Intruder Capture in Sierpinski Graphs

In this paper we consider the problem of capturing an intruder in a networked environment. The intruder is defined as a mobile entity that moves arbitrarily fast inside the network and escapes from a team of software agents. The agents have to collaborate and coordinate their moves in order to isolate the intruder. They move asynchronously and they know the network topology they are in is a particular fractal graph, the Sierpiski graph SGn. We first derive lower bounds on the minimum number of agents, number of moves and time steps required to capture the intruder. We then consider two models: one in which agents have a capability, of "seeing" the state of their neighbors; the second one in which the actions of the agents are leaded by a coordinator. One of our goals is to continue a previous study on what is the impact of visibility on complexity: we have found that in this topology the visibility assumption allows us to reach an optimal bound on the number of agents required for the cleaning strategy. On the other hand, the second strategy relies only on local computations but requires an extra agent and a higher (by a constant) complexity in terms of time and number of moves.

[1]  Amiya Nayak,et al.  Cleaning an Arbitrary Regular Network with Mobile Agents , 2005, ICDCIT.

[2]  Paola Flocchini,et al.  Contiguous search in the hypercube for capturing an intruder , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[3]  Lali Barrière,et al.  Fractality and the small-world effect in Sierpinski graphs , 2006 .

[4]  Andrea S. LaPaugh,et al.  Recontamination does not help to search a graph , 1993, JACM.

[5]  Lali Barrière,et al.  Capture of an intruder by mobile agents , 2002, SPAA '02.

[6]  Nicolas Nisse,et al.  Distributed Chasing of Network Intruders by Mobile Agents , 2006 .

[7]  Ivan Hal Sudborough,et al.  The Vertex Separation and Search Number of a Graph , 1994, Inf. Comput..

[8]  Elmar Teufl,et al.  Spanning trees of finite Sierpiński graphs , 2006 .

[9]  Christos H. Papadimitriou,et al.  Searching and Pebbling , 1986, Theor. Comput. Sci..

[10]  Paola Flocchini,et al.  Decontamination of chordal rings and tori , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[11]  Paola Flocchini,et al.  Size Optimal Strategies for Capturing an Intruder in Mesh Networks , 2005, Communications in Computing.

[12]  Nicolas Nisse,et al.  Distributed chasing of network intruders , 2008, Theor. Comput. Sci..

[13]  Elmar Teufl,et al.  The number of spanning trees of finite Sierpi´ nski graphs , 2006 .

[14]  Christos H. Papadimitriou,et al.  The complexity of searching a graph , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[15]  D. R. Lick,et al.  Theory and Applications of Graphs , 1978 .