A Novel Epidemic Model for the Interference Spread in the Internet of Things †
Abstract
:1. Introduction
- What is the spread pattern followed by the interference information as a network is using LIBA? Given the structure of a network and the underlying routing algorithms, the contamination of a particular node would not necessarily affect each node in the same network. The influence of a particular contaminated node is to be studied and structured in order to know how the spread would work on the network.
- How can this spread pattern be used for predicting the next generation of the underlying IoT network? Knowing the spread pattern may help in understanding the spread dynamics, and hence this enables to specify the governing time-depending dynamic system. Therefore, this would help in predicting the state of the system and, consequently, the spread.
2. Routing Framework
3. Diffusion Set I
- P1:All nodes in set I are at the same distance from the sink. That is,
- P2:I is a singleton, or for each node x in I, there is another node y in I such that x and y share the next neighbor (the next node, say, z of the node n refers to a node such that and . Mathematically,
- P3:For each node x in N, if x shares a next node with some node in I, then . That is,
- ,
- ,
- ,
- and
- .
- :
- All nodes in M are at the distance . That is,
- :
- , or for each node n in M there is another node y in M such that n and y share a next neighbor. That is,
- :
- For each node n in N, if n shares a next neighbor with node y in M, then n is a member of M. That is,
- :
- x shares a next neighbor with a node y in M. That is,
4. Interference Spread Model
- Susceptible nodes: They are the nodes that interfere less or do not interfere in a network, and their total number is denoted by S. Each susceptible node is assumed to have a weight less than the threshold .
- Attacked nodes: They are the highly interfering nodes, but still are able to operate. The total number of attacked nodes in a network is denoted by A. An attacked node is assumed to have a weight less than the threshold but at least to the threshold .
- Replaced nodes: They are the nodes which are replaced because of the high interference. These nodes’ total number is denoted by R. A node is considered to be replaced if its interference is at least the threshold .
4.1. The Proposed Spread Model
4.2. Analytical Description
- The susceptibility rate of each node in the interference group i which is denoted by .
- Infectiousness rate of nodes in the attacked diffusion set i denoted by .
4.3. Model Assumptions
- We assume that there is no node newly joining the network. That is, at any time t, if N is the number of nodes at time , then .
- The death (not caused by interference) and birth rate are assumed to be zero.
- We consider the networks where the death of nodes does not cause new diffusion set formation.
4.4. Stability Analysis
4.5. Disease-Free Equilibrium (DFE)
- Case 1:
- If , then , is the unique solution of Equation (8). In this case, the DFE is .
- Case 2:
- If , then the system of Equation (8) has infinitely many solutions, and thus the system will have infinite number of DFE whose form is where may not all be zero.
4.6. Stability of a Network at DFE
- Case 1:
- If , the DFE is , and the Jacobian of evaluated at is , the zero matrix.Consequently, the matrix is the zero matrix. The eigenvalues of the matrix K are all zero and hence the basic reproductive number is . Since , the DFE is globally stable. This is explained by the fact that at , the network is empty and will remain empty because no new nodes join it.
- Case 2:
- If , then the system of Equation (8) has more than one solutions, and thus the system will have more than one DFE points whose form is , where may not all be zero.
5. Numerical Results
- Static system. It is a system where parameters are considered constants.
- Stochastic system. It is the system where parameters are randomly selected.
- Predictive system. It is a system where parameters are assumed to follow a predictive function.
5.1. Static System
5.2. Stochastic System
5.3. Predictive System
6. Conclusions
Author Contributions
Funding
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Acronyms
IoT | internet of things |
LIBA | least interference beaconing algorithm |
SAR | susceptible–attacked–replaced |
WSN | wireless sensor network |
SIS | susceptible–infected–susceptible |
SIP | susceptible–infected–protected |
SIRS | susceptible–infected–recovered (removed) susceptible |
SIR | susceptible–infected–recovered |
SIR-M | susceptible–infected–recovered with maintenance |
CTP | collection tree protocol |
IP | internet protocol |
IR | infected and recovered |
TOB | TinyOS beaconing |
4IR | fourth industrial revolution |
References
- Schwab, K. The Fourth Industrial Revolution; Currency: Redfern, NSW, Australia, 2017. [Google Scholar]
- Shah, S.H.; Yaqoob, I. A survey: Internet of Things (IOT) technologies, applications and challenges. In Proceedings of the 2016 IEEE Smart Energy Grid Engineering (SEGE), Oshawa, ON, Canada, 21–24 August 2016; pp. 381–385. [Google Scholar]
- Kortuem, G.; Kawsar, F.; Sundramoorthy, V.; Fitton, D. Smart objects as building blocks for the internet of things. IEEE Internet Comput. 2009, 14, 44–51. [Google Scholar] [CrossRef] [Green Version]
- Mauwa, H.; Bagula, A.; Tuyishimire, E.; Ngqondi, T. An optimal spectrum allocation strategy for dynamic spectrum markets. In Proceedings of the 2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Barcelona, Spain, 21–23 October 2019; pp. 1–8. [Google Scholar]
- Mauwa, H.; Bagula, A.; Tuyishimire, E.; Ngqondi, T. Community healthcare mesh network engineering in white space frequencies. In Proceedings of the 2019 ITU Kaleidoscope: ICT for Health: Networks, Standards and Innovation (ITU K), Atlanta, GA, USA, 4–6 December 2019; pp. 1–8. [Google Scholar]
- Tuyishimire, E.; Adiel, I.; Rekhis, S.; Bagula, B.A.; Boudriga, N. Internet of Things in Motion: A Cooperative Data Muling Model under Revisit Constraints. In Proceedings of the Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), 2016 International IEEE Conferences, Toulouse, France, 18–21 July 2016; pp. 1123–1130. [Google Scholar]
- Antoine, B.; Tuyishimire, E.; Olasupo, A. Cyber physical systems (cps) surveillance using an epidemic model. arXiv 2019, arXiv:1912.07479. [Google Scholar]
- Darvishi, H.; Ciuonzo, D.; Eide, E.R.; Rossi, P.S. Sensor-fault detection, isolation and accommodation for digital twins via modular data-driven architecture. IEEE Sens. J. 2020, 21, 4827–4838. [Google Scholar] [CrossRef]
- Santamaria, A.F.; Raimondo, P.; Tropea, M.; De Rango, F.; Aiello, C. An IoT surveillance system based on a decentralised architecture. Sensors 2019, 19, 1469. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Ismail, A.; Bagula, B.A.; Tuyishimire, E. Internet-of-things in motion: A uav coalition model for remote sensing in smart cities. Sensors 2018, 18, 2184. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Ismail, A.; Tuyishimire, E.; Bagula, A. Generating dubins path for fixed wing uavs in search missions. In International Symposium on Ubiquitous Networking; Springer: Berlin/Heidelberg, Germany, 2018; pp. 347–358. [Google Scholar]
- Tuyishimire, E. Cooperative Data Muling Using a Team of Unmanned Aerial Vehicles. Ph.D. Thesis, University of the Western Cape, Cape Town, South Africa, 31 July 2019. [Google Scholar]
- Tuyishimire, E.; Bagula, A.; Rekhis, S.; Boudriga, N. Trajectory Planing for Cooperating Unmanned Aerial Vehicles in the IoT. IoT 2022, 3, 147–168. [Google Scholar] [CrossRef]
- Bagula, A.; Tuyishimire, E.; Wadepoel, J.; Boudriga, N.; Rekhis, S. Internet-of-Things in Motion: A Cooperative Data Muling Model for Public Safety. In Proceedings of the Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), 2016 International IEEE Conferences, Toulouse, France, 18–21 July 2016; pp. 17–24. [Google Scholar]
- Tuyishimire, E.; Bagula, A.; Rekhis, S.; Boudriga, N. Cooperative Data Muling from Ground Sensors to Base Stations Using UAVs. In Proceedings of the 2017 IEEE Symposium on Computers and Communications (ISCC), Heraklion, Greece, 3–6 July 2017. [Google Scholar]
- Snoonian, D. Smart buildings. IEEE Spectr. 2003, 40, 18–23. [Google Scholar] [CrossRef]
- Lund, H.; Østergaard, P.A.; Connolly, D.; Mathiesen, B.V. Smart energy and smart energy systems. Energy 2017, 137, 556–565. [Google Scholar] [CrossRef]
- Haverkort, B.R.; Zimmermann, A. Smart industry: How ICT will change the game! IEEE Internet Comput. 2017, 21, 8–10. [Google Scholar] [CrossRef]
- Baig, M.M.; Gholamhosseini, H. Smart health monitoring systems: An overview of design and modeling. J. Med. Syst. 2013, 37, 1–14. [Google Scholar] [CrossRef]
- Tuyishimire, E.; Bagula, B.A.; Ismail, A. Optimal clustering for efficient data muling in the internet-of-things in motion. In International Symposium on Ubiquitous Networking; Springer: Berlin/Heidelberg, Germany, 2018; pp. 359–371. [Google Scholar]
- Tuyishimire, E.; Bagula, A.; Ismail, A. Clustered data muling in the internet of things in motion. Sensors 2019, 19, 484. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Jibreel, F.; Tuyishimire, E.; Daabo, I.M. An Enhanced Heterogeneous Gateway-Based Energy-Aware Multi-hop Routing Protocol for Wireless Sensor Networks. Preprints 2022, 2022010024. [Google Scholar] [CrossRef]
- Tuyishimire, E. Routing in Mobile Networks. 2013. Available online: https://tinyurl.com/5n7ppvh5 (accessed on 10 February 2022).
- Tuyishimire, E.; Bagula, B.A. A Formal and Efficient Routing Model for Persistent Traffics in the Internet of Things. In Proceedings of the 2020 Conference on Information Communications Technology and Society (ICTAS), Durban, South Africa, 11–12 March 2020; pp. 1–6. [Google Scholar]
- Bagula, A.B.; Djenouri, D.; Karbab, E. On the Relevance of Using Interference and Service Differentiation Routing in the Internet-of-Things. In Internet of Things, Smart Spaces, and Next Generation Networking; Springer: Berlin/Heidelberg, Germany, 2013; pp. 25–35. [Google Scholar]
- Bagula, A.; Djenouri, D.; Karbab, E. Ubiquitous Sensor Network Management: The Least Interference Beaconing Model. In Proceedings of the 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), London, UK, 8–11 September 2013. [Google Scholar]
- Ngqakaza, L.; Bagula, A. Least Path Interference Beaconing Protocol (LIBP): A Frugal Routing Protocol for the Internet-of-Things. In International Conference on Wired/Wireless Internet Communications; Springer: Berlin/Heidelberg, Germany, 2014; pp. 148–161. [Google Scholar]
- Azmi, N.; Kamarudin, L.; Mahmuddin, M.; Zakaria, A.; Shakaff, A.; Khatun, S.; Kamarudin, K.; Morshed, M. Interference issues and mitigation method in WSN 2.4 GHz ISM band: A survey. In Proceedings of the 2014 2nd International Conference on Electronic Design (ICED), Penang, Malaysia, 19–21 August 2014; pp. 403–408. [Google Scholar]
- Denis Ndanguza, J.; de Dieu Niyigena, J.M.T. Modelling the Distribution and Spread of Ebola Disease in West Africa; Nova Science Publishers: Hauppauge, NY, USA, 2019; Chapter 1. [Google Scholar]
- Kermack, W.; McKendrick, A. Contributions to the mathematical theory of epidemics—I. Bull. Math. Biol. 1991, 53, 33–55. [Google Scholar] [PubMed]
- Theodorakopoulos, G.; Le Boudec, J.Y.; Baras, J.S. Selfish response to epidemic propagation. IEEE Trans. Autom. Control 2012, 58, 363–376. [Google Scholar] [CrossRef] [Green Version]
- Ganesh, A.; Massoulié, L.; Towsley, D. The effect of network topology on the spread of epidemics. In Proceedings of the IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Miami, FL, USA, 13–17 March 2005; Volume 2, pp. 1455–1466. [Google Scholar]
- Sotoodeh, H.; Safaei, F.; Sanei, A.; Daei, E. A General Stochastic Information Diffusion Model in Social Networks based on Epidemic Diseases. arXiv 2013, arXiv:1309.7289. [Google Scholar] [CrossRef]
- Zhang, X.; Neglia, G.; Kurose, J.; Towsley, D. Performance modeling of epidemic routing. Comput. Netw. 2007, 51, 2867–2891. [Google Scholar] [CrossRef]
- Tang, S.; Mark, B.L. Analysis of virus spread in wireless sensor networks: An epidemic model. In Proceedings of the 2009 7th International Workshop on Design of Reliable Communication Networks, Washington, DC, USA, 25–28 October 2009; pp. 86–91. [Google Scholar]
- Tuyishimire, E.; Bagula, B.A. Modelling and analysis of interference diffusion in the internet of things: An epidemic model. In Proceedings of the 2020 Conference on Information Communications Technology and Society (ICTAS), Durban, South Africa, 11–12 March 2020; pp. 1–6. [Google Scholar]
- Wei, Z.; Masouros, C.; Liu, F.; Chatzinotas, S.; Ottersten, B. Energy-and cost-efficient physical layer security in the era of IoT: The role of interference. IEEE Commun. Mag. 2020, 58, 81–87. [Google Scholar] [CrossRef]
- Tuyishimire, E.; Bagula, B.A. A novel management model for dynamic sensor networks using diffusion sets. In Proceedings of the 2020 Conference on Information Communications Technology and Society (ICTAS), Durban, South Africa, 11–12 March 2020; pp. 1–6. [Google Scholar]
- Roberts, M.G.; Heesterbeek, J. Characterizing the next-generation matrix and basic reproduction number in ecological epidemiology. J. Math. Biol. 2013, 66, 1045–1064. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Hahn, G. A modified Euler method for dynamic analyses. Int. J. Numer. Methods Eng. 1991, 32, 943–955. [Google Scholar] [CrossRef]
Model Type | Assumed Population/Setting | Domain | Strength | Main Gaps |
---|---|---|---|---|
SIS [32] | Networked computing devices | Computer and Communications Societies | (i) Determination of what makes epidemic either weak or potent and (ii) the network topology is considered | (i) Preliminary investigation, (ii) the quantitative research for the epidemic is not covered and (iii) stochastic and predictive mechanisms are not taken care of. |
SIRS [33] | (i) Social network | Informationdiffusion | Accommodates people differences on an information reaction, (ii) people are grouped based on their similarities and (iii) people may migrate from a group to the other | (i) A group of people is not mathematically defined and specified, (ii) the partition property is not proven/justified, (iii) the predictive model is not covered and (iv) the communication model of people is not considered (anyone can transfer the disease to anyone). |
IR and itsderivatives [34] | Sensorsnetworks | Epidemicrouting | (i) Considered mobile networks and (ii) epidemic models are used in/for routing | (i) The quantitative analysis of the spread is neither studied nor analyzed, (ii) all nodes are assumed to be homogeneous, (iii) any sensor can transfer the disease to any sensor, and (iv) stochastic and predictive mechanisms are not taken care of. |
SIR [30] | People | MathematicalBiology | Model of reference | (i) Represents a very ideal system where recovered and removed states have the same behavior and (ii) stochastic and predictive mechanisms are not taken care of. |
SIR-M [35] | WSN | Sensors | Network flexibility analysis | (i) Any sensor can transfer the disease to any sensor, (ii) the considered disease is avoidable and hence not persistent, (iii) stochastic and predictive mechanisms are not taken care of, and (iv) the structure of the network and communication are not formally considered. |
SIP [31] | A networkof agents | Automaticcontrol | Game theory is employed to consider the interaction of the agents | (i) The network structure is not considered, (ii) the communication model is not exploited, (iii) any agent may transfer the epidemic to any other and (iv) stochastic and predictive mechanisms are not taken care of. |
Parameter | Description | Value |
---|---|---|
N | Total number of nodes of a network | 200 |
m | Number of chosen diffusion sets | 4 |
Initial number of susceptible nodes in the set i | , | |
Initial number of attacked nodes in the set i | , | |
Initial number of replaced nodes in the set i | , | |
Migration rate from susceptible nodes in diffusion set i to attacked nodes in i | , | |
Migration rate from attacked nodes in diffusion set i to replaced nodes in i | , | |
Susceptibility of a node in diffusion set i | , | |
Infectiousness of a node in diffusion set i | , | |
Network impact if a susceptible node in diffusion set i becomes attacked | , |
Parameter | Set 1 | Set 2 |
---|---|---|
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Tuyishimire, E.; Niyigena, J.d.D.; Tubanambazi, F.M.; Rutikanga, J.U.; Gatabazi, P.; Bagula, A.; Niyigaba, E. A Novel Epidemic Model for the Interference Spread in the Internet of Things. Information 2022, 13, 181. https://doi.org/10.3390/info13040181
Tuyishimire E, Niyigena JdD, Tubanambazi FM, Rutikanga JU, Gatabazi P, Bagula A, Niyigaba E. A Novel Epidemic Model for the Interference Spread in the Internet of Things. Information. 2022; 13(4):181. https://doi.org/10.3390/info13040181
Chicago/Turabian StyleTuyishimire, Emmanuel, Jean de Dieu Niyigena, Fidèle Mweruli Tubanambazi, Justin Ushize Rutikanga, Paul Gatabazi, Antoine Bagula, and Emmanuel Niyigaba. 2022. "A Novel Epidemic Model for the Interference Spread in the Internet of Things" Information 13, no. 4: 181. https://doi.org/10.3390/info13040181
APA StyleTuyishimire, E., Niyigena, J. d. D., Tubanambazi, F. M., Rutikanga, J. U., Gatabazi, P., Bagula, A., & Niyigaba, E. (2022). A Novel Epidemic Model for the Interference Spread in the Internet of Things. Information, 13(4), 181. https://doi.org/10.3390/info13040181