Perpetual Exploration of a Ring in Presence of Byzantine Black Hole

Authors Pritam Goswami , Adri Bhattacharya , Raja Das , Partha Sarathi Mandal



PDF
Thumbnail PDF

File

LIPIcs.OPODIS.2024.17.pdf
  • Filesize: 0.79 MB
  • 17 pages

Document Identifiers

Author Details

Pritam Goswami
  • Sister Nivedita University, Kolkata, India
Adri Bhattacharya
  • Indian Institute of Technology Guwahati, India
Raja Das
  • Jadavpur University, Kolkata, India
Partha Sarathi Mandal
  • Indian Institute of Technology Guwahati, India

Cite As Get BibTex

Pritam Goswami, Adri Bhattacharya, Raja Das, and Partha Sarathi Mandal. Perpetual Exploration of a Ring in Presence of Byzantine Black Hole. In 28th International Conference on Principles of Distributed Systems (OPODIS 2024). Leibniz International Proceedings in Informatics (LIPIcs), Volume 324, pp. 17:1-17:17, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2024) https://doi.org/10.4230/LIPIcs.OPODIS.2024.17

Abstract

Perpetual exploration stands as a fundamental problem in the domain of distributed mobile agent algorithms, where the objective is to ensure that each node within a graph is visited by at least one agent infinitely often. While this issue has received significant attention, particularly concerning ring topologies, the presence of malicious nodes, referred to as black holes, adds more complexity. A black hole can destroy any incoming agent without leaving any trace of its existence.
In [Bampas et al., 2015; Královič and Miklík, 2010], the authors have considered this problem in the context of periodic data retrieval. They introduced a variant of a black hole called gray hole (where the adversary chooses whether to destroy an agent or let it pass) among other variants, and showed that 4 asynchronous and co-located agents are necessary and sufficient to solve the periodic data retrieval problem (hence perpetual exploration) in the presence of such a gray hole if each of the nodes of the ring has a whiteboard.
This paper investigates the exploration of a ring by introducing a realistic variant of a gray hole, called a "Byzantine black hole". In addition to the usual capabilities of a gray hole, the adversary can also choose whether to erase any previously stored information on that node. 
Note that in [Bampas et al., 2015; Královič and Miklík, 2010], this problem was considered with only one particular initial scenario (i.e., agents are initially co-located) and one specific communication model (i.e., whiteboard). Now, there can be many other initial scenarios where all agents might not be co-located (i.e., they may be scattered). Also, there are many weaker communications models such as Face-to-Face and Pebble, where this perpetual exploration problem is yet to be investigated in the presence of a Byzantine black hole. 
The main results of our paper focus on minimizing the number of agents while guaranteeing that they perform the perpetual exploration on a ring even in the presence of a Byzantine black hole under different communication models and for different starting scenarios. On the positive side, as a byproduct of our work, we achieved a better upper and lower bound result (i.e., 3 agents) for perpetual exploration in the presence of a Byzantine black hole (which is a more generalized version of a gray hole), by trading-off the scheduler capability, when the agents are initially co-located, and each node contains a whiteboard.

Subject Classification

ACM Subject Classification
  • Theory of computation → Distributed algorithms
Keywords
  • Mobile Agents
  • Exploration
  • Ring
  • Black Hole
  • Malicious host
  • Byzantine Fault

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads

References

  1. Balasingham Balamohan, Paola Flocchini, Ali Miri, and Nicola Santoro. Time optimal algorithms for black hole search in rings. Discrete Mathematics, Algorithms and Applications, 3(04):457-471, 2011. URL: https://doi.org/10.1142/S1793830911001346.
  2. Evangelos Bampas, Nikos Leonardos, Euripides Markou, Aris Pagourtzis, and Matoula Petrolia. Improved periodic data retrieval in asynchronous rings with a faulty host. Theoretical Computer Science, 608:231-254, 2015. URL: https://doi.org/10.1016/J.TCS.2015.09.019.
  3. Adri Bhattacharya, Giuseppe F Italiano, and Partha Sarathi Mandal. Black hole search in dynamic cactus graph. In International Conference and Workshops on Algorithms and Computation, pages 288-303. Springer, 2024. URL: https://doi.org/10.1007/978-981-97-0566-5_21.
  4. Adri Bhattacharya, Giuseppe F Italiano, and Partha Sarathi Mandal. Black hole search in dynamic tori. arXiv preprint, 2024. URL: https://doi.org/10.48550/arXiv.2402.04746.
  5. Jérémie Chalopin, Shantanu Das, Arnaud Labourel, and Euripides Markou. Black hole search with finite automata scattered in a synchronous torus. In Distributed Computing: 25th International Symposium, DISC 2011, Rome, Italy, September 20-22, 2011. Proceedings 25, pages 432-446. Springer, 2011. URL: https://doi.org/10.1007/978-3-642-24100-0_41.
  6. Jérémie Chalopin, Shantanu Das, Arnaud Labourel, and Euripides Markou. Tight bounds for black hole search with scattered agents in synchronous rings. Theoretical Computer Science, 509:70-85, 2013. URL: https://doi.org/10.1016/J.TCS.2013.02.010.
  7. Jurek Czyzowicz, Dariusz Kowalski, Euripides Markou, and Andrzej Pelc. Complexity of searching for a black hole. Fundamenta Informaticae, 71(2-3):229-242, 2006. URL: http://content.iospress.com/articles/fundamenta-informaticae/fi71-2-3-05.
  8. Jurek Czyzowicz, Dariusz Kowalski, Euripides Markou, and Andrzej Pelc. Searching for a black hole in synchronous tree networks. Combinatorics, Probability and Computing, 16(4):595-619, 2007. URL: https://doi.org/10.1017/S0963548306008133.
  9. Giuseppe A Di Luna, Paola Flocchini, Giuseppe Prencipe, and Nicola Santoro. Black hole search in dynamic rings: The scattered case. In 27th International Conference on Principles of Distributed Systems (OPODIS 2023). Schloss-Dagstuhl-Leibniz Zentrum für Informatik, 2024. Google Scholar
  10. Giuseppe Antonio Di Luna, Paola Flocchini, Giuseppe Prencipe, and Nicola Santoro. Black hole search in dynamic rings. In 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS), pages 987-997. IEEE, 2021. URL: https://doi.org/10.1109/ICDCS51616.2021.00098.
  11. Stefan Dobrev, Paola Flocchini, Rastislav Královič, and Nicola Santoro. Exploring an unknown dangerous graph using tokens. Theoretical Computer Science, 472:28-45, 2013. URL: https://doi.org/10.1016/J.TCS.2012.11.022.
  12. Stefan Dobrev, Paola Flocchini, Giuseppe Prencipe, and Nicola Santoro. Searching for a black hole in arbitrary networks: Optimal mobile agents protocols. Distributed Computing, 19:1-99999, 2006. Google Scholar
  13. Stefan Dobrev, Paola Flocchini, Giuseppe Prencipe, and Nicola Santoro. Mobile search for a black hole in an anonymous ring. Algorithmica, 48:67-90, 2007. URL: https://doi.org/10.1007/S00453-006-1232-Z.
  14. Stefan Dobrev, Paola Flocchini, Giuseppe Prencipe, and Nicola Santoro. Mobile search for a black hole in an anonymous ring. Algorithmica, 48:67-90, 2007. URL: https://doi.org/10.1007/S00453-006-1232-Z.
  15. Stefan Dobrev, Nicola Santoro, and Wei Shi. Locating a black hole in an un-oriented ring using tokens: The case of scattered agents. In European Conference on Parallel Processing, pages 608-617. Springer, 2007. URL: https://doi.org/10.1007/978-3-540-74466-5_64.
  16. Paola Flocchini, David Ilcinkas, and Nicola Santoro. Ping pong in dangerous graphs: Optimal black hole search with pebbles. Algorithmica, 62:1006-1033, 2012. URL: https://doi.org/10.1007/S00453-011-9496-3.
  17. Pritam Goswami, Adri Bhattacharya, Raja Das, and Partha Sarathi Mandal. Perpetual exploration of a ring in presence of byzantine black hole. arXiv preprint, 2024. URL: https://doi.org/10.48550/arXiv.2407.05280.
  18. Wayne A Jansen. Intrusion detection with mobile agents. Computer Communications, 25(15):1392-1401, 2002. URL: https://doi.org/10.1016/S0140-3664(02)00040-3.
  19. Rastislav Královič and Stanislav Miklík. Periodic data retrieval problem in rings containing a malicious host. In Structural Information and Communication Complexity: 17th International Colloquium, SIROCCO 2010, Şirince, Turkey, June 7-11, 2010. Proceedings 17, pages 157-167. Springer, 2010. URL: https://doi.org/10.1007/978-3-642-13284-1_13.
  20. Mengfei Peng, Wei Shi, Jean-Pierre Corriveau, Richard Pazzi, and Yang Wang. Black hole search in computer networks: State-of-the-art, challenges and future directions. Journal of Parallel and Distributed Computing, 88:1-15, 2016. URL: https://doi.org/10.1016/J.JPDC.2015.10.006.
  21. Claude E Shannon. Presentation of a maze-solving machine. Claude Elwood Shannon Collected Papers, pages 681-687, 1993. Google Scholar
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail