skip to main content
10.1145/3631461.3631551acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicdcnConference Proceedingsconference-collections
research-article
Open Access

A Further Study on Weak Byzantine Gathering of Mobile Agents

Published:22 January 2024Publication History

ABSTRACT

The gathering of mobile agents in the presence of Byzantine faults is first studied by Dieudonné et al.. Authors provide a polynomial time algorithm handling any number of weak Byzantine agents in the presence of at least one good agent considering start-up delays, i.e., the good agents may not wake up at the same time. Hirose et al. come up with an algorithm considering start-up delays that use a strong team of at least 4f2 + 8f + 4 many good agents but runs much faster than that of Dieudonné et al.. Later Hirose et al. provide another polynomial time algorithm for gathering in the presence of at least 8f + 8 good agents. However, this algorithm does not work in the presence of start-up delays, also simultaneous termination of good agents is not possible. We, in this work, provide an algorithm considering start-up delays of the good agents reducing the number of good agents w.r.t. Hirose et al. from 4f2 + 8f + 4 to f2 + 4f + 9. Also, our algorithm guarantees simultaneous termination of the good agents.

References

  1. Steve Alpern and Shmuel Gal. 2003. The theory of search games and rendezvous. International series in operations research and management science, Vol. 55. Kluwer.Google ScholarGoogle Scholar
  2. Edward J. Anderson and Sándor P. Fekete. 1998. Asymmetric Rendezvous on the Plane. In Proceedings of the Fourteenth Annual Symposium on Computational Geometry (Minneapolis, Minnesota, USA) (SCG ’98). Association for Computing Machinery, New York, NY, USA, 365–373. https://doi.org/10.1145/276884.276925Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Sébastien Bouchard, Yoann Dieudonné, and Bertrand Ducourthial. 2016. Byzantine Gathering in Networks. Distrib. Comput. 29 (2016), 435–457.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Sébastien Bouchard, Yoann Dieudonné, and Anissa Lamani. 2022. Byzantine Gathering in Polynomial Time. Distrib. Comput. 35 (2022), 235–263.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Mark Cieliebak, Paola Flocchini, Giuseppe Prencipe, and Nicola Santoro. 2003. Solving the Robots Gathering Problem. In Automata, Languages and Programming, Jos C. M. Baeten, Jan Karel Lenstra, Joachim Parrow, and Gerhard J. Woeginger (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 1181–1196.Google ScholarGoogle Scholar
  6. Reuven Cohen and David Peleg. 2005. Convergence Properties of the Gravitational Algorithm in Asynchronous Robot Systems. SIAM J. Comput. 34, 6 (2005), 1516–1528.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Jurek Czyzowicz, Andrzej Pelc, and Arnaud Labourel. 2012. How to meet asynchronously (almost) everywhere. ACM Trans. Algorithms 8, 4 (2012), 37:1–37:14.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Anders Dessmark, Pierre Fraigniaud, Dariusz R. Kowalski, and Andrzej Pelc. 2006. Deterministic Rendezvous in Graphs. Algorithmica 46, 1 (2006), 69–96.Google ScholarGoogle ScholarCross RefCross Ref
  9. Yoann Dieudonné, Andrzej Pelc, and David Peleg. 2014. Gathering Despite Mischief. ACM Trans. Algorithms 11 (2014), 28 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. R. Weber E. Anderson. 1990. The rendezvous problem on discrete locations. Journal of Applied Probability 28 (1990), 839–851.Google ScholarGoogle ScholarCross RefCross Ref
  11. Sándor P. Fekete Edward J. Anderson. 2001. Two Dimensional Rendezvous Search. Operation Research 49 (2001), 107–118.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Paola Flocchini, Giuseppe Prencipe, Nicola Santoro, and Peter Widmayer. 2005. Gathering of asynchronous robots with limited visibility. Theoretical Computer Science 337, 1 (2005), 147–168.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Paola Flocchini, Giuseppe Prencipe, Nicola Santoro, and Peter Widmayer. 2005. Gathering of asynchronous robots with limited visibility. Theoretical Computer Science 337, 1 (2005), 147–168. https://doi.org/10.1016/j.tcs.2005.01.001Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Jion Hirose, Junya Nakamura, Fukuhito Ooshita, and Michiko Inoue. 2021. Gathering with a Strong Team in Weakly Byzantine Environments. In Proceedings of the 22nd International Conference on Distributed Computing and Networking (Nara, Japan) (ICDCN ’21). Association for Computing Machinery, New York, NY, USA, 26–35. https://doi.org/10.1145/3427796.3427799Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Jion Hirose, Junya Nakamura, Fukuhito Ooshita, and Michiko Inoue. 2022. Brief Announcement: Gathering Despite a Linear Number of Weakly Byzantine Agents. In Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing (Salerno, Italy) (PODC’22). Association for Computing Machinery, New York, NY, USA, 375–377. https://doi.org/10.1145/3519270.3538470Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Amos Israeli and Marc Jalfon. 1990. Token Management Schemes and Random Walks Yield Self-Stabilizing Mutual Exclusion. In Proceedings of the Ninth Annual ACM Symposium on Principles of Distributed Computing (Quebec City, Quebec, Canada) (PODC ’90). Association for Computing Machinery, New York, NY, USA, 119–131. https://doi.org/10.1145/93385.93409Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Dariusz R. Kowalski and Adam Malinowski. 2008. How to meet in anonymous network. Theoretical Computer Science 399, 1 (2008), 141–156.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. W. Lim and S. Alpern. 1996. Minimax rendezvous on the line. SIAM Journal on Control and Optimization 34 (1996), 1650–1665.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Gianluca De Marco, Luisa Gargano, Evangelos Kranakis, Danny Krizanc, Andrzej Pelc, and Ugo Vaccaro. 2006. Asynchronous deterministic rendezvous in graphs. Theor. Comput. Sci. 355, 3 (2006), 315–326.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Avery Miller and Ullash Saha. 2020. Fast Byzantine Gathering with Visibility in Graphs. In Algorithms for Sensor Systems, Cristina M. Pinotti, Alfredo Navarra, and Amitabha Bagchi (Eds.). Springer International Publishing, Cham, 140–153.Google ScholarGoogle Scholar
  21. Andrzej Pelc. 2012. Deterministic rendezvous in networks: A comprehensive survey. Networks 59, 3 (2012), 331–347.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Andrzej Pelc. 2018. Deterministic gathering with crash faults. Networks 72, 2 (2018), 182–199.Google ScholarGoogle ScholarCross RefCross Ref
  23. Omer Reingold. 2008. Undirected connectivity in log-space. J. ACM 55, 4 (2008), 17:1–17:24.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Thomas S. Schelling. 1960. The strategy of conflict. Vol. 55. Oxford University Press, Oxford.Google ScholarGoogle Scholar
  25. Amnon Ta-Shma and Uri Zwick. 2014. Deterministic Rendezvous, Treasure Hunts, and Strongly Universal Exploration Sequences. ACM Trans. Algorithms 10 (2014), 15 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. L. Thomas. 1992. Finding your kids when they are lost. Journal of the Operational Research Society 43 (1992), 637–639.Google ScholarGoogle ScholarCross RefCross Ref
  27. Masashi TSUCHIDA, Fukuhito OOSHITA, and Michiko INOUE. 2018. Byzantine-Tolerant Gathering of Mobile Agents in Arbitrary Networks with Authenticated Whiteboards. IEICE Transactions on Information and Systems E101.D, 3 (2018), 602–610.Google ScholarGoogle Scholar
  28. Masashi Tsuchida, Fukuhito Ooshita, and Michiko Inoue. 2019. Gathering of Mobile Agents in Asynchronous Byzantine Environments with Authenticated Whiteboards. In Networked Systems, Andreas Podelski and François Taïani (Eds.). Springer International Publishing, Cham, 85–99.Google ScholarGoogle Scholar
  29. S. Gal V. Baston. 1998. Rendezvous on the line when the players’ initial distance is given by an unknown probability distribution. SIAM Journal on Control and Optimization 36 (1998), 1880–1889.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. S. Gal V. Baston. 2001. Rendezvous search when marks are left at the starting points. Naval Research Logistics 48 (2001), 722–731.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. A Further Study on Weak Byzantine Gathering of Mobile Agents

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICDCN '24: Proceedings of the 25th International Conference on Distributed Computing and Networking
      January 2024
      423 pages
      ISBN:9798400716737
      DOI:10.1145/3631461

      Copyright © 2024 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 22 January 2024

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)38
      • Downloads (Last 6 weeks)12

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format