Abstract

With the rapid growth of network of devices with embedded technology, mobile crowdsensing (MCS) has been gaining increasing popularity. The development of 5G network services is prompting further growth in crowdsensing applications. However, MCS participants risk their privacy when reporting data with their actual sensing positions. To address this issue, the concept of differential privacy (DP) can be adopted to provide a theoretical guarantee for participants’ privacy in MCS services. In this study, we design a new DP crowdsensing scheme with game theory. Based on the multilevel interactive game model, MCS server, DP controllers, and mobile devices are regarded as rational individual decision makers that aim to maximize their own payoffs. For these decision makers, the proposed game approach analyzes suitably the competitive and coordinative MCS environments. The main novelty possessed by our control scheme is to capture the dynamics of MCS system operations with the privacy consideration. Compared with other existing protocols, performance evaluation shows the advantages of our proposed scheme in terms of the sensing task success ratio, MCS participating ratio, and normalized payoff of participating devices. Finally, we provide the guidance on the future research direction of MCS services including other issues.

1. Introduction

A large number of network devices are being connected at an unprecedented rate realizing the idea of the Internet of Things (IoT). The interconnections of these devices enable us to collect and exchange data for offering various applications, such as product tracking, environment monitoring, patient surveillance, and home automation. It opens the door to innovations that facilitate new interactions among ‘things’ and human and provides new opportunities for applications and services that improve the quality of our daily life. Cisco predicts that 50 billion devices would connect to the Internet by 2020; this number would reach 500 billion by 2025. In the future, IoT will lead to a significant change in our life patterns in the way we live and interact with multiple devices [14].

For the IoT implementation, mobile crowdsensing (MCS) is an appealing paradigm and has gained growing attention in the last years. MCS refers to the technology that uses mobile network devices to sense and collect the information of surrounding environments and then report this information to the MCS server. With built-in data storage and intelligent functional ability, the MCS server analyzes statistical characteristics and mines the data to reveal hidden attributes based on the mass of collected information. Taking advantage of the ubiquitous presence of powerful mobile devices, that is, smartphones or sensor-embedded actuators, MCS has become an appealing technique to commercial businesses that wish to collect data without making large-scale investments. In the recent years, famous companies use the MCS technique to offer services based on the big data collected [5]

The performance of MCS depends on the contribution of participating devices. However, mobile devices acting MCS services have to sacrifice their energy and time. To stimulate cooperative actions among selfish devices, the MCS server should pay the price for each participating device. It can induce devices to provide full sensing efforts while ensuring the sensing quality. More specifically, each individual device is motivated to transmit accurate sensing information, if the expected payment from the MCS server exceeds its sensing cost [6]. Otherwise, it has nothing to gain by reporting the MCS information. Therefore, adaptive pricing policy is a key challenge in the MCS system to balance the profits between the MCS server and individual devices.

As a mathematical tool, game theory has been used to investigate the interaction between the MCS server and mobile devices. Game theory is the study of models of conflict and cooperation between intelligent rational decision makers [7]. In this paper, we develop a new game model to formulate the operation of MCS system. Our proposed game model is understood to achieve greater and reciprocal advantages for selfish network agents, who can strengthen their competitive advantages by using the multilevel interactive approach. In addition, to get a desired game outcome, learning algorithms are used in competitive environments. During the iterative learning process, three key steps are performed by game players: (i) observing the current system environment, (ii) estimating the prospective payoff, and (iii) selecting a best strategy to reach an effective solution.

Traditionally, people value their privacy and they certainly do not want their personal information to be accessible to just anyone at any time. But recent advances in technology threaten privacy and open up the possibility of a range of negative consequences as a result of access to personal data. During MCS operations, the collected information can be sensitive to individuals, revealing personal data such as individual commuting routes and locations. Therefore, ensuring the privacy and security of personal information collected through MCS is important and necessary. Therefore, privacy protection mechanism has been considered an essential requirement for the MCS system. However, until now, the principal privacy issue in the MCS system has not yet been well addressed; few existing work systematically investigates the privacy protection problem considering the tradeoff between privacy preservation and sensed data accuracy [811].

In 2006, C. Dwork et al. introduced the concept of differential privacy (DP), which is a mathematical definition for the privacy loss that results to individuals when their private information is used in the creation of a data product. The main idea of DP is that a network agent perturbs its original data by adding carefully designed random noises and then directly transmits the noisy data to a data collection server. Finally, the data collector is able to compute population statistics. The DP approach can limit the increased privacy risk resulting from inclusion of private data in a statistical database and makes it possible to provide very accurate statistics from the database while still ensuring high levels of privacy protection. Therefore, DP ensures that the privacy of data is protected because the data collector cannot access the original data [12, 13]. In real-world environments, DP-based data collection is first implemented in Google Chrome browser to collect and track the client-side information [14].

Motivated by the above discussion, we have adopted the DP mechanism to design a new practical MCS control scheme. For dealing with the DP-based MCS situation, our scheme focuses on the three control issues: MCS price decision, privacy level selection, and MCS contribution handling. In the MCS price decision process, the MCS price is decided by a novel learning algorithm. In the privacy level selection process, mobile devices dynamically select their privacy levels to maximize their profits. In the MCS contribution handling process, the sensed data amount of each device is adjusted using another online learning algorithm. Based on the interactive feedback mechanism, control decisions in each process are made in a distributed manner and cause cascade interactions while balancing the payoff among selfish system agents. Finally, we can reach the most profitable solution in the MCS system.

1.1. Related Work

Considerable state-of-the-art research has been conducted on the design of DP-based MCS schemes. Reference [15] investigates the influence of sensing data correlation on DP protection and explores different correlation models to describe the relationship from two different perspectives. From a protector’s view, Bayesian network is used to model the probabilistic relationship among sensing data, and a corresponding DP is given. From an adversary’s view, the Gaussian correlation model is used to describe the data correlation structure, and a new algorithm to compute Bayesian DP leakage is presented. Finally, the extensive simulations show the influence of the size of maximum correlated group in all of participants on Bayesian DP [15].

Jian Lin and others designed the Privacy-Preserving Mobile Crowdsensing (PPMC) scheme to achieve approximate computational efficiency, individual rationality, and social cost minimization [16]. First, authors consider a single-bid model in which each user can only submit a set of tasks and then develop another multibid model in which each user can submit a bid for each task in its task set. One important component of both models is a platform-defined score function for selecting users. In particular, two score functions, that is, linear and log functions, are developed to realize the two models. Extensive numerical results demonstrate that the PPMC scheme can achieve bid-privacy preservation though sacrificing social cost [16].

Reference [17] proposes a new DP aggregation protocol to resist collusion attacks without incurring extra error. This protocol ensures that the accumulated error in the sum statistics is only a copy Laplace noise required for DP, but the magnitude of the noise incorporated to each party’ data is not large enough to the data privacy. Another feature of the proposed protocol is that it needs not to have a priori estimation of those colluded parties to make it secure under insecure communication channels. In addition, authors design an efficient aggregation encryption scheme to support MCS applications and also make some extensions to make the proposed protocol more applicable in realities, such as the fault tolerant and supporting parties’ dynamic joins or leaves [17].

Reference [18] proposes a new anonymized data-collection scheme that can estimate data distributions more accurately. In particular, authors propose two methods: Single to Randomized Multiple Dummies (S2M) and S2M with Bayes (S2Mb), both of which can make a better tradeoff between privacy and utility. And then, they develop an algorithm that calculates optimized values of the parameters that constitute S2M and S2Mb. The optimized parameters satisfy DP and minimize the expected values of mean squared errors and Jensen-Shannon divergence, which are the popular utility metrics. Finally, this study provides the implementation results of synthetic and real datasets and proves that S2M and S2Mb methods outperform existing schemes [18].

Leye Wang and others designed the Sparse Differential Location Privacy (SDLP) scheme to provide a theoretical guarantee for participants’ location privacy regardless of an adversary’s prior knowledge [19]. For the privacy preserving, this scheme includes three functions: data adjustment, optimal location obfuscation, and uncertainty aware inference functions. The data adjustment function is used to fit the original sensing data to the obfuscated location. The optimal obfuscation function minimizes the uncertainty in data adjustment under the constraints of DP and evenly distributed obfuscation. The uncertainty aware inference function improves the inference accuracy for the obfuscated data. The SDLP scheme explores how to balance three key functions for space MCS applications. Empirical evaluation with real-world datasets shows that the SDLP scheme can provide adequate privacy protection with reduced data quality loss [19].

Some earlier studies [1519] have attracted considerable attention while introducing unique challenges in handling the MCS control problems. In this paper, we demonstrate that our proposed scheme significantly outperforms these existing PPMC [16] and SDLP [19] schemes.

1.2. Contribution

For the MCS process, there is little work that has perfectly resolved the tradeoff between efficiency and privacy. In order to strike the appropriate performance balance among contradictory requirements, we take a first step towards addressing the DP-based MCS control problem by presenting a multilevel game model. Our game process is operated according to the step-by-step repeated game manner while harnessing the synergies among MCS agent interactions. Based on the novel multilevel game approach, the proposed scheme achieves effective advantages to adapt to dynamically changing MCS environments. Although several MCS algorithms including the DP concept have been proposed, no systematic study including the strategic control issues has been conducted.

1.3. Organization

The remainder of this article is organized as follows. In the next section, we describe the principal platform of the MCS system and present our multilevel game formulation. And then, we explain the proposed MCS control algorithms in detail and their properties. Section III provides the simulation scenario and the experimental results. By means of a comparison with existing PPMC [16] and SDLP [19] schemes, we validate the performance excellency of the proposed scheme. Finally, we present our conclusion and discuss the remaining open challenges in this research area along with possible solutions.

2. The Proposed MCS Control Algorithms

In this section, we first give the formation of multilevel game model and notations of important parameters. After that we present the proposed MCS control algorithms with necessary assumptions. Finally, the proposed scheme is described strategically in the nine-step procedures.

2.1. MCS System Architecture and Multilevel Game Model

In this study, we consider the MCS infrastructure with the DP-management platform. It is consisting of mobile devices, MCS server, and DP controllers. The MCS server gets sensing data and pays the price through the DP controllers. There are multiple sensing tasks requesting from the MCS server, which delivers a final service to MCS customers by analyzing the obtained information. As MCS participants, mobile devices sense independently the information data while deciding their level of privacy protection and the amount of MCS contributions. When a mobile device chooses a higher level of privacy protection or smaller amount of sensed data, its service payment is reduced; the service payment of each individual mobile device is proportional to his contribution. Therefore, each rational mobile device needs to tradeoff between his own preference and the payoff maximization.

DP controllers control the exchange of sensed data between multiple devices and the MCS server. According to the level of privacy protection, there are multiple DP controllers. Each DP controller has been assigned as a specific privacy level and works as a mediator to collect the sensed data with the same DP level. With their selected privacy levels, mobile devices report the sensed data to the corresponding DP controller. According to their contributions, the MCS server pays the service price to DP controllers and each individual DP controller redistributes the allocated price to its corresponding mobile devices. The general platform of hierarchical MCS system is shown in Figure 1.

DP is a privacy definition that was originally developed by Dwork, Nissim, McSherry, and Smith, with major contributions by many others over the years. It is one of the most important privacy metrics and has been widely studied in data-mining research publications. In cryptography, the DP aims to provide the accuracy of queries from statistical databases while minimizing the chances of identifying its records. Simply, the DP concept is satisfied if the distribution of the output does not change observably when one mobile device’s information in the dataset is changed [18]. Specifically, a common mechanism adds the random noise generated from a Laplace distribution to the query result. It must guarantee that the contribution of each individual device’s information to a query result is limited according to the parameter, which is a positive real number [14, 20].

Originally, DP was designed for the data sharing scenario in which a trusted data server holds a dataset where each tuple is collected from a device without perturbation and releases perturbed information from the dataset using a randomized algorithm [20]. However, this traditional DP approach is not adaptable to implement the DP-based MCS service. If the DP controller is untrusted, then each individual device would have to perturb his tuple to protect privacy before it is collected by the DP controller. In this case, the tuple owned by each mobile device is regarded as a singleton dataset, and we require that the perturbation algorithm should locally ensure the DP concept when such a singleton dataset is given as the input. This variant of DP is referred to as -local differential privacy (-LDP) [14, 20]. In this study, we focus on the -LDP instead of the original notion of -DP; the -LDP approach provides a much stronger degree of privacy protection for each mobile device against the DP controller.

During the MCS system operations, system agents, that is, MCS server, DP controllers, and mobile devices, make decisions individually. In this situation, a main issue for each agent is how to perform well by considering the mutual-interaction relationship. To develop a new dynamic MCS control scheme, we design a new multilevel game model to balance conflict of interests among system agents. At the upper level, the MCS server pays the price to multiple DP controllers by using a proportional-split sharing manner. At the lower level, DP controllers and mobile devices are game players. Each DP controller redistributes the obtained price to mobile devices, and mobile devices dynamically select their corresponding DP controllers to maximize their payoffs. At the global level, the MCS server and mobile devices are game players; they interact with each other to get a well-balanced MCS system performance. At each level, game players dynamically adjust their decisions to maximize their own profits. For the implementation practicality, our multilevel game model () is designed in an entirely distributed and self-organizing interactive fashion. Mathematically, can be defined as ,   at each time period of gameplay.(i) is the finite set of game players where represents one MCS server, is a set of multiple DP controllers, and is a set of MCS participating mobile devices.(ii) is the set of MCS sensing application tasks.(iii) is the discrete DP levels of MCS; in represents the DP level of DP controller .(iv) is the finite strategy set of different game players. is the strategy combination of the MCP server where is the MCS service price per sensing data bit, and is the price distribution vector for DP controllers. For simplicity, is defined as a discrete value, and are the minimum and maximum prices, respectively, and is the assigned price per bit for the DP controller where . Therefore, the MCS price payment is shared by multiple DP controllers.(v) is the strategy set of ; represents a proportional-split parameter. For simplicity, is also defined as a discrete value, and are the minimum and maximum values, respectively. Using the value, the redistributes the obtained price to its corresponding mobile devices.(vi) is the strategy combination of the where is the ’s sensing data amount for the MCS service and is the ’s DP level. For simplicity, is also defined as a discrete value, and are the minimum and maximum values, respectively.(vii) is the utility function set of game players. , , and represent the utility functions of the MCP server, and , respectively.(viii)The is a time period. The is repeated time periods with imperfect information.

2.2. Multilevel Game Based MCS Control Algorithms

The MCS server launches sequentially MCS tasks with specific -LDP levels to multiple mobile devices. Based on his own preference, each mobile device individually decides the amount of sensed data, and its -LDP level, that is, . Simply, we assume that values are decided based on the discrete set . Therefore, there are 4 DP controllers; that is, , in our MCS platform and each DP controller has its own -LDP level. As a mediator, the DP controller actually collects the same -LDP level sensed data from some mobile devices.

In this study, we implicitly decompose the MCS scheme into three levels and present dynamic solutions for each level control problem. To achieve a higher payoff, each system agent performs a self-configuration mechanism in order to identify better opportunities. Using the incentive price, the MCS server can induce selfish mobile devices to participate in the MCS process. At the upper level, the MCS server pays the price to DP controllers based on the server’s strategies and . At the lower level, each DP controller redistributes the obtained price to its corresponding mobile devices based on the proportional-split sharing solution. At the same time, mobile devices choose their -LDP levels to adaptively respond to the DP controller decision based on the feedback learning process. At the global level, the MCS server and mobile devices interact and adjust their strategies, that is, and , to maximize individual payoffs. Based on this multilevel game approach, we can reach a fair-efficient solution under dynamically changing system environments.

At the upper level, the MCS server attempts to maximize the service outcome with the lower price payment. However, there is a fundamental tradeoff. If the MCS service price increases, it can induce more selfish devices to participate in MCS services, which will cause a better service outcome while sacrificing the cost effectiveness. Therefore, by considering this tradeoff, the MCS server adaptively selects the most proper price strategy. To capture this conflicting relationship, the MCS server’s payoff is defined with the strategy combination . In , the strategy is decided to interact with mobile devices at the global level. Based on the strategy, the MCS server adjusts the price vector for DP controllers in the upper level. To maximize his payoff, the is decided according to the idea of proportional-split sharing approach. At time , the utility function of MCS server is defined as follows:where is the -LDP value for the DP controller , and is the sensed data amount collected by the at time with the payment. For the time period, the value with the strategy is decided based on the proportional-split sharing method:At the lower level, each DP controller redistributes the obtained price to its corresponding mobile devices in a distributed manner. According to the participating devices’ sensed data amount, the utility function of is defined, and the selects the strategy to maximize his utility function; the value is an element of , which is a discrete set of real numbers. At time , the utility function of with the strategy is estimated as follows;where is the set of mobile devices, which are actively participating MCS service through the . Like the decision mechanism, the payment mechanism for mobile devices is designed based on the proportional-split sharing approach. With the strategy , the decides the service price per bit for the mobile device . At time , if the selects the strategy and the contributes to the amount of sensed data, the is given byAt each time step, the receives the payoff as a consequence of selecting strategy. The uses this information to predict the payoff values of next time period and adjust the propensities of their strategies. In this study, we adopt the modified Roth-Erev learning mechanism to decide on the ’s strategy [21]. At time , the expected utility of with the strategy is derived as follows:where is the learning rate and is the actually obtained utility for the at time . Based on this expected utility value, we can calculate the propensity of each strategy at the time period. Based on the modified Roth-Erev learning mechanism, the propensity of strategy at time is defined as [21]:where and are the weight and recency parameters, respectively. The parameter is used to encourage the exploitation of new actions while avoiding premature convergence on a suboptimal action [21].

At the lower level, individual mobile device selects his -LDP level; it is directly related to decide on his corresponding DP controller. In this study, there are four DP controllers. Therefore, each mobile device has four possible strategies. For the , his payoff corresponds to the received outcome minus the incurred cost. At time , if the selects the strategy for his MCS service, that is, is selected as ’s corresponding DP controller, the payoff of with the strategies and is defined as follows:To estimate the instantaneous expense for MCS services, the cost function is defined based on the sensed data amount given by and where , , , and are estimation parameters. With the and strategies, the expected utility of at the time period is also derived in the same manner as equation (7);where is the learning rate and is the actually obtained utility for the at time . Based on this expected utility value, we also calculate the propensity of strategy at time   . It is also estimated based on the modified Roth-Erev learning mechanism. Therefore, the value is calculated in the same manner according to (6).

Based on the strategy propensities, we can estimate the probability distribution for each strategy selection. In the proposed algorithms, the softmax activation logistic function is adopted to calculate the probability distribution [22]. Finally, at the lower level, the and select their strategies, that is, and , according to these distributions. Therefore, without any impractical rationality assumptions, players dynamically change their current strategies while interacting with other players and can learn how to perform well in an effort to maximize their own goals.

At the global level, the MCS server and individual mobile devices dynamically adjust their strategies, that is, and , to maximize their payoffs. To decide on and strategies, the time period of the global level is different from the time period of the upper or lower level process; is larger than where . From the viewpoint of the MCS server, the expected payoff with the strategy at the time period can be defined aswhere is the learning rate and is the strategy in . is the set of multiple strategies, which are selected during the . According to the value, we can also calculate the propensity of strategy at the time period. In this case, is estimated as follows:where is the learning rate, and is the control factor. is the gradient of the sigmoid function with respect to the . If the strategy is selected at the time period, is set to 1, that is, ; otherwise is set to 0 where [21].

With the interaction with the MCS server, each individual mobile device dynamically adjusts his strategy to maximize the payoff. According to (7), the ’s payoff with the strategies and is defined as follows:where is the set of multiple strategies, which are selected during the . With the and strategies, the expected payoff of at the time period is also expected according to (9). Based on this information, we also calculate the propensity of strategy at time   ; is also calculated in the same manner as equation (10). Based on these strategy propensities, that is, and , we also estimate the probability distributions for and strategies. In the same manner as in the lower level game process, we use the softmax activation logistic function to calculate these probability distributions. According to these distributions, the MCS server and each mobile device select their strategies, that is, and . In each time round , game players can learn the others’ responses with incoming information and will select better strategies to approximate the most desirable system solution.

2.3. Main Steps of Proposed Multilevel MCS Control Scheme

In this study, we have investigated the influence of crowdsensing information with the privacy protection issue and propose a novel MCS control scheme based on the multilevel interactive game model. It takes into account the desired level of privacy protection, computational efficiency, individual rationality, and social welfare. As game players, the MCS server, DP controllers, and mobile devices can capture the dynamics of MCS system conditions and determine their best strategies to maximize their payoffs. Through a step-by-step online learning approach, they are able to feed back their decisions while getting a full synergy of interactive multilevel operations. Therefore, game players at each level adaptively adjust their control decisions individually without centralized coordination. It is an effective and suitable way to operate practically the real-world MCS system. The main steps of the proposed MCS control scheme are described as follows.

Step 1. At the initial time, system parameters and sensing tasks are characterized by the simulation scenario and Table 1.

Step 2. Each DP controller has been designated as a specific -LDP level. Therefore, the collected data in each DP controller have the same -LDP value.

Step 3. The MCS generates sequentially MCS sensing tasks, and mobile devices actively sense and collect the information of local environments. As mediators, DP controllers arbitrate between the MCS server and mobile devices.

Step 4. The MCS server selects the combination of strategies . At the global level, the MCS server decides on the value at each according to (9)-(10). At the upper level, the MCS server dynamically adjusts the price vector for DP controllers at each according to (2).

Step 5. DP controllers redistribute the obtained price to their corresponding mobile devices in the proportional-split sharing approach. At the lower level, each DP controller dynamically selects his strategy at each to maximize the according to (3), (5)-(6).

Step 6. Individual mobile devices select the combination of their strategies . At the global level, they dynamically adjust their strategies at each using (11). At the lower level, they decide on their -LDP values at each according to (7)-(8).

Step 7. Based on the step-by-step multilevel game process, the MCS, DP controllers and mobile devices interact with one another and cause a cascade effect in an online distributed fashion.

Step 8. By using the proportional-split sharing and online learning methods, game players know how to select their strategies while maximizing their perceived payoffs.

Step 9. Under the dynamic MCS system environment, game players are constantly self-monitoring the current MCS system conditions; proceed to Step 3 for the next multilevel game iteration.

3. Performance Evaluation

In this section, we evaluate the performance of our proposed protocol and compare it with that of the existing PPMC [16] and SDLP [19] schemes. Based on the simulation results, we confirm the superiority of the proposed approach. To ensure a fair comparison, the following simulation assumptions and MCS system platform are used.(i)There are one MCS server , four DP controllers for different DP services, and one hundred mobile devices , which are distributed randomly in a geographical region.(ii)There is the set of MCS sensing application tasks where . can be categorized as four different sensing task groups, that is, . Each is specified according to the sensing requirements. They are generated with equal probability.(iii)To distribute the obtained price to its corresponding mobile devices, the strategy set of DP controller is (iv)The -LDP value of each sensing task application is randomly decided among .(v)Each mobile device has a range of sensing capacity to proceed MCS services; is a discrete value where 200 sensing cycles/s, 300 sensing cycles/s, 400 sensing cycles/s, 500 sensing cycles/s, 600 sensing cycles/.(vi)Sensing tasks in are generated based on the Poisson process; the generation rate range is varied from 0 to 3.(vii)The time period of the global level is divided into 10 time periods of the upper and lower level process . In this simulation model, is assumed as one second.(viii)System performance measures obtained on the basis of 100 simulation runs are plotted as functions of the sensing task generation rate.(ix)For simplicity, we assume the absence of physical obstacles in the experiments.

To demonstrate the validity of our proposed method, we measured the sensing task success ratio, MCS participating ratio, and normalized payoff of participating devices. Table 1 shows the system parameters used in the simulation. Major system control parameters of the simulation, presented in Table 1, facilitate the development and implementation of our simulator.

Figure 2 gives the performance comparison of each scheme in terms of the task success ratio. From the viewpoint of system operator, it is a main concern and important performance criterion. As mentioned earlier, the MCS server generates sequentially MCS sensing tasks. As the task generation rate increases, the task success ratio decreases. From Figure 2, it is easy to see that the scheme which is designed in this paper has the best performance. In the proposed scheme, the MCS server, DP controllers, and mobile devices make intelligent control decisions while working together toward an appropriate system performance. Therefore, they can respond practically to current system conditions and jointly reach a mutually acceptable agreement to complete the request tasks; it leads to a higher task success ratio. From low to high task generation rate, we can effectively complete the requested task sensing applications compared with other existing schemes.

Figure 3 presents the MCS participating ratio for each scheme. In the proposed approach, the MCS server and DP controllers can effectively induce selfish mobile devices to participate in the MCS process. Based on the feedback based online learning methods, the MCS server chooses the most adaptable service price and DP controllers rationally redistribute the assigned price to mobile devices. This multilevel approach can stimulate mobile devices to participate actively in the MCS process while revealing their private propensities and to take appropriate actions. As game players, the MCS server, DP controllers, and mobile devices are mutually dependent and monitoring each other in order to obtain the best solution for all. For this reason, the proposed scheme can attain the better MCS participating ratio to the existing PPMC and SDLP schemes.

The curves in Figure 4 indicate the normalized payoff of participating mobile devices. In our scheme, mobile devices can get payoffs according to the actual contributions for MCS services. In particular, individual devices in the proposed scheme dynamically select their strategies while aligning their goals and preferences. Therefore, they can maximize their payoffs in a self-adapting manner to meet their goals under dynamically changeable MCS environments. During different task generation intensities, we can see that the proposed scheme achieves better devices’ payoffs. In summary, simulation results shown in Figures 24 demonstrate that the proposed scheme, which uses a multilevel game model, can get the full synergy of MCS processing operations. In conclusion, simulation results show that our scheme attains an attractive MCS system performance, something that the PPMC [16] and SDLP [19] schemes cannot offer.

4. Summary and Conclusions

In recent years, the widespread prevalence of smart devices has enabled a new IoT paradigm, called MCS services. This technique leverages pervasive mobile devices to efficiently collect the big sensory data while rewarding their work. However, they concern about the loss of individual privacy seriously. In this paper, we design a privacy-preserving MCS control scheme based on the multilevel game model. As game players, the MCS server, DP controllers, and mobile devices aim to maximize their payoffs in each level. From the perspectives of the MCS server, DP controllers, and mobile devices, the main concerns are to decide on the service price, to redistribute the obtained price, and to decide on the MCS contribution considering the privacy preservation, respectively. To capture the dynamics of interactive relationships, each game player learns how to perform well by interacting with other players without any impractical rationality assumptions. Using the step-by-step repeated game process, the proposed scheme can explore an effective solution under widely different and diversified MCS situations. It is a practical and suitable approach in the real-world system operation. Through extensive simulation experiments, we evaluate the performance of our scheme and existing protocols, and the results validate that our proposed scheme can significantly improve performance. In the future, we will extend the proposed approach by adding the cooperative game concept as a negotiation bargaining solution. Also, we plan to focus on implementing a realistic MCS application for traffic information collection against faked sensing attacks. Finally, we would like to take a research opportunity to address the big data mining and deep learning issues in the MCS system from the operator’s perspective.

Data Availability

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This research was supported by the MSIT (Ministry of Science and ICT), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2018-2018-0-01799) supervised by the IITP (Institute for Information & communications Technology Promotion).