Back to Search Start Over

Distributed chasing of network intruders

Authors :
Blin, Lélia
Fraigniaud, Pierre
Nisse, Nicolas
Vial, Sandrine
Source :
Theoretical Computer Science. Jun2008, Vol. 399 Issue 1/2, p12-37. 26p.
Publication Year :
2008

Abstract

Abstract: Graph searching is one of the most popular tools for analyzing the chase for a powerful and hostile software agent (called the “intruder”), by a set of software agents (called the “searchers”) in a network. The existing solutions for the graph searching problem suffer however from a serious drawback: they are mostly centralized and assume a global synchronization mechanism for the searchers. In particular: (1) the search strategy for every network is computed based on the knowledge of the entire topology of the network, and (2) the moves of the searchers are controlled by a centralized mechanism that decides at every step which searcher has to move, and what movement it has to perform. This paper addresses the graph searching problem in a distributed setting. We describe a distributed protocol that enables searchers with logarithmic size memory to clear any network, in a fully decentralized manner. The search strategy for the network in which the searchers are launched is computed online by the searchers themselves without knowing the topology of the network in advance. It performs in an asynchronous environment, i.e., it implements the necessary synchronization mechanism in a decentralized manner. In every network, our protocol performs a connected strategy using at most searchers, where is the minimum number of searchers required to clear the network in a monotone connected way using a strategy computed in the centralized and synchronous setting. [Copyright &y& Elsevier]

Details

Language :
English
ISSN :
03043975
Volume :
399
Issue :
1/2
Database :
Academic Search Index
Journal :
Theoretical Computer Science
Publication Type :
Academic Journal
Accession number :
31922577
Full Text :
https://doi.org/10.1016/j.tcs.2008.02.004