Hardness and Approximation Results for Black Hole Search in Arbitrary Graphs

A black hole is a highly harmful stationary process residing in a node of a network and destroying all mobile agents visiting the node, without leaving any trace. We consider the task of locating a black hole in a (partially) synchronous arbitrary network, assuming an upper bound on the time of any edge traversal by an agent. For a given graph and a given starting node we are interested in finding the fastest possible Black Hole Search by two agents (the minimum number of agents capable to identify a black hole). We prove that this problem is NP-hard in arbitrary graphs, thus solving an open problem stated in [2]. We also give a 7/2-approximation algorithm, thus improving on the 4-approximation scheme observed in [2]. Our approach is to explore the given input graph via some spanning tree. Even if it represents a very natural technique, we prove that this approach cannot achieve an approximation ratio better than 3/2.

[1]  Christian F. Tschudin,et al.  Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.

[2]  Euripides Markou,et al.  Complexity of Searching for a Black Hole , 2006, Fundam. Informaticae.

[3]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[4]  Nicola Santoro,et al.  Searching for a black hole in arbitrary networks: optimal mobile agent protocols , 2002, PODC '02.

[5]  Euripides Markou,et al.  Searching for a Black Hole in Tree Networks , 2004, OPODIS.

[6]  David S. Johnson,et al.  The Planar Hamiltonian Circuit Problem is NP-Complete , 1976, SIAM J. Comput..

[7]  Kwok-Wai Cheung,et al.  Protecting Mobile Agents Against Malicious Hosts by Intention Spreading , 1999, PDPTA.

[8]  Jan Vitek,et al.  Mobile Computations and Hostile Hosts , 1999 .

[9]  Fritz Hohl,et al.  A framework to protect mobile agents by using reference states , 2000, Proceedings 20th IEEE International Conference on Distributed Computing Systems.

[10]  Daniel J. Kleitman,et al.  Spanning Trees with Many Leaves , 1991, SIAM J. Discret. Math..

[11]  Nicola Santoro,et al.  Multiple Agents RendezVous in a Ring in Spite of a Black Hole , 2003, OPODIS.

[12]  Nicola Santoro,et al.  Searching for a black hole in arbitrary networks: optimal mobile agents protocols , 2006, Distributed Computing.

[13]  Nicola Santoro,et al.  Mobile Search for a Black Hole in an Anonymous Ring , 2001, DISC.

[14]  Jon Ølnes,et al.  Mobile Agent Security - Issues and Directions , 1999, IS&N.

[15]  Nicola Santoro,et al.  Black Hole Search by Mobile Agents in Hypercubes and Related Networks , 2002, OPODIS.

[16]  Fritz Hohl,et al.  Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.