36
9

Broadcast CONGEST Algorithms against Adversarial Edges

Abstract

We consider the corner-stone broadcast task with an adaptive adversary that controls a fixed number of tt edges in the input communication graph. In this model, the adversary sees the entire communication in the network and the random coins of the nodes, while maliciously manipulating the messages sent through a set of tt edges (unknown to the nodes). Since the influential work of [Pease, Shostak and Lamport, JACM'80], broadcast algorithms against plentiful adversarial models have been studied in both theory and practice for over more than four decades. Despite this extensive research, there is no round efficient broadcast algorithm for general graphs in the CONGEST model of distributed computing. We provide the first round-efficient broadcast algorithms against adaptive edge adversaries. Our two key results for nn-node graphs of diameter DD are as follows: 1. For t=1t=1, there is a deterministic algorithm that solves the problem within O~(D2)\widetilde{O}(D^2) rounds, provided that the graph is 3 edge-connected. This round complexity beats the natural barrier of O(D3)O(D^3) rounds, the existential lower bound on the maximal length of 33 edge-disjoint paths between a given pair of nodes in GG. This algorithm can be extended to a O~(DO(t))\widetilde{O}(D^{O(t)})-round algorithm against tt adversarial edges in (2t+1)(2t+1) edge-connected graphs. 2. For expander graphs with edge connectivity of Ω(t2logn)\Omega(t^2\log n), there is an improved broadcast algorithm with O(tlog2n)O(t \log ^2 n) rounds against tt adversarial edges. This algorithm exploits the connectivity and conductance properties of G-subgraphs obtained by employing the Karger's edge sampling technique. Our algorithms mark a new connection between the areas of fault-tolerant network design and reliable distributed communication.

View on arXiv
Comments on this paper