Next Article in Journal
Time-Reversibility, Causality and Compression-Complexity
Previous Article in Journal
Comparative Analysis of Different Univariate Forecasting Methods in Modelling and Predicting the Romanian Unemployment Rate for the Period 2021–2022
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Mobile Clustering Scheme for Pedestrian Contact Tracing: The COVID-19 Case Study

by
Mario E. Rivero-Angeles
1,*,†,
Víctor Barrera-Figueroa
2,*,†,
José E. Malfavón-Talavera
3,†,
Yunia V. García-Tejeda
4,†,
Izlian Y. Orea-Flores
3,†,
Omar Jiménez-Ramírez
3,† and
José A. Bermúdez-Sosa
3,†
1
Communication Networks Laboratory, CIC-Instituto Politécnico Nacional, Mexico City 07738, Mexico
2
SEPI-UPIITA-Instituto Politécnico Nacional, Mexico City 07740, Mexico
3
Telematics Section, UPIITA-Instituto Politécnico Nacional, Mexico City 07738, Mexico
4
Basic Sciences Section, UPIITA-Instituto Politécnico Nacional, Mexico City 07340, Mexico
*
Authors to whom correspondence should be addressed.
These authors contributed equally to this work.
Entropy 2021, 23(3), 326; https://doi.org/10.3390/e23030326
Submission received: 12 February 2021 / Revised: 1 March 2021 / Accepted: 5 March 2021 / Published: 10 March 2021
(This article belongs to the Section Information Theory, Probability and Statistics)

Abstract

:
In the context of smart cities, there is a general benefit from monitoring close encounters among pedestrians. For instance, for the access control to office buildings, subway, commercial malls, etc., where a high amount of users may be present simultaneously, and keeping a strict record on each individual may be challenging. GPS tracking may not be available in many indoor cases; video surveillance may require expensive deployment (mainly due to the high-quality cameras and face recognition algorithms) and can be restrictive in case of low budget applications; RFID systems can be cumbersome and limited in the detection range. This information can later be used in many different scenarios. For instance, in case of earthquakes, fires, and accidents in general, the administration of the buildings can have a clear record of the people inside for victim searching activities. However, in the pandemic derived from the COVID-19 outbreak, a tracking that allows detecting of pedestrians in close range (a few meters) can be particularly useful to control the virus propagation. Hence, we propose a mobile clustering scheme where only a selected number of pedestrians (Cluster Heads) collect the information of the people around them (Cluster Members) in their trajectory inside the area of interest. Hence, a small number of transmissions are made to a control post, effectively limiting the collision probability and increasing the successful registration of people in close contact. Our proposal shows an increased success packet transmission probability and a reduced collision and idle slot probability, effectively improving the performance of the system compared to the case of direct transmissions from each node.

1. Introduction

Smart City is a general term used to represent an information system installed in certain intelligent environments to disseminate information regarding the operation of the city and the quality of life of the residents [1], such as information about the water supply, traffic conditions, dangerous leaks, cultural and sports events, health-related information, updates about pollution, and climate-related data among many others. In pandemic times, smart city environments would allow having detailed monitoring of contagion hotspots by following close encounters of potential sick individuals with other people in specific periods and locations. With this information, governmental authorities can isolate specific individuals who might be at risk of infection without affecting the rest of the population, effectively avoiding the complete lockdown of the city and reducing the economic impact of the epidemic.
The outbreak of a new virus that emerged in the city of Wuhan, central China in December 2019, has crossed all borders. The virus was named Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2 for short) by the International Committee on Taxonomy of Viruses. Consequently, COVID-19 (Coronavirus Disease 2019) is the illness that it causes [2]. On 8 February 2021, the Worldometer COVID-19 Data reported 106,952,085 cases with COVID-19 and confirmed 2,334,563 deaths worldwide [3].
It is generally known that SARS-CoV-2 is primarily transmitted via airborne, through aerosols emitted during speech, sneeze or cough, by infected individuals [4]. Aerosols containing SARS-CoV-2 remain suspended in the air for hours [5], and may potentially be inhaled by others. Therefore, for reducing the risk of transmission, physical distancing of 2 m is considered as an effective protection only if everyone wears face masks in daily life activities [6]. However, small particles with viral content may travel in indoor environments, covering distances up to 10 m starting from the emission sources [6]. Moreover, the temperature, lighting, and humidity of the environment are abiotic factors that influence the inactivation of COVID-19.
It is reported that exposure of the SARS-CoV-2 virus for 30 min at 34 C, in the absence of humidity, is sufficient to damage the structure of the spike protein [7], which binds to ACE2 (Angiotensin-converting enzyme 2) the receptor for SARS-CoV-2 [8]. In contrast, at 22 C, the spike protein structure remains unaffected. Regarding exposure of the virus to sunlight, about 90% or more of SARS-CoV-2 virus is inactivated after being exposed for 11--34 min of midday sunlight in Mexico and in many other world cities during summer. On the contrary, the virus is active for a day or more in winter [9].
UV light is divided into three classifications: UVA (320–400 nm), UVB (280–320 nm), and UVC (200–280 nm). UVC is absorbed by RNA and DNA bases [10], which is effective for inactivating SARS-CoV-2 [11]. The monitoring of the above-mentioned abiotic factors can help us to determine the pedestrian occupancy in a building or space, and implement precautionary measures to reduce risks of getting COVID-19.
In current times, the COVID-19 epidemic has shown the devastating effects of poor infection monitoring and tight and generalized quarantine conditions in different cities regarding the economy and general health of their population, due to prolonged isolation, lack of social interaction, and sunlight, among others. Furthermore, experts warn that this current epidemic is only one of many others to come in the near future. Hence, we suggest being ready for future emergencies by having the computational tools to avoid catastrophic scenarios as the one lived worldwide in 2020–2021. To this end, contact tracing is a critical tool to stop the spreading of such diseases [12,13,14].
Our monitoring system employs devices with Radio Frequency (RF) communication capabilities to periodically send a beacon signal to form mobile clusters (pedestrians are usually moving in specific trajectories and the clusters move accordingly) with individuals inside their radio of interest, i.e., within the distance of possible contagion. This radio can be modified according to the abiotic factors monitored at certain times during the day. Even if worldwide safety guidelines clearly state to keep social distancing of at least two meters, in many cases, these recommendations have not been respected as has been documented throughout the world [15,16]. This is the main reason for the increment in confirmed cases at different periods of this pandemic. In some cases, the 2-m social distance has not been respected due to cultural, religious, social, and/or commercial reasons where people continue to gather in special dates that they are used to celebrate, despite police installing sanitary filters and trying to separate people by force, as reported in [15]. Furthermore, as mentioned in [17], urban agglomerations, where the social distancing is not fully respected, are the centers at highest risk during a period of a pandemic. Indeed, more than 90% of COVID-19 clusters are associated with densely populated urban agglomerations and megacities in the world [17]. This is can be explained in part by the fact that people have not respected the 2-m distancing on their daily activities since cities are the economic and financial motor of many developing countries and many activities cannot be completely stopped, workers have to travel, in many cases using the public transport system where close contacts cannot be avoided as noted in [18]. Building on this, we believe that using a short-range (lower than 2 m) clustering scheme for communication among pedestrian’s devices for contact tracing applications entail important benefits.
Although ad-hoc wireless sensor networks could be designed based on Bluetooth technology (see, e.g., [19]), we find some issues that limit its application to the tracking of pedestrians in a pandemic scope. In the first place, its high power consumption: establishing a wireless Bluetooth link at a distance of 10 m (Power Class 2) or 1 m (Power Class 3) requires 4 dBm or 0 dBm, respectively. In this work, we designed a wireless device that employs only –17.5 dBm for establishing a reliable wireless link, which is far lower than the previous transmitting powers. In the second place, the pairing of devices: for the correct pairing, the Bluetooth devices should be close enough depending on their transmission power and the level of security. It is observed that the higher the level of security, the larger the average time needed to establish a link (see, e.g., [20]). This may require a few seconds, which is far larger than the microseconds used to transmit data between our RF devices. In the third place, security: though Bluetooth employs an authentication protocol to connect two devices, as well as encryption for transmitting data, it is not difficult to attack a Bluetooth device (see, e.g., [21]), which compromises the protection of information of the pedestrians.
Then, our proposal focuses on nodes inside the mobile cluster to share their ID in order to detect the people that was in close interaction with each individual throughout the day. Hence, whenever an individual is confirmed to be infected (by a trusting health authority), the city services can easily detect the people that could be in potential infection danger by determining the identity of the people that were close to this infected person in the previous days. Thus, these people in potential danger can be isolated as well as the people that were in touch with them and so on and so forth.
The use of mobile clusters aims at making efficient utilization of resources, increasing the success transmission probability of nodes. For mobile applications, Cluster Heads (CHs) can transmit the close contact information from the nodes inside the cluster directly to a base station or access point whenever a close contact of less than the contagion range occurred, avoiding the need of storing this data in the device and periodically (once a day, in some cases) accessing remote databases. For the case of using specific devices, with much lower computational and storage resources than mobile phones, that cannot access databases or maintain many contact IDs for many days, the mobile clustering scheme also reduces replicated data—due to selecting a single Cluster Head in charge of receiving and concentrating the information for the rest of the nodes in the cluster and concentrating this data into a single transmission to the city/institution administrator, making efficient use of the scarce RF and computational resources as well as reducing energy consumption compared to the case where each node constantly transmits data to the disease control agency. In a smart city environment, many contagion control points can be distributed in strategic parts of the city, such as schools, hospitals, access to massive transport services, and others to have close control of potential pedestrian contagion and swiftly take action to reduce and limit infection spreading.
By providing an individual monitoring system, like the one proposed in this work, using either a smartphone or specific devices provided by different institutions like universities, hospitals, etc., it is possible to maintain open many buildings and commerces, thus reducing the risk of contagion. For instance, universities can provide RF devices to all their students, professors, administrative personnel, etc., in order to remain open and isolate only both sick individuals and all the people that were in touch with them in specific periods and locations. The benefits of such specific devices are the additional security and privacy compared to using mobile phones. Indeed, in case of a cyber attack, hackers could obtain much more information from smartphones while monitoring devices can only provide IDs, which are only known by the appropriate authorities. It is important to note that the use of applications in the mobile phone is much easier than a device dedicated to contact tracing. However, as mentioned in [22], there are many privacy concerns related to these applications, especially about systems based on tracking the geographical location of app users. This is one of the main deterrents for installing such tracking systems in personal mobile phones, especially in countries where governmental entities are not trusted (whether this appreciation is justified or not) by the general public or the official measures to combat the COVID-19 pandemic does not consider accurate contact tracking as the main tool to reduce strict confinement conditions. Such is the case of Latin America and Africa (note that there are no official applications listed in [22] for countries like Mexico, Guatemala, Honduras, Angola, Egypt, and many more), where also the COVID-19 epidemic has high contagion levels [23]. As such, applications in mobile phones are not a practical or preferred solution for all countries and cities to keep contact tracing information. For these cases, the use of a personal device provided by the university or factory or hospital, or any other place where a high concentration of people is expected, with no other information than a specific ID could be a much-accepted solution. It would also reduce cyber-attacks aimed at obtaining personal information from mobile phones. Hence, we argue that the use of specific devices may not be adopted as a general solution for contact tracing at the country level, but it may provide an effective and accepted solution for specific enterprises, commerce locations, and governmental and health entities that would allow an anticipated reopening solution to mitigate the economic and social negative impact of generalized lockdowns. For countries where mobile phone applications are well accepted, the mobile clustering scheme and results can be relevant and provide further insights on the performance of such solutions.
Some monitoring systems aim at keeping a close register regarding the specific individuals that enter a certain location. For instance, in Mexico City and China [24], a governmental application using QR codes at the entrance of buildings and commerces, requires clients to scan the QR code in order to register the time at which a person was inside the facilities. Hence, if a certain person is diagnosed with COVID-19, such a system determines the people that were at the same time and place as the infected individual, which are at a high risk of contagion. However, this system is not accurate enough. Indeed, the fact that other people were inside the same building at the same time than an infected individual does not imply that they were at any time at contagion distance from each other: they could have been at different locations inside the building, never crossing paths, and the system could warn a higher number of people than needed to keep them in quarantine. In addition, the efficacy of such a system is compromised considering that the authorities implemented this service at the end of 2020 while confirmed COVID-19 cases increased exponentially in early 2021.
Other applications that use mobile phones to detect people in close range produce redundant information by requiring all of these nodes to transmit the list of people (mobile phones) that were close to them. This redundant information entails high energy consumption and implementation costs by using resources from the cellular system that are expensive. Conversely, our proposal keeps an accurate register of people that were in actual contagion distance from each other inside and outside buildings. Furthermore, a single user in a group of people is selected to convey this information to the disease control agency reducing the number of transmissions and redundancy.
The main contributions of this paper are:
  • We propose a novel mobile clustering scheme to efficiently gather information of close contact with other people in pedestrian scenarios.
  • We design and propose a specific communication protocol to implement a mobile clustering scheme.
  • We mathematically model the proposed mobile clustering scheme to study the system performance in different scenarios by providing a teletraffic analysis of the dynamics of contact instants and encounters in pedestrian scenarios.
  • We design and develop our own RF device with the specific objective of maintaining a record of people in close contact under the mobile clustering scheme.
Moreover, the derived mathematical model can be easily extended and adapted to different scenarios and cities in order to provide other services related to smart city applications in non-pandemic times, like intelligent access control to buildings or public transportation.
The rest of the paper is organized as follows: first, we present relevant works in the context of contact tracing systems. Then, the system model is described in detail. Following this, Section 4 presents the main operation of the mobile clustering protocol. Then, the pedestrian mobility pattern is characterized in Section 5. The mathematical model is derived in Section 6 where all the variables and assumptions are explained. In Section 7, we present the design and performance of the node developed for contact tracing purposes. The paper ends by presenting the most relevant results and conclusions.

2. Related Work

Contact tracing is an essential tool to improve the health of people and to reduce the economic impact of a pandemic such as the one derived by the SARS-CoV-2 virus [13]. To this end, there have been many efforts to develop digital tools to keep track of contact among people to rapidly detect possible contagion hot spots.
For example, the study in [12] describes the strict contact tracing scheme used in South Korea that uses data from the Global Positioning System (GPS), credit card transactions, and video surveillance among other systems in order to reduce the contagion cases of COVID-19, clearly showing the benefits of such policies.
Regarding the digital contact tracing tools, there are many different applications with government support in certain regions as mentioned in [22], are centralized protocols concentrating all personal data (geo-localization) in state institutions. For instance, Israel approved the secret service to use surveillance measures to access information of users connected at different networks, which can have many potential privacy issues. Decentralized protocols like the one developed by Covid Watch, the CEN Protocol, based on Bluetooth Low Energy (BLE) using proximity among cellular phones to detect potential contagion cases. In this regard, the Pan-European Privacy-Preserving Proximity Tracing (PEPP-PT) project (a combination of centralized and decentralized approaches) developed a BLE app aimed at detecting such close interactions and avoid state surveillance activities. Later on, different institutions criticized the PEPP-PT for lack of transparency and privacy issues [22]. Nonetheless, these decentralized approaches aim at protecting private information using anonymous keys that have no relation to the user’s identities. However, these applications do not function properly if only a small population uses the app [25], which occurs even if workers are legally required to use it [26]. However, in a closed environment such as universities or hospitals where employee access to the buildings can be conditioned on using a specific RF device just like ID is commonly required (or even IDs can be placed on such devices), our proposed device could be a better option since it does not require administrative access to the mobile phone in order to implement contact tracing and the exposure of smartphones is avoided, which can be potentially dangerous to people since mobile phones are reservoirs for various pathogens [27]. In addition, apps that use Bluetooth and GPS to estimate the distance may over-report interactions leading to a high number of false positives [22]. By contrast, the development of a specific device has the advantage of fine-tuning the contagion range according to the specific needs thorough the careful design of antennas, amplifiers, and filters. Indeed, for COVID-19, the official recommendation is to avoid close contact of less than 1.5 or 2 m, but variations of this virus or for other viruses in the future, this social distancing can be different and the RF device can be designed accordingly, while GPS and Bluetooth systems cannot easily do. In this work, we propose the use of both approaches, based on apps on mobile phones and specific RF devices, in order to offer a general solution for contact tracing efforts in the sense that the mobile clustering scheme provides an efficient data reporting in pedestrian environments.
Many papers have studied the effectiveness and uses of contact tracking applications and models [28]. For instance, in [29], the authors perform different simulations to evaluate the effectiveness of such tools. However, they do not consider the real possible interactions between pedestrians. Instead, they rely on census data which have no information on contact times in a given trajectory, like our work.
In [30], the authors consider a network-based model to calculate the infection spread in a close population. Specifically, this work proposes a stochastic simulation and moment closure approximation where nodes are placed at certain distances to calculate the probability that two connected nodes get infected. A similar approach is presented in [31], where the authors study the dynamics of contagions using a stochastic epidemic model based on the embedded non-stationary Galton–Watson process. However, they do not consider the times that nodes are in contact with each other in a pedestrian movement pattern nor the dynamics of the nodes in such an environment.
In [32], the authors discuss privacy and trade-offs of such contact tracing applications. To this end, we propose the use of specific nodes that do not contain personal information, except for an ID (assigned by the government, institute, enterprise, or health authority) and geo-localization data that present minimum risk in case of a cyber attack.
As mentioned in [33], many applications use Bluetooth signal strength to calculate the distance among people and duration of such contact, while others rely on geo-localization data using GPS information to determine the proximity of individuals [34,35,36,37]. However, we propose to use direct transmissions to nodes in the proximity to clearly identify the people in close contact to others, which we believe would render more accurate proximity results since it implicitly considers the contact time that nodes were in contact with each other instead of instant contacts provided by Bluetooth and GPS signals. Additionally, by using the node developed and designed in our work, the contagion radius can be easily selected according to the specific disease phenomena, making our system general for current and future pandemics. In addition, the proposed mobile clustering scheme can inform of potential infection cases in hours, when the CHs report their data to the sink point when they are placed in strategic locations, or minutes if the cellular system is used. As mentioned in [38], for a contact tracing tool to be effective, it has to report potential infection cases in less than one day, contrary to GPS-based solutions that have to be retrieved from GPS records that can take many days to analyze.

3. System Model

In this section, the basic assumptions and system variables of the mobile clustering scheme are presented in detail. Our work is focused on pedestrian movement in outdoor conditions, where people are walking towards a building, institution, or commercial location. Specifically, we consider the case of students entering the facilities of the National Polytechnic Institute in Mexico City. In Figure 1, we present the general operation of the proposed system. The system operates by clustering neighbor nodes (associated with pedestrians) moving with a certain trajectory. Given the dynamics of the users, nodes select their role as either Cluster Head or Cluster Member according to the protocol described in Section 4. The nodes begin the packet transmission after an initialization packet is received that is periodically transmitted by a beacon localized at strategic points. In our case, the beacon emitter is placed at the street leading to the entrance of the National Polytechnique Institute (left part of Figure 2). (For other applications, beacon and sink nodes can be placed at the entrance of the supermarket or the subway or hospital, among others.) While pedestrians are walking along the street, they form clusters (depicted by red hexagons) and act according to their role (which can also change according to the possible scenarios described below), i.e., CMs transmitting their packet to their associated (nearest) CH. The approximated distance is calculated by the strength of the signal emitted by each CH. When the CHs detect the sink node, they transmit the gathered information while the CMs remain silent after successful transmission to their respective CH. The sink node stores this information (time and place that the nodes that were part of a cluster and hence were in close interaction among each other and are potentially in danger of contagion in the case that one of them receives a positive COVID-19 test result in the following days) that can be accessed by the trusted authority, e.g., government or health care institution, such that, in case of a positive test of the virus, the people in potential contagion danger can be prevented and put in quarantine. In the case of mobile phone users, the sink and beacon emitter function can be performed by the attending base station.
In this case, students typically arrive in high concentrations at certain times in the morning, just before day-time courses begin and in the afternoon when evening courses start. In order to determine the characteristics of the student’s movement, we took many hours of video in the street leading to the entrance of the institute at peak traffic periods, i.e, when a high concentration of people is attempting to enter the campus. The rationale behind this is that the proposed mobile clustering scheme aims at reducing packet transmissions and making efficient resource utilization by reducing data redundancy. To this end, a single node gathers the information from neighboring nodes. As such, this scheme is effective when there are many nodes walking in close proximity. When single nodes (pedestrians) are walking, the mobile clustering scheme has no meaningful impact compared to direct node transmissions to the sink.

Pedestrian Trajectories

As previously mentioned, we obtained real pedestrian trajectories as the ones presented in Figure 2 (pedestrians enter from the left side of the figure). Specifically, we recorded the pedestrians accessing the National Polytechnic Institute, in Mexico City, on different days and times. In total, we used 15 different trajectories for this work. Even if we obtained many more hours of recordings, we found out that many of them could not be used due to obstacles, such as cars and buses passing through, which impede the tracking of each individual.
At this location, pedestrians follow a specific behavior in the sense that they are all walking towards the entrance of the institute (upper right of Figure 2). In addition, there are some well-defined schedules where pedestrian traffic is intense, while, at other times, there is almost no one walking through. This is a relevant characteristic of people accessing an education building, such as universities or colleges, due to strict times for the beginning and end of the courses. However, this is also true for much other indoor access, such as commercial malls, governmental buildings, and also access to public transport like the subway. Hence, we believe that the analysis presented for this specific case can be easily extended to many other scenarios.
On this basis, we consider that each person in the recorded environment has a mobile device that can communicate with its neighbors, either using a smart phone or a specific RF device (like the one developed in this work) that implements the mobile clustering scheme described in detail in the next section. Then, a node in each cluster acts as Cluster Head (CH), receiving data (ID, timestamp, location, etc.) from the rest of the nodes in the cluster who acts as Cluster Members (CMs). For smartphones, this information is available for most cases, while, for specific communication devices, this information can be provided by specific beacons placed in strategic locations informing the location and time that the user crossed a certain area. In the specific case of the National Polytechnic Institute, these beacons can be placed at the exit of bus stops and subway stations closest to the different campuses or at the streets leading to the entrance of the facilities, like the left part of Figure 2. Unlike a conventional clustering scheme [39], CMs and CHs can enter and leave their current cluster, in which case the system must adapt to the ongoing changes. Then, each CH sends its data to a sink node while the rest of the CMs remain silent after their packet has been successfully received by their CH. In this work, the sink is placed at the entrance of the Institute, but it can also be placed at strategic points in the street or can even be sent to a cellular base station, depending on the particular scenario.

4. Mobile Clustering Scheme

In this section, we describe the operation and main considerations of the mobile clustering scheme developed in this work.

4.1. Initialization Phase

When nodes are turned on or smartphones are activated in the tracking application, they become CH with probability P and CM with probability 1 P . This can be done when people leave their house or work and interaction with other people begins. Hence, devices do not have to be turned on at all times and smartphones also do not have to be active.
Conversely, for close communities, such as universities, the sink node can perform the beacon transmission, in order to save energy consumption at nodes. Hence, when nodes are turned on, they enter reception mode waiting for the beacon signal, as shown in Figure 3. As such, nodes would not transmit information outside the campus since the sink is placed at the entrance of the facilities; this also provides a certain level of privacy.
At this point, CHs begin transmitting a beacon signal periodically each T b seconds, with the transmission power necessary to reach neighbor nodes. (This transmission range has to be carefully calibrated according to the specific virus characteristics, i.e., the social distance where people can be infected.) On the other hand, CMs enter into reception mode continuously listening to the channel to receive a beacon.
If CMs do not receive a beacon after T w seconds ( T w > T b ), they assume that no CH is present and they become CH with probability p. The impact of the selection of both parameters p and T b in the system performance is studied later in this work.

4.2. Data Transmission Phase

Once that the CHs have be selected, and the beacon signal is transmitted with a timestamp, geographical information, and ID of the CH, all receiving CMs transmit their packet (with their ID, geographical information, and timestamp) with probability τ as shown in Figure 4. The reason for this is to avoid packet collisions among CMs in the current cluster. CMs only perform a single successful transmission (a single CM transmission that suffers no packet collision) to their current CH. At this point, the CH effectively registers that such CM is inside the contagion range at that specific time and place and will report it (with the information of the rest of the CMs) to the sink node. However, these nodes may report again if a different CH is found, which means that a new set of nodes may be present and the conditions of new contagion cases may exist.
Building on this, the mobile clustering protocol may encounter different possible scenarios that are important to study, as described below.

4.3. Possible Operation Scenarios

As we have noticed in the pedestrian trajectories, after a certain time that the students walk towards the entrance, the clusters reach a certain stable phase where the same set of nodes moves almost at the same pace resulting in the same number of nodes in the proximities of each other. A single CH and multiple CM scenario is illustrated in Figure 5. In this case, each cluster enters the normal operation described above. This is the best-case scenario since there is no need for additional packet transmissions and, after a few seconds, only the CH is periodically transmitting the beacon packet, but CMs no longer respond. However, due to the mobility of nodes, CHs and CMs can enter or leave an already formed cluster, which would trigger the following actions from the mobile clustering scheme.
(A) Multiple CMs and no CH: This is the case where the CH leaves its cluster given that this node walks slower or faster than the rest of the nodes in the cluster and CMs have not transmitted their packet, as depicted in Figure 6. In this case, after T w seconds, the CMs do not receive the beacon signal and assume that the CH is no longer present. Hence, each member becomes a new CH with probability p. The first CM to become CH sends its beacon packet, informing the rest of the nodes that he has taken the role of CH. In the case that another CM also becomes CH, when listening to the beacon packet, it returns to the CM role. At this point, the cluster enters the normal protocol operation.
(B) Multiple CHs: In this case, when two pedestrians with the role of CH encounter each other in the same contagion range illustrated in Figure 7, each one with its beacon transmission time (even if the beacon is transmitted each T b seconds, the transmissions do not occur at the same time), the first CH that transmits its beacon will remain as CH, while the other CHs become CMs, returning to a normal operation state. CHs that become CMs transmit all the gathered data retrieved at this point to the new CH.
Since our proposal is based on clustering nodes according to the distance among them, and this distance is estimated by the signal strength, there could be inaccuracy and uncertainty given by signal fading, interference, and noise in the environment. Hence, to further improve the system precision, different fuzzy techniques applied to clustering can be used, such as the one presented in [40].

5. Mobility Statistics

In this section, we study in detail the duration of the connection times among nodes during their trajectory towards the entrance. Specifically, using the videos taken at rush hours, we determine the times that each node remains in each cluster either as a CH or CM.
Specifically, the videos show frame by frame the position of each pedestrian that walked along the street, giving us the location of each potential node (at this point, pedestrians are not equipped by RF nodes). These positions are placed in a virtual map, such as the one presented in Figure 8. Then, each node is elected as either CM or CH, with probability 1 p and p, respectively, at the beginning of the street. This role can change while pedestrians move along the street. Each CH is depicted in this figure with a red circle with the node at the center. Then, the rest of the nodes (CMs) are associated with the closest CH. (In this case, it is a geometric distance, but, in the practical system, the distance can be approximated by the strength of the CH signal.) At this point, we can determine the connection time of each node in its corresponding cluster.
Building on this, we find the connection time histograms considering all the connection times from all of the videos (all pedestrian trajectories recorded) such as the one presented in Figure 9, which is obtained for a radius of 2.5 m, i.e., the red virtual circle is scaled to be 2.5 m. The histograms represent the frequency or the number of samples in each connection time bin. From this, we can characterize the probability density function as described below.
For each histogram, we determine some statistical parameters, such as the mean ( E X ), standard deviation ( σ X ), variance ( σ X 2 ), and Coefficient of Variation ( C o V ), which are defined as follows [41]:
E X = 1 n i = 1 n x i ,
σ X 2 = 1 n i = 1 n ( x i E X ) 2 ,
σ X = σ X 2 ,
C o V = σ X E X ,
where n is the number of connection times measured in the pedestrian trajectories considering contagion ranges of 2.5, 3.0, 3.5, and 4.0 m, and 2, 3, 4, and 5 initial CHs. (We consider that some nodes can enter the facilities as either CH or CM and we want to study the effect of having a different number of CHs on the performance of the mobile clustering protocol.) As a result of this analysis, we obtained a CoV higher than one for all considered cases ( C o V = 1.7 ). This information is relevant because a Hyper-Exponential distribution can be used to model these connection times. The mathematical model presented below is based on this fact.
In addition, note that, as the communication range increases, the mean connection time is increased accordingly, which is an expected result since pedestrians remain connected longer times.

Phase-Type Distributions for Pedestrian Connection Times

Given that all the connection times have a C o V = 1.7 , we focus on finding the parameters of a Hyper-Exponential distribution. This distribution is obtained using two exponential distributions, where the first one with rate μ 1 is selected in probability p, and the other one with rate μ 2 has the complementary probability 1 p , as shown in the following Figure 10, where each phase represents a random exponentially distributed value with rate μ 1 and μ 2 , respectively.
From this, the probability density function is described by [42]
f X x = p θ 1 e θ 1 x + 1 p θ 2 e θ 2 x
Then, the mean is given by
E X = 0 x f X x d x
= p 1 θ 1 + 1 p 1 θ 2 ,
and the variance can be calculated, after some algebraic manipulation, as
σ X 2 = 0 x E X 2 f X x d x
= p θ 1 2 2 p + 1 p θ 2 1 + p θ 2 2 p θ 1 .
Solving (7) for p, we get
p = E X 1 θ 2 θ 1 θ 2 θ 2 θ 1 .
Clearly from this expression, we have the following restrictions: μ 2 > μ 1 and 0 p 1 , then:
E X 1 μ 2 μ 1 μ 2 μ 2 μ 1 < 1 , μ 1 + E X μ 2 1 μ 1 < μ 2 , μ 1 < 1 E X .
Using these expressions, we can find all the parameters of the Hyper-Exponential distribution, namely, p, μ 1 , and μ 2 , for each pedestrian environment. The fitting distributions are shown in Table 1, Table 2, Table 3 and Table 4.

6. Mathematical Model

We model the potential contagion risk through the time and distance that a node was in contact with another node that later was proven to be positive for SARS-CoV-2 or any other virus that propagates in the air and through the close interchange between people in a pedestrian case. To this end, we derive and numerically solve a Continuous Time Markov Chain (CTMC), depicted in Figure 11, where the states represent the number of nodes inside a mobile cluster. As shown above, the times inside a mobile cluster can be modeled using hyper-exponentially distributed random times. As such, nodes can experience times inside a cluster exponentially distributed either with rate μ 1 (and probability p), or with rate μ 2 (and probability 1 p ). The values of these parameters are shown in Table 1, Table 2, Table 3 and Table 4 depending on the particular scenario (number of initial CHs and contagion radio).
Building on this, each state of the proposed CTMC is formed as an order pair i , j , where i is the number of nodes in phase 1 (nodes enter this phase with probability p) and j is the number of nodes in phase 2 (nodes enter this phase with probability 1 p ). Nodes remain in this phase during the time inside the cluster until they leave it or the cluster vanishes. Hence, the valid states space is described by Ω i , j 0 i n max ; 0 j n max . For the specific pedestrian scenarios considered in this work, the number of people in close interactions was not higher than 10. As such, we observe that n max = 10 , which is the maximum number of nodes inside a mobile cluster observed during the real pedestrian trajectories, but the Markov chain is not limited to this number. In fact, n max would take the proper value according to the system conditions, i.e., the values of p, λ , μ 1 , and μ 2 , which is also true for our analysis. In addition, we calculated the rate λ at which nodes can enter an already formed mobile cluster, according to the specific speed and trajectory of each recorded pedestrian.
From this, we can see that transitions in the Markov Chain occur as follows:
  • When the system is in the state i , j ( 0 < i , j < n max ), it moves to the state i + 1 , j when a new arrival to phase 1 occurs with rate p × λ (in case of arrival, i.e., a node entering a particular mobile cluster in phase 1); it moves to the state i , j + 1 when a new arrival happens to phase 2 with rate 1 p × λ (in case of an arrival to phase 2); the system goes to state i 1 , j with rate i × μ 1 when a node in phase 1 leaves the cluster; and to state i , j 1 with rate j × μ 2 when a node in phase 2 leaves the cluster.
  • When the system is in the state 0 , j ( 0 < j < n max ), the system moves to the state 1 , j when a new arrival to phase 1 occurs with rate p × λ (in case of arrival, i.e., a node entering a particular mobile cluster in phase 1); it moves to the state 0 , j + 1 when a new arrival happens to phase 2 with rate 1 p × λ (in case of an arrival to phase 2); note that the system cannot transit to the state 1 , j ; and it moves to the state 0 , j 1 with rate j × μ 2 when a node in phase 2 leaves the cluster.
  • A similar behavior like the previous case occurs in the state i , 0 ( 0 < i < n m a x ) with the appropriate modifications.
  • When the system is in the state n max , j ( 0 < j < n max ), it cannot move to the state n max + 1 , j ; it moves to the state n max , j + 1 when a new arrival happens to phase 2 with rate 1 p × λ (in case of an arrival to phase 2); the system goes to the state n max 1 , j with rate n max × μ 1 when a node in phase 1 leaves the cluster and to the state n max , j 1 with rate j × μ 2 when a node in phase 2 leaves the cluster.
  • A similar behavior like the previous case occurs in the state i , n max ( 0 < i < n max ) with the appropriate modifications.
  • In the state 0 , 0 , only arrivals are allowed, and, in the state n max , n max only departures can occur with the appropriate rates.
Nodes cannot transit from phase 1 (2) to phase 2 (1) due to the nature of the hyper-exponential process, i.e., nodes either remain in the system with rate μ 1 or μ 2 but not a combination of these rates, as shown in Figure 10. Since this chain corresponds to an irreducible CTMC, we numerically solve it using the rate equalization method to find the stable state probabilities, π i , j that represent the probability that the cluster has i nodes in phase 1 and j nodes in phase 2.
Note that this Markov Chain can model all the dynamics of the system, and we use it to obtain the main system performance parameters. First, the average number of nodes in a cluster is calculated. Recall that the state of the Markov chain depicts the number of nodes in phase 1, i, and the number of nodes in phase 2, j, then i + j gives the actual number of nodes at each instant with probability π ( i , j ) , which is found numerically solving the Markov Chain. Hence, the average number of nodes can be calculated as:
n ¯ = i = 0 n max j = 0 n max i + j π i , j .
Then, we calculate the probability that a packet is successfully transmitted from a CM to their respective CH. Since CM only transmits with probability τ after the reception of the beacon packet, the system behaves as a Slotted ALOHA random access protocol [43], where slots have a duration of T b seconds. In view of this, the packet success probability in a beacon period, when there are i nodes in phase 1 and j nodes in phase 2, can be calculated as:
P suc i , j = i 1 τ 1 τ i 1 1 τ j + j 1 τ 1 τ j 1 1 τ i .
Hence, the average successful transmission probability in the system can be calculated as:
P suc = i = 0 n max j = 0 n max P suc i , j π i , j .
Similarly, the probability of idle beacon period, i.e., the probability that no node transmits in the beacon period when there are i nodes in phase 1 and j nodes in phase 2, can be calculated as:
P idle ( i , j ) = i 0 1 τ i 1 τ j + j 0 1 τ j 1 τ i .
Hence, the average idle probability in the system can be calculated as:
P idle = i = 0 n max j = 0 n max P idle i , j π i , j .
Finally, the packet collision probability can be calculated as:
P col = 1 P idle P suc .

7. Design of the RF Device

In this section, we show the design of an RF device that is carried by every pedestrian of our model. We highlight that this device was designed to be reliable, portable, and simple. As such, this device is not to intended to be a highly sophisticated piece of equipment nor to compete with already available commercial solutions. The RF device consists of four main parts: a microcontroller, a transceiver, an antenna, and a battery. Next, we provide details about each of these parts.

7.1. Microcontroller Section

The chip ATMega328p is the microcontroller used in the design of the RF device. It is a low-power CMOS 8-bit microcontroller with an advanced RISC architecture. This microcontroller possesses 32 KBytes of in-system self-programmable flash program memory, 1 KByte EEPROM, and 2 KBytes internal SRAM. In addition, this microcontroller provides six sleep modes: idle, ADC noise reduction, power-save, power-down, standby, and extended standby.
The microcontroller is set up in a stand-alone configuration, running with the internal 8 MHz clock, see Figure 12. The SPI interface is used for burning (flashing) the microcontroller’s program, and for driving the transceiver. Several ports are available for interfacing sensors for physical variables such as temperature, heart rate, etc., if necessary. For burning the program, we can use well-known utilities such as AVRDUDE, which is available under Linux, Windows, and Mac OS distributions.

7.2. Transceiver Section

A transceiver is needed for establishing wireless communications between CMs and CHs. Several commercial options are available such as XBee modules, see Figure 13a, which provide integrated solutions for configuring a wireless network based on the IEEE 802.15.4 networking protocol. These modules work in the 2.4 GHz ISM band, which is highly populated by the radiation of Wi-Fi and Bluetooth devices, microwave ovens, and other devices. The interfering sources increase the packet error rate [44,45,46]; reduce the throughput [47,48]; and induce higher path loss, and fading [49]. A drawback is the impossibility to write custom firmware for specific applications.
Some cheap RF modules allow certain customization for they lack communication firmware. For instance, the transmitter (TX) module of Figure 13b is a Colpitts oscillator that is turned on/off by an electronic switch, resulting in OOK modulation. The receiver (RX) module is a super-regenerative circuit together with an op-amp comparator for detecting digital symbols. These modules consume up to 20 mW and 10 mW [50], respectively, and work in the ISM band of 315 MHz or 433 MHz. A notable drawback is the large amount of source code needed for equipping the wireless link with the essential functionality for establishing reliable communications, thus occupying most of the microcontroller’s program memory.
On the other hand, there are highly configurable transceiver modules and well developed libraries for existing custom firmware. One example is found in the family of chips nRF24 from Nordic®, see Figure 13c, which work in the 2.4 GHz ISM band. Another example comes from the chip CC1101 from Texas Instruments®, which work in the sub-1 GHz ISM bands [51]. The coverage range of these modules is quite high when using high-gain well-matched antennas at the maximum output power (up to 0 dBm for the nRF24L01+ at 2.4 GHz, and up to 11 dBm for the CC1101 at 915 MHz).
In the present work, we use the chip MRF49XA from Microchip [52] as transceiver, see Figure 13d. It can work in the 433, 868, and 915 MHz ISM bands. We choose the 915 MHz ISM band since, at this frequency, the RF device can be equipped by a small antenna. Moreover, this band is not populated. The chip employs FSK modulation, with a data rate ranging from 1.2 kbps to 256 kbps. The reception has an increased sensitivity of –110 dBm. The transceiver allows different sleep modes for a reduced overall current consumption. All of the above leads to robust enough wireless links to surpass multipath fading and interference.
Some external components and few extra signals from the ATMega328p are needed for designing a completely RF transceiver, see Figure 14a. Configuration is performed via the SPI interface. The RF interface (RFN and RFP pins of the chip) form an open-collector differential output of 9 + i 77 Ω impedance at 915 MHz. This in turn is the input impedance of the balun designed to feed a 50 Ω antenna, see Figure 14b.
In addition, the MRF49XA provides an analog output for determining the strength of the received signal, when the chip works as a receiver. This is the pin RSSIO, which stands for Received Signal Strength Indicator Output. This signal can be connected to any of the ADC ports of the microcontroller, say, the port PC3, see Figure 14c. The digital value of the RSSIO signal can be used for estimating the closeness of another transmitting node, and determine if that node is inside the contagion range.
The output power of a node working as a transmitter will have losses throughout its trajectory until it reaches the receiving antenna. In our case, the transmitting power is set at the lowest value of –17.5 dBm. Losses include the dispersion by the air interface, coupling losses, polarization losses, among many others [53] (§12.3), so that, at the end, the received power will be in the range of –100 dBm to –60 dBm. Determining the exact value of the received power in a radio link is difficult (not to say impossible) so that at most some estimations can be drawn. Nonetheless, by means of the voltage at the RSSIO pin of the transceiver, we can perform certain calibration processes to estimate distances. That is, we can measure the voltage in this pin in function of the distance to the receiving node under normal conditions in the scenario with pedestrians walking towards the entrance of the building or campus. The voltage corresponding to 2 m is used as a threshold. Thus, if the RSSIO voltage is below this threshold. it implies that the node is outside the contagion radio; otherwise, the nodes are effectively close to each other at a distance less than 2 m. This calibration can be performed to other radii for different infectious diseases. This calibration should agree with Figure 14c, in which the input power dBm on the horizontal axis is translated into distance.

7.3. Antenna Section

The antenna of the RF device is made of a single strand of 24 AWG wire (0.5106 mm diameter). Its length was experimentally determined by successively shortening the wire up to observing the resonance at f 0 = 915 MHz. This was performed with a vector network analyzer (VNA) MS46121B from Anritsu®. Resonance is determined from the scattering parameter s 11 , which corresponds to the reflection coefficient Γ = B / A at the input of the antenna. Here, B and A are amplitudes of the reflected and incident waves at the input port, respectively. The lower the value of Γ , the smaller the reflected power and the better the coupling of the antenna. This implies that most of the power supplied to the antenna will be radiated as electromagnetic waves. Similarly, in the reception mode, most of the received power will be transferred to the transceiver.
The measured values of s 11 ω as the frequency ω = 2 π f is swept over a given bandwidth are plotted on a Smith chart, see Figure 15a. The central point s 11 = 0 of this diagram represents the best coupling. Around this point, indicated by a gray disc in the chart, the coupling is optimal. On the contrary, the outer circle s 11 = 1 corresponds to the worst coupling since all of the energy is reflected. We determined two resonant lengths, namely, 1 = 10.3 cm and 2 = 25.8 cm, and the measured impedances are Z in = 37.858 + i 10.101 Ω and Z in = 46.405 + i 7.702 Ω, respectively. At 915 MHz, the strokes are closer to the central point associated with the Z 0 = 50 Ω, impedance at which the balun was designed. Figure 15b shows the same information but in a Cartesian plane. Resonance corresponds to the minimum reached by the curves, which lie in the gray stripe in the figure.

7.4. Battery Section

The power consumption W = I T V C C of the RF device is determined from its consumed current I T at the voltage V C C applied at its terminals. We measure the power consumption in the TX, RX, sleep modes. Let I μ C and I radio denote the current consumed by the microcontroller and the transceiver, respectively, thereby I T = I μ C + I radio . Table 5 and Table 6 show the results of the power consumption in TX mode, and RX and Sleep modes, respectively. The measures were taken with the RF device operating in a continuous form. The first column of Table 5 shows the available transmitting powers of the radio chip, being –17.5 dBm and 0 dBm the lowest and the highest available powers, respectively.
According to the results of the tables, at V C C = 3.3 V, the average current consumption of the microcontroller in TX mode is I μ C , TX = 4.37 mA; in RX mode, it is I μ C , RX = 4.1 mA; and, in sleep mode, it is I μ C , Sleep = 3.94 mA. These values agree with that specified in the datasheet of the ATMega328p [54], namely, I μ C , max = 5 mA @ 4 MHz, and V C C = 3 V. With respect to the transceiver, the average current consumption is I radio , TX = 13.6 mA and I radio , RX = 12.8 mA in TX and RX modes, respectively. No substantial changes are observed in TX or RX mode, and these values are below the typical value indicated in the datasheet of about 17 mA. However, a substantial reduction is observed in the sleep mode, with a current consumption of I radio , Sleep = 552 A.
The necessary energy for transmitting a chain of digital symbols during a time interval Δ t TX is calculated as follows [55]
E TX = W TX Δ t TX ,
where W TX is the power consumption in TX mode (see Table 5). Similarly, the formulas
E RX = W RX Δ t RX ,
E Sleep = W Sleep Δ t Sleep
give the necessary energy for receiving a chain of digital symbols during a time interval Δ t RX , and for keeping the RF device in the sleep mode during a time interval Δ t Sleep , respectively, where W RX and W Sleep are the corresponding power levels (see Table 6).
Assume a data rate of 100 kbps (which is well supported by the transceiver) in both the TX and RX mode, and assume a sequence of 100 Bytes (that take 8 ms at the considered data rate), then the energy consumption in both modes is:
E TX = 459.36 J , E RX = 446.16 J ,
where we have considered a transmission power of –17.5 dBm. The energy consumption of the RF device in the sleep mode during one second is
E Sleep = 14.85 mJ .
These raw data allow for choosing a suitable battery for feeding the RF device.
In this work, we have considered a LiPo (Lithium-ion Polymer) battery, due to the ease charging, and its small dimensions and weight, which contributes to its portability. For instance, the model DTP502535 [56] is a LiPo battery with a rated capacity of 400 mAh @ 3.7 V, see Figure 16a. The RF device can be fed with this voltage (indeed, the device can work well at the maximum rating voltage of 6 V). Moreover, the maximum rated current is 400 mA, which is more than enough for powering the RF device. The capacity of this battery allows approximately 11,598,746 uninterrupted transmissions and 11,941,904 uninterrupted receptions (of the order of 9.5 × 10 9 bits in both cases), and up to 365,432 s (about 101.5 h, a little more than four days) in the sleep mode continuously. A battery with a larger capacity will increase these estimations proportionally.
LiPo batteries, like the one considered, can be charged by inexpensive charging modules such as the Tp4056 module, see Figure 16b, which provides a USB port for plugging standard phone chargers.
The final assembly of the RF device is shown in Figure 17. This image does not show the battery and the charging module. The small size of the device allows keeping it in a small case that could be worn by the pedestrian. The hardware thus designed is not equipped with a real-time clock or a location mechanism. However, this information can be emitted by a beacon located at strategic locations, such as bus stations, subway entrances, parking lots, or any other location close to the entrance of the campus of the university or other important buildings. In this sense, our RF device is able to handle such information, and can transmit it to the sink node when available. Nonetheless, a more sophisticated design can be included with a real-time clock and a location mechanism, but its power consumption will be greater. For the sake of simplicity and lower power consumption, we opt for the RF device as shown in this work.

8. Numerical Results

We now discuss some of the relevant results of this study. First, we validate the Markov chain by comparing the average number of nodes per cluster using the real trajectories and the results obtained through the mathematical model. In Figure 18, we present these results for a different number of initial CHs and contagion radii. We can observe that the results of the model closely match the results of the real trajectories, lightly overestimating the number of nodes having a maximum difference of 0.6 nodes in the worst case. Hence, we believe that the model correctly predicts the behavior of the mobile clustering scheme and can be used to design and analyze contact tracing in other scenarios.
We further verify the accuracy of the mathematical model by calculating the packet success probability using Equation (12) and comparing it to simulation results. The simulation model consists of tracking each individual node and simulating the mobile clusters based on the protocol described in Section 4. Specifically, we choose the initial number of CHs (2, 3, 4, and 5) by randomly selecting the nodes in the system. Then, the selected CHs begin the beacon transmission. At this point, the system can be found in any of the possible operation scenarios previously described. Then, after all the clusters are found with a single CH and multiple CMs, the packet transmission procedure from CMs to CH begins. Whenever a CM successfully transmits its packet, it stops further transmissions. From this, the simulation counts the time where a single transmission occurs in order to find the success transmission probability (labeled as Real Walk) divided by the total operation time and is compared to the analytical results as shown in Figure 19.
From these results, we can see a good match between simulation and analytical results, especially for two and three initial CHs. In the case of four and five initial CHs, the analytical results slightly separate from the simulation results. The rationale of this is that the mathematical model does not consider the cases where clusters are broken and rebuild in case CH leaves and/or enters a different cluster. Even if we propose the appropriate rules for the mobile clustering protocol to react to these cases, the Markov chain only considers a normal operation situation where clusters are formed by a single CH and multiple CMs. However, the simulation considered all the operation time. As such, in the simulation results, the successful time is lower due to this forming and reforming time of clusters. This effect is further accentuated when the contagion range is increased since the CHs cover a higher area and is more probable to have multiple CHs inside a single cluster, causing higher reconfiguring times.
Now that the mathematical model is validated, and the system variables where the model is more accurate are identified, the following figures use the numerical results derived from the Markov chain and Equations (12) and (13). In Figure 20, we present the success, idle, and collision probabilities in a beacon period. From these results, it is important to note that the successful transmission probability achieves a maximum value when τ is in the range of 0.4 to 0.6. For lower values of τ , the idle (collision) probability is too high (low), while, for higher values, the collision (idle) probability increases (decreases). This is true for almost all values of the initial number of CHs and contagion range.
Another interesting observation is that the performance of the system in terms of these probabilities does not vary much for different radii, which can be explained by observing the dynamics of the pedestrian movement. Indeed, we observe that most of the pedestrians are close to each other and tend to remain together during the trajectories, closer than the minimum contagion range. As such, the number of nodes per cluster is not impacted by increasing the contagion range. We believe that this characteristic may be similar in other scenarios where people are walking to the entrance of another facility or building or subway station, where many people remain in the same range for long periods. However, in other cases, such as people walking in a commercial mall or a park, this characteristic may not be present. We leave this research line open for future works.
Finally, in Figure 21, we present the system performance of the mobile clustering scheme compared to the non-clustered system, i.e., where nodes transmit directly to the sink node. In this case, the sink is located at the entrance of the building. Hence, in the non-clustered system, when nodes enter the communication range of the sink node, they transmit with probability τ .
We can see that the mobile clustering scheme entails better performance than the non-clustered system, in terms of higher successful transmission and lower packet collision probability for almost all the cases investigated, proving the effectiveness of the proposed scheme.

9. Conclusions

In this work, we develop a mobile clustering protocol to efficiently provide contact tracing information for contagion contention purposes. We frame this work in the context of smart cities where smartphones of the population or specific communication devices actively share their information with a trusted authority. In a smart city environment, nodes and personal communication devices collaborate with the city administration to achieve common goals for the benefit of the residents and population in general. Since personal information (location and health status) is used to detect possible disease-spreading hot spots, the system has to be supervised and managed by a trusted health authority. The aforementioned system is mathematically modeled, studied, analyzed, and verified through simulation results. The model is accurate in most of the presented scenarios and system parameters. Hence, it can be used for system design in different scenarios than the ones presented in this work. In addition, we designed and constructed an RF capable device that could be used in closed communities, such as university campuses, governmental buildings, hospitals, and schools among others. We focused our research on pedestrians entering the university campus in order to have a controlled environment and obtain data in an expedited manner. However, the same methodology can be used for any other environment, such as commercial, leisure, cultural, and sports events, among others. For these other applications, the first step is to characterize the connection times among people given by the mobility pattern in each scenario, i.e., determine the probability density function of the connection times. In our case, we obtained a Hyper-Exponential distribution where all the parameters were obtained through visual observation. However, in a future work, these times can be obtained directly by the data generated by the Radio Frequency devices or the mobile phones performing the contact tracing application. Given these connection times, we can perform a similar mathematical analysis of the system in order to obtain preliminary/theoretical performance metrics by solving the corresponding Markov Chain. It is important to note that the mobile clustering scheme is independent of these connection times and can operate in any mobility scenario, since CHs and CMs are elected in a distributed manner and based on the number of nodes in the neighborhood. In a future work, we intend to determine the performance of the mobile clustering scheme in such alternative scenarios.
The use of these contact tracing tools will be fundamental in the efforts to control and reduce the impact of the COVID-19 pandemic and future pandemic to come. As such, it is important to have the mathematical and hardware tools to design and implement computational tools in a timely manner in emergency cases. As an additional feature of this work, the use of mobile clusters can be extended to many other applications such as traffic control in vehicular networks or vehicle tracing where also specific devices may be required. In smart city applications in conjunction with autonomous driving scenarios, it may provide a valuable tool for safety and data dissemination.

Author Contributions

Formal analysis, M.E.R.-A. and V.B.-F.; Investigation, M.E.R.-A., V.B.-F., Y.V.G.-T. and I.Y.O.-F.; Methodology, J.E.M.-T. and J.A.B.-S.; Resources, O.J.-R.; Software, J.E.M.-T. and O.J.-R.; Supervision, Y.V.G.-T., I.Y.O.-F. and J.A.B.-S.; Validation, M.E.R.-A., J.E.M.-T., Y.V.G.-T. and I.Y.O.-F.; Writing—original draft, M.E.R.-A., V.B.-F., Y.V.G.-T. and I.Y.O.-F. All authors have read and agreed to the published version of the manuscript.

Funding

This paper was partially supported by IPN SIP projects 20210438, 20211671, 20210307, and 20211607.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Krishnan, S.; Balasubramanian, T. Traffic flow optimization and vehicle safety in smart cities. Traffic 2016, 5. [Google Scholar] [CrossRef]
  2. Gupta, P.; Goyal, K.; Kanta, P.; Ghosh, A.; Singh, M.P. Novel 2019-Coronavirus on New Year’s Eve. Indian J. Med. Microbiol. 2019, 37, 459–477. [Google Scholar] [CrossRef]
  3. Worldometer COVID-19 Data Coronavirus Disease (COVID-19) Situation Report—8 February 2021, 22:26 GMT. Available online: https://www.worldometers.info/coronavirus/#countries (accessed on 1 March 2021).
  4. Asadi, S.; Bouvier, N.; Wexler, A.S.; Ristenpart, W.D. The coronavirus pandemic and aerosols: Does COVID-19 transmit via expiratory particles? Aerosol Sci. Technol. 2020, 54, 635–638. [Google Scholar] [CrossRef] [Green Version]
  5. Anderson, E.L.; Turnham, P.; Griffin, J.R.; Clarke, C.C. Consideration of the Aerosol Transmission for COVID-19 and Public Health. Risk Anal. 2020, 40, 902–907. [Google Scholar] [CrossRef]
  6. Setti, L.; Passarini, F.; De Gennaro, G.; Barbieri, P.; Perrone, M.G.; Borelli, M.; Palmisani, J.; Di Gilio, A.; Piscitelli, P.; Miani, A. Airborne Transmission Route of COVID-19: Why 2 Meters/6 Feet of Inter-Personal Distance Could Not Be Enough. Int. J. Environ. Res. Public Health 2020, 17, 2932. [Google Scholar] [CrossRef] [Green Version]
  7. Sharma, A.; Preece, B.; Swann, H.; Fan, X.; McKenney, R.; Ori-McKenney, K.; Saffarian, S.; Vershinin, M. Structural stability of SARS-CoV-2 virus like particles degrades with temperature. Biochem. Biophys. Res. Commun. 2021, 534, 343–346. [Google Scholar] [CrossRef]
  8. Chan, K.K.; Dorosky, D.; Sharma, P.; Abbasi, S.A.; Dye, J.M.; Kranz, D.M.; Herbert, A.S.; Procko, E. Engineering human ACE2 to optimize binding to the spike protein of SARS coronavirus 2. Science 2020, 369, 1261–1265. [Google Scholar] [CrossRef] [PubMed]
  9. Sagripanti, J.; Lytle, C.D. Estimated Inactivation of Coronaviruses by Solar Radiation With Special Reference to COVID-19. Photochem. Photobiol. 2020, 96, 731–737. [Google Scholar] [CrossRef] [PubMed]
  10. Darnell, M.E.; Subbarao, K.; Feinstone, S.M.; Taylor, D.R. Inactivation of the coronavirus that induces severe acute respiratory syndrome, SARS-CoV. J. Virol. Methods 2004, 121, 85–91. [Google Scholar] [CrossRef] [PubMed]
  11. Storm, N.; McKay, L.G.; Downs, S.N.; Johnson, R.I.; Birru, D.; de Samber, M.; Willaert, W.; Cennini, G.; Griffiths, A. Rapid and complete inactivation of SARS-CoV-2 by ultraviolet-C irradiation. Sci. Rep. 2020, 10, 22421. [Google Scholar] [CrossRef]
  12. Park, Y.; Choe, Y.; Park, O.; Park, S.; Kim, Y.; Kim, J.; Kweon, S.; Woo, Y.; Gwack, J.; Kim, S. Contact tracing during coronavirus disease outbreak, South Korea, 2020. Emerg. Infect. Dis. 2020, 26, 2465–2468. [Google Scholar] [CrossRef]
  13. Klinkenberg, D.; Fraser, C.; Heesterbeek, H. The effectiveness of contact tracing in emerging epidemics. PLoS ONE 2006, 1, e12. [Google Scholar] [CrossRef] [PubMed]
  14. Eames, K.T.; Keeling, M.J. Contact tracing and disease control. Proc. R. Soc. Lond. Ser. Biol. Sci. 2003, 270, 2565–2571. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  15. Quintero, M.J. Nothing Stops the Crowds in CDMX. Available online: https://www.jornada.com.mx/ultimas/capital/2020/11/29/nada-frena-las-aglomeraciones-en-la-cdmx-5571.html (accessed on 1 March 2021).
  16. Chile Suma 1.699 Casos de Covid-19 con Aglomeraciones en la Capital por Compras Navideñas. Available online: https://www.efe.com/efe/america/sociedad/chile-suma-1-699-casos-de-covid-19-con-aglomeraciones-en-la-capital-por-compras-navidenas/20000013-4425665 (accessed on 1 March 2021).
  17. Manawadu, L.; Gunathilaka, K.L.W.I.; Wijeratne, V.P.I.S. Urban Agglomeration and COVID-19 Clusters: Strategies for Pandemic Free City Management. Int. J. Sci. Res. Publ. 2020, 10, 769–775. [Google Scholar] [CrossRef]
  18. Why Has Coronavirus Affected Cities More than Rural Areas? Available online: https://www.economicsobservatory.com/why-has-coronavirus-affected-cities-more-rural-areas (accessed on 1 March 2021).
  19. Javeri, O.; Jeyakumar, A. Wireless Sensor Network Using Bluetooth. In Proceedings of the International Conference on Advances in Computing, Communication and Control, Mumbai, India, 28–29 January 2011. [Google Scholar] [CrossRef]
  20. Gajbhiye, S.; Karmakar, S.; Sharma, M.; Sharma, S. Bluetooth secure simple pairing with enhanced security level. J. Inf. Secur. Appl. 2019, 44, 170–183. [Google Scholar] [CrossRef]
  21. Wong, F.L.; Stajano, F.; Clulow, J. Repairing the Bluetooth Pairing Protocol. In Proceedings of the International Workshop on Security Protocols, Cambridge, UK, 20–22 April 2005. [Google Scholar] [CrossRef]
  22. COVID-19/Apps: Wikipedia. Available online: https://en.wikipedia.org/wiki/COVID-19_apps (accessed on 1 March 2021).
  23. WHO Coronavirus (COVID-19) Dashboard. Available online: https://covid19.who.int/ (accessed on 1 March 2021).
  24. Shanghai Offers Health QR Codes in Public Transport. Available online: www.xinhuanet.com/english/2020-02/25/c_138817911.htm (accessed on 6 April 2020).
  25. Contact Tracing in the Real World|Light Blue Touchpaper. Available online: https://www.lightbluetouchpaper.org/2020/04/12/contact-tracing-in-the-real-world/ (accessed on 15 April 2020).
  26. Tracetogether.Singapore Government. Retrieved 2 July 2020. Available online: https://www.tracetogether.gov.sg/ (accessed on 1 March 2021).
  27. Bhardwaj, N.; Khatri, M.; Bhardwaj, S.K.; Sonne, C.; Deep, A.; Kim, K. A review on mobile phones as bacterial reservoirs in healthcare environments and potential device decontamination approaches. Environ. Res. 2020, 186, 109569. [Google Scholar] [CrossRef] [PubMed]
  28. Anglemyer, A.; Moore, T.H.M.; Parker, L.; Chambers, T.; Grady, A.; Chiu, K.; Parry, M.; Wilczynska, M.; Flemyng, E.; Bero, L. Digital contact tracing technologies in epidemics: A rapid review. Cochrane Database Syst. Rev. 2020. [Google Scholar] [CrossRef]
  29. Hinch, R.; Probert, W.; Nurtay, A.; Kendall, M.; Wymant, C.; Hall, M.; Lythgoe, K.; Cruz, A.B.; Zhao, L.; Stewart, A.; et al. Effective Configurations of a Digital Contact Tracing App: A Report to NHSX Retrieved July; Pathogen Dynamics Group, Big Data Institute, Nuffield Department of Medicine, University of Oxford: Oxford, UK, 2020; Volume 23, p. 2020. [Google Scholar]
  30. Kiss, I.Z.; Green, D.M.; Kao, R.R. Disease contact tracing in random and clustered networks. Proc. R. Soc. Biol. Sci. 2005, 272, 1407–1414. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  31. Muller, J.; Kretzschmar, M.; Dietz, K. Contact tracing in stochastic and deterministic epidemic models. Math. Biosci. 2000, 164, 39–64. [Google Scholar] [CrossRef]
  32. Cho, H.; Ippolito, D.; Yu, Y.W. Contact tracing mobile apps for COVID-19: Privacy considerations and related trade-offs. arXiv, 2020; arXiv:2003.11511. [Google Scholar]
  33. Kleinman, R.A.; Merkel, C. Digital contact tracing for COVID-19. CMAJ 2020, 192, E653–E656. [Google Scholar] [CrossRef]
  34. Toy, A. Alberta’s Contact-Tracing App Only Works on iOS When Phone is Unlocked, App Running in Foreground. Available online: https://globalnews.ca/news/6898691/ab-trace-together-contact-app-alberta-covid-ios/ (accessed on 21 May 2020).
  35. Government Technology Agency (GovTech). TraceTogether—Behind the Scenes Look at Its Development Process; Government Technology Agency: Singapore, 2020; Available online: www.tech.gov.sg/media/technews/tracetogether-behind-the-scenes-look-at-its-development-process (accessed on 5 April 2020).
  36. Castelluccia, C.; Bielova, N.; Boutet, A.; Cunche, M.; Lauradoux, C.; Le Métayer, D.; Roca, V. ROBERT: ROBust and Privacy-presERving Proximity Tracing. hal-02611265. 2020. Available online: https://hal.inria.fr/hal-02611265/document (accessed on 18 May 2020).
  37. École Polytechnique Fédérale de Lausanne (EPFL). EPFL and ETH Zurich Advance Digital Contact Tracing Project (News Article); École Polytechnique Fédérale de Lausanne (EPFL): Lausanne, Switzerland, 2020; Available online: https://actu.epfl.ch/news/epfl-and-eth-zurich-advance-digital-contact-tracin/ (accessed on 25 April 2020).
  38. Kretzschmar, M.E.; Rozhnova, G.; Bootsma, M.C.; van Boven, M.; van de Wijgert, J.H.; Bonten, M.J. Impact of Delays on Effectiveness of Contact Tracing Strategies for COVID-19: A Modelling Study. Lancet Public Health 2020, 5, e452–e459. [Google Scholar] [CrossRef]
  39. Heinzelman, W.B.; Chandrakasan, A.P.; Balakrishnan, H. An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 2002, 1, 660–670. [Google Scholar] [CrossRef] [Green Version]
  40. Postorino, M.N.; Versaci, M. A Geometric Fuzzy-Based Approach for Airport Clustering. Adv. Fuzzy Syst. 2014, 2014, 201243. [Google Scholar] [CrossRef] [Green Version]
  41. Papoulis, A.; Saunders, H. Probability, Random Variables and Stochastic Processes; McGraw Hill: New York, NY, USA, 1994. [Google Scholar]
  42. Papadopolous, H.T.; Heavey, C.; Browne, J. Queueing Theory in Manufacturing Systems Analysis and Design; Springer: Berlin/Heidelberg, Germany, 1993. [Google Scholar]
  43. Rom, R.; Sidi, M. Multiple access Protocols: Performance and Analysis; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2012. [Google Scholar]
  44. Huo, H.; Xu, Y.; Bilen, C.C.; Zhang, H. Coexistence issues of 2.4 GHz sensor networks with other RF devices at home. In Proceedings of the 2009 Third International Conference on Sensor Technologies and Applications, Athens, Greece, 18–23 June 2009; pp. 200–205. [Google Scholar] [CrossRef]
  45. Iyer, V.; Hermans, F.; Voigt, T. Detecting and avoiding multiple sources of interference in the 2.4 GHz spectrum. In Proceedings of the European Conference on Wireless Sensor Networks, Porto, Portugal, 9–11 February 2015. [Google Scholar] [CrossRef] [Green Version]
  46. Park, J.-A.; Park, S.-K.; Kim, D.-H.; Cho, P.-D.; Cho, K.-R. Experiments on radio interference between wireless LAN and other radio devices on a 24 GHz ISM band. In Proceedings of the 57th IEEE Semiannual Vehicular Technology Conference, Jeju, Korea, 22–25 April 2003; pp. 1798–1801. [Google Scholar] [CrossRef]
  47. Kamerman, A.; Aben, G. Throughput performance of wireless LANs operating at 2.4 and 5 GHz. In Proceedings of the 11th IEEE International Symposium on Personal Indoor and Mobile Radio Communications, London, UK, 18–21 September 2000; pp. 190–195. [Google Scholar] [CrossRef]
  48. Sundaresan, S.; Feamster, N.; Teixeira, R. Measuring the performance of user traffic in home wireless networks. In Proceedings of the Passive and Active Measurement, New York, NY, USA, 19–20 March 2015. [Google Scholar] [CrossRef] [Green Version]
  49. Srisooksai, T.; Kaemarungsi, K.; Takada, J.; Saito, K. Radio propagation measurement and characterization in outdoor tall food grass agriculture field for wireless sensor network at 2.4 GHz band. Prog. Electromagn. Res. 2018, 88, 43–58. [Google Scholar] [CrossRef]
  50. Rawashdeh, M. RF 315/433 MHz Transmitter-Receiver Module and Arduino. Available online: http://volthauslab.com/datasheets/433Mhz-RF-tx-rx/RF-315433-MHz-Transmitter-receiver-Module-and-Ardu.pdf (accessed on 1 March 2021).
  51. Texas Instruments. CC1101, Low-Power Sub-1 GHz RF Transceiver. Datasheet. 2019. Available online: https://www.ti.com/lit/ds/symlink/cc1101.pdf?$ts=1615220724186$ (accessed on 8 March 2021).
  52. Microchip Technology Inc. MRF49XA ISM Band Sub-GHz RF Transceiver. Preliminary Datasheet 2009–2011. Available online: http://ww1.microchip.com/downloads/en/devicedoc/70590c.pdf (accessed on 8 March 2021).
  53. Roddy, D. Satellite Communications; McGraw-Hill, Inc.: New York, NY, USA, 2001. [Google Scholar]
  54. Atmel Corporation. 8-bit AVR Microcontrollers, ATmega328/P, Datasheet Complete. Datasheet. 2016. Available online: https://ww1.microchip.com/downloads/en/DeviceDoc/Atmel-7810-Automotive-Microcontrollers-ATmega328P_Datasheet.pdf (accessed on 8 March 2021).
  55. Hayt, W.H., Jr.; Kemmelly, J.E. Engineering Circuit Analysis; McGraw-Hill, Inc.: New York, NY, USA, 1993. [Google Scholar]
  56. Data Power Technology Limited. Polymer Li-ion Rechargeable Battery DTP502535. Datasheet 2015. 6 November 2015. Available online: https://cdn.sparkfun.com/datasheets/Prototyping/spe-00-502535-400mah-en-1.0ver.pdf (accessed on 1 March 2021).
Figure 1. Block diagram of the mobile clustering system.
Figure 1. Block diagram of the mobile clustering system.
Entropy 23 00326 g001
Figure 2. Pedestrian trajectories to access an indoor location.
Figure 2. Pedestrian trajectories to access an indoor location.
Entropy 23 00326 g002
Figure 3. System initialization in a closed community: A beacon signal is transmitted in order for nodes to wake up and select their role as either Cluster Head or Cluster Member as well as forming the mobile clusters.
Figure 3. System initialization in a closed community: A beacon signal is transmitted in order for nodes to wake up and select their role as either Cluster Head or Cluster Member as well as forming the mobile clusters.
Entropy 23 00326 g003
Figure 4. System normal operation: Once nodes have selected their role, Cluster Members transmit their packet to their associated CH which periodically transmit a beacon signal to maintain the clusters.
Figure 4. System normal operation: Once nodes have selected their role, Cluster Members transmit their packet to their associated CH which periodically transmit a beacon signal to maintain the clusters.
Entropy 23 00326 g004
Figure 5. Scenario 1: A single CH and multiple CMs.
Figure 5. Scenario 1: A single CH and multiple CMs.
Entropy 23 00326 g005
Figure 6. Scenario 2: Multiple CMs and no CH.
Figure 6. Scenario 2: Multiple CMs and no CH.
Entropy 23 00326 g006
Figure 7. Scenario 3: Multiple CHs and CMs.
Figure 7. Scenario 3: Multiple CHs and CMs.
Entropy 23 00326 g007
Figure 8. Virtual mobile clusters for the connection radius of 2.5 m.
Figure 8. Virtual mobile clusters for the connection radius of 2.5 m.
Entropy 23 00326 g008
Figure 9. Histogram of the connection times of nodes with a radius of 2.5 m.
Figure 9. Histogram of the connection times of nodes with a radius of 2.5 m.
Entropy 23 00326 g009
Figure 10. Hyper-exponential process.
Figure 10. Hyper-exponential process.
Entropy 23 00326 g010
Figure 11. Markov chain that models the mobile clustering scheme.
Figure 11. Markov chain that models the mobile clustering scheme.
Entropy 23 00326 g011
Figure 12. Stand-alone configuration for the ATMega328p.
Figure 12. Stand-alone configuration for the ATMega328p.
Entropy 23 00326 g012
Figure 13. Some commercial RF modules. (a) XBee module; (b) 433 MHz TX/RX modules; (c) NRF24L01+ transceiver; (d) MRF49XA transceiver.
Figure 13. Some commercial RF modules. (a) XBee module; (b) 433 MHz TX/RX modules; (c) NRF24L01+ transceiver; (d) MRF49XA transceiver.
Entropy 23 00326 g013
Figure 14. (a) Circuitry for the radio chip: C 2 C 4 , and C 8 are decoupling capacitors; (b) design of the balun for a 50 Ω antenna; (c) analog RSSI voltage provided by the chip as a function of power received by the antenna; the larger the receiving power, the shorter the distance of the transmitting node, and vice versa.
Figure 14. (a) Circuitry for the radio chip: C 2 C 4 , and C 8 are decoupling capacitors; (b) design of the balun for a 50 Ω antenna; (c) analog RSSI voltage provided by the chip as a function of power received by the antenna; the larger the receiving power, the shorter the distance of the transmitting node, and vice versa.
Entropy 23 00326 g014
Figure 15. Frequency response of the antenna: (a) parameter s 11 ω plotted on a Smith chart; (b) rectangular plot of s 11 ω .
Figure 15. Frequency response of the antenna: (a) parameter s 11 ω plotted on a Smith chart; (b) rectangular plot of s 11 ω .
Entropy 23 00326 g015
Figure 16. (a) LiPo Battery DTP502535; (b) charging module Tp4056.
Figure 16. (a) LiPo Battery DTP502535; (b) charging module Tp4056.
Entropy 23 00326 g016
Figure 17. (a) Top view of the RF device with the transceiver section and the antenna; (b) bottom view of the RF device with the microcontroller section.
Figure 17. (a) Top view of the RF device with the transceiver section and the antenna; (b) bottom view of the RF device with the microcontroller section.
Entropy 23 00326 g017
Figure 18. Average number of nodes per cluster: the hyper-exponential approach.
Figure 18. Average number of nodes per cluster: the hyper-exponential approach.
Entropy 23 00326 g018
Figure 19. Success probability for the hyper-exponential Markov chain with different number of mobile clusters.
Figure 19. Success probability for the hyper-exponential Markov chain with different number of mobile clusters.
Entropy 23 00326 g019
Figure 20. Success, idle and collision probabilities for the mobile clustering scheme.
Figure 20. Success, idle and collision probabilities for the mobile clustering scheme.
Entropy 23 00326 g020
Figure 21. Total registration process: success, idle, and collision probabilities.
Figure 21. Total registration process: success, idle, and collision probabilities.
Entropy 23 00326 g021
Table 1. Parameter values of the hyper-exponential distribution for two initial CHs.
Table 1. Parameter values of the hyper-exponential distribution for two initial CHs.
Radio μ 1 μ 2
2.50.0781.31
30.08081.33
3.50.070.2933
40.05660.168
Table 2. Parameter values of the hyper-exponential distribution for three initial CHs.
Table 2. Parameter values of the hyper-exponential distribution for three initial CHs.
Radio μ 1 μ 2
2.50.0640.2085
30.0580.1321
3.50.06080.0975
40.07220.0806
Table 3. Parameter values of the hyper-exponential distribution for four initial CHs.
Table 3. Parameter values of the hyper-exponential distribution for four initial CHs.
Radio μ 1 μ 2
2.50.0751.073
30.05890.1942
3.50.070660.1875
40.0590.091
Table 4. Parameter values of the hyper-exponential distribution for five initial CHs.
Table 4. Parameter values of the hyper-exponential distribution for five initial CHs.
Radio μ 1 μ 2
2.50.010260.1136
30.07380.1612
3.50.0790.079
40.0770.077
Table 5. Power consumption in TX mode at V C C = 3.3 V.
Table 5. Power consumption in TX mode at V C C = 3.3 V.
TX Power I radio I μ C I T W
(dBm)(mA)(mA)(mA)(mW)
015.24.419.664.68
−2.514.24.618.862.04
−5.013.94.318.260.06
−7.513.54.017.557.75
−10.513.34.217.557.75
−12.513.04.417.457.42
−15.012.94.517.457.42
−17.512.84.617.457.42
Table 6. Power consumption in RX and sleep modes at V C C = 3.3 V.
Table 6. Power consumption in RX and sleep modes at V C C = 3.3 V.
I radio I μ C I T W
(mA)(mA)(mA)(mW)
Reception mode
12.84.116.955.77
Sleep mode
0.5523.944.514.85
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Rivero-Angeles, M.E.; Barrera-Figueroa, V.; Malfavón-Talavera, J.E.; García-Tejeda, Y.V.; Orea-Flores, I.Y.; Jiménez-Ramírez, O.; Bermúdez-Sosa, J.A. Mobile Clustering Scheme for Pedestrian Contact Tracing: The COVID-19 Case Study. Entropy 2021, 23, 326. https://doi.org/10.3390/e23030326

AMA Style

Rivero-Angeles ME, Barrera-Figueroa V, Malfavón-Talavera JE, García-Tejeda YV, Orea-Flores IY, Jiménez-Ramírez O, Bermúdez-Sosa JA. Mobile Clustering Scheme for Pedestrian Contact Tracing: The COVID-19 Case Study. Entropy. 2021; 23(3):326. https://doi.org/10.3390/e23030326

Chicago/Turabian Style

Rivero-Angeles, Mario E., Víctor Barrera-Figueroa, José E. Malfavón-Talavera, Yunia V. García-Tejeda, Izlian Y. Orea-Flores, Omar Jiménez-Ramírez, and José A. Bermúdez-Sosa. 2021. "Mobile Clustering Scheme for Pedestrian Contact Tracing: The COVID-19 Case Study" Entropy 23, no. 3: 326. https://doi.org/10.3390/e23030326

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop