Hierarchical Analysis and Control of Epidemic Spreading over Networks using Dissipativity and Mesh Stability
Abstract
Analyzing and controlling spreading processes are challenging problems due to the involved non-linear node (subsystem) dynamics, unknown disturbances, complex interconnections, and the large-scale and multi-level nature of the problems. The dissipativity concept provides a practical framework for addressing such concerns, thanks to the energy-based representation it offers for subsystems and the compositional properties it provides for the analysis and control of interconnected (networked) systems comprised of such subsystems. Therefore, in this paper, we utilize the dissipativity concept to analyze and control a spreading process that occurs over a hierarchy of nodes, groups, and a network (i.e., a spreading network). We start by generalizing some existing results on dissipativity-based topology design for networked systems. Next, we model the considered spreading network as a networked system and establish the dissipativity properties of its nodes. The generalized topology design method is then applied at multiple levels of the considered spreading network to formulate its analysis and control problems as Linear Matrix Inequality (LMI) problems. We identify and enforce localized necessary conditions to support the feasibility of the LMI problem solved at each subsequent hierarchical level of the spreading network. Consequently, the proposed method does not involve iterative multi-level optimization stages that are computationally inefficient. The proposed control solution ensures that the spreading network is not only stable but also dissipative and mesh-stable (i.e., it also minimizes the impact and propagation of disturbances affecting the spreading network). Compared to conventional methods, such as threshold pruning and high-degree edge removal, our approach offers superior performance in terms of infection containment, control efficiency, and disturbance robustness. Extensive numerical results demonstrate the effectiveness of the proposed technique.
Index Terms—Dissipativity-Based Control, Spreading Processes, Epidemics Control, Spreading Networks Design.
I Introduction
Studying epidemic spreading processes over interconnected systems is crucial for multiple domains, including epidemiology, social services, and healthcare systems. In terms of underlying dynamics, the spreading processes of information and opinions that occur in computer networks and social systems also take a very similar form. Therefore, understanding how infections propagate across multiple groups in a network–due to nodes in those groups having some inter-group interconnections–is crucial for designing effective control mechanisms to prevent undesirable outbreaks by preventing such interactions. Typically, these systems are modeled as graphs where nodes represent entities (e.g., individuals, households, communities, etc.), and edges denote interactions through which the spreading process occurs. Recent research has highlighted the importance of modeling such processes in a hierarchical manner, particularly when dealing with large-scale multi-level networks such as local, regional, and global spread of epidemics [??]. However, designing control strategies for these networks is challenging due to the presence of nonlinear node dynamics, unknown disturbances, complex interconnections, and their inherently large-scale multi-level nature.
Traditional control techniques for spreading networks generally focus on modifying the network topology to mitigate infection levels or enhance robustness. Some work also investigate acceleration of local healing (recovery) rates. Two commonly employed methods are threshold pruning and high-degree edge removal. Threshold pruning aims to eliminate inter-group connections exceeding a specified threshold, thus removing the most impactful pathways for infection spread. High-degree edge removal, on the other hand, targets nodes with high inter-group connectivity and eliminates their outgoing connections, thereby limiting the influence of highly connected nodes [??]. Despite their practical appeal, these methods are typically heuristic and fail to adequately account for the complex dynamics and external disturbances present in real-world systems. Additionally, such approaches are often static and do not offer guarantees regarding the stability or robustness of the network under varying conditions.
Dissipativity theory provides a powerful alternative framework for analyzing and controlling networked systems. Unlike conventional methods that rely on heuristic pruning strategies, dissipativity offers a systematic approach to evaluating the energy transfer properties of systems, which can be directly related to stability and robustness criteria. By using an energy-based representation of subsystems, dissipativity theory facilitates a compositional approach to the analysis and design of large-scale systems. It has been successfully applied to various networked control problems, including consensus, synchronization, and disturbance rejection [??]. However, its application to epidemic spreading control remains largely unexplored. In this paper, we propose a dissipativity-based framework for the analysis and design of spreading networks. Our approach models the spreading network as a hierarchical system with disturbance inputs and performance outputs, enabling the use of robust networked systems techniques in a scalable manner. The proposed method provides stability and robustness guarantees through dissipativity conditions formulated as Linear Matrix Inequality (LMI) problems, allowing for efficient computation and practical implementation.
Our contributions can be summarized as follows.
-
1.
We model epidemic spreading processes as hierarchical networked systems with disturbance inputs and performance outputs, enabling the application of robust networked systems techniques in a scalable manner.
-
2.
We derive dissipativity properties of the nodes under disturbances in epidemic spreading processes, enabling the analysis of dissipativity of any group of such nodes and, subsequently, of any network of such groups and beyond.
-
3.
Going beyond the analysis of spreading networks, we propose a systematic spreading network design technique (to ensure stability and robustness via dissipativity) with soft and hard constraints on deviations from a given nominal interconnection network.
-
4.
The proposed approach does not involve solving iterative multi-level optimization problems as we include specifically designed necessary conditions to support the feasibility of the optimization problem solved in each subsequent layer. All optimization problems take the form of LMI problems, hence convex, and can be solved using existing software toolboxes.
-
5.
While we propose a very generalized approach, we provide clear implementation details and extensive numerical results showcasing the benefits of the proposed method and comparing it with basic spreading network control methods.
This paper is structured as follows. Section II provides necessary preliminary results on dissipativity and networked systems. Section III presents the spreading network dynamics and formulates the analysis and control (design) problems. The proposed dissipativity-based analysis and control techniques are detailed in Section IV. Simulation results and conclusions are given in Sections V and VI, respectively.
II Preliminaries
In this section, we provide some preliminary results that will be utilized in the remainder of this paper.
II-A Notations
We use and to denote sets of real and natural numbers, respectively. For any , we define . An block matrix is denoted as or as ). We consider and to be a block row matrix and a block diagonal matrix, respectively. and respectively denote zero and identity matrices (their dimensions will be clear from the context). A symmetric positive definite (semi-definite) matrix is denoted by . We use the symbol to represent conjugate matrices in symmetric matrices (their meaning will be clear from the context). We also define , as the indicator function and . The notations and denote respective class- functions [1]. We use to denote the Euclidean (spectral) norm of a vector (matrix), and to denote any standard norm (note ). For a time-varying vector (i.e., a signal) , and norms are given by and , respectively. , denotes the maximum and minimum eigenvalues of a matrix.
II-B Dissipativity
Consider the non-linear dynamical system described by
(1) | |||
where , and denote the state, input and output, respectively. Functions and are continuously differentiable, and satisfy and .
Definition 1
The system (1) is called dissipative under supply rate if there is a continuously differentiable storage function such that when , , and
,
for all trajectories of the system.
Based on the used supply rate , the dissipativity property can be specialized. The -dissipativity property (also known as -dissipativity in the literature), defined in the sequel, uses a quadratic supply rate determined by a coefficient matrix [2].
Definition 2
The system (1) is -dissipative if it is dissipative under the quadratic supply rate function:
The notion of -dissipativity captures several well-known properties of interest [3], as outlined in the following remark.
Remark 1
If the system (1) is -dissipative with:
-
1.
, then it is passive;
-
2.
, then it is strictly passive ( and are the input and output passivity indices, denoted as IF-OFP());
-
3.
, then it is -stable ( is the -gain, denoted as ).
II-C Node Dissipativity
Consider a scalar dynamic system described by (for known and fixed ):
(2) | ||||
where , and .
Proposition 1
The system (2) is -dissipative for any that satisfies the LMI problem:
(3) | ||||
Proof:
Note that, in this proof, we omit denoting the dependence on time of variables and for notational convenience. As is an equilibrium point of (with and ), we consider a quadratic storage function and a quadratic supply rate function defined as V(x) = 12 p x^2 and s(u,y) = [u y]^⊤[a bb c] [u y], respectively, where and are design variables. For -dissipativity of the system , we require ˙V(x) ≤s(u,y) ⇔0 ≤Φ(u,x) ≜s(u,x) - ˙V(x) to hold for all possible trajectories of the system. Using with (2), can be expressed as
Since , we get where ¯Φ(u,x) ≜au^2 + ((2b-p) + px)xu + (c + p(¯γ-δ))x^2. Therefore, we need to identify the conditions to ensure .
To this end, note that , and . Therefore, it is clear that we require and . Now, let us define Ψ_x(u) ≜¯Φ(u,x) ≡au^2 + ¯bu + ¯c, where , , and .
First, let us consider the case , for which is a convex quadratic function in for a given . Let be the unconstrained minimizer of for a given . Using the convexity and , we get u^* = -¯b2a and Ψ_x(u^*) = -¯b24a + ¯c. Note that, if , the convexity of and automatically implies that . On the other hand, if , we then require enforcing to guarantee . Using the and expressions, these requirements translate to: If , then , or and . Finally, for the case , with . Therefore, if , we require to ensure . In all, we require and {a≥0, ¯b≥0, or a¿0,¯b≤0,4a¯c-¯b2≥0.
Recall that , and . Therefore, , and . Further,
Furthermore,
Using these equivalences, we can arrive at the requirements as and
which leads to (3) using the Schur complement. ∎
Based on Prop. 1 and Rm. 1, the following corollary can be established regarding the passivity of the system (2).
Corollary 1
The system (2) with is passive, and also IF-OFP() with and .
II-D Networked System Dissipativity
Consider a networked system as shown in Fig. 1 comprised of subsystems with an input (disturbance) and an output (performance). Each subsystem follows the dynamics
(4) | ||||
where , and denotes the state, input and output, respectively, and and . The subsystems are interconnected according to the relationship
(5) |
where and are vectorized subsystem inputs and outputs, respectively, and the interconnection matrix.

In the context of this paper, we require the following simplifying assumption regarding the dissipativity properties of the subsystems.
Assumption 1
Each subsystem (4) is -dissipative (from input to output ) where is such that .
In the following proposition, subsystem dissipativity properties are used to design the interconnection matrix so that the networked system is dissipative.
Proposition 2
(7) |
(8) |
If the interconnection matrix is constrained so that
(9) |
the following corollary can be used to design the remaining interconnection matrix block so that the networked system is dissipative.
Corollary 2
II-E Subsystem Dissipativity
Note that the feasibility of the network-level LMI problem presented in Prop. 2 (or Co. 2) depends on the used subsystem dissipativity properties . Often, such subsystem dissipativity properties result from subsystem-level LMI problems. Therefore, it is worth identifying any necessary conditions required of subsystem dissipativity properties to help the feasibility of the network-level LMI problem, as they can be enforced at such subsystem-level LMI problems. In the following proposition, we identify such necessary conditions to help the feasibility of the network-level LMI problem (10) given in Co. 2 for the possible inclusion in subsystem-level LMI problems.
Proposition 3
For the feasibility of the network-level LMI problem (10) given in Co. 2, it is necessary that each subsystem is -dissipative such that satisfies the LMI problem:
Find: | (11) | |||
Sub. to: |
where is as defined in (12), each is a free variable matrix with the format of the th diagonal block of in (6), and is the -th diagonal block of that describes the self-connection matrix of the subsystem .
Proof:
For the block matrix given in (8), the equivalence Φ¿ 0 ⇔¯Φ ≜[[Φ_kl^ij]_k,l∈N_4]_i,j∈N_N ¿ 0 holds, where is the “block element-wise” permutation [4] of . Using the diagonal blocks of , we can identify a set of necessary conditions for as Φ¿ 0 ⇔¯Φ ¿ 0 ⟹{ ¯Φ_ii ¿ 0, ∀i∈N_N}, where each takes the form in (13). Note that, the implication M_uy = (X_p^11)^-1 L_uy ⟹M_uy^ii = p_i^-1(X_i^11)^-1L_uy^ii, ∀i∈N_N, has also been used to replace terms in deriving (13). Finally, we use the equivalence ¯Φ_ii ¿ 0 ⇔~Φ_ii ≜1pi¯Φ_ii ¿ 0, and the notation divide the matrix in (13) by to obtain (12). ∎
(12) |
(13) |
Remark 2
To include the identified necessary condition (11) in the subsystem-level LMI problem solved at the subsystem (to find its dissipativity ), it is required to know the self-connection matrix . As we will see in the sequel, this information is known and fixed at the “subsystems” considered in the spreading networks application studied in this paper.
Remark 3
A further simplified necessary condition than (11) can be obtained if the matrices and (i.e., subsystem and network level dissipativity measures) are limited to be scalar matrices, over all and . The idea is to reapply the diagonal block extraction and “block element-wise” formulation technique used in Prop. 3, for (11). Note that this simplification will be further significant if is a zero matrix or has a zero in its diagonal.
II-F Constraints
When designing an interconnection matrix for a networked system, instead of designing it from scratch, it is often required to minimize (or constrain) deviations from an existing interconnection matrix . However, including such an objective (or constrain) in the design techniques presented in Prop. 2 and Co. 2 makes the problem bilinear due to the involved change of variables, typically of the form where and are the actual design variables. Nevertheless, there are some approximate strategies that we can use.
Consider an objective function of the form
which leads to
This motivates an objective function of the form:
with for the design problems.
On the other hand, consider a scenario where we require the designed interconnection matrix to be constrained with respect to the nominal so that
(14) |
holds where represents the allowed deviation from the nominal values. If the involved matrix norm above is the 2-norm (i.e., the matrix spectral norm, a.k.a., the largest singular value), we can obtain an equivalent condition as
The last two steps above result from the Schur complement and congruence techniques. Note that the final result is a bilinear matrix inequality in design variables due to the involved term. However, a necessary condition for (14) can be obtained as
using the fact that, for any matrix ,
Finally, reapplying the Schur complement technique, we get
(15) |
Once a candidate solution for the design variables are known, as (15) is linear in , it can then be used to update the initial choice of . If such updates are executed iteratively, desired convergence condition is .
Now, if the constraint (14) is element-wise, i.e.,
where , we can obtain an equivalent condition as
when and is diagonal.
II-G Scalable Mesh Stability
Enforcing dissipativity in a networked system ensures the dissipation of disturbances. In contrast, enforcing scalable mesh stability (SMS), as defined below, ensures the dispersion of the disturbances over the network.
For this discussion, let us consider the networked system shown in Fig. 1 under the constraints (9). In this setting, each subsystem (4) can be described by (with a slight abuse of notation)
(16) |
were and denotes the set of neighbors of each subsystem .
Definition 3
Definition 4
Proposition 4
The following proposition provides the additional conditions that should be included in the networked system design problem so as to ensure the SMS property. However, we require the following slightly stronger assumption than As. 1 regarding the nature of the subsystem dissipativity.
Assumption 2
Each subsystem (16) is -dissipative (from input to output ) where is such that , and the corresponding storage function is where .
Proposition 5
Proof:
Compared to Co. 2, here we only have to establish the SMS property for the networked system. Note that we will omit explicitly denoting the time dependence of variables for notational convenience.
According to As. 2, as each subsystem is -dissipative, we have
(18) |
where we select and so that
(19) |
Moreover, as each subsystem has a quadratic storage function of the form , we have
(20) |
Applying (20) in (18) leads to
(21) |
where we define and . Note that (21) implies that
(22) |
where we have further used the fact and (20). Using (20) and the definitions of and , (22) implies
which, using the fact that , leads to
(23) |
We will next bound the term . Using the relationship , we get
Applying this result in (23) gives
(24) | ||||
where ~λ_i1 ≜λ(Ri)λ(Pi)λ(Pi)λ(Qi) and ~λ_i2 ≜λ(Pi)λ(Pi).
Based on Prop. 4 and Def. 3, the networked system to be SMS, we require the existence of functions and such that —x_i(t) —≤β_i(—x_i(t_0)—, t-t_0) + ~γ max_j∈N_N ∥x_i ∥_∞+ σ_i(∥w_i ∥_∞), for all where is a scalar . Comparing this with (24) we can obtain the condition for the SMS of the networked system as
Finally, under the change of variables relationship, M_uy≜(X_p^11)^-1 L_uy ⇔M_uy^ij = (p_iX_i^11)^-1 L_uy^ij, ∀i∈N_N, the condition for the SMS of the networked system becomes
(25) |
∎
III Problem Formulation
III-A Spreading Network
Consider an epidemic spreading over a network consisting of groups denoted by . Each group can be represented by an open graph , where vertices represent the nodes, edges represent the epidemic spreading interactions between the nodes, and is the total number of nodes in the group .
For a group , an intra-group transmission matrix is used to contain all the transmission rate values corresponding to the node interactions within the group. In particular, having a positive transmission rate value implies the existence of a directed edge , indicating that node can infect the node , where (allowing self-infections, i.e., ) and . Clearly, the intra-group transmission matrix fully defines (implies) the epidemic spreading interactions within the group .
Extending this notion of intra-group transmission matrices, we define inter-group transmission matrices to contain transmission rate values corresponding to node interactions across different groups. For example, the inter-group transmission matrix , represents the spreading interactions directed from the nodes in the group towards the nodes in the group where and . In particular, having a positive transmission rate value implies the existence of a global directed edge , indicating that node can infect the node , where and with .
The network Susceptible-Infected-Susceptible (SIS) model is used to model the dynamics of the infected proportion (also called the “state”) in each node , as
(26) |
where is the total recovery rate and is the external infection effect (also called the “input”). In particular, , where is the mean recovery rate and accounts for the uncertainty/modeling errors in the recovery rate so that (both and are assumed as known and fixed, and satisfies ). On the other hand, in (26), is defined as
(27) |
and is a disturbance input that accounts for modeling errors related to transmission rates.
III-B Networked System Representation
The considered spreading network (26)-(27) can be viewed as a networked system, more precisely, as a hierarchy of networked systems, as shown in Fig. 2.
To see this, we first split the input in (27) into local and global components, respectively denoted by and , as
where is defined using the intra-group interactions as
(28) |
and is defined using the inter-group interactions as
(29) |
We next vectorized (28) over to obtain
(30) |
where and are the vectorized local input and state of the group , respectively. Subsequently, the vectorized version of (29) over can be obtained as
(31) |
where and are the vectorized global input and disturbance of the group , respectively. We also define
as the vectorized total input of the group .
Each group now can be seen as a networked system (see Fig. 1), comprised of the nodes interconnected according to the interconnection matrix
(32) |
where the external input is and the output is .
Next, we continue vectorizing (31) over , to obtain
where , and are the vectorized global input, state and disturbance, respectively, and with is the transmission matrix representing all inter-group interactions over the spreading network.
Finally, we can view the spreading network as a networked system (see Fig. 1), comprised of the groups interconnected according to the interconnection matrix
(33) |
where the external input is that represents disturbances due to unmodeled dynamics, and the output is that acts as a performance input for the spreading network.

Problem
Our goal is to determine a set of optimal alterations for the inter-group interconnections (i.e., ) to ensure the stability and robustness of the infections-free state (i.e., ) for the spreading network. In this pursuit, we also provide recommendations for improving inter-group interactions (i.e., ), if it is imperative to achieving stability and robustness of the infections-free state for the spreading network.
IV Dissipativity-Based Solution
IV-A Dissipativity Analysis and Design
We begin by establishing the dissipativity properties of the nodes.
Lemma 1
Each node (26) in the spreading network is -dissipative (from to ) where is given by LMI problem:
(34) | ||||
Proof:
Next, we use the established node dissipativity properties to identify the group dissipativity properties.
Lemma 2
Proof:
Using the networked system representation (32) of each group , for its -dissipativity analysis, we can apply Co. 2. To this end, we first verify that As. 1 holds for each group as dissipativity properties of each node identified in Lm. 1 satisfies . Next, we introduce an extra constraint for the design variable in Co. 2 as as Co. 2 is originally intended for design problems (not for analysis problems). Consequently, we can obtain (35). ∎
Next, we use the established group dissipativity properties to optimize the inter-group interconnections to ensure (or optimize) the dissipativity of the spreading network.
Lemma 3
The spreading network shown in Fig. 2 can be made -dissipative (from input to output ) where , by designing the interconnection matrix via the LMI problem
Find: | (36) | |||
Sub. to: |
where is as defined in (43), for any is defined using the known group dissipativity properties as , , , shares the structure of , and .
Proof:
Based on the networked system representation (33) of the spreading network , to synthesize its interconnection matrix to ensure/optimize its -dissipativity, we can apply Co. 2. In this pursuit, we first verify that As. 1 holds for as dissipativity properties of each group identified in Lm. 2 satisfies . Consequently, starting from (10), we can obtain (36). ∎
When designing the interconnection matrix , to optimize the deviations from a given nominal interconnection matrix (i.e., to optimize ), in the LMI problem (36), one can use an objective function of the form
(37) |
with some scaling coefficients . While the first two terms aim to minimize the deviations from the nominal interconnection matrix, the last term ensures the rate of the stored energy is minimized.
On the other hand, when the designed interconnection matrix needs to be constrained with respect to a given nominal interconnection matrix so that one can include an additional LMI constraint in the LMI problem (36) as
(38) |
with some (e.g., , or ideally, ). Note also that, in the above proposed LMI constraint, can be treated as a design variable to be minimized.
If the matrix takes a diagonal form (i.e., if each is diagonal), an element-wise version of the above constraint can be enforced by including the LMI constraint
(39) |
in the LMI problem (36).
IV-B Supporting Feasibility with Necessary Conditions
The following lemma presents a necessary condition to be included in each node dissipativity analysis to support the feasibility of the corresponding group dissipativity analysis.
Lemma 4
At each group , for the feasibility of its -dissipativity analysis problem (in Lm. 2), a necessary condition that can be enforced at each node in its -dissipativity analysis problem (in Lm. 1, ) is the feasibility of the LMI problem:
Find: | (40) | |||
Sub. to: |
where shadows (recall that each is the th diagonal element of in (35)), and is the -th diagonal element of .
Proof:
The following lemma presents a necessary condition to be included in each group dissipativity analysis to support the feasibility of the spreading network design.
Lemma 5
For the feasibility of -dissipative spreading network design problem (in Lm. 3), a necessary condition that can be enforced at each group in its -dissipativity analysis problem (in Lm. 2) is the feasibility of the LMI problem:
Find: | (41) | |||
Sub. to: |
where shadows (recall that each is the th diagonal block of in (35)).
Proof:
(42) |
(43) |
IV-C Overall Process
Combining the above results, we provide the following unified theorem to outline the overall task of designing a dissipative spreading network.
Theorem 1
Given the node recovery rate information, intra-group interconnections and nominal inter-group interconnections, we can enforce the spreading network to be be -dissipative by designing the interconnection matrix following the process outlined in Alg. 1.
Proof:
Problem
Find: | (44) | |||
Sub. to: |
Problem
Problem
(46) | ||||
Sub. to: | ||||
where is as defined in (43).
Remark 4
While we have only provided the theoretical result for the design of a dissipative spreading network, the same result can be used for dissipativity analysis of the spreading network given the inter-group interconnections. The approach is analogous to how we analyzed dissipativity of individual groups using the dissipativity-based topology design result in Pr. 2 at the group level given the intra-group interconnections.
Remark 5
The proposed framework’s ability to conduct both dissipativity analysis and dissipative design is beneficial as we can use it to reconfigure intra-group interconnections if a group is not sufficiently dissipative compromising the performance of the spreading network. Moreover, the same capability will play a major role when there are higher layers beyond the network level (e.g., a network of networks layer) in the considered spreading network.
V Simulation Results
To provide operational details and showcase the benefits of the proposed dissipativity-based spreading network design technique, we implement it along with several of its variants and two standard techniques for a randomly generated spreading network. In particular, we report the variation of the average infection level observed under different design methods over an extended period where different disturbances were injected into the spreading network. We also report the percentage reductions in the inter-group interconnections exercised by different design methods to measure the exerted spreading network design effort.
V-A Considered Spreading Network
As shown in Fig. 3(a)-3(b), the considered spreading network consists of four groups with nodes, respectively. The mean recovery rates (i.e., ) for the nodes were selected from the uniform random distribution in the interval . The recovery rate deviation bound (i.e., ) was set as of the selected recovery rate at each node. The initial infection level for each node was selected from the uniform random distribution in the interval .
The intra-group interconnections were created randomly with a probability of for any node pair in a group, and the interconnection levels were selected from the uniform random distribution in the interval . While we made no assumption regarding the group connectivity (like strong connectivity), we scaled down the intra-group interconnections to ensure group stability of the infections-free state when isolated from other groups. This scaling was done only to create an ideal reference behavior to compare with other spreading network design methods. On the other hand, the inter-group interconnections were created randomly with a probability of for any node pair in the spreading network, and the interconnection levels were selected from the uniform random distribution in the internal without any scaling.
The disturbance input (i.e., ) affecting each node was chosen to include four distinct components, each active during specific time windows and triggered asynchronously at different nodes: a brief, low-amplitude sinusoidal fluctuation during , a step offset during , a toggling component during , and mild random noise added during . These short-lived perturbations combine to create a rich disturbance profile to evaluate the different design approaches.
We simulated this spreading network under different inter-group interconnection configurations given by different spreading network design methods, including the two cases where we used none of and all of the original inter-group interconnections. The observed variations of the average infection level (fraction) of the spreading network over a period are shown in Fig. 4. Notice that when no inter-group interconnections are used, by design, the spreading network stabilizes to the infections-free state very rapidly overcoming all disturbance conditions. However, when there are inter-group interconnections, the spreading network does not stabilize to the infections-free state. Hence these two average infections profiles provide the best and worst case scenarios for the spreading process to compare other spreading network design methods.
V-B Dissipativity-Based Design
We implemented the proposed dissipativity-based spreading network design method as follows. First, each node was considered to be IF-OFP() (see Rm. 1), and hence, the problem was solved by setting and optimizing for decision variables and , representative of the passivity indices and , respectively. As we plan to establish similar IF-OFP properties at the group level, in problem , we also set and included and as decision variables. Overall, when solving the problem , we optimize the objective function to identify the maximum feasible node passivity indices while helping to establish similarly high passivity indices at the group level.
Next, each group was considered to have a vectored IF-OFP property, and hence the problem was solved by setting and optimizing for diagonal matrices (decision variables) and . As we plan to establish the network L2G() (see Rm. 1), in problem , we also set , and and include as a decision variable. Overall, when solving the problem , we optimize the objective function to identify maximum feasible group passivity indices while helping to achieve lowest possible gain values for the spreading network.
Finally, we set out to design the inter-group interconnections in the spreading network to make it L2G(), i.e., finite-gain stable with a gain . For this, the problem was solved by setting , and , and optimizing for and as decision variables. In particular, when solving problem , we optimized the objective function:
subject to a limit on the fractional deviation allowed for the magnitude of any inter-group interconnection level, i.e.,
In the baseline dissipativity-based design approach, we used the problem parameters and . For comparison purposes, we also evaluate the dissipativity-based design for (effectively, ) and . Henceforth, these dissipativity-based methods are denoted as DissBC(), e.g., the baseline dissipativity-based method is denoted as DisBC().
V-C Threshold and Degree Based Methods
To compare the performance of the dissipativity-based spreading network designs, we also examine two basic, practical spreading network design methods (see also [6]). The first approach prunes inter-group interconnections with weights beyond a given threshold . By removing the strongest inter-group links, this method reduces the most impactful pathways for disease propagation. Henceforth, this threshold-based approach is denoted as TBC(). The second approach identifies the top fraction of the nodes in terms of their inter-group out-degree and removes all their outgoing connections to nodes in other groups. By isolating these highly connected nodes, this method limits the spread of epidemics through critical inter-group links. Henceforth, this degree-based approach is denoted as DegBC().
To make the comparison of different spreading network design methods fair, we first identified a “design effort” metric:
representing the average fractional cutdown of the interconnections, observed under each method. The baseline DissBC() method observed an average fractional cutdown of , and hence the parameters and respectively of TBC() and DegBC() methods were tuned to achieve the similar level. The resulting parameters were and .
V-D Results
Based on the reported average infection levels in Fig. 4, the baseline DissBC() method provided the closest behavior to the best case (i.e., the case without interconnections). The TBC() and DegBC() methods while achieved stability, were considerably slow to respond to various disturbances. This effectiveness of the proposed DissBC() method can be attributed to the systematic dynamics-aware LMI-based design process, which optimally tailors the inter-group interconnections while optimizing the a robust stability measure.
As stated in Rm. 4, the proposed dissipativity-based spreading networks design approach can also be used to analyze the dissipativity of a given spreading network. Consequently, it can be used to analyze the gain level of any given spreading network. We used this level as a performance metric besides the time-averaged infection level (fraction)
and the average interconnection reductions fraction as measures of performance when comparing different spreading network design methods. The observed performance metrics are summarized in Tab. I.
Based on Tab. I, it is clear that the dissipativity-based spreading network design have superior (i.e., lower) gain levels compared to other methods. In particular, DissBC() (i.e., when and thus, when the design objective is effectively ) has obtained the lowest value, at . Interestingly, as can be seen in Figs. 5(a) and 5(c), the average reduction of interconnections in this DissBC() case is also the lowest, at . This implies that it is not necessary to reduce interconnections significantly to obtain guaranteed theoretical robust stability measures.
Based on both Fig. 4 and Tab. I, dissipativity based spreading network design methods also have superior experimental average infections level performance (i.e., lower metrics). In particular, DissBC() (i.e., when and thus when the design objective is effectively the interconnections) has obtained the lowered value, at . This is because, due to its focus on optimizing only the interconnections, the solution has drastically cutdown interconnections. This behavior is evident from Figs. 5(b) and 5(d) and also from the fact that this method achieves the highest values, at .
As shown in Fig. 6, in dissipativity based designs, by reducing the parameter from to and (enforcing stricter constraints on interconnection deviations), DissBC() and Diss() methods have sacrificed both experimental performance and theoretical performance .
Considering these behaviors, it is clear that the selected baseline dissipativity-based design approach DissBC() considers a moderate case where both the robust stability measure and interconnection cost are treated equally, without forced constraints of interconnection deviations. As can be seen in Fig. 3(c) and 3(d), this leads to a spreading network with a close to the best: (i) robust stability guarantee with , (ii) experimental performance , and (iii) interconnection reductions highlighting the benefit of co-designing networks while using a well-balanced multiple objective function.
Overall, the results indicate that the proposed dissipativity-based approach provides a structured and efficient means of spreading networks. Its robustness against asynchronous disturbances while using specifically designed minimal alterations to the nominal network further highlights its suitability for practical applications where system dynamics are complex and uncertain.















Design Method | |||
---|---|---|---|
Without interconnections | 0.0616 | 1.0000 | - |
With Interconnections | 0.3603 | 0.0000 | - |
DissBC() | 0.0680 | 0.8710 | 24.15 |
DissBC() | 0.0645 | 0.9497 | 26.16 |
DissBC() | 0.0677 | 0.9000 | 35.08 |
DissBC() | 0.0709 | 0.8168 | 24.10 |
DissBC() | 0.0638 | 0.9575 | 30.70 |
TBC() | 0.0700 | 0.8726 | - |
DegBC() | 0.0730 | 0.8854 | 249.6 |
VI Conclusion
In this paper, we presented a dissipativity-based framework for controlling epidemic spreading over networked systems. By formulating the control problem using dissipativity theory, we established a systematic method for designing inter-group interconnections that ensure stability and robustness against disturbances. Comparative analysis with traditional control techniques, including threshold pruning and high-degree edge removal, demonstrates the superior performance of the proposed approach in reducing infection levels with lower control effort. Future work includes extending the framework to account for adaptive or time-varying networks and exploring its application to other spreading processes beyond epidemic control.
References
- [1] E. D. Sontag and Y. Wang, “On Characterizations of the Input-to-State Stability Property,” Systems & Control Letters, vol. 24, no. 5, pp. 351–359, 1995.
- [2] S. Welikala, H. Lin, and P. J. Antsaklis, “Non-Linear Networked Systems Analysis and Synthesis using Dissipativity Theory,” in Proc. of American Control Conf., 2023, pp. 2951–2956.
- [3] ——, “On-line Estimation of Stability and Passivity Metrics,” in Proc. of 61st IEEE Conf. on Decision and Control, 2022, pp. 267–272.
- [4] ——, “A Decentralized Analysis and Control Synthesis Approach for Networked Systems with Arbitrary Interconnections,” IEEE Trans. on Automatic Control, no. 0018-9286, 2024.
- [5] M. Mirabilio, A. Iovine, E. De Santis, M. D. D. Benedetto, and G. Pola, “Scalable Mesh Stability of Nonlinear Interconnected Systems,” IEEE Control Systems Letters, vol. 6, pp. 968–973, 2022.
- [6] Y. Yi, L. Shan, P. E. Paré, and K. H. Johansson, “Edge Deletion Algorithms for Minimizing Spread in SIR Epidemic Models,” arXiv e-prints, p. 2011.11087, 2020. [Online]. Available: http://arxiv.org/abs/2011.11087