Abstract
Consider a networked environment, supporting mobile agents, where there is a black hole: a harmful host that disposes of visiting agents upon their arrival, leaving no observable trace of such a destruction. The black hole search problem is the one of assembling a team of asynchronous mobile agents, executing the same protocol and communicating by means of whiteboards, to successfully identify the location of the black hole; we are concerned with solutions that are generic (i.e., topology-independent). We establish tight bounds on the size of the team (i.e., the number of agents), and the cost (i.e., the number of moves) of a size-optimal solution protocol. These bounds depend on the a priori knowledge the agents have about the network, and on the consistency of the local labelings. In particular, we prove that: with topological ignorance Δ+1 agents are needed and suffice, and the cost is Θ(n 2), where Δ is the maximal degree of a node and n is the number of nodes in the network; with topological ignorance but in presence of sense of direction only two agents suffice and the cost is Θ(n 2); and with complete topological knowledge only two agents suffice and the cost is Θ(n log n). All the upper-bound proofs are constructive.
Similar content being viewed by others
References
Albers, S., Henzinger, M.R.: Exploring unknown environments. SIAM J. Comput. 29, 1164–1188 (2000)
Alpern, S., Baston, V., Essegaier, S.: Rendezvous search on a graph. J. Appl. Probab. 36(1), 223–231 (1999)
Alpern, S., Gal, S.: The Theory of Search Games and Rendezvous. Kluwer (2003)
Averbakh, I., Berman, O.: A heuristic with worst-case analysis for minimax routing of two traveling salesmen on a tree. Discrete Appl. Math. 68, 17–32 (1996)
Awerbuch, B., Betke, M., Singh, M.: Piecemeal graph learning by a mobile robot. Inf. Comput. 152, 155–172 (1999)
Barrière, L., Flocchini, P., Fraigniaud, P., Santoro, N.: Rendezvous and election of mobile agents: impact of sense of direction. Theory Comput. Syst. (in press)
Barrière, L., Flocchini, P., Fraigniaud, P., Santoro, N.: Capture of an intruder by mobile agents. In: Proceedings of the 14th ACM Symposium on Parallel Algorithms and Architectures (SPAA'02), pp. 324–332 (2002)
Barrière, L., Flocchini, P., Fraigniaud, P., Santoro, N.: Can we elect if we cannot compare? In: Proceedings of the 15th ACM Symposium on Parallel Algorithms and Architectures (SPAA'03), pp. 200–209 (2003)
Bender, M., Fernandez, A., Ron, D., Sahai, A., Vadhan, S.: The power of a pebble: Exploring and mapping directed graphs. In: Proceedings of the 30th ACM Symposium on Theory of Computing (STOC'98), pp. 269–287 (1998)
Bender, M., Slonim, D.K.: The power of team exploration: two robots can learn unlabeled directed graphs. In: Proceedings of the 35th Symposium on Foundations of Computer Science (FOCS'94), pp. 75–85 (1994)
Blum, A., Raghavan, P., Schieber, B.: Navigating in unfamiliar geometric terrain. SIAM J. Comput. 26, 110–137 (1997)
Blum, M., Kozen, D.: On the power of the compass (or, why mazes are easier to search than graphs). In: Proceedings of the 19th Symposium on Foundations of Computer Science (FOCS'78), pp. 132–142 (1978)
Chess, D.M.: Security issues in mobile code systems. In: Proceedings of the Conference on Mobile Agent Security, LNCS 1419, pp. 1–14 (1998)
Deng, X., Kameda, T., Papadimitriou, C.H.: How to learn an unknown environment i: The rectilinear case. J. ACM 45, 215–245 (1998)
Deng, X., Papadimitriou, C.H.: Exploring an unknown graph. J. Graph Theory 32(3), 265–297 (1999)
Dessmark, A., Fraigniaud, P., Pelc, A.: Deterministic rendezvous in graphs. In: Proceedings of the 11th European Symposium on Algorithms (ESA'03), pp. 184–195 (2003)
Dessmark, A., Pelc, A.: Optimal graph exploration without good maps. In: Proceedings of the 10th European Symposium on Algorithms (ESA'02), pp. 374–386 (2002)
Deugo, D.: Mobile agents for electing a leader. In: Proceedings of the 4th International Symposium on Autonomous Decentralized System, pp. 324–324 (1999)
Diks, K., Fraigniaud, P., Kranakis, E., Pelc, A.: Tree exploration with little memory. J. Algorith. 51, 38–63 (2004)
Dobrev, S., Flocchini, P., Prencipe, G., Santoro, N.: Mobile search for a black hole in an anonymous ring. Algorithmica (in press)
Dobrev, S., Flocchini, P., Prencipe, G., Santoro, N.: Finding a black hole in an arbitrary network: optimal mobile agents protocols. In: Proceedings of the 21st ACM Symposium on Principles of Distributed Computing (PODC'02), pp. 153–162 (2002)
Dudek, G., Jenkin, M., Milios, E., Wilkes, D.: Robotic exploration as graph construction. Trans. Robot. Autom. 7(6), 859–865 (1991)
Esparza, O., Soriano, M., Munoz, J.J., Forne, J.: Host revocation authority: A way of protecting mobile agents from malicious hosts. In: Proceedings of the International Conference onWeb Engineering (ICWE'03), LNCS 2722 (2003)
Flocchini, P., Mans, B., Santoro, N.: Sense of direction: definition, properties and classes. Networks 32(3), 165–180 (1998)
Flocchini, P., Mans, B., Santoro, N.: Sense of direction in distributed computing. Theor. Comput. Sci. (291), 29–53 (2003)
Flocchini, P., Roncato, A., Santoro, N.: Backward consistency and sense of direction in advanced distributed systems. SIAM J. Comput. 32(2), 281–306 (2003)
Fraigniaud, P., Gasieniec, L., Kowalski, D., Pelc, A.: Collective tree exploration. In: Proceedings of the 6th Latin American Theoretical Informatics Symposium (LATIN'04), pp. 141–151 (2004)
Fraigniaud, P., Ilcinkas, D., Peer, G., Pelc, A., Peleg, D.: Graph exploration by a finite automaton. In: Proceedings of the 29th Symposium on Mathematical Foundations of Computer Science (MFCS), pp. 451–462 (2004)
Frederickson, G.N., Hecht, M.S., Kim, C.E.: Approximation algorithms for some routing problems. SIAM J. Comput. 7, 178–193 (1978)
Greenberg, M.S., Byington, J.C., Harper, D.G.: Mobile agents and security. IEEE Commun. Mag. 36(7), 76–85 (1998)
Gyuri, E.: On division of graphs to connected subgraphs. In: Proceedings of the 5th Hungarian Combinatorial Colloquium (1976)
Hohl, F.: Time limited blackbox security: Protecting mobile agents from malicious hosts. In: Proceedings of the Conference on Mobile Agent Security, LNCS 1419, pp. 92–113 (1998)
Hohl, F.: A framework to protect mobile agents by using reference states. In Proceedings of the 20th International Conference on Distributed Computing Systems (ICDCS 2000) (2000)
Jennings, N.R.: On agent-based software engineering. Artif. Intell. 117(2), 277–296 (2000)
Kozen, D.: Automata and planar graphs. In: Proceedings of the Fundations Computatial Theory (FCT'79), pp. 243–254 (1979)
Kranakis, E., Krizanc, D., Santoro, N., Sawchuk, C.: Mobile agent rendezvous in a ring. In: Proceedings of the International Conference on Distibuted Computing Systems (ICDCS'03), pp. 592–599 (2003)
Lovàsz, L.: A homology theory for spanning trees of a graph. Acta Mathematica Academiae Scientiarum Hungaricae 30(3,4), 241–251 (1977)
Muller, H.: Automata catching labyrinths with at most three components. Elektronische Informationsverarbeitung und Kybernetic 15(1), 3–9 (1979)
Ng, S.K., Cheung, K.W.: Protecting mobile agents against malicious hosts by intention spreading. In: Proceedings of the 1999 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'99), pp. 725–729 (1999)
Oppliger, R.: Security issues related to mobile code and agent-based systems. Comput. Commun. 22(12), 1165–1170 (1999)
Panaite, P., Pelc, A.: Exploring unknown undirected graphs. J. Algorith. 33, 281–295 (1999)
Rabin, M.O.: Maze threading automata. Technical Report Seminar Talk, University of California at Berkeley (1967)
Rollik, H.A.: Automaten in planaren graphen. Acta Inform. 13, 287–298 (1980)
Roo, N., Hareti, S., Shi, W., Iyengar, S.: Robot navigation in unknown terrains: Introductory survey of length,non-heuristic algorithms. Technical Report ORNL/TM12410, Oak Ridge National Lab. (1993)
Sander, T., Tschudin, C.F.: Protecting mobile agents against malicious hosts. In: Proceedings of the Conference on Mobile Agent Security, LNCS 1419, pp. 44–60 (1998)
Schelderup, K., Ones, J.: Mobile agent security–issues and directions. In: Proceedings of the 6th International Conference on Intelligence and Services in Networks, LNCS 1597, pp. 155–167 (1999)
Shannon, CL.E.: Presentation of a maze-solving machine. In: Proceedings of the 8th Conference of the Josiah Macy Jr. Found. (Cybernetics), pp. 173–180 (1951)
Vitek, J., Castagna, G.: Mobile computations and hostile hosts. In: Tsichritzis, D. (ed.). Mobile Objects, pp. 241–261. University of Geneva (1999)
Yu, X., Yung, M.: Agent rendezvous: A dynamic symmetry-breaking problem. In: Proceedings of the International Colloquium on Automata Languages and Programming (ICALP'96), pp. 610–621 (1996)
Author information
Authors and Affiliations
Corresponding author
Additional information
A preliminary version of this paper appeared in the Proceedings of the 21st ACM Symposium on Principles of Distributed Computing [21].
Rights and permissions
About this article
Cite this article
Dobrev, S., Flocchini, P., Prencipe, G. et al. Searching for a black hole in arbitrary networks: optimal mobile agents protocols. Distrib. Comput. 19, 1–99999 (2006). https://doi.org/10.1007/s00446-006-0154-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00446-006-0154-y