{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T15:43:21Z","timestamp":1768319001691,"version":"3.49.0"},"reference-count":105,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2023,10,19]],"date-time":"2023-10-19T00:00:00Z","timestamp":1697673600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["CNS-2131309, CNS-1911191"],"award-info":[{"award-number":["CNS-2131309, CNS-1911191"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2024,1,31]]},"abstract":"<jats:p>\n            We aim to preserve a large amount of data generated inside\n            <jats:italic>base station-less sensor networks<\/jats:italic>\n            (BSNs) while considering that sensor nodes are selfish. BSNs refer to emerging sensing applications deployed in challenging and inhospitable environments (e.g., underwater exploration); as such, there do not exist data-collecting base stations in the BSN to collect the data. Consequently, the generated data has to be stored inside the BSN before uploading opportunities become available. Our goal is to preserve the data inside the BSN with minimum energy cost by incentivizing the storage- and energy-constrained sensor nodes to participate in the data preservation process. We refer to the problem as DPP:\n            <jats:underline>d<\/jats:underline>\n            ata\n            <jats:underline>p<\/jats:underline>\n            reservation\n            <jats:underline>p<\/jats:underline>\n            roblem in the BSN. Previous research assumes that all the sensor nodes are cooperative and that sensors have infinite battery power and design a minimum-cost flow-based data preservation solution. However, in a distributed setting and under different control, the resource-constrained sensor nodes could behave selfishly only to conserve their resources and maximize their benefit.\n          <\/jats:p>\n          <jats:p>In this article, we first solve DPP by designing an integer linear programming (ILP)-based optimal solution without considering selfishness. We then establish a game-theoretical framework that achieves provably truthful and optimal data preservation in BSNs. For a special case of DPP wherein nodes are not energy-constrained, referred to as DPP-W, we design a data preservation game DPG-1 that integrates algorithmic mechanism design (AMD) and a more efficient minimum cost flow-based data preservation solution. We show that DPG-1 yields dominant strategies for sensor nodes and delivers truthful and optimal data preservation. For the general case of DPP (wherein nodes are energy-constrained), however, DPG-1 fails to achieve truthful and optimal data preservation. Utilizing packet-level flow observation of sensor node behaviors computed by minimum cost flow and ILP, we uncover the cause of the failure of the DPG-1. It is due to the packet dropping by the selfish nodes that manipulate the AMD technique. We then design a data preservation game DPG-2 for DPP that traces and punishes manipulative nodes in the BSN. We show that DPG-2 delivers dominant strategies for truth-telling nodes and achieves provably optimal data preservation with cheat-proof guarantees. Via extensive simulations under different network parameters and dynamics, we show that our games achieve system-wide data preservation solutions with optimal energy cost while enforcing truth-telling of sensor nodes about their private cost types. One salient feature of our work is its integrated game theory and network flows approach. With the observation of flow level sensor node behaviors provided by the network flows, our proposed games can synthesize \u201cmicroscopic\u201d (i.e., selfish and local) behaviors of sensor nodes and yield targeted \u201cmacroscopic\u201d (i.e., optimal and global) network performance of data preservation in the BSN.<\/jats:p>","DOI":"10.1145\/3606263","type":"journal-article","created":{"date-parts":[[2023,6,27]],"date-time":"2023-06-27T11:54:47Z","timestamp":1687866887000},"page":"1-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Truthful and Optimal Data Preservation in Base Station-less Sensor Networks: An Integrated Game Theory and Network Flow Approach"],"prefix":"10.1145","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9890-8038","authenticated-orcid":false,"given":"Yuning","family":"Yu","sequence":"first","affiliation":[{"name":"California State University Dominguez Hills"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4643-1952","authenticated-orcid":false,"given":"Shanglin","family":"Hsu","sequence":"additional","affiliation":[{"name":"California State University Dominguez Hills"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7885-5995","authenticated-orcid":false,"given":"Andre","family":"Chen","sequence":"additional","affiliation":[{"name":"California State University Dominguez Hills"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3118-4389","authenticated-orcid":false,"given":"Yutian","family":"Chen","sequence":"additional","affiliation":[{"name":"California State University Long Beach"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2710-9076","authenticated-orcid":false,"given":"Bin","family":"Tang","sequence":"additional","affiliation":[{"name":"California State University Dominguez Hills"}]}],"member":"320","published-online":{"date-parts":[[2023,10,19]]},"reference":[{"issue":"4","key":"e_1_3_2_2_2","article-title":"Ultra-low power data storage for sensor networks","volume":"5","author":"Aathur G.","year":"2009","unstructured":"G. Aathur, P. Desnoyers, D. Ganesan, and P. Shenoy. 2009. Ultra-low power data storage for sensor networks. ACM Trans. Sensor Netw. 5, 4 (2009), 33:1\u201333:34.","journal-title":"ACM Trans. Sensor Netw."},{"issue":"4","key":"e_1_3_2_3_2","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1145\/2489253.2489261","article-title":"A game theory distributed approach for energy optimization in WSNs","volume":"9","author":"Abrardo A.","year":"2013","unstructured":"A. Abrardo, L. Balucanti, and A. Mecocci. 2013. A game theory distributed approach for energy optimization in WSNs. ACM Trans. Sensor Netw. 9, 4, Article 44 (July2013).","journal-title":"ACM Trans. Sensor Netw."},{"key":"e_1_3_2_4_2","first-page":"259","volume-title":"IEEE IPCCC\u201904","author":"Agah A.","year":"2004","unstructured":"A. Agah, S. K. Das, and K. Basu. 2004. A game theory based approach for security in wireless sensor networks. In IEEE IPCCC\u201904. 259\u2013263."},{"key":"e_1_3_2_5_2","volume-title":"Network Flows: Theory, Algorithms, and Applications","author":"Ahuja R. K.","year":"1993","unstructured":"R. K. Ahuja, T. L. Magnanti, and J. B. Orlin. 1993. Network Flows: Theory, Algorithms, and Applications. Prentice-Hall, Inc."},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1504\/ijsnet.2019.097810"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.03.011"},{"key":"e_1_3_2_8_2","doi-asserted-by":"crossref","unstructured":"L. Anderegg and S. Eidenbenz. 2003. Ad hoc-VCG: A truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In MobiCom\u201903. 245\u2013259.","DOI":"10.1145\/938985.939011"},{"issue":"10","key":"e_1_3_2_9_2","doi-asserted-by":"crossref","first-page":"10094","DOI":"10.1109\/TVT.2019.2934027","article-title":"Game theory and Lyapunov optimization for cloud-based content delivery networks with device-to-device and UAV-enabled caching","volume":"68","author":"Asheralieva A.","year":"2019","unstructured":"A. Asheralieva and D. Niyato. 2019. Game theory and Lyapunov optimization for cloud-based content delivery networks with device-to-device and UAV-enabled caching. IEEE Trans. Vehic. Technol. 68, 10 (2019), 10094\u201310110.","journal-title":"IEEE Trans. Vehic. Technol."},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.03.032"},{"key":"e_1_3_2_11_2","volume-title":"INFOCOM\u201914","author":"Basagni S.","year":"2014","unstructured":"S. Basagni, L. Boloni, P. Gjanci, C. Petrioli, C. A. Phillips, and D. Turgut. 2014. Maximizing the value of sensed information in underwater wireless sensor networks via an autonomous underwater vehicle. In INFOCOM\u201914."},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.06.020"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.133"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2011.2164014"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2316834"},{"key":"e_1_3_2_16_2","volume-title":"EAI GameNets\u201916","author":"Chen Y.","year":"2016","unstructured":"Y. Chen and B. Tang. 2016. Data preservation in base station-less sensor networks: A game theoretic approach. In EAI GameNets\u201916."},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2011.08.052"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/BF01726210"},{"key":"e_1_3_2_19_2","volume-title":"Introduction to Algorithms","author":"Corman T.","year":"2009","unstructured":"T. Corman, C. Leiserson, R. Rivest, and C. Stei. 2009. Introduction to Algorithms. MIT Press."},{"key":"e_1_3_2_20_2","volume-title":"MobiData\u201915","author":"Crary N.","year":"2015","unstructured":"N. Crary, B. Tang, and S. Taase. 2015. Data preservation in data-intensive sensor networks with spatial correlation. In MobiData\u201915."},{"key":"e_1_3_2_21_2","first-page":"540","volume-title":"IEEE INFOCOM\u201909","author":"DiPalantino D.","year":"2009","unstructured":"D. DiPalantino and R. Johari. 2009. Traffic engineering vs. content distribution: A game theoretic perspective. In IEEE INFOCOM\u201909. 540\u2013548."},{"issue":"2","key":"e_1_3_2_22_2","doi-asserted-by":"crossref","DOI":"10.1145\/2883615","article-title":"Game theory framework for MAC parameter optimization in energy-delay constrained sensor networks","volume":"12","author":"Doudou M.","year":"2016","unstructured":"M. Doudou, J. M. Barcelo-Ordinas, D. Djenouri, J. Garcia-Vidal, A. Bouabdallah, and N. Badache. 2016. Game theory framework for MAC parameter optimization in energy-delay constrained sensor networks. ACM Trans. Sen. Netw. 12, 2 (May2016).","journal-title":"ACM Trans. Sen. Netw."},{"key":"e_1_3_2_23_2","volume-title":"IEEE INFOCOM\u201912","author":"Duan L.","unstructured":"L. Duan, T. Kubo, K. Sugiyama, J. Huang, T. Hasegawa, and J. Walrand. 2012. Incentive mechanisms for smartphone collaboration in data acquisition and distributed computing. In IEEE INFOCOM\u201912."},{"issue":"11","key":"e_1_3_2_24_2","first-page":"3926","article-title":"A high-resolution sensor network for monitoring glacier dynamics","volume":"14","author":"Edwards S.","year":"2013","unstructured":"S. Edwards, T. Murray, T. O\u2019Farrell, I. C. Rutt, P. Loskot, I. Martin, N. Selmes, R. Aspey, T. James, S. L. Bevan, and T. Baug\u00e9. 2013. A high-resolution sensor network for monitoring glacier dynamics. IEEE Sensors J. 14, 11 (2013), 3926\u20133931.","journal-title":"IEEE Sensors J."},{"key":"e_1_3_2_25_2","volume-title":"IEEE IPDPS\u201905","author":"Eidenbenz S.","year":"2005","unstructured":"S. Eidenbenz, G. Resta, and P. Santi. 2005. COMMIT: A sender-centric truthful and energy-efficient routing protocol for ad hoc networks with selfish nodes. In IEEE IPDPS\u201905."},{"key":"e_1_3_2_26_2","doi-asserted-by":"crossref","DOI":"10.1201\/9781003007265","volume-title":"Artificial Intelligence Techniques in IoT Sensor Networks","author":"Elhoseny M.","year":"2020","unstructured":"M. Elhoseny, K. Shankar, and M. Abdel-Basset. 2020. Artificial Intelligence Techniques in IoT Sensor Networks. Chapman and Hall\/CRC."},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-005-0122-y"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.2001.1754"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.68"},{"key":"e_1_3_2_30_2","volume-title":"Game Theory","author":"Fudenberg D.","year":"1991","unstructured":"D. Fudenberg and J. Tirole. 1991. Game Theory. MIT Press."},{"key":"e_1_3_2_31_2","volume-title":"ACM SIGCOMM\u201920","author":"Ghaffarivardavagh R.","year":"2020","unstructured":"R. Ghaffarivardavagh, S. S. Afzal, O. Rodriguez, and F. Adib. 2020. Ultra-wideband underwater backscatter via piezoelectric metamaterials. In ACM SIGCOMM\u201920."},{"key":"e_1_3_2_32_2","volume-title":"IEEE AINA\u201918","author":"Ghoreyshi S. M.","year":"2018","unstructured":"S. M. Ghoreyshi, A. Shahrabi, and T. Boutaleb. 2018. An efficient AUV-aided data collection in underwater sensor networks. In IEEE AINA\u201918."},{"key":"e_1_3_2_33_2","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2019.107037","article-title":"Survey, comparison and research challenges of IoT application protocols for smart farming","volume":"168","author":"Glaroudis D.","year":"2020","unstructured":"D. Glaroudis, A. Iossifides, and P. Chatzimisios. 2020. Survey, comparison and research challenges of IoT application protocols for smart farming. Comput. Netw. 168 (2020).","journal-title":"Comput. Netw."},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1006\/jagm.1995.0805"},{"key":"e_1_3_2_35_2","first-page":"101","article-title":"Network flow algorithmss","author":"Goldberg A. V.","year":"1990","unstructured":"A. V. Goldberg, E. Tardos, and R. E. Tarjan. 1990. Network flow algorithmss. Paths, Flows VLSI-Des. 9 (1990), 101\u2013164.","journal-title":"Paths, Flows VLSI-Des."},{"key":"e_1_3_2_36_2","volume-title":"ACM EC\u201901","author":"Golle P.","year":"2001","unstructured":"P. Golle, K. Leyton-Brown, and I. Mironov. 2001. Incentives in peer-to-peer file sharing. In ACM EC\u201901."},{"key":"e_1_3_2_37_2","first-page":"161","volume-title":"MobiHoc\u201918","author":"Gong X.","year":"2018","unstructured":"X. Gong and N. Shroff. 2018. Incentivizing truthful data quality for quality-aware mobile data crowdsourcing. In MobiHoc\u201918. 161\u2013170."},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2934026"},{"key":"e_1_3_2_39_2","first-page":"65","article-title":"Incentives in public decision making","volume":"1","author":"Green J.","year":"1979","unstructured":"J. Green and J. Laffont. 1979. Incentives in public decision making. Stud. Pub. Econ. 1 (1979), 65\u201378.","journal-title":"Stud. Pub. Econ."},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.2307\/1914085"},{"key":"e_1_3_2_41_2","volume-title":"HICSS","author":"Heinzelman W.","unstructured":"W. Heinzelman, A. Chandrakasan, and H. Balakrishnan. 2000. Energy-efficient communication protocol for wireless microsensor networks. In HICSS."},{"key":"e_1_3_2_42_2","volume-title":"MASS","author":"Hou X.","unstructured":"X. Hou, Z. Sumpter, L. Burson, X. Xue, and B. Tang. 2012. Maximizing data preservation in intermittently connected sensor networks. In MASS."},{"key":"e_1_3_2_43_2","volume-title":"IEEE MASS","author":"Hsu S.","year":"2020","unstructured":"S. Hsu, Y. Yu, and B. Tang. 2020. \\(DRE^2\\) : Achieving data resilience in wireless sensor networks: A quadratic programming approach. In IEEE MASS."},{"issue":"5","key":"e_1_3_2_44_2","doi-asserted-by":"crossref","first-page":"7093","DOI":"10.1109\/JSEN.2020.3043748","article-title":"Dynamic spatial-correlation-aware topology control of wireless sensor networks using game theory","volume":"21","author":"Hu S.","year":"2021","unstructured":"S. Hu, G. Li, and G. Huang. 2021. Dynamic spatial-correlation-aware topology control of wireless sensor networks using game theory. IEEE Sensors J. 21, 5 (2021), 7093\u20137102.","journal-title":"IEEE Sensors J."},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.10.018"},{"key":"e_1_3_2_46_2","volume-title":"ACM SIGCOMM","author":"Jang J.","year":"2019","unstructured":"J. Jang and F. Adib. 2019. Underwater backscatter networking. In ACM SIGCOMM."},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.10.002"},{"key":"e_1_3_2_48_2","volume-title":"ACM MobiHoc","author":"Jin H.","year":"2017","unstructured":"H. Jin, L. Su, and K. Nahrstedt. 2017. Theseus: Incentivizing truth discovery in mobile crowd sensing systems. In ACM MobiHoc."},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.830937"},{"key":"e_1_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.031412.00077"},{"key":"e_1_3_2_51_2","volume-title":"IEEE INFOCOM\u201913","author":"Koutsopoulos I.","unstructured":"I. Koutsopoulos. 2013. Optimal incentive-driven design of participatory sensing sys-tems. In IEEE INFOCOM\u201913."},{"issue":"2","key":"e_1_3_2_52_2","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.cosrev.2009.04.003","article-title":"Worst-case equilibria","volume":"3","author":"Koutsoupias E.","year":"2016","unstructured":"E. Koutsoupias and C. Papadimitriou. 2016. Worst-case equilibria. Comput. Sci. Rev. 3, 2 (2016), 65\u201369.","journal-title":"Comput. Sci. Rev."},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.151"},{"key":"e_1_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.136"},{"key":"e_1_3_2_55_2","volume-title":"IEEE ICDE\u201912","author":"Lim H.","unstructured":"H. Lim, G. Ghinita, E. Bertino, and M. Kantarcioglu. 2012. A game-theoretic approach for high-assurance of data trustworthiness in sensor networks. In IEEE ICDE\u201912."},{"key":"e_1_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1036"},{"key":"e_1_3_2_57_2","volume-title":"SECON","author":"Liu L.","year":"2016","unstructured":"L. Liu, R. Wang, D. Guo, and X. Fan. 2016. Message dissemination for throughput optimization in storage-limited opportunistic underwater sensor networks. In SECON."},{"key":"e_1_3_2_58_2","volume-title":"TENSOR\u201923","author":"Ly J.","unstructured":"J. Ly, Y. Chen, and B. Tang. 2023. Data-VCG: A data preservation game for base station-less sensor networks with performance guarantee. In TENSOR\u201923."},{"key":"e_1_3_2_59_2","volume-title":"ACM MobiCom\u201900","author":"Marti S.","unstructured":"S. Marti, T. J. Giuli, K. Lai, and M. Baker. 2000. Mitigating routing misbehavior in mobile ad hoc networks. In ACM MobiCom\u201900."},{"key":"e_1_3_2_60_2","volume-title":"IEEE CDC\u201907","author":"Maskery M.","unstructured":"M. Maskery and V. Krishnamurthy. 2007. Decentralized adaptation in sensor networks: Analysis and application of regret-based algorithms. In IEEE CDC\u201907."},{"key":"e_1_3_2_61_2","volume-title":"IGCC","author":"Mosse D.","year":"2012","unstructured":"D. Mosse and G. Gadola. 2012. Controlling wind harvesting with wireless sensor networks. In IGCC."},{"key":"e_1_3_2_62_2","article-title":"Algorithms for selfish agents: Mechanism design for distributed computation","author":"Nisan N.","year":"1999","unstructured":"N. Nisan. 1999. Algorithms for selfish agents: Mechanism design for distributed computation. In STACS\u201999..","journal-title":"STACS\u201999."},{"key":"e_1_3_2_63_2","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1145\/301250.301287","volume-title":"STOC\u201999)","author":"Nisan N.","year":"1999","unstructured":"N. Nisan and A. Ronen. 1999. Algorithmic mechanism design. In STOC\u201999). 129\u2013140."},{"key":"e_1_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.1006\/game.1999.0790"},{"key":"e_1_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2007.4300988"},{"key":"e_1_3_2_66_2","volume-title":"IEEE INFOCOM\u201920","author":"Pathak N.","year":"2020","unstructured":"N. Pathak, A. Mukherjee, and S. Misra. 2020. Reconfigure and reuse: Interoperable wearables for healthcare IoT. In IEEE INFOCOM\u201920."},{"key":"e_1_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2008.6388348"},{"key":"e_1_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2714668"},{"key":"e_1_3_2_69_2","volume-title":"IEEE ICCCN\u201917","author":"Phillips D. E.","unstructured":"D. E. Phillips, M. Moazzami, G. Xing, and J. M. Lees. 2017. A sensor network for real-time volcano tomography: System design and deployment. In IEEE ICCCN\u201917."},{"key":"e_1_3_2_70_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.022"},{"key":"e_1_3_2_71_2","volume-title":"IEEE MASS\u201919","author":"Rahmati M.","unstructured":"M. Rahmati and D. Pompili. 2019. UWSVC: Scalable video coding transmission for in-network underwater imagery analysis. In IEEE MASS\u201919."},{"key":"e_1_3_2_72_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.09.008"},{"key":"e_1_3_2_73_2","volume-title":"IEEE MASS 2023","author":"Rivera J.","unstructured":"J. Rivera, Y. Chen, and B. Tang. 2023. On the performance of Nash equilibria of data preservation in base station-less sensor networks. In IEEE MASS 2023."},{"key":"e_1_3_2_74_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2009.82"},{"key":"e_1_3_2_75_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.09.005"},{"key":"e_1_3_2_76_2","article-title":"Game theory for wireless sensor networks: A survey","volume":"12","author":"Shi H.-Y.","year":"2012","unstructured":"H.-Y. Shi, W.-L. Wang, N.-M. Kwok, and S.-Y. Chen. 2012. Game theory for wireless sensor networks: A survey. Sensors (Basel, Switz.) 12 (122012), 9055\u201397.","journal-title":"Sensors (Basel, Switz.)"},{"key":"e_1_3_2_77_2","volume-title":"IPTPS\u201903","author":"Shneidman J.","year":"2003","unstructured":"J. Shneidman and D. C. Parkes. 2003. Rationality and self-interest in peer to peer networks. In IPTPS\u201903."},{"key":"e_1_3_2_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/1378704.1378721"},{"key":"e_1_3_2_79_2","volume-title":"IEEE INFOCOM\u201908","author":"Syed A. A.","year":"2008","unstructured":"A. A. Syed, W. Ye, and J. Heidemann. 2008. T-Lohi: A new class of MAC protocols for underwater acoustic sensor networks. In IEEE INFOCOM\u201908. Retrieved from: http:\/\/www.isi.edu\/ilense\/snuse\/index.html."},{"key":"e_1_3_2_80_2","article-title":"Fusion-based volcanic earthquake detection and timing in wireless sensor networks","volume":"9","author":"Tan R.","year":"2013","unstructured":"R. Tan, G. Xin, J. Chen, W.-Z. Song, and R. Huang. 2013. Fusion-based volcanic earthquake detection and timing in wireless sensor networks. ACM Trans. Sensor Netw. 9 (2013).","journal-title":"ACM Trans. Sensor Netw."},{"key":"e_1_3_2_81_2","volume-title":"IEEE INFOCOM\u201918","author":"Tang B.","year":"2018","unstructured":"B. Tang. 2018. \\(DAO^2\\) : Overcoming overall storage overflow in intermittently connected sensor networks. In IEEE INFOCOM\u201918, 1\u20139."},{"key":"e_1_3_2_82_2","volume-title":"ICCCN\u201914","author":"Tang B.","year":"2014","unstructured":"B. Tang, N. Jaggi, and M. Takahashi. 2014. Achieving data K-availability in intermittently connected sensor networks. In ICCCN\u201914."},{"issue":"2","key":"e_1_3_2_83_2","doi-asserted-by":"crossref","DOI":"10.1145\/2422966.2422968","article-title":"Energy-efficient data redistribution in sensor networks","volume":"9","author":"Tang B.","year":"2013","unstructured":"B. Tang, N. Jaggi, H. Wu, and R. Kurkal. 2013. Energy-efficient data redistribution in sensor networks. ACM Trans. Sensor Netw. 9, 2 (Apr.2013), 11:1\u201311:28.","journal-title":"ACM Trans. Sensor Netw."},{"key":"e_1_3_2_84_2","doi-asserted-by":"publisher","DOI":"10.10.1109\/TNET.2023.3273553"},{"key":"e_1_3_2_85_2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6261.1961.tb02789.x"},{"issue":"4","key":"e_1_3_2_86_2","doi-asserted-by":"crossref","DOI":"10.1145\/2489253.2489260","article-title":"Energy efficiency in wireless sensor networks: A game-theoretic approach based on coalition formation","volume":"9","author":"Voulkidis A. C.","year":"2013","unstructured":"A. C. Voulkidis, M. P. Anastasopoulos, and P. G. Cottis. 2013. Energy efficiency in wireless sensor networks: A game-theoretic approach based on coalition formation. ACM Trans. Sensor Netw. 9, 4 (July2013).","journal-title":"ACM Trans. Sensor Netw."},{"key":"e_1_3_2_87_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.66"},{"key":"e_1_3_2_88_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3230904"},{"key":"e_1_3_2_89_2","volume-title":"SECON\u201907","author":"Wang Q.","unstructured":"Q. Wang and W. Yang. 2007. Energy consumption model for power management in wireless sensor networks. In SECON\u201907."},{"key":"e_1_3_2_90_2","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1145\/1023720.1023745","volume-title":"MobiCom","author":"Wang W.","year":"2004","unstructured":"W. Wang, X. Y. Li, and Y. Wang. 2004. Truthful multicast routing in selfish wireless networks. In MobiCom. 245\u2013259."},{"issue":"11","key":"e_1_3_2_91_2","doi-asserted-by":"crossref","first-page":"7966","DOI":"10.1109\/TCOMM.2019.2932986","article-title":"Truthful mechanism design for wireless powered network with channel gain reporting","volume":"67","author":"Wang Z.","year":"2019","unstructured":"Z. Wang, T. Alpcan, J. S. Evans, and S. Dey. 2019. Truthful mechanism design for wireless powered network with channel gain reporting. IEEE Trans. Commun. 67, 11 (2019), 7966\u20137979.","journal-title":"IEEE Trans. Commun."},{"key":"e_1_3_2_92_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-014-9489-2"},{"key":"e_1_3_2_93_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2766635"},{"key":"e_1_3_2_94_2","first-page":"303","volume-title":"ACM MobiCom\u201908","author":"Wu F.","year":"2008","unstructured":"F. Wu, T. Chen, S. Zhong, L. Li, and Y. Yang. 2008. Incentive-compatible opportunistic routing for wireless networks. In ACM MobiCom\u201908. 303\u2013314."},{"key":"e_1_3_2_95_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2362914"},{"key":"e_1_3_2_96_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2300753"},{"key":"e_1_3_2_97_2","volume-title":"SECON\u201913","author":"Xue X.","year":"2013","unstructured":"X. Xue, X. Hou, B. Tang, and R. Bagai. 2013. Data preservation in intermittently connected sensor networks with data priorities. In SECON\u201913."},{"key":"e_1_3_2_98_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2421897"},{"key":"e_1_3_2_99_2","volume-title":"WiOpt\u201917","author":"Yedidsion H.","unstructured":"H. Yedidsion, A. Banik, P. Carmi, M. J. Katz, and M. Segal. 2017. Efficient data retrieval in faulty sensor networks using a mobile mule. In WiOpt\u201917."},{"key":"e_1_3_2_100_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2650979"},{"key":"e_1_3_2_101_2","first-page":"1","volume-title":"IEEE INFOCOM\u201910","author":"Yu Q.","year":"2010","unstructured":"Q. Yu, J. Chen, Y. Fan, X. Shen, and Y. Sun. 2010. Multi-channel assignment in wireless sensor networks: A game theoretic approach. In IEEE INFOCOM\u201910. 1\u20139."},{"key":"e_1_3_2_102_2","volume-title":"IEEE INFOCOM\u201910","author":"Zhang C.","year":"2010","unstructured":"C. Zhang, X. Zhu, Y. Song, and Y. Fang. 2010. A formal study of trust-based routing in wireless ad hoc networks. In IEEE INFOCOM\u201910."},{"key":"e_1_3_2_103_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2415528"},{"key":"e_1_3_2_104_2","volume-title":"SECON\u201915","author":"Zheng H.","year":"2015","unstructured":"H. Zheng and J. Wu. 2015. Data collection and event detection in the deep sea with delay minimization. In SECON\u201915."},{"key":"e_1_3_2_105_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2659258"},{"key":"e_1_3_2_106_2","volume-title":"IEEE INFOCOM\u201903","author":"Zhong S.","year":"2003","unstructured":"S. Zhong, J. Chen, and Y. R. Yang. 2003. Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In IEEE INFOCOM\u201903."}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3606263","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3606263","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:07Z","timestamp":1750178827000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3606263"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,19]]},"references-count":105,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1,31]]}},"alternative-id":["10.1145\/3606263"],"URL":"https:\/\/doi.org\/10.1145\/3606263","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"value":"1550-4859","type":"print"},{"value":"1550-4867","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,19]]},"assertion":[{"value":"2022-06-17","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-06-13","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-10-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}