skip to main content
10.1145/3038912.3052584acmotherconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
research-article

Back To The Source: An Online Approach for Sensor Placement and Source Localization

Published:03 April 2017Publication History

ABSTRACT

Source localization, the act of finding the originator of a disease or rumor in a network, has become an important problem in sociology and epidemiology. The localization is done using the infection state and time of infection of a few designated sensor nodes; however, maintaining sensors can be very costly in practice.

We propose the first online approach to source localization: We deploy a priori only a small number of sensors (which reveal if they are reached by an infection) and then iteratively choose the best location to place a new sensor in order to localize the source. This approach allows for source localization with a very small number of sensors; moreover, the source can be found while the epidemic is still ongoing. Our method applies to a general network topology and performs well even with random transmission delays.

References

  1. F. Altarelli, A. Braunstein, L. Dall'Asta, A. Lage-Castellanos, and R. Zecchina. Bayesian inference of epidemics on networks via belief propagation. Physical review letters, 112(11), 2014.Google ScholarGoogle Scholar
  2. A. Barabási and R. Albert. Emergence of scaling in random networks. Science, 286, 1999.Google ScholarGoogle Scholar
  3. J. Cáceres, M. Hernando, M. Mora, I. Pelayo, M. Puertas, C. Seara, and D. Wood. On the metric dimension of cartesian products of graphs. SIAM J. Discrete Mathematics, 21(2), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. S. Cauchemez and N. Ferguson. Likelihood-based estimation of continuous-time epidemic models from time-series data: application to measles transmission in london. Journal of the Royal Society Interface, 5(25), 2008.Google ScholarGoogle ScholarCross RefCross Ref
  5. L. Celis, F. Pavetić, B. Spinelli, and P. Thiran. Budgeted sensor placement for source localization on trees. In LAGOS, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  6. X. Chen, X. Hu, and C. Wang. Approximability of the minimum weighted doubly resolving set problem. In COCOON, 2014.Google ScholarGoogle Scholar
  7. V. Colizza, A. Barrat, M. Barthélemy, and A. Vespignani. The role of the airline transportation network in the prediction and predictability of global epidemics. Proc. of the National Academy of Sciences of the USA, 103(7), 2006.Google ScholarGoogle ScholarCross RefCross Ref
  8. W. Dong, W. Zhang, and C. Tan. Rooting out the rumor culprit from suspects. In IEEE ISIT, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  9. B. Ehrenberg. How much is your personal data worth? https://www.theguardian.com/news/datablog/2014/apr/22/how-much-is-personal-data-worth, 2014.Google ScholarGoogle Scholar
  10. P. Erdös and A. Rényi. On random graphs. I. Publ. Math. Debrecen, 6, 1959.Google ScholarGoogle Scholar
  11. M. Farajtabar, M. Gomez-Rodriguez, M. Zamani, N. Du, H. Zha, and L. Song. Back to the past: Source identification in diffusion networks from partially observed cascades. In AISTATS, 2015.Google ScholarGoogle Scholar
  12. D. Golovin and A. Krause. Adaptive submodularity: Theory and applications in active learning and stochastic optimization. Journal of Artificial Intelligence Research, 42, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. H. Gray and P. Odell. On least favorable density functions. SlAM Review, 9, 1967.Google ScholarGoogle Scholar
  14. A. Gupta, V. Nagarajan, and R. Ravi. Thresholded covering algorithms for robust and max-min optimization. In International Colloquium on Automata, Languages, and Programming, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. Jiang, S. Wen, S. Yu, Y. Xiang, and W. Zhou. Identifying propagation sources in networks: State-of-the-art and comparative studies. IEEE Communication Survey Tutorials, 2014.Google ScholarGoogle Scholar
  16. O. Kariv and S. Hakimi. An algorithmic approach to network location problems. ii: The p-medians. SIAM journal of Applied Mathematics, 37, 1979.Google ScholarGoogle Scholar
  17. M. Lelarge. Efficient control of epidemics over random networks. In SIGMETRICS/Performance, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. Lokhov, M. Mézard, H. Ohta, and L. Zdeborová. Inferring the origin of an epidemic with a dynamic message-passing algorithm. Ph. Review E, 90(1), 2014.Google ScholarGoogle Scholar
  19. A. Louni, A. Santhanakrishnan, and K. Subbalakshmi. Identification of source of rumors in social networks with incomplete information. ASE SocialCom, 2015.Google ScholarGoogle Scholar
  20. A. Louni and K. Subbalakshmi. A two-stage algorithm to estimate the source of information diffusion in social media networks. IEEE INFOCOM Workshop on Dynamic Social Networks, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  21. W. Luo and W. Tay. Identifying infection sources in large tree networks. In IEEE SECON, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  22. W. Luo, W. Tay, and M. Leng. How to identify an infection source with limited observations. IEEE Journal of Sel. Topics in Signal Processing, 8(4), 2014.Google ScholarGoogle Scholar
  23. J. McAuley and J. Leskovec. Learning to discover social circles in ego networks. In NIPS, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. OpenFlights. Route dataset. http://openflights.org/data.html#route, 2012.Google ScholarGoogle Scholar
  25. M. Penrose. Random Geometric Graphs. Oxford Studies in Probability, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  26. P. Pinto, P. Thiran, and M. Vetterli. Locating the source of diffusion in large-scale networks. Physical Review Letters, 109, 2012.Google ScholarGoogle Scholar
  27. B. Prakash, J. Vreeken, and C. Faloutsos. Spotting culprits in epidemics: How many and which ones? IEEE ICDM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. D. Shah and T. Zaman. Rumors in a network: Who's the culprit? IEEE Transactions on information theory, 57, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Z. Somda, M. Meltzer, H. Perry, N. Messonnier, U. Abdulmumini, G. Mebrahtu, M. Sacko, K. Touré, S. O. Ki, T. Okorosobo, W. Alemu, and I. Sow. Cost analysis of an integrated disease surveillance and response system: case of burkina faso, eritrea, and mali. Cost Effectiveness and Resource Allocation, 7(1), 2009.Google ScholarGoogle Scholar
  30. B. Spinelli, L. Celis, and P. Thiran. Observer placement for source localization: The effect of budgets and transmission variance. In Allerton Conf., 2016.Google ScholarGoogle ScholarCross RefCross Ref
  31. B. Spinelli, L. Celis, and P. Thiran. Back to the source: An online approach for sensor placement and source localization. https://arxiv.org/pdf/1702.01056v1.pdf, 2017.Google ScholarGoogle Scholar
  32. S. Sundareisan, J. Vreeken, and B. Prakash. Hidden hazards: Finding missing nodes in large graph epidemics. In SIAM SDM, 2015.Google ScholarGoogle Scholar
  33. H. Wang, P. Zhang, L. Chen, H. Liu, and C. Zhang. Online diffusion source detection in social networks. In IEEE Neural Networks (IJCNN), 2015.Google ScholarGoogle Scholar
  34. S. Zejnilovic, J. Gomes, and B. Sinopoli. Network observability and localization of the source of diffusion based on a subset of vertices. In Allerton Conf., 2013.Google ScholarGoogle Scholar
  35. S. Zejnilović, J. Gomes, and B. Sinopoli. Sequential observer selection for source localization. In IEEE GlobalSIP, pages 1220--1224, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  36. X. Zhang, Y. Zhang, T. Lv, and Y. Yin. Identification of efficient observers for locating spreading source in complex networks. Physica A: Statistical Mechanics and its Applications, 442, 2016.Google ScholarGoogle Scholar
  37. L. Zheng and C. Tan. A probabilistic characterization of the rumor graph boundary in rumor source detection. In IEEE DSP, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  38. K. Zhu, Z. Chen, and L. Ying. Locating the contagion source in networks with partial timestamps. Data Mining and Knowledge Discovery, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. K. Zhu and L. Ying. Information source detection in the SIR model: A sample path based approach. In IEEE ITA, 2013.Google ScholarGoogle Scholar
  40. K. Zhu and L. Ying. A robust information source estimator with sparse observations. Computational Social Networks, 1(1), 2014.Google ScholarGoogle Scholar

Index Terms

  1. Back To The Source: An Online Approach for Sensor Placement and Source Localization

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          WWW '17: Proceedings of the 26th International Conference on World Wide Web
          April 2017
          1678 pages
          ISBN:9781450349130

          Copyright © 2017 Copyright is held by the International World Wide Web Conference Committee (IW3C2).

          Publisher

          International World Wide Web Conferences Steering Committee

          Republic and Canton of Geneva, Switzerland

          Publication History

          • Published: 3 April 2017

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          WWW '17 Paper Acceptance Rate164of966submissions,17%Overall Acceptance Rate1,899of8,196submissions,23%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader