Keywords

1 Introduction

In recent years, a significant environmental sensibility has grown throughout the world, making people aware about the importance of knowing and monitoring the state of the environment [2, 11]. This has also stimulated, on the one hand, the search for greener solutions to new and existing human processes having significant negative impacts on the environment and, on the other hand, solutions to remedy, where possible, the damage that anthropic development has caused in various ecosystems [33].

In this context, a very promising technology to change many aspects of our daily lives, making “smart” and “interactive” most of the world around us, is represented by the Internet of Things (IoT) [50]. The IoT allows to smart devices and humans to be involved together in pervasive, proactive, and collaborative activities to orchestrate and execute increasingly complex and sophisticated tasks [27]. As a consequence of the opportunity provided by the IoT of interconnecting a massive numbers of smart objects with increasing computational, storage, communication, and power capabilities, new opportunities are available for governments, agencies, businesses, and citizens to know and monitor the current state and evolution over time of an ecosystem [35, 53].

By means of IoT devices, it is possible to gather over time a wide variety of data referred to the quality of air, water, and soil, as well as temperatures, electromagnetic and acoustic pollution, and so on. Moreover, the possibility of using fixed and/or mobile IoT devices and varying their spatial density makes it possible to transform almost any habitat into a smart one [7].

In this scenario, however, it must be taken into account that the potentially wide heterogeneity of devices implies that each of them will have its own trustworthiness in terms of performance [31]. The reasons for this are manifold, including the nature of the device itself, the existence of different types of devices suitable to perform the same type of measurement, adverse environmental conditions, insufficient battery power, etc. Therefore, forming the best temporary team of devices that can support human operators in monitoring a particular habitat can also be a challenging task [17], particularly in presence of large scenarios or with respect to time-critical instances or when it is necessary to take into account conflicting issues.

Some of the strategies usually adopted to select the members to form ad hoc, temporary teams (e.g., semantic similarities, structural similarities, integration or cohesion approaches, locality principles, etc.) may not be appropriate in our highly dynamic contexts and, particularly, in presence of heterogeneous devices (e.g., in terms of skills, autonomy, resource availability, etc.) [25, 52]. To address this issue, several solutions have been proposed in the literature relying on different properties, but to this end an increasing number of proposals consider social properties of devices as fundamental to have a reasonable high expectancy of achieving mutually satisfactory interactions between them [46].

In recent years, a property that has found increasing consensus in team formation processes is the trustworthiness [19]. To this end, several definitions of trustworthiness have been proposed in the literature [10, 15], generally dependent on the particular application context, the information sources and their freshness, the data type, etc. Consequently, several measures exist to evaluate the trustworthiness of an actor and for optimizing team-building processes, also in presence of very large communities [22, 26, 38].

Also in the formation of temporary teams to perform environmental surveillance activities, the trustworthiness of the actors can play a significant role in making such scenarios not only smart but also efficient and effective. To this end, this paper proposes a framework that adopts a trust-based approach for the automated formation of IoT device teams able to support human operators in environmental surveillance. This framework was tested on a simulated scenario demonstrating a measurable improvement in team composition both in terms of performance and appreciation.

The outline of the paper is as follows. Section 2 presents the scenario of interest and introduces the framework we designed. The details of the trust model and of the proposed team formation strategy are described in Sect. 3, while Sect. 4 presents the results of our simulations. Section 5 gives an overview on the related literature and, finally, in Sect. 6 some conclusions are drawn and the forthcoming researches delineated.

2 The Framework

As previously highlighted, nowadays there exists a greater environmental awareness, and citizens, media, and national and supranational authorities (e.g., UN, EU) are increasingly committed to its protection. Most of these actions require a synergy between different actors, at all involved levels, and the use of different tools to achieve the common goal of protecting our vital environment.

Advanced environmental monitoring processes also require similar collaborative approaches. They, if on the one hand, are made easier by advances in information and communication technologies and, on the other hand, require solving new challenges such as those of forming temporary teams of smart devices and fruitfully cooperation with human operators.

Collaborative mechanisms between sensors and humans within a team are a substantial improvement over simply collecting and analyzing sensor data. In fact, building ad hoc teams allows us to improve the effectiveness and efficiency of environmental surveillance activities and optimize the overall consumption of computational, memory, and energy resources.

In the scenario defined above, suppose we form a temporary team in which a human worker, who is the team leader (TL), and mobile IoT devices work together. The elements to take into account when forming such a team will be:

  • A number m of smart IoT devices placed in the environment

  • A number n of IoT devices necessary to carry out a specific surveillance activity

  • A set of k criteria, or operation profile, characterizing the IoT devices, with respect to the surveillance activity (model, sensitivity, computational storage capacity and power, mobility, and so on).

For example, consider a complex natural ecosystem, in which a significant number of IoT devices (mobile and fixed) operate; the goal could be that to collect environmental information by selecting only those devices that meet specific requirements (e.g., detector sensitivity, etc.).

As a consequence, the surveillance process can be conducted at different levels of detail based on the number of IoT devices it uses, precision, and other characteristics. These devices will have the ability to communicate with each other and also cooperate in order to identify errors and malfunctions [42]. In this context, the framework will be able to support the TL in the formation of the teams, analyzing and keeping the profile of the devices and the activities carried out updated. Therefore, once the task and characteristics of the IoT devices required by the TL are known, the best team of collaborators of the TL will be formed.

More formally, let A be an area to monitor, let SE the smart environment active on A, and let SA the set of the surveillance activities required to be performed on A (see Fig. 1).

Fig. 1
An illustration of a framework represents a team leader T L carrying out a set of surveillance activities a 1 to a n, according to operative time t, and value of an integrated measure w, through ad hoc teams of I o T devices.

The framework supports an team leader TL in forming temporary, ad hoc teams (dashed boxes) of IoT devices according to their time availability t and trust w, for carrying out some surveillance activities SA in a specific smart environment SE

Specifically, the m IoT devices are classified based on their operational profiles, which are kept constantly updated by the framework. For each SA, which can also be formed by several elementary tasks, a team leader is selected who will proceed to choose the n IoT devices members of his team T, classifying them in ascending order according to the measure:

$$\displaystyle \begin{aligned} R = \frac{t}{w} \end{aligned}$$

where for each device, R is its rank, t is the operative time (e.g., the time required to a device for ending its current task and becomes again available), and w is the value of an integrated measure that takes into account the reputation and the accuracy of the IoT device (see Sect. 3).

The proposed framework is compliant with approaches that can differ in computational complexity and performance. In order to test the feasibility of the proposed solution, a numerical approach has been preliminary adopted here. In addition, a centralized or distributed approach could be adopted for managing the device profiles or for the calculation of their rank and their trust and accuracy; this also depends on the nature of the data to be processed or according to specific needs (response time, privacy, resource usage, etc.). This aspect can heavily affect the performance of the system also in the light of the specific devices features and the application context [12]. However, we currently consider these aspects as orthogonal to the core goal of our proposal.

However, it is simple to note how a collaborative and trusted monitoring activity, such as the one required in the proposed framework, can easily be implemented through the agent-based computing paradigm, thanks to the cooperative and social attitudes of software agents, both with real and virtual entities. In this respect, software agents can proactively perform sensing/computation/implementation tasks in the interest of human users and also applying nontrivial coordination schemes.

For this purpose, in the following we will consider that each IoT device is associated with an agent and similarly for the TL. Among the advantages of such an approach, we point out that the multi-agent system could take charge of many instances related to, e.g., device heterogeneity, thus providing the TL with an abstract, more resilient, and less critical SE.

In addition, in order to prevent tampering, protecting the integrity and reliability of the data collected and stored, the agent hosted by each device could operate autonomously from the device and appropriately encode the data (see Sect. 3) Thus, even in potential “hostile” environments, agents associated with the TL and IoT devices could mutually interact in safe modality in the absence of a central repository.

Finally, agent simulators could be exploited to simulate easily on the performance of complex coordination, computation, mobility, network, and energy models.

3 The Trust Model

In our framework, the trustworthiness of IoT devices plays a fundamental role to form the teams. To this purpose a specific trust model has been designed to characterize IoT devices. Even though a significant number of reliability, reputation and trust definition have been provided in the literature (the interested reader can refer to [3, 10, 40]). In the following we will refer to the definitions provided below:

  • Reliability. Let k be the measure of reliability of a device, in the range [0, 1], representing its ability to correctly describe the environment where it lives. k takes into account each task the device has carried out. More in detail, let y = f(x1, ⋯ , xn) ∈ [0, 1] ⊂R be a function describing the quality of the task carried out by the device and let x1, ⋯ , xn be some parameters referring to freshness, device competence, etc. Hence, k is computed as:

    $$\displaystyle \begin{aligned} k^{new} = \alpha \cdot k^{old} + (1-\alpha) \cdot y, \end{aligned} $$
    (1)

    where α ∈ [0, 1] ⊂R gives more or less relevance to y in updating k.

  • Reputation. Let m be the measure of the reputation of a device, ranging in [0, 1] ⊂R, about the appreciation a device receives from the team leader community for its activity. The measure m, is computed on the basis of the feedback n ∈ [0, 1] ⊂R provided by the TLs which it cooperated with and calculated as:

    $$\displaystyle \begin{aligned} m^{new} = \beta \cdot m^{old} + (1-\beta) \cdot n \end{aligned} $$
    (2)

    where β ∈ [0, 1] ⊂R gives more or less relevance to n (i.e., the last task) in updating m.

  • Trust Let w a measure of the trust of a device, belonging to [0, 1], which combines both reliability and reputation measures to characterize a IoT device in team formation processes. The measure w is computed as:

    $$\displaystyle \begin{aligned} w = \gamma \cdot k + (1- \gamma) \cdot m \end{aligned} $$
    (3)

    where γ ∈ [0, 1] ⊂R gives more or less relevance to k with respect to m in order to adopt different strategies, in terms of reliability and reputation, in team formation processes based on the specific characteristics of the monitored ecosystem.

More in detail, the main peculiarities in our reputation model are:

  • Reliability and reputation respectively refers to the provided data and the data requester in order to obtain a comprehensive trustworthiness measure. This overcomes the syllogism that a trusted entity would, by default, guarantee trusted data. In fact, the premise itself does not guarantee that only qualitatively adequate data can be collected, and this is without dishonest behaviors (for simplicity’s sake, not currently considered) occurring for some illicit purpose.

  • The proposed measure of “reliability” can take into account several contextual elements that may be present in the target functions, e.g., granularity of data (sensitivity is an important aspect in some environmental surveillance activities, like chemical radiation), frequency of detection (excessive detection frequency could represent computational, storage, and transmission overhead), responsiveness (it is critical in cases of alerts for catastrophic natural events like floods, earthquakes, and similar occurrences), etc.

  • We have linearly combined reputation and precision measures in a single trustworthiness measure, like [23]. In such a way, by increasing the reputation and/or the reliability, then also the trustworthiness increases and vice versa. Notwithstanding its simplicity, behind the advantage of a predictable behavior, this linear trust model performs well, as it is shown by the results presented in Sect. 4 with respect to the proposed simulated case-study.

  • Finally, the value of the γ parameter can be modified on an ad hoc basis, for example, to take into account on the contextual knowledge, or for applying more sophisticated specific strategies. To this end, sensitivity studies could be performed aimed at maximizing the performance of the framework by balancing the various factors involved therein.

4 Experiments

The proposed framework was validated through a set of experiments simulating an intelligent environment E formed by humans and IoT devices that are supported by a multi-agent system. A time window consisting of multiple working days was simulated, and a number of environmental surveillance activities were performed for each day. In turn, each surveillance task, carried out by appropriate teams of IoT devices managed by a TL, consisted of several sub-tasks, even different among them.

For simplicity, each team consists of a TL (operating as a supervisor), a number of IoT devices (for convenience assumed mobile such as simple drones). Furthermore, it was assumed that:

  • IoT devices are heterogeneous in reliability and reputation (or, in other words, accuracy and effectiveness);

  • Each surveillance and monitoring task requires a specialized device.

The assumptions made imply that:

  • Each device requires a different amount of time to complete its task.

  • A device receives from the TL that requested its service, a different appreciation.

In the formation of a team, each TL is supported by a personal agent (TLA). The TLA cooperates with the software agents associated with the IoT devices and forms, at a given time, the best possible team optimizing this process with respect to time availability and reliability of the devices (see Sects. 2 and 3). At the end of the task, the reliability (k), reputation (m), and trustworthiness (w) of the device will be updated.

4.1 Experimental Settings

In the simulation the following setting has been adopted:

  • A unique smart environment SE.

  • 30 working days.

  • 150 surveillance (i.e., monitoring) tasks per day.

  • 100 mobile heterogeneous IoT devices.

  • The surveillance working place must be reached in a time of 10 min.

  • Each surveillance activity consists of 4 different serial sub-tasks, each one realized by 3 different mobile IoT devices (i.e., a surveillance activity requires 12 IoT devices).

The settings of IoT devices conform to the standard values for the application domain under consideration. In addition, preliminary tests also enabled the parameters of the trust model to be configured. More in detail:

  • The initial values of w and m have been initially set to 1.0, as well as that of w.

  • The parameters α and β, used to calculate k and m, respectively, have both been set to 0.85, this for warranting a smooth behavior over time.

  • The parameter γ, used to update the w was set to 0.75, to give more relevance to the feedback issued by the team leader.

4.2 Results

The preliminary simulations carried out used two different scenarios named S1 and S2. More specifically, two different configurations were adopted in terms of the overall reliability and reputation of IoT devices, i.e., their accuracy and their appreciation by TLs. In more detail, reliability and reputation varied in different fixed intervals in a uniform manner, and, consequently, so did the reliability measure. For the S1 scenario reliability and reputation varied in a range of 10%, while for S2 they could vary in a range of 20%.

Two strategies were also adopted for the two scenarios to guide the teams’ formation processes; the first based on our approach, the other based only on the time availability of IoT devices. The results obtained are represented in Fig. 2 and confirmed that in both scenarios our strategy performs better than the one based on time availability alone. This implies that in the formation of the teams, those devices that are the more accurate and effective were chosen.

Fig. 2
A horizontally fluctuating line graph for S 1 w, S 1 t, S 2 w, and S 2 t versus Day. S1 w has the highest working days of approximately 0.979. S 2 curves are at the bottom.

Trustworthiness for working days for the scenarios S1 and S2 for teams formed on the basis of the trustworthiness and the only time, respectively

Furthermore, through the measures of reliability and reputation described in Sect. 3, it is possible to verify the advantages of our proposal in comparison to the formation of teams based only on the time of availability of a device or, in other words, based on the formation of the required team in the fastest way.

The two strategies described above for the two scenarios S1 and S2 were applied over the entire 30 days simulated considering the reliability and reputation measures of all IoT devices affiliated with the various teams thus formed.

A cumulative balance in terms of reliability and reputation for the two scenarios are depicted in Figs. 3 and 4. The benefits given by our proposal are evident in both scenarios and for both measures; moreover, the more the benefits provided by our proposal increase, the more heterogeneous the IoT devices are.

Fig. 3
An line graph of summation delta k versus days for S 1 and S 2 from the origin. S 2 has a steeper increase than S 1.

Advantages in terms of reliability (k) between trustworthiness and time strategies for scenarios S1 and S2

Fig. 4
An increasing line graph of summation delta m versus days for S 1 and S 2. S 2 is steeper than S 1.

Advantages in terms of reputation (m) between trustworthiness and time strategies for scenarios S1 and S2

Conversely, by adopting a team formation strategy based only on the use of the devices that have maximum reliability, in that case while we will achieve the best performance in terms of accuracy if compared to any other possible strategy, but on the other hand, the time to complete a monitoring task may increase significantly and unacceptably.

5 Related Work

An increasing number of researches focus on collaborative environmental surveillance and monitoring, mainly leveraging on well-established technologies (individually considered or jointly exploited) such as wireless sensor and actuator networks (WSANs), unmanned aerial vehicles (UAVs), automated guided vehicles (AVGs), and other IoT-related ones.

In [16, 51] smart systems based on cooperating WSANs allow controlling temperature, light, and humidity levels of indoor spaces in order to identify and react to critical situations but also to improve the energy efficiency of buildings and thermal comfort of their inhabitants. In collaboration with teams of AGVs, instead, WSN-equipped workshops can benefit of reduced downtime and limited connectivity issues [20, 28]: the operations of the production lines are better synchronized with each other, while anomalies can be earlier identified and solved, often automatically, thus also limiting the human interventions.

In outdoor large-scale environments (e.g., roads, agriculture fields), WSN and UAV can collaborate in surveillance and monitoring tasks by ensuring relevant improvements in terms of effectiveness and responsiveness, especially in case of emergency situations [41, 44]. For example, collaborative smart drones have been widely exploited in the smart city domain for fire and accident detection [6], pollution [55] and parking monitoring [9], disaster management scenarios [5], and urban video-surveillance [36], often by implementing efficient data processing strategies based on lightweight AI techniques. More recently, due to the COVID-19 emergency, collaborative monitoring and surveillance systems have been implemented to hinder the virus spreading both in indoor and outdoor environments [39, 49].

In all the aforementioned works, apart from specific monitoring targets (humidity, temperature, CO/noise/pollution/water level, etc.) and implementation choices (e.g., centralized cloud-based systems or distributed ones pivoted around software agents), the collaboration between human and machines is key since the complexity of some operations demands several, heterogeneous devices to cooperate with each other and to work as one. However, to form teams by leveraging on principles such as locality [46] (i.e., to group team members geographically or socially close with each other) or similarity [13] (i.e., to ensemble team from members with common objectives, features or working modalities) is definitively challenging, especially on large-scale and dynamic scenarios. There, devices can be frequently substituted, dropped, or hijacked: therefore, the history of past interactions is not always available, and there are other few useful elements upon which estimating the reliability of candidate team members [54]. Hence, over the years, locality or similarity principles have been replaced by trust as first-class criterion for dynamic team formation, mostly supported by decentralized techniques such as EigenTrust [32] or the PeerTrust [56].

Along this line, the air-quality level and healthiness of a monitored environment has been rated in [4] by means of a trust-based decision-making protocol according to which “trusted” community members are able to forward information to health professionals and to alert people in the case of safety risks. Similarly, authors of [29] have implemented a participatory sensing for hazard detection and response system: a Trust-as-a-Service cloud utility is exploited to manage the reputation scores of the community members (i.e., users, sensors, and other IoT devices) so that they can automatically carry on both surveillance and notification tasks, even in large-scale scenarios.

Rather than scalability, trust systems of [37] and [30] put the interoperability on the spotlight. The former is SenSquare, a collaborative IoT platform for environmental monitoring capable to deal with different data formats and transmission protocols during the gathering process from heterogeneous, trusted data sources. The latter [30], instead, refers to a cloud-based data-centric framework for trustworthy IoT monitoring services: here, authors have defined a comprehensive trustworthiness score (which considers the trust of both data and entity) which is potentially compliant with the standards proposed by the Telecommunication Standardization Sector (ITU-T, which coordinates standards for telecommunications and information communication technology).

Scalability and interoperability but also smartness and autonomy are desiderata of a collaborative trust-based systems that can be achieved thanks to the software agents [24]. Just to cite a few works, an agent-based alert system has been implemented in [8] for promptly alerting in case of tsunami events: a team of “agentified” wavemeters provide certified data, automatically discarding the detection coming from less reliable or less reputed devices (according to the trust model presented by [47]).

In the industrial IoT (IIoT) scenario, instead, factory activities such as the monitoring of materials or the supply chain resource managements have been demanded to teams of trusted agents (acting as digital alias for sensors, actuators, and AVGs), automatically grouped according to mutual “on field” information/observations, social relationships, QoS, security, etc. [1, 14, 18, 21, 43, 48]. In [34] the monitoring operations of a smart grid are performed by a multi-agent system over a blockchain by exploiting game theory principles, while in [45] the authors proposed a trust-based multi-agent cooperative load balancing system aimed at monitoring CPU and memory usage reports of a highly distributed network.

In all these cases, the agent-based computing represents an enabling paradigm for the dynamic, decentralized, and scalable information processing aimed at the establishment of a sound trust system.

6 Conclusions

The formation of temporary teams that include IoT devices and human team leaders leads TLs to interact with devices whose performance, relative to their specific skills, may not be the best possible. In this article, we proposed a strategy to form the best possible team by selecting its members based on their reliability, reputation, and availability. Specific definitions of device reliability, reputation, and trustworthiness have been introduced, and a new trust-based framework was presented to support the formation of temporary teams of IoT devices.

The experiments we performed on a simulated scenario, although based on the use of realistic parameters (with the goal of considering our approach suitable for environmental surveillance applications), showed that the combination of reliability, reputation, and trustworthy information leads to measurable performance improvement in the simulations performed. In fact, the simulations have shown the potential benefits of our proposal in terms of efficiency and effectiveness.

These results obviously need to be confirmed by further experiments on real environments. Indeed, some random and unpredictable events due, for example, to malfunctions, may affect the performance of the framework. We plan to address this and other specific issues in our ongoing research.