7,426 research outputs found
Passively mobile communicating machines that use restricted space
We propose a new theoretical model for passively mobile Wireless Sensor Networks, called PM, standing for Passively mobile Machines. The main modification w.r.t. the Population Protocol model [Angluin et al. 2006] is that the agents now, instead of being automata, are Turing Machines. We provide general definitions for unbounded memories, but we are mainly interested in computations upper-bounded by plausible space limitations. However, we prove that our results hold for more general cases. We focus on complete interaction graphs and define the complexity classes PM-SPACE(f(n)) parametrically, consisting of all predicates that are stably computable by some PM protocol that uses O(f(n)) memory in each agent. We provide a protocol that generates unique identifiers from scratch only by using O(log n) memory, and use it to provide an exact characterization of the classes PMSPACE(f(n)) when f(n) = Ω(log n): they are precisely the classes of all symmetric predicates in NSPACE(nf(n)). As a consequence, we obtain a space hierarchy of the PM model when the memory bounds are Ω(log n). Finally, we establish that the minimal space requirement for the computation of non-semilinear predicates is O(log log n). © 2011 ACM.FOM
Passively Mobile Communicating Logarithmic Space Machines
We propose a new theoretical model for passively mobile Wireless Sensor
Networks. We call it the PALOMA model, standing for PAssively mobile
LOgarithmic space MAchines. The main modification w.r.t. the Population
Protocol model is that agents now, instead of being automata, are Turing
Machines whose memory is logarithmic in the population size n. Note that the
new model is still easily implementable with current technology. We focus on
complete communication graphs. We define the complexity class PLM, consisting
of all symmetric predicates on input assignments that are stably computable by
the PALOMA model. We assume that the agents are initially identical.
Surprisingly, it turns out that the PALOMA model can assign unique consecutive
ids to the agents and inform them of the population size! This allows us to
give a direct simulation of a Deterministic Turing Machine of O(nlogn) space,
thus, establishing that any symmetric predicate in SPACE(nlogn) also belongs to
PLM. We next prove that the PALOMA model can simulate the Community Protocol
model, thus, improving the previous lower bound to all symmetric predicates in
NSPACE(nlogn). Going one step further, we generalize the simulation of the
deterministic TM to prove that the PALOMA model can simulate a Nondeterministic
TM of O(nlogn) space. Although providing the same lower bound, the important
remark here is that the bound is now obtained in a direct manner, in the sense
that it does not depend on the simulation of a TM by a Pointer Machine.
Finally, by showing that a Nondeterministic TM of O(nlogn) space decides any
language stably computable by the PALOMA model, we end up with an exact
characterization for PLM: it is precisely the class of all symmetric predicates
in NSPACE(nlogn).Comment: 22 page
Global Versus Local Computations: Fast Computing with Identifiers
This paper studies what can be computed by using probabilistic local
interactions with agents with a very restricted power in polylogarithmic
parallel time. It is known that if agents are only finite state (corresponding
to the Population Protocol model by Angluin et al.), then only semilinear
predicates over the global input can be computed. In fact, if the population
starts with a unique leader, these predicates can even be computed in a
polylogarithmic parallel time. If identifiers are added (corresponding to the
Community Protocol model by Guerraoui and Ruppert), then more global predicates
over the input multiset can be computed. Local predicates over the input sorted
according to the identifiers can also be computed, as long as the identifiers
are ordered. The time of some of those predicates might require exponential
parallel time. In this paper, we consider what can be computed with Community
Protocol in a polylogarithmic number of parallel interactions. We introduce the
class CPPL corresponding to protocols that use , for some k,
expected interactions to compute their predicates, or equivalently a
polylogarithmic number of parallel expected interactions. We provide some
computable protocols, some boundaries of the class, using the fact that the
population can compute its size. We also prove two impossibility results
providing some arguments showing that local computations are no longer easy:
the population does not have the time to compare a linear number of consecutive
identifiers. The Linearly Local languages, such that the rational language
, are not computable.Comment: Long version of SSS 2016 publication, appendixed version of SIROCCO
201
IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN
Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of
deployment. However, the issues related to security is less explored. The IoT devices are light weight in nature and have low
computation power, low battery life and low memory. As incorporating security features are resource expensive, IoT devices are
often found to be less protected and in recent times, more IoT devices have been routinely attacked due to high profile security
flaws. This paper aims to explore the security vulnerabilities of IoT devices particularly that use Low Power Wide Area Networks
(LPWANs). In this work, LoRaWAN based IoT security vulnerabilities are scrutinised and loopholes are identified. An attack was
designed and simulated with the use of a predictive model of the device data generation. The paper demonstrated that by predicting
the data generation model, jamming attack can be carried out to block devices from sending data successfully. This research will
aid in the continual development of any necessary countermeasures and mitigations for LoRaWAN and LPWAN functionality of
IoT networks in general
Terminating population protocols via some minimal global knowledge assumptions
We extend the population protocol model with a cover-time service that informs a walking state every time it covers the whole network. This represents a known upper bound on the cover time of a random walk. The cover-time service allows us to introduce termination into population protocols, a capability that is crucial for any distributed system. By reduction to an oracle-model we arrive at a very satisfactory lower bound on the computational power of the model: we prove that it is at least as strong as a Turing Machine of space log n with input commutativity, where n is the number of nodes in the network. We also give a log n-space, but nondeterministic this time, upper bound. Finally, we prove interesting similarities of this model to linear bounded automata. Keywords: population protocol, cover-time service, rendezvous-based communication, interaction, counter machine, absence detector, linear-bounded automaton 1
How Many Cooks Spoil the Soup?
In this work, we study the following basic question: "How much parallelism
does a distributed task permit?" Our definition of parallelism (or symmetry)
here is not in terms of speed, but in terms of identical roles that processes
have at the same time in the execution. We initiate this study in population
protocols, a very simple model that not only allows for a straightforward
definition of what a role is, but also encloses the challenge of isolating the
properties that are due to the protocol from those that are due to the
adversary scheduler, who controls the interactions between the processes. We
(i) give a partial characterization of the set of predicates on input
assignments that can be stably computed with maximum symmetry, i.e.,
, where is the minimum multiplicity of a state in
the initial configuration, and (ii) we turn our attention to the remaining
predicates and prove a strong impossibility result for the parity predicate:
the inherent symmetry of any protocol that stably computes it is upper bounded
by a constant that depends on the size of the protocol.Comment: 19 page
The Internet of Things Will Thrive by 2025
This report is the latest research report in a sustained effort throughout 2014 by the Pew Research Center Internet Project to mark the 25th anniversary of the creation of the World Wide Web by Sir Tim Berners-LeeThis current report is an analysis of opinions about the likely expansion of the Internet of Things (sometimes called the Cloud of Things), a catchall phrase for the array of devices, appliances, vehicles, wearable material, and sensor-laden parts of the environment that connect to each other and feed data back and forth. It covers the over 1,600 responses that were offered specifically about our question about where the Internet of Things would stand by the year 2025. The report is the next in a series of eight Pew Research and Elon University analyses to be issued this year in which experts will share their expectations about the future of such things as privacy, cybersecurity, and net neutrality. It includes some of the best and most provocative of the predictions survey respondents made when specifically asked to share their views about the evolution of embedded and wearable computing and the Internet of Things
- …