This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

11institutetext: School of Operations Research and Information Engineering, Cornell University, Ithaca, NY

Bounding the Price-of-Fair-Sharing using Knapsack-Cover Constraints to guide Near-Optimal Cost-Recovery Algorithms

Sander Aarts    Jacob Dentes    Manxi Wu    David Shmoys
Abstract

We consider the problem of fairly allocating the cost of providing a service among a set of users, where the service cost is formulated by an NP-hard covering integer program (CIP). The central issue is to determine a cost allocation to each user that, in total, recovers as much as possible of the actual cost while satisfying a stabilizing condition known as the core property. The ratio between the total service cost and the cost recovered from users has been studied previously, with seminal papers of Deng, Ibaraki, & Nagomochi and Goemans & Skutella linking this price-of-fair-sharing to the integrality gap of an associated LP relaxation. Motivated by an application of cost allocation for network design for LPWANs, an emerging IoT technology, we investigate a general class of CIPs and give the first non-trivial price-of-fair-sharing bounds by using the natural LP relaxation strengthened with knapsack-cover inequalities. Furthermore, we demonstrate that these LP-based methods outperform previously known methods on an LPWAN-derived CIP data set. We also obtain analogous results for a more general setting in which the service provider also gets to select the subset of users, and the mechanism to elicit users’ private utilities should be group-strategyproof. The key to obtaining this result is a simplified and improved analysis for a cross-monotone cost-allocation mechanism.

Keywords:
Cost sharing Covering integer programs LoRaWAN

1 Introduction

Allocating costs fairly when providing some collective service to a set of users has been a mainstream topic within cooperative game theory in which the notion of the core, and the associated core property, plays a central role. Specifically, the core property requires that the payment from each user is such that each subset of users pays, in total, no more than the cost of providing service just to them. LP duality has long been known to play a fundamental role in such allocations, and the seminal work of Deng, Ibaraki & Nagamochi [11] and Goemans & Skutella [16] proved the link between the integrality gap (or lack thereof) for several NP-hard discrete optimization settings and the fraction of the service cost that can be recovered by an allocation satisfying the core property. We term the ratio between optimal cost and the cost recoverable satisfying the core property as the price-of-fair-sharing.

For a natural subclass of covering integer programs (CIPs), known as the multiset-multi-covering problems, the strongest known price-of-fair-sharing was not obtained using a dual LP-based framework [27]. We show that an LP-based approach can yield improved bounds and simplified analyses, not just for this special case considered by [27], but for general CIPs. More specifically, our main result is that by strengthening the natural LP relaxation for CIPs with knapsack-cover inequalities, the resulting dual LP does have the property that any feasible solution yields a cost-allocation that satisfies the core property. This reduces the problem of finding a cost-allocation to that of finding a strengthened-LP-relative approximation algorithm, allowing us to leverage approximation algorithms already known for these settings (e.g., [6, 7, 8, 22]). Not only do these existing algorithms yield bounds on the price-of-fair sharing for general CIPs, they also provide existing bounds for families of sparse CIP instances.

We also obtain analogous results in a more general setting where the service provider selects a subset of users to receive the service based on their elicited private valuations of the service. The mechanism used to to elicit users’ private valuations needs to be group-strategyproof so that no subset of users have the incentive to misreport their valuations. The key to obtaining this result is a simplified and improved analysis for a cross-monotone cost-allocation mechanism. These results also rely on our knapsack-cover-strengthened LP relaxation.

Our investigation into these questions was directly motivated by challenges in the development of an emerging technology, LPWANs, a popular Internet of Things solution for wirelessly connecting devices to the internet [34]: CIPs emerge from the appropriate model for determining the location of gateways to provide coverage to a collection of users, and our result is useful to determine how the cost of LPWANs should be shared among users in an incentive compatible manner. We complement our algorithmic and structural results with an empirical investigation into the effectiveness of our methods on relatively large-scale LPWAN data. Our empirical study demonstrates that, in comparison to several natural heuristic alternatives, our theoretically-motivated methods provide far superior results.

2 Optimizing coverage for LPWAN networks and IoT

The growth of the Internet of Things (IoT) is creating both new opportunities and challenges in wireless coverage provision and pricing. Low-power wide-area networks (LPWANs) are a ubiquitous technology for connecting devices, or things, to the internet. These networks use radio communication to transmit signals over long distances. Demodulating, and transferring these signals to the internet requires networks of physical wireless receivers. Many such networks are already deployed. In 2023 alone, LPWANs reportedly served over 1.3 billion IoT connections [1]. LoRaWAN is among the most popular LPWAN solutions, representing roughly 40% of all connections made outside of China. Globally, over 150 different network operators provide LoRaWAN coverage [35].

Sharing LoRaWAN coverage among multiple users is an effective yet challenging approach to better utilize wireless infrastructure and lower costs. Two key features make sharing LoRaWAN coverage especially beneficial. Firstly, the receivers, or gateways, can process orders of magnitude more wireless traffic than that produced by a typical single IoT application (see, e.g., the application in [2]). Secondly, the quality of coverage improves as the number of gateways increases. Transmitted LoRaWAN packets tend to fail at random, and coverage quality is measured by the packet reception rate. However, transmissions are association free; a device broadcasts to all nearby gateways, many of which may process the same packet [34]. A packet is lost if and only if all nearby gateways simultaneously fail to receive it. Thus, having multiple gateways to cover the transmitted signal can significantly improve the reception rate. This multi-coverage feature is a key aspect of our model and raises interesting computational challenges.

The problem of optimally providing wireless coverage to a group of users using multiple gateways can be modeled as a covering integer program. Let 𝒰\mathcal{U} denote a set of mm users, and \mathcal{F} a set of nn potential gateway locations, or facilities. Each user j𝒰j\in\mathcal{U} has a service requirement rj>0r_{j}>0, and each gateway has an opening cost ci>0c_{i}>0. Requirements and costs are represented by vectors 𝐫=(r1,r2,,rm)\mathbf{r}=(r_{1},r_{2},\dots,r_{m}) and 𝐜=(c1,,cn)\mathbf{c}=(c_{1},\dots,c_{n}), respectively. Each facility-user pair is associated with a contribution parameter aij0a_{ij}\geq 0 that specifies the quality of coverage that facility ii provides user jj if opened; these can be estimated using data on the distance between the facility and the user as well as the terrain [37]. Contributions are represented as an n×mn\times m matrix 𝐀\mathbf{A}. The objective is to minimize cost, subject to providing sufficient coverage to each user.

c=min{𝐜T𝐱:𝐀𝐱𝐫,𝐱{0,1}n}\displaystyle c^{*}=\min\{\mathbf{c}^{T}\mathbf{x}:\mathbf{A}\mathbf{x}\geq\mathbf{r},\ \mathbf{x}\in\{0,1\}^{n}\} (1)

Here, the binary decision variables 𝐱=(x1,,xn)\mathbf{x}=(x_{1},\dots,x_{n}) indicate whether each facility ii is opened or not. More details on how CIPs capture LoRaWAN coverage provision are given in Appendix 0.A. (A more general formulation of CIPs permits the purchase of up to did_{i} integer copies of facility ii. Our results extend to this setting in a straightforward way, but we omit this extension for simplicity and clarity of exposition.)

3 Cost-sharing fundamentals

The main objective in this work is to develop a principled algorithmic framework for finding fair and stable ways to share the cost of CIP solutions among the set of users. We follow a standard approach in mechanism design and define “fair and stable” using the core property [20, 31]. An allocation satisfies the core property if no subset of users is allocated more cost than the minimum cost of providing coverage for this subset alone. This property can also be viewed as an absence of cross-subsidies; no sub-group of users pays more than what it would cost them to serve themselves, thereby not subsidizing other users [14].

More formally, a cost allocation is a vector ξ=(ξ1,,ξm),\mathbf{\xi}=(\xi_{1},\dots,\xi_{m}), where ξj0\xi_{j}\geq 0 represents the dollar amount charged to user j𝒰j\in\mathcal{U}. Allocations ξj\xi_{j} are also called cost-shares. Following the standard definition, cost-shares ξ\mathbf{\xi} satisfy the core property if for each sub-group J𝒰,J\subseteq\mathcal{U},

jJξjcJ,J𝒰,\sum_{j\in J}\xi_{j}\leq c^{*}_{J},\quad\forall J\subseteq\mathcal{U}, (2)

where cJc^{*}_{J} is the minimum cost of serving group JJ [20]. Cost allocations can vary in magnitude. We say cost allocation ξ\mathbf{\xi} is budget-balanced whenever the total amount paid by the served users, j𝒰ξj\sum_{j\in\mathcal{U}}\xi_{j}, equals the cost of serving them. The core is the set of budget-balanced cost allocations satisfying the core property [20]. In some problems, finding cost-shares in the core can be challenging.

Linear programming (LP) duality is the workhorse tool for finding cost-shares satisfying the core property, but it is not always possible to simultaneously satisfy both the core property and to be budget-balanced. There are simple CIP instances that have no cost-allocations in the core (see, e.g., Li et al. [27]). Deng, Ibaraki, and Nagamochi [11] show that a generic covering problem has a non-empty core if and only if its natural LP-relaxation has no integrality gap. As such, it is common to maximize the cost recovered, subject to satisfying the core-property [16, 20]; a cost-allocation ξ\mathbf{\xi} is β\beta-budget-balanced if it recovers a fraction β\beta of the cost.

For many optimization problems, every dual feasible solution is a cost allocation that satisfies the core property. This connection has important algorithmic implications. First, one can leverage duality to find cost-shares satisfying the core property by using (approximation) algorithms that produce feasible dual solutions as well as feasible integer solutions to the primal. If the integer solution costs at most α\alpha times the dual, we see that the corresponding cost allocation is 1/α1/\alpha-budget balanced. We shall say then that α\alpha is the price-of-fair-sharing (or equivalently, 1/α1/\alpha has also been termed the cost-recovery ratio). This relationship has been frequently used to obtain strong results in many settings [11, 12, 16, 17, 24, 26, 28, 30].

On the other hand, seminal work by Deng, Ibaraki, & Nagamochi [11] and Goemans & Skutella [16] shows that all cost allocations satisfying the core property are dual feasible solutions in the set cover problem and the facility location problem. Since the cost-allocation mechanism purchases an integer solution, but only allocates costs as a fractional solution, duality implies that price-of-fair-sharing is lower-bounded by the integrality gap of the problem. It is folklore that the price-of-fair-sharing is α\alpha whenever the integrality gap of the natural LP relaxation is α\alpha [20, 28].

The relationship between the price-of-fair-sharing and the integrality gap of the natural IP/LP formulation does not, however, appear to hold for CIPs. The multi-cover constraints in CIPs render the natural linear programming relaxation ill-suited for cost-sharing. Even with just one user |U|=1|U|=1 and integral inputs, the integrality gap of the CIP is unbounded [7]. Naively, this would imply that the price-of-fair-sharing in CIPs is unbounded. However, Li, Sun, Wang, and Lou [27] show that a bound can be attained for the special case of CIPs with integer-valued 𝐀\mathbf{A} and 𝐫\mathbf{r}. Their analysis, however, does not make explicit use of duality. Moreover, our IoT application yields CIPs that do not satisfy the assumption of integer-valued 𝐀\mathbf{A} and 𝐫\mathbf{r}. This begs two questions: How do cost-sharing and duality relate in CIPs, and can there be an effective cost-recovery at all when data are non-integer-valued?

4 Knapsack-Cover Constraints to the Rescue

This paper presents a principled framework for finding cost-shares in CIPs using linear programming duality. Our approach makes use of a well-known strengthened LP formulation based on knapsack-cover inequalities [7]. Our main contribution is to show that every feasible dual solution in this strengthened LP, which we shall denote KC-LP, naturally induces cost-shares that satisfy the core property. This has significant algorithmic consequences. First, our results imply that any approximation algorithm that produces CIP solutions with cost at most α\alpha times the KC-LP optimum can be used to produce cost-shares that recover 1/α1/\alpha of the cost; that is, a price-of-fair-sharing of α\alpha. There are many such algorithms [7, 8, 9, 22]. More generally, our framework can be used to find cost-shares for any integer CIP solution by solving the strengthened dual linear program.

These methods yield the first cost-sharing algorithm with bounded price-of-fair-sharing for general CIPs. Furthermore, we prove that the implied price-of-fair-sharing bounds are tight. In addition, we showcase the efficacy of our framework by recovering up to 93% of the cost in semi-stylized LoRaWAN covering problems at scale; this is over twice the recovery of the next-best method. We also use our KC-LP approach to obtain analogous results for a more general setting in which the service provider also selects a subset of users to receive the service based on the users’ private valuations elicited from a mechanism that is group-strategyproof. This reinforces the central message of this paper, affirming the powerful connection between an effective cost sharing mechanism and KC-LP dual solutions.

The knapsack-cover inequalities are introduced in the seminal work by Carr, Fleischer, Leung, and Phillips [7] to strengthen the LP so as to bound its integrality gap. It is helpful to first understand how the integrality gap of the natural LP relaxation is unbounded. Carr et al. provide the following instance: let R>0R>0 be a large integer requirement for a single user, and let there be two facilities; facility aa provides R1R-1 units of coverage at near-zero cost, whereas facility bb provides RR units of coverage at a cost of 11. Clearly, a feasible integer solution must include item bb, with a total cost of 11. A fractional solution, however, can select a full unit of item aa, and only a 1/R1/R fraction of item bb, with a cost of 1/R1/R. The resulting integrality gap is RR, which can be arbitrarily large.

Carr et al. [7] derive a strong bound on the integrality gap by adding exponentially many valid knapsack-cover (KC) inequalities to produce a strengthened LP relaxation. These inequalities represent residual coverage requirements at partial solutions. Suppose facilities SS\subseteq\mathcal{F} have been built. Now user jj has a residual requirement rjS=max{rjiSaij,0}r^{S}_{j}=\max\left\{r_{j}-\sum_{i\in S}a_{ij},0\right\}. To satisfy jj’s residual requirement, an additional contribution of at least rjSr^{S}_{j} is needed from the remaining unbuilt facilities \S\mathcal{F}\backslash S. In addition, there is no benefit to exceeding rjSr^{S}_{j}, so the original contributions aija_{ij} can be clipped to rjSr^{S}_{j} if they exceed this value. We call aijS=min{aij,rjS}a^{S}_{ij}=\min\left\{a_{ij},r^{S}_{j}\right\} the residual contribution, and set it to zero if ii is in SS. This defines the knapsack-cover inequality:

i\SaijSrjS.\sum_{i\in\mathcal{F}\backslash S}a^{S}_{ij}\geq r^{S}_{j}. (3)

There are |𝒰|×|2|=m2n|\mathcal{U}|\times|2^{\mathcal{F}}|=m2^{n} KC inequalities. The KC inequalities are valid; their presence does not change the set of feasible integer solutions, and reduces the feasible set of the LP relaxation. The strengthened linear program is as follows:

minx\displaystyle\min_{x}~{} icixi,\displaystyle\sum_{i\in\mathcal{F}}c_{i}x_{i},
s.t.\displaystyle s.t.\quad iSaijSxirjS,\displaystyle\sum_{i\in\mathcal{F}\setminus S}a^{S}_{ij}x_{i}\geq r^{S}_{j}, (j,S)𝒰×2,\displaystyle\forall(j,S)\in\mathcal{U}\times 2^{\mathcal{F}}, (KC-LP)
xi0,\displaystyle x_{i}\geq 0, i.\displaystyle\forall i\in\mathcal{F}.

Note that the constraints xi1x_{i}\leq 1 have been dropped. (Multiplicity constraints are implicit, in that aijS=0a^{S}_{ij}=0 whenever iSi\in S.) Associated with this primal is the knapsack-cover dual program (4), referred to as the KC-LP dual. The dual has one constraint for each facility, and one variable for every KC inequality:

maxy\displaystyle\max_{y}~{} j𝒰SrjSyjS,\displaystyle\sum_{j\in\mathcal{U}}\sum_{S\subseteq\mathcal{F}}r^{S}_{j}y^{S}_{j},
s.t.\displaystyle s.t.\quad j𝒰S{i}aijSyjSci,\displaystyle\sum_{j\in\mathcal{U}}\sum_{S\subseteq\mathcal{F}\setminus\{i\}}a^{S}_{ij}y^{S}_{j}\leq c_{i}, i,\displaystyle\forall i\in\mathcal{F}, (KC-DP)
yjS0,\displaystyle y_{j}^{S}\geq 0, (j,S)𝒰×2.\displaystyle\forall(j,S)\in\mathcal{U}\times 2^{\mathcal{F}}.

There are known approximation algorithms for CIPs that yield integer solutions with costs within a multiplicative factor of the KC-LP optimum. The worst-case performance of these algorithms depend on the column and row sparsity of the contributions 𝐀\mathbf{A}. Let Δ=maxi{j𝒰𝟏[aij>0]}\Delta=\max_{i}\{\sum_{j\in\mathcal{U}}\mathbf{1}[a_{ij}>0]\} denote the column sparsity, and let Γ=maxj{i𝟏[aij>0]}\Gamma=\max_{j}\left\{\sum_{i\in\mathcal{F}}\mathbf{1}[a_{ij}>0]\right\} denote the row sparsity. Carr et al. [7] propose a Γ\Gamma-approximation algorithm based on rounding a KC-LP solution; Kolliopoulos and Young [22] design an alternative KC-LP rounding procedure to yield a 𝒪(log(1+Δ))\mathcal{O}\left(\log(1+\Delta)\right)-approximation algorithm. Together, these provide upper bounds on the strengthened integrality gap of Γ\Gamma and 𝒪(1+logΔ))\mathcal{O}\left(1+\log\Delta\right)). Some algorithms attain improved guarantees at the cost of small violations of the multiplicity constraints [8, 9]. Common to these LP-rounding rounding methods is that they first require obtaining an optimal solution to the KC-LP.

The strengthened linear program and its dual can be solved to near-optimality in polynomial time. Chekuri and Quanrud [8] develop a multiplicative weights method that returns approximately optimal primal and dual solutions in near linear time, but with an 𝒪(1/ϵ5)\mathcal{O}\left(1/\epsilon^{5}\right) dependence on the relative error ϵ\epsilon. Their approach builds upon earlier work of Plotkin, Shmoys, and Tardos [33], and the solution method outlined by Carr et al. [7]. The returned dual solutions are feasible, lie within a 11ϵ\frac{1}{1-\epsilon}-factor of the optimum, and have a polynomially-bounded number of non-zero variables [8]. In practice, the primal and dual problems can be solved exactly using column generation for quite large instances; the problem of finding a most violated inequality can be reduced to solving a sequence of pseudopolynomially-many minimum-cost knapsack problems, each of which admits a pseudopolynomial exact algorithm (e.g., [25]). In our case study, we solve the KC-LP dual to optimality using this approach in large-scale problem instances with thousands of users and thousands of facilities.

5 Cost-shares and the strengthened LP

Our main technical contribution is to show that any feasible solution to the strengthened dual (4) produces a cost-allocation that satisfies the core property. This reconciles the apparent inconsistency for the CIP with respect to the folk understanding cost-shares and duality. The cost-shares themselves are remarkably intuitive: each user pays the part of the dual objective associated with her share of service utilization.

Theorem 5.1

Let 𝐲=(yjS)S,j𝒰\mathbf{y}=(y^{S}_{j})_{S\subseteq\mathcal{F},j\in\mathcal{U}} be a KC-LP dual-feasible solution. Then, cost-shares

ξj:=SrjSyjS,j𝒰,\xi_{j}:=\sum_{S\subseteq\mathcal{F}}r^{S}_{j}y^{S}_{j},\qquad\forall j\in\mathcal{U}, (4)

satisfy the core property. We say the cost-shares in (4) are induced by 𝐲\mathbf{y}.

Clearly, by summing the cost-shares over all users, we recover the dual objective in (4). The theorem is simple, but its consequences are profound. In particular, it can be used to exploit approximation algorithms that find integer solutions with costs bounded in terms of a corresponding dual-feasible solution.

Corollary 1

Let XX\subseteq\mathcal{F} be a feasible solution to the CIP, and 𝐲\mathbf{y} a KC-LP dual feasible solution. If XX is KC-LP-relative α\alpha-approximation, i.e.,

c(X)iXciαjUSrjSyjS,c(X)\equiv\sum_{i\in X}c_{i}\leq\alpha\sum_{j\in U}\sum_{S\subseteq\mathcal{F}}r^{S}_{j}y^{S}_{j},

then the cost-shares induced by 𝐲\mathbf{y} have cost-of-fair-sharing at most α\alpha times c(X)c(X).

This implies that the Carr et al. [7] algorithm yields cost-allocations with cost-of-fair-sharing at most Γm\Gamma\leq m, and that the rounding approach of Kolliopoulos and Young [22] produces a cost-of-fair-sharing of 𝒪(lnΔ)\mathcal{O}\left(\ln\Delta\right), where Δn\Delta\leq n. Moreover, if small violations of the multiplicity bounds are tolerated, this is improved further on sparse instances [8, 9]. These are the first price-of-fair-sharing bounds for general CIPs. Furthermore, even on the more restricted multi-set multi-cover problem, i.e., CIPs with integer inputs, our work yields improvements. The Γ\Gamma-bound is new, and the latter 𝒪(lnΔ)\mathcal{O}\left(\ln\Delta\right) bound dominates the existing 𝒪(maxijaij)\mathcal{O}(\max_{i}\sum_{j}a_{ij}) bound of Li et al. [27]. Finally, our theorem implies that one can also find cost-shares directly by solving the KC-LP dual. This decouples the problem of finding an integer CIP solution from that of finding cost-shares. Our case study shows this can have great value in practice.

Proof of Theorem 1

The proof is relatively simple; it naturally uses dual feasibility, and a rearrangement of summations that is standard in the analysis of primal-dual schema (see, e.g., [38]). Fix a KC-LP dual feasible solution 𝐲\mathbf{y}, and let ξ\mathbf{\xi} be the induced cost-shares. The main burden of proof is to show that no subset of users has incentive to act separately from the others. In other words, we need to show that for any J𝒰J\subseteq\mathcal{U},

cJjJξ,c^{*}_{J}\geq\sum_{j\in J}\xi,

where cJc^{*}_{J} is the minimum cost of an integer solution serving group JJ only; this is the minimum cost to the CIP in which only constraints associated with users JJ are included.

We prove this by considering an optimal solution to the problem of serving the smaller set of users. Let XJX^{*}_{J}\subseteq\mathcal{F} be a minimum-cost solution for serving group JJ. Using 4 feasibility of 𝐲\mathbf{y}, we see that

cJ\displaystyle c^{*}_{J} =iXJciiXJ(j𝒰S\{i}aijSyjS)iXJjJS\{i}aijSyjS,\displaystyle=\sum_{i\in X^{*}_{J}}c_{i}\geq\sum_{i\in X^{*}_{J}}\left(\sum_{j\in\mathcal{U}}\sum_{S\subset\mathcal{F}\backslash\{i\}}a^{S}_{ij}y^{S}_{j}\right)\geq\sum_{i\in X^{*}_{J}}\sum_{j\in J}\sum_{S\subset\mathcal{F}\backslash\{i\}}a^{S}_{ij}y^{S}_{j},

where the last inequality is due to the fact that all variables are non-negative.

The last part can be shown using a standard change in the order of summation. The right-hand-side expression above counts, for every item iXJi\in X^{*}_{J}, the sum over subsets SS\subseteq\mathcal{F} that do not contain ii. Equivalently, one can sum, for each subset SS\subseteq\mathcal{F}, every item in XJX^{*}_{J} not in SS, i.e.

iXJjJS\{i}aijSyjS=jJSyjS(iXJSaijS)\sum_{i\in X^{*}_{J}}\sum_{j\in J}\sum_{S\subset\mathcal{F}\backslash\{i\}}a^{S}_{ij}y^{S}_{j}=\sum_{j\in J}\sum_{S\subseteq\mathcal{F}}y^{S}_{j}\left(\sum_{i\in X^{*}_{J}\setminus S}a^{S}_{ij}\right) (5)

Recall that XJX^{*}_{J} is a feasible solution to the sub-problem of serving users in set JJ only. The residual demand of each subset SS is satisfied by XJX^{*}_{J} for all users in JJ:

iXJ\SaijSrJS,jJ.\sum_{i\in X^{*}_{J}\backslash S}a^{S}_{ij}\geq r^{S}_{J},\quad\forall j\in J. (6)

By applying the inequality (6) to (5), we arrive at the cost allocation to group JJ under the cost-shares ξ\mathbf{\xi}. In summary, we have shown that

c(XJ)jJSFrjSyjS=jξjc(X^{*}_{J})\geq\sum_{j\in J}\sum_{S\subseteq F}r^{S}_{j}y^{S}_{j}=\sum_{j}\xi_{j} (7)

This proves that each group J𝒰J\subseteq\mathcal{U} prefers to accept the cost-shares ξ\mathbf{\xi} over forming a group on their own. In other words, any 4 dual solution 𝐲\mathbf{y} produces cost-shares satisfying the core property. \square

A natural question is whether there are cost-allocations, perhaps not derived from KC-LP dual variables, that have lower worst-case prices-of-fair-sharing. For CIP the answer is no; our bounds are provably tight, at least with respect to parameters Γ\Gamma and Δ\Delta. In particular, in the special case in which all contributions and requirements are binary, the KC-LP and its dual reduce to the standard set cover linear programs. Here, the folk theorem applies, and the cost-recovery ratio is provably upper-bounded by the integrality gap [11]. For Set Cover, and hence CIP as well, the integrality gap can be as large as Γ\Gamma and lnΔ\ln\Delta [15, 36]. Hence, the lower bounds of our cost-recovery ratios for CIP are tight.

6 A case study on LoRaWAN coverage

We conduct a case study to evaluate the effectiveness of the KC-LP cost-sharing framework on a practical coverage-sharing problem for LoRaWAN. The study is based on a scenario in which the goal is to provide coverage over Brooklyn, NY, a relatively large and densely built urban area. The challenge is to find a gateway placement that provides sufficient coverage throughout the area at minimal cost, and to allocate the cost of the gateways across the users, subject to the core constraint, while recovering as much of the cost as possible. This is the main problem motivating our work. Our results are based on the average performance over a sequence of random problem instances. Our results suggest the KC-LP framework performs well in practice; by solving both the IP and KC-LP dual to optimality, we recover on average 93% of the cost of the gateways.

The set of problem instances is derived from a combination of real-world data and assumptions made in the absence of available data. Each instance is a CIP with random contribution matrix 𝐀\mathbf{A}, requirements 𝐫\mathbf{r}, and facilities 𝐟\mathbf{f}. The demand points, or users 𝒰\mathcal{U}, are defined as a regular gird of 7,8087,808 points over the study-area. Each instance uses a sub-sample of size 2,0002,000. Facility locations are derived from the corners of real building footprints, and sub-sampled down to 4,3804,380 per instance. This mimics a practical constraint faced by operators who do not have access to every site due to the high access cost. Next, each facility ii is associated with a cost cic_{i} uniformly distributed between 0 and 11. For the contribution matrix 𝐀\mathbf{A}, we use a distance-based Okumura-Hata model with normal noise to generate random connection qualities aija_{ij} between each gateway-demand point pair (i,j)(i,j) [18]. Finally, to ensure feasibility, each demand point has a requirement equal to the value of building all gateways, divided by a geometrically distributed random variable, sampled independently for each user. A total of 10 instances are used.

For each instance, we solve both the CIP and the KC-LP dual to optimality. The CIPs are solved using an off-the-shelf IP solver; the KC-LP dual is solved using the column generation routine, similar to [7]. This produces the optimal cost-shares, in the sense that the price-of-fair-sharing matches the instance-specific integrality gap exactly. To reiterate, the ability to find cost-shares by solving the KC-LP dual is a valuable consequence of our work. We are not aware of another equally tractable method for finding cost-shares of this quality in practice. We also consider additional benchmark algorithms.

The KC-LP solver is compared against two natural approximation algorithms that produce cost-shares: the PrimalDual algorithm and the Greedy algorithm. The PrimalDual algorithm, or dual-ascent algorithm, incrementally grows both a feasible KC-LP dual solution, and an infeasible integer CIP solution. The algorithm terminates as soon as the integer solution is feasible. The main idea behind this algorithm is standard (see e.g. [38]), and analogous to that of [6] in a multi-user setting. Next, we also employ an existing Greedy algorithm that also produces both an integer solution to the CIP, as well as cost-shares [27]. This algorithm produces cost-shares via dual fitting; it greedily selects gateways to add, and amortizes the per-coverage cost of selected facilities into an infeasible KC-LP dual solution. Finally, the dual variables are scaled down by log(n)\log(n) to ensure feasibility. We also introduce an improved variant of this algorithm, called Greedy+. By viewing the greedy-generated cost-shares as KC-LP dual variables, these need to be scaled down by worst-case bound, but only the minimal amount to make them KC-LP dual feasible.

One caveat of both greedy algorithms is that they only seem to work well on CIPs with integer requirements 𝐫\mathbf{r} and contributions 𝐀\mathbf{A} [13]. As such, for these algorithms only, we modify the instances by multiplying the inputs 𝐀\mathbf{A} and 𝐫\mathbf{r} by a large constant, and then rounding the connections up, and the requirements down, to the nearest integer. This modification never compromises feasibility, and does not increase the minimum cost. However, solutions to the rounded CIPs need not be feasible for the original real-valued instance. This is a potential weakness of using greedy algorithms on real-valued CIPs.

1 0.04 42 0.48 293 2.01 864 2.28 835 3.70 1376 6.22 1907 7.05 1728 7.41 2209 10.9 24810 15.4 32300.20.20.40.40.60.60.80.8111.21.21.41.4Fraction of IP-OPTIP-OPT   KC-LP   PD-Obj    PD-Rev   Gr-Obj   Gr+-Rev   Gr-RevInstanceCostBuilt

Figure 1: Costs incurred and recovery for 10 instances. IP-OPT is the cost of the IP optimum, KC-LP the cost of the KC-LP optimum. Prefixes PD, Gr, and GR+, represent the PrimalDual, Greedy, and Greedy+, respectively. Suffixes Obj and Rev represent the integer objective cost, and cost-share revenue, respectively.

The results are summarized in Figure 1. Each set of bars along the x-axis represent one instance; the bar heights represent costs. The Greedy algorithm performs remarkably well, with its solution cost exceeding the minimum by only 10% on average, whereas the primal-dual algorithm performs worse, averaging nearly 30% above optimal. More remarkably, the Optimal method recovers 93% of the cost on average; over twice as much as the next best algorithm. Greedy recovers relatively little cost, even after the improved dual-fitting Greedy+; PrimalDual recovers considerably more – 45% of the minimum cost.

Overall, the KC-LP framework finds near perfect cost-shares when sharing the cost of LoRaWAN coverage. Using column generation to solve the KC-LP dual, one can recover nearly all of the cost of reasonably realistic coverage provision instances. If the instances are larger such that solving the IP and KC-LP to optimality is prohibitive, one can use both Greedy and Primal-Dual; the former to solve the CIP, the latter to find cost-shares. Alternatively, one can solve the KC-LP to near-optimality using the algorithms methods of [7, 9]. The consistency of performance across this data set (along with other results that achieved analogous performance on variants in which the costs were Gaussian rather than uniform) demonstrate the effectiveness of this theoretically-inspired approach to deliver significant results in our application.

7 Group-strategyproof KC-LP cost-shares

So far it has been assumed that the group of users to be served is given; sometimes this choice also falls on the service provider. In an extended setting, the goal of the service provider is to elicit private user preferences and design a mechanism for choosing who to serve, in addition to allocating costs to those served. See Jain and Mahdian [20] for more details on definitions. Assume that each user j𝒰j\in\mathcal{U} has a private utility uju_{j} for receiving service, and has the option of opting out for a utility of 0. When utilities are unknown, they must be elicited by a mechanism. This creates a challenge, because users and groups of users may be able to strategically misreport their utilities. A mechanism is said to be strategyproof if individual users cannot benefit from misreporting their utility, and group-strategyproof if no group of users can benefit by colluding to misreport their utilities. The goal of a mechanism in this setting is to elicit preferences in a group-strategyproof manner, decide who to serve, and allocate-costs in a way that maximizes the cost-recovery ratio.

To find a group-strategyproof mechanism, Moulin and Shenker [29] prove that it suffices to have cross-monotonic cost-allocation mechanism. Cost-shares ξ:𝒰×2𝒰𝐑|𝒰|\xi:\mathcal{U}\times 2^{\mathcal{U}}\rightarrow\mathbf{R}^{|\mathcal{U}|} are cross-monotonic if the cost allocated to user jj does not increase when more users are served:

ξj(U)ξj(J),jJU𝒰.\xi_{j}(U)\leq\xi_{j}(J),\quad\forall j\in J\subseteq U\subseteq\mathcal{U}. (8)

Not all cost-shares that satisfy the core property are cross-monotonic. Pál and Tardos [30] provided a general approach for using primal-dual algorithms to find cross-monotonic cost-shares in the facility location problem and the rent-or-buy problem. This approach has been used for many other problems as well [21, 23, 24, 26]. Interestingly, imposing cross-monotonicity usually lowers the best attainable cost-recovery ratio (or equivalently, increases the price-of-fair-sharing) [30]. Indeed, Immorlica, Mahdian, and Mirrokni [19] upper bounded the cost-recovery ratio for cross-monotonic cost allocations using an elegant probabilistic method. In particular, a cross-monotonic cost allocation for set cover can recover at most 1/Δ1/\Delta of the cost, where Δ\Delta is the size of the largest set. Moreover, even if all elements are covered by at most two sets, the cost recovery ratio is 𝒪((2+ϵ)/n1/3)\mathcal{O}\left((2+\epsilon)/n^{1/3}\right). Li et al. [27] describe a cross-monotonic cost allocation for the CIP that recovers 1/(2n)1/(2n) of the cost without explicit use of duality; we simplify their proof using the strengthened dual, generalize the algorithm to general CIP, and improve this to 1/(2Δ)1/(2\Delta).

Our strengthened linear programming approach can also be used to find cross-monotonic cost-shares. Our mechanism uses a primal-dual algorithm following the general framework of Pál and Tardos [30]. Mechanically, our algorithm is equivalent to that of Li et al. [27], but our analysis is different, in that it uses the KC-LP dual.

Theorem 7.1

Fix users U𝒰U\subseteq\mathcal{U}. The mechanism (Algorithm 1) produces a feasible solution XX for users UU, and cross-monotone cost-shares ξj(J)\xi_{j}(J) that satisfy jJξj(J)(12Δ)c(X)\sum_{j\in J}\xi_{j}(J)\geq\left(\frac{1}{2\Delta}\right)\cdot c(X).

The main algorithmic idea behind the mechanism is to let each user independently select facilities in complete isolation from the other users. Cross-monotonicity is enforced by preventing any interactions between users’ dual variables. Moreover, the problem faced by an individual user is a minimum cost-knapsack problem, each of which can be solved by a primal-dual algorithm (Algorithm 2) [6]. This produces, for each user jUj\in U, a selection of facilities XjX_{j}, and a KC-LP dual solution 𝐲j\mathbf{y}_{j} that is feasible for the individual problem with constraints for user jj only, and no variables corresponding to other users. Finally, our mechanism selects the union of all selected facilities (Xj)jU(X_{j})_{j\in U}, and scales down the individual dual variables 𝐲j\mathbf{y}_{j} by the column sparsity Δ\Delta. The procedure is summarized in Algorithm 1, in which MinCostKnapsackPrimalDual is Algorithm 2.

Input: (,𝒰,𝐫,𝐜,𝐀)(\mathcal{F},\mathcal{U},\mathbf{r},\mathbf{c},\mathbf{A})
for all users jJj\in J independently do
       Xj,𝐲jMinCostKnapsackPrimalDual(,rj,c,aj)X_{j},\mathbf{y}^{\prime}_{j}\leftarrow\texttt{MinCostKnapsackPrimalDual}(\mathcal{F},r_{j},c,a_{j})
       𝐲j𝐲j/Δ\mathbf{y}_{j}\leftarrow\mathbf{y}^{\prime}_{j}/\Delta
Xj𝒰XjX\leftarrow\cup_{j\in\mathcal{U}}X_{j}
ξj(U)12ΔSFyjS\xi_{j}(U)\leftarrow\frac{1}{2\Delta}\sum_{S\subseteq F}y^{S}_{j} for all jUj\in U
return X,ξX,\xi
Algorithm 1 A cross-monotonic primal-dual algorithm

Carnes and Shmoys [6] develop and analyze a primal-dual algorithm for the minimum-cost knapsack problem based on the KC-LP formulation. Fix a single user j𝒰j\in\mathcal{U} and let 𝐚j=(a1j,,anj)\mathbf{a}_{j}=(a_{1j},\dots,a_{nj}) denote their contributions. The user starts with an all-zero dual solution 𝐲j\mathbf{y}_{j}, and an empty selection X=X=\emptyset. While the residual demand rjXr^{X}_{j} is positive, they increase the dual variable yjXy^{X}_{j}. Eventually, some constraint SF{i}aijXyjXci\sum_{S\subseteq F-\{i\}}a^{X}_{ij}y^{X}_{j}\leq c_{i} becomes tight for a facility ii. This facility is added to the selection XX, and the process repeats. This procedure is summarized in Algorithm 2. The algorithm returns a selection of facilities XjX_{j} and a feasible KC-LP dual solution. Critically, the cost of XjX_{j} is at most twice the KC-LP dual objective under 𝐲j\mathbf{y}_{j}.

Theorem 7.2 (Carnes and Shmoys [6])

Let XjX_{j}\subseteq\mathcal{F} and 𝐲j\mathbf{y}_{j} be a selection of facilities, and the corresponding dual solution returned by Algorithm 2. These satisfy the inequality

iXjci2SrjSyjS.\sum_{i\in X_{j}}c_{i}\leq 2\sum_{S\subseteq\mathcal{F}}r^{S}_{j}y^{S}_{j}.

This result is used in two parts of our proof. First, we use the dual feasibility of the individual dual variables 𝐲j\mathbf{y}_{j} to construct a feasible dual solution to the master CIP, which gives us the core-property via Theorem 5.1. Secondly, the approximation ratio is used to derive our cost-recovery ratio.

Input: (,𝐜,rj,𝐚j)(\mathcal{F},\mathbf{c},r_{j},\mathbf{a}_{j})
X,𝐲j,𝟎X,\mathbf{y}_{j}\leftarrow\emptyset,\mathbf{0}
while rjX>0r^{X}_{j}>0 do
       Increase yjXy^{X}_{j} until for some i\Xi\in\mathcal{F}\backslash X:
S{i}aijXyjX=ci\sum_{S\subseteq\mathcal{F}-\{i\}}a^{X}_{ij}y^{X}_{j}=c_{i} (9)
XX{i}X\leftarrow X\cup\{i\}
      
return XX, 𝐲j\mathbf{y}_{j}
Algorithm 2 Minimum-Cost Knapsack Primal-Dual Algorithm

Proof of Theorem 2.

To prove this result, we need to argue for cross-monotonicity, the core-property, and cost recovery. We argue for cross-monotonicity first. Clearly, the dual variables 𝐲j\mathbf{y}^{\prime}_{j} of each user are independent of other users. Meanwhile, the maximum number of users in UU served by any facility, Δ\Delta, is monotonically increasing in the size of UU, so the dual variables 𝐲j=𝐲j/Δ\mathbf{y}_{j}=\mathbf{y}^{\prime}_{j}/\Delta are monotonically decreasing in UU, as are the induced cost-shares.

The core property is easy to prove using dual feasibility and our Theorem 5.1. Consider some selected facility iXi\in X. Then,

j𝒰SF\{i}aijSyjS=1Δ{j𝒰:aij>0}(S\{i}aijSyjS)1Δ{jJ:aij>0}cici.\sum_{j\in\mathcal{U}}\sum_{S\subseteq F\backslash\{i\}}a^{S}_{ij}y^{S}_{j}=\frac{1}{\Delta}\sum_{\{j\in\mathcal{U}:a_{ij}>0\}}\left(\sum_{S\subseteq\mathcal{F}\backslash\{i\}}a^{S}_{ij}y^{\prime S}_{j}\right)\leq\frac{1}{\Delta}\sum_{\{j\in J:a_{ij}>0\}}c_{i}\leq c_{i}.

The first equality follows from dropping users not served by facility ii. The second equality uses the definition of 𝐲j=𝐲j/Δ\mathbf{y}_{j}=\mathbf{y}^{\prime}_{j}/\Delta. The following inequality uses the fact that the dual variables are individually feasible to the min-cost knapsack LP of each user jj. The final inequality follows from the definition of Δ\Delta. The above shows that dual variables (𝐲j)j𝒰(\mathbf{y}_{j})_{j\in\mathcal{U}} are feasible for the CIP induced by users UU, and thus Theorem 5.1 implies that the core-property is satisfied by the accompanying cost-shares (ξj(U))jU(\xi_{j}(U))_{j\in U}.

Finally, the cost-recovery recovery ratio follows from the approximation ratio of the minimum-cost knapsack algorithm. In particular, observe that

iXcij𝒰iXjci2j𝒰SrjSyjS=2Δj𝒰SrjSyjS.\sum_{i\in X}c_{i}\leq\sum_{j\in\mathcal{U}}\sum_{i\in X_{j}}c_{i}\leq 2\sum_{j\in\mathcal{U}}\sum_{S\subseteq\mathcal{F}}r^{S}_{j}y^{\prime S}_{j}=2\Delta\sum_{j\in\mathcal{U}}\sum_{S\subseteq\mathcal{F}}r^{S}_{j}y^{S}_{j}.

The first inequality is obvious; the second follows from applying Theorem 7.2 to each user jj in UU individually. The last equality follows from the definition of 𝐲j\mathbf{y}_{j}. This proves that the cost-of-fair-sharing is at most 2Δ2\Delta as claimed. \square

Finally, the proof suggests there is potential for improvement. In fact, whenever the contributions 𝐀\mathbf{A} are binary, the min-cost knapsack algorithm is exact, in which case the cost-recovery ratio is 1/Δ1/\Delta [27]. Moreover, if we know that each selected facility XX always selected by at least two users, it also follows that the cost-of-fair-sharing is a factor 22 smaller, i.e. Δ\Delta. On the other hand, no group-strategyproof mechanism can recover more than 1/Δ1/\Delta of the cost in general [19]. Whether the 2Δ2\Delta cost-of-fair-sharing is tight when contributions are non-binary remains an open problem [27].

{credits}

7.0.1 Acknowledgements

This material is based on work supported by the NSF under Grant CNS-1952063.

7.0.2 \discintname

The authors have no competing interests to declare that are relevant to the content of this article.

References

  • [1] LPWAN Market. https://iot-analytics.com/lpwan-market/, accessed: 2024-06-29
  • [2] Aarts, S., Shmoys, D.B., Coy, A.: An interpretable determinantal choice model for subset selection (2023)
  • [3] Almuhaya, M.A., Jabbar, W.A., Sulaiman, N., Abdulmalek, S.: A survey on LoRaWAN technology: Recent trends, opportunities, simulation tools and future directions. Electronics 11(1),  164 (2022)
  • [4] Attia, T., Heusse, M., Tourancheau, B., Duda, A.: Experimental characterization of LoRaWAN link quality. In: 2019 IEEE Global Communications Conference (GLOBECOM). pp. 1–6. IEEE (2019)
  • [5] Augustin, A., Yi, J., Clausen, T., Townsley, W.M.: A study of LoRa: Long range & low power networks for the internet of things. Sensors 16(9),  1466 (2016)
  • [6] Carnes, T., Shmoys, D.: Primal-dual schema for capacitated covering problems. In: Integer Programming and Combinatorial Optimization: 13th International Conference, IPCO 2008 Bertinoro, Italy, May 26-28, 2008 Proceedings 13. pp. 288–302. Springer (2008)
  • [7] Carr, R.D., Fleischer, L.K., Leung, V.J., Phillips, C.A.: Strengthening integrality gaps for capacitated network design and covering problems. In: Proceedings of the Eleventh Annual ACM-SIAM Symposium on Discrete Algorithms. p. 106–115. SODA ’00, Society for Industrial and Applied Mathematics, USA (2000)
  • [8] Chekuri, C., Quanrud, K.: On Approximating (Sparse) Covering Integer Programs. In: Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms. pp. 1596–1615. SIAM (2019)
  • [9] Chen, A., Harris, D.G., Srinivasan, A.: Partial resampling to approximate covering integer programs. Random Structures & Algorithms 58(1), 68–93 (2021)
  • [10] Chiang, C.I., Hwang, M.J., Liu, Y.H.: An alternative formulation for certain fuzzy set-covering problems. Mathematical and Computer Modelling 42(3-4), 363–365 (2005)
  • [11] Deng, X., Ibaraki, T., Nagamochi, H.: Algorithmic aspects of the core of combinatorial optimization games. Mathematics of Operations Research 24(3), 751–766 (1999)
  • [12] Devanur, N.R., Mihail, M., Vazirani, V.V.: Strategyproof cost-sharing mechanisms for set cover and facility location games. In: Proceedings of the 4th ACM Conference on Electronic Commerce. pp. 108–114 (2003)
  • [13] Dobson, G.: Worst-case analysis of greedy heuristics for integer programming with nonnegative data. Mathematics of Operations Research 7(4), 515–531 (1982)
  • [14] Faulhaber, G.R.: Cross-Subsidization: Pricing in Public Enterprises. The American Economic Review 65(5), 966–977 (1975)
  • [15] Feige, U.: A threshold of ln n for approximating set cover. Journal of the ACM (JACM) 45(4), 634–652 (1998)
  • [16] Goemans, M.X., Skutella, M.: Cooperative facility location games. Journal of Algorithms 50(2), 194–214 (2004)
  • [17] Gupta, A., Kumar, A., Pál, M., Roughgarden, T.: Approximation via cost-sharing: a simple approximation algorithm for the multicommodity rent-or-buy problem. In: 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings. pp. 606–615. IEEE (2003)
  • [18] Hata, M.: Empirical formula for propagation loss in land mobile radio services. IEEE Transactions on Vehicular Technology 29, 317–325 (1980)
  • [19] Immorlica, N., Mahdian, M., Mirrokni, V.S.: Limitations of cross-monotonic cost-sharing schemes. ACM Transactions on Algorithms (TALG) 4(2), 1–25 (2008)
  • [20] Jain, K., Mahdian, M.: Cost Sharing, p. 385–410. Cambridge University Press (2007)
  • [21] Jain, K., Vazirani, V.V.: Equitable cost allocations via primal–dual-type algorithms. SIAM Journal on Computing 38(1), 241–256 (2008)
  • [22] Kolliopoulos, S.G., Young, N.E.: Approximation algorithms for covering/packing integer programs. Journal of Computer and System Sciences 71(4), 495–505 (2005)
  • [23] Könemann, J., Leonardi, S., Schäfer, G., Van Zwam, S.: From primal-dual to cost shares and back: a stronger lp relaxation for the steiner forest problem. In: Automata, Languages and Programming: 32nd International Colloquium, ICALP 2005, Lisbon, Portugal, July 11-15, 2005. Proceedings 32. pp. 930–942. Springer (2005)
  • [24] Könemann, J., Leonardi, S., Schäfer, G., van Zwam, S.H.: A group-strategyproof cost sharing mechanism for the Steiner forest game. SIAM Journal on Computing 37(5), 1319–1341 (2008)
  • [25] Lawler, E.L.: Fast approximation algorithms for knapsack problems. In: 18th Annual Symposium on Foundations of Computer Science (sfcs 1977). pp. 206–213. IEEE (1977)
  • [26] Leonardi, S., Schaefer, G.: Cross-monotonic cost-sharing methods for connected facility location games. In: Proceedings of the 5th ACM Conference on Electronic Commerce. p. 242–243. EC ’04, Association for Computing Machinery, New York, NY, USA (2004)
  • [27] Li, X.Y., Sun, Z., Wang, W., Lou, W.: Cost sharing and strategyproof mechanisms for set cover games. Journal of combinatorial optimization 20(3), 259–284 (2010)
  • [28] Meir, R., Bachrach, Y., Rosenschein, J.S.: Minimal subsidies in expense sharing games. In: Algorithmic Game Theory: Third International Symposium, SAGT 2010, Athens, Greece, October 18-20, 2010. Proceedings 3. pp. 347–358. Springer (2010)
  • [29] Moulin, H., Shenker, S.: Strategyproof sharing of submodular costs: budget balance versus efficiency. Economic Theory pp. 511–533 (2001)
  • [30] Pál, M., Tardos, É.: Group Strategyproof Mechanisms via Primal-Dual Algorithms. In: 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings. pp. 584–593. IEEE (2003)
  • [31] Parsons, S.G.: Cross-subsidization in telecommunications. Journal of Regulatory Economics 13, 157–182 (1998)
  • [32] Petrić, T., Goessens, M., Nuaymi, L., Toutain, L., Pelov, A.: Measurements, performance and analysis of LoRa FABIAN, a real-world implementation of LPWAN. In: 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC). pp. 1–7. IEEE (2016)
  • [33] Plotkin, S.A., Shmoys, D.B., Tardos, É.: Fast approximation algorithms for fractional packing and covering problems. Mathematics of Operations Research 20(2), 257–301 (1995)
  • [34] Semtech: LoRa® and LoRaWAN®: A technical overview. https://lora-developers.semtech.com/documentation/tech-papers-and-guides/lora-and-lorawan/, accessed: 2021-09-07
  • [35] Semtech: Network Providers. https://www.semtech.com/lora/ecosystem/networks, accessed: 2024-06-29
  • [36] Singh, M.: Integrality gap of the vertex cover linear programming relaxation. Operations Research Letters 47(4), 288–290 (2019)
  • [37] Torres-Sanz, V., Sanguesa, J.A., Serna, F., Martinez, F.J., Garrido, P., Calafate, C.T.: Analysis of the Influence of Terrain on LoRaWAN-based IoT Deployments. In: Proceedings of the Int’l ACM Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems. p. 217–224. MSWiM ’23, Association for Computing Machinery, New York, NY, USA (2023)
  • [38] Williamson, D.P., Shmoys, D.B.: The Design of Approximation Algorithms. Cambridge university press (2011)

Appendix 0.A LoRaWAN, network planning, and the CIP

Low-Power Wide-Area Networks (LPWANs) are a popular IoT solution for connecting devices to the internet over long distances using little power. LoRaWAN one of the most widely used LPWAN protocols; see e.g., Alumhaya et al. [3] for an overview. LoRaWAN is designed for the transmission of small packets of data from battery-driven sensors to wireless receivers called gateways. These forward the data to the internet over a broadband backhaul [34]. LoRaWAN applications include road-surface monitoring, sensing fill-levels of municipal garbage containers, and tracking livestock locations, which are used to, respectively, inform safe traffic routing, optimize garbage pickup, and reduce costs of livestock monitoring, respectively. While LoRaWAN is the primary motivating application of this work, the covering integer program we study is quite general, and therefore applicable to other technologies, not to mention problems entirely divorced from wireless networks and IoT.

A property of LoRaWAN that is particularly relevant to cost-sharing are its low barriers to entry. Specifically, LoRaWAN uses the ISM band of the wireless spectrum [34]. This is an unlicensed band; anyone can operate a gateway free of charge, without a license or certification. Secondly, LoRaWAN gateways are relatively inexpensive, with some models costing just a few hundred US dollars. While the cost of carrier-grade gateways that support large volumes of traffic can be higher, individuals or small groups of users can serve their own needs at relatively low costs. Finally, organizations such as TTN provide open-source software and free online support for managing the server and software end of LoRaWAN networks, which further increases accessibility. Altogether, these low barriers give users considerable leverage over the cost of wireless coverage. This is in stark contrast with other wireless technologies and natural monopolies, such as 5G, that require costly licenses and hardware.

Another unique and critical feature of LoRaWAN is the use of redundant gateways for improving the quality of coverage. LoRaWAN is association-free, in that a single device does not transmit to any particular receiver [34]. Instead, transmissions are broadcast to all receivers, and demodulated by each one that successfully receivers the packet. Duplicates are pruned in hindsight by the network server. This feature is critical for achieving robustness through redundancy; a transmitted packet is lost only if all receivers fail to demodulate it. Studies on LoRaWAN connectivity find that transmissions often fail at random, but the success rate varies predictably with distance, terrain, and wireless parameters [4, 5, 32]. By being covered by multiple gateways, the probability of packet loss can be kept minimal despite individual connections frequently failing. The CIP model accommodates user reception rate requirements, gateway redundancy, and heterogeneity in connection qualities.

Receptions and the link budget. There are models for determining whether a transmission is received or not. A key concept used in most such models is received power, denoted PtxP_{tx}. LoRaWaN receivers are said to successfully process any arriving transmission with a received power of at least pmin=120p_{min}=-120 dBm [34]. Received power is usually modeled using a link budget. In simplest form the budget is

Prx=ptxLP_{rx}=p_{tx}-L (10)

Here ptxp_{tx} stands for transmitted power; this represents roughly how “loud” a device is “speaking”. A higher power exhausts batteries faster. Usual for IoT devices is a transmitted power of 1010 dBm, 3030 dBm at most. The variable LL stands for path loss, which describes how the transmitted power deteriorates as the transmission propagates through space. Modeling the path loss is key to understanding wireless connectivity.

Hata path loss. A widely used model for path loss is the Hata [18] model. It expresses the path loss L(𝐗)L(\mathbf{X}) over a given wireless link as a simple log-polynomial model over data. The data 𝐗\mathbf{X} are the distance dd, height of the (mobile) transmitter hMh_{M}, the height of the receiver (base station) hBh_{B}, and the frequency ff, i.e. 𝐗=(d,hM,hB,f)\mathbf{X}=(d,h_{M},h_{B},f). The Hata path loss is

L(d,hM,hB,f)=69.55\displaystyle L(d,h_{M},h_{B},f)=69.55 +26.16log10(f)13.82log10(hB)\displaystyle+26.16\log_{10}(f)-13.82\log_{10}(h_{B})
+(44.96.55log10(hB))log10(d)+CH\displaystyle+(44.9-6.55\log_{10}(h_{B}))\log_{10}(d)+C_{H} (11)

Where CHC_{H} is a height-correction factor which in cities, and at f=916f=916 Mhz, is

CH=3.2(log10(11.75hM))24.97.C_{H}=3.2\left(\log_{1}0(11.75h_{M})\right)^{2}-4.97.

It is sometimes further assumed that there is an additive random normal component X𝒩(0,σ2)X\sim\mathcal{N}(0,\sigma^{2}) in the path loss. This is called log-normal shadowing. While these models are simple, we do not take them at face value. We retain our beliefs that there is considerable uncertainty around connectivity.

The additive coverage constraints in the CIP can capture requirements in terms of packet reception probabilities via a simple reduction. Assume that the successful reception from user jj to facility ii is a binary variable, with given success, or reception, rate ρij\rho_{ij}. In this case, one can view coverage provision as a fuzzy set cover problem. Chian, Hwang, and Liu [10] reduce fuzzy set covering to a CIP. Assume that failures of links are independent, and let 𝐱=(x1,,xn)\mathbf{x}=(x_{1},\dots,x_{n}) be a binary vector encoding a subset of built facilities FF\subseteq\mathcal{F}. Then the failure rate of a transmission from user jj is

Pr[FailureF]=i(1ρij)xi.\Pr[\text{Failure}\mid F]=\prod_{i\in\mathcal{F}}(1-\rho_{ij})^{x_{i}}.

Taking logarithms this yields an expression that is additive in the variables xix_{i}.

logPr[Failurex]=ilog(1ρij)xi\log\Pr[\text{Failure}\mid x]=\sum_{i\in\mathcal{F}}\log(1-\rho_{ij})x_{i}

A constraint limiting the maximum packet error rate can therefore be expressed as a covering constraint in the CIP. While independence is a strong assumption, this reduction adds intuition to the CIP, and can be viewed as a stylized approximation to a dependent system, e.g., by choosing more “pessimistic” estimates for ρij\rho_{ij}, or higher service requirements rjr_{j}.