Abstract
Infectious diseases pose a serious threat to public health due to its high infectivity and potentially high mortality. One of the most effective ways to protect people from being infected by these diseases is through vaccination. However, due to various resource constraints, vaccinating all the people in a community is not practical. Therefore, targeted vaccination, which vaccinates a small group of people, is an alternative approach to contain infectious diseases. Since many infectious diseases spread among people by droplet transmission within a certain range, we deploy a wireless sensor system in a high school to collect contacts happened within the disease transmission distance. Based on the collected traces, a graph is constructed to model the disease propagation, and a new metric (called connectivity centrality) is presented to find the important nodes in the constructed graph for disease containment. Connectivity centrality considers both a node’s local and global effect to measure its importance in disease propagation. Centrality based algorithms are presented and further enhanced by exploiting the information of the known infected nodes, which can be detected during targeted vaccination. Simulation results show that our algorithms can effectively contain infectious diseases and outperform other schemes under various conditions.
Keywords: Wireless sensor system, human contact, node centrality, disease containment
I. Introduction
Infectious diseases pose a serious threat to public health due to its high infectivity and potentially high mortality. Over the last few decades, infectious diseases have caused several regional and worldwide pandemics, resulting in many infections and deaths. For example, during H1N1 pandemic in 2009, more than 600,000 cases were lab-confirmed and more than 14,000 were dead all over the world [1]. According to World Health Organization (WHO), the epidemic of Ebola in 2014 has caused significant mortality in many West African countries, with a reported case with fatality rate of 70% [2]. Even for a seasonal influenza, it is estimated to affect 5% to 15% of the global population and cause 3 to 5 million cases of severe infections and 250,000 to 500,000 deaths worldwide each year [3].
To prevent infectious diseases, one of the most effective ways is to vaccinate the susceptible individuals. However, due to resource constraints such as the limited vaccine supply, in many cases, it may not be practical to vaccinate all the susceptible individuals, especially when a new infectious disease outbreaks. Therefore, targeted vaccination, which vaccinates a small group of people in a community, is an alternative approach to contain infectious diseases. The challenge is how to find the group of people whose vaccination will averagely result in the maximum reduction of disease spread.
Targeted vaccination has been studied in some previous works [4]–[7]. However, these works are limited to theoretical analysis based on synthetic networks such as random, homogeneous or scale-free network, which may not reflect the real contact patterns among people in different scenarios. For example, based on the contact traces collected from high school students, where each student carries a sensor node to record the contacts with others by sending and receiving packets (details shown in Section III), we show in Figure 1 that the distributions of the number of nodes’ contacts (i.e., the number of packets received from other nodes) and neighbors (i.e., the number of nodes from which packets are received) are different from the power-law distributions. Since students in the high school spend most of their time in classes and students in the same class may have contacts with each other, most of the nodes in the network will have similar number of neighbors and contacts. As observed from our collected trace, the number of nodes’ neighbors and the number of nodes’ contacts are more likely to follow normal distributions rather than power-law distributions.
The problem of targeted vaccination has some similarity to virus (worm) containment in the area of computer networks, such as cellular networks [8]–[10] or online social networks [11]–[14]. Based on cluster partition and community detection, different schemes have been proposed for virus (worm) containment [8], [11]. By using various techniques to divide the network into different partitions, these schemes contain the viruses (worms) within the infected partition before they spread out. More specifically, the nodes that separate network partitions are vaccinated in [8] and the neighbors of overlapped nodes between two communities are vaccinated in [11]. However, these works mainly focus on containing the worm (virus) in cellular network or online social network, which has different propagation patterns from infectious disease. For infectious disease, it will be transmitted with a probability when two people contact with each other. However, in cellular network or online social network, a node will be infected immediately once it contacts with an infected node. In addition, they implicitly assume that all nodes in the network are eligible for vaccination, which is not true in disease containment (e.g., we cannot vaccinate an infected node). Thus, we cannot directly apply these schemes to targeted vaccination.
Different from the aforementioned works, we deploy a wireless sensor system in a high school to collect contacts among students. Since the wireless signal strength degrades as the communication distance increases [15], we can measure the wireless signal strength and then infer when and where students meet with each other. This information is important for modeling the propagation of infectious disease. Many respiratory infectious diseases (e.g., influenza) spread among people by droplet transmission, requiring an infected and a susceptible person to be in close physical contact at a short maximum distance [16]–[18]. With our wireless sensor system, we can find student contacts within such distance, and construct a disease propagation graph to model the infectious disease propagation. Then, targeted vaccination becomes a problem of selecting important nodes in a graph to contain infectious disease.
Based on the disease propagation graph, node centrality can be used to measure its importance during disease propagation. Although there are some centrality measures [19] such as degree centrality, betweenness centrality and closeness centrality, they all have disadvantages when applied to disease containment. For example, degree centrality only considers the connection between a node and its neighbors, and thus is limited by its local effect. Betweenness centrality measures the global effect, but it does not describe the difference between a node’s influence on its neighbors and that on those nodes far away. Closeness centrality does not work when the graph is disconnected. In disease propagation, an infected node will infect nodes closer with much higher possibility than those far away. Thus, we propose a new metric called connectivity centrality, which takes into account a node’s influence on all others and considers nodes closer more important. Based on the proposed centrality measure, we design centrality based algorithm for targeted vaccination. In infectious disease containment, not all nodes are eligible for vaccination. For example, vaccination for a node which has already been infected will not be effective. Some of these infected nodes can be detected during vaccination. With this information, we enhance the centrality based algorithm by considering both a node’s infecting capability and its infected possibility. We evaluate the centrality based algorithm and the enhanced algorithm, and compare them with other schemes. The trace driven simulation results show that our algorithms can significantly reduce the infection rate. Although our algorithms are illustrated based on the contact trace collected from a high school, they are trace-independent and can work in other networks.
The rest of this paper is organized as follows. Section II reviews related work and Section III describes our trace collection. We propose centrality based algorithms and enhanced algorithm in Section IV and evaluate the performance in Section V. Section VI concludes the paper. A preliminary work has been published in [20].
II. Related Work
A rich body of work has focused on infectious disease containment. Various disease propagation patterns have been studied in [21] and [22]. Based on the disease propagation model, Prakash et al. [21] derived the epidemic threshold for a given network under which an epidemic will not happen and above which an epidemic will happen. Moreover, they have designed a greedy strategy, which vaccinates the node that causes the largest drop in the eigenvalue of the system matrix. Cohen et al. [22] proposed a mathematical model and an immunization policy based on a small fraction of random acquaintances, and analytically studied the critical threshold for complete immunization. However, these techniques mainly focus on how to avoid the spreading of infectious disease becoming an epidemic, without considering how to decrease the number of infected individuals in a community.
With using the SIR (Susceptible-Infected-Removed) epidemiological model, Madar et al. [23] studied the epidemic spreading behavior in scale-free networks and proposed different immunization strategies. In [24], Hayashi et al. investigated the spread of viruses in growing scale-free networks with new users coming, and compared the performance of targeted vaccination and random vaccination under such network models. However, in these works, they assume that the graph is scale-free and the connections between nodes follow power law distribution.
By analyzing a real cellular network trace, Zhu et al. [8] constructed a graph to describe the social relationships between mobile phones, and proposed two algorithms (balanced partitioning and cluster partitioning) to contain mobile worms at the early stage. Nguyen et al. [11] utilized community structures to contain viruses in online social networks. They presented community detection algorithms to find the overlapping communities and patched the nodes in the overlapped areas to prevent worms spreading from one community to another. With the community structure, Lu et al. [12] calculated the intra-centrality (within community) and inter-centrality (between community) and combined them together to select nodes for vaccination. The Facebook trace in New Orleans regional network was used in [11] and [12]. However, these works mainly focus on the worms (viruses) in cellular networks or online social networks, which have different propagation patterns from infectious diseases. In addition, they implicitly assume that any node in the network can be selected as vaccinated node, while in disease containment, this is not true (e.g., we cannot vaccinate a node that has already been infected).
This paper extends the preliminary version of our algorithm appeared in [20]. In [20], we proposed connectivity centrality and designed an algorithm based on the proposed centrality. In this paper, we enhance the centrality based algorithm by exploiting information of the known infected nodes which can be detected during targeted vaccination. Given a set of known infected nodes, we measure node’s infecting capability and its possibility to be infected, and consider these two factors to select nodes to be vaccinated.
III. Trace Collection
Most infectious diseases spread among people through virus, which is transmitted by airborne infectious particles or small respiratory droplets when two people contact within a certain distance [16]–[18]. Besides, the activity of many infectious viruses (e.g., influenza virus) varies in indoor and outdoor environment because of the different ambient airflow patterns [25], [26]. Therefore, collecting the contacts among people within the disease transmission distance and indicating whether a contact happened indoor or outdoor are important for modeling disease propagation and designing disease containment algorithms. However, most of the existing traces do not consider these two factors, and thus we deploy a wireless sensor system in a high school and collect our own traces.
A. System Overview
Due to the frequent and close contacts among students every day, schools are regarded to play a major role in the spread of infectious diseases into the community [27], [28]. Therefore, we deployed our trace collection system in a high school which has about 800 students. The Crossbow TelosB mote, which has a low-power microcontroller, an IEEE 802.15.4 radio and extended memory, is used to collect student contacts. Since the wireless signal strength degrades as the communication distance increases, we can measure the wireless signal strength and then infer when and where students meet with each other. In the wireless sensor system, we have two types of motes: mobile motes and stationary motes. Mobile motes are carried by students to collect their contacts. As shown in Figure 2, each mobile mote is placed in a pouch attached to a lanyard and worn by a student around his (her) neck. During a school day, the mobile motes are carried by students and each of them is labeled with a unique ID. The mobile mote broadcasts a beacon every 20 seconds and keeps listening to the wireless channel to record beacons from other motes. The beacon includes mote type, mote ID, and its local sequence number which is initialized to 0 and increased by one after each beacon broadcast. Stationary motes are deployed at some fixed places (e.g., classrooms, dining halls and restrooms) to indicate the contact locations. Each stationary mote is also assigned a unique ID and broadcasts beacons with its mote type, ID and sequence number at an interval of 20 seconds. The sequence number starts at 0 when the mote is powered on and increased by one after each broadcast. During trace collection, all the motes keep broadcasting beacons periodically and only mobile motes record beacons from others. Beacons from other mobile motes are recorded as contact information and beacons from stationary motes are recorded to infer whether the contacts happen indoor or outdoor.
The wireless sensor system is deployed during a flu season in 2012. On each school day, the mobile motes are distributed to students around 7 am and received back around 4 pm. In order not to disturb students’ activities, the stationary motes are deployed at night before the trace collection and their starting times are recorded manually. The experiment was conducted across two weeks in March 2012. Averagely, 3.4 million contacts were collected between mobile motes each day.
B. Design Considerations
1). Disease Transmission Distance
According to [17], [18], and [29], the airborne droplets can only transmit from one person to another when their contact distance is less than 9 feet. Thus, 9 feet is a critical distance for disease propagation and we only need to collect contacts within this distance. By using received signal strength indicator (RSSI), which reflects the distance between the sending and receiving nodes, we can determine if a contact happens within a specific range by checking if the corresponding RSSI is above certain threshold for a given transmission power.
Different from many existing sensor network applications [30]–[33], where wireless nodes are supposed to communicate with each other with the highest transmission power to achieve higher data delivery rate and reach larger coverage area, we choose a lower transmission power in our system to save energy. Since a TelosB mote only has two AA batteries as its power supply, if it keeps working at the highest transmission power level, its batteries will die very quickly. According to our preliminary experimental results, the transmission power of −16.9 dBm (power level 6 for TelosB mote) is strong enough to ensure a high data delivery rate within a distance of 9 feet. Under this transmission power, the RSSI of the packet received within 9 feet is larger than −80 dBm. Therefore, in our implementation, the transmission power of the mobile mote is set to −16.9 dBm and a beacon from the mobile mote is recorded only if its RSSI is larger than −80 dBm.
2). Indoor or Outdoor
Since the infecting capability of infectious disease varies in indoor and outdoor environment due to the different ambient airflow patterns [25], [26], stationary motes are deployed to provide location information for inferring where a contact happens. In our system, stationary motes periodically broadcast beacons with transmission power of −11 dBm (power level 10 for TelosB mote) and they are carefully deployed to cover the entire buildings in the school. Thus, if a mote is indoor at some time, it will receive beacons from at least one stationary mote at that time. Further, if a beacon is received from a mobile mote and at the same time both the sender and receiver have recorded beacons from some stationary motes, we can infer that this contact happens indoor; otherwise, it happens outdoor. Therefore, we can discern whether a contact happens indoor or outdoor by checking beacons received from the stationary motes.
IV. Targeted Vaccination
In this section, we first construct a graph to model disease propagation based on the collected traces. Then, we propose centrality based algorithm for disease containment, and further enhance the solution by exploiting the knowledge of the infected nodes which have been detected during vaccination.
A. Disease Propagation Graph
If there is a contact between two students, there will be some probability for the infectious disease to be transmitted between them. Therefore, we can construct a graph (called disease propagation graph) to model disease propagation based on the collected human contacts. The disease propagation graph is represented by , where is the set of vertices and is the set of edges. In graph , each node represents a participant and an edge exists when there is contact between and . Since the infectious disease is transmitted bidirectional, is an undirected graph.
In the disease propagation graph, we assign each edge a weight to describe the disease propagation probability between these two nodes. Two factors should be considered when assigning the edge weight: contact frequency and contact location. For two nodes that contact with each other frequently (i.e., they spend a lot of time together), if one node gets some infectious disease, the other one is most likely to be infected. Thus, the more frequently two nodes encounter, the larger weight should be assigned to the corresponding edge. Another factor that affects the probability of infection is contact location. According to [25] and [26], infectious disease such as influenza, is more likely to spread quickly in indoor environment than outdoor environment. Thus, contacts happen indoor should be assigned more weight than contacts happen outdoor.
Considering both contact frequency and contact location, the edge weight is calculated as:
where
and is the time period of the trace used for constructing the graph.
In our trace collection system, each mote (either mobile mote or stationary mote) periodically broadcasts a beacon whose local sequence number is initialized to 0 and increased by one after each broadcast. Since there are many stationary motes whose starting times are manually recorded, beacons received from these motes can be used to synchronize local sequence numbers in the beacons received from mobile motes. Therefore, we use the synchronized global sequence number to represent time . is set to 1 when receives a beacon from at or receives a beacon from at . is set to if the contact happens outdoor. Since infectious disease is relatively inactive in outdoor environment, and its value depends on the characteristic of the specific disease.
B. Centrality Based Targeted Vaccination
The disease propagation graph shows how each node contacts with others and how disease propagates among them. In the graph, each node has different influence on others and thus plays a different role during disease propagation. Since the importance of each node on disease propagation can be measured by centrality, we propose centrality based algorithm for targeted vaccination.
In literature, there are some well known centrality metrics [19] such as degree, betweenness and closeness centrality.
Degree centrality measures how well a node is connected with its neighbors and it is defined as:
where is the set of ’s neighboring nodes.
Betweenness centrality measures to what extent a node can connect two other nodes through a shortest path and it is defined as:
where is the total number of shortest paths from node to and is the total number of shortest paths from node to that go through node .
Closeness centrality measures how close a node is to others and it is defined as:
where is the cardinality of and is the shortest path distance between and .
Although these centralities can be used to measure the node’s importance in a graph, they are not applicable to describe a node’s influence on others during disease propagation. For example, Figure 3 shows an example of using different centralities to remove one node to contain the disease. Both betweenness and closeness centralities are distance based and the weight between any two neighboring nodes should represent their distance. However, in the disease propagation graph, the edge weight is assigned based on the disease propagation probability. The larger the edge weight is, the closer the nodes are and the smaller their distance is. Therefore, when calculating distance based centralities, is used as the distance between two neighboring nodes and . As shown in Figure 3, both node and have the highest degree centrality; node has the highest betweenness centrality; all the nodes have the same closeness centrality of 0. However, none of these centralities returns the optimal vaccinated node , whose removal will not only separate the graph into different parts, but also remove edges with large edge weights. This is because degree centrality only considers the connection between a node and its neighbors, and thus is limited by its local effect; betweenness centrality considers the global effect, but it does not describe the difference between a node’s influence on its neighbors and that on those nodes far away; with considering the distance between two nodes, closeness centrality treats a node’s influence on others differently, but its value is dominated by the path with longer distance since all the distances are simply added together, and it does not work in a disconnected graph.
In disease propagation graph, infectious disease is more likely to be transmitted to nodes closer than nodes further away. Thus we propose a new centrality metric called connectivity centrality to measure how contagious an infected node is to others and it is defined as:
where
and denotes the number of hops between and along the shortest path.
Connectivity centrality takes into account a node’s effect on others and considers nodes closer more important, and thus it is better than other centrality metrics for measuring node’s influence on disease propagation. For example, in Figure 3, the optimal vaccinated node is the node with the highest connectivity centrality.
Based on node centrality, we can propose a straightforward algorithm. To find vaccinated nodes, we sort all the nodes based on their centrality values and choose the top nodes. However, in disease containment, not all nodes are eligible for vaccination. For example, vaccinating a node which has already been infected will not be effective. In addition, some nodes may refuse to get vaccinated because of their concerns on potential side effects [34]. Therefore, in the centrality based algorithm, after sorting, we select the first nodes which are eligible for vaccination as the targeted nodes.
C. Enhanced Targeted Vaccination
Centrality based algorithm selects the nodes with the highest influence to be vaccinated. This is because once these nodes are infected, they are able to infect more nodes due to their close connections. However, it only considers the infecting capability of a node, without considering how possible it will be infected. Both these two factors should be taken into account for vaccination. For example, as shown in Figure 4, each edge has the same weight and is known as an infected node. By using centrality based algorithm, both and can be selected as the candidate nodes due to their high centrality. However, since has already been infected, will be a better choice because it is more likely to be infected soon, and vaccinating will potentially protect more nodes from being infected. In order to describe both a node’s infecting capability and its infected possibility, we propose infecting score and infected score by exploiting the information of the infected nodes which can be detected during vaccination, and combine these two scores together to determine which nodes should be vaccinated.
1). Infecting Score
When centrality is used to measure node’s influence on others, it implicitly assumes that all the other nodes are uninfected. However, if there are some known infected nodes in the graph, the calculated centrality may not accurately measure node’s importance. For example, as shown in Figure 5, the black nodes are infected nodes. With centrality based algorithm, node should be chosen to be vaccinated first since has the highest centrality no matter which centrality metric is used. However, considering that node , , and have already been infected, node will be a better choice since its removal will separate node and from the infected nodes, while ’s removal will still leave infected nodes in all partitions.
Let denote the set of known infected nodes; e.g., in Figure 5. To measure node ’s influence under the infected node set , nodes in should not be considered since these nodes have already been infected and has no influence on them. Also, has no influence on the nodes that are closer to an infected node than to . For example, even if node is infected, it will not affect node ’s infection status which only depends on the connection between and . As a result, node ’s influence should be different with the knowledge of the infected nodes ( in this example). Thus, we define infecting score to measure the infecting capability of a node under infected node set . As illustrated in Section IV-B, connectivity centrality describes the local and global effects of a node, which is better than other centralities in measuring its importance during disease propagation. Based on connectivity centrality, node ’s infecting score under infected node set is defined as follows:
where
Based on this definition, when , i.e., connectivity centrality is a special case for calculating the infecting score when no node is infected.
2). Infected Score
To measure the importance of a node more accurately, besides infecting score, infected score is introduced to measure the possibility for it to be infected, which is calculated as follows:
Figure 6 illustrates how to apply the above equation to a simple graph, which contains three nodes , and . Suppose ; i.e., node has been detected as an infected node. By applying Equation 1, we have the following linear equations:
where .
In the disease propagation graph, for two nodes and , we have . Thus, Equation 2 can be easily solved as follows:
For a disease propagation graph with edge weight , we can calculate infected score for each node by applying Equation 1. In this way, a linear equation system can be generated.
Suppose the node set , the infected set and the uninfected set . For simplicity, we denote as and denote normalized weight as . By applying Equation 1 for each node, we have the following equations:
It can be easily transformed to a linear equation system denoted by matrices:
where is an identity matrix, is a zero matrix,
and
Theorem 1:
The system of linear equations given in Equation 3 has a single unique solution.
The proof of Theorem 1 can be found in Appendix A. As long as a linear equation system shown in Equation 3 can be obtained, some well known methods such as Gaussian Elimination, Cramer’s Rule, etc., can be used to solve it and we can get the infected score of each node under a certain infected node set .
3). Combined Score
Infecting score measures how a node infects others once it is infected, while infected score evaluates how possible this node will be infected with the current knowledge of the infected set . Both factors should be taken into account when selecting the vaccinated nodes. Therefore, we combine them as follows to get a node ’s combined score.
At each round, the node with the highest combined score is selected as the candidate node. If this node is eligible for vaccination, it is removed from the graph and the combined score is recalculated based on the updated graph; if it has already been infected, it is added into set and the node with the highest combined score based on the updated is chosen as candidate. This process is repeated until nodes are selected for vaccination. Comparing with the adaptive algorithm in [20], our enhanced algorithm exploits the information of some known infected nodes during vaccination and combines both a node’s infecting score and infected score together to evaluate a node’s influence in disease propagation. The pseudo code of the enhanced algorithm is shown in Algorithm 1.
V. Performance Evaluations
In this section, we evaluate the performance of our centrality based algorithm and enhanced algorithm.
A. Simulation Setup
The performance of our algorithms is evaluated based on the trace collected in the high school. The trace is divided into two halves based on the time when it was collected. We firstly use half of the trace as the training data to build the disease propagation graph, and use the other half for performance evaluations. Then we exchange the two halves and run the training and testing again for cross validation.
At the very beginning, we randomly choose a small group of nodes (1%) as the seed set of infection sources to initiate the infection process. The trace is executed based on time units. At each time unit (20 seconds), the SIR model [35] is used to simulate the infection process. In SIR, each node has three states: (Susceptible), (Infected) and (Recovered). For a node which is initially at state , it will be infected with probability (called transmission probability) indoor and ( is set to 0.5) outdoor by contacting with an infected node. Once the node is infected, it will move into state . An infected node may recover with a probability ( is set to 0.0003) at each time unit and goes back to state . Nodes in state will not get infected again since they have got immunization already.
Although some vaccination strategies have been proposed for certain diseases, e.g., ring vaccination for smallpox and targeted mop-up campaigns for polio, these strategies are based on the knowledge of infected nodes, which is not known in many scenarios. Therefore, instead of comparing with these strategies, we compare our centrality based algorithms and enhanced algorithm (Enhanced) with the community based scheme (AFOCS) [11] and the cluster based scheme (Cluster) [8]. Degree centrality, betweenness centrality and connectivity centrality are used to implement centrality based algorithm (denoted as Degree, Betweenness and Connectivity respectively). Closeness centrality is not used here since it does not work when the graph is disconnected.
Vaccinating Threshold is used to control when the targeted vaccination starts. It is measured as the percentage of infected nodes in the network. This parameter represents the time delay since the infectious disease starts propagating till a vaccine is generated. Once the percentage of infected nodes reaches the threshold , we start to distribute vaccines to the selected nodes.
B. Comparisons of Infection Rates
Figure 7 shows how the infection rate changes when the percentage of vaccinated nodes increases with % and 10% respectively. As shown in the figure, no matter which scheme is used, the number of infected nodes will decrease with more vaccines distributed. Enhanced achieves better performance than other schemes under different . When % and 20% of nodes are vaccinated, the infection rate of Enhanced is about 45%, but the infection rate of other schemes are higher than 50%. For the centrality based algorithms, under different , Degree performs better than Betweenness since disease is easier to transmit from the infected nodes to their neighbors than to those far away. Connectivity performs better than Betweenness and Degree, verifying that connectivity centrality is better to measure node’s importance for disease propagation.
Comparing Figure 7a with Figure 7b, we can see that AFOCS and Cluster perform worse than Connectivity when %, but better when %. The reason is as follows. If more nodes are infected before vaccination (i.e., is larger), these infected nodes are more likely to be clustered together around the infected nodes. Since AFOCS and Cluster contain the disease by isolating infected communities or clusters, they can perform better when is larger. However, their infection rate is still much higher than Enhanced.
C. Infection Rate vs. Time
Figure 8 shows how the infection rate changes over time with % and 10%, respectively. The spread of the disease can be divided into three phases. At the beginning, the disease is slowly spread from the infection sources. Then, it propagates widely and the infection rate increases quickly. Finally, no more nodes will get infected and the infection rate keeps stable. Comparing with other schemes, Enhanced performs better as the infection rate increases more slowly and is bounded under a much lower level.
D. Effect of Transmission Probability
Figure 9 shows how the disease transmission probability affects the spread of disease. As can be seen, Enhanced outperforms other schemes under different . For centrality based algorithms, Connectivity achieves better performance than Degree and Betweenness. Comparing centrality based algorithms with Cluster, both Connectivity and Degree perform better than Cluster when , but Cluster performs better than Connectivity and Degree when . The reason is as follows. Generally speaking, if the infected nodes are uniformly distributed, centrality based algorithms will perform better; if the infected nodes are clustered together, Cluster will perform better. With a lower , nodes will be infected more randomly, and then their distribution looks more uniform. With a higher , nodes with close connections will be infected more easily and thus the infected nodes are more likely to be clustered together.
E. Effect of Node Willingness
Because of the concerns on the potential side effects, not all nodes are willing to be vaccinated even if they are highly suggested. Thus, we assume each node is willing to be vaccinated with the same probability (called willingness). Figure 10 shows how node willingness affects the disease spread when different schemes are used under different . Comparing to other schemes, Enhanced is much more robust when node willingness varies. This is because the vaccinated nodes are adaptively chosen at each round in Enhanced. Even if a node is not willing to be vaccinated, its influence on the disease propagation is considered when selecting the next vaccinated nodes. However, in other schemes, the vaccinated nodes are calculated beforehand and node willingness is not considered. For AFOCS and Cluster, if certain bridge nodes (the nodes which connect different communities or clusters) are unwilling to be vaccinated, the goal for isolating the infected communities or clusters may fail.
F. Performance in Scale-Free Networks
In some social networks, the number of nodes’ neighbors follows power law distribution and the networks are scale free. In order to evaluate the performance of our algorithms in these networks, we generate a synthetic scale-free graph using Barabasi-Albert model [36]. Then we generate contacts in 1400 time steps based on the topology of this graph. At each time step, a node generates contacts with each neighbor with probability , where is set to 0.3 in our simulation. With the synthetic contact trace, we can initiate the infection process and compare our enhanced algorithm with other algorithms. As shown in Figure 11, even in the scale-free network, Enhanced achieves better performance than other schemes. Comparing with AFOCS and cluster, centrality based algorithms perform better because they vaccinate the nodes with more neighbors first and these nodes are more likely to be infected in scale-free networks.
VI. Conclusion
In this paper, we deployed a wireless sensor system in a high school to collect contacts happened between two students when they are within the disease transmission distance. Based on the collected traces, we construct a disease propagation graph to model the disease propagation, and propose a new metric called connectivity centrality to find the important nodes in the constructed graph for disease containment. Different from centrality measures like degree, betweenness or closeness centrality, connectivity centrality considers both a node’s local and global effect to measure its importance in disease propagation. Centrality based algorithms are presented and further enhanced by exploiting the information of the known infected nodes which can be detected during vaccination. We evaluate our algorithms and compare them with other schemes based on the real and synthetic traces. Simulation results show that our algorithms can contain infectious diseases effectively and outperform other schemes under various conditions.
Acknowledgments
We would like to thank the anonymous reviewers for their insightful comments and helpful suggestions.
Biographies
Xiao Sun (S’16) received the B.S. degree from Tianjin University, Tianjin, in 2008, and the M.E. degree from the Chinese Academy of Sciences, Beijing, in 2011. He is currently pursuing the Ph.D. degree with the Department of Computer Science and Engineering, The Pennsylvania State University, University Park. His research interests include wireless health, pervasive computing, and mobile networking.
Zongqing Lu (M’14)received the B.E. and M.E. degrees from Southeast University, China, and the Ph.D. degree in computer engineering from Nanyang Technological University, Singapore. He is currently a Post-Doctoral Scholar with the Department of Computer Science and Engineering, The Pennsylvania State University. His research interests include mobile computing, mobile cloud computing, mobile networking, mobile sensing, and social networks.
Xiaomei Zhang (S’15)received the B.E. degree from the University of Science and Technology of China, in 2010. She is currently pursuing the Ph.D. degree with the Department of Computer Science and Engineering, The Pennsylvania State University. Her research interests include mobile computing, mobile social networks, data science, and machine learning.
Marcel Salathé received the Ph.D. degree from ETH Zürich, Switzerland. He is currently an Associate Professor with the Schools of Life Sciences, and Computer and Communication Sciences, École Polytechnique Fédérale de Lausanne, Switzerland. His field of expertise is in digital epidemiology, where he uses sensor data, social media data, and other novel digital data sources to prevent and mitigate the spread of diseases.
Guohong Cao (F’11)received the B.S. degree in computer science from Xi’an Jiaotong University and the Ph.D. degree in computer science from Ohio State University, in 1999. Since then, he has been with the Department of Computer Science and Engineering, The Pennsylvania State University, where he is currently a Professor. His research interests include wireless networks, mobile systems, security and privacy, vehicular networks, and cyber-physical systems. He was a recipient of the NSF CAREER Award in 2001. He has served on the Editorial Board of the IEEE Transactions on Mobile Computing, the IEEE Transactions on Wireless Communications, and the IEEE Transactions on Vehicular Technology, and has served on the organizing and technical program committees of many conferences, including the TPC Chair/Co-Chair of the IEEE SRDS’2009, MASS’2010, and INFOCOM’2013.
Appendix
Proof of Theorem 1:
In Equation 3, since
if we replace with for simplicity, Equation 3 can be rewritten as
where , ,
and
Thus, to prove that the system of linear equations given in Equation 3 has a single unique solution, we only need to prove that Equation 5 has a single unique solution. Let denote a non-zero column vector of real numbers and let denote the transpose of , then we have
Considering that , the above equation can be rewritten as
Since , i.e., , we have
and equality holds only when .
Since is used to denote , and equality cannot hold for every . Thus, for any non-zero column vector , we have
Therefore, symmetric matrix is positive definite and in Equation 5 can be uniquely solved. Since in Equation 4 can also be uniquely solved, we prove that the system of linear equations given in Equation 3 has a single unique solution.
Funding Statement
This work was supported in part by the National Science Foundation (NSF) under grant CNS-1526425 and CNS-1421578.
References
- [1].WHO. (2010). Pandemic (H1N1) 2009—Update 100. [Online]. Available: http://www.who.int/csr/don/2010_05_14/en/
- [2].WHO: Ebola Response Roadmap Situation Report 3, World Health Org, Geneva, Switzerland, Sep. 2014. [Google Scholar]
- [3].WHO. (2003). Influenza. [Online]. Available: http://www.who.int/mediacentre/factsheets/2003/fs211/en/
- [4].Fu X., Small M., Walker D. M., and Zhang H., “Epidemic dynamics on scale-free networks with piecewise linear infectivity and immunization,” Phys. Rev. E, vol. 77, no. , p. 036113, 2008. [DOI] [PubMed] [Google Scholar]
- [5].Chen Y., Paul G., Havlin S., Liljeros F., and Stanley H. E., “Finding a better immunization strategy,” Phys. Rev. Lett., vol. 101, no. 5, p. 058701, 2008. [DOI] [PubMed] [Google Scholar]
- [6].Wang Y., Xiao G., Hu J., Cheng T. H., and Wang L., “Imperfect targeted immunization in scale-free networks,” Phys. A, Statist. Mech. Appl., vol. 388, no. 12, pp. 2535–2546, 2009. [Google Scholar]
- [7].Pastor-Satorras R. and Vespignani A., “Immunization of complex networks,” Phys. Rev. E, vol. 65, no. 3, p. 036104, 2002. [DOI] [PubMed] [Google Scholar]
- [8].Zhu Z., Cao G., Zhu S., Ranjan S., and Nucci A., “A social network based patching scheme for worm containment in cellular networks,” in Proc. IEEE INFOCOM, Apr. 2009, pp. 1476–1484. [Google Scholar]
- [9].Li F., Yang Y., and Wu J., “CPMC: An efficient proximity malware coping scheme in smartphone-based mobile networks,” in Proc. IEEE INFOCOM, Mar. 2010, pp. 1–9. [Google Scholar]
- [10].Zhu Z. and Cao G., “Worms in cellular networks,” in Encyclopedia of Cryptography and Security. New York, NY, USA: Springer, 2011, pp. 1392–1393. [Google Scholar]
- [11].Nguyen N. P., Dinh T. N., Tokala S., and Thai M. T., “Overlapping communities in dynamic networks: Their detection and mobile applications,” in Proc. ACM MobiCom, 2011, pp. 85–96. [Google Scholar]
- [12].Lu Z., Wen Y., and Cao G., “Community detection in weighted networks: Algorithms and applications,” in Proc. IEEE PerCom, Mar. 2013, pp. 179–184. [Google Scholar]
- [13].Lu Z., Sun X., Wen Y., Cao G., and La Porta T., “Algorithms and applications for community detection in weighted networks,” IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 11, pp. 2916–2926, Nov. 2015. [Google Scholar]
- [14].Lu Z., Sun X., Wen Y., and Cao G., “Skeleton construction in mobile social networks: Algorithms and applications,” in Proc. 11th Annu. IEEE Int. Conf. Sens., Commun., Netw. (SECON), Jun./Jul. 2014, pp. 477–485. [Google Scholar]
- [15].Bahl P. and Padmanabhan V. N., “RADAR: An in-building RF-based user location and tracking system,” in Proc. IEEE INFOCOM, Mar. 2000, pp. 775–784. [Google Scholar]
- [16].Engel J. D., Rhinehart E., Jackson M., and Chiarello L., “2007 guideline for isolation precautions: Preventing transmission of infectious agents in healthcare settings,” Amer. J. Infection Control, vol. 35, no. 10, pp. S65–S164, 2007. [DOI] [PMC free article] [PubMed] [Google Scholar]
- [17].Salathé M., Kazandjieva M., Lee J. W., Levis P., Feldman M. W., and Jones J. H., “A high-resolution human contact network for infectious disease transmission,” Proc. Nat. Acad. Sci. USA, vol. 107, no. 51, pp. 22020–22025, 2010. [DOI] [PMC free article] [PubMed] [Google Scholar]
- [18].Barclay V. C., et al. , “Positive network assortativity of influenza vaccination at a high school: Implications for outbreak risk and herd immunity,” PLoS ONE, vol. 9, no. 2, p. e87042, 2014. [DOI] [PMC free article] [PubMed] [Google Scholar]
- [19].Freeman L. C., “Centrality in social networks conceptual clarification,” Soc. Netw., vol. 1, no. 3, pp. 215–239, 1979. [Google Scholar]
- [20].Sun X., Lu Z., Zhang X., Salathe M., and Cao G., “Targeted vaccination based on a wireless sensor system,” in Proc. IEEE PerCom, Mar. 2015, pp. 215–220. [Google Scholar]
- [21].Prakash B. A., Tong H., Valler N., Faloutsos M., and Faloutsos C., “Virus propagation on time-varying networks: Theory and immunization algorithms,” in Machine Learning and Knowledge Discovery in Databases. Berlin, Germany: Springer, 2010, pp. 99–114. [Google Scholar]
- [22].Cohen R., Havlin S., and ben-Avraham D., “Efficient immunization strategies for computer networks and populations,” Phys. Rev. Lett., vol. 91, no. 24, p. 247901, 2003. [DOI] [PubMed] [Google Scholar]
- [23].Madar N., Kalisky T., Cohen R., ben-Avraham D., and Havlin S., “Immunization and epidemic dynamics in complex networks,” Eur. Phys. J. B, Condens. Matter Complex Syst., vol. 38, no. 2, pp. 269–276, 2004. [Google Scholar]
- [24].Hayashi Y., Minoura M., and Matsukubo J. (2003). “Recoverable prevalence in growing scale-free networks and the effective immunization” [Online]. Available: http://arxiv.org/abs/cond-mat/0305549 [DOI] [PubMed] [Google Scholar]
- [25].Weber T. P. and Stilianakis N. I., “Inactivation of influenza a viruses in the environment and modes of transmission: A critical review,” J. Infection, vol. 57, no. 5, pp. 361–373, 2008. [DOI] [PMC free article] [PubMed] [Google Scholar]
- [26].Robinson M., Stilianakis N. I., and Drossinos Y., “Spatial dynamics of airborne infectious diseases,” J. Theor. Biol., vol. 297, pp. 116–126, Mar. 2012. [DOI] [PMC free article] [PubMed] [Google Scholar]
- [27].Cauchemez S., Valleron A.-J., Boelle P.-Y., Flahault A., and Ferguson N. M., “Estimating the impact of school closure on influenza transmission from sentinel data,” Nature, vol. 452, no. 7188, pp. 750–754, 2008. [DOI] [PubMed] [Google Scholar]
- [28].Hens N., et al. , “Estimating the impact of school closure on social mixing behaviour and the transmission of close contact infections in eight European countries,” BMC Infectious Diseases, vol. 9, no. 1, p. 187, 2009. [DOI] [PMC free article] [PubMed] [Google Scholar]
- [29].Kazandjieva M., Lee J. W., Salathé M., Feldman M. W., Jones J. H., and Levis P., “Experiences in measuring a human contact network for epidemiology research,” in Proc. 6th Workshop Hot Topics Embedded Netw. Sensors, 2010, Art. no. 7. [Google Scholar]
- [30].Chen S. L., “A power-efficient adaptive fuzzy resolution control system for wireless body sensor networks,” IEEE Access, vol. 3, pp. 743–751, 2015. [Google Scholar]
- [31].Wan L., Han G., Shu L., Feng N., Zhu C., and Lloret J., “Distributed parameter estimation for mobile wireless sensor network based on cloud computing in battlefield surveillance system,” IEEE Access, vol. 3, pp. 1729–1739, 2015. [Google Scholar]
- [32].Alim Al Islam A. B. M., Hossain M. S., Raghunathan V., and Hu Y. C., “Backpacking: Energy-efficient deployment of heterogeneous radios in multi-radio high-data-rate wireless sensor networks,” IEEE Access, vol. 2, pp. 1281–1306, 2014. [Google Scholar]
- [33].Long J., Dong M., Ota K., and Liu A., “Achieving source location privacy and network lifetime maximization through tree-based diversionary routing in wireless sensor networks,” IEEE Access, vol. 2, pp. 633–651, 2014. [Google Scholar]
- [34].Chor J. S. Y., et al. , “Willingness of Hong Kong healthcare workers to accept pre-pandemic influenza vaccination at different WHO alert levels: Two questionnaire surveys,” Brit. Med. J., vol. 339, p. b3391, Aug. 2009. [DOI] [PMC free article] [PubMed] [Google Scholar]
- [35].Hethcote H. W., “The mathematics of infectious diseases,” SIAM Rev., vol. 42, no. 4, pp. 599–653, 2000. [Google Scholar]
- [36].Albert R. and Barabási A.-L., “Statistical mechanics of complex networks,” Rev. Mod. Phys., vol. 74, no. 1, p. 47, 2002. [Google Scholar]