A Further Study on Weak Byzantine Gathering of Mobile Agents

Ashish Saxena, Kaushik Mondal

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The gathering of mobile agents in the presence of Byzantine faults is first studied by Dieudonné et al.. Authors provide a polynomial time algorithm handling any number of weak Byzantine agents in the presence of at least one good agent considering start-up delays, i.e., the good agents may not wake up at the same time. Hirose et al. come up with an algorithm considering start-up delays that use a strong team of at least 4f2 + 8f + 4 many good agents but runs much faster than that of Dieudonné et al.. Later Hirose et al. provide another polynomial time algorithm for gathering in the presence of at least 8f + 8 good agents. However, this algorithm does not work in the presence of start-up delays, also simultaneous termination of good agents is not possible. We, in this work, provide an algorithm considering start-up delays of the good agents reducing the number of good agents w.r.t. Hirose et al. from 4f2 + 8f + 4 to f2 + 4f + 9. Also, our algorithm guarantees simultaneous termination of the good agents.

Original languageEnglish
Title of host publicationICDCN 2024 - Proceedings of the 25th International Conference on Distributed Computing and Networking
PublisherAssociation for Computing Machinery
Pages22-31
Number of pages10
ISBN (Electronic)9798400716737
DOIs
StatePublished - 4 Jan 2024
Externally publishedYes
Event25th International Conference on Distributed Computing and Networking, ICDCN 2024 - Chennai, India
Duration: 4 Jan 20247 Jan 2024

Publication series

NameACM International Conference Proceeding Series

Conference

Conference25th International Conference on Distributed Computing and Networking, ICDCN 2024
Country/TerritoryIndia
CityChennai
Period4/01/247/01/24

Keywords

  • Anonymous graphs
  • Byzantine Faults
  • Deterministic algorithm
  • Gathering
  • Mobile agents

ASJC Scopus subject areas

  • Human-Computer Interaction
  • Computer Networks and Communications
  • Computer Vision and Pattern Recognition
  • Software

Fingerprint

Dive into the research topics of 'A Further Study on Weak Byzantine Gathering of Mobile Agents'. Together they form a unique fingerprint.

Cite this