offTAFS A Truthful Auction For IoT Application Offloading in Fog Computing Networks
offTAFS A Truthful Auction For IoT Application Offloading in Fog Computing Networks
4, 15 FEBRUARY 2023
Abstract—Emerging as an alternative to cloud comput- second [3]. Many such devices which generate these massive
ing, fog computing is expected to provide low-latency, high- IoT data are resource-constrained and, thus, do not read-
throughput, reliable services for ever-growing Internet of Things ily process and respond locally in real time. Most of the
(IoT) applications, especially real-time applications with strict
responsiveness requirements. By offloading time-critical and current applications (e.g., online games, virtual reality, intel-
computation-intensive applications to proximal fog nodes (FNs), ligent transportation systems, and smart cities) have strict
both application response time and network congestion can be response time requirements. Today’s users tend to be delay-
markedly reduced. However, the FNs commonly suffer from lim- and jitter sensitive, such that the violation of real-time require-
ited resources compared to cloud computing nodes and, hence, ment substantially degrades their Quality of Experience (QoE)
may not serve all application users with guaranteed performance.
The dynamic and heterogeneous nature of FNs also brings dif- and drive down service providers’ revenue. Furthermore, the
ficulty and overhead to fog computing resource management. majority of applications are currently hosted on cloud plat-
These issues are addressed in the present study with the design forms, which have high latency and unpredictable Internet
of a double auction mechanism, namely, truthful auction for connections. The massive amount of data generated by IoT
the fog system (TAFS), which provides incentives for FNs to greatly exacerbates congestion on the Internet. This clear gap
satisfy as many application demands as possible with guaran-
teed performance. TAFS takes into account the latency tolerance between user demands and current computing and networking
of application users during the FN assignment and resource infrastructures has created an urgent demand for resolution.
allocation to satisfy real-time requirements. We theoretically Fortunately, the novel fog computing paradigm is a promis-
prove that TAFS satisfies several desired economic properties, ing approach to solving the above problems [4]. As a comple-
including truthfulness, individual rationality, and budget bal- ment to the cloud, fog computing moves the early processing
ance. The performance of TAFS is evaluated through simulation
experiments. and storage of data from distant clouds to fog nodes (FNs)
closer to the data source. From the users’ view, applications
Index Terms—Application offloading, double auction, edge that require intensive computation and/or real-time responses
computing, fog computing, incentive mechanism.
can be hosted on proximal FNs instead of on the user devices,
a process called computation offloading, which can greatly
reduce delay and network congestion [5].
I. I NTRODUCTION The capability of fog computing can be extended by
HE Internet of Things (IoT) has developed at an unprece-
T dented speed over recent years. There were approxi-
mately 23 billion connected IoT devices in 2018; this number
incorporating decentralized fog devices. Devices with idle
resources, connected through different networks and owned
by different owners, can be integrated into a uniform fog
is expected to reach 75 billion by 2025 [1]. These ubiqui- computing platform to provide the most needed computing
tous, interconnected things bring us more efficient, convenient, resources proximal to the end users. This process, however,
and even safer lives, but they also bring significant chal- introduces two significant challenges: 1) what are the incen-
lenges. It is estimated that in 2020, 1.7 MB of data will tives for fog devices to provide their idle resources? Sharing
be created every second for every person on Earth [2]. A the idle resources is costly for device owners in terms of
single self-driving car generates about 1 GB of data per overhead, energy, and usage, and should thus be monetarily
compensated for. An incentive mechanism should generally be
Manuscript received 14 July 2021; revised 12 October 2021; accepted truthful, fair, and efficient to provide proper incentivization for
5 January 2022. Date of publication 14 January 2022; date of current ver-
sion 6 February 2023. The work of Lijun Sun was supported in part by the sharing across ad hoc FNs, while allowing users to utilize fog
Fund Project for Visiting Scholars of Shandong Provincial Department of services with confidence and 2) how do we address the com-
Education. (Corresponding author: Lijun Sun.) plexity of resource management and optimization introduced
Lijun Sun was with the School of Computing and Augmented Intelligence,
Arizona State University, Tempe, AZ 85287 USA. She is now with the by the complex interplay between heterogeneous FNs and user
College of Computer Science and Technology, Qingdao University of demands? A well-designed resource allocation method should
Science and Technology, Qingdao 266061, Shandong, China (e-mail: lijun- maximize social welfare in terms of user demand satisfaction
[email protected]).
Guoliang Xue is with the School of Computing and Augmented and resource utilization in addition to the monetary incentive.
Intelligence, Arizona State University, Tempe, AZ 85287 USA (e-mail: This article proposes a three-layer cloud-fog computing
[email protected]). system framework designed to address the above problems
Ruozhou Yu is with the Department of Computer Science, North Carolina
State University, Raleigh, NC 27606 USA (e-mail: [email protected]). (Fig. 1). At the fog computing layer, IoT providers build and
Digital Object Identifier 10.1109/JIOT.2022.3143101 manage IoT platforms to provide functional services, such
2327-4662
c 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY WARANGAL. Downloaded on January 02,2024 at 11:41:02 UTC from IEEE Xplore. Restrictions apply.
SUN et al.: TAFS: TRUTHFUL AUCTION FOR IoT APPLICATION OFFLOADING IN FOG COMPUTING NETWORKS 3253
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY WARANGAL. Downloaded on January 02,2024 at 11:41:02 UTC from IEEE Xplore. Restrictions apply.
3254 IEEE INTERNET OF THINGS JOURNAL, VOL. 10, NO. 4, 15 FEBRUARY 2023
TABLE I
E XISTING I NCENTIVE S CHEMES
optimal payment. Hasana et al. [19] presented a highly local- Fig. 2. Local fog computing system offloading model.
ized and mobile ad hoc cloud computing model which runs
a reward scheme for rating and penalizing IoT worker nodes
based on task performance, task offloading, partial status, and offloading service? In addressing these questions, we use the
task outcome preservation. local fog computing system as an open market and model the
In [20], a dynamic resource allocation method based on problem of UA offloading in the system as a double auction.
pricing was developed in a fog computing environment. This is a two-stage process consisting of an assignment stage
According to the various QoS requirements of user tasks, and a pricing stage. Below, we will also explain our design
on-demand billing, daily billing, and auction billing meth- goals.
ods were designed in which resources are allowed to be
overbooked. However, the authors made no mentioning of
motivating participants. A. Local Fog Computing System
Recent work in [21]–[25] centered on incentive mecha- We argue that a trusted platform is an ideal platform for the
nisms for different objects, but not FNs within fog computing free trading of computational resources and demands between
environments. Considering a proof-of-work-based blockchain fog providers and application users. A similar approach has
network, Jiao et al. [21] focused on the transaction between been taken in the cloud computing market [26] to reduce cap-
cloud/fog computing service providers and miners with the ital expenditures by reusing an existing infrastructure for users,
goal of motivating miners. Chang et al. [22] formulated a boosting resource utilization for Thing-owners, and enabling
two-stage Stackelberg game between the miners and the edge more flexible pricing options (e.g., pay-as-you-go) for com-
service provider (ESP) in order to find the optimal incentive puting or network providers. Inspired by the Fog-of-Things
for the ESP and miners to choose autofit mining strate- (FoT) paradigm presented in [6], in this study, the IoT provider
gies. Others [23] encouraged an operator provider (OP) to (shown in Fig. 1) in FoT is a third party for the incentive mech-
invest in computing and network resources at the edge of the anism. Fig. 2 shows a local fog computing system that consists
network, in order to accommodate requests from application of a fog network, smart-device UAs, and an IoT provider.
service providers (ASPs). The OP negotiates with ASPs to The UA (illustrated by a rectangle in the figure) is gener-
determine the serving QoS of applications as well as how ated by the IoT terminal in reference to terminal devices, such
much participants are paid. In a novel mobile task offload- as smart mobile phones, sensor nodes, and cameras. These
ing D2D fogging framework, an energy-saving incentive was devices collect a large amount of data to be stored or ana-
proposed [24] to prevent overexploiting and free-riding behav- lyzed in a timely manner. However, IoT terminal resources are
iors. A joint optimization framework for FNs, data service restricted and many applications require real-time responses,
operators (DSOs), and data service subscribers (DSSs) was so the user must make an application request for storage
developed in [25] where DSOs rent a computation resource or computing resources from the IoT provider. Here, we
block (CRB) from FNs to serve DSSs. Researchers [25] have assume that all applications are independent and indivisible
also explored the pricing for DSOs - both for profitability and as such that any application can only be offloaded to at most
to motivate DSSs to purchase large quantities of CRBs. one FN.
The studies referenced above regarding offloading and An FN (illustrated by a circle in the figure) is arbitrar-
resource allocation in the fog computing context did not con- ily distributed in the fog computing layer. All FNs in the
sider communication delay along the transmission path in the local area together form the fog network. FNs usually have
fog network. The difference between these related works and richer resources than IoT terminals, so they can provide
the present study is highlighted in Table I. paid service for offloading applications by using their sur-
plus resources. A single FN can handle multiple offloaded
applications simultaneously.
III. S YSTEM M ODEL AND P ROBLEM M ODEL In a real system, the computing resources of FNs generally
Who coordinates the interactions among the FNs, between include CPU resources and memory resources, which can be
FNs and users, or between the fog layer and the cloud managed by the IoT provider in a manner similar to cloud
layer? Who is responsible for the maintenance of the whole computing, i.e., via virtualization. For example: 1) the CPU
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY WARANGAL. Downloaded on January 02,2024 at 11:41:02 UTC from IEEE Xplore. Restrictions apply.
SUN et al.: TAFS: TRUTHFUL AUCTION FOR IoT APPLICATION OFFLOADING IN FOG COMPUTING NETWORKS 3255
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY WARANGAL. Downloaded on January 02,2024 at 11:41:02 UTC from IEEE Xplore. Restrictions apply.
3256 IEEE INTERNET OF THINGS JOURNAL, VOL. 10, NO. 4, 15 FEBRUARY 2023
TABLE II (i)
N OTATIONS its ask, i.e., Pbi ≤ Bi for all ui ∈ Uw , and Psj,k ≥
Aj · dφ −1 (k) for all fj ∈ Fw .
k
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY WARANGAL. Downloaded on January 02,2024 at 11:41:02 UTC from IEEE Xplore. Restrictions apply.
SUN et al.: TAFS: TRUTHFUL AUCTION FOR IoT APPLICATION OFFLOADING IN FOG COMPUTING NETWORKS 3257
then selects the buyer winners and the seller entity winners to 13 if xij = 1 then
determine the price. 14 Uc ← Uc ∪ {ui }; Fc ← Fc ∪ {fj }; (i) ← j;
15 end
16 end
B. Stage 1: Assignment Stage 17 return (Uc , F c , )
Definition 3 (CFA Problem): Given fog network G, UA set
U, and FN set F, the CFA problem is to assign the applications
in U to FNs in F, satisfying three conditions: 1) the total Algorithm 2: Urgency+Greedy-Based Algorithm
amount of resource demand of UAs assigned to an FN does not
exceed the amount of its available resources; 2) each assigned 1 for each Fi do
UA’s delay requirement is satisfied; and 3) the total amount 2 sort all the FNs in Fi in descending order per their
of resources allocated are maximal. The CFA problem can be available CRBs;
3 end
formulated as follows:
4 Sort all the UAs in U in ascending order per their
max di · xij (3) maximum tolerance delay ti ;
ui ∈U fj ∈Fi 5 for each ui ∈ U do
6 Take the FN from Fi in turn, find the first j, such that
s.t. di · xij ≤ rj for j = 1, 2, . . . , m (4) di ≤ rj ;
ui ∈U
7 xij ← 1, rj ← rj − di , repeat sorting for Fi
xij ≤ 1 for i = 1, 2, . . . , n (5) 8 end
fj ∈Fi
xij ∈ {0, 1} (6)
where the 0-1 variable xij denotes whether ui is assigned to the delay requirement of ui . Thus, the path ui → f2 → f1 is
fj . The objective function (3) serves to maximize the allocated excluded, and ui cannot be offloaded to f1 .
resources, which is the design objective 5 referenced above. Definition 4 (Feasible FN): Given any ui ∈ U with a
Constraint (4) bounds the total amount of resources assigned maximum tolerance delay ti , and minimal latency vector
j
to any FN by its amount of available resource. fj ∈ Fi in Wi =(Wi1 , Wi2 , . . . , Wim ), wi is the shortest latency from ui to fj .
Constraints (3) and (5) state that the feasible assignment of Let Fi ⊆ F be the Feasible FN set, where each fj ∈ Fi satisfies
j
ui to fj satisfies condition 2. For the definition of a feasible wi ≤ ti .
assignment, see Definition 4 below. Constraints (5) and (6) We use the heuristic algorithm (Algorithm 1) to implement
specify that the application to be offloaded is indivisible, and stage 1.
so it can only be assigned to at most one FN. We can prove that Lines 2–10 find the Feasible FN set Fi for each ui ∈ U.
the CFA problem is NP-hard by a polynomial-time reduction Previous researchers have reported the multiple knapsack
from the 0-1 knapsack problem. Therefore, we seek effective problem with assignment restrictions (MKARs) problem solu-
heuristic algorithms rather than trying to design polynomial- tions corresponding to line 11 [29]. The auctioneer can choose
time optimal algorithms. different matching algorithms for different purposes. However,
To satisfy condition 2, the IoT provider needs to compute under the real-time conditions of the fog computing scenario,
j
the latency wi from ui ∈ U to all fj ∈ F by using the shortest it is necessary to select a method with low computational
path algorithm. As shown in Fig. 4, the minimal latency from complexity. Here, we use three fast heuristic algorithms:
ui to f4 is no more than the maximum tolerance delay of ui , 1) urgency + greedy based (UGB); 2) urgency-only based
i.e., w4i ≤ ti , while the shortest path from ui to f1 cannot meet (UOB); and 3) random assignment (RA). The UGB algorithm
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY WARANGAL. Downloaded on January 02,2024 at 11:41:02 UTC from IEEE Xplore. Restrictions apply.
3258 IEEE INTERNET OF THINGS JOURNAL, VOL. 10, NO. 4, 15 FEBRUARY 2023
4 end
5 Sort all the buyers in Uc to get an ordered list
U = ui1 , ui2 , · · · such that B(i i1
1)
≥ B(i
i2
2)
···;
6 Sort all the seller entities in Fc to get an ordered list
F = fjk1 1
, fjk2
2
, · · · such that Aj1 · dφ −1 (k1 ) ≤ Aj2
·dφ −1 (k2 ) · · ·
(im )
7 Find the largest m, such that Bi
m
≥ Ajm · dφ −1 (km )
8 if m < 2 then
9 return( Uw , Fw , 0, 0);
10 end
11 (x, y, z)← (im , jm , km );
// Determine price and payment
(x)
12 Pb ← Bx , Ps ← Ay · dφ −1 (z)
// Sacrifice one buyer and one seller
entity to ensure the truthfulness
13 Uw ← Ux \ {ux }, Fw ← Fx \ {fy };
z
20 if uφ −1 (k) ∈ / Uw then
21 Fw ← Fw \ {fjk }; Fig. 5. Example with five UAs and seven FNs: Stage 1. (a) Bid matrix B
and the assignment. (b) Resource demand and maximum tolerance delay of
22 end UAs. (c) Amount of available resources and asks of FNs. (d) Shortest latency
23 end matrix.
24 return (Uw , Fw , P , P )
b s
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY WARANGAL. Downloaded on January 02,2024 at 11:41:02 UTC from IEEE Xplore. Restrictions apply.
SUN et al.: TAFS: TRUTHFUL AUCTION FOR IoT APPLICATION OFFLOADING IN FOG COMPUTING NETWORKS 3259
j
the result holds even after increasing the bid Bi or decreasing
the ask Aj . Under Lemmas 4 and 5, if fjk (resp. ui in Lemma 5)
is still the winner after giving a different ask (resp. different
bid in Lemma 5), the clearing price remains the same.
Due to space limitations, we prove the lemmas for sellers
(Lemmas 2, 4, and 6) and only one (Lemma 3) for buyers here.
Other properties for buyers (Lemmas 5 and 7) can be proven
Fig. 6. Example with five UAs and seven FNs: Stage 2. (a) Assignment
in a similar (and easier) manner as we prove the lemmas for
stage result: (1) = 2, (2) = 4, (3) = (4) = (5) = 3; φ(1) = 1, sellers.
φ(2) = 5, φ(3) = (2), φ(4) = 3, φ(5) = 4; Uc = {u1 , u2 , u3 , u4 , u5 }, Fc = Lemma 1: Assuming ui is assigned to fj in stage 1, the
{f2 , f3 , f4 }, Fc = {f21 , f32 , f33 , f34 , f45 }. (b) Bipartite graph showing the pricing −j
stage. auction result for ui is independent of its bid on Bi , which
j
includes the bids in Bi except Bi .
Proof: As mentioned in Section IV, the assignment and
In stage 2, the candidate FNs are further split into the can- pricing stages are entirely separate. The whole assignment pro-
didate FBs [Fig. 6(a)]. The candidate buyers and seller entities cess is independent of any bids. On the other side, once ui is
sorting and pricing results can be represented by a bipartite assigned to fj , whether ui is determined to be a winner or not
j
graph, as shown in Fig. 6(b). The auctioneer finds m = 4, the depends only on Bi . Therefore, our lemma holds.
k
winning pairs being (u5 , f34 ) and (u4 , f33 ). In this case, each Lemma 2: If fj wins with ask Aj , then it still wins with
buyer pays 4.5, each seller gains 4, and the auctioneer earns Ãj < Aj .
2 × (4.5 − 4) = 1. Proof: According to Lemma 1, if (i) = j and φ(i) = k
for winner fjk with Aj , then the same is true for f˜jk (i.e., similar
to FB as fjk only with a different ask Ãj ). Similarly, in the
V. A NALYSIS
pricing stage, Uc , Fc , Fc , φ, and are all unchanged even if
In this section, we prove that TAFS has the three economic the ask of fj decreases, which moves the position of fjk forward
properties mentioned in Section III-C. in the nondecreasing order set F.
Theorem 1: The TAFS scheme is individually rational. Fig. 7 shows that the order of FBs between the new posi-
Proof: Since Ux is a nonincreasing ordered list, and Fx tion of f̃jk and the position of fjk are not affected by Ãj .
is a nondecreasing ordered list, for each winning buyer ui ∈
(i) (i ) We take another winner FB fjkaa in F, where Ãj · dφ −1 (k) ≤
Uw ⊆ Ux , we know that Bi ≥ Bix x = Pb . For each win-
j Aja · dφ −1 (ka ) ≤ Aj · dφ −1 (k) , as an example. Previously,
ning seller entity fjk ∈ Fw ⊆ Fx , Psk,j = Ps = Ajy · dφ −1 (z) ≥ (i )
s Aja · dφ −1 (ka ) ≤ Bia a ; now, its position has moved forward,
Aj · dφ −1 (k) , and we have k Pj,k ≥ Aj · k dφ −1 (k) . This (i )
completes ours proof. Aja · dφ −1 (ka ) ≤ Aja+1 · dφ −1 (ka+1 ) ≤ Bia+1a+1 so that (uia+1 , fjkaa )
Theorem 2: The TAFS scheme is budget balanced. is the winning pair. The boundary pair selection remains the
Proof: Every winning buyer ui ∈ Uw needs to pay same as before, which implies that f̃jk still wins.
(i)
B(i
ix
x)
= Pb and every winning seller entity receives Ajy · Lemma 3: If ui wins with bid Bi , then it still wins with
(i) (i)
dφ −1 (z) = Ps . We know that winners are one-to-one UA-to- B̃i > Bi .
(i )
FB pairs, i.e., |Uw | = |Fw |, and Bix x ≥ Ajy · dφ −1 (z) , and so Proof: According to Lemma 1, we know that ui is still
(i)
− fjk ∈Fw Aj · dφ −1 (k) = |Uw | · (Pb − Ps ) ≥ 0. This assigned to f(i) , in stage 1, and all candidate winners, i.e.,
ui ∈Uw Bi (i)
completes the proof. FBs and UAs, are unchanged even if the bid changes to B̃i .
(i) (i)
Theorem 3: The TAFS scheme is truthful. As the bid increases, i.e., B̃i ≥ Bi , the position of ui
This proof necessitates a group of lemmas. First, note that in the sorted set U should move forward or be unchanged as
the results of the auction remain the same regardless of how shown in Fig. 8. We know B̃(i) i > B(i)
i ≥ B(x)
x = Pb , so the
the winners change their bids or asks. Given that ui is assigned value of m remains constant and, thereby, the boundary pair
to fj in stage 1, Lemma 1 shows that as long as ui does not is the same; ui still wins.
change its bid on fj , the result for ui does not change. Lemmas Lemma 4: If fjk wins after asking Aj or Ãj , then it is given
2 and 3 show that if we already have a winning pair (ui , fjk ), the same payment: Ps = P̃s .
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY WARANGAL. Downloaded on January 02,2024 at 11:41:02 UTC from IEEE Xplore. Restrictions apply.
3260 IEEE INTERNET OF THINGS JOURNAL, VOL. 10, NO. 4, 15 FEBRUARY 2023
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY WARANGAL. Downloaded on January 02,2024 at 11:41:02 UTC from IEEE Xplore. Restrictions apply.
SUN et al.: TAFS: TRUTHFUL AUCTION FOR IoT APPLICATION OFFLOADING IN FOG COMPUTING NETWORKS 3261
Fig. 9. Utilities of [(a)–(c)] a buyer and [(d)–(f)] a seller in auctions with different assignment algorithms, where n = 10 and m = 30. (a) UGB. (b) UOB.
(c) RA. (d) UGB. (e) UOB. (f) RA.
where Vmax is set to 4. We varied Vmax to observe the influ- IoT provider, and social welfare when the number of sellers
ence of different values on the auction success rate, shown m = 10. Fig. 10(e) shows the effects of changes in the number
in Fig. 11(b). Finally, Vmax was set to 6 in other experi- of buyers on the IoT provider’s utility by taking the RA algo-
ments, because the median performance was obtained when rithm as an example with m = 10, 15, 20, 25, 30, respectively.
the bid is (0, 6]. Regarding the delay settings, since some pop- It is interesting to find that in the case of a small number of
ular applications, such as augmented reality and autonomous users (when smaller than 70, 50, and 60 for users, fogs, and
driving, require millisecond response time, the maximum toler- social welfare, respectively), the no-delay requirement had no
ance delay was randomly generated between [20, 30] ms. The obvious effect on the utility. The utility under UGB-IDT was
number of CRBs requested by the buyer and available CRBs even lower than that under the other three algorithms, whereas
by the seller was randomly generated in [2, 3] and [30, 50], when the number of users was larger, the utility, especially of
respectively. fogs under the UGB-IDT algorithm, was significantly better
The performance metrics in the experiments included buyer than other algorithms. This is due to the sealed auction.
utility, seller utility, the utility of IoT provider, the ratio of 3) Impact on Efficiency: Here, system efficiency is
successful transactions to buyer requests, and running time. expressed as the ratio of the number of successful transactions
We compared the three algorithms mentioned in Section IV-B. to the total number of requests. As discussed in Section III-C,
In order to observe the effect of delay tolerance on TAFS the system efficiency of TAFS may also be affected due to
performance, we also considered UGB (Algorithm 2) in the a mismatch between the bids of buyers and asks of sellers.
infinite delay-tolerance (IDT) scenario, where all applications’ To capture the economic impact on system efficiency, we
maximum delay tolerance was infinite. Throughout all the plotted the ratio of successful transactions to buyer requests
experiments, we denoted these algorithms as UGB, UOB, RA, over the three assignment algorithms as shown in Fig. 11(a).
and UGB-IDT, respectively. Surprisingly, the ratio was not significantly affected by the
number of sellers. With the increase in the number of users,
the success rate slightly decreased, but even the number of
B. Results users climbed 200, that is, when the total demand for offload-
1) Truthfulness of TAFS: To verify the truthfulness of ing was greater than the amount of available resources that the
TAFS, we randomly selected one buyer and one seller to test fog could provide within the area, the success rate could still
how their utility change if they change their bid or ask. As be maintained at more than 70%.
shown in Fig. 9, in each auction, V was the true valuation of Next, we examined the impact of the bid distribution on
the buyer and C was the true cost of the seller. Two different system efficiency. For different Vmax , Fig. 11(b) shows the
values were tested for both the buyer’s true valuation and the successful transaction rate of TAFS when using the three
seller’s true cost. For each different true value (resp. cost), the respective algorithms. The success rate under the UGB, UOB,
buyer (resp. seller) could not improve its utility by submitting RA, and UGB-IDT algorithms all increased as Vmax increased,
a bid (resp. ask) different from its true valuation (resp. cost). and even approached 100% when the bid interval reached to
2) Impact on Utility: The original TAFS design does not [0, 100]. That is, when the offload service offered by the FN
prioritize profitability, but we did run simulations to verify brought a greater actual value to the user, TAFS reached the
the impact of changes in the number of participants on the desired economic characteristics with guaranteed delay and
utility of each party to observe the performance of this mech- system efficiency.
anism. Fig. 10(a)–(d) shows the effects of changes in the 4) Running Time: To confirm the time complexity analysis
number of buyers on the total utility of buyers, sellers, the of TAFS given in Section V, we tested its running time with
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY WARANGAL. Downloaded on January 02,2024 at 11:41:02 UTC from IEEE Xplore. Restrictions apply.
3262 IEEE INTERNET OF THINGS JOURNAL, VOL. 10, NO. 4, 15 FEBRUARY 2023
Fig. 10. (a)–(d) Utility of buyers, sellers, IoT provider, and social welfare in auctions with different assignment algorithms, where m = 10. (e) Utility of
IoT provider with RA algorithm, where m =10, 15, 20, 25.
R EFERENCES
[1] Indian Health Service. “Internet of Things (IOT) Connected Devices
Installed Base Worldwide from 2015 to 2025 (in Billions).” Statista-
The Statistics Portal. Statista.com. [Online]. Available: https://
www.statista.com/statistics/471264/iot-number-of-connecteddevices-
worldwide/ (accessed Nov. 2016).
Fig. 12. Running time of TAFS. (a) m = 10 and n is varying from 20 to
100, while (b) n = 100 and m is varying from 10 to 30. [2] “Data Our New Natural Resource.” [Online]. Available:
https://www.demandcaster.com/blognews/data-our-new-resource/
(accessed Oct. 2018).
[3] L. Mearian. “Self-Driving Cars Could Create 1GB of Data a Second.”
UGB, UOB, and RA algorithms as shown in Fig. 12. The RA [Online]. Available: http://www.computerworld.com/article/2484219/
emerging-technology/self-driving-cars-could-create-1gb-of-data-a-seco
algorithm shows the lowest running time. nd.html (accessed Apr. 7, 2016).
[4] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing and
its role in the Internet of Things,” in Proc. 1st Edition MCC Workshop
VII. C ONCLUSION Mobile Cloud Comput., 2012, pp. 13–16.
[5] M. Aazam, S. Zeadally, and K. A. Harras, “Offloading in fog comput-
We designed an incentive mechanism, TAFS, in this study ing for IoT: Review, enabling technologies, and research opportunities,”
for application offloading in fog network environments. The Future Gener. Comput. Syst., vol. 87, pp. 278–289, Oct. 2018.
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY WARANGAL. Downloaded on January 02,2024 at 11:41:02 UTC from IEEE Xplore. Restrictions apply.
SUN et al.: TAFS: TRUTHFUL AUCTION FOR IoT APPLICATION OFFLOADING IN FOG COMPUTING NETWORKS 3263
[6] R. Yu, G. Xue, V. T. Kilari, and X. Zhang, “The fog of things paradigm: [30] D. J. Watts and S. H. Strogatz, “Collective dynamics of ‘small-world’
Road toward on demand Internet of Things,” IEEE Commun. Mag., networks,” Nature, vol. 393, no. 6684, pp. 440–442, 1998.
vol. 56, no. 9, pp. 48–54, Sep. 2018.
[7] P. Mach and Z. Becvar, “Mobile edge computing: A survey on architec-
ture and computation offloading,” IEEE Commun. Surveys Tuts., vol. 19,
no. 3, pp. 1628–1656, 3rd Quart., 2017.
[8] H. Shah-Mansouri and V. W. S. Wong, “Hierarchical fog-cloud com-
puting for IoT systems: A computation offloading game,” IEEE Internet
Things J., vol. 5,no. 4, pp. 3246–3257, Aug. 2018.
[9] J. Du, L. Zhao, J. Feng, and X. Chu, “Computation offloading
and resource allocation in mixed fog/cloud computing systems with Lijun Sun (Member, IEEE) received the B.S.
min-max fairness guarantee,” IEEE Trans. Commun., vol. 66, no. 4, degree from Qingdao University of Science and
pp. 1594–1608, Apr. 2018. Technology, Qingdao, China, in 2000, and the
[10] Z. Chang, Z. Zhou, T. Ristaniemi, and Z. Niu, “Energy efficient M.S. degree in computer engineering and the Ph.D.
optimization for computation offloading in fog computing system,” in degree from the Institute of complexity science,
Proc. IEEE Global Commun. Conf. (GLOBECOM), Jan. 2018, pp. 1–6. Qingdao University, Qingdao, in 2003 and 2008,
[11] L. Liu, Z. Chang, X. Guo, S. Mao, and T. Ristaniemi, “Multiobjective respectively.
optimization for computation offloading in fog computing,” IEEE She was a Visiting Scholar with Arizona State
Internet Things J., vol. 5, no. 1, pp. 283–294, Feb. 2018. University, Tempe, AZ, USA. She is currently an
[12] Z. Zhou, H. Liao, X. Wang, S. Mumtaz, and J. Rodriguez, “When vehic- Assistant Professor with the College of Computer
ular fog computing meets autonomous driving: Computational resource Science and Technology, Qingdao University of
management and task offloading,” IEEE Netw., vol. 34, no. 6, pp. 70–76, Science and Technology. Her current research interests include fog/edge com-
Nov./Dec. 2020. puting, Internet of Things, crowdsourcing and network economics, and smart
[13] A. Yousefpour, G. Ishigaki, R. Gour, and J. P. Jue, “On reducing IoT traffic.
service delay via fog offloading,” IEEE Internet Things J., vol. 5, no. 2,
pp. 998–1010, Apr. 2018.
[14] Y. Xiao and M. Krunz, “QoE and power efficiency tradeoff for fog
computing networks with fog node cooperation,” in Proc. IEEE Conf.
Comput. Commun. (INFOCOM), May 2017, pp. 1–9.
[15] Z. Chang, L. Liu, X. Guo, and Q. Sheng, “Dynamic resource allocation
and computation offloading for IoT fog computing system,” IEEE Trans.
Ind. Informat., vol. 17, no. 5, pp. 3348–3357, May 2021.
[16] X. Wang, Z. Ning, and L. Wang, “Offloading in Internet of Vehicles: Guoliang Xue (Fellow, IEEE) received the Ph.D.
A fog-enabled real-time traffic management system,” IEEE Trans. Ind. degree in computer science from the University of
Informat., vol. 14, no. 10, pp. 4568–4578, Oct. 2018. Minnesota, Minneapolis, MN, USA, in 1991.
[17] W. Sun, J. Liu, Y. Yue, and H. Zhang, “Double auction-based resource He is a Professor of Computer Science and
allocation for mobile edge computing in Industrial Internet of Things,” Engineering with Arizona State University, Tempe,
IEEE Trans. Ind. Informat., vol. 14, no. 10, pp. 4692–4701, Oct. 2018. AZ, USA. His research interests span the areas
[18] Y. Liu, C. Xu, Y. Zhan, Z. Liu, J. Guan, and H Zhang, “Incentive mech- of QoS provisioning, machine learning, wireless
anism for computation offloading using edge computing: A Stackelberg networking, network security and privacy, crowd-
game approach,” Comput. Netw., vol. 129, no. 2, pp. 399–409, 2017. sourcing and network economics, Internet of Things,
[19] R. Hasana, M. Hossainaand, and R. Khan, “Aura: An incentive-driven smart city, and smart grids.
ad-hoc IoT cloud framework for proximal mobile computation offload- Prof. Xue has received the IEEE Communications
ing,” Future Gener. Comput. Syst., vol. 86, pp. 821–835, Sep. 2018. Society William R. Bennett Prize in 2019 (the Best Paper Award for
[20] F. Zhang, Z. Tang, M. Chen, X. Zhou, and W. Jia, “A dynamic resource IEEE/ACM T RANSACTIONS ON N ETWORKING and IEEE T RANSACTIONS
overbooking mechanism in fog computing,” in Proc. IEEE 15th Int. ON N ETWORK AND S ERVICE M ANAGEMENT in the previous three years).
Conf. Mobile Ad Hoc Sens. Syst. (MASS), Oct. 2018, pp. 89–97. He was a Keynote Speaker at IEEE LCN’2011 and ICNC’2014. He
[21] Y. Jiao, P. Wang, D. Niyato, and K. Suankaewmanee, “Auction was the TPC Co-Chair of IEEE Globecom’2020 and INFOCOM’2010
mechanisms in cloud/fog computing resource allocation for public and the General Co-Chair of IEEE CNS’2014. He has served on the
blockchain networks,” IEEE Trans. Parallel Distrib. Syst., vol. 30, no. 9, TPC of many conferences, including ACM CCS, ACM MOBIHOC,
pp. 1975–1989, Sep. 2019. IEEE ICNP, and IEEE INFOCOM. He is an Associate Editor of IEEE
[22] Z. Chang, W. Guo, X. Guo, Z. Zhou, and T. Ristaniemi, “Incentive T RANSACTIONS ON M OBILE C OMPUTING. He served on the Editorial Board
mechanism for edge computing-based blockchain,” IEEE Trans. Ind. of IEEE/ACM T RANSACTIONS ON N ETWORKING and an Area Editor of
Informat., vol. 16, no. 11, pp. 7105–7114, Nov. 2020. IEEE T RANSACTIONS ON W IRELESS C OMMUNICATIONS, overseeing 13
[23] Y.-Y. Shih, C.-Y. Wang, and A.-C. Pang, “Fog computing service provi- editors in the Wireless Networking area. He is the Steering Committee Chair
sion using bargaining solutions,” IEEE Trans. Services Comput., vol. 14, of IEEE INFOCOM.
no. 6, pp. 1765–1780, Nov./Dec. 2021.
[24] L. Pu, X. Chen, J. Xu, and X. Fu, “D2D fogging: An energy-efficient
and incentive-aware task offloading framework via network-assisted
D2D collaboration,” IEEE J. Sel. Areas Commun., vol. 34, no. 12,
pp. 3887–3901, Dec. 2016.
[25] H. Zhang, Y. Xiao, S. Bu, D. Niyato, F. R. Yu, and Z. Han, “Computing
resource allocation in three-tier IoT fog networks: A joint optimization
approach combining Stackelberg game and matching,” IEEE Internet
Things J., vol. 4, no. 5, pp. 1204–1215, Oct. 2017. Ruozhou Yu (Senior Member, IEEE) received the
[26] P. Samimi, Y. Teimouri, and M. Mukhtar, “A combinatorial double auc- Ph.D. degree in computer science from Arizona State
tion resource allocation model in cloud computing,” Inf. Sci., vol. 357, University, Tempe, AZ, USA, in 2019.
pp. 201–216, Aug. 2016. He is an Assistant Professor of Computer Science
[27] R. P. McAfee, “A dominant strategy double auction,” J. Econ. Theory, with North Carolina State University, Raleigh, NC,
vol. 56, no. 2, pp. 434–450, Apr. 1992. USA. His research interests include Internet of
[28] D. Yang, X. Fang, and G. Xue, “Truthful auction for cooperative commu- Things, cloud/edge computing, smart networking,
nications,” in Proc. 12th ACM Int. Symp. Mobile Ad Hoc Netw. Comput. algorithms and optimization, distributed machine
(MOBIHOC), 2011, p. 9. learning, security and privacy, and blockchain.
[29] M. Dawande, J. Kalagnanam, P. Keskinocak, R. Ravi, and F. S. Dr. Yu was a recipient of the NSF CAREER
Salman, “Approximation algorithms for the multiple knapsack problem Award in 2021. He has served on the Organizing
with assignment restrictions,” J. Combinatorial Optim., vol. 4, no. 2, Committee of IEEE INFOCOM 2022 and IEEE IPCCC 2020–2021 and as a
pp. 171–186, 2000. member of the Technical Committee of IEEE INFOCOM 2020–2022.
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY WARANGAL. Downloaded on January 02,2024 at 11:41:02 UTC from IEEE Xplore. Restrictions apply.