Next Article in Journal
Multicriteria Approach for Design Optimization of Lightweight Piezoelectric Energy Harvesters Subjected to Stress Constraints
Previous Article in Journal
Deep Learning with Word Embedding Improves Kazakh Named-Entity Recognition
Previous Article in Special Issue
Autoethnography on Researcher Profile Cultivation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Epidemic Model for the Interference Spread in the Internet of Things †

by
Emmanuel Tuyishimire
1,*,
Jean de Dieu Niyigena
2,
Fidèle Mweruli Tubanambazi
3,
Justin Ushize Rutikanga
4,
Paul Gatabazi
5,6,
Antoine Bagula
7 and
Emmanuel Niyigaba
8
1
Department of Knowledge and Information Stewardship, University of Cape Town, Cape Town 7701, South Africa
2
Department of Mathematics, College of Science and Technology, University of Rwanda, Kigali 00100, Rwanda
3
Department of Sciences with Education, Kibogora Polytechnic, Nyamasheke 50, Rwanda
4
College of Agriculture, Animal Science and Veterinary Medicine, University of Rwanda, Nyagatare 57, Rwanda
5
Department Mathematics and Applied Mathematics, University of Johannesburg, Johannesburg 524, South Africa
6
Department of Applied Statistics, University of Rwanda, Huye 124, Rwanda
7
Department of Computer Science, University of the Western Cape, Cape Town 7735, South Africa
8
Department of Science, Integrated Polytechnic Regional Centre, Musanze 226, Rwanda
*
Author to whom correspondence should be addressed.
This paper is an extended version of our paper published in 2020 Conference on Information Communications Technology and Society (ICTAS), Durban, South Africa, 11–12 March 2020.
Information 2022, 13(4), 181; https://doi.org/10.3390/info13040181
Submission received: 10 February 2022 / Revised: 8 March 2022 / Accepted: 10 March 2022 / Published: 2 April 2022
(This article belongs to the Special Issue Information Spreading on Networks)

Abstract

:
Due to the multi-technology advancements, internet of things (IoT) applications are in high demand to create smarter environments. Smart objects communicate by exchanging many messages, and this creates interference on receivers. Collection tree algorithms are applied to only reduce the nodes/paths’ interference but cannot fully handle the interference across the underlying IoT. This paper models and analyzes the interference spread in the IoT setting, where the collection tree routing algorithm is adopted. Node interference is treated as a real-life contamination of a disease, where individuals can migrate across compartments such as susceptible, attacked and replaced. The assumed typical collection tree routing model is the least interference beaconing algorithm (LIBA), and the dynamics of the interference spread is studied. The underlying network’s nodes are partitioned into groups of nodes which can affect each other and based on the partition property, the susceptible–attacked–replaced (SAR) model is proposed. To analyze the model, the system stability is studied, and the compartmental based trends are experimented in static, stochastic and predictive systems. The results shows that the dynamics of the system are dependent groups and all have points of convergence for static, stochastic and predictive systems.

1. Introduction

The world has entered in the era where intelligent machines have changed the production chain: the fourth industrial revolution (4IR) [1]. We are, additionally, in the era where the COVID-19 pandemic has geared the use of more advanced ways of digital communication. This has created high demand for the multi-technology, multi-protocol and multi-platform infrastructure, where IoT technologies play crucial roles.
It was discussed in [2] that the IoT is successful due to the fact that objects can now be manipulated daily to be outfitted with sensing, identification and positioning devices. The objects may be endowed with an internet protocol (IP) address to become smart objects, capable of communicating with not only other smart objects, but also with humans. In this case, it is expected to reach areas that we could not have reached without the advances made in sensing, identification and positioning technologies. While being globally discoverable and queried, these smart objects can similarly discover and interact with external entities by querying humans, computers and other smart objects [3].
The smart objects can also obtain intelligence by making or enabling context-related decisions by taking advantage of the available communication channels (see [4,5], for example) to provide information about themselves, and can access information that was aggregated by other smart objects [6]. The application domain for this technology may be found in many ways, including cyberphysical security [7], digital twins [8], surveillance [9], smart cities [10,11], smart transportation [12,13,14,15], smart buildings [16], smart energy [17], smart industry [18] and smart health [19]. These applications’ enabling technologies include sensor, nano-electronics, wireless sensor network (WSN) identification, localization, storage and cloud. However, IoT systems and applications are bound by security, privacy, safety, integrity, trust, dependability, transparency, anonymity and ethics constraints.
On the other hand, there has been several communication models in the IoT (see [20,21,22,23] for example) and in particular, the LIBA [24,25,26,27] has been proposed with the least interference beaconing paradigm as a frugal and lightweight IoT communication protocol. Here, the routing is done by a beaconing process that, as a result, produces a routing tree of the underlying network, which is rooted from the sink of the network. The routing is done by periodically sending beaconing messages in a network, and nodes communicate to form the tree routed at the sink. During the process, the path selection is done in such a way that the interference on nodes is minimized. The periodic repetition of the routing process enables nodes to change their paths to the sink and hence this is considered a collection tree algorithm and has been proven to be efficient in communication energy saving.
It is clear from [28] that in a real IoT deployment scenario, the very high interference values on nodes may be identified as an attack on the underlying IoT aiming at defeating the performance of the whole sensor network engineering mechanism. This could be done by influencing the routing processes and sending messages with wrong information about the nodes’ interference; this would lead to an incorrect routing tree. In this case, some nodes of the network would be overused while alternative ones remain underused. This would be considered an attack which may target, for example, the ventilation system of a power plant by messing up the weight of the mote that controls the temperature of the plant and thus congest that node by spamming it with traffic from other nodes. This might disable any communication between that node and the actuator that kicks off the air conditioning upon temperature changes. Communication security measures may be considered to mitigate this issue. However, there could be a scenario where, even if all communications are secured and a collection tree routing is correctly used, at a certain time, a node would have been sending and receiving a lot of messages to the point where it can no longer operate properly. Such nodes may be understood as nodes which have been subjected to a high level of interference, and this would inevitably affect other nodes in the same WSN.
Depending on the level of interference for each node of an IoT, nodes can clearly be grouped in compartments. The increase in interference of a node can lead to its migration from one compartment to another. This can, therefore, be compared with a normal human epidemic contamination, where an individual can move, for example, from a susceptible compartment to an attacked/infected compartment or to a replaced/diagnosed compartment, or even from an infected to diagnosed compartment. This kind of epidemic model can be achieved, in the case of WSN, by considering nodes with low interference levels as nodes in the susceptible compartment, being a sign of the less used nodes (nodes which have sent few messages and can still send many more); nodes which have been averagely used may be put in the attacked compartment; and nodes which have been much used may be assumed to have been replaced by fresh ones and thus are considered to belong in the replaced compartment. Epidemic models which are used to study the interaction between individuals when a disease enters a given population (see the Ebola spread model in [29] or the susceptible–infected–recovered (SIR) in [30], for example) can therefore be used to model the interference spread in interference-aware routing algorithms, such as the LIBA.
Epidemic models in WSN have been the subject of various research. The susceptible–infected–protected (SIP) model was proposed in [31] to find an equilibrium point reached by the network, when its nodes increase (or respectively decrease) their security or when the infection in the network is higher (or respectively lower). In [32], the authors proposed a susceptible–infected–susceptible (SIS) model to study how the topology affects the spread of an epidemic in a WSN. In [33], the authors used the susceptible–infected–recovered (removed) susceptible (SIRS) model to analyze the stochastic information diffusion in social networks. In [34], the infected and recovered (IR) model and its derivatives were proposed as the epidemic routing model, and this was used to study the performance of various epidemic style routing schemes. The authors in [35] used the susceptible–infected–recovered with maintenance (SIR-M) model to characterize the dynamics of virus spread from a single node to the entire network. The mechanism of the SIR-M model contributes to a decrease in the number of infected nodes. We compare these epidemic models in Table 1 and highlight the main gaps to be addressed in this paper.
On the other hand, previous works have shown that minimizing the path interference on nodes was necessary to improve traffic engineering in connection-oriented networks. When applied in the context of the IoT [24,25], a similar principle revealed that applying the least interference beaconing paradigm to wireless sensor networks translated into energy savings and better performance for LIBA, compared to the collection tree protocol (CTP) [24,25,26,27] and TinyOS beaconing (TOB) protocol [24,25]. However, for the purpose of efficiency and accuracy, it is relevant, useful and critical to revisit the LIBA paradigm, using a sound mathematical framework to find responses to some unanswered questions and analyze the stability of the LIBA for potential avenues for improvement. Two of the unanswered questions concerning the stability of LIBA are as follows:
  • What is the spread pattern followed by the interference information as a network is using LIBA? Given the structure of a network and the underlying routing algorithms, the contamination of a particular node would not necessarily affect each node in the same network. The influence of a particular contaminated node is to be studied and structured in order to know how the spread would work on the network.
  • How can this spread pattern be used for predicting the next generation of the underlying IoT network? Knowing the spread pattern may help in understanding the spread dynamics, and hence this enables to specify the governing time-depending dynamic system. Therefore, this would help in predicting the state of the system and, consequently, the spread.
Using a mapping between path interference and epidemic disease contamination levels, we propose and analyze the performance of a novel compartmental network framework that minimizes the path interference while controlling the spread of the interference in a sensor network by partitioning the network into epidemic compartments (susceptible ( S ), attacked ( A ) and replaced ( R )). Compartments are deduced from special sets called “diffusion sets” forming disjoint subsets of nodes with each of them having its own compartmental model. The numerical results deduced from the analytical spread model provide relevant answers to the two questions raised above both in static, stochastic and predictive scenarios.
This paper extends the work proposed in [24] and complement the research conducted in [36] to answer the questions raised above, while mitigating the issue arisen in Table 1. The work in [24] proposed the SAR, where the network partition model is exploited to model the interference spread. Here, the partition model is only defined and explained, and the formal justification (proof) that the provided model indeed partitions the network is not provided. Furthermore, the spread of the interference is assumed to be done using constant rates. This is a significant assumption, as this would be true in a very short period of time and does not apply to all WSN. The proposed model in this paper provides formal justification that the defined partition model indeed verifies the partition property of the assumed network. To achieve this, the partition model proposed in [36] is adopted, where the definition and proofs are modified to suit the assumed network in this paper. The SAR model proposed in [24] is further extended by assuming a more realistic situation, where transmission rates are assumed to be stochastic and depend on a prediction done based on pre-collected data. The interference management measure was discussed and compared in [37]. However all of them are only applicable on the physical layer, and the article invites research on theoretical approaches to complement these studied models.
To the best of our knowledge, this is the first attempt to address the interference issue in the network layer, where we map the network operations and structure with the spread of a disease (interference) on the network. It is, here, expected that the presented model will play a crucial role in risk management in communication networks.
The remainder of this paper is organized as follows. The considered collection tree routing model is introduced in Section 2. The network partition model is described in Section 3. The proposed epidemic model is proposed and analyzed in Section 4, and Section 5 covers the experimental results. This paper is finally concluded in Section 6.

2. Routing Framework

In this section, the collection tree routing model, which is LIBA, is described using Figure 1. We consider a portion of an active network (subnetwork) and explain the basics of the considered routing scheme. The aim of the routing algorithm is to construct a spanning tree routed from the sink, where each node uses the least interfering path to the sink. The interference is measured, for each node, and depends on how many times a node is chosen to be a parent (a node to forward messages in the direction to the sink). It is assumed that the routing is periodically performed to update paths to the sink and that each time this is done, a new weight distribution on the nodes is updated to change the current interference status.
Figure 1 illustrates the basic steps of a typical collection tree protocols which is LIBA. We assume a certain number of routing rounds and hence assume an initially node-weighted graph. Figure 1a shows the structure of the considered current subnetwork. It reveals that the considered node weighting is described as in the dictionary D 0 = {s:2, a:0, b:1, c:0}. It is shown in Figure 1b that the sink s (this is the uniquely assumed sink) starts the beaconing process by broadcasting a beaconing message. As shown in Figure 1c, each node receiving the beaconing message (initiated from the sink) chooses the parent (sender) and relays the beacon in the network.The figure also shows that the acknowledged node updates its weight to the number of the acknowledgment messages received. This is why the sink’ s weight remains at 2. Figure 1d shows that node c chooses and acknowledges node a because it has the least weight (level of interference). This updates the weight of node a, whereas nodes b and c update their weights to zero, as they have not received any acknowledgment message. This means that there are no parents to any node in the resulting routing tree. The new weighting distribution then becomes D 1 = {s:2, a:1, b:0, c:0}, and the overall weight distribution is therefore D T = {s:4, a:1, b:1, c:0}.
This scheme is periodically repeated for nodes to make new choices and hence update their paths leading to the sink.
For as long as the algorithm keeps on being repeated, nodes increase their weights (levels of interference). Here, it is important to note that the increase in interference of one node does not affect the increase in interference for each node of the network. Rather, it causes the increase in interference of a selected group of nodes. For instance, it is clear from Figure 1 that the high level of interference of node b would influence the interference choice of node c, which would prefer node a of a lower weight and, consequently, node a would increase its weight. If the weight of node a becomes higher than that of b, for the same reason, node b would increase its weight. This means that the increase in weight/interference on node b affects the increase in weight on node a and vice versa, and no other node in the network is affected by the level of interference of any of the two nodes.
Hence, the interference spread is group dependent. We call these group of nodes diffusion sets. In the next section, we study the diffusion sets structure, and this will enable us to study the interference spread across the underlying network.

3. Diffusion Set I

Having seen that the spread of interference depends on some subsets structure of the network, we mathematically study a new structure of nodes in a network, based on how nodes can spread interference to each other. We refer to the fact that an increase in interference level (weight) of a node may cause other selected nodes to increase their weights, and in this case we say that interference is transferred from one node to another.
So, modeling the interference spread in a WSN which uses collection tree algorithms, such as LIBA, depends on the interference spread within each diffusion set of the network. The spread of interference does not behave in the same way for all diffusion sets, and this is why the global spread modeling has to depend on modeling the spread on each diffusion set of the network.
However, the quantification of nodes would be difficult in the case where a node can belong in more than one diffusion sets. This is why, in this section, we study the structure of the diffusion sets and their properties leading to the network partition, before conducting any quantitative modeling. The claimed partition property will give us confidence that, once the quantitative modeling is done on the level of the diffusion set, no node in the network is counted more than once.
We start by formally defining the diffusion set and prove all lemmas and theorems leading to the partition property. Here, we depend on the definition of a partition stating that a set of subsets P is a partition of a set S if, and only if, all subsets in P are mutually exclusive and their union equals S. We aim to prove that the set of diffusion sets I is a partition of the set of nodes of the underlying network.
Definition 1.
Consider G ( L , N , W , s ) to be an undirected and node-weighted network where L stands for the set of its links, N is the set of its nodes, W is the set of the nodes weights and s is its sink. Define on N a distance function d : N N such that d ( n ) is the least number of links between node n and the sink s of the graph G.
A diffusion set I is a non empty subset of N satisfying the following properties:
  • P1:All nodes in set I are at the same distance from the sink. That is,
    x , y I , d ( x ) = d ( y )
  • P2:I is a singleton, or for each node x in I, there is another node y in I such that x and y share the next neighbor (the next node, say, z of the node n refers to a node such that ( z , n ) L and d ( z ) = d ( n ) + 1 . Mathematically,
    # I = 1 ( x I , y I { x } , c N ,
    d ( c ) = d ( x ) + 1 ( c , x ) L .
  • P3:For each node x in N, if x shares a next node with some node in I, then x I . That is,
    x N , y I , c N ,
    d ( x ) = d ( y ) = d ( c ) 1 ( c , x ) , ( c , y ) L x I .
To define the diffusion set, we adopted the general definition provided in [38] by using a special distance function.
Figure 2 represents an example which shows the graph whose nodes are partitioned in diffusion sets.
From Figure 2, nodes are grouped in diffusion sets as follows:
  • I 1 = { a } ,
  • I 2 = { b , c , d } ,
  • I 3 = { e } ,
  • I 4 = { f , g } and
  • I 5 = { h } .
It is clear that the union of all diffusion sets consists of all nodes of the graph, and all diffusion sets of the graph are mutually exclusive.
Thus, the set { I 1 , I 2 , I 3 , I 4 , I 5 } of all diffusion sets forms a partition of the set N. The figure also shows that any two nodes in the same diffusion set do not need to have the same next neighbor. For instance, nodes b and d are in the same diffusion set I 2 but do not have the same next neighbor: the next neighbor of b is f, whereas the next neighbor of d is g.
Furthermore, the nodes e and g (or f) share the same next neighbor h, but they are not in the same diffusion set because they are not at the same distance from the sink a. In fact, d ( f ) = d ( g ) = 2 but d ( e ) = 1 and clearly d ( f ) = d ( g ) d ( e ) .
Lemma 1.
Consider the set I of all diffusion sets of a graph G ( L , N , W , s ) (see Definition 1). Each diffusion set I of G is maximal in I . That is,
I 1 , I 2 I , I 1 I 2 I 1 = I 2
Proof. 
Let I 1 and I 2 be two diffusion sets such that I 1 I 2 .
We want to show that I 1 = I 2 . Since I 1 I 2 , it is sufficient to show that I 2 I 1 = because I 2 = I 1 ( I 2 I 1 ) .
We proceed by contradiction.
Let x I 2 I 1 . This means that x I 2 and x I 1 . Since x N , property P 3 in Definition 1 is valid. That is,
y I 1 , c N
d ( x ) = d ( y ) = d ( c ) 1 ( c , x ) , ( c , y ) L x I 1 .
Taking the contrapositive and using the fact that x I 1 ,
y I 1 , c N , d ( x ) d ( c ) 1 d ( y ) d ( c ) 1 ( c , x ) , ( c , y ) L
On the other hand I 2 I 1 N implies that x I 2 I 1 ,
x I 1 , y I 1 c N | d ( c ) = d ( x ) + 1 ( x , c ) L ( y , c ) L
So, there is no node y I 1 which shares the next node with the node x. It follows that no node in I 1 can be in the same diffusion set as x. This contradicts the fact that nodes in I 1 and x are in the same diffusion set I 2 . □
In two steps (Theorems 1 and 2), we prove that the set of diffusion sets partitions the set of all nodes of the network G ( L , N , W , s ) .
Theorem 1.
Given the graph G ( L , N , W , s ) as described in Definition 1, the set I of all diffusion sets of G are pairwise disjoint. That is,
I 1 , I 2 I , I 1 I 2 I 1 = I 2 .
Proof. 
Let I 1 and I 2 be any two diffusion sets. We want to show that
I 1 I 2 I 1 = I 2 .
Let x I 1 I 2 .
If both I 1 and I 2 are singletons, then we are done.
If I 1 is a singleton and I 2 is not, I 1 I 2 implies that I 1 I 2 and hence I 1 = I 2 because I 1 and I 2 are maximal in I ( Lemma 1).
Consider I 1 and I 2 to be two diffusion sets of size greater than 1, and let us proceed by contradiction.
Let I 1 I 2 and suppose y I 1 I 2 ( I 1 I 2 and if not I 1 I 2 which contradicts Lemma 1). It follows that there is no node belonging to I 2 , sharing its next neighbor with the node y.
Since I 1 I 2 I 2 , there is no node in I 1 I 2 sharing the next hop with the node y.
Hence, by property P 2 in Definition 1 (definition of diffusion set), there is no node in I 1 I 2 belonging in the same diffusion set as the node y.
This implies that the nodes x and y are not in the same diffusion set.
On the other hand, x I 1 I 2 implies that x I 1 , and y I 1 I 2 implies that y I 1 ; this contradicts the fact that the nodes x and y do not belong in the same diffusion set. Hence I 1 = I 2 . □
Theorem 2.
Let I be the set of all diffusion sets of the graph G ( L , N , W , s ) (see Definition 1). For each node x in N, there exists a diffusion set I in I containing x. That is,
x N , I I , x I .
Proof. 
For x N , we want to find a diffusion set which contains x. Define a subset M of N satisfying the following characteristics:
C 1
All nodes in M are at the distance d ( x ) . That is,
y M , d ( y ) = d ( x )
C 2 : 
M = { x } , or for each node n in M there is another node y in M such that n and y share a next neighbor. That is,
M = { x } ( n M , y M { n } ,
c N , d ( c ) = d ( n ) + 1 ( n , c ) , ( y , c ) L .
C 3 : 
For each node n in N, if n shares a next neighbor with node y in M, then n is a member of M. That is,
n N , y M , c N ,
d ( n ) = d ( y ) = d ( c ) 1 ( n , c ) , ( y , c ) L n M .
C 4 : 
x shares a next neighbor with a node y in M. That is,
y M , c N ,
d ( x ) = d ( y ) = d ( c ) 1 c ( n , c ) , ( y , c ) L .
C l a i m : x M I .
Since x N and C 4 is valid, C 3 shows that x M (by setting n = x ).
On the other hand C 1 P 1 , C 2 P 2 and C 3 P 3 (see Definition 1), and hence M I . Thus
x N , M I , x M .
Corollary 1.
The set I of all diffusion sets of the network G ( L , N , W , s ) (see Definition 1) partitions N.
Proof. 
By definition in Definition 1, I consists of nonempty elements. In addition, Theorem 1 shows that I consists of disjoints elements. It is then sufficient to show that the union of the sets in I is equal to N. That is
I I I = N
Let x I I I I x I x I x since I x N , x N and thus, by Definition 1, I I , I N . Hence,
I I I N
On the other hand, from Theorem 2 it follows that
N I I I
Hence, from Equations (1) and (2), the result follows. □
Note that since I is a partition of the set N of all nodes of a network, we can say that
I I # I = # N .
This helps us make a quantitative study involving diffusion sets.

4. Interference Spread Model

Based on usual mechanisms of epidemic disease spread, we propose a model for interference spread in a network when LIBA is the typically used collection tree protocol. In this work, the nodes are considered to be distributed in three epidemic compartments and we need two thresholds T 1 and T 2 to specify susceptible, attacked or replaced nodes, as shown by Figure 3.
Figure 3 enables us to define the considered states as follows:
  • Susceptible nodes: They are the nodes that interfere less or do not interfere in a network, and their total number is denoted by S. Each susceptible node is assumed to have a weight less than the threshold T 1 .
  • Attacked nodes: They are the highly interfering nodes, but still are able to operate. The total number of attacked nodes in a network is denoted by A. An attacked node is assumed to have a weight less than the threshold T 2 but at least to the threshold T 1 .
  • Replaced nodes: They are the nodes which are replaced because of the high interference. These nodes’ total number is denoted by R. A node is considered to be replaced if its interference is at least the threshold T 2 .
To show the interference spread mechanisms, We use Figure 4 to picture the cases considered, and this enables us to clarify the underlying model assumptions.
As depicted from Figure 4, the assumed network is partitioned in diffusion sets G1, G2, G3 and singletons. Node 4 is attacked, and this attack can only affect Node 4. Node 3 is viewed as a node which has been replaced due to a very high level of interference. Nodes in the same diffusion set as Nodes 3 and 4, together with the remaining nodes in the network, are assumed to be susceptible.
We assume that replaced nodes do not become infected or susceptible again. The reason is that nodes might be replaced with high quality and they would be attacked once the majority of the original nodes in the network have been replaced. In this case, all replaced nodes are updated to susceptible, and other compartments are assumed to be empty; then the dynamic model is applied again.

4.1. The Proposed Spread Model

Nodes may be distributed in diffusion sets (see the algorithm in [38]), where nodes in the same diffusion set are assumed to be infectiously similar to each other and those in different diffusion sets behave differently. Each diffusion set i contains a set of susceptible nodes whose number is denoted by S i , the set of attacked nodes whose size is A i and finally the set of replaced nodes whose size is R i . A diffusion set i in which A i 0 or R i 0 is referred to as the attacked set, that is, the diffusion set which has contained at least one attached or replaced node. The following figure shows the considered compartmental migration rates in any arbitrary diffusion set, say, i.
As shown in Figure 5, Susceptible nodes in the diffusion set i may be attacked at the rate a i , whereas attacked nodes from i are replaced at the rate c i .
Susceptible nodes in the diffusion set i may quickly increase their interference levels so as to be directly replaced without being considered as attacked. On the other hand, replaced nodes my cause some of the susceptible or attacked nodes to leave the network because of the destruction of links. We consider b i to be the rate with which susceptible nodes in i are replaced.

4.2. Analytical Description

Taking account to all cases discussed in Section 4.1, we obtain the following difference equation.
S i = a i S i b i S i A i = a i S i c i A i R i = b i S i + c i A i
Note that S i , A i and R i are functions of time t for each diffusion set i. The negative rates in the model represent a decrease, whereas the positive ones represent an increase.
The parameter a i stands for the transmission rate between susceptible and attacked nodes. This parameter depends directly on the number of susceptible nodes S i and the attacked ones A i . This is why it makes sense to say that a i relates two other measures:
  • The susceptibility rate of each node in the interference group i which is denoted by β i .
  • Infectiousness rate of nodes in the attacked diffusion set i denoted by γ i .
On the other hand, the structure of a diffusion set clearly influences the attack ability since different diffusion sets have not the same infection effects. We use the parameter η i for the measure of the structure impact when a node is attacked.
So to compute a i , we use the formula
a i = β i γ i η i A i N
where A i N denotes the fraction of attacked nodes in diffusion set i.
Using the Equations (3) and (4), we obtain the following equation.
S i = β i γ i η i A i N S i b i S i A i = β i γ i η i A i N S i c i A i R i = b i S i + c i A i

4.3. Model Assumptions

  • We assume that there is no node newly joining the network. That is, at any time t, if N is the number of nodes at time t = 0 , then N = i S i ( t ) + i A i ( t ) + i R i ( t ) .
  • The death (not caused by interference) and birth rate are assumed to be zero.
  • We consider the networks where the death of nodes does not cause new diffusion set formation.

4.4. Stability Analysis

In this section, we study the stability of the system at the disease-free equilibrium points. We first compute the disease-free equilibrium of the system which is used to computer the basic reproduction number R 0 , which is the number used for studying the stability.

4.5. Disease-Free Equilibrium (DFE)

Consider Equation (5) and assume the sets of the network diffusion sets in I whose size is m. Since the system is not affected by the number of replaced nodes R, the equation of R is omitted. We present DFE as E = ( e 1 , e 2 , , e 2 m ) = ( S i , A i = 0 ) , i = 1 , 2 , , m , which verifies the equations
i I , β i γ i η i A i N S i b i S i = 0 .
Since A i = 0 , Equation (6) is reduced to
i I , b i S i = 0 .
Since the system of Equation (7) is linear, it can be written in matrix form
S A = 0
where, S = ( S 1 S 2 S m ) and
A = b 1 0 0 0 b 2 0 0 0 b m
Case 1:
If d e t A 0 , then S i = 0 , i = 1 , 2 , m is the unique solution of Equation (8). In this case, the DFE is E 0 = ( S i * = 0 , A i * = 0 ) .
Case 2:
If d e t A = 0 , then the system of Equation (8) has infinitely many solutions, and thus the system will have infinite number of DFE whose form is E = ( S i * , A i * = 0 ) where S i * may not all be zero.
Note that according to linear algebra, d e t ( A ) = 0 if, and only if, the rows or columns of A are linearly dependent. This can help us to study the dependency of diffusion sets in terms of interference transmission.

4.6. Stability of a Network at DFE

We study stability using the basic reproduction number R 0 . We calculate R 0 using the next-generation matrix approach as described in [39].
After removing the equations for R i , let us decompose the remaining systems of Equation (7) into two subsystems as follows:
F i ( S i , A i ) = 0 β i γ i η i A i N S i
V i ( S i , A i ) = β i γ i η i A i N S i + b i S i c i A i
The next-generation matrix is K = F V 1 , where F and V are the Jacobian matrices of F and V , respectively, evaluated at the DFE.
Case 1:
If d e t A 0 , the DFE is E 0 = ( S i * = 0 , A i * = 0 ) , and the Jacobian of F evaluated at E 0 is F i j ( E 0 ) = F i e j ( E 0 ) , the zero matrix.
Consequently, the matrix K = F V 1 is the zero matrix. The eigenvalues of the matrix K are all zero and hence the basic reproductive number is R 0 = 0 . Since R 0 < 1 , the DFE E 0 is globally stable. This is explained by the fact that at E 0 , the network is empty and will remain empty because no new nodes join it.
Case 2:
If d e t A = 0 , then the system of Equation (8) has more than one solutions, and thus the system will have more than one DFE points whose form is E = ( S i * , A i * = 0 ) , where S i * may not all be zero.
F = β 1 γ 1 η 1 S 1 * N 0 0 0 β 2 γ 2 η 2 S 2 * N 0 0 0 β m γ m η m S m * N
= δ i j β i γ i η i S j * N i j
where δ i j is the Kronecker delta. That is
δ i j = 1 if i = j 0 otherwise
V = c 1 0 0 0 c 2 0 0 0 c m
= [ δ i j c i ] i j
K = F V 1 = β i γ i η i S j * N c i δ i j i j
Since K is a diagonal matrix, the basic reproduction number is
R 0 = T r a c e ( K ) = i = 1 m β i γ i η i S i * N c i .

5. Numerical Results

In this section, numerical results are computed using three different settings.
  • Static system. It is a system where parameters are considered constants.
  • Stochastic system. It is the system where parameters are randomly selected.
  • Predictive system. It is a system where parameters are assumed to follow a predictive function.
We use the subnetworks in Figure 6 to explain the network scenarios where the three systems may be applicable. A focus is put on the diffusion sets I 1 , I 2 and I 3 as shown in Figure 6a–c, respectively. We assume all nodes in the same diffusion set have exactly the same initial weights. This assumption is possible in many ways: for instance, at the first run of the LIBA, where nodes have not yet chosen their parent and their weights are all zero.
As it is shown in Figure 6a, all nodes in diffusion set I 1 are connected to only one next node, which has to choose any of the nodes in I 1 as the parent. The nodes in the diffusion set have the same weights and hence they have an equal chance to be chosen to be parent. So for each run of LIBA, exactly one node of the diffusion set is increased by one. Furthermore, an already chosen node increases the weight and will have a chance to be chosen again, once each node has been chosen and has incremented its weight by 1 to obtain the same weights for all nodes in the diffusion set. So, given the number of runs, one can compute the number of nodes which have achieved a certain level of interference. The average of such a number of nodes will determine how many nodes are expected to achieve a certain interference threshold and, hence, how many nodes would change a compartment. However, Figure 6b shows a case where nodes do not have the same chance to be chosen as the parent. There is clearly a node in the diffusion set I 2 which may be chosen by two next nodes. This makes it difficult to calculate how many nodes will have achieved a certain level of interference, given the number of runs. We say that such a number is random. However, the scenario presented in Figure 6c shows a more randomized scenario, where it is harder to make such a prediction. In this case, we assume that the rates of the compartment transmission are random (stochastic) in the case of the network in Figure 6c, but in the case of Figure 6b, the randomness appears biased. This is why, in the case of Figure 6b, more investigations have to be conducted by recording various rates, using some predictive techniques to approximate such rates.

5.1. Static System

Table 2 shows the initial conditions of the considered network and also the constant values of the considered parameters. It enabled us to use the Euler method (see [40]) to numerically solve Equation (3). Python packages were used in simulation (numerical computation and plotting of related curves) where the solution was computed with 5999 iterations.
Figure 7 represents the trend of compartment sizes when related parameter/rates are assumed to be constant. Figure 7a shows that the number of susceptible nodes, in both diffusion sets, decreases quickly toward their convergence to zero, after 500 days.
Figure 7b shows that attacked nodes for both diffusion sets first increase toward a single maximum, then decrease toward the convergence to zero after 600 days.
Figure 7c reveals that the number of replaced nodes increases and converges at the total number of nodes in each diffusion set (100 nodes), and this is highlighted in Figure 7d.
It is important to note that the difference in variation rates reflects the parameter settings shown in Table 2. This also justifies the reason why the number of attacked nodes do not reach the same maximum.

5.2. Stochastic System

We consider a system where the parameters are randomly selected. The selection is done in a normally distributed sample (with sample size 5999) of values shown in Table 3. We use the representation, such as b 1 N ( 0.04 , 0.2 ) , to mean that the parameter b 1 for the first set is selected from a normal distribution whose mean is 0.04 and the standard deviation is 0.2 .
Figure 8 shows the same trend as Figure 7, except the fact that the curves in Figure 8 are not smooth, and this causes the system not to have unique maximum of attacked nodes (for each diffusion set), unlike the case of static system (Figure 7).

5.3. Predictive System

In this experiment, parameters are considered to be functions of time. We assume that they may be predicted by a Gaussian function. The considered distribution for each parameter is the same as in a stochastic system. However, in this experiment, instead of randomly selecting values of parameters, the order in which the sample values are distributed is respected.
Figure 9 shows that the predictive system differs from the stochastic system, only with respect to the fact that curves corresponding to diffusion set may cross each other.

6. Conclusions

In this paper, the diffusion set is a new structure of nodes in a network. The properties of diffusion sets leading to the partition property was proven and hence justified the model on the diffusion set model. This enabled quantitative modeling of the interference spread on the network. We presented a SAR model describing the spread of interference when LIBA is used by the network. Results showed that for static, stochastic and predictive systems, susceptible nodes and attacked nodes converge to zero, whereas the replaced nodes converge to the total number of nodes in each diffusion set. All used data are artificial. For future work, it is essential to use real data, where the static system is determined using approximated parameters and the predictive system is defined using predictive models obtained by regression analysis.

Author Contributions

Conceptualization, E.T.; methodology, E.T.; software, E.T.; validation, J.d.D.N., F.M.T., J.U.R., P.G., A.B. and E.N.; formal analysis, E.T.; investigation, E.T.; resources, E.T. and A.B.; data curation, J.d.D.N., F.M.T., J.U.R., P.G. and E.N.; writing—original draft preparation, E.T.; writing—review and editing, E.T., J.d.D.N., F.M.T., J.U.R., P.G., A.B. and E.N.; visualization, E.T., J.d.D.N., F.M.T., J.U.R., P.G. and E.N.; supervision, A.B.; project administration, E.T. and A.B. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Acronyms

IoTinternet of things
LIBAleast interference beaconing algorithm
SARsusceptible–attacked–replaced
WSNwireless sensor network
SISsusceptible–infected–susceptible
SIPsusceptible–infected–protected
SIRSsusceptible–infected–recovered (removed) susceptible
SIRsusceptible–infected–recovered
SIR-Msusceptible–infected–recovered with maintenance
CTPcollection tree protocol
IPinternet protocol
IRinfected and recovered
TOBTinyOS beaconing
4IRfourth industrial revolution

References

  1. Schwab, K. The Fourth Industrial Revolution; Currency: Redfern, NSW, Australia, 2017. [Google Scholar]
  2. Shah, S.H.; Yaqoob, I. A survey: Internet of Things (IOT) technologies, applications and challenges. In Proceedings of the 2016 IEEE Smart Energy Grid Engineering (SEGE), Oshawa, ON, Canada, 21–24 August 2016; pp. 381–385. [Google Scholar]
  3. Kortuem, G.; Kawsar, F.; Sundramoorthy, V.; Fitton, D. Smart objects as building blocks for the internet of things. IEEE Internet Comput. 2009, 14, 44–51. [Google Scholar] [CrossRef] [Green Version]
  4. Mauwa, H.; Bagula, A.; Tuyishimire, E.; Ngqondi, T. An optimal spectrum allocation strategy for dynamic spectrum markets. In Proceedings of the 2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Barcelona, Spain, 21–23 October 2019; pp. 1–8. [Google Scholar]
  5. Mauwa, H.; Bagula, A.; Tuyishimire, E.; Ngqondi, T. Community healthcare mesh network engineering in white space frequencies. In Proceedings of the 2019 ITU Kaleidoscope: ICT for Health: Networks, Standards and Innovation (ITU K), Atlanta, GA, USA, 4–6 December 2019; pp. 1–8. [Google Scholar]
  6. Tuyishimire, E.; Adiel, I.; Rekhis, S.; Bagula, B.A.; Boudriga, N. Internet of Things in Motion: A Cooperative Data Muling Model under Revisit Constraints. In Proceedings of the Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), 2016 International IEEE Conferences, Toulouse, France, 18–21 July 2016; pp. 1123–1130. [Google Scholar]
  7. Antoine, B.; Tuyishimire, E.; Olasupo, A. Cyber physical systems (cps) surveillance using an epidemic model. arXiv 2019, arXiv:1912.07479. [Google Scholar]
  8. Darvishi, H.; Ciuonzo, D.; Eide, E.R.; Rossi, P.S. Sensor-fault detection, isolation and accommodation for digital twins via modular data-driven architecture. IEEE Sens. J. 2020, 21, 4827–4838. [Google Scholar] [CrossRef]
  9. Santamaria, A.F.; Raimondo, P.; Tropea, M.; De Rango, F.; Aiello, C. An IoT surveillance system based on a decentralised architecture. Sensors 2019, 19, 1469. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  10. Ismail, A.; Bagula, B.A.; Tuyishimire, E. Internet-of-things in motion: A uav coalition model for remote sensing in smart cities. Sensors 2018, 18, 2184. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  11. Ismail, A.; Tuyishimire, E.; Bagula, A. Generating dubins path for fixed wing uavs in search missions. In International Symposium on Ubiquitous Networking; Springer: Berlin/Heidelberg, Germany, 2018; pp. 347–358. [Google Scholar]
  12. Tuyishimire, E. Cooperative Data Muling Using a Team of Unmanned Aerial Vehicles. Ph.D. Thesis, University of the Western Cape, Cape Town, South Africa, 31 July 2019. [Google Scholar]
  13. Tuyishimire, E.; Bagula, A.; Rekhis, S.; Boudriga, N. Trajectory Planing for Cooperating Unmanned Aerial Vehicles in the IoT. IoT 2022, 3, 147–168. [Google Scholar] [CrossRef]
  14. Bagula, A.; Tuyishimire, E.; Wadepoel, J.; Boudriga, N.; Rekhis, S. Internet-of-Things in Motion: A Cooperative Data Muling Model for Public Safety. In Proceedings of the Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), 2016 International IEEE Conferences, Toulouse, France, 18–21 July 2016; pp. 17–24. [Google Scholar]
  15. Tuyishimire, E.; Bagula, A.; Rekhis, S.; Boudriga, N. Cooperative Data Muling from Ground Sensors to Base Stations Using UAVs. In Proceedings of the 2017 IEEE Symposium on Computers and Communications (ISCC), Heraklion, Greece, 3–6 July 2017. [Google Scholar]
  16. Snoonian, D. Smart buildings. IEEE Spectr. 2003, 40, 18–23. [Google Scholar] [CrossRef]
  17. Lund, H.; Østergaard, P.A.; Connolly, D.; Mathiesen, B.V. Smart energy and smart energy systems. Energy 2017, 137, 556–565. [Google Scholar] [CrossRef]
  18. Haverkort, B.R.; Zimmermann, A. Smart industry: How ICT will change the game! IEEE Internet Comput. 2017, 21, 8–10. [Google Scholar] [CrossRef]
  19. Baig, M.M.; Gholamhosseini, H. Smart health monitoring systems: An overview of design and modeling. J. Med. Syst. 2013, 37, 1–14. [Google Scholar] [CrossRef]
  20. Tuyishimire, E.; Bagula, B.A.; Ismail, A. Optimal clustering for efficient data muling in the internet-of-things in motion. In International Symposium on Ubiquitous Networking; Springer: Berlin/Heidelberg, Germany, 2018; pp. 359–371. [Google Scholar]
  21. Tuyishimire, E.; Bagula, A.; Ismail, A. Clustered data muling in the internet of things in motion. Sensors 2019, 19, 484. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  22. Jibreel, F.; Tuyishimire, E.; Daabo, I.M. An Enhanced Heterogeneous Gateway-Based Energy-Aware Multi-hop Routing Protocol for Wireless Sensor Networks. Preprints 2022, 2022010024. [Google Scholar] [CrossRef]
  23. Tuyishimire, E. Routing in Mobile Networks. 2013. Available online: https://tinyurl.com/5n7ppvh5 (accessed on 10 February 2022).
  24. Tuyishimire, E.; Bagula, B.A. A Formal and Efficient Routing Model for Persistent Traffics in the Internet of Things. In Proceedings of the 2020 Conference on Information Communications Technology and Society (ICTAS), Durban, South Africa, 11–12 March 2020; pp. 1–6. [Google Scholar]
  25. Bagula, A.B.; Djenouri, D.; Karbab, E. On the Relevance of Using Interference and Service Differentiation Routing in the Internet-of-Things. In Internet of Things, Smart Spaces, and Next Generation Networking; Springer: Berlin/Heidelberg, Germany, 2013; pp. 25–35. [Google Scholar]
  26. Bagula, A.; Djenouri, D.; Karbab, E. Ubiquitous Sensor Network Management: The Least Interference Beaconing Model. In Proceedings of the 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), London, UK, 8–11 September 2013. [Google Scholar]
  27. Ngqakaza, L.; Bagula, A. Least Path Interference Beaconing Protocol (LIBP): A Frugal Routing Protocol for the Internet-of-Things. In International Conference on Wired/Wireless Internet Communications; Springer: Berlin/Heidelberg, Germany, 2014; pp. 148–161. [Google Scholar]
  28. Azmi, N.; Kamarudin, L.; Mahmuddin, M.; Zakaria, A.; Shakaff, A.; Khatun, S.; Kamarudin, K.; Morshed, M. Interference issues and mitigation method in WSN 2.4 GHz ISM band: A survey. In Proceedings of the 2014 2nd International Conference on Electronic Design (ICED), Penang, Malaysia, 19–21 August 2014; pp. 403–408. [Google Scholar]
  29. Denis Ndanguza, J.; de Dieu Niyigena, J.M.T. Modelling the Distribution and Spread of Ebola Disease in West Africa; Nova Science Publishers: Hauppauge, NY, USA, 2019; Chapter 1. [Google Scholar]
  30. Kermack, W.; McKendrick, A. Contributions to the mathematical theory of epidemics—I. Bull. Math. Biol. 1991, 53, 33–55. [Google Scholar] [PubMed]
  31. Theodorakopoulos, G.; Le Boudec, J.Y.; Baras, J.S. Selfish response to epidemic propagation. IEEE Trans. Autom. Control 2012, 58, 363–376. [Google Scholar] [CrossRef] [Green Version]
  32. Ganesh, A.; Massoulié, L.; Towsley, D. The effect of network topology on the spread of epidemics. In Proceedings of the IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Miami, FL, USA, 13–17 March 2005; Volume 2, pp. 1455–1466. [Google Scholar]
  33. Sotoodeh, H.; Safaei, F.; Sanei, A.; Daei, E. A General Stochastic Information Diffusion Model in Social Networks based on Epidemic Diseases. arXiv 2013, arXiv:1309.7289. [Google Scholar] [CrossRef]
  34. Zhang, X.; Neglia, G.; Kurose, J.; Towsley, D. Performance modeling of epidemic routing. Comput. Netw. 2007, 51, 2867–2891. [Google Scholar] [CrossRef]
  35. Tang, S.; Mark, B.L. Analysis of virus spread in wireless sensor networks: An epidemic model. In Proceedings of the 2009 7th International Workshop on Design of Reliable Communication Networks, Washington, DC, USA, 25–28 October 2009; pp. 86–91. [Google Scholar]
  36. Tuyishimire, E.; Bagula, B.A. Modelling and analysis of interference diffusion in the internet of things: An epidemic model. In Proceedings of the 2020 Conference on Information Communications Technology and Society (ICTAS), Durban, South Africa, 11–12 March 2020; pp. 1–6. [Google Scholar]
  37. Wei, Z.; Masouros, C.; Liu, F.; Chatzinotas, S.; Ottersten, B. Energy-and cost-efficient physical layer security in the era of IoT: The role of interference. IEEE Commun. Mag. 2020, 58, 81–87. [Google Scholar] [CrossRef]
  38. Tuyishimire, E.; Bagula, B.A. A novel management model for dynamic sensor networks using diffusion sets. In Proceedings of the 2020 Conference on Information Communications Technology and Society (ICTAS), Durban, South Africa, 11–12 March 2020; pp. 1–6. [Google Scholar]
  39. Roberts, M.G.; Heesterbeek, J. Characterizing the next-generation matrix and basic reproduction number in ecological epidemiology. J. Math. Biol. 2013, 66, 1045–1064. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  40. Hahn, G. A modified Euler method for dynamic analyses. Int. J. Numer. Methods Eng. 1991, 32, 943–955. [Google Scholar] [CrossRef]
Figure 1. Routing with LIBA.
Figure 1. Routing with LIBA.
Information 13 00181 g001
Figure 2. Diffusion sets.
Figure 2. Diffusion sets.
Information 13 00181 g002
Figure 3. Thresholds for interference states subdivision.
Figure 3. Thresholds for interference states subdivision.
Information 13 00181 g003
Figure 4. Interference transmission in the diffusion sets of a network.
Figure 4. Interference transmission in the diffusion sets of a network.
Information 13 00181 g004
Figure 5. Representation of interference spread.
Figure 5. Representation of interference spread.
Information 13 00181 g005
Figure 6. Considered types of networks.
Figure 6. Considered types of networks.
Information 13 00181 g006
Figure 7. Interference spread in a static system.
Figure 7. Interference spread in a static system.
Information 13 00181 g007
Figure 8. The interference spread stochastic system.
Figure 8. The interference spread stochastic system.
Information 13 00181 g008
Figure 9. The interference spread in a predictive system.
Figure 9. The interference spread in a predictive system.
Information 13 00181 g009aInformation 13 00181 g009b
Table 1. Network-related epidemic models and their comparison.
Table 1. Network-related epidemic models and their comparison.
Model TypeAssumed
Population/Setting
DomainStrengthMain Gaps
SIS [32]Networked computing devicesComputer and Communications Societies(i) Determination of what makes epidemic either weak or potent and (ii) the network topology is considered(i) Preliminary investigation, (ii) the quantitative research for the epidemic is not covered and (iii) stochastic and predictive mechanisms are not taken care of.
SIRS [33](i) Social networkInformationdiffusionAccommodates people differences on an information reaction, (ii) people are grouped based on their similarities and (iii) people may migrate from a group to the other(i) A group of people is not mathematically defined and specified, (ii) the partition property is not proven/justified, (iii) the predictive model is not covered and (iv) the communication model of people is not considered (anyone can transfer the disease to anyone).
IR and itsderivatives [34]SensorsnetworksEpidemicrouting(i) Considered mobile networks and (ii) epidemic models are used in/for routing(i) The quantitative analysis of the spread is neither studied nor analyzed, (ii) all nodes are assumed to be homogeneous, (iii) any sensor can transfer the disease to any sensor, and (iv) stochastic and predictive mechanisms are not taken care of.
SIR [30]PeopleMathematicalBiologyModel of reference(i) Represents a very ideal system where recovered and removed states have the same behavior and (ii) stochastic and predictive mechanisms are not taken care of.
SIR-M [35]WSNSensorsNetwork flexibility analysis(i) Any sensor can transfer the disease to any sensor, (ii) the considered disease is avoidable and hence not persistent, (iii) stochastic and predictive mechanisms are not taken care of, and (iv) the structure of the network and communication are not formally considered.
SIP [31]A networkof agentsAutomaticcontrolGame theory is employed to consider the interaction of the agents(i) The network structure is not considered, (ii) the communication model is not exploited, (iii) any agent may transfer the epidemic to any other and (iv) stochastic and predictive mechanisms are not taken care of.
Table 2. Numerical values.
Table 2. Numerical values.
ParameterDescriptionValue
NTotal number of nodes of a network200
mNumber of chosen diffusion sets4
S i 0 Initial number of susceptible nodes in the set i S 1 0 = 100 , S 2 0 = 100
A i 0 Initial number of attacked nodes in the set i A 1 0 = 0 , A 2 0 = 0
R i 0 Initial number of replaced nodes in the set i R 1 0 = 0 , R 2 0 = 0
b i Migration rate from susceptible nodes in diffusion set i to attacked nodes in i b 1 = 0.04 , b 2 = 1
c i Migration rate from attacked nodes in diffusion set i to replaced nodes in i c 1 = 0.05 , c 2 = 0.003
β i Susceptibility of a node in diffusion set i β 1 = 0.8 , β 2 = 1
γ i Infectiousness of a node in diffusion set i γ 1 = 2 , γ 2 = 01.5
η i Network impact if a susceptible node in diffusion set i becomes attacked η 1 = 1 , η 2 = 0.9
Table 3. Numerical values.
Table 3. Numerical values.
ParameterSet 1Set 2
b i b 1 N ( 0.04 , 0.2 ) b 2 N ( 0.02 , 0.1 )
c i c 1 N ( 0.005 , 0.025 ) c 2 N ( 0.003 , 0.015 )
β i β 1 N ( 0.8 , 0.7 ) β 2 N ( 1 , 1 )
γ i γ 1 N ( 2 , 1 ) γ 2 N ( 1.5 , 1 )
η i η 1 N ( 1 , 0.5 ) η 2 N ( 0.9 , 0.7 )
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Tuyishimire, E.; Niyigena, J.d.D.; Tubanambazi, F.M.; Rutikanga, J.U.; Gatabazi, P.; Bagula, A.; Niyigaba, E. A Novel Epidemic Model for the Interference Spread in the Internet of Things. Information 2022, 13, 181. https://doi.org/10.3390/info13040181

AMA Style

Tuyishimire E, Niyigena JdD, Tubanambazi FM, Rutikanga JU, Gatabazi P, Bagula A, Niyigaba E. A Novel Epidemic Model for the Interference Spread in the Internet of Things. Information. 2022; 13(4):181. https://doi.org/10.3390/info13040181

Chicago/Turabian Style

Tuyishimire, Emmanuel, Jean de Dieu Niyigena, Fidèle Mweruli Tubanambazi, Justin Ushize Rutikanga, Paul Gatabazi, Antoine Bagula, and Emmanuel Niyigaba. 2022. "A Novel Epidemic Model for the Interference Spread in the Internet of Things" Information 13, no. 4: 181. https://doi.org/10.3390/info13040181

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop