DocumentCode
2176602
Title
Cycling Through a Dangerous Network: A Simple Efficient Strategy for Black Hole Search
Author
Dobrev, Stefan ; Flocchini, Paola ; Santoro, Nicola
Author_Institution
University of Ottawa
fYear
2006
fDate
2006
Firstpage
57
Lastpage
57
Abstract
In this paper we consider a dangerous process located at a node of a network (called Black Hole ) and a team of mobile agents deployed to locate that node. The nature of the danger is such that when an agent enters the dangerous node, it is trapped there leaving no trace of its destruction. The goal is to deploy as few agents as possible and to locate the black hole in as few moves as possible. We present a simple algorithm that works on any topology (a-priori known by the agents). Our algorithm, based on the pre-computation of an open vertex cover by cycles of the network, uses the optimal number of agents (two); its cost (number of moves) depends on the choice of the cover and it is optimal for several classes of networks.
Keywords
Black Hole Search; Failure; Malicious Host; Mobile Agents; Undetectable; Cost function; Distributed computing; Mobile agents; Network topology; Performance evaluation; Size measurement; Black Hole Search; Failure; Malicious Host; Mobile Agents; Undetectable;
fLanguage
English
Publisher
ieee
Conference_Titel
Distributed Computing Systems, 2006. ICDCS 2006. 26th IEEE International Conference on
ISSN
1063-6927
Print_ISBN
0-7695-2540-7
Type
conf
DOI
10.1109/ICDCS.2006.25
Filename
1648844
Link To Document