Skip to main content
IEEE - PMC COVID-19 Collection logoLink to IEEE - PMC COVID-19 Collection
. 2016 Apr 6;4:1558–1569. doi: 10.1109/ACCESS.2016.2551199

Infectious Disease Containment Based on a Wireless Sensor System

Xiao Sun 1,, Zongqing Lu 1, Xiaomei Zhang 1, Marcel Salathe 2,3, Guohong Cao 1
PMCID: PMC7309273  PMID: 34192096

Abstract

Infectious diseases pose a serious threat to public health due to its high infectivity and potentially high mortality. One of the most effective ways to protect people from being infected by these diseases is through vaccination. However, due to various resource constraints, vaccinating all the people in a community is not practical. Therefore, targeted vaccination, which vaccinates a small group of people, is an alternative approach to contain infectious diseases. Since many infectious diseases spread among people by droplet transmission within a certain range, we deploy a wireless sensor system in a high school to collect contacts happened within the disease transmission distance. Based on the collected traces, a graph is constructed to model the disease propagation, and a new metric (called connectivity centrality) is presented to find the important nodes in the constructed graph for disease containment. Connectivity centrality considers both a node’s local and global effect to measure its importance in disease propagation. Centrality based algorithms are presented and further enhanced by exploiting the information of the known infected nodes, which can be detected during targeted vaccination. Simulation results show that our algorithms can effectively contain infectious diseases and outperform other schemes under various conditions.

Keywords: Wireless sensor system, human contact, node centrality, disease containment

I. Introduction

Infectious diseases pose a serious threat to public health due to its high infectivity and potentially high mortality. Over the last few decades, infectious diseases have caused several regional and worldwide pandemics, resulting in many infections and deaths. For example, during H1N1 pandemic in 2009, more than 600,000 cases were lab-confirmed and more than 14,000 were dead all over the world [1]. According to World Health Organization (WHO), the epidemic of Ebola in 2014 has caused significant mortality in many West African countries, with a reported case with fatality rate of 70% [2]. Even for a seasonal influenza, it is estimated to affect 5% to 15% of the global population and cause 3 to 5 million cases of severe infections and 250,000 to 500,000 deaths worldwide each year [3].

To prevent infectious diseases, one of the most effective ways is to vaccinate the susceptible individuals. However, due to resource constraints such as the limited vaccine supply, in many cases, it may not be practical to vaccinate all the susceptible individuals, especially when a new infectious disease outbreaks. Therefore, targeted vaccination, which vaccinates a small group of people in a community, is an alternative approach to contain infectious diseases. The challenge is how to find the group of people whose vaccination will averagely result in the maximum reduction of disease spread.

Targeted vaccination has been studied in some previous works [4][7]. However, these works are limited to theoretical analysis based on synthetic networks such as random, homogeneous or scale-free network, which may not reflect the real contact patterns among people in different scenarios. For example, based on the contact traces collected from high school students, where each student carries a sensor node to record the contacts with others by sending and receiving packets (details shown in Section III), we show in Figure 1 that the distributions of the number of nodes’ contacts (i.e., the number of packets received from other nodes) and neighbors (i.e., the number of nodes from which packets are received) are different from the power-law distributions. Since students in the high school spend most of their time in classes and students in the same class may have contacts with each other, most of the nodes in the network will have similar number of neighbors and contacts. As observed from our collected trace, the number of nodes’ neighbors and the number of nodes’ contacts are more likely to follow normal distributions rather than power-law distributions.

FIGURE 1.

FIGURE 1.

Distributions of the number of nodes’ (a) neighbors and (b) contacts.

The problem of targeted vaccination has some similarity to virus (worm) containment in the area of computer networks, such as cellular networks [8][10] or online social networks [11][14]. Based on cluster partition and community detection, different schemes have been proposed for virus (worm) containment [8], [11]. By using various techniques to divide the network into different partitions, these schemes contain the viruses (worms) within the infected partition before they spread out. More specifically, the nodes that separate network partitions are vaccinated in [8] and the neighbors of overlapped nodes between two communities are vaccinated in [11]. However, these works mainly focus on containing the worm (virus) in cellular network or online social network, which has different propagation patterns from infectious disease. For infectious disease, it will be transmitted with a probability when two people contact with each other. However, in cellular network or online social network, a node will be infected immediately once it contacts with an infected node. In addition, they implicitly assume that all nodes in the network are eligible for vaccination, which is not true in disease containment (e.g., we cannot vaccinate an infected node). Thus, we cannot directly apply these schemes to targeted vaccination.

Different from the aforementioned works, we deploy a wireless sensor system in a high school to collect contacts among students. Since the wireless signal strength degrades as the communication distance increases [15], we can measure the wireless signal strength and then infer when and where students meet with each other. This information is important for modeling the propagation of infectious disease. Many respiratory infectious diseases (e.g., influenza) spread among people by droplet transmission, requiring an infected and a susceptible person to be in close physical contact at a short maximum distance [16][18]. With our wireless sensor system, we can find student contacts within such distance, and construct a disease propagation graph to model the infectious disease propagation. Then, targeted vaccination becomes a problem of selecting important nodes in a graph to contain infectious disease.

Based on the disease propagation graph, node centrality can be used to measure its importance during disease propagation. Although there are some centrality measures [19] such as degree centrality, betweenness centrality and closeness centrality, they all have disadvantages when applied to disease containment. For example, degree centrality only considers the connection between a node and its neighbors, and thus is limited by its local effect. Betweenness centrality measures the global effect, but it does not describe the difference between a node’s influence on its neighbors and that on those nodes far away. Closeness centrality does not work when the graph is disconnected. In disease propagation, an infected node will infect nodes closer with much higher possibility than those far away. Thus, we propose a new metric called connectivity centrality, which takes into account a node’s influence on all others and considers nodes closer more important. Based on the proposed centrality measure, we design centrality based algorithm for targeted vaccination. In infectious disease containment, not all nodes are eligible for vaccination. For example, vaccination for a node which has already been infected will not be effective. Some of these infected nodes can be detected during vaccination. With this information, we enhance the centrality based algorithm by considering both a node’s infecting capability and its infected possibility. We evaluate the centrality based algorithm and the enhanced algorithm, and compare them with other schemes. The trace driven simulation results show that our algorithms can significantly reduce the infection rate. Although our algorithms are illustrated based on the contact trace collected from a high school, they are trace-independent and can work in other networks.

The rest of this paper is organized as follows. Section II reviews related work and Section III describes our trace collection. We propose centrality based algorithms and enhanced algorithm in Section IV and evaluate the performance in Section V. Section VI concludes the paper. A preliminary work has been published in [20].

II. Related Work

A rich body of work has focused on infectious disease containment. Various disease propagation patterns have been studied in [21] and [22]. Based on the disease propagation model, Prakash et al. [21] derived the epidemic threshold for a given network under which an epidemic will not happen and above which an epidemic will happen. Moreover, they have designed a greedy strategy, which vaccinates the node that causes the largest drop in the eigenvalue of the system matrix. Cohen et al. [22] proposed a mathematical model and an immunization policy based on a small fraction of random acquaintances, and analytically studied the critical threshold for complete immunization. However, these techniques mainly focus on how to avoid the spreading of infectious disease becoming an epidemic, without considering how to decrease the number of infected individuals in a community.

With using the SIR (Susceptible-Infected-Removed) epidemiological model, Madar et al. [23] studied the epidemic spreading behavior in scale-free networks and proposed different immunization strategies. In [24], Hayashi et al. investigated the spread of viruses in growing scale-free networks with new users coming, and compared the performance of targeted vaccination and random vaccination under such network models. However, in these works, they assume that the graph is scale-free and the connections between nodes follow power law distribution.

By analyzing a real cellular network trace, Zhu et al. [8] constructed a graph to describe the social relationships between mobile phones, and proposed two algorithms (balanced partitioning and cluster partitioning) to contain mobile worms at the early stage. Nguyen et al. [11] utilized community structures to contain viruses in online social networks. They presented community detection algorithms to find the overlapping communities and patched the nodes in the overlapped areas to prevent worms spreading from one community to another. With the community structure, Lu et al. [12] calculated the intra-centrality (within community) and inter-centrality (between community) and combined them together to select nodes for vaccination. The Facebook trace in New Orleans regional network was used in [11] and [12]. However, these works mainly focus on the worms (viruses) in cellular networks or online social networks, which have different propagation patterns from infectious diseases. In addition, they implicitly assume that any node in the network can be selected as vaccinated node, while in disease containment, this is not true (e.g., we cannot vaccinate a node that has already been infected).

This paper extends the preliminary version of our algorithm appeared in [20]. In [20], we proposed connectivity centrality and designed an algorithm based on the proposed centrality. In this paper, we enhance the centrality based algorithm by exploiting information of the known infected nodes which can be detected during targeted vaccination. Given a set of known infected nodes, we measure node’s infecting capability and its possibility to be infected, and consider these two factors to select nodes to be vaccinated.

III. Trace Collection

Most infectious diseases spread among people through virus, which is transmitted by airborne infectious particles or small respiratory droplets when two people contact within a certain distance [16][18]. Besides, the activity of many infectious viruses (e.g., influenza virus) varies in indoor and outdoor environment because of the different ambient airflow patterns [25], [26]. Therefore, collecting the contacts among people within the disease transmission distance and indicating whether a contact happened indoor or outdoor are important for modeling disease propagation and designing disease containment algorithms. However, most of the existing traces do not consider these two factors, and thus we deploy a wireless sensor system in a high school and collect our own traces.

A. System Overview

Due to the frequent and close contacts among students every day, schools are regarded to play a major role in the spread of infectious diseases into the community [27], [28]. Therefore, we deployed our trace collection system in a high school which has about 800 students. The Crossbow TelosB mote, which has a low-power microcontroller, an IEEE 802.15.4 radio and extended memory, is used to collect student contacts. Since the wireless signal strength degrades as the communication distance increases, we can measure the wireless signal strength and then infer when and where students meet with each other. In the wireless sensor system, we have two types of motes: mobile motes and stationary motes. Mobile motes are carried by students to collect their contacts. As shown in Figure 2, each mobile mote is placed in a pouch attached to a lanyard and worn by a student around his (her) neck. During a school day, the mobile motes are carried by students and each of them is labeled with a unique ID. The mobile mote broadcasts a beacon every 20 seconds and keeps listening to the wireless channel to record beacons from other motes. The beacon includes mote type, mote ID, and its local sequence number which is initialized to 0 and increased by one after each beacon broadcast. Stationary motes are deployed at some fixed places (e.g., classrooms, dining halls and restrooms) to indicate the contact locations. Each stationary mote is also assigned a unique ID and broadcasts beacons with its mote type, ID and sequence number at an interval of 20 seconds. The sequence number starts at 0 when the mote is powered on and increased by one after each broadcast. During trace collection, all the motes keep broadcasting beacons periodically and only mobile motes record beacons from others. Beacons from other mobile motes are recorded as contact information and beacons from stationary motes are recorded to infer whether the contacts happen indoor or outdoor.

FIGURE 2.

FIGURE 2.

A mobile mote carried by a student.

The wireless sensor system is deployed during a flu season in 2012. On each school day, the mobile motes are distributed to students around 7 am and received back around 4 pm. In order not to disturb students’ activities, the stationary motes are deployed at night before the trace collection and their starting times are recorded manually. The experiment was conducted across two weeks in March 2012. Averagely, 3.4 million contacts were collected between mobile motes each day.

B. Design Considerations

1). Disease Transmission Distance

According to [17], [18], and [29], the airborne droplets can only transmit from one person to another when their contact distance is less than 9 feet. Thus, 9 feet is a critical distance for disease propagation and we only need to collect contacts within this distance. By using received signal strength indicator (RSSI), which reflects the distance between the sending and receiving nodes, we can determine if a contact happens within a specific range by checking if the corresponding RSSI is above certain threshold for a given transmission power.

Different from many existing sensor network applications [30][33], where wireless nodes are supposed to communicate with each other with the highest transmission power to achieve higher data delivery rate and reach larger coverage area, we choose a lower transmission power in our system to save energy. Since a TelosB mote only has two AA batteries as its power supply, if it keeps working at the highest transmission power level, its batteries will die very quickly. According to our preliminary experimental results, the transmission power of −16.9 dBm (power level 6 for TelosB mote) is strong enough to ensure a high data delivery rate within a distance of 9 feet. Under this transmission power, the RSSI of the packet received within 9 feet is larger than −80 dBm. Therefore, in our implementation, the transmission power of the mobile mote is set to −16.9 dBm and a beacon from the mobile mote is recorded only if its RSSI is larger than −80 dBm.

2). Indoor or Outdoor

Since the infecting capability of infectious disease varies in indoor and outdoor environment due to the different ambient airflow patterns [25], [26], stationary motes are deployed to provide location information for inferring where a contact happens. In our system, stationary motes periodically broadcast beacons with transmission power of −11 dBm (power level 10 for TelosB mote) and they are carefully deployed to cover the entire buildings in the school. Thus, if a mote is indoor at some time, it will receive beacons from at least one stationary mote at that time. Further, if a beacon is received from a mobile mote and at the same time both the sender and receiver have recorded beacons from some stationary motes, we can infer that this contact happens indoor; otherwise, it happens outdoor. Therefore, we can discern whether a contact happens indoor or outdoor by checking beacons received from the stationary motes.

IV. Targeted Vaccination

In this section, we first construct a graph to model disease propagation based on the collected traces. Then, we propose centrality based algorithm for disease containment, and further enhance the solution by exploiting the knowledge of the infected nodes which have been detected during vaccination.

A. Disease Propagation Graph

If there is a contact between two students, there will be some probability for the infectious disease to be transmitted between them. Therefore, we can construct a graph (called disease propagation graph) to model disease propagation based on the collected human contacts. The disease propagation graph is represented by Inline graphic, where Inline graphic is the set of vertices and Inline graphic is the set of edges. In graph Inline graphic, each node Inline graphic represents a participant and an edge Inline graphic exists when there is contact between Inline graphic and Inline graphic. Since the infectious disease is transmitted bidirectional, Inline graphic is an undirected graph.

In the disease propagation graph, we assign each edge Inline graphic a weight Inline graphic to describe the disease propagation probability between these two nodes. Two factors should be considered when assigning the edge weight: contact frequency and contact location. For two nodes that contact with each other frequently (i.e., they spend a lot of time together), if one node gets some infectious disease, the other one is most likely to be infected. Thus, the more frequently two nodes encounter, the larger weight should be assigned to the corresponding edge. Another factor that affects the probability of infection is contact location. According to [25] and [26], infectious disease such as influenza, is more likely to spread quickly in indoor environment than outdoor environment. Thus, contacts happen indoor should be assigned more weight than contacts happen outdoor.

Considering both contact frequency and contact location, the edge weight Inline graphic is calculated as:

A.

where

A.

and Inline graphic is the time period of the trace used for constructing the graph.

In our trace collection system, each mote (either mobile mote or stationary mote) periodically broadcasts a beacon whose local sequence number is initialized to 0 and increased by one after each broadcast. Since there are many stationary motes whose starting times are manually recorded, beacons received from these motes can be used to synchronize local sequence numbers in the beacons received from mobile motes. Therefore, we use the synchronized global sequence number to represent time Inline graphic. Inline graphic is set to 1 when Inline graphic receives a beacon from Inline graphic at Inline graphic or Inline graphic receives a beacon from Inline graphic at Inline graphic. Inline graphic is set to Inline graphic if the contact happens outdoor. Since infectious disease is relatively inactive in outdoor environment, Inline graphic and its value depends on the characteristic of the specific disease.

B. Centrality Based Targeted Vaccination

The disease propagation graph shows how each node contacts with others and how disease propagates among them. In the graph, each node has different influence on others and thus plays a different role during disease propagation. Since the importance of each node on disease propagation can be measured by centrality, we propose centrality based algorithm for targeted vaccination.

In literature, there are some well known centrality metrics [19] such as degree, betweenness and closeness centrality.

Degree centrality measures how well a node is connected with its neighbors and it is defined as:

B.

where Inline graphic is the set of Inline graphic’s neighboring nodes.

Betweenness centrality measures to what extent a node can connect two other nodes through a shortest path and it is defined as:

B.

where Inline graphic is the total number of shortest paths from node Inline graphic to Inline graphic and Inline graphic is the total number of shortest paths from node Inline graphic to Inline graphic that go through node Inline graphic.

Closeness centrality measures how close a node is to others and it is defined as:

B.

where Inline graphic is the cardinality of Inline graphic and Inline graphic is the shortest path distance between Inline graphic and Inline graphic.

Although these centralities can be used to measure the node’s importance in a graph, they are not applicable to describe a node’s influence on others during disease propagation. For example, Figure 3 shows an example of using different centralities to remove one node to contain the disease. Both betweenness and closeness centralities are distance based and the weight between any two neighboring nodes should represent their distance. However, in the disease propagation graph, the edge weight is assigned based on the disease propagation probability. The larger the edge weight is, the closer the nodes are and the smaller their distance is. Therefore, when calculating distance based centralities, Inline graphic is used as the distance between two neighboring nodes Inline graphic and Inline graphic. As shown in Figure 3, both node Inline graphic and Inline graphic have the highest degree centrality; node Inline graphic has the highest betweenness centrality; all the nodes have the same closeness centrality of 0. However, none of these centralities returns the optimal vaccinated node Inline graphic, whose removal will not only separate the graph into different parts, but also remove edges with large edge weights. This is because degree centrality only considers the connection between a node and its neighbors, and thus is limited by its local effect; betweenness centrality considers the global effect, but it does not describe the difference between a node’s influence on its neighbors and that on those nodes far away; with considering the distance between two nodes, closeness centrality treats a node’s influence on others differently, but its value is dominated by the path with longer distance since all the distances are simply added together, and it does not work in a disconnected graph.

FIGURE 3.

FIGURE 3.

An example of different centrality metrics in the disease propagation graph. The edge weight Inline graphic is shown in the graph and Inline graphic is used as the distance between two neighboring nodes Inline graphic and Inline graphic when calculating distance based centralities. Both node Inline graphic and Inline graphic have the highest degree centrality of 0.45; node Inline graphic has the highest betweenness centrality of 25; all the nodes have the same closeness centrality of 0; node Inline graphic has the highest connectivity centrality of 0.504.

In disease propagation graph, infectious disease is more likely to be transmitted to nodes closer than nodes further away. Thus we propose a new centrality metric called connectivity centrality to measure how contagious an infected node is to others and it is defined as:

B.

where

B.

and Inline graphic denotes the number of hops between Inline graphic and Inline graphic along the shortest path.

Connectivity centrality takes into account a node’s effect on others and considers nodes closer more important, and thus it is better than other centrality metrics for measuring node’s influence on disease propagation. For example, in Figure 3, the optimal vaccinated node Inline graphic is the node with the highest connectivity centrality.

Based on node centrality, we can propose a straightforward algorithm. To find Inline graphic vaccinated nodes, we sort all the nodes based on their centrality values and choose the top Inline graphic nodes. However, in disease containment, not all nodes are eligible for vaccination. For example, vaccinating a node which has already been infected will not be effective. In addition, some nodes may refuse to get vaccinated because of their concerns on potential side effects [34]. Therefore, in the centrality based algorithm, after sorting, we select the first Inline graphic nodes which are eligible for vaccination as the targeted nodes.

C. Enhanced Targeted Vaccination

Centrality based algorithm selects the nodes with the highest influence to be vaccinated. This is because once these nodes are infected, they are able to infect more nodes due to their close connections. However, it only considers the infecting capability of a node, without considering how possible it will be infected. Both these two factors should be taken into account for vaccination. For example, as shown in Figure 4, each edge has the same weight and Inline graphic is known as an infected node. By using centrality based algorithm, both Inline graphic and Inline graphic can be selected as the candidate nodes due to their high centrality. However, since Inline graphic has already been infected, Inline graphic will be a better choice because it is more likely to be infected soon, and vaccinating Inline graphic will potentially protect more nodes from being infected. In order to describe both a node’s infecting capability and its infected possibility, we propose infecting score and infected score by exploiting the information of the infected nodes which can be detected during vaccination, and combine these two scores together to determine which nodes should be vaccinated.

FIGURE 4.

FIGURE 4.

Targeted vaccination with some known infected nodes.

1). Infecting Score

When centrality is used to measure node’s influence on others, it implicitly assumes that all the other nodes are uninfected. However, if there are some known infected nodes in the graph, the calculated centrality may not accurately measure node’s importance. For example, as shown in Figure 5, the black nodes are infected nodes. With centrality based algorithm, node Inline graphic should be chosen to be vaccinated first since Inline graphic has the highest centrality no matter which centrality metric is used. However, considering that node Inline graphic, Inline graphic, Inline graphic and Inline graphic have already been infected, node Inline graphic will be a better choice since its removal will separate node Inline graphic and Inline graphic from the infected nodes, while Inline graphic’s removal will still leave infected nodes in all partitions.

FIGURE 5.

FIGURE 5.

Node’s infecting capability under a set of known infected nodes. Node Inline graphic has the highest degree, betweenness, closeness and connectivity centrality (Inline graphic, Inline graphic, Inline graphic and Inline graphic), but node Inline graphic, which has the highest infecting score under Inline graphic (Inline graphic), is a better choice for vaccination.

Let Inline graphic denote the set of known infected nodes; e.g., Inline graphic in Figure 5. To measure node Inline graphic’s influence under the infected node set Inline graphic, nodes in Inline graphic should not be considered since these nodes have already been infected and Inline graphic has no influence on them. Also, Inline graphic has no influence on the nodes that are closer to an infected node than to Inline graphic. For example, even if node Inline graphic is infected, it will not affect node Inline graphic’s infection status which only depends on the connection between Inline graphic and Inline graphic. As a result, node Inline graphic’s influence should be different with the knowledge of the infected nodes (Inline graphic in this example). Thus, we define infecting score to measure the infecting capability of a node under infected node set Inline graphic. As illustrated in Section IV-B, connectivity centrality describes the local and global effects of a node, which is better than other centralities in measuring its importance during disease propagation. Based on connectivity centrality, node Inline graphic’s infecting score under infected node set Inline graphic is defined as follows:

1).

where

1).

Based on this definition, Inline graphic when Inline graphic, i.e., connectivity centrality is a special case for calculating the infecting score when no node is infected.

2). Infected Score

To measure the importance of a node more accurately, besides infecting score, infected score is introduced to measure the possibility for it to be infected, which is calculated as follows:

2).

Figure 6 illustrates how to apply the above equation to a simple graph, which contains three nodes Inline graphic, Inline graphic and Inline graphic. Suppose Inline graphic; i.e., node Inline graphic has been detected as an infected node. By applying Equation 1, we have the following linear equations:

2).

where Inline graphic.

FIGURE 6.

FIGURE 6.

Infected score calculation in a simple graph.

In the disease propagation graph, for two nodes Inline graphic and Inline graphic, we have Inline graphic. Thus, Equation 2 can be easily solved as follows:

2).

For a disease propagation graph Inline graphic with edge weight Inline graphic, we can calculate infected score for each node Inline graphic by applying Equation 1. In this way, a Inline graphic linear equation system can be generated.

Suppose the node set Inline graphic, the infected set Inline graphic and the uninfected set Inline graphic. For simplicity, we denote Inline graphic as Inline graphic and denote normalized weight Inline graphic as Inline graphic. By applying Equation 1 for each node, we have the following equations:

2).

It can be easily transformed to a linear equation system denoted by matrices:

2).

where Inline graphic is an identity matrix, Inline graphic is a zero matrix,

2).

and

2).
Theorem 1:

The system of linear equations given in Equation 3 has a single unique solution.

The proof of Theorem 1 can be found in Appendix A. As long as a linear equation system shown in Equation 3 can be obtained, some well known methods such as Gaussian Elimination, Cramer’s Rule, etc., can be used to solve it and we can get the infected score of each node under a certain infected node set Inline graphic.

3). Combined Score

Infecting score measures how a node infects others once it is infected, while infected score evaluates how possible this node will be infected with the current knowledge of the infected set Inline graphic. Both factors should be taken into account when selecting the vaccinated nodes. Therefore, we combine them as follows to get a node Inline graphic’s combined score.

3).

At each round, the node with the highest combined score is selected as the candidate node. If this node is eligible for vaccination, it is removed from the graph and the combined score is recalculated based on the updated graph; if it has already been infected, it is added into set Inline graphic and the node with the highest combined score based on the updated Inline graphic is chosen as candidate. This process is repeated until Inline graphic nodes are selected for vaccination. Comparing with the adaptive algorithm in [20], our enhanced algorithm exploits the information of some known infected nodes during vaccination and combines both a node’s infecting score and infected score together to evaluate a node’s influence in disease propagation. The pseudo code of the enhanced algorithm is shown in Algorithm 1.

Algorithm 1:

Algorithm 1:

Enhanced Targeted Vaccination

V. Performance Evaluations

In this section, we evaluate the performance of our centrality based algorithm and enhanced algorithm.

A. Simulation Setup

The performance of our algorithms is evaluated based on the trace collected in the high school. The trace is divided into two halves based on the time when it was collected. We firstly use half of the trace as the training data to build the disease propagation graph, and use the other half for performance evaluations. Then we exchange the two halves and run the training and testing again for cross validation.

At the very beginning, we randomly choose a small group of nodes (1%) as the seed set of infection sources to initiate the infection process. The trace is executed based on time units. At each time unit (20 seconds), the SIR model [35] is used to simulate the infection process. In SIR, each node has three states: Inline graphic (Susceptible), Inline graphic (Infected) and Inline graphic (Recovered). For a node which is initially at state Inline graphic, it will be infected with probability Inline graphic (called transmission probability) indoor and Inline graphic (Inline graphic is set to 0.5) outdoor by contacting with an infected node. Once the node is infected, it will move into state Inline graphic. An infected node may recover with a probability Inline graphic (Inline graphic is set to 0.0003) at each time unit and goes back to state Inline graphic. Nodes in state Inline graphic will not get infected again since they have got immunization already.

Although some vaccination strategies have been proposed for certain diseases, e.g., ring vaccination for smallpox and targeted mop-up campaigns for polio, these strategies are based on the knowledge of infected nodes, which is not known in many scenarios. Therefore, instead of comparing with these strategies, we compare our centrality based algorithms and enhanced algorithm (Enhanced) with the community based scheme (AFOCS) [11] and the cluster based scheme (Cluster) [8]. Degree centrality, betweenness centrality and connectivity centrality are used to implement centrality based algorithm (denoted as Degree, Betweenness and Connectivity respectively). Closeness centrality is not used here since it does not work when the graph is disconnected.

Vaccinating Threshold Inline graphic is used to control when the targeted vaccination starts. It is measured as the percentage of infected nodes in the network. This parameter represents the time delay since the infectious disease starts propagating till a vaccine is generated. Once the percentage of infected nodes reaches the threshold Inline graphic, we start to distribute vaccines to the selected nodes.

B. Comparisons of Infection Rates

Figure 7 shows how the infection rate changes when the percentage of vaccinated nodes increases with Inline graphic% and 10% respectively. As shown in the figure, no matter which scheme is used, the number of infected nodes will decrease with more vaccines distributed. Enhanced achieves better performance than other schemes under different Inline graphic. When Inline graphic% and 20% of nodes are vaccinated, the infection rate of Enhanced is about 45%, but the infection rate of other schemes are higher than 50%. For the centrality based algorithms, under different Inline graphic, Degree performs better than Betweenness since disease is easier to transmit from the infected nodes to their neighbors than to those far away. Connectivity performs better than Betweenness and Degree, verifying that connectivity centrality is better to measure node’s importance for disease propagation.

FIGURE 7.

FIGURE 7.

Effect of vaccinating threshold Inline graphic (Inline graphic). (a) Inline graphic%. (b) Inline graphic%.

Comparing Figure 7a with Figure 7b, we can see that AFOCS and Cluster perform worse than Connectivity when Inline graphic%, but better when Inline graphic%. The reason is as follows. If more nodes are infected before vaccination (i.e., Inline graphic is larger), these infected nodes are more likely to be clustered together around the infected nodes. Since AFOCS and Cluster contain the disease by isolating infected communities or clusters, they can perform better when Inline graphic is larger. However, their infection rate is still much higher than Enhanced.

C. Infection Rate vs. Time

Figure 8 shows how the infection rate changes over time with Inline graphic% and 10%, respectively. The spread of the disease can be divided into three phases. At the beginning, the disease is slowly spread from the infection sources. Then, it propagates widely and the infection rate increases quickly. Finally, no more nodes will get infected and the infection rate keeps stable. Comparing with other schemes, Enhanced performs better as the infection rate increases more slowly and is bounded under a much lower level.

FIGURE 8.

FIGURE 8.

Infection rate vs. time (percentage of vaccinated nodes = 40%, Inline graphic). (a) Inline graphic%. (b) Inline graphic%.

D. Effect of Transmission Probability

Figure 9 shows how the disease transmission probability Inline graphic affects the spread of disease. As can be seen, Enhanced outperforms other schemes under different Inline graphic. For centrality based algorithms, Connectivity achieves better performance than Degree and Betweenness. Comparing centrality based algorithms with Cluster, both Connectivity and Degree perform better than Cluster when Inline graphic, but Cluster performs better than Connectivity and Degree when Inline graphic. The reason is as follows. Generally speaking, if the infected nodes are uniformly distributed, centrality based algorithms will perform better; if the infected nodes are clustered together, Cluster will perform better. With a lower Inline graphic, nodes will be infected more randomly, and then their distribution looks more uniform. With a higher Inline graphic, nodes with close connections will be infected more easily and thus the infected nodes are more likely to be clustered together.

FIGURE 9.

FIGURE 9.

Effect of the disease transmission probability Inline graphic (Inline graphic%). (a) Inline graphic. (b) Inline graphic.

E. Effect of Node Willingness

Because of the concerns on the potential side effects, not all nodes are willing to be vaccinated even if they are highly suggested. Thus, we assume each node is willing to be vaccinated with the same probability (called willingness). Figure 10 shows how node willingness affects the disease spread when different schemes are used under different Inline graphic. Comparing to other schemes, Enhanced is much more robust when node willingness varies. This is because the vaccinated nodes are adaptively chosen at each round in Enhanced. Even if a node is not willing to be vaccinated, its influence on the disease propagation is considered when selecting the next vaccinated nodes. However, in other schemes, the vaccinated nodes are calculated beforehand and node willingness is not considered. For AFOCS and Cluster, if certain bridge nodes (the nodes which connect different communities or clusters) are unwilling to be vaccinated, the goal for isolating the infected communities or clusters may fail.

FIGURE 10.

FIGURE 10.

Effect of node willingness (percentage of vaccinated nodes = 20%, Inline graphic). (a) Inline graphic%. (b) Inline graphic%.

F. Performance in Scale-Free Networks

In some social networks, the number of nodes’ neighbors follows power law distribution and the networks are scale free. In order to evaluate the performance of our algorithms in these networks, we generate a synthetic scale-free graph using Barabasi-Albert model [36]. Then we generate contacts in 1400 time steps based on the topology of this graph. At each time step, a node generates contacts with each neighbor with probability Inline graphic, where Inline graphic is set to 0.3 in our simulation. With the synthetic contact trace, we can initiate the infection process and compare our enhanced algorithm with other algorithms. As shown in Figure 11, even in the scale-free network, Enhanced achieves better performance than other schemes. Comparing with AFOCS and cluster, centrality based algorithms perform better because they vaccinate the nodes with more neighbors first and these nodes are more likely to be infected in scale-free networks.

FIGURE 11.

FIGURE 11.

Infection rate vs. time in scale-free network (percentage of vaccinated nodes = 40%, Inline graphic). (a) Inline graphic%. (b) Inline graphic%.

VI. Conclusion

In this paper, we deployed a wireless sensor system in a high school to collect contacts happened between two students when they are within the disease transmission distance. Based on the collected traces, we construct a disease propagation graph to model the disease propagation, and propose a new metric called connectivity centrality to find the important nodes in the constructed graph for disease containment. Different from centrality measures like degree, betweenness or closeness centrality, connectivity centrality considers both a node’s local and global effect to measure its importance in disease propagation. Centrality based algorithms are presented and further enhanced by exploiting the information of the known infected nodes which can be detected during vaccination. We evaluate our algorithms and compare them with other schemes based on the real and synthetic traces. Simulation results show that our algorithms can contain infectious diseases effectively and outperform other schemes under various conditions.

Acknowledgments

We would like to thank the anonymous reviewers for their insightful comments and helpful suggestions.

Biographies

graphic file with name sun-2551199.gif

Xiao Sun (S’16) received the B.S. degree from Tianjin University, Tianjin, in 2008, and the M.E. degree from the Chinese Academy of Sciences, Beijing, in 2011. He is currently pursuing the Ph.D. degree with the Department of Computer Science and Engineering, The Pennsylvania State University, University Park. His research interests include wireless health, pervasive computing, and mobile networking.

graphic file with name lu-2551199.gif

Zongqing Lu (M’14)received the B.E. and M.E. degrees from Southeast University, China, and the Ph.D. degree in computer engineering from Nanyang Technological University, Singapore. He is currently a Post-Doctoral Scholar with the Department of Computer Science and Engineering, The Pennsylvania State University. His research interests include mobile computing, mobile cloud computing, mobile networking, mobile sensing, and social networks.

graphic file with name zhang-2551199.gif

Xiaomei Zhang (S’15)received the B.E. degree from the University of Science and Technology of China, in 2010. She is currently pursuing the Ph.D. degree with the Department of Computer Science and Engineering, The Pennsylvania State University. Her research interests include mobile computing, mobile social networks, data science, and machine learning.

graphic file with name salat-2551199.gif

Marcel Salathé received the Ph.D. degree from ETH Zürich, Switzerland. He is currently an Associate Professor with the Schools of Life Sciences, and Computer and Communication Sciences, École Polytechnique Fédérale de Lausanne, Switzerland. His field of expertise is in digital epidemiology, where he uses sensor data, social media data, and other novel digital data sources to prevent and mitigate the spread of diseases.

graphic file with name cao-2551199.gif

Guohong Cao (F’11)received the B.S. degree in computer science from Xi’an Jiaotong University and the Ph.D. degree in computer science from Ohio State University, in 1999. Since then, he has been with the Department of Computer Science and Engineering, The Pennsylvania State University, where he is currently a Professor. His research interests include wireless networks, mobile systems, security and privacy, vehicular networks, and cyber-physical systems. He was a recipient of the NSF CAREER Award in 2001. He has served on the Editorial Board of the IEEE Transactions on Mobile Computing, the IEEE Transactions on Wireless Communications, and the IEEE Transactions on Vehicular Technology, and has served on the organizing and technical program committees of many conferences, including the TPC Chair/Co-Chair of the IEEE SRDS’2009, MASS’2010, and INFOCOM’2013.

Appendix

Proof of Theorem 1:

In Equation 3, since

Proof of Theorem 1:

if we replace Inline graphic with Inline graphic for simplicity, Equation 3 can be rewritten as

Proof of Theorem 1:

where Inline graphic, Inline graphic,

Proof of Theorem 1:

and

Proof of Theorem 1:

Thus, to prove that the system of linear equations given in Equation 3 has a single unique solution, we only need to prove that Equation 5 has a single unique solution. Let Inline graphic denote a non-zero column vector of Inline graphic real numbers and let Inline graphic denote the transpose of Inline graphic, then we have

graphic file with name M210.gif

Considering that Inline graphic, the above equation can be rewritten as

graphic file with name M212.gif

Since Inline graphic, i.e., Inline graphic, we have

graphic file with name M215.gif

and equality holds only when Inline graphic.

Since Inline graphic is used to denote Inline graphic, Inline graphic and equality cannot hold for every Inline graphic. Thus, for any non-zero column vector Inline graphic, we have

graphic file with name M222.gif

Therefore, symmetric matrix Inline graphic is positive definite and Inline graphic in Equation 5 can be uniquely solved. Since Inline graphic in Equation 4 can also be uniquely solved, we prove that the system of linear equations given in Equation 3 has a single unique solution.

Funding Statement

This work was supported in part by the National Science Foundation (NSF) under grant CNS-1526425 and CNS-1421578.

References

  • [1].WHO. (2010). Pandemic (H1N1) 2009—Update 100. [Online]. Available: http://www.who.int/csr/don/2010_05_14/en/
  • [2].WHO: Ebola Response Roadmap Situation Report 3, World Health Org, Geneva, Switzerland, Sep. 2014. [Google Scholar]
  • [3].WHO. (2003). Influenza. [Online]. Available: http://www.who.int/mediacentre/factsheets/2003/fs211/en/
  • [4].Fu X., Small M., Walker D. M., and Zhang H., “Epidemic dynamics on scale-free networks with piecewise linear infectivity and immunization,” Phys. Rev. E, vol. 77, no. , p. 036113, 2008. [DOI] [PubMed] [Google Scholar]
  • [5].Chen Y., Paul G., Havlin S., Liljeros F., and Stanley H. E., “Finding a better immunization strategy,” Phys. Rev. Lett., vol. 101, no. 5, p. 058701, 2008. [DOI] [PubMed] [Google Scholar]
  • [6].Wang Y., Xiao G., Hu J., Cheng T. H., and Wang L., “Imperfect targeted immunization in scale-free networks,” Phys. A, Statist. Mech. Appl., vol. 388, no. 12, pp. 2535–2546, 2009. [Google Scholar]
  • [7].Pastor-Satorras R. and Vespignani A., “Immunization of complex networks,” Phys. Rev. E, vol. 65, no. 3, p. 036104, 2002. [DOI] [PubMed] [Google Scholar]
  • [8].Zhu Z., Cao G., Zhu S., Ranjan S., and Nucci A., “A social network based patching scheme for worm containment in cellular networks,” in Proc. IEEE INFOCOM, Apr. 2009, pp. 1476–1484. [Google Scholar]
  • [9].Li F., Yang Y., and Wu J., “CPMC: An efficient proximity malware coping scheme in smartphone-based mobile networks,” in Proc. IEEE INFOCOM, Mar. 2010, pp. 1–9. [Google Scholar]
  • [10].Zhu Z. and Cao G., “Worms in cellular networks,” in Encyclopedia of Cryptography and Security. New York, NY, USA: Springer, 2011, pp. 1392–1393. [Google Scholar]
  • [11].Nguyen N. P., Dinh T. N., Tokala S., and Thai M. T., “Overlapping communities in dynamic networks: Their detection and mobile applications,” in Proc. ACM MobiCom, 2011, pp. 85–96. [Google Scholar]
  • [12].Lu Z., Wen Y., and Cao G., “Community detection in weighted networks: Algorithms and applications,” in Proc. IEEE PerCom, Mar. 2013, pp. 179–184. [Google Scholar]
  • [13].Lu Z., Sun X., Wen Y., Cao G., and La Porta T., “Algorithms and applications for community detection in weighted networks,” IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 11, pp. 2916–2926, Nov. 2015. [Google Scholar]
  • [14].Lu Z., Sun X., Wen Y., and Cao G., “Skeleton construction in mobile social networks: Algorithms and applications,” in Proc. 11th Annu. IEEE Int. Conf. Sens., Commun., Netw. (SECON), Jun./Jul. 2014, pp. 477–485. [Google Scholar]
  • [15].Bahl P. and Padmanabhan V. N., “RADAR: An in-building RF-based user location and tracking system,” in Proc. IEEE INFOCOM, Mar. 2000, pp. 775–784. [Google Scholar]
  • [16].Engel J. D., Rhinehart E., Jackson M., and Chiarello L., “2007 guideline for isolation precautions: Preventing transmission of infectious agents in healthcare settings,” Amer. J. Infection Control, vol. 35, no. 10, pp. S65–S164, 2007. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [17].Salathé M., Kazandjieva M., Lee J. W., Levis P., Feldman M. W., and Jones J. H., “A high-resolution human contact network for infectious disease transmission,” Proc. Nat. Acad. Sci. USA, vol. 107, no. 51, pp. 22020–22025, 2010. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [18].Barclay V. C., et al. , “Positive network assortativity of influenza vaccination at a high school: Implications for outbreak risk and herd immunity,” PLoS ONE, vol. 9, no. 2, p. e87042, 2014. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [19].Freeman L. C., “Centrality in social networks conceptual clarification,” Soc. Netw., vol. 1, no. 3, pp. 215–239, 1979. [Google Scholar]
  • [20].Sun X., Lu Z., Zhang X., Salathe M., and Cao G., “Targeted vaccination based on a wireless sensor system,” in Proc. IEEE PerCom, Mar. 2015, pp. 215–220. [Google Scholar]
  • [21].Prakash B. A., Tong H., Valler N., Faloutsos M., and Faloutsos C., “Virus propagation on time-varying networks: Theory and immunization algorithms,” in Machine Learning and Knowledge Discovery in Databases. Berlin, Germany: Springer, 2010, pp. 99–114. [Google Scholar]
  • [22].Cohen R., Havlin S., and ben-Avraham D., “Efficient immunization strategies for computer networks and populations,” Phys. Rev. Lett., vol. 91, no. 24, p. 247901, 2003. [DOI] [PubMed] [Google Scholar]
  • [23].Madar N., Kalisky T., Cohen R., ben-Avraham D., and Havlin S., “Immunization and epidemic dynamics in complex networks,” Eur. Phys. J. B, Condens. Matter Complex Syst., vol. 38, no. 2, pp. 269–276, 2004. [Google Scholar]
  • [24].Hayashi Y., Minoura M., and Matsukubo J. (2003). “Recoverable prevalence in growing scale-free networks and the effective immunization” [Online]. Available: http://arxiv.org/abs/cond-mat/0305549 [DOI] [PubMed] [Google Scholar]
  • [25].Weber T. P. and Stilianakis N. I., “Inactivation of influenza a viruses in the environment and modes of transmission: A critical review,” J. Infection, vol. 57, no. 5, pp. 361–373, 2008. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [26].Robinson M., Stilianakis N. I., and Drossinos Y., “Spatial dynamics of airborne infectious diseases,” J. Theor. Biol., vol. 297, pp. 116–126, Mar. 2012. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [27].Cauchemez S., Valleron A.-J., Boelle P.-Y., Flahault A., and Ferguson N. M., “Estimating the impact of school closure on influenza transmission from sentinel data,” Nature, vol. 452, no. 7188, pp. 750–754, 2008. [DOI] [PubMed] [Google Scholar]
  • [28].Hens N., et al. , “Estimating the impact of school closure on social mixing behaviour and the transmission of close contact infections in eight European countries,” BMC Infectious Diseases, vol. 9, no. 1, p. 187, 2009. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [29].Kazandjieva M., Lee J. W., Salathé M., Feldman M. W., Jones J. H., and Levis P., “Experiences in measuring a human contact network for epidemiology research,” in Proc. 6th Workshop Hot Topics Embedded Netw. Sensors, 2010, Art. no. 7. [Google Scholar]
  • [30].Chen S. L., “A power-efficient adaptive fuzzy resolution control system for wireless body sensor networks,” IEEE Access, vol. 3, pp. 743–751, 2015. [Google Scholar]
  • [31].Wan L., Han G., Shu L., Feng N., Zhu C., and Lloret J., “Distributed parameter estimation for mobile wireless sensor network based on cloud computing in battlefield surveillance system,” IEEE Access, vol. 3, pp. 1729–1739, 2015. [Google Scholar]
  • [32].Alim Al Islam A. B. M., Hossain M. S., Raghunathan V., and Hu Y. C., “Backpacking: Energy-efficient deployment of heterogeneous radios in multi-radio high-data-rate wireless sensor networks,” IEEE Access, vol. 2, pp. 1281–1306, 2014. [Google Scholar]
  • [33].Long J., Dong M., Ota K., and Liu A., “Achieving source location privacy and network lifetime maximization through tree-based diversionary routing in wireless sensor networks,” IEEE Access, vol. 2, pp. 633–651, 2014. [Google Scholar]
  • [34].Chor J. S. Y., et al. , “Willingness of Hong Kong healthcare workers to accept pre-pandemic influenza vaccination at different WHO alert levels: Two questionnaire surveys,” Brit. Med. J., vol. 339, p. b3391, Aug. 2009. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [35].Hethcote H. W., “The mathematics of infectious diseases,” SIAM Rev., vol. 42, no. 4, pp. 599–653, 2000. [Google Scholar]
  • [36].Albert R. and Barabási A.-L., “Statistical mechanics of complex networks,” Rev. Mod. Phys., vol. 74, no. 1, p. 47, 2002. [Google Scholar]

Articles from Ieee Access are provided here courtesy of Institute of Electrical and Electronics Engineers

RESOURCES