Increasing negotiation performance at the edge of the network

by   Sam Vente, et al.

Automated negotiation has been used in a variety of distributed settings, such as privacy in the Internet of Things (IoT) devices and power distribution in Smart Grids. The most common protocol under which these agents negotiate is the Alternating Offers Protocol (AOP). Under this protocol, agents cannot express any additional information to each other besides a counter offer. This can lead to unnecessarily long negotiations when, for example, negotiations are impossible, risking to waste bandwidth that is a precious resource at the edge of the network. While alternative protocols exist which alleviate this problem, these solutions are too complex for low power devices, such as IoT sensors operating at the edge of the network. To improve this bottleneck, we introduce an extension to AOP called Alternating Constrained Offers Protocol (ACOP), in which agents can also express constraints to each other. This allows agents to both search the possibility space more efficiently and recognise impossible situations sooner. We empirically show that agents using ACOP can significantly reduce the number of messages a negotiation takes, independently of the strategy agents choose. In particular, we show our method significantly reduces the number of messages when an agreement is not possible. Furthermore, when an agreement is possible it reaches this agreement sooner with no negative effect on the utility.



page 8

page 10


JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT

As the Internet of Things (IoT) emerges over the next decade, developing...

Connecting the World of Embedded Mobiles: The RIOT Approach to Ubiquitous Networking for the Internet of Things

The Internet of Things (IoT) is rapidly evolving based on low-power comp...

Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs

We propose CrowdPatching, a blockchain-based decentralized protocol, all...

RL-IoT: Reinforcement Learning to Interact with IoT Devices

Our life is getting filled by Internet of Things (IoT) devices. These de...

The Saeed-Liu-Tian-Gao-Li authenticated key agreement protocol is insecure

A recently proposed authenticated key agreement protocol is shown to be ...

MQTT-ST: a Spanning Tree Protocol for Distributed MQTT Brokers

MQTT, one of the most popular protocols for the IoT, works according to ...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.