An Incentive Mechanism for Mobile Crowd Sensing in Vehicular Ad Hoc Networks

Abstract

In the mobile crowdsensing of vehicular ad hoc networks (VANETs), in order to improve the amount of data collection, an effective method to attract a large number of vehicles is needed. Therefore, the incentive mechanism plays a dominant role in the mobile crowdsensing of vehicular ad hoc networks. In addition, the behavior of providing malicious data by vehicles as data collectors will have a huge negative impact on the whole collection process. Therefore, participants need to be encouraged to provide data honestly to obtain more available data. In order to increase data collection and improve the availability of collected data, this paper proposes an incentive mechanism for mobile crowdsensing in vehicular ad hoc networks named V-IMCS. Specifically, the Stackelberg game model, Lloyd’s clustering algorithm and reputation management mechanism are used to balance the competitive relationship between participants and process the data according to the priority order, so as to improve the amount of data collection and encourage participants to honestly provide data to obtain more available data. In addition, the effectiveness of the proposed mechanism is verified by a series of simulations. The simulation results show that the amount of available data is significantly higher than the existing incentive mechanism while improving the amount of data collection.

Share and Cite:

Yin, J. , Wei, L. , Sun, H. , Lin, Y. and Zhao, X. (2022) An Incentive Mechanism for Mobile Crowd Sensing in Vehicular Ad Hoc Networks. Journal of Transportation Technologies, 12, 96-110. doi: 10.4236/jtts.2022.121006.

1. Introduction

With the development of sensor technology and embedded computing devices, mobile crowdsensing (MCS) has become a popular technology [1] [2]. In addition, with the increasing demand for a social event and phenomenon analysis, MCS is gradually applied to the Internet of vehicles [3]. MCS of vehicles refers to that mobile vehicles use advanced sensor technology to collect and transmit perception data in real time [4]. For example, the vehicle can regularly report the current vehicle status, traffic status and weather conditions by using the on-board unit and sensor device [5]. MCS of the Internet of vehicles can be applied to various life situations. However, due to the demand of MCS for massive data, more vehicles need to participate in MCS [6] [7]. In addition, false data will affect the data results, and service consumers hope that the data provided by participating vehicles are true and effective [8]. How to ensure the amount of available data while meeting the needs of massive data is one of the challenges faced by the current MCS of the Internet of vehicles [9]. An incentive mechanism is needed to increase the amount of data available while increasing the amount of data collected.

In recent years, scholars at home and abroad have done a lot of research on the perceived incentive mechanism of group intelligence [10] [11] [12] [13] [14]. Among them, Yang et al. [11] designed two auction based incentive mechanisms, focusing on the platform or users, to encourage users to participate in perception and complete perception tasks. J. S. Lee et al. [12] proposed a reverse auction mechanism, which allows users to send the valuation of their data to the service provider (SP), and SP decides whether to purchase their data. T. Luo et al. [13] proposed an incentive mechanism for users to participate in the game, which sets a full reward for SP according to users’ contributions to the auction. The above studies only consider the interaction between SP and data collectors (DC), while ignoring the payment and consumption behavior of service consumers (SC). In order to solve this problem, Kaoru et al. [14] proposed an incentive mechanism (quality and usability of information, QUOIN), which considers the price competition relationship between SP and DC, SP and SC, but ignores the availability of collected data.

In order to solve the above problems, this paper proposes an incentive mechanism in MCS of the Internet of vehicles. Firstly, the reputation mechanism is used to update the reputation of participants in real time, so as to encourage participants to provide data honestly, so as to improve the proportion of effective data; Secondly, the incentive mechanism scheme of Kaoru et al. is optimized, and the Stackelberg game model [15] is used to achieve the Nash equilibrium [16]. On the basis of the maximum data output, more participants are further encouraged to participate in data collection through the integral reward mechanism; Finally, Lloyd’s clustering algorithm is used to sort the collected data, so as to improve the amount of available data.

An incentive mechanism for mobile crowd sensing in vehicular ad hoc network (V-IMCS) proposed in this paper can balance the competitive relationship between SP, SC and DC, and improve the amount of data collection and available data. The main contributions of this paper are: using Stackelberg game model to find the Nash equilibrium point and obtain the data volume of profit maximization, so as to balance the competitive relationship among SP, SC and DC, and improve the data collection volume; in the incentive mechanism, Lloyd’s clustering algorithm is used to improve the amount of available data; introduce reputation management mechanism and point reward mechanism to further encourage more participants to honestly provide data and improve the amount of data collected and available; compared with the existing incentive mechanism, the mechanism proposed in this paper improves the amount of data collection and available data.

The remaining sections are as follows. Section II covers the essential technologies relevant to the mechanism. Section III discusses the mechanism content, including five stages; Initialization; service request between the service consumer and the SP; data collection between SP and DC; SP processes the collected data; Reputation feedback and strategy update. Overall results and future work can be found across Sections IV.

2. Related Works

2.1. Stackelberg Model

When leading manufacturers decide their own output, they will expect the impact of their own output on follower manufacturers [17] [18]. Therefore, the output determined by leading manufacturers is a profit maximization output constrained by following the manufacturer’s response function. With the continuous growth of the price of leading manufacturers, the price of follow-up manufacturers will also increase, and maintain a relative maximum price to achieve Nash equilibrium [19] [20].

2.2. Lloyd’s Clustering Algorithm

Lloyd’s clustering algorithm is a classical clustering algorithm that can maintain scalability and efficiency when processing large data sets [21] [22]. Its execution process is as follows [23]:

1) Input points are divided into k groups, the center point of each group is calculated, and K initial points are randomly selected in the input point data set;

2) Calculate Voronoi diagram of K central points;

3) Integrate Voronoi diagram and calculate centroid;

4) Then move each center point to the centroid of the Voronoi diagram.

Repeat the above process until the center point does not change.

2.3. Network Model of Mobile Crowd Sensing of Vehicular Ad Hoc Networks

MCS of vehicular ad hoc networks means that in the Internet of vehicles, mobile vehicles use advanced sensor technology to collect and transmit perception data in real time. The MCS of the Internet of vehicles is often composed of the following parts [24] [25].

1) Trusted authority (TA)

In order to ensure the normal operation of the organizational structure of the Internet of vehicles, it is usually necessary to introduce a trusted certification authority named TA to store the identity information of all users in the corresponding area.

2) Service provider (SP)

SP pays a certain reward to the data collector, obtains data from the data collector, processes the data and sends it to the service consumer. The reward meets the following principles [14]: if the data validity is high, the payment reward is high; If the data schedule is high, the payment reward is high; The more similar data are provided, the lower the reward will be paid; If the collected data is more important for data coverage, the payment reward will be higher.

3) Data collector (DC)

DC is responsible for selecting an appropriate data collection strategy, collecting perceptual data, and providing the collected data to the SP. Vehicles in the Internet of vehicles have certain computing and storage capabilities [24], and can act as DC in the MCS of the Internet of vehicles.

4) Service consumer (SC)

Refers to some management departments (e.g. traffic management department, meteorological bureau) that generate demand for some data and want to extract valuable information (e.g. traffic conditions, accident conditions, weather conditions) from the existing perceived data. SC consider the optimal consumption strategy according to their own needs and choose the corresponding SP to provide services for themselves.

3. Incentive Mechanism Named V-IMCS

The incentive mechanism V-IMCS proposed in this paper mainly includes five stages: the first stage is initialization; the second stage is the service request between SC and SP; the third stage is data collection between SP and DC; in the fourth stage, SP processes the collected data; the fifth stage is reputation feedback and strategy update. The overall flow chart of incentive mechanism is shown in Figure 1.

3.1. Initialization

In order to avoid malicious data transmission by vehicles and ensure the availability of vehicle information data, the trusted organization generates time interval T α { T 1 , T 2 , } , sets unique identification and initial reputation score for each vehicle, stores the information in the database, updates the vehicle reputation immediately according to the time interval, and sets the initial reputation score through Equation (1).

R M V i 0 = { 0.9 V i L E 0.5 V i P S 0.1 V i O T (1)

Figure 1. System architecture.

where LE is law enforcement vehicles, PS is public service vehicles and OT is other vehicles [26].

3.2. Service Request

When SC requests information, it determines the task number TID, task content CM and the number of requested information N0 according to the specific requirements of the perceived task, and then sends a request message Q t C i to SP through Equation (2).

Q t C i = ( T I D , C M , N 0 ) (2)

After receiving Q t C i , SP publishes the service information P m S i to SC through Equation (3).

P m S i = ( T I D , C M , A W S i ) (3)

where, A W S i is service pricing.

Then, SC selects the desired SP to send the demand message according to the service information Q m C i , as shown in Equation (4).

Q m C i = ( T I D , C M , N 0 , P c C i , T 0 ) (4)

where, P c C i is Compensation amount, T0 is deadline.

3.3. Data Collection

After receiving the demand information, SP generates a request task Q t s i , such as Equation (5) to the vehicle Vi.

Q t s i = ( T I D , C M , T M , R M 2 0 , R M 1 0 ) (5)

where TM is expiration time, R M 1 0 and R M 2 0 ( 1 R M 1 0 R M 2 0 > 0 ) are the minimum reputation requirements of the two collection schemes described below, which are uniformly set by SP.

This paper provides two collection schemes: direct payment and cumulative compensation:

1) Direct payment: If Vi selects this scheme and the collected data passes the verification, a reward A W V i will be issued. Otherwise, the vehicle reputation feedback will be updated and the reward will be cancelled. For ease of illustration, the collection scheme is recorded as M 1 0 .

2) Cumulative compensation: If Vi selects this scheme and the collected data passes the verification, it will submit the vehicle reputation feedback and accumulate points for the vehicle. Otherwise, it will update the vehicle reputation feedback and cancel the reward. Calculate the cumulative integral by Equation (6).

S W V i = S W V i n + A W V i (6)

where S W V i n is total points before vehicle accumulation, n means that the vehicle has participated in n times of integral accumulation.

In addition, when the vehicle’s points accumulate to a certain amount, you can get additional rewards. Specifically, calculate the total points S W V i after additional rewards through Equation (7).

S W V i = { ( 1 + σ ) S W V i if S W V i S W 0 S W V i otherwise (7)

where, σ ( 0 < σ < 1 ) is Incentive factor and S W 0 is extra bonus line by SP.

If n > n 0 , the vehicle can choose to extract points and convert the points owned into reward according to Equation (8). The collection scheme is recorded as M 2 0 .

A W V i = δ S W V i ( n n 0 ) (8)

where n 0 is extractable times threshold and δ is conversion scale factor by SP.

According to the above collection scheme, the follow-up operations are as follows:

After receiving the request task from SP, if Vi decides to participate in the collection task, select the corresponding collection scheme, generate the final feedback information R m V i , such as Equation (9), and feed back the results to SP.

R m V i = ( P s V i , M 1 , 2 0 , A W V i , T V i ) (9)

where P s V i is vehicle unique identification, M 1 , 2 0 { M 1 0 , M 2 0 } is collection method selected for the vehicle, A W V i is price, and T V i is current time.

3.4. Information Processing

Service provider collects the feedback information sent by the vehicle, and then sends a reputation query request, such as Equation (10), to TA.

Q s S i = ( T I D , P s V i ) (10)

Then, TA retrieves the reputation value according to the unique identification of the vehicle, generates a feedback message and sends it to SP as shown in Equation (11).

A s S i = ( T I D , R M V i ) (11)

After that, the collected information and data are processed. The main process is shown in Figure 2. The specific process is as follows:

Service provider judges whether the vehicle meets R M V i R M 1 , 2 0 ( R M 1 , 2 0 { R M 1 0 , R M 2 0 } ) according to the retrieved reputation value. If not, generate feedback on the current vehicle dishonesty. Otherwise, SP uses the following Lloyd’s clustering algorithm to cluster the information data.

Lloyd’s clustering algorithm are as follows:

Firstly, the vehicle is divided into several priorities according to the value ratio of = R M V i A W V i , and they are pressed into the corresponding priority queue. The

steps are as follows: first, SP input the number of priorities a to be divided, and randomly generate a random center point, expressed as { w 1 , w 2 , , w a } . Secondly, SP assign each vehicle value ratio i { 1 , 2 , , n } to the closest area according to the value of the center point. Integrate the Voronoi diagram of the center point in each region to calculate its centroid. Finally, SP move the center point to the centroid position and update the center point.

Repeat the above steps until the center point of the area does not change. Finally, output the values of a center points, and sort the values of the center points from large to small to obtain the final collection { w 1 , w 2 , , w a } .

Service provider can divide the received vehicle information data into a groups according to the ratio for priority judgment, and the groups with large values are given priority. Compared with random authentication, authentication according to clustering priority order can improve the total availability of data.

SP determines whether the data provided by each vehicle is null or inconsistent with the data required by the task and other invalid data according to the clustering priority order obtained from the above operations. If the above situation exists, reputation feedback R f V j = 0 is generated; Otherwise, reputation feedback R f V j = 1 is generated.

Figure 2. Information processing flow chart.

Then, service provider sends the feedback information, such as Equation (12), to the trusted institution for updating the vehicle reputation value.

A f V i = ( T I D , P s V i , R f V i ) (12)

Then, service provider sends the reliable data set after verification processing to SC and pays DC with reliable data.

3.5. Information Update

At intervals T α , the trusted institution updates the reputation value of each vehicle according to the received vehicle reputation feedback. The set of n reputation feedback received by the vehicle in the current time period is F s V i = { R f V i 1 , R f V i 2 , , R f V i n } , and the new reputation value Equation (13) is:

R M V i = { F s V i n R M V i if F s V i = ϕ γ R M V i otherwise (13)

In addition, at regular intervals T α , SC and DC will change their strategies under the influence of SP, and finally minimize costs and maximize profits [14]. Detailed proofs are proved in Varian’s Microeconomics [20].

4. Results and Discussion

This chapter evaluates the effectiveness of the mechanism through simulation and compares it with the existing schemes to prove the performance advantages of the scheme proposed in this paper.

4.1. Simulation Sample

In this section, corresponding experiments are designed to test the performance of the mechanism. All experiments run on the host configured with 1.8 GHz Intel processor, 8 GB memory and windows 10 operating system. This mechanism simulates and collects the data according to the pricing demand relationship and the Stackelberg optimization model [20], in which the pricing meets the normal distribution [27], the time period division is referred to [14], and the parameter values are shown in Table 1.

For 230 data of Nash equilibrium point, the reputation and pricing are sampled according to the normal distribution [26] [27] [28]. In this simulation experiment, the real numbers within the range of [0, 1] are randomly sampled for 7 times, and 230 data are randomly generated according to the normal distribution N ( μ , σ 2 ) . Since 99.7% of the value of normal distribution is within the range of three standard deviations around the average, let μ = 0.5 , σ = μ / 3 , so as to meet that most of the obtained data are within the range of [0, 1].

According to Lloyd’s clustering algorithm, the seven times of data can be divided into six clustering center points. After 2000 iterations, the center point image shown in Figure 3 can be obtained.

Table 1. Simulation sample.

Figure 3. Six kinds of center point images divided by Lloyd’s clustering algorithm.

Among them, the higher the center point value, the higher the category priority. SP selects DC according to the priority.

4.2. Result Analysis

Firstly, this paper analyzes the improvement of data collection by the mechanism, and compares it with the non incentive mechanism.

As shown in Figure 4, the initial data collection volume of this mechanism will be affected by comprehensive factors such as SP, SC and pricing, with certain randomness [14], while the data collection volume without incentive mechanism is only affected by stable factors such as pricing [20]. Through six experiments and the conclusion put forward by Kaoru et al. [14], the initial situation of incentive mechanism can be roughly divided into two types, which are recorded as situation a and situation B. In case a, the vehicle increases the collection

Figure 4. Changes in the amount of data collected by each mechanism in different time periods.

price to obtain a high initial data collection volume, but its profit is also relatively low; the vehicle in case B reduces the collection price, resulting in a low amount of initial data collection, but its profit is correspondingly high.

With the passage of time, the collection price of vehicles in case a will be reduced accordingly in order to improve the profit, so the number of vehicles collected will also be reduced accordingly; similarly, in case B, in order to increase the collection quantity, the collection price will be increased accordingly, so as to increase the collection quantity. Since the operation satisfies the Nash equilibrium, it will reach a corresponding equilibrium point after a period of time [20]. According to a certain proportion, the non incentive mechanism meets the normal distribution with the price fluctuation [25]. It can be seen from Figure 4 that the non incentive mechanism fluctuates greatly. According to the statistics in Table 2, compared with the non incentive mechanism of t { 1 , 3 , 5 , 7 } in different time periods, the average data collection of V-IMCS mechanism is significantly higher, and the collection in most time periods is higher than that of non incentive mechanism. Refer to [14] for time period division.

In conclusion, compared with no incentive mechanism, the mechanism proposed in this paper improves the amount of data collection.

Secondly, this paper analyzes the improvement of the amount of available data, and compares it with various incentive mechanisms.

According to [28], the pricing range and pricing constant benchmark can be defined, and the pricing constant can be adjusted according to demand. In this paper, 60% and 70% of the benchmark are taken as supplementary experimental data. According to the relevant parameter settings, Figure 5 is calculated. The demand curve of SC will intersect with the data supply curve under different pricing parameters, so as to obtain the data demand under different pricing parameters.

According to Figure 5, the demand is taken as 150, 130 and 120. Seven simulation experiments are carried out on each mechanism respectively to compare

Table 2. Statistics of data collection in each time period.

Figure 5. Data demand under each pricing parameter.

the without incentive mechanism, QUOIN incentive mechanism and V-IMCS mechanism. For the data screening mechanism, refer to the reputation screening principle in [26].

When the amount of data is 150, the comparison of the amount of available data under different mechanisms is shown in Figure 6(a). Due to the use of clustering algorithm, the available data can be selected preferentially. Compared with no incentive mechanism and QUOIN incentive mechanism, the average amount of available data of V-IMCS incentive mechanism is more under 7 simulation experiments.

When the data volume is 130 and 120, the comparison of the available data volume under different mechanisms is shown in Figures 6(b)-(c). Compared with 150, the available data volume without incentive mechanism and QUOIN incentive mechanism is reduced, and the V-IMCS incentive mechanism is not greatly affected. Therefore, compared with no incentive mechanism and QUOIN incentive mechanism, the amount of available data obtained by V-IMCS incentive mechanism is not easily affected by the amount of data demand.

In addition, if the provided data is not used by the SP, the vehicle will not be paid accordingly. In order to obtain the reward, the vehicle needs to get a higher priority, which further encourages the vehicle to provide data honestly.

To sum up, in the MCS of the Internet of vehicles, while encouraging vehicles to honestly provide data, the amount of available data received is significantly higher than the existing QUOIN mechanism and without incentive mechanism, and is not easily affected by the amount of data demand.

(a) M = 150 (b) M = 130 (c) M = 120

Figure 6. Comparison of available data of each mechanism under different data requirements.

5. Conclusions

Based on Stackelberg game model and Lloyd’s clustering algorithm, this paper proposes a new incentive mechanism V-IMCS for the MCS of the Internet of vehicles. The V-IMCS incentive mechanism proposed in this paper not only balances the competitive relationship between SP, SC and DC, but also improves the amount of data collection and available data.

In addition, this paper analyzes the effectiveness of the proposed mechanism to collect data, then reveals it through a series of simulations. While improving the amount of data collection, the amount of available data is significantly higher than that of QUOIN mechanism and without incentive mechanism. It is also less affected by the amount of data demand.

Acknowledgements

This work was in part supported by Fundamental Research Funds for the Central Universities of Jinan University (Grant No. 21621417), Natural Science Foundation of Guangdong Province of China (Grant No. 2017A030308013), Science and Technology Planning Project of Guangdong Province of China (Grant No. KTP20200022), Fundamental Research Funds for the Central Universities (No. 21618332).

Conflicts of Interest

The authors declare no conflicts of interest regarding the publication of this paper.

References

[1] Al-Fuqaha, A., Guizani, M., Mohammadi, M., et al. (2015) Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Communications Surveys & Tutorials, 17, 2347-2376.
https://doi.org/10.1109/COMST.2015.2444095
[2] Han, Z., Liao, J., Qi, Q., et al. (2019) Radio Environment Map Construction by Kriging Algorithm Based on Mobile Crowd Sensing. Wireless Communications & Mobile Computing, 2019, Article ID: 4064201.
https://doi.org/10.1155/2019/4064201
https://dl.acm.org/doi/10.1155/2019/4064201
[3] Xu, G., Li, H., Liu, S., et al. (2019) Efficient and Privacy-Preserving Truth Discovery in Mobile Crowd Sensing Systems. IEEE Transactions on Vehicular Technology, 68, 3854-3865.
https://doi.org/10.1109/TVT.2019.2895834
[4] Yang, J., Li, C.P. and Yan, J.J. (2017) MCS Data Collection Mechanism for Participants’ Reputation Awareness. Chinese Journal of Engineering, 1922-1934.
http://dx.doi.org/10.13374/j.issn2095-9389.2017.12.020
[5] Ganti, R.K., Fan, Y. and Lei, H. (2011) Mobile Crowdsensing: Current State and Future Challenges. IEEE Communications Magazine, 49, 32-39.
https://doi.org/10.1109/MCOM.2011.6069707
[6] Wu, Y., Zeng, J.R., Peng, H., et al. (2016) Survey on Incentive Mechanisms for Crowd Sensing. Journal of Software, 27, 2025-2047.
http://www.cnki.com.cn/Article/CJFDTotal-RJXB201608010.htm
[7] Liu, Y.N., Li, H.C., Guan, X., et al. (2018) Review of Incentive Mechanism for Mobile Crowd Sensing. Journal of Chongqing University of Posts and Telecommunications, 30, 147-158.
http://en.cnki.com.cn/Article_en/CJFDTotal-CASH201802001.htm
[8] Liu, B., Zhou, W., Zhu, T.Q., et al. (2017) Invisible Hand: A Privacy Preserving Mobile Crowd Sensing Framework Based on Economic Models. IEEE Transactions on Vehicular Technology, 66, 4410-4423.
https://ieeexplore.ieee.org/document/7572139
[9] Liu, X., Ota, K., Liu, A., et al. (2016) An Incentive Game Based Evolutionary Model for Crowd Sensing networks. Peer-to-Peer Networking and Applications, 9, 692-711.
https://doi.org/10.1007/s12083-015-0342-2
[10] Sun, G., Sun, S., Yu, H., et al. (2020) Toward Incentivizing Fog-Based Privacy-Preserving Mobile Crowdsensing in the Internet of Vehicles. IEEE Internet Things, 7, 4128-4142.
https://doi.org/10.1109/JIOT.2019.2951410
[11] Yang, D., Xue, G., Xi, F., et al. (2012) Crowdsourcing to Smartphones: Incentive Mechanism Design for Mobile Phone Sensing. Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, New York, NY, USA, August 2012, 173-184.
https://doi.org/10.1145/2348543.2348567
[12] Lee, J.S. and Hoh, B. (2010) Sell Your Experiences: A Market Mechanism Based Incentive for Participatory Sensing. 2010 IEEE International Conference on Pervasive Computing and Communications (PerCom), Mannheim, Germany, 29 March-2 April 2010, 60-68.
https://doi.org/10.1109/PERCOM.2010.5466993
[13] Luo, T., Tan, H.P. and Xia, L. (2014) Profit-Maximizing Incentive for Participatory Sensing. IEEE INFOCOM 2014-IEEE Conference on Computer Communications, Toronto, ON, Canada, 27 April-2 May 2014, 127 p.
https://doi.org/10.1109/INFOCOM.2014.6847932
[14] OTA, K., Dong, M.X., Gui, J., et al. (2018) QUOIN: Incentive Mechanisms for Crowd Sensing Networks. IEEE Network, 32, 114-119.
https://doi.org/10.1109/MNET.2017.1500151
[15] Nan, G., Mao, Z., Mei, Y., et al. (2014) Stackelberg Game for Bandwidth Allocation in Cloud-Based Wireless Live-Streaming Social Networks. IEEE Systems Journal, 8, 256-267.
https://doi.org/10.1109/JSYST.2013.2253420
[16] Siman, M. and Cruz, J.B. (1973) On the Stackelberg Strategy in Nonzero-Sum Games. Journal of Optimization Theory and Applications, 11, 533-555.
https://doi.org/10.1007/BF00935665
[17] Fu, B., Chen, M., Fei, Z., et al. (2021) Research on the Stackelberg Game Method of Building Micro-Grid with Electric Vehicles. Journal of Electrical Engineering & Technology, 16, 1637-1649.
https://doi.org/10.1007/s42835-021-00677-w
[18] Chang, F., Zhou, G., Cheng, W., et al. (2020) A Stackelberg Game-Theory Approach for Maintenance Grouping of Complex Multi-Component System under Smart Product-Service Paradigm. Procedia Manufacturing, 49, 173-179.
https://doi.org/10.1016/j.promfg.2020.07.015
[19] Zhu, X., Liao, B. and Yang, S. (2021) An Optimal Incentive Policy for Residential Prosumers in Chinese Distributed Photovoltaic Market: A Stackelberg Game Approach. Journal of Cleaner Production, 308, 127325.
https://doi.org/10.1016/j.jclepro.2021.127325
[20] Varian, H.R. (1999) Intermediate Microeconomics: A Modern Approach.
https://is.muni.cz/publication/16238
[21] Zhou, W., Zhang, C.L. and Wu, J.X. (2016) Qualitative Balanced Clustering Algorithm Based on Hartigan-Wong and Lloyd. Journal of Shandong University (Engineering Science), 46, 37-44.
http://en.cnki.com.cn/Article_en/CJFDTOTAL-SDGY201605006.htm
[22] Jourdain, B. and Pagès, G. (2021) Optimal Dual Quantizers of 1 D Log-Concave Distributions: Uniqueness and Lloyd Like Algorithm. Journal of Approximation Theory, 267, 105581.
https://doi.org/10.1016/j.jat.2021.105581
[23] Zhang, R. (2019) Optimal Multi-Source Inference Privacy—A Generalized Lloyd-Max Algorithm. 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA, 2-5 Oct. 2018, 219 p.
https://doi.org/10.1109/ALLERTON.2018.8635890
[24] Liu, Z., Weng, J., Ma, J., et al. (2019) TCEMD: A Trust Cascading-Based Emergency Message Dissemination Model in VANETs. IEEE Internet of Things Journal, 7, 4028-4048.
https://doi.org/10.1109/JIOT.2019.2957520
[25] Sun, S.Y. (2019) Research on Privacy and Security in Vehicle Crowd-Sensing [Dissertation]. Sichuan: University of Electronic Science and Technology of China, Master’s Thesis, University of Electronic Science and Technology of China, Chengdu, China.
http://cdmd.cnki.com.cn/Article/CDMD-10614-1019851075.htm
[26] Liu, Z., Huang, F., Weng, J., et al. (2021) BTMPP: Balancing Trust Management and Privacy Preservation for Emergency Message Dissemination in Vehicular Networks. IEEE Internet of Things Journal, 8, 5386-5407.
https://doi.org/10.1109/JIOT.2020.3037098
[27] Li, Y.P. (2018) Random Normal Distribution-Based Dynamic Pricing Model of “Snapshot”. Value Engineering, 37, 201-202.
https://doc.paperpass.com/journal/20181511jzgc.html
[28] Liu, Z., Guo, J., Huang, F.R., et al. (2021) Lightweight Trustworthy Message Exchange in Unmanned Aerial Vehicle Networks. IEEE Transactions on Intelligent Transportation Systems, 1-14.
https://doi.org/10.1109/TITS.2021.3136304

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.