Scattered Black Hole Search in an Oriented Ring using Tokens

A black hole is a highly harmful host that disposes of visiting agents upon their arrival without any observable trace of the destruction. The problem of locating the black hole in asynchronous ring network is known to be solvable by a team of mobile agents if each node is equipped with a whiteboard. A simpler and less expensive inter-communication and synchronization mechanism is provided by tokens: each agent has available a bounded number of tokens that can be carried, placed in a node or/and on a port of the node, or removed. All tokens are identical and no other form of communication or coordination is available to the agents. It is known that locating the black hole in an anonymous ring network using tokens is feasible when the team of agents is initially collocated (i.e. they all start from the same host). Recently, the more difficult case when the agents are scattered (i.e., when the agents do not start from the same host) has also been examined and solutions requiring only O(1) tokens per agent but using a total of O(n2) moves have been presented. The number of moves can be reduced to O(kn + n log n) if the number k of agents is known. In this paper, we study the impact of orientation and knowledge of team size on the cost of black hole location by scattered agents with tokens. We prove that, in oriented rings, the number of moves can be reduced from O(n2) to the optimal Theta(nlogn) using only O(1) tokens per agent, without any knowledge of the team size. This result holds even if both agents and nodes are anonymous. Interestingly, the proposed algorithm solves, with the same cost, also the leader election problem and the rendezvous problem for the scattered agents despite the presence of a BH.

[1]  Euripides Markou,et al.  Hardness and approximation results for Black Hole Search in arbitrary networks , 2007, Theor. Comput. Sci..

[2]  Euripides Markou,et al.  Searching for a Black Hole in Synchronous Tree Networks , 2007, Comb. Probab. Comput..

[3]  David M. Chess,et al.  Security Issues in Mobile Code Systems , 1998, Mobile Agents and Security.

[4]  Nicola Santoro,et al.  Searching for a black hole in arbitrary networks: optimal mobile agent protocols , 2002, PODC '02.

[5]  Rolf Oppliger Security issues related to mobile code and agent-based systems , 1999, Comput. Commun..

[6]  W. A. Jansen,et al.  MOBILE AGENTS AND SECURITY , 1999 .

[7]  Nicola Santoro,et al.  Mobile Search for a Black Hole in an Anonymous Ring , 2007, Algorithmica.

[8]  Nicola Santoro,et al.  Searching for a black hole in arbitrary networks: optimal mobile agents protocols , 2006, Distributed Computing.

[9]  Colin Cooper,et al.  Searching for Black-Hole Faults in a Network Using Multiple Agents , 2006, OPODIS.

[10]  Wei Shi,et al.  Locating a Black Hole in an Un-oriented Ring Using Tokens: The Case of Scattered Agents , 2007, Euro-Par.

[11]  Euripides Markou,et al.  Complexity of Searching for a Black Hole , 2006, Fundam. Informaticae.

[12]  Nicola Santoro,et al.  Cycling Through a Dangerous Network: A Simple Efficient Strategy for Black Hole Search , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[13]  Nicola Santoro,et al.  Multiple Agents RendezVous in a Ring in Spite of a Black Hole , 2003, OPODIS.

[14]  Wei Shi,et al.  Black Hole Search in Asynchronous Rings Using Tokens , 2006, CIAC.

[15]  Nicola Santoro,et al.  Exploring an Unknown Graph to Locate a Black Hole Using Tokens , 2006, IFIP TCS.

[16]  Nicola Santoro,et al.  Black hole search in common interconnection networks , 2006 .