Int. J. of Computers, Communications & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. VI (2011), No. 4 (December), pp. 592-602 A Non-cooperative Game Algorithm for Task Scheduling in Wireless Sensor Networks L. Dai, Y.L. Chang, Z. Shen Liang Dai School of Electronic and Control Engineering Chang’an University Xi’an 710064, China E-mail: ldai1981@gmail.com Yilin Chang, Zhong Shen State Key Laboratory of Integrated Service Networks Xidian University Xi’an 710071, China E-mail: ylchang@xidian.edu.cn, zhshen@mail.xidian.edu.cn Abstract: Scheduling tasks in wireless sensor networks is one of the most challenging problems. Sensing tasks should be allocated and processed among sensors in minimum times, so that users can draw prompt and effective con- clusions through analyzing sensed data. Furthermore, finishing sensing task faster will benefit energy saving, which is critical in system design of wire- less sensor networks. But sensors may refuse to take pains to carry out the tasks due to the limited energy. To solve the potentially selfish problem of the sensors, a non-cooperative game algorithm (NGTSA) for task scheduling in wireless sensor networks is proposed. In the proposed algorithm, according to the divisible load theory, the tasks are distributed reasonably to every node from SINK based on the processing capability and communication capability. By removing the performance degradation caused by communications inter- ference and idle, the reduced task completion time and the improved network resource utilization are achieved. Strategyproof mechanism which provide in- centives to the sensors to obey the prescribed algorithms, and to truthfully report their parameters, leading to an effient task scheduling and execution. A utility function related with the total task completion time and tasks allocat- ing scheme is designed. The Nash equilibrium of the game algorithm is proved. The simulation results show that with the mechanism in the algorithm, selfish nodes can be forced to report their true processing capability and endeavor to participate in the measurement, thereby the total time for accomplishing the task is minimized and the energy-consuming of the nodes is balanced. Keywords: wireless sensor networks; task scheduling; divisible load theory; game algorithm; mechanism design. 1 Introduction & Motivation Wireless sensor networks are constituted by a large number of nodes, and without fixed infras- tructure and centralized control mechanisms, so the task scheduling needs of mutual cooperation in all nodes. The energy of sensors is limited, so not all the sensors are willing to participate in collaborative efforts. Lack of coordination between the nodes in wireless sensor networks is a new problem[1]. Owing to the sensors with limited energy, the task should be completed within the shortest possible amount of time, so that users can draw useful conclusions through analyzing sensed Copyright c⃝ 2006-2011 by CCC Publications A Non-cooperative Game Algorithm for Task Scheduling in Wireless Sensor Networks 593 data. Furthermore, finishing sensing task faster will benefit energy saving, which is critical in system design of wireless sensor networks. Divisible load theory [2] provides an effective solution to wireless sensor networks for task scheduling [3-6]. Different from other heuristic solutions of task scheduling problem in wireless sensor networks [7, 8], this scheme can get not only the optimal solution, but also the analytic solution, thus ensuring the consistency of the results of scheduling. Divisible load scheduling algorithms were applied to wireless sensor networks in [3-6]. Al- though the authors derived closed-form solutions to obtain the optimal finish time, the network topology discussed in those papers is single-level tree structure. While in wireless sensor networks, as compared with the single-level tree structure, clustered structure (multi-level tree structure) has a great of advantages [9]. Those algorithms mentioned above designed on the premise that sensors manipulate the algorithms and perform a task to the best of their abilities. But the sensors may be owned by autonomous rational organizations or people that have no a priori mo- tivation for cooperation. Consequently, they will manipulate the algorithms if it benefits them to do so. Therefore, we present a non-cooperative game algorithm for task scheduling in wireless sensor networks. The goal of this algorithm is to minimize the overall execution time (hereafter called makespan) and fully utilize network resources, by finding an optimal strategy of splitting the original tasks received by SINK into a number of sub-tasks as well as distributing these sub- tasks to the clusters in the right order, and through the proposed mechanism to encourage collaboration. 2 Mechanism design The energy of sensors is limited, if we do not integrate contributions with benefits, not all nodes willing to participate in collaborative efforts to perform tasks. This selfish, non-cooperative behavior will result in poor performance. If we follow the principle of more labor and more benefits, some selfish sensors, driven by the interests, will intentionally exaggerate its data- measuring capacity to increase their income. Such dishonest behavior will result in that it’s difficult to determine which sensor reporting its actual capacity, and which said a lie, so we can not globally optimize tasks allocation according to each sensor’s capacity. These dishonest or selfish behavior, has seriously affected the efficiency of wireless sensor network. Therefore, we should provide incentives to the nodes to obey the prescribed algorithms and to truthfully report their parameters, leading to an efficient allocation and execution. This problem can be solved by applying mechanism design of game theory. Mechanisms are generally composed of allocation o = o(a1, a2, · · ·, an) and payment p = (p1(a), p2(a), · · ·, pn(a)) rules. Allocation rules also are called output function. In mechanism design, there are usually n agents, and each agent has some private information, which is known as the type of agent or true value. The private information is only known by agent, and is confidential for the external, for example, the type of a agent ti can be the cost executing an assigned task. vi(ti, o) is the value function of an agent, said the cost of performing a task. pi(·) is the payment function for agent performing a task. ui(·) is the utility function of an agent, that ui(·) = pi(·) − vi(ti, o). To maximize the utility function value is the goal of agents. Mechanism should be designed to maintain unity with the goal the agent seeking for. Mechanism can induce the agent’s choice or behavior by means of payment. If in a mechanism, the only optional behavior of all agents is directly stating their prefer- ences, then we say that the mechanism is a direct revelation mechanism. In a direct revelation mechanism, if all agents will tell their true preferences in order to maximize their utility, then we say that the mechanism is incentive compatibility. The nature of incentive compatibility allows 594 L. Dai, Y.L. Chang, Z. Shen SINK C1 Ck C3 C2 n11 nknk nk2 nk1 n1n1 n13 n12 l11 l13 l12 Cluster1 l1n1 lknk lk2 lk1 Clusterk l1 l2 l3 lk Figure 1: Network topology us to design a mechanism to overcome the selfishness of agents, because in an incentive compat- ible mechanism, the agent will always choose to say their true private information in order to maximize their utility. In a direct revelation mechanism, if it’s a dominant strategy that they gave their true preferences, then we claimed that the mechanism is strategyproof. If each agent is honest, and each agent’s income is not less than zero, then the mechanism satisfies the voluntary participation condition. 3 Scheduling Algorithm 3.1 Network model The network topology discussed in this paper is shown in Fig.1. Wireless sensor networks construct clusters several times in its life cycle. Each cluster will have a set-up phase and a steady-state phase[11]. Assuming that there are k clusters (Clusteri, i = 1, ...., k) in the network during a steady-state phase. Each cluster head is expressed as Ci. Within the Clusteri, there are ni nodes expressed as ni,j (i = 1, ....k; j = 1, ...ni), respectively. Communication links between cluster heads and SINK are expressed as li, i = 1, ...., k, respectively. Communication links between intra-cluster nodes and cluster head Ci are expressed as li,j (i = 1, ....k; j = 1, ...ni), respectively. The following notations will be used throughout this paper: αi: The total fraction of load that is assigned by SINK to cluster head Ci; αi,j: The fraction of load that is assigned to intra-cluster node ni,j in Clusteri by Ci; By definition we can see: k∑ i=1 αi = 1 (1) ni∑ j=1 αi,j = αi (2) ωi: A constant that is inversely proportional to the processing (data fusion) speed of cluster head Ci; yi,j: A constant that is inversely proportional to the measuring speed of intra-cluster node ni,j; A Non-cooperative Game Algorithm for Task Scheduling in Wireless Sensor Networks 595 zi: A constant that is inversely proportional to the speed of link between SINK and cluster head Ci; zi,j: A constant that is inversely proportional to the speed of link between the cluster head Ci and the intra-cluster node ni,j; Tcp: Data fusion intensity constant. Tcp is the time that takes to fuse all the load on a cluster head when ωi = 1. The entire load can be fused on cluster head Ci in time ωiTcp; Tms: Measurement intensity constant. Tms is the time that takes the intra-cluster node ni,j to measure the entire load when yi,j = 1. The entire assigned measurement load can be measured on the intra-cluster node ni,j in time yi,jTms; Tcm: Communication intensity constant. This is the time it takes to transmit all the pro- cessing loads over a link when zi = 1. The entire load can be transmitted over the ith link in time ziTcm; φi: The information utility constant [8,10] of cluster head Ci. Information utilization constant is based on a technique of information accuracy estimation. Through estimating accuracy of information, cluster head can know the approximate percentage of data fusion. Tf : The finish time of a given task. In this paper, we formulate the problem of task scheduling in a large scale sensor network as an optimization problem to minimize Tf . 3.2 Scheduling strategy The proposed task scheduling algorithm is based on LEACH [11] protocol. LEACH was firstly proposed clustering protocol in wireless sensor network, and its certain governing ideas breathe through many other clustering protocols, such as TEEN and DAEA. LEACH protocol structures the single-hop networks. Each cluster’s intra-cluster nodes share the same channel, while each cluster head has its own channel to SINK. The original tasks received by SINK are divided into two stages: inter-cluster task scheduling and intra-cluster task scheduling. First, inter-cluster task scheduling partitions the entire tasks into each cluster, and then the sub-tasks in a cluster are assigned to each intra-cluster node by intra-cluster task scheduling. 1) Intra-cluster task scheduling Fig.2 illustrates the timing diagram for a set of intra-cluster nodes, indexed from n1 to nk, in one cluster. From Fig.2, it can be observed that there is no time gap between every two successive nodes because the divisible workload can be transferred in the cluster. All nodes start to measure data at the same time. Once the previous node finishes transmitting data, the other one completes its measuring task and starts to report its data. As a result, the proposed timing diagram minimizes the makespan by scheduling the measuring time and reporting time of each node. Moreover, since the intra-cluster scheduling tries to avoid the transmission conflicts at the cluster head, energy spent on retransmission is conserved. For cluster i, based on the timing diagram shown in Fig.2, one can write the following set of equations about tasks assigned to the intra-cluster nodes in Clusteri: αi,j−1yi,j−1Tms = αi,jyi,jTms + αi,jzi,jTcm, i = 2, 3, ...k (3) A general expression for the above set of recursive equations can be written as: αi,j=si,jαi,j−1 (4) where si,j = yi,j−1Tms/(yi,jTms + zi,jTcm). 596 L. Dai, Y.L. Chang, Z. Shen n1 n2 ti n3 nk ,1 ,1i i cmz Tα,1 ,1i i msy Tα ,2 ,2i i cmz Tα,2 ,2i i msy Tα ,3 ,3i i cmz Tα,3 ,3i i msy Tα , ,i ni i ni cmz Tα, ,i ni i ni msy Tα Measurement Data reporting Figure 2: Timing diagram for intra-cluster task-processing Using eq.2 and eq.4, The above recursive equation for αi,1 can be rewritten in terms of αi only as αi,1 = αi/(1 + ni∑ j=2 j∏ k=2 si,k) (5) The cluster head Ci will use the above value of αi,1 to obtain the amount of data that has to be measured by the rest of the ni − 1 sensors by using αi,j = αi j∏ k=2 (si,k)/(1 + ni∑ j=2 j∏ k=2 si,k) (6) Then from Fig.2, the minimum time for measuring, reporting SINK’s sub-task αi can be given as ti=αi(yi,1Tms + zi,1Tcm)/(1 + ni∑ j=2 j∏ k=2 si,k) (7) 2) Inter-cluster task scheduling After cluster heads fusing the intra-cluster nodes’ measured data, cluster heads can send the fused data to SINK concurrently because each cluster head has a separate channel to SINK. In order to remove the performance degradation caused by idle, and to improve efficiency, as shown in Fig.3, we can get ti + αiwiTcp + φiαiziTcm = tj + αjwjTcp + φjαjzjTcm, i ̸= j (8) In eq.7, we make (yi,1Tms + zi,1Tcm)/(1 + ni∑ j=2 j∏ k=2 si,k) = gi, then substitute gi into eq.8, we can get αiri = αjrj (9) where ri = gi + wiTcp + φiziTcm. Now using the eq.1 and eq.9, one can solve for αi as αi=(1/ri)/ k∑ i=1 (1/ri) (10) A Non-cooperative Game Algorithm for Task Scheduling in Wireless Sensor Networks 597 Intra-cluster scheduling Reporting data to SINK 1t 2t 3t 4t kt 1 1 cpwTα 2 2 cpw Tα 3 3 cpw Tα 4 4 cpw Tα k k cpw Tα k k k cmz Tϕ α 1 1 1 cmzTϕ α 2 2 2 cmz Tϕ α 3 3 3 cmz Tϕ α 4 4 4 cmz Tϕ α C1 Ck C4 C3 C2 S I N K Tf Data fusion Figure 3: Timing diagram for inter-cluster task scheduling Hereto, we can get the fraction of load cluster head Ci and the intra-cluster nodes within it received from SINK (αi and αi,j). And the total task execution time is as follow: Tf=ti + (wiTcp + φiziTcm)(1/ri)/ k∑ i=1 (1/ri) (11) For the homogeneous networks, the parameters(measurement speed, communication speed, data-fusing speed, information utility constant) of the network are the same and there are n sensors in each cluster. SINK can evenly distributed loads to each cluster. The sub-loads each cluster receiving is as follows: αi=1/k (12) In the homogeneous networks, the minimum time-consuming for the total task is: Tf=(D + wTcp + φzTcm)/k (13) where D= (yTms + zTcm)/n. With the increasing density of wireless sensor networks, the number of the clusters is higher with the current clustering algorithms. From eq.13, it can be known that Tf approaches 0 with k approaching infinite. 4 Mechanism Design for NGTSA In this section, we propose strategyproof mechanism for task scheduling of wireless sensor networks. The ith cluster is composed of ni strategic sensors. Each task-performing sensor ni,j is characterized its true value yi,j, which is equal to the time to measure the unit task. We denote by yi = (yi,1, yi,2, ···, yi,ni) the vector of true measuring speed. Measuring speed yi,j is private to ni,j. As the sensor ni,j with rationality may give a bid bi,j which is not equal the true measuring speed yi,j, if it benefits it to do so. Cluster heads calculated the fraction of load that is assigned to intra-cluster nodes αi(bi) = (αi,1(bi), αi,2(bi), ···, αi,ni(bi)), according to the bids of intra-cluster nodes, where ni∑ j=1 αi,j(bi) = αi, and bi = (bi,1, bi,2, · · ·, bi,ni) is the bid vector of intra-cluster nodes. 598 L. Dai, Y.L. Chang, Z. Shen As the selfishness of sensors, the sensor may complete the measurement task at a relatively low speed ỹi,j, where ỹi,j ≤ yi,j. After intra-cluster nodes completed their task, cluster head node will get the actual measuring speed. The value function of ni,j under task allocation αi(bi) is defined as follow: Vi,j(αi(bi), ỹi,j) = −αi,jỹi,j (14) The value of Vi,j(αi(bi), ỹi,j) is equivalent to the negation of the actual time required for ni,j to complete αi,j of total load. It can be regarded as the cost of ni,j to complete its task. The mechanism will provide payment for involving in measurement, so each node will select the appropriate strategy to maximize its benefits. The utility function of ni,j is defined as follow: Ui,j(bi, ỹi) = Qi,j(bi, ỹi) + Vi,j(αi(bi), ỹi,j) (15) where Qi,j(bi, ỹi) is the payment cluster head Ci paid to ni,j, ỹi = (ỹi,1, ỹi,2, · · ·, ỹi,ni) is the vector of each node’s actual measurement speed. Utility function equals the payment the node got from mechanism minus the cost for completing its tasks. Designing such mechanisms involves finding an allocation and a payment scheme that mini- mize the makespan according to the sensors’ bid bi and motivate all the intra-cluster sensors to bid their true value yi,j and measure the task at their full measuring capacity ỹi,j = yi,j. Define the payment function for mechanism is as follow: Qi,j(bi, ỹi) = Ci,j(bi, ỹi) + Bi,j(bi, ỹi) (16) where Ci,j(bi, ỹi) = −Vi,j(αi(bi), ỹi,j) is the compensation to the node ni,j. The bonus of ni,j is defined as follow: Bi,j(bi, ỹi) = T−i,j(αi(b−i,j), b−i,j) − T(αi(bi), (b−i,j, ỹi,j)) (17) where T−i,j(α(b−i,j), b−i,j) is the optimal task completion time when ni,j is not involved in measurement, that is, the bonus of intra-cluster node is equal to its contribution in reducing the task completion time because of its participation for measurement. Theorem (strategyproofness). The mechanism proposed in this paper is strategyproof. Proof. According to the bids of intra-cluster nodes in cluster i, bi = (bi,1, bi,2, · · ·, bi,ni), we can get the utility of ni,j is as follow: Ui,j(bi, ỹi) = Qi,j(bi, ỹi) + Vi,j(αi(bi), ỹi,j) = T−i,j(α(b−i,j), b−i,j) − T(αi(bi), (b−i,j, ỹi,j)) + αi,j(b)ỹi,j − αi,j(b)ỹi,j = T−i,j(α(b−i,j), b−i,j) − T(αi(bi), (b−i,j, ỹi,j)) (18) When ni,j perform a task to the best of their abilities (ỹi,j = yi,j), and bid the measurement as bi,j = yi,j, the utility of ni,j is as follow: Uti,j = T−i,j(α(b−i,j), b−i,j) − T(αi(bi), (b−i,j, ỹi,j)) = T−i,j(α(b−i,j), b−i,j) − T ti,j (19) where T ti,j is the shortest possible amount of time to finish total tasks according to divisible load theory. If ni,j bids a lower value, that is, bi,j < yi,j ,the makespan is increased by a small amount as the load allocated to the other intra-cluster nodes is increased. Therefore, only when ni,j voluntarily gives the true measuring speed and be assiduous in its duty, they can get the maximum benefit. Because T−i,j is the optimal task completion time when ni,j is not involved in measurement, its value must not be less than when all the nodes involved in the tasks. So, we can get Uti,j ≥ 0, that is, all nodes within one cluster will try to do their best to carry out a task. A Non-cooperative Game Algorithm for Task Scheduling in Wireless Sensor Networks 599 5 Wireless Energy Use In this section, the energy model of the NGTSA algorithm is presented in detail and the equations of energy consumption of individual sensor nodes are derived. The model is based on first-order radio model [11]. There are three kinds of energy consumption in the wireless sensor network: measurement, data fusion, and communication. Because nodes in the sensor network cooperate with each other via data transmission. Energy consumption of communications exist in sensor nodes, cluster heads and SINK. It is not necessary for cluster heads and SINK to perform any sensing task. Thus, there is no energy cost for cluster heads due to the measurement of these nodes, while the additional energy cost of cluster heads attributes to data fusion. The energy to sense, fuse, and transmit a unit sensory data are denoted by es, ep, and etx, respectively. Sensor nodes also consume the energy of erx to receive one unit of data. The distance between the sender and the receiver is d. The energy use for each kind of nodes is outlined as follows: Energy use for individual sensor nodes j in cluster i: Ei,j = αi,j(es + etxd 2), i = 1, · · ·, k , j = 1, · · ·, ni (20) Energy use for individual cluster head: Ei = αi(erx + ep + φietxd 2), i = 1, · · ·, k (21) Energy use for SINK: ESINK = k∑ i=1 αiφietx (22) 6 Performance Evaluation In the above sections, we have obtained the close-form solution of the task completion time and the formula for the energy consumption of each node. In this section, we investigate the effects of different cases under homogeneous network environment on the makespan, energy consumption of every intra-cluster nodes, and the payment/utility of the cheating nodes. We consider the wireless sensor network comprising 10 clusters. Within each cluster, there are 20 intra-cluster nodes. Assume that only the first intra-cluster node cheats by reporting values different than its true measuring speed, and by measurement at a different speed than the true speed in each cluster. The speed of communication link between each node were 0.05; the measuring speed of each intra-cluster node is 0.2; the data fusion speed of each cluster head is 0.1, and the information utility constant of each cluster head is 0.5. In the simulation, the following energy parameters are adopted: transmitting a unit of sensor reading over a unit distance takes etx=200nJ, receiving one unit of sensor reading consumes erx=150nJ, measuring one unit of sensor reading needs es=100nJ, fusing one unit of observation consumes ep=20nJ and the distance between the sender and the receiver is d=100m. In the simulation, we supposed that: Tms=Tcm=Tcp= 1. We simulated the following eight cases: 1⃝ yi,1 = bi,1 = ỹi,1; 2⃝ yi,1 = bi,1 < ỹi,1; 3⃝ yi,1 < bi,1 = ỹi,1; 4⃝ yi,1 = ỹi,1 < bi,1; 5⃝ bi,1 < yi,1 = ỹi,1; 6⃝ yi,1 < ỹi,1 < bi,1; 7⃝ yi,1 < bi,1 < ỹi,1; 8⃝ bi,1 < yi,1 < ỹi,1. where bi,1 states the bid of the first intra-cluster node; yi,1 represents the node’s actual value; ỹi,1 is the true value of the measurement speed. The bid bi,1 and the measurement value ỹi,1 for each case are presented in Tables 1: 600 L. Dai, Y.L. Chang, Z. Shen Table 1: Bids and Execution Values Case 1 2 3 4 5 6 7 8 bi,1 0.2 0.2 0.3 0.3 0.1 0.4 0.3 0.1 ỹi,1 0.2 0.3 0.3 0.2 0.2 0.3 0.4 0.3 Figure 4: Makespan when the first intra-cluster node cheats The simulation results are shown in Fig.3 and Fig.5. Firstly, Fig.3 shows the makespan for the eight cases. Notice that case 1 (yi,1 = bi,1 = ỹi,1) results in the minimum makespan, while all other cases result in a larger makespan. In that case, each node honestly bids, and makes effort to measure. When ỹi,1 ≤ bi,1, the case 3,4, and 7, the makespan is increased by a small amount as the load allocated to the other intra-cluster nodes is increased. The effect of cheating is dispersed throughout the remaining nodes. In the remaining case (ỹi,1 > bi,1),the case 2,5,6, and 8, the network performance dramatically degrades as the first intra-cluster nodes is overloaded, and the other nodes are underutilized. In these cases, the first intra-cluster nodes is slowing down the entire network. The increase in makespan is large, and it is due to the impact of ỹi,1. Next, the second simulation is about the energy consumption of intra-cluster sensor nodes for the 8 cases. SINK and cluster heads are not taken into account, because generally, SINK has no energy constraint and the chosen cluster heads have the possibly enough energy. The network is configured with 20 clusters. Without loss of generality, the intra-cluster sensor nodes in the first cluster are chosen to study the energy consumption, as shown in Fig.5. In each case, the energy consumption of sensor nodes monotonically decreases due to the reduced workload. In the case (yi,1 = bi,1 = ỹi,1), each node honestly bids, and make effort to measure, so the energy-consuming of each intra-cluster node is most evenly. In the case 2,5,6, and 8, because the cluster head allocates more tasks on the first intra-cluster node as it bids a rate slower than its true rate, the energy-consuming of the first intra-cluster nodes increases noticeably, which will run out power and affected the entire network performance. Then, the third simulation is about the payment and utility of intra-cluster nodes. Fig.6 shows the payment and utility for the first intra-cluster nodes in the 8 cases. As we expected, case 1 (yi,1 = bi,1 = ỹi,1), maximizes the first intra-cluster node’s utility. In all the other cases, utility is lessened. When ỹi,1 > bi,1, the utility is negative due to the impact of ỹi,1 on the A Non-cooperative Game Algorithm for Task Scheduling in Wireless Sensor Networks 601 Figure 5: Energy consumption when the first intra-cluster node cheats Figure 6: Payment and utility of the first intra-cluster node when it cheats makespan. In the remaining cases, payment and utility are reduced as αi,1. 7 Conclusions As the node in wireless sensor network has limited energy, the tasks should be completed as quickly as possible, and the network resources should be fully utilized. In this paper, we present a task scheduling algorithm (NGTSA) in clustered wireless sensor networks. The goal of this algorithm is to minimize the makespan and fully utilize network resources, by finding an optimal strategy of splitting the original load received by SINK into a number of chunks as well as distributing these chunks to the clusters in the right order. As the gradual development of the wireless sensor networks and ubiquitous networks, this scheduling model using divisible load theory needs further study and validation. In addition, the validation of divisible load theory in wireless sensor networks still remains in the simulation phase. There are short of scanty of large-scale, practical applications to demonstrate its true potential, so applying the divisible load theory in actual wireless sensor network should be an important research direction for the next step. 602 L. Dai, Y.L. Chang, Z. Shen Acknowledgement The authors thank the editors and the anonymous reviewers for their valuable comments that helped to improve the paper. The work was supported by the National Natural Science Foundation of China (No.60972047), and the 111 project (No.B08038). Bibliography [1] C. Pandana, H. Zhu, L. Ray, Cooperation Enforcement and Learning for Optimizing Packet Forwarding in Autonomous Wireless Networks. IEEE Transactions on Wireless Communi- cations, vol.7, No.8, pp.3150-3163, 2008. [2] V. Bharadwaj, D. Ghose, T. G.ROBERTAZZI, Divisible Load Theory: A New Paradigm for Load Scheduling in Distributed Systems. Cluster Computing, vol.6, No.1, pp.7-18, 2003. [3] M. Moges, T.G. Robertazzi, Wireless Sensor Networks: Scheduling for Measurement and Data Reporting. IEEE Transactions on Aerospace and Electronic Systems, vol.42, No.1, pp.327- 340, 2006. [4] H. LIU, X. YUAN, M. Moges, An Efficient Task Scheduling Method for Improved Network Delay in Distributed Sensor Networks. In Proceedings of TridentCom 2007, Orlando, FL, USA, 1-8, 2007. [5] H. LIU, J. SHEN, X. YUAN, M. Moges, Performance Analysis of Data Aggregation in Wire- less Sensor Mesh Networks, In Proceedings of Earth & Space 2008, Akron, OH, USA, 1-8, 2008. [6] C. Kijeung , T. G. Robertazzi, Divisible Load Scheduling in Wireless Sensor Networks with Information Utility Performance. In Proceedings of IPCCC 2008, Austin, Texas, USA, 9-17, 2008. [7] Z. ZENG, A. LIU, D. LI, A Highly Efficient DAG Task Scheduling Algorithm for Wireless Sensor Networks, In Proceedings of ICYCS 2008,Zhang Jia Jie , Hunan , China, 570-575, 2008. [8] J. LIN, W. XIAO, F. L. Lewis, Energy-Efficient Distributed Adaptive Multisensor Scheduling for Target Tracking in Wireless Sensor Networks. IEEE Transactions on Instrumentation and Measurement, vol.58, No.6, pp.1886 - 1896, 2009. [9] P. Guo, T. Jiang, K. Zhang, H. Chen, Clustering algorithm in initialization of multi-hop wireless sensor networks. IEEE Transactions on Wireless Communications, vol.8, No.12, pp. 5713–5717, 2009. [10] N. Nisan, A. Ronen. Algorithmic mechanism design, Games and Economic Behavior, vol.35, nos.1-2, pp.166 -196, 2001. [11] W. Heinzelman, A. Chandrakasan, An Application-specifid Protocol Architecture for Wire- less Microsensor Networks. IEEE Transaction on Wireless Communications, vol.1, No.4, pp. 660-670, 2002.