6,500 research outputs found

    Tight Bounds for Black Hole Search with Scattered Agents in Synchronous Rings

    Full text link
    We study the problem of locating a particularly dangerous node, the so-called black hole in a synchronous anonymous ring network with mobile agents. A black hole is a harmful stationary process residing in a node of the network and destroying destroys all mobile agents visiting that node without leaving any trace. We consider the more challenging scenario when the agents are identical and initially scattered within the network. Moreover, we solve the problem with agents that have constant-sized memory and carry a constant number of identical tokens, which can be placed at nodes of the network. In contrast, the only known solutions for the case of scattered agents searching for a black hole, use stronger models where the agents have non-constant memory, can write messages in whiteboards located at nodes or are allowed to mark both the edges and nodes of the network with tokens. This paper solves the problem for ring networks containing a single black hole. We are interested in the minimum resources (number of agents and tokens) necessary for locating all links incident to the black hole. We present deterministic algorithms for ring topologies and provide matching lower and upper bounds for the number of agents and the number of tokens required for deterministic solutions to the black hole search problem, in oriented or unoriented rings, using movable or unmovable tokens

    Black Hole Search with Finite Automata Scattered in a Synchronous Torus

    Full text link
    We consider the problem of locating a black hole in synchronous anonymous networks using finite state agents. A black hole is a harmful node in the network that destroys any agent visiting that node without leaving any trace. The objective is to locate the black hole without destroying too many agents. This is difficult to achieve when the agents are initially scattered in the network and are unaware of the location of each other. Previous studies for black hole search used more powerful models where the agents had non-constant memory, were labelled with distinct identifiers and could either write messages on the nodes of the network or mark the edges of the network. In contrast, we solve the problem using a small team of finite-state agents each carrying a constant number of identical tokens that could be placed on the nodes of the network. Thus, all resources used in our algorithms are independent of the network size. We restrict our attention to oriented torus networks and first show that no finite team of finite state agents can solve the problem in such networks, when the tokens are not movable. In case the agents are equipped with movable tokens, we determine lower bounds on the number of agents and tokens required for solving the problem in torus networks of arbitrary size. Further, we present a deterministic solution to the black hole search problem for oriented torus networks, using the minimum number of agents and tokens

    Dagstuhl Reports : Volume 1, Issue 2, February 2011

    Get PDF
    Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061) : Simone Fischer-HĂŒbner, Chris Hoofnagle, Kai Rannenberg, Michael Waidner, Ioannis Krontiris and Michael Marhöfer Self-Repairing Programs (Dagstuhl Seminar 11062) : Mauro PezzĂ©, Martin C. Rinard, Westley Weimer and Andreas Zeller Theory and Applications of Graph Searching Problems (Dagstuhl Seminar 11071) : Fedor V. Fomin, Pierre Fraigniaud, Stephan Kreutzer and Dimitrios M. Thilikos Combinatorial and Algorithmic Aspects of Sequence Processing (Dagstuhl Seminar 11081) : Maxime Crochemore, Lila Kari, Mehryar Mohri and Dirk Nowotka Packing and Scheduling Algorithms for Information and Communication Services (Dagstuhl Seminar 11091) Klaus Jansen, Claire Mathieu, Hadas Shachnai and Neal E. Youn

    Faulty node repair and dynamically spawned black hole search

    Get PDF
    New threats to networks are constantly arising. This justifies protecting network assets and mitigating the risk associated with attacks. In a distributed environment, researchers aim, in particular, at eliminating faulty network entities. More specifically, much research has been conducted on locating a single static black hole, which is defined as a network site whose existence is known a priori and that disposes of any incoming data without leaving any trace of this occurrence. However, the prevalence of faulty nodes requires an algorithm able to (a) identify faulty nodes that can be repaired without human intervention and (b) locate black holes, which are taken to be faulty nodes whose repair does require human intervention. In this paper, we consider a specific attack model that involves multiple faulty nodes that can be repaired by mobile software agents, as well as a virus v that can infect a previously repaired faulty node and turn it into a black hole. We refer to the task of repairing multiple faulty nodes and pointing out the location of the black hole as the Faulty Node Repair and Dynamically Spawned Black Hole Search. Wefirst analyze the attack model we put forth. We then explain (a) how to identify whether a node is either (1) a normal node or (2) a repairable faulty node or (3) the black hole that has been infected by virus v during the search/repair process and, (b) how to perform the correct relevant actions. These two steps constitute a complex task, which, we explain, significantly differs from the traditional Black Hole Search. We continue by proposing an algorithm to solve this problem in an

    Searching for black holes in subways.

    Get PDF
    Abstract Current mobile agent algorithms for mapping faults in computer networks assume that the network is static. However, for large classes of highly dynamic networks (e.g., wireless mobile ad hoc networks, sensor networks, vehicular networks), the topology changes as a function of time. These networks, called delay-tolerant, challenged, opportunistic, etc., have never been investigated with regard to locating faults. We consider a subclass of these networks modelled on an urban subway system. We examine the problem of creating a map of such a subway. More precisely, we study the problem of a team of asynchronous computational entities (the mapping agents) determining the location of black holes in a highly dynamic graph, whose edges are defined by the asynchronous movements of mobile entities (the subway carriers). We determine necessary conditions for the problem to be solvable. We then present and analyze a solution protocol; we show that our algorithm solves the fault mapping problem in subway networks with the minimum number of agents possible, k = Îł + 1, where Îł is the number of carrier stops at black holes. The number of carrier moves between stations required by the algorithm in the worst case is , where n C is the number of subway trains, and l R is the length of the subway route with the most stops. We establish lower bounds showing that this bound is tight. Thus, our protocol is both agent-optimal and move-optimal

    Recherche optimale de trou noir avec cailloux

    Get PDF
    National audienceUn trou noir est un noeud d'un rĂ©seau qui dĂ©truit tout agent (ou robot) y entrant sans laisser de trace dĂ©tectable. L'emplacement du trou noir doit ĂȘtre dĂ©terminĂ© par une une Ă©quipe d'agents mobiles identiques dĂ©ployĂ©e Ă  partir d'un emplacement sain. Pratiquement tous les rĂ©sultats existants pour des agents asynchrones supposent la prĂ©sence Ă  chaque noeud d'une mĂ©moire partagĂ©e (tableau blanc), de taille logarithmique, sur laquelle les agents peuvent lire et Ă©crire. Un mĂ©chanisme moins puissant et moins exigeant consiste en l'utilisation de cailloux identiques (qui peuvent ĂȘtre dĂ©posĂ©s sur les noeuds, repris, et transportĂ©s par les agents), traditionnellement employĂ©s pour l'exploration de graphes sains (i.e. sans trou noir). Deux rĂ©sultats rĂ©cents montrent qu'il est possible d'utiliser des cailloux comme moyen de communication pour la recherche de trou noir. Ces rĂ©sultats autorisent cependant les cailloux Ă  ĂȘtre placĂ©s non seulement sur les noeuds mais aussi sur les liens. Ils supposent Ă©galement que les liens sont FIFO. Dans ce papier, nous considĂ©rons le modĂšle des cailloux idĂ©aux, c'est-Ă -dire le modĂšle oĂč un caillou ne peut ĂȘtre placĂ© que sur les noeuds, et pas plus d'un caillou ne peut ĂȘtre placĂ© sur un noeud donnĂ©. Nous prouvons que pour les rĂ©seaux de topologie connue il est possible d'obtenir exactement les mĂȘmes bornes optimales en utilisant des cailloux idĂ©aux qu'en utilisant des tableaux blancs, et ce mĂȘme si les liens ne sont pas FIFO. Plus prĂ©cisĂ©ment, nous prouvons qu'une Ă©quipe de deux agents asynchrones, chacun Ă©quipĂ© d'un seul caillou indistinguable (qui ne peut ĂȘtre placĂ© que sur les noeuds, avec au plus un caillou par noeud), peut localiser le trou noir. Ce rĂ©sultat est obtenu en utilisant le nombre optimal de mouvements Θ(nlog⁥n)\Theta(n\log{n}), oĂč n est le nombre de noeuds. Pour rĂ©sumer, nous fournissons la premiĂšre preuve que, pour la recherche de trou noir, le modĂšle des cailloux idĂ©aux est aussi puissant que le modĂšle des tableaux blancs
    • 

    corecore