Εμφάνιση απλής εγγραφής

dc.creatorDas S., Luccio F.L., Markou E.en
dc.date.accessioned2023-01-31T07:51:26Z
dc.date.available2023-01-31T07:51:26Z
dc.date.issued2015
dc.identifier10.1007/978-3-319-28472-9_16
dc.identifier.isbn9783319284712
dc.identifier.issn03029743
dc.identifier.urihttp://hdl.handle.net/11615/73112
dc.description.abstractWe examine the problem of rendezvous, i.e., having multiple mobile agents gather in a single node of the network. Unlike previous studies, we need to achieve rendezvous in presence of a very powerful adversary, a malicious agent that moves through the network and tries to block the honest agents and prevents them from gathering. The malicious agent can be thought of as a mobile fault in the network. The malicious agent is assumed to be arbitrarily fast, has full knowledge of the network and it cannot be exterminated by the honest agents. On the other hand, the honest agents are assumed to be quite weak: They are asynchronous and anonymous, they have only finite memory, they have no prior knowledge of the network and they can communicate with the other agents only when they meet at a node. Can the honest agents achieve rendezvous starting from an arbitrary configuration in spite of the malicious agent? We present some necessary conditions for solving rendezvous in spite of the malicious agent in arbitrary networks. We then focus on the ring and mesh topologies and provide algorithms to solve rendezvous. For ring networks, our algorithms solve rendezvous in all feasible instances of the problem, while we show that rendezvous is impossible for an even number of agents in unoriented rings. For the oriented mesh networks, we prove that the problem can be solved when the honest agents initially form a connected configuration without holes if and only if they can see which are the occupied nodes within a two-hops distance. To the best of our knowledge, this is the first attempt to study such a powerful and mobile fault model, in the context of mobile agents. Our model lies between the more powerful but static fault model of black holes (which can even destroy the agents), and the less powerful but mobile fault model of Byzantine agents (which can only imitate the honest agents but can neither harm nor stop them). © Springer International Publishing Switzerland 2015.en
dc.language.isoenen
dc.sourceLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)en
dc.source.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-84955273367&doi=10.1007%2f978-3-319-28472-9_16&partnerID=40&md5=224db1070fb5a85a9d0bc522152e674e
dc.subjectAlgorithmsen
dc.subjectMesh generationen
dc.subjectMESH networkingen
dc.subjectSensor nodesen
dc.subjectWireless sensor networksen
dc.subjectArbitrary networksen
dc.subjectAsynchronousen
dc.subjectFinite memoryen
dc.subjectMalicious agenten
dc.subjectMesh topologiesen
dc.subjectMultiple mobile agentsen
dc.subjectPrior knowledgeen
dc.subjectRendezvous problemsen
dc.subjectMobile agentsen
dc.subjectSpringer Verlagen
dc.titleMobile agents rendezvous in spite of a malicious agenten
dc.typeconferenceItemen


Αρχεία σε αυτό το τεκμήριο

ΑρχείαΜέγεθοςΤύποςΠροβολή

Δεν υπάρχουν αρχεία που να σχετίζονται με αυτό το τεκμήριο.

Αυτό το τεκμήριο εμφανίζεται στις ακόλουθες συλλογές

Εμφάνιση απλής εγγραφής