet the following sufficient conditions:

From the optimization contract established, we take as the only influencing factor to study gradient collection. As such, the optimal rewarding scheme can be summarized in the following theorem.

Theorem 8. For a known set of data quantity satisfying , the optimal reward is given by

Proof. We use contradiction to validate this theorem. There exists a that yields greater profit for the model owner, meaning that Theorem 7 is incorrect, i.e., . This implies there exists at least a that satisfies the inequality .
According to Lemma 6, we haveFrom Theorem 7, we also can getFrom (22) and (23), we can deduce that . This violates the IR constraint. Therefore, there does not exist the rewards in the feasible contract that yields greater profit for the model owner.

Substitute (10) into (6), the variable of each data quantity can be derived by separately optimizing each as follows:where . The derived solutions are feasible when they satisfy the monotonicity constraint. Otherwise, we adopt the “Bunching and Ironing” algorithm [39] to adjust the solutions iteratively (see Algorithm 1).

(1)Initialization: Let
(2)while The set of violates the monotonicity constraint, do
(3)Find an infeasible subsequence , where and ;
(4)Set
(5)end while
(6)Return The feasible set
4.2. Dual Contract

For ease of notation, we study one of the workers as a representative for now. The worker of type data collect and data update frequency utility maximize the problem denoted by and as follows:where represents the contract reward from data quantity and represents the contract reward from data update frequency. In the formulation of contract theory, each worker has a bundles that, respectively, maximizes its utility and .

From (3) and (4), the model owner utility is expressed as follows.

For the data quantity performance profit ,

For the data update frequency performance profit ,where represents the number of the worker participating in the task and denotes the proportion of type worker. In the formula of contract theory, represents the data quantity provided by workers, represents the data update frequency provided by workers, and the quality of data is equal to the weighted preference of data quantity and data update frequency.

Overall, the utility of the worker is denoted by that can be expressed as follows:where and represent the weighted preference for data quantity and data update frequency, respectively. In addition, and .

Also, for the data quantity and data update frequency contract, each contract must satisfy the following constraints.

Definition 9 (individual rationality (IR)). Each worker participates in the task if and only if its utility is not less than zero, i.e.,

Definition 10 (incentive compatibility (IC)). Each worker of type only chooses contracts designed for its type, not any other contract to maximize utility, i.e.,and

However, this means that we have to deal with 2 IR constraints and 2 IC constraints, both of which are nonconvex. As such, we continue to reduce and relax the conditions that guarantee the contract is feasible.

Lemma 11. For any feasible contract, we have if , , it follows , , , .

Proof. Using the IC in Definition 10, we haveThen, we add these two inequalitiesTidying it up, we can getWhen , it follows . Likewise, we can prove if , it follows in this way.

Lemma 11 implies that workers with the lower unit data collection cost collect the higher data quantities and the more reward . Similarly, workers with the lower cost of data update to update the higher data and more rewards will be obtained. As such, the contract bundles are designed such that higher data quantities and data update frequency contribute translate to higher rewards. Also, a feasible contract has the necessary conditions for the following monotonicity conditions.

Theorem 12 (monotonicity). The feasible dual contract must satisfy the following conditions:and

Next, we further relax the IR and IC constraints. Intuitively, the maximum utility worker is the worker that incurs the highest quality of data, i.e., the type worker.

Lemma 13 (reduce dual contract IR constraints). If the IR constraints of worker type 1 are satisfied, the other IR constraints will also remain the same.

Proof. In the data collection stage, according to the IC constraints in Definition 10 and conditions , we haveIn the data update stage, the worker data update cost is satisfied , and we haveAs such, if the IR constraint of worker type 1 is satisfied, the other IR constraints are automatically satisfied.

Lemma 14 (reduce dual contract IC constraints). The constraints can be reduced to local down incentive constraints (LDIC).

Proof. In the data collection stage, consider three worker types, where . The two LDICs, i.e., constraints between owners of type m and type m − 1, are as follows:It can be obtained from Lemma 11 that when , it follows . As such, we can rewrite LDICs as follows:Tidy it up, we haveAs such, we haveIf the IC constraint in Definition 10 applies to workers of type , it will also apply to workers of type . This process can be extended down from type to workers of type 1, i.e., all LDICs remain the same, and we can rewrite that as follows:We can find that if the local upward incentive constraint (LUIC) holds, then all UICs are also satisfied. From the condition in Theorem 12, if , LDIC also implies a local upward incentive constraint (LUIC) as follows:Likewise, we can prove the data update contract in this way. As such, we have shown that the IC constraints in Definition 10 can be reduced to LDIC constraints since it also guarantees that all UIC and DIC constraints hold.

With the constraints relaxed, we can derive a tractable set of sufficient conditions for the feasible contract.

Theorem 15. A feasible contract must meet the following sufficient conditions:

Theorem 15 implies that the weighted quality of data quantity and data update frequency is equal to the data quality required in the single contract, where we add a quality conversion parameter from data update frequency to data quantity. The reward obtained by the weighted data quantity and data update frequency is smaller than the reward obtained in the single contract. Thereafter, we take and as the only influencing factor to study data collection and data update, respectively. As such, the optimal rewarding scheme can be summarized in the following theorem.

Theorem 16. For a known set of data quantity satisfying in a feasible contract, the optimal reward is given by

Similar, for a satisfying in a feasible contract, the optimal reward is given by

Proof. We adopt the proof by contradiction to validate this theorem. We first assume that there exists a that yields greater profit for the worker, meaning that Theorem 15 is incorrect, i.e., . This implies there exists at least a that satisfies the inequality .
According to Lemma 13 and Theorem 15, we haveFrom (50) and (51), we can deduce that . This violates the IR constraint. Therefore, there does not exist the rewards in the feasible contract that yields greater profit for the model owner. Likewise, we can prove the (26) in this way.

Substitute (25) into (16), the variable of each data quantity can be derived by separately optimizing each as follows:

Similarly, substitute (49) into (28), the variable of each data update frequency can be derived by separately optimizing each as follows:

The derived solutions are feasible if and only if they satisfy the monotonicity constraint. Otherwise, we can replace with or using the Bunching and Ironing algorithm.

5. Performance Evaluation

In this section, we evaluate the feasibility of the single contract and the dual contract and the optimality of our designed dual contract-based incentive mechanism. Then, we evaluate the data quantity and data update frequency changes under the different preferences. Also, we evaluate the utility of workers, the utility of model owners, and social welfare changes under the different worker types.

The key simulation parameters are provided in Table 3, and we assume that there are 100 workers to research our incentive mechanism, with varying collection costs modeled by the normal distribution. We adopt the k-means clustering method to derive M = 5 clusters of workers and M = 8 clusters of model owners. We keep  =  = 0.5, i.e., both data freshness and service delays are of equal importance to the model owner.

5.1. Contract Optimization

To study the contract feasibility, we set  = 100,  = 20, and  = 70.

For the single contract of the incentive mechanism, Figure 2 shows that both the quality of the gradient contributed and rewards for the model owners increase as the model owner’s willingness to participate increases. The monotonicity constraint in Theorem 4 is satisfied. Also, Figure 3 shows that all model owner utilities are positive and can maximize utility when they choose the contract design for its type. The IR constraint in Definition 1 and the IC constraint in Definition 2 are satisfied.

The dual contract of the incentive mechanism contains two superimposed contracts. For the first stage contract, Figure 4 shows that both the data quantity contributed and rewards for the workers decrease as the cost incurred per unit quantity of the data collected increases. The monotonicity constraint in Theorem 12 is satisfied. Also, Figure 5 shows that all worker utilities are positive and can maximize utility when they choose the contract design for its type. The IR constraint in Definition 9 and the IC constraint in Definition 10 are satisfied. The workers collect more data in the first stage, i.e., the higher update costs in the second stage. As such, Figure 6 shows that both the data update frequency contributed and rewards for the workers increase as the cost of the data update decreases. The monotonicity in Theorem 12 is satisfied. Also, Figure 7 shows that all worker utilities are positive and can maximize utility when they choose the contract design for its type. The IR constraints in Definition 9 and IC constraints in Definition 10 are satisfied.

5.2. Performance Comparison

To facilitate the analysis, we consider one task as representative of the continuous task, while the other tasks are similar. Therefore, our proposed incentive mechanism can be applied to any number of tasks in a continuous task with a fixed duration T. Moreover, we take the example of the requester who prefers data quantity with a set of values for and . Figure 8 illustrates the variations in the model owner’s utility as the data quantity preference changes. As expected, the model owner’s utility increases as the data quantity weighing becomes higher, indicating a greater inclination toward the requester’s preference. Furthermore, when , the value of is equivalent to the model owner’s willingness to participate in the single contract. A higher implies a greater willingness to participate. This finding validates that the model owner can adjust the weights and to accommodate the requester’s preference and own willingness to participate.

We present a comparison between the proposed incentive scheme and two other contract-based schemes: the contract-based social maximization scheme (CS) and the contract-based complete information scheme (CC) presented in [33]. The CC scenario assumes that the model owner has full knowledge of the cost types of each worker, while the CS scenario aims to maximize social welfare. We observe from Figure 8 that the utility of model owners cannot always be maximized under the single contract in CC. On the other hand, the single contract in CS yields similar results to the dual contract in terms of model owner utility, which is consistently lower than that of the proposed scheme. We attribute this difference in performance to the second stage of the proposed contract, where the average data update cost is smaller compared to that of the CS and CC scenarios. This leads to a better model owner utility under the proposed scheme compared to the single contract in CS and CC. Furthermore, the proposed contract also outperforms the single contract in CA, as the effect of the second stage contract improves its overall performance.

Overall, our results highlight the importance of considering a multistage contract in incentivizing workers for collaborative data updates.

5.3. Managing the AoI-Service Latency Trade-Off

In practice, a model owner may have different preferences for varying tasks. We vary the weights and within the range [0.1, 0.9] to study the changes in data quantity and data update frequency when the model owner preferences vary.

Figure 9 depicts the changes in the number of data quantities as the preference towards varies. As expected, data quantities and the growth rate increase as increases. Figure 10 depicts the changes in data update frequency as the preference towards varies. As expected, the number of data update frequencies decreases, and the rate of decline increases as increases.

5.4. Impact of Worker Types

Figures 1113 depict the system performance concerning under a different number of worker types. When the number of increases, both the model owner and the workers obtain higher utilities. Because the collected quality of data improves, model owners can obtain more utility for training the model and gaining more rewards. Thus, social welfare is also improved. Also, we found when the number of worker types increases, the utility of the model owner decreases but the utilities of workers increase. The reason is that when the number of worker types increases, it becomes more difficult for the model owner to mine the information of the worker type and design the corresponding contract. Therefore, the workers can extract more rewards from the model owner.

6. Conclusion

This paper presents a hierarchical incentive mechanism for an FL-based system with caching where the models trained by the workers are all based on their latest data and investigate the trade-off between data quantity and data update frequency. Specifically, we design a single contract to a dual contract based on the model owner’s willingness to participate and the gradient quality that the worker provides. Our proposed mechanism uses contract theory to incentivize high-quality gradient updates from different types of workers.

As a future research direction, we can explore superior incentive mechanisms to improve FL efficiency. Furthermore, by considering worker data quality in more aspects and practical conditions limitations, this may involve incorporating other metrics, such as data completeness or relevance or data correlation between different people into the incentive mechanism design.

Data Availability

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This work was supported by the National Nature Science Foundation of China (No. 61962022 and No. 62062034).