Skip to main content

Capturing an Intruder in the Pyramid

  • Conference paper
Computer Science – Theory and Applications (CSR 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3967))

Included in the following conference series:

Abstract

In this paper, we envision a solution for the problem of capturing an intruder in one of the most popular interconnection topologies, namely the pyramid. A set of agents collaborate to capture a hostile intruder in the network. While the agents can move in the network one hop at a time, the intruder is assumed to be arbitrarily fast, i.e. it can traverse any number of nodes contiguously as far as there are no agents in those nodes. Here we consider a new version of the problem where each agent can replicate new agents when needed, i.e. the algorithm starts with a single agent and new agents are created on demand. In particular, we propose two different algorithms on the pyramid network and we will later discuss about the merits of each algorithm based on some performance criteria.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Foukia, N., Hulaas, J.G., Harms, J.: Intrusion Detection with Mobile Agents. In: Proc. of the 11th Annual Conference of the Internet Society, INET 2001 (2001)

    Google Scholar 

  2. Barrière, L., Flocchini, P., Fraigniaud, P., Santoro, N.: Capture of an Intruder by Mobile Agents. In: Proc. of SPAA 2002, Winnipeg, Manitoba, Canada (2002)

    Google Scholar 

  3. Asaka, M., Okazawa, S., Taguchi, A., Goto, S.: A method of tracing intruders by use of mobile agents. In: Proc. of the 9th Annual Conference of the Internet Society, INET 1999 (1999)

    Google Scholar 

  4. Helmer, G.G., Wong, J.S.K., Honavar, V., Miller, L.: Intelligent agents for intrusion detection. In: IEEE Information Technology Conference, pp. 121–124 (1998)

    Google Scholar 

  5. Flocchini, P., Huang, M.J., Luccio, F.L.: Contiguous Search in the Hyperdiamond for Capturing an Intruder. In: Proc. 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS), Denver, Colorado (2005)

    Google Scholar 

  6. Breisch, R.: An intuitive approach to speleology. Southwestern Cavers 6, 72–78 (1967)

    Google Scholar 

  7. Parsons, T.D.: Pursuit-evasion in a graph. In: Theory and Applications of Graphs, pp. 426–441. Springer, Heidelberg (1976)

    Google Scholar 

  8. Parsons, T.D.: The search number of a connected graph. In: Proc. Ninth Southeastern Conf. Combinatorics, Graph Theory and Computing, Winnipeg. Congress, vol. XXI, pp. 549–554 (1978)

    Google Scholar 

  9. Alspach, B.: Searching and Sweeping Graphs: A Brief Survey. (September 2004), accessible at ww.dmi.unict.it/combinatorics04/documenti%20pdf/alspach.pdf

  10. Bienstock, D., Seymour, P.: Monotonicity in graph searching. Journal of Algorithms 12, 239–245 (1991)

    Article  MathSciNet  MATH  Google Scholar 

  11. Cao, F., Hsu, D.F.: Fault-tolerance properties of pyramid networks. IEEE Transactions on Computers 48(1), 88–93 (1999)

    Article  MathSciNet  Google Scholar 

  12. Sarbazi-Azad, H., Ould-Khaoua, M., Mackenzie, L.M.: Algorithmic construction of Hamiltonians in pyramids. Information Processing Letters 80, 75–79 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  13. Dingle, A., Sudborough, H.: Simulation of binary trees and x-trees on pyramid networks. In: Proc. IEEE Symp. on Parallel & Distributed Processing, May 1992, pp. 220–229 (1992)

    Google Scholar 

  14. Leighton, F.T.: Introduction to parallel algorithms and architectures: arrays, trees, hypercubes. Morgan Kaufmann, San Francisco (1992)

    MATH  Google Scholar 

  15. Jenq, J.F., Sahni, S.: Image Shrinking and Expanding on a Pyramid. IEEE Transactions On Parallel and Distributed Systems 4(11), 1291–1296 (1993)

    Article  MATH  Google Scholar 

  16. Megiddo, N., Hakimi, S., Garey, M., Johnson, D., Papadimitriou, C.: The complexity of searching a graph. Journal of the ACM 35(1), 18–44 (1988)

    Article  MathSciNet  MATH  Google Scholar 

  17. Demirbas, M., Arora, A., Gouda, M.: A pursuer-evader game for sensor networks. In: Huang, S.-T., Herman, T. (eds.) SSS 2003. LNCS, vol. 2704, pp. 1–16. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  18. Yospanya, P., Laekhanukit, B., Nanongkai, D., Fakcharoenphol, J.: Detecting and cleaning intruders in sensor networks. In: Proceedings of the National Comp. Sci. and Eng. Conf. (NCSEC 2004) (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shareghi, P., Imani, N., Sarbazi-Azad, H. (2006). Capturing an Intruder in the Pyramid. In: Grigoriev, D., Harrison, J., Hirsch, E.A. (eds) Computer Science – Theory and Applications. CSR 2006. Lecture Notes in Computer Science, vol 3967. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11753728_58

Download citation

  • DOI: https://doi.org/10.1007/11753728_58

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34166-6

  • Online ISBN: 978-3-540-34168-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics