arXiv:0908.0390v1 [cs.DC] 4 Aug 2009 Byzantine Convergence in Robots Networks: The Price of Asynchrony Zohir Bouzid Maria Gradinariu S´ebastien Tixeuil Universit´e Pierre et Marie Curie - Paris 6, LIP6-CNRS 7606, France FirstName.LastName@lip6.fr Abstract We study the convergence problem in fully asynchronous, uni-dimensional robot net- works that are prone to Byzantine (i.e. malicious) failures. In these settings, oblivious anonymous robots with arbitrary initial positions are required to eventually converge to an a apriori unknown position despite a subset of them exhibiting Byzantine behavior. Our contribution is twofold. We propose a deterministic algorithm that solves the problem in the most generic settings: fully asynchronous robots that operate in the non-atomic CORDA model. Our algorithm provides convergence in 5f + 1-sized networks where f is the upper bound on the number of Byzantine robots. Additionally, we prove that 5f +1 is a lower bound whenever robot scheduling is fully asynchronous. This constrasts with pre- vious results in partially synchronous robots networks, where 3f + 1 robots are necessary and sufficient. Keywords: Robots networks, Byzantine tolerance, Asynchronous systems, Conver- gence. 1 Introduction The use of cooperative swarms of weak inexpensive robots for achieving complex tasks such as exploration or tracking in dangerous environments is a promising option for reducing both human and material costs. Robot networks recently became a challenging research area for distributed systems since most of the problems to be solved in this context (e.g. coordination, agreement, resource allocation or leader election) form the core of distributed computing. However, the classical distributed computing solutions do not translate well due to fundamentally different execution models. In order to capture the essence of distributed coordination in robot networks, two main computational models are proposed in the literature: the ATOM [10] and CORDA [9] models. The main difference between the two models comes from the granularity for executing a Look- Compute-Move cycle. In such a cycle, the Look phase consists in taking a snapshot of the other robots positions using its visibility sensors. In the Compute phase a robot computes a target destination based on its previous observation. The Move phase simply consists in moving toward the computed destination using motion actuators. In the ATOM model, the whole cycle is atomic while in the CORDA model, the cycle is executed in a continuous manner. That is, in the ATOM model, robots executing concurrently always remain in the same phase while in CORDA it is possible that e.g. a robot executes its Look phase while another robot performs its Move phase, or that a robot executes its Compute phase while its 1 view (obtained during the Look phase) is already outdated. Of course, executions that may appear in the CORDA model are a strict superset of those that may appear in the ATOM model, so a protocol that performs in the CORDA model also works in the ATOM model, but the converse is not true. Similarly, impossibility results for the ATOM model still hold in the CORDA model. Complementary to the granularity of robots action is the amount of asynchrony in the system, that is modeled by the scheduler: (i) a fully synchronous scheduler operates all robots in a lock-step manner forever, while (ii) a k-bounded scheduler preserves a ratio of k between the most often activated robot and the least often activated robot, finally (iii) a fully asynchronous scheduler only guarantees that every robots is activated infinitely often in an infinite execution. The robots that we consider have weak capacities: they are anonymous (they execute the same protocol and have no mean to distinguish themselves from the others), oblivious (they have no memory that is persistent between two cycles), and have no compass whatsoever (they are unable to agree on a common direction or orientation). Convergence is a fundamental agreement primitive in robot networks and is used in the implementation of a broad class of services (e.g. the construction of common coordinate systems or specific geometrical patterns). Given a set of oblivious robots with arbitrary initial locations and no agreement on a global coordinate system, convergence requires that all robots asymptotically approach the same, but unknown beforehand, location. Convergence looks similar to distributed approximate agreement since both problems require nodes to agree on a common object (that is instantiated to be a position in space for the case of convergence, or a value in the case of distributed agreement). Related works Since the pioneering work of Suzuki and Yamashita [10], gathering1 and convergence have been addressed in fault-free systems for a broad class of settings. Prencipe [9] studied the problem of gathering in both ATOM and CORDA models, and showed that the problem is intractable without additional assumptions such as being able to detect the multiplicity of a location (i.e., knowing if there is more than one robot in a given location). The case of fault-prone robot networks was recently tackled by several academic studies. The faults that have been investigated fall in two categories: crash faults (i.e. a faulty robots stops executing its cycle forever) and Byzantine faults (i.e. a faulty robot may exhibit arbitrary behavior and movement). Of course, the Byzantine fault model encompasses the crash fault model, and is thus harder to address. Deterministic fault-tolerant gathering is addressed in [2] where the authors study a gathering protocol that tolerates one crash, and an algorithm for the ATOM model with fully synchronous scheduling that tolerates up to f byzantine faults, when the number of robots is (strictly) greater than 3f. In [6] the authors study the feasibility of probabilistic gathering in crash-prone and Byzantine-prone environments. Deterministic fault-tolerant convergence was first addressed in [4, 5], where algorithms based on convergence to the center of gravity of the system are presented. Those algorithms work in the ATOM [4] and CORDA [5] models with a fully asynchronous scheduler and tolerate up to f (n > f) crash faults, where n is the number of robots in the system. Most related to this paper are [1, 3], where the authors studied convergence in byzantine- prone environments when robots move in a uni-dimensional space. In more details, [1] showed that convergence is impossible if robots are not endowed with strong multiplicity detectors which are able to detect the exact number of robots that may simultaneously share the same 1Gathering requires robots to actually reach a single point within finite time regardless of their initial positions. 2 Reference Computation Model Scheduler Bounds [2] ATOM fully synchronous n > 3f [1] ATOM fully synchronous n > 2f ATOM k-bounded n > 3f CORDA k-bounded n > 4f [3] CORDA k-bounded n > 3f This paper CORDA fully asynchronous n > 5f Table 1: Byzantine resilience bounds for deterministic convergence location. The same paper defines the class of cautious algorithms which guarantee that correct robots always move inside the range of positions held by correct robots, and proved that any cautious convergence algorithm that can tolerate f Byzantine robots requires the presence of at least 2f + 1 robots in fully-synchronous ATOM networks and 3f + 1 robots in k-bounded (and thus also in fully asynchronous) ATOM networks. The lower bound for the ATOM model naturally extends to the CORDA model, and [3] provides a matching upper bound in the k-bounded CORDA model. Interestingly enough, all previously known deterministic Byzantine tolerant robot pro- tocols assume either the more restrictive ATOM model [6], or the constrained fully syn- chronous [2] or k-bounded [1, 3] schedulers, thus the question of the existence of such protocols in a fully asynchronous CORDA model remains open. Our contribution We present the first study of Byzantine resilient robot protocols that considers the most general execution model: the CORDA model together with the fully asynchronous scheduler. We concentrate on the convergence problem and prove that the fully asynchronous scheduler implies a lower bound of 5f + 1 for the number n of robots for the class of cautious protocols (this bound holds for both ATOM and CORDA models). We also exhibit a deterministic protocol that matches this lower bound (that is, provided that n ≥5f + 1, our protocol is determinstic and performs in the CORDA model with fully asynchronous scheduling). Table 1 summarizes the characteristics of our protocol with respect to previous work on Byzantine tolerant robot convergence (better characteristics for a protocol are depicted in boldface). Outline The remaining of the paper is organized as follows: Section 2 presents our model and robot network assumptions. This section also presents the formal specification of the convergence problem. Section 3 presents the byzantine resilience lower bound proof. Sec- tion 4 describes our protocol and its complexity, while concluding remarks are presented in Section 5. 2 Model and Problem Definition Most of the notions presented in this section are borrowed from[10, 8, 2]. We consider a network that consists of a finite set of robots arbitrarily deployed in a uni-dimensional space. The robots are devices with sensing, computing and moving capabilities. They can observe (sense) the positions of other robots in the space and based on these observations, they perform some local computations that can drive them to other locations. 3 In the context of this paper, the robots are anonymous, in the sense that they can not be distinguished using their appearance, and they do not have any kind of identifiers that can be used during the computation. In addition, there is no direct mean of communication between them. Hence, the only way for robots to acquire information is by observing their positions. Robots have unlimited visibility, i.e. they are able to sense the entire set of robots. Robots are also equipped with a strong multiplicity sensor that provides robots with the ability to detect the exact number of robots that may simultaneously occupy the same location. We assume that the robots cannot remember any previous observation nor computation performed in any previous step. Such robots are said to be oblivious (or memoryless). A protocol is a collection of n programs, one operating on each robot. The program of a robot consists in executing Look-Compute-Move cycles infinitely many times. That is, the robot first observes its environment (Look phase). An observation returns a snapshot of the positions of all robots within the visibility range. In our case, this observation returns a snap- shot (also called configuration hereafter) of the positions of all robots denoted with P(t) = {P1(t), ..., Pn(t)}. The positions of correct robots are referred as U(t) = {U1(t), ..., Um(t)} where m denotes the number of correct robots. Note that U(t) ⊆P(t). The observed po- sitions are relative to the observing robot, that is, they use the coordinate system of the observing robot. We denote by P i(t) = {P i 1(t), ..., P i n(t)} the configuration P(t) given in terms of the coordinate system of robot i (U i(t) is defined similarly). Based on its observa- tion, a robot then decides — according to its program — to move or to stay idle (Compute phase). When a robot decides a move, it moves to its destination during the Move phase. An execution e = (c0, . . . , ct, . . .) of the system is an infinite sequence of configurations, where c0 is the initial configuration2 of the system, and every transition ci →ci+1 is associated to the execution of a subset of the previously defined actions. A scheduler is a predicate on computations, that is, a scheduler defines a set of admissible computations, such that every computation in this set satisfies the scheduler predicate. A scheduler can be seen as an entity that is external to the system and selects robots for execution. As more power is given to the scheduler for robot scheduling, more different executions are possible and more difficult it becomes to design robot algorithms. In the remaining of the paper, we consider that the scheduler is fully asynchronous, that is, in any infinite execution, every robot is activated infinitely often, but there is no bound for the ration between the most activated robot and the least activated one. We now review the main differences between the ATOM [10] and CORDA [8] models. In the ATOM model, whenever a robot is activated by the scheduler, it performs a full computation cycle. Thus, the execution of the system can be viewed as an infinite sequence of rounds. In a round one or more robots are activated by the scheduler and perform a computation cycle. The fully-synchronous ATOM model refers to the fact that the scheduler activates all robots in each round, while the regular ATOM model enables the scheduler to activate only a subset of the robots. In the CORDA model, robots may be interrupted by the scheduler after performing only a portion of a computation cycle. In particular, phases (Look, Compute, Move) of different robots may be interleaved. For example, a robot a may perform a Look phase, then a robot b performs a Look-Compute-Move complete cycle, then a computes and moves based on its previous observation (that does not correspond to the current configuration anymore). As a result, the set of executions that are possible in the 2Unless stated otherwise, we make no specific assumption regarding the respective positions of robots in initial configurations. 4 CORDA model are a strict superset of those that are possible in the ATOM model. So, an impossibility result that holds in the ATOM model also holds in the CORDA model, while an algorithm that performs in the CORDA model is also correct in the ATOM model. Note that the converse is not necessarily true. The faults we address in this paper are Byzantine faults. A byzantine (or malicious) robot may behave in arbitrary and unforeseeable way. In each cycle, the scheduler determines the course of action of faulty robots and the distance to which each non-faulty robot will move in this cycle. However, a robot i is guaranteed to move a distance of at least δi towards its destination before it can be stopped by the scheduler. Our convergence algorithm performs operations on multisets. A multiset or a bag S is a generalization of a set where an element can have more than one occurrence. The number of occurrences of an element a is referred as its multiplicity. The total number of elements of a multiset, including their repeated occurrences, is referred as the cardinality and is denoted by |S|. min(S)(resp. max(S)) is the smallest (resp. largest) element of S. If S is nonempty, range(S) denotes the set [min(S), max(S)] and diam(S) (diameter of S) denotes max(S) −min(S). Given an initial configuration of n autonomous mobile robots (m of which are correct such that m ≥n−f), the point convergence problem requires that all correct robots asymptotically approach the exact same, but unknown beforehand, location. In other words, for every ǫ > 0, there is a time tǫ from which all correct robots are within distance of at most ǫ of each other. Definition 2.1 (Byzantine Convergence) A system of oblivious robots satisfies the Byzan- tine convergence specification if and only if ∀ǫ > 0, ∃tǫ such that ∀t > tǫ, ∀i, j ≤m, distance(Ui(t), Uj(t)) < ǫ, where Ui(t) and Uj(t) are the positions of some correct robots i and j at time t, and where distance(a, b) denote the Euclidian distance between two positions. Definition 2.1 requires the convergence property only from the correct robots. Note that it is impossible to obtain the convergence for all robots since Byzantine robots may exhibit arbitrary behavior and never join the position of correct robots. 3 Impossibility for n ≤5f and a fully asynchronous scheduler In this section we prove the fact that, when the number of robots in the network does not exceed 5f (with f of those robots possibly being Byzantine), the problem of Byzantine resilient convergence is impossible to solve under a fully asynchronous scheduler. The result is proved for the weaker ATOM model, and thus extends to the CORDA model. Our proof is based on a particular initial setting from which we prove that no cautious convergence algorithm is possible if the activation of robots is handled by a fully asynchronous scheduler. Consider a network N of n robots placed on a line segment [A, B], f of which may be Byzantine with n ≤5f. We consider that robots are ordered from left to right. This order is only given for ease of presentation of the proof and is unknown to robots that can not use it in their algorithms. It was proved in [1] that the problem is impossible to solve when n ≤3f, we thus consider here the case when 3f < n ≤5f only. The initial placement of correct robots is illustrated in Figure 1: f robots are at location A, f others robots are at location B and the remaining m −2f ones are located at some intermediate location between A and B. The impossibility proof depends on the ability of the adversary to move these m −2f robots along [A, B], so their position is denoted by a variable X, with X belonging to interval 5 (A, B). In the following, these three groups of robots located at A, B and X will be referred as SetA, SetB and SetX respectively. The positions of the Byzantine robots are determined by the adversary. Figure 1: Robot Network N (Configuration C1) for (n = 9, f = 2) We show by contradiction that in these conditions, no cautious convergence algorithm is possible. Assume that there exists a cautious convergence algorithm P that is correct when the robots are activated by a fully asynchronous scheduler, then we show that in this setting, any cautious algorithm P satisfies properties that can by used by the adversary to prevent convergence of P, which is a contradiction. The properties satisfied by all cautious protocols are captured in the following two basic facts: • Fact 1: If all Byzantine robots are inside [A, X] (resp. [X, B]) then when robots of SetA (resp. SetB) are activated, their calculated destination points are necessarily inside [A, X] (resp. [X, B]). This fact is proved by Lemma 3.1. • Fact 2: The adversary is able to move the robots of SetX as close as desired to location A (resp. B). This is proved by Lemmas 3.2, 3.3 and 3.4. Based on this, the adversary first moves the robots of SetX very close to A (using Fact 2) and then activates the robots of SetA that remain in the neighborhood of A (due to Fact 1). Afterward, it moves the intermediate robots of SetX very close to B (using Fact 2) and activates the robots of SetB which also remain in the neighborhood of B (due to Fact 1). By repeating these actions indefinitely, the adversary ensures that every robot is activated infinitely often in the execution yet prevents convergence at the same time since robots at A and B remain always arbitrarily close to their initial positions and never converge. In the following, we prove Fact1 and Fact2 by a sequence of lemmas, and then give a formal presentation of the algorithm used by the adversary to prevent any cautious protocol from achieving convergence. Lemma 3.1 In N, ∀X ∈(A, B), if all Byzantine robots are inside [A, X] (resp. [X, B]) then when robots of SetA (resp. SetB) are activated, their destination points computed by any cautious algorithm are necessarily inside [A, X] (resp. [X, B]). To prove Fact2, we use the network N described above (see Figure 1). We prove only the capability of the adversary to move the intermediate robots at X as close as wanted to B, the other case being symmetric. Fact2 implies that if the number of robots in the network is lower or equal to 5f then it always exists a judicious placement of the Byzantine robots that permits the adversary to make the intermediate robots in X move in the direction of B up to a location that is as close as desired to B. We divide the analysis in two cases depending on the parity of (n −f). 6 Case 1: (n −f) is even To push the robots of SetX as close to A or B as wanted, the adversary uses algorithm GoToBorder1 (G2B1) described as Algorithm 1. Informally, the algorithm divides Byzantines robots between position X and the target border to which the adversary wants to push the robots of SetX (e.g. B in what follows). The aim of the adversary is to maintain the same number of robots in X and B (this is possible because n −f is even). We prove that in this case, any cautious convergence algorithm makes the robots of SetX move towards B. However, the distance traveled by them may be too small to bring them sufficiently close to B. Since the scheduler is fully asynchronous, it is authorized to activate the robots of SetX as often as necessary to bring them close to B, as long as it does so for a finite number of times. Algorithm 1 GoToBorder1 (G2B1) Input: Border: the border towards which robots of SetX move (equal to A or B). Input: d: a distance. Actions: while distance(X, Border) > d do Place (n −3f)/2 byzantine robots at Border. Place (5f −n)/2 byzantine robots at X. Activate simultaneously all robots of SetX and make them move to their computed destination D. X ←D end while Lemma 3.2 If (n−f) is even, ∀d < distance(A, B), ∀Border ∈A, B, algorithm G2B1(Border, d) terminates. Case 2: (n −f) is odd To prove Lemma 3.2, we relied on the symmetry induced by the placement of Byzantine robots. This symmetry is possible only because (n −f) is even. Indeed, having the same number of robots in B and X implies that convergence responsibility is delegated to both robots at X and at B (there is no asymmetry to exploit to get one of these two groups play a role that would be different from the other group. Robots of SetX and SetB have thus no other choice but to move toward each other when they are activated. The distance traveled at each activation must be large enough to ensure the eventual convergence of the algorithm. However, the situation is quite different when (n −f) is odd. Indeed, the number of robots is necessarily different in X and B, which means that one of the two points has a greater multiplicity than the other. Then in this case there is no guarantee that a cautious convergence algorithm will order the robots of SetX to move toward B when they are activated (the protocol could delegate the convergence responsibility to robots of SetB). Nevertheless, we observe that whatever the cautious algorithm is, if it does not move the robots that are located at the greatest point of multiplicity, it must do so for those at the smallest one (and vice versa), otherwise no convergence is ever possible. The convergence is thus either under the responsibility of robots at the larger point of multiplicity or those at the smaller one (or both). This observation is exploited by Algorithm GoToBorder2 (G2B2) that is presented as Algorithm 2, that tries the two possible cases to ensure its proper functioning when confronted 7 to any cautious algorithm. The algorithm forms the larger point of multiplicity at B at one cycle, and the next cycle at X. Thus, point X will be the larger point of multiplicity one time, and the smallest one the next time. This implies that the robots of SetX must move towards B at least once every two cycles. So by repeatedly alternating between the two configurations where robots of SetX are successively the set of larger and smaller multiplicity, the adversary ensures that they end up moving towards B. The fully asynchrony of the scheduler ensures that they are activated as many times as it takes to move them as close to B as wanted, provided that the algorithm terminates. Algorithm 2 GoToBorder2 (G2B2) Input: Border: the border towards which the robots of SetX move (equal to A or B). Input: d: a distance. Actions: Place (n −3f + 1)/2 Byzantine robots at Border. Place (5f −n −1)/2 Byzantine robots at X. while distance(X, Border) > d do Activate simultaneously all robots at X and make them move to their computed destination D. X ←D. Move a Byzantine robot from Border to X. Activate simultaneously all robots at X and make them move to their computed destination D. X ←D Move a Byzantine robot from X to Border. end while Lemma 3.3 If (n−f) is odd, ∀d < distance(A, B), ∀Border ∈A, B, algorithm G2B2(Border, d) terminates. We are now ready to prove Fact2. Lemma 3.4 For n ≤5f, ∀d < distance(A, B), if the robots run a cautious convergence algorithm, the fully distributed scheduler is able to move the robots of SetX into a position ≥B −d or ≤A + d. Proof : The proof follows directly from Lemmas 3.2 and 3.3. □ The Split function The purpose of Algorithms G2B1 and G2B2 is to push the intermedi- ate robots of SetX as close the adversary want to the extremities of the network. For ease of the description, we assume in what follows that the adversary want to push them towards the extremity B. These two routines are then used by the adversary to prevent the convergence of the algorithm. For the algorithm of the adversary to work, it is necessary to keep the robots of SetA, SetB and SetX separated from each other and to avoid for example that the robots of SetX merge with those of SetB and form a single point of multiplicity. Yet, functions G2B1 and G2B2 cannot prevent such a situation to appear because the destinations are computed by the convergence algorithm which can order the robots to move exactly towards B. If the distance to travel is too small (distance(X, B) ≤δi for all i ∈SetX), then the adversary can not stop the robots of SetX before they arrive at B. To recover from this situation and separate the robots that have merged, we define a new function Split(Set, Border) which 8 separates the robots of Set from those located at Border. For example, Split(SetX, B) sepa- rates the robots of SetX from those of SetB by directing them towards A. Lemma 3.5 is used to prove that function Split performs as planned. Let N be a network of n robots divided between two positions A and B. let p and q be the number of robots at A and B respectively. These robots are endowed with a cautious convergence algorithm that tolerate the presence of up to f Byzantine robots. Lemma 3.5 proves that if a robot in A or B is activated, it cannot remain in its position and moves toward the robots located in the other point. Lemma 3.5 If |p−q| ≥f, then if a robot at A (resp. B) is activated, its destination computed by any cautious convergence algorithm lays inside (A, B] (resp. [A, B)). We now present Function Split(Set, Border) that is presented as Algorithm 3. We first define Maxδ as max{δi/i is a correct robot} such that δi is the minimum distance that can be traveled by a robot i before it may be stopped by the adversary. This means that if a group of robots (SetX in our case) are distant from their destination by more than Maxδ, the adversary is able to stop them all before they reach their destination. Notice now that in the setting of network N described in Figure 1, SetA and SetB contain each exactly f correct robots. If robots of SetX merge with those of SetB for example, they form a set of n −2f correct robots colocated in the same multiplicity point. By placing all the Byzantine robots at A, this location contains a set of 2f robots. The difference between the two sets of robots in A and B is lower or equal to f (because 3f < n ≤5f). Then if we activate the robots of SetX (which are located at B), they will move towards A according to Lemma 3.5. By stopping these robots once they all travelled a distance equal to Maxδ or reached they destination before, we ensure that the three sets SetA, SetX and SetB are disjoint, because the initial distance between A and B is > Maxδ. Algorithm 3 Function Split(Set, Border) Require: distance(A, B) > Maxδ Variables: Input: Border: is equal to A or to B. Input: Set: the set of robots to move away from Border. OppositeBorder: is equalt to B if the input Border is equal to A, and vice versa. Actions: Place all Byzantine robots in OppositeBorder. Activate the robots of Set, and stop them at a point Maxδ away from Border. The fully asynchronous scheduler algorithm Theorem 3.6 In the ATOM model, the problem of Byzantine resilient convergence is impos- sible to solve with a cautious algorithm under a fully asynchronous scheduler. Proof : We prove that for network N, there can be no cautious convergence algorithm for n ≤5f if the robots are activated by a fully asynchronous scheduler. The algorithm of the adversary is given as Algorithm 4 and it can prevent any cautious algorithm to converge. Indeed, if the initial distance between robots at A and B is equal to d, then these robots will always remain distant from each other by a distance at least equal to 6d/10. The proof of algorithm 4 follows directly from Lemmas 3.1, 3.4 and 3.5. □ 9 Algorithm 4 Adversary Algorithm Require: distance(A, B) > Maxδ Definitions: d0: any distance that is strictly smaller than distance(A, B)/4, let d0 ←distance(A, B)/10. G2B(Border, d): equal to G2B1(Border, d) if n −f is even and equal to G2B2(Border, d) if n −f is odd Actions: while true do G2B(A, d0). Activate the robots at A. if the robots of SetX are at A, then Split(SetX, A). G2B(B, d0). Activate the robots at B. if the robots of SetX are at B, then Split(SetX, B). d0 ←d0/2 end while 4 Deterministic Asynchronous Convergence In this section, we propose a deterministic convergence algorithm and prove its correctness in CORDA model under a fully asynchronous scheduler when there are at least 5f + 1 robots, f of which may be Byzantine. Algorithm Description The idea of our algorithm is based on three mechanisms: (1) a trimming function for the computation of destinations, (2) location dependency and (3) an election procedure. The purpose of the trimming function is to ignore the most extreme positions in the network when computing the destination. Robots move hence towards the center of the remaining positions. Consequently, the effect of Byzantine robots is canceled since they cannot drag the correct robots away from the range of correct positions. Location dependency affects the computation of the trimming function such that the re- turned result depends on the position of the calling robot. This leads to interesting properties on the relation between the position of a robot and its destination that are critical to conver- gence. The election procedure instructs to move only the robots located at the two extremes of the network. Thus, by the combined effect of these three mechanisms, as the algorithm progresses, the extreme robots come together towards the middle of the range of correct positions which ensures the eventual convergence of the algorithm. The algorithm uses three functions as follows. The trimming function trimi 2f() removes among the 2f largest positions of the multiset given in parameter only those that are greater than the position of the calling robot i. Similarly, it removes among the 2f smallest positions only those that are smaller than the position of the calling robot. It is clear that the output of trimi 2f() depends on the position of the calling robot. Formally, let minindexi be the index of the minimum position between Pi(t) and P2f+1(t) (if Pi(t) < P2f+1(t) then minindexi is equal to i, otherwise it is equal to 2f + 1). Similarly, let maxindexi be the index of the maximum position between Pi(t) and Pn−2f(t) (if Pi(t) > Pn−2f(t) then maxindexi is equal to i, otherwise it is equal to n −2f). trimi 2f(P(t)) is the multiset consisting of positions {Pminindexi(t), Pminindexi+1(t), . . . , Pmaxindexi(t)}. 10 The function center() simply returns the median point of the input range. The two functions are illustrated in Figure 2). The election function returns true if the calling robot is allowed to move. Only the robots that are located at the extremes of the networks are allowed to move, that is those whose position is either ≤Pf+1(t) or ≥Pn−f(t). Figure 2: Illustration of functions trimi 2f and center for robots A in a system of (n = 16, f = 3) robots. Algorithm 5 Convergence Algorithm under a fully asynchronous Scheduler Functions: trimi 2f(P(t)): removes up to 2f largest positions that are larger than Pi(t) and up to 2f smallest positions that are smaller than Pi(t) from the multiset P(t) given in parameter. center(): returns the point that is in the middle of the range of points given in parameter. elected() ≡((Pi(t) ≤Pf+1(t)) or (Pi(t) ≥Pn−f(t))). This function returns true if the calling robot is allowed to move. Actions: if elected() move towards center(trimi 2f(P(t))) By definition, convergence aims at asymptotically decreasing the range of possible posi- tions for the correct robots. The shrinking property captures this property. An algorithm is shrinking if there exists a constant factor α ∈(0, 1) such that starting in any configuration the range of correct robots eventually decreases by a multiplicative α factor. Note that to deal with the asynchrony of the model, the diameter calculation takes into account both the positions and destinations of correct robots. Definition 4.1 (Shrinking Algorithm) An algorithm is shrinking if and only if ∃α ∈ (0, 1) such that ∀t, ∃t′ > t, such that diam(U(t′)∪D(t′)) < α ∗diam(U(t)∪D(t)), where U(t) and D(t) are respectively the the multisets of positions and destinations of correct robots. A natural way to solve convergence is to never let the algorithm increase the diameter of correct robot positions. In this case the algorithm is called cautious. This notion was first introduced in [7]. A cautious algorithm is particularly appealing in the context of Byzantine failures since it always instructs a correct robot to move inside the range of the positions held by the correct robots regardless of the locations of Byzantine ones. The following definition introduced first in [1] customizes the definition of cautious algorithm proposed in [7] to robot networks. Definition 4.2 (Cautious Algorithm) Let Di(t) be the last destination calculated by the robot i before time t and let U i(t) the positions of the correct robots as seen by robot i before 11 time t. 3 An algorithm is cautious if it meets the following conditions: (i) cautiousness: ∀t, Di(t) ∈range(U i(t)) for each robot i, and (ii) non-triviality: ∀t, if diameter(U(t)) ̸= 0 then ∃t′ > t and a robot i such that Di(t′) ̸= Ui(t′) (at least one correct robot changes its position whenever convergence is not achieved). Theorem 4.1 [1] Any algorithm that is both cautious and shrinking solves the convergence problem in faulty robots networks. In the appendix we prove the correctness of Algorithm 5 in the CORDA model under a fully asynchronous scheduler. In order to show that Algorithm 5 converges, we prove first that it is cautious then we prove that it satisfies the specification of a shrinking algorithm. Convergence then follows from Theorem 4.1. 5 Concluding remarks Our work closes the study of the convergence problem for unidimensional robot networks. We studied the convergence problem under the most generic settings: asynchronous robots under unbounded adversaries and byzantine fault model. We proved that in these settings the byzantine resilience lower bound is 5f + 1 and we propose and prove correct the first deterministic convergence algorithm that meets this lower bound. We curently investigate the extension of the curent work to the multi-dimensional spaces. References [1] Byzantine-resilient convergence in oblivious robot networks. International Conference on Distributed Systems and Networks (ICDCN 2009), pages 275–280, January 2009. [2] N. Agmon and D. Peleg. Fault-tolerant gathering algorithms for autonomous mobile robots. Symposium on Discrete Algorithms: Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms, 11(14):1070–1078, 2004. [3] Z. Bouzid, M. G. Potop-Butucaru, and S. Tixeuil. Optimal byzantine resilient convergence in asynchronous robot networks. CoRR, abs/0906.0651, 2009. [4] R. Cohen and D. Peleg. Robot convergence via center-of-gravity algorithms. Proc. of the 11th Int. Colloquium on Structural Information and Communication Complexity, pages 79–88, 2004. [5] R. Cohen and D. Peleg. Convergence properties of the gravitational algorithm in asynchronous robot systems. SIAM Journal on Computing, 34(6):1516–1528, 2005. [6] X. Defago, M. Gradinariu, S. Messika, and P.R. Parvedy. Fault-tolerant and self-stabilizing mobile robots gathering. DISC06, the 20th International Conference on Distributed Computing. LNCS, 3274:46–60, 2006. [7] D. Dolev, N.A. Lynch, S.S. Pinter, E.W. Stark, and W.E. Weihl. Reaching approximate agreement in the presence of faults. Journal of the ACM (JACM), 33(3):499–516, 1986. [8] G. Prencipe. Corda: Distributed coordination of a set of autonomous mobile robots. In Proc. 4th European Research Seminar on Advances in Distributed Systems (ERSADS’01), pages 185–190, Bertinoro, Italy, May 2001. [9] G. Prencipe. On the feasibility of gathering by autonomous mobile robots. In A. Pelc and M. Raynal, editors, Proc. Structural Information and Communication Complexity, 12th Intl Coll., SIROCCO 2005, volume 3499 of LNCS, pages 246–261, Mont Saint-Michel, France, May 2005. Springer. [10] I. Suzuki and M. Yamashita. Distributed anonymous mobile robots: Formation of geometric patterns. SIAM Journal of Computing, 28(4):1347–1363, 1999. 3If the last calculation was executed at time t′ ≤t then Di(t) = Di(t′). 12 Appendix Proof of Lemma 3.1 Proof : We prove the lemma only for the case when all Byzantine robots are inside [A, X], and we denote the corresponding configuration by C1 (see Figure 1). The case where all Byzantine robots are inside [X, B] is symmetric. Figure 3: Illustration of Lemma 3.1, configuration C2 Let C2 (see Figure 3) be a similar configuration of n robots where the distribution of positions is isomorphic to that of C1, but where the correct and Byzantine robots are located differently: all robots at B are byzantine (there are f such robots), and all robots inside [A, X] are correct. Since the robot convergence algorithm is cautious, the diameter of correct robots in C2 must never decrease, and then all their calculated destination points must lay inside [A, X]. Since C1 and C2 are indistinguishable to individual robots of SetA, the Look and Compute phases give the same result in the two cases, which proves our lemma. □ Proof of Lemma 3.2 Proof : We prove the Lemma by contradiction. We assume that the algorithm does not terminate for a given input distance d0, and we prove that this leads to a contradiction. We consider only the case where Border = B, the other case being symmetric. The non- termination of the algorithm implies that there exists some distance d1 ≤d0 such that robots at X and B always remain distant by at least d1 from each other, even if robots at X are activated indefinitely. Note that the placement of Byzantine robots in G2B1 implies that initially, and for n ≤5f, the number of robots located at X and B is the same and is equal to (n −f)/2 as illustrated in Figure 4.(a). We denote by C1 the resulting configuration. We now construct a configuration C2 (see Figure 4.(b)) that is isomorphic to C1 but with a different distribution of Byzantine and correct robots: correct robots are divided equally between X and B, (n−f)/2 correct robots at X and (n −f)/2 others at B. By hypothesis, these robots are supposed to converge to a single point (located between X and B as the convergence point is computed by a cautious algorithm). The placement of Byzantine robots and the choice of activated robots at each cycle is divided into two parts. During even cycles, Byzantine robots are placed at point A and robots located at X are activated. During odd cycles, the scheduler constructs a strictly symmetrical configuration by moving Byzantine robots from A to a point E with E > B and distance(B, E) = distance(A, X). In this case, the scheduler activates robots at B. In these conditions, activating robots at X ensures that they always remain at a distance of at least d1 from those located at B (as in configuration C1). Indeed, configurations C1 and C2 are equivalent and completely indistinguishable to individual robots which must behave similarily in both cases (as the algorithm is deterministic). And by symmetry, the activation i (a) Configuration C1 for (n = 13, f = 3) (b) Configuration C2 for (n = 13, f = 3) Figure 4: Illustration of lemma 3.2 (Fact2, (n −f) even) of robots at B during odd cycles also ensures that minimum distance of d1 between the two groups of robots. Hence, robots at X and B remain separated by a distance of at least d1 forever even if activated indefinitely, which prevents the convergence of the algorithm and leads to a contradiction. This proves our Lemma. □ Proof of Lemma 3.3 Proof : We consider in our proof only the case when Border = B since the other case is symmetric. The placement of Byzantine robots in G2B2 is such that the multiplicity of X exceeds that of B by 1 during even cycles, and lowers it by 1 during odd cycles. We denote by C0 the initial configuration (in which the multiplicity of X is less than of B by 1 as illustrated in Figure 5.(a)). We assume for the purpose of contradiction that G2B2 does not terminate for some input distance d0. This means that robots of SetX and SetB remain always distant from each others by a distance at least equal to d1 with d1 being some distance ≤d0. The resulting execution in this case is denoted by E0 = {C0, C1, C2, C3, ...}. A configuration Ci+1 is obtained from Ci by activating robots at X, letting them execute their Move phases, and moving one Byzantine robot from X to B or vice versa. (a) Initial configuration C0 for (n = 12, f = 3) (b) Initial configuration C′ 0 for (n = 12, f = 3) Figure 5: Illustration of lemma 3.3 (Fact2, (n −f) odd) We construct a configuration C′ 0 equivalent to C0 but where correct robots are divided between X and B with⌊(n−f)/2⌋robots at X and ⌈(n−f)/2⌉robots at B (see Figure 5.(b)) . By definition, these robots must converge to a point between X and B since they are endowed with a cautious convergence algorithm. Byzantine robots are at A. Since C′ 0 and C0 are equivalent, the activation of robots at X and the displacement of Byzantine robots to ii the right of B will produce a configuration C′ 1 that is equivalent to C1 by symmetry. This time, activated robots are those at B. By moving them to their calculated destination points and by moving Byzantine robots again to the left of X the scheduler can form a configuration C′ 2 which is equivalent to C2. This process can be repeated: during odd cycles, Byzantine robots are at the left of X and robots at X are activated. During even cycles, the situation is symmetrical: Byzan- tine robots are to the right of B and robots at B are activated. The obtained execution E′ 0 = {C′ 0, C′ 1, C′ 2, C′ 3, ...} is equivalent to E0, and robots at X and B remain separated by a distance at least equal to d1 forever even if they are activated indefinitely. This prevents the convergence of the convergence protocol while ensuring fairness of activations, which contradicts the assumptions and proves our Lemma. □ Proof of Lemma 3.5 Proof : Let C1 be the initial configuration, and consider the computed destination by an activated robot located at A (the case of a robot located at B is symmetric). Since the algorithm is cautious, this destination point is necessarily located inside [A, B]. For the lemma to be correct, it suffices to prove that this destination is different from A. In other words, we must prove that the robot moves towards B upon its activation. So assume for the sake of contradiction that it is not the case, that is, the computed destination is A and let us separate the analysis into three cases depending on the relationship between p and q: • Case 1 (p > q): Let C2 be a configuration isomorphic to C1 with the following place- ment of robots: At A there are min(f, p) Byzantine robots and p −min(f, p) corrects ones, and at B are located f −min(f, p) Byzantine robots and q−f +min(f, p) corrects ones. Since Configurations C1 and C2 are indistinguishable to individual robots, the destinations computed in the two cases are the same. So when the robots at A are ac- tivated, they do not move. The next cycle, the adversary moves p −q Byzantine robots from A to B to obtain a configuration C3 symmetric to C2. This time, the adversary activates the robots at B which do not move either since C2 and C3 are symmetric. Then, the adversary brings the p −q Byzantine robots to A to get again the configura- tion C2 and then activates the robots at A. The process repeats, and by placing these p−q Byzantine robots in one cycle at A and the next cycle at B, the adversary prevents the convergence of the algorithm. This is a contradiction. • Case 2 (p < q): We can reach a contradiction by using an argument similar to Case 1. • Case 3 (p = q): If the activated robots at A do not move upon their activation, it is also the case at B since the configuration is symmetric. This prevents the convergence of the algorithm and leads also to a contradiction. Consequently, the lemma is proved. □ Proof of Algorithm 5 Algorithm 5 is cautious In this section we prove that Algorithm 5 is a cautious algorithm (see Definition 4.2) for n > 5f. The following lemma states that the range of the trimmed multiset trimi 2f(P(t)) is contained in the range of correct positions. iii Lemma 5.1 Let i be a correct robot executing Algorithm 5, it holds that ∀t, range(trimi 2f(P(t))) ⊆range(U(t)) Proof : We prove that for any correct robot, i, the following conditions hold: 1. ∀t, min(trimi 2f(P(t))) ∈range(U(t)). 2. ∀t, max(trimi 2f(P(t))) ∈range(U(t)). 1. By definition, min(trimi 2f(P(t))) = min{Pi(t), P2f+1(t)}. Hence proving Property (1) reduces to proving Pi(t) ∈range(U(t)) and P2f+1(t) ∈range(U(t)). (a) Pi(t) ∈range(U(t)) directly follows from the assumption that robot i is correct. (b) Pf+1(t) ∈range(U(t)). Suppose the contrary: there exists some time instant t such that P2f+1(t) /∈range(U(t)) and prove that this leads to a contradiction. If P2f+1(t) /∈range(U(t)) then either P2f+1(t) < U1(t) or P2f+1(t) > Um(t). i. If P2f+1(t) < U1(t) then there are at least 2f + 1 positions {P1(t), P2(t), . . . , P2f(t), P2f+1(t)} that are smaller than U1(t) which is the first correct position in the network at time t. This means that there would be at least 2f + 1 byzantine robots in the system. But this contradicts the assumption that at most f byzantine robots are present in the system. ii. If P2f+1(t) > Um(t) then since n > 5f there are more than 3f positions {P2f+1(t), ..., Pn(t)} that are greater than Um(t), which is the last correct po- sition in the system at time t. This also leads to a contradiction. 2. The property is symmetric to 2) and can be proved using the same argument. □ A direct consequence of the above property is that correct robots always compute a destination within the range of positions held by correct robots, whatever the behavior of Byzantine ones. Thus, the diameter of positions held by correct robots never increases. Consequently, the algorithm is cautious. The formal proof is proposed in the following lemma. Lemma 5.2 Algorithm 5 is cautious for n > 5f. Proof : We have to prove the two properties of cautious algorithms, namely cautiousness and non-triviality. Cautiouness: We start by the cautiousness property of our algorithm. According to Lemma 5.1, range(trimi 2f(P(t))) ⊆range(U(t)) for each correct robot i, thus center(trimi 2f(P(t))) ∈ range(U(t)). It follows that all destinations computed by correct robots are located inside range(U(t)) which proves the cautiousness property. Non-triviality: By fairness, the robots at positions U1(t) and Um(t) are guaranteed to be eventually elected irrespective of the positions of byzantine robots. And at least one of them will move unless all correct robots are colocated in the same point.This proves the non-triviality condition. □ iv 5.0.1 Algorithm 5 is Shrinking The following lemma proves that the only robots that can be elected are those located at the extremes of the network, namely those whose position is either less equal than Uf+1(t) or greater equal than Um−f(t). The activation of these robots move them away from the extremes of the network, thereby reducing the diameter of positions held by correct robots which leads to convergence. Lemma 5.3 If some correct robot i is activated at time t, then either Ui(t) ≤Uf+1(t) or Ui(t) ≥Um−f(t) where m is the number of correct robots in the network and Ui(t) denotes the position of correct robot i at t; Proof : By definition of the algorithm, a robot is activated only if its position is either ≤Pf+1(t) or ≥Pn−f(t). To prove the lemma, it suffices then to show that Pf+1(t) ≤Uf+1(t) and Pn−f(t) ≥Um−f(t): To prove that Pf+1(t) ≤Uf+1(t), we suppose to the contrary that Pf+1(t) > Uf+1(t). In this case, Pf+1(t) would be strictly greater than all the positions {U1(t), ..., Uf+1(t)}, which contradicts the definition of Pf+1(t) as the (f + 1)-th position in the network. This proves that Pf+1(t) ≤Uf+1(t) and the same argument is used to prove that Pn−f(t) ≥Um−f(t), since the two cases are symmetric. □ The following lemma proves an important property on the relationship between the posi- tion of a robot and its computed destination. Indeed, knowing the position Ui(t) held by a correct robot i at time t, it is possible to give bounds on the possible value of its destination point Di(t). Interestingly, this bound holds irrespective of the positions of Byzantine robots and the actions of the adversary. Formally, consider any initial configuration at time t0, such that U(t0) and D(t0) are respectively the multiset of positions and destinations of correct robots at time t0. Define UD(t0) to be the union of U(t0) and D(t0). By considering the cycles started by correct robots after t0, the following property holds: Lemma 5.4 For each correct robot i that starts a cycle after t0, the following inequalities hold: Di(t) ∈[Ui(t) + Min(UD(t0)) 2 , Ui(t) + Max(UD(t0)) 2 ] . Proof : The proof is twofold. First, we show that (1) Di(t) ≥(Ui(t) + Min(UD(t0)))/2. Then, we prove the symmetric property (2) Di(t) ≤(Ui(t) + Max(UD(t0)))/2. 1. Di(t) ≥(Ui(t) + Min(UD(t0)))/2 : Assume towards contradiction that for some robot i that start a cycle at time t1 ≥t0, there exists a time t ≥t1 in this cycle such that: Di(t) < Ui(t) + min(UD(t0)) 2 Note that Ui(t1) ≥Ui(t) because if robot i moves between t1 and t, it becomes closer to its destination Di(t). Thus: Di(t) < Ui(t1) + min(UD(t0)) 2 . . . (1) v This means that distance(min(UD(t0)), Di(t)) < distance(Di(t), U1(t)). Denote by d the distance between Ui(t1) and Di(t). Note that Di(t) < Ui(t1). The computation of Di(t) by i is based on the configuration of the network as last seen by robot i. That is, the configuration of the system at the beginning of its cycle P(t1). This implies that: Di(t) = center(trimi 2f(P(t1))) . . . (2) We prove that (1) and (2) combined lead to a contradiction. The location dependency property of the trimming function implies that Ui(t1) ∈ trimi 2f(P(t1)). So, up to this point we proved that there exists a point Ui(t1) ∈trimi 2f(P(t1)) such that Ui(t1) > Di(t) and distance(Ui(t1), Di(t)) = d. But since by (2), Di(t) is the center of trimi 2f(P(t1)), there must exists another point q ∈trimi 2f(P(t1)), such that q < Di(t) and distance(q, Di(t)) = d. But we observed from (1) that distance(min(UD(t0)), Di(t1)) < d, which implies that distance(min(UD(t0)), Di(t1)) < distance(q, Di(t)). This means that q < min(UD(t0)). But q ∈trimi 2f(P(t1)), so min(trimi 2f(P(t1))) < min(UD(t0)). This contradicts lemma 5.1, which proves the first part of our lemma. 2. (2) Di(t) ≤(Ui(t) + Max(UD(t0)))/2 : The property is symmetric to (1) and can be proved using the same argument. □ Let S be a subset of correct robots, and define UDS(t) to be the multiset of their positions and destinations at time t. Lemma 5.5 If |S| ≥m −2f and there exists a time t1 ≥t0 such that for each t > t1, max(UDS(t)) ≤max(UD(t0)) −b, then all computed destinations by all correct robots in cycles that start after t1 are ≤max(UD(t0)) −b/2. Proof : Let i be any correct robot that computes its destination Di in a cycle started after t1, say at t. We prove in the following that Di < max(UD(t0)) −b/2: First, observe that since max(UDS(t)) < max(UD(t0)) −b and |S| ≥m −2f > 2f, then min(Trimi 2f(P(t)) < max(UD(t0)) −b . Otherwise, min(Trimi 2f(P(t)) would be greater than all the positions in S (> 2f po- sitions), which contradicts the definition of Trimi 2f (at most the 2f smallest positions are removed). According to lemma 5.1, we have max(Trimi 2f(P(t)) < max(UD(t0)) vi But Di is the center of trimi 2f(P(t)), which means that distance(Di, min(trimi 2f(P(t)))) must be equal to distance(Di, max(trimi 2f(P(t)))). Hence, Di < max(UD(t0)) −b/2 □ Lemma 5.6 If |S| ≥m −f and at some time t1 ≥t0, max(UDS(t1)) ≤max(UD(t0)) −b, then all computed destinations by all correct robots in cycles that start after t1 are less or equal to max(UD(t0)) −b/2. Proof : First, we prove that after t1, the robots in S remains always at positions < max(UD(t0))−b, meaning that all their computed destinations after t1 are < max(UD(t0))− b. Assume the contrary: Let i be the first robot in S that starts a cycle after t1 such that its computed destination in this cycle is > max(UD(t0))−b. This implies that max(trimi 2f(P(t1))) > max(UD(t0)) −b, which means that at least 2f + 1 positions in the network at t1 are strictly greater than max(UD(t0)) −b. If we add to these 2f+1 positions that are greater than max(UD(t0))−b, the m−f ≥n−2f positions in S that are less or equal than max(UD(t0))−b, we get a total number of robots in the network that is strictly greater than n, which leads to contradiction. This proves that all positions and destinations of robots in S after t1 are less than or equal to max(UD(t0)) −b. Thus by lemma 5.5, the destinations computed by all correct robots in the network are less than or equal to max(UD(t0)) −b/2. □ The next Lemma states that if some computed destination is located in the neighborhood of one extreme of the network, then a majority of correct robots (at least m−2f) are located in the neighborhood of this extreme. Lemma 5.7 Let Di be a destination point computed by a correct robot i in a cycle started at time t. If Di < min(UD(t)) + b, then at least m −2f correct robots are located at positions that are < min(UD(t)) + 2b at t. Proof : The computation of Di is based on the configuration of the network as last seen by robot i, that is the configuration at the beginning of the cycle at t, P(t). So we first prove that at t, max(trimi 2f(P(t))) < min(UD(t)) + 2b: By hypothesis, Di < min(UD(t)) + b. But according to lemma 5.1 , min(UD(t)) ≤ min(trimi 2f(P(t))). Thus, Di < min(trimi 2f(P(t))) + b. This means that distance(Di, min(trimi 2f(P(t)))) < b But Di is the center of trimi 2f(P(t)), which means that distance(Di, min(trimi 2f(P(t)))) must be equal to distance(Di, max(trimi 2f(P(t)))). Hence, max(trimi 2f(P(t)))) < Di + b But since by hypothesis Di < min(UD(t)) + b, we have max(trimi 2f(P(t)))) < min(UD(t)) + 2b vii This means that at most 2f positions (which may be correct) are ≥min(UD(t)) + 2b at t. This completes the proof. □ Let U(t0) and D(t0) be respectively the multisets of positions and destinations of correct robots at the initial time t0, and define UD(t0) to be the union of U(t0) and D(t0). Take b to be any distance < diameter(UD(t0))/4, for example b = diameter(UD(t0))/10. The next lemma states that if a correct robot elected at t > t0 is located inside the range (min(UD(t0))+b, max(UD(t0))−b), then the destinations points computed by correct robots after t are either all ≤max(UD(t0)) −b/4 or all ≥min(UD(t0)) + b/4. This means that the election of a robot located inside (min(UD(t0))+b, max(UD(t0))−b) is a sufficient condition to convergence. Lemma 5.8 Let t1 be the first time at which all correct robots in the network executed a complete cycle at least once since t0. If a correct robot is elected at t > t1 and is located inside [min(UD(t0))+b, max(UD(t0))− b], then the destination points computed by correct robots in cycles that start after t are either all located at positions ≤max(UD(t0))−b/4 or all located at positions ≥min(UD(t0))+b/4. Proof : Let i be a correct robot that is elected at time t > t1 and whose position Ui(t) is inside [min(UD(t0)) + b, max(UD(t0)) −b]. According to lemma 5.3, either Ui(t) ≥Um−f(t) or Ui(t) ≤Uf+1(t). Thus, we separate the analysis into two cases depending on the rank of the elected robot: • Case 1: Ui(t) ≥Um−f(t). Define S(t) to be the set of correct positions {U1(t), ..., Um−f (t), ..., Ui(t)}, and note that |S(t)| ≥m −f. By hypothesis, Ui(t) ≤max(UD(t)) −b which implies that the positions of all robots in S(t) are ≤min(UD(t)) + b. Thus by lemma 5.4, the destinations of all robots in S(t) are ≤max(UD(t0)) −b/2. This means that rangeS(t), the range of positions and destinations of robots in S(t) is such that at t, max(rangeS(t)) ≤max(UD(t0)) −b/2. Hence, according to lemma 5.6, all destinations points computed by correct robots in cycles that start after t are ≤max(UD(t0)) −b/4. • Case 2: Ui(t) ≤Uf+1(t). The case is symmetric and we prove by a similar argument to Case 1 that all destination points computed by correct robots are ≥min(UD(t0)) + b/4, which proves our lemma. □ Lemma 5.9 Algorithm 1 is shrinking in CORDA model under a fully asynchronous scheduler when n > 5f. Proof : Let U(t0) = {U1(t0), Um(t0)} be the configuration of correct robots at initial time t0, and let D(t0) = {D1(t0), ..., Dm(t0)} the multiset of their destinations at t0. Define UD(t0) to be viii the union of U(t0) and D(t0), and let diam(t0), the diameter at t0, be equal to max(UD(t0))− min(UD(t0)). U(t), D(t), UD(t) and diam(t) for each t > t0 are defined similarly. Let t1 be the first time at which every correct robot in the network has executed a whole cycle at least once since t0. We consider the evolution of the network after t1. The aim of this is to apply lemma 5.4, that is, based only on the position of a correct robot, we can give bounds on its destination point which is especially interesting in the case of a robot executing a Move phase of its cycle. We take into account all the computed destinations by correct robots after t1 and we distinguish between two cases: (1) the case when all destinations computed after t1 are inside [min(UD(t0)) + diam(t0) 10 , max(UD(t0)) −diam(t0) 10 ]. and (2) the case when a computed destination after t1 lay outside this range. We show that in both cases, there is a time at which the diameter of correct positions decreases by a factor of at least 39/40. • Case 1: All destinations computed by correct robots in cycles started after t1 are inside the range [min(UD(t0)) + diam(t0)/10, max(UD(t0)) −diam(t0)/10]. In this case, since each robot i is guaranteed to move a minimal distance of δi before it can be stopped by the adversary, there is a time t2 ≥t1 when all correct robots are located inside [min(UD(t0)) + diam(t0)/10, max(UD(t0)) −diam(t0)/10]. Thus diam(t2) = diam(t0) ∗4/5, and by setting α = 4/5, our algorithm is shrinking. • Case 2: There is a destination Di, computed by a correct robot i in a cycle started after t1, that is outside the range [min(UD(t0)) + diam(t0)/10, max(UD(t0)) −diam(t0)/10]. This means that either Di < min(UD(t0)) + diam(t0)/10 or Di > max(UD(t0)) − diam(t0)/10. Since the two cases are symmetric, there is no loss of generality to assume that Di < min(UD(t0)) + diam(t0)/10. The calculation of Di is based on the configuration of the network as seen by robot i at the beginning of the cycle, say at t2 (with t2 ≥t1). Thus, according to lemma 5.7, at t2, at least m−2f correct robots are located at positions < min(UD(t0))+diam(t0)/5. Denote by S(t2) the set of these robots. By lemma 5.4, the destinations of robots in S(t2) are < min(UD(t0)) + diam(t0) ∗(3/5). Thus, the positions and destinations of robots in S(t2) are < max(UD(t0)) −diam(t0) ∗2/5. We now observe the positions of elected robots whose rank is ≤f + 1 and which are activated after t2. We separate the analysis into two subcases: – Subcase 2A: There is a time t > t2 at which is elected a correct robot i whose rank is ≤f + 1 and whose position Ui(t) is > min(UD(t0)) + diam(t0)/10. No- tice that since |S(t2)| > m −2f, Ui(t) is also < max(UD(t0)) −diam(t0) ∗2/5 which is the upper bound on the positions of robots in S(t2). Thus, Ui(t) ∈ [min(UD(t0))+diam(t0)/10, max(UD(t0))−diam(t0)/10] and according to lemma 5.8, the diameter eventually decreases by a multiplicative factor of 1−1/40. Hence, by setting α = 39/40 the lemma follows. ix – Subcase 2B: All elected correct robots that are activated after t2 and whose rank is ≤f + 1 are located at positions < min(UD(t0)) + diam(t0)/10. This implies, according to lemma 5.4, that the positions of these elected robots remain always at positions < max(UD(t0)) −diam(t0) ∗9/20. Thus, all robots in S(t2) remain always at positions < max(UD(t0)) −diam(t0) ∗9/20 (∀t > t2). According to lemma 5.5, all destinations computed at cycle that start after t2 are < max(UD(t0)) −diam(t0) ∗9/40. And since robots are guaranteed to move toward destinations by a minimum distance before they can be stopped by the adversary, they all end up located at positions < max(UD(t0)) −diam(t0) ∗9/40. Hence there is a time t > t2 such that diam(t) = diam(t0) ∗(1 −9/40). It suffices to set α = 31/40 and the lemma follows. Consequently, we set α = 39/40 and the lemma is proved. □ x arXiv:0908.0390v1 [cs.DC] 4 Aug 2009 Byzantine Convergence in Robots Networks: The Price of Asynchrony Zohir Bouzid Maria Gradinariu S´ebastien Tixeuil Universit´e Pierre et Marie Curie - Paris 6, LIP6-CNRS 7606, France FirstName.LastName@lip6.fr Abstract We study the convergence problem in fully asynchronous, uni-dimensional robot net- works that are prone to Byzantine (i.e. malicious) failures. In these settings, oblivious anonymous robots with arbitrary initial positions are required to eventually converge to an a apriori unknown position despite a subset of them exhibiting Byzantine behavior. Our contribution is twofold. We propose a deterministic algorithm that solves the problem in the most generic settings: fully asynchronous robots that operate in the non-atomic CORDA model. Our algorithm provides convergence in 5f + 1-sized networks where f is the upper bound on the number of Byzantine robots. Additionally, we prove that 5f +1 is a lower bound whenever robot scheduling is fully asynchronous. This constrasts with pre- vious results in partially synchronous robots networks, where 3f + 1 robots are necessary and sufficient. Keywords: Robots networks, Byzantine tolerance, Asynchronous systems, Conver- gence. 1 Introduction The use of cooperative swarms of weak inexpensive robots for achieving complex tasks such as exploration or tracking in dangerous environments is a promising option for reducing both human and material costs. Robot networks recently became a challenging research area for distributed systems since most of the problems to be solved in this context (e.g. coordination, agreement, resource allocation or leader election) form the core of distributed computing. However, the classical distributed computing solutions do not translate well due to fundamentally different execution models. In order to capture the essence of distributed coordination in robot networks, two main computational models are proposed in the literature: the ATOM [10] and CORDA [9] models. The main difference between the two models comes from the granularity for executing a Look- Compute-Move cycle. In such a cycle, the Look phase consists in taking a snapshot of the other robots positions using its visibility sensors. In the Compute phase a robot computes a target destination based on its previous observation. The Move phase simply consists in moving toward the computed destination using motion actuators. In the ATOM model, the whole cycle is atomic while in the CORDA model, the cycle is executed in a continuous manner. That is, in the ATOM model, robots executing concurrently always remain in the same phase while in CORDA it is possible that e.g. a robot executes its Look phase while another robot performs its Move phase, or that a robot executes its Compute phase while its 1 view (obtained during the Look phase) is already outdated. Of course, executions that may appear in the CORDA model are a strict superset of those that may appear in the ATOM model, so a protocol that performs in the CORDA model also works in the ATOM model, but the converse is not true. Similarly, impossibility results for the ATOM model still hold in the CORDA model. Complementary to the granularity of robots action is the amount of asynchrony in the system, that is modeled by the scheduler: (i) a fully synchronous scheduler operates all robots in a lock-step manner forever, while (ii) a k-bounded scheduler preserves a ratio of k between the most often activated robot and the least often activated robot, finally (iii) a fully asynchronous scheduler only guarantees that every robots is activated infinitely often in an infinite execution. The robots that we consider have weak capacities: they are anonymous (they execute the same protocol and have no mean to distinguish themselves from the others), oblivious (they have no memory that is persistent between two cycles), and have no compass whatsoever (they are unable to agree on a common direction or orientation). Convergence is a fundamental agreement primitive in robot networks and is used in the implementation of a broad class of services (e.g. the construction of common coordinate systems or specific geometrical patterns). Given a set of oblivious robots with arbitrary initial locations and no agreement on a global coordinate system, convergence requires that all robots asymptotically approach the same, but unknown beforehand, location. Convergence looks similar to distributed approximate agreement since both problems require nodes to agree on a common object (that is instantiated to be a position in space for the case of convergence, or a value in the case of distributed agreement). Related works Since the pioneering work of Suzuki and Yamashita [10], gathering1 and convergence have been addressed in fault-free systems for a broad class of settings. Prencipe [9] studied the problem of gathering in both ATOM and CORDA models, and showed that the problem is intractable without additional assumptions such as being able to detect the multiplicity of a location (i.e., knowing if there is more than one robot in a given location). The case of fault-prone robot networks was recently tackled by several academic studies. The faults that have been investigated fall in two categories: crash faults (i.e. a faulty robots stops executing its cycle forever) and Byzantine faults (i.e. a faulty robot may exhibit arbitrary behavior and movement). Of course, the Byzantine fault model encompasses the crash fault model, and is thus harder to address. Deterministic fault-tolerant gathering is addressed in [2] where the authors study a gathering protocol that tolerates one crash, and an algorithm for the ATOM model with fully synchronous scheduling that tolerates up to f byzantine faults, when the number of robots is (strictly) greater than 3f. In [6] the authors study the feasibility of probabilistic gathering in crash-prone and Byzantine-prone environments. Deterministic fault-tolerant convergence was first addressed in [4, 5], where algorithms based on convergence to the center of gravity of the system are presented. Those algorithms work in the ATOM [4] and CORDA [5] models with a fully asynchronous scheduler and tolerate up to f (n > f) crash faults, where n is the number of robots in the system. Most related to this paper are [1, 3], where the authors studied convergence in byzantine- prone environments when robots move in a uni-dimensional space. In more details, [1] showed that convergence is impossible if robots are not endowed with strong multiplicity detectors which are able to detect the exact number of robots that may simultaneously share the same 1Gathering requires robots to actually reach a single point within finite time regardless of their initial positions. 2 Reference Computation Model Scheduler Bounds [2] ATOM fully synchronous n > 3f [1] ATOM fully synchronous n > 2f ATOM k-bounded n > 3f CORDA k-bounded n > 4f [3] CORDA k-bounded n > 3f This paper CORDA fully asynchronous n > 5f Table 1: Byzantine resilience bounds for deterministic convergence location. The same paper defines the class of cautious algorithms which guarantee that correct robots always move inside the range of positions held by correct robots, and proved that any cautious convergence algorithm that can tolerate f Byzantine robots requires the presence of at least 2f + 1 robots in fully-synchronous ATOM networks and 3f + 1 robots in k-bounded (and thus also in fully asynchronous) ATOM networks. The lower bound for the ATOM model naturally extends to the CORDA model, and [3] provides a matching upper bound in the k-bounded CORDA model. Interestingly enough, all previously known deterministic Byzantine tolerant robot pro- tocols assume either the more restrictive ATOM model [6], or the constrained fully syn- chronous [2] or k-bounded [1, 3] schedulers, thus the question of the existence of such protocols in a fully asynchronous CORDA model remains open. Our contribution We present the first study of Byzantine resilient robot protocols that considers the most general execution model: the CORDA model together with the fully asynchronous scheduler. We concentrate on the convergence problem and prove that the fully asynchronous scheduler implies a lower bound of 5f + 1 for the number n of robots for the class of cautious protocols (this bound holds for both ATOM and CORDA models). We also exhibit a deterministic protocol that matches this lower bound (that is, provided that n ≥5f + 1, our protocol is determinstic and performs in the CORDA model with fully asynchronous scheduling). Table 1 summarizes the characteristics of our protocol with respect to previous work on Byzantine tolerant robot convergence (better characteristics for a protocol are depicted in boldface). Outline The remaining of the paper is organized as follows: Section 2 presents our model and robot network assumptions. This section also presents the formal specification of the convergence problem. Section 3 presents the byzantine resilience lower bound proof. Sec- tion 4 describes our protocol and its complexity, while concluding remarks are presented in Section 5. 2 Model and Problem Definition Most of the notions presented in this section are borrowed from[10, 8, 2]. We consider a network that consists of a finite set of robots arbitrarily deployed in a uni-dimensional space. The robots are devices with sensing, computing and moving capabilities. They can observe (sense) the positions of other robots in the space and based on these observations, they perform some local computations that can drive them to other locations. 3 In the context of this paper, the robots are anonymous, in the sense that they can not be distinguished using their appearance, and they do not have any kind of identifiers that can be used during the computation. In addition, there is no direct mean of communication between them. Hence, the only way for robots to acquire information is by observing their positions. Robots have unlimited visibility, i.e. they are able to sense the entire set of robots. Robots are also equipped with a strong multiplicity sensor that provides robots with the ability to detect the exact number of robots that may simultaneously occupy the same location. We assume that the robots cannot remember any previous observation nor computation performed in any previous step. Such robots are said to be oblivious (or memoryless). A protocol is a collection of n programs, one operating on each robot. The program of a robot consists in executing Look-Compute-Move cycles infinitely many times. That is, the robot first observes its environment (Look phase). An observation returns a snapshot of the positions of all robots within the visibility range. In our case, this observation returns a snap- shot (also called configuration hereafter) of the positions of all robots denoted with P(t) = {P1(t), ..., Pn(t)}. The positions of correct robots are referred as U(t) = {U1(t), ..., Um(t)} where m denotes the number of correct robots. Note that U(t) ⊆P(t). The observed po- sitions are relative to the observing robot, that is, they use the coordinate system of the observing robot. We denote by P i(t) = {P i 1(t), ..., P i n(t)} the configuration P(t) given in terms of the coordinate system of robot i (U i(t) is defined similarly). Based on its observa- tion, a robot then decides — according to its program — to move or to stay idle (Compute phase). When a robot decides a move, it moves to its destination during the Move phase. An execution e = (c0, . . . , ct, . . .) of the system is an infinite sequence of configurations, where c0 is the initial configuration2 of the system, and every transition ci →ci+1 is associated to the execution of a subset of the previously defined actions. A scheduler is a predicate on computations, that is, a scheduler defines a set of admissible computations, such that every computation in this set satisfies the scheduler predicate. A scheduler can be seen as an entity that is external to the system and selects robots for execution. As more power is given to the scheduler for robot scheduling, more different executions are possible and more difficult it becomes to design robot algorithms. In the remaining of the paper, we consider that the scheduler is fully asynchronous, that is, in any infinite execution, every robot is activated infinitely often, but there is no bound for the ration between the most activated robot and the least activated one. We now review the main differences between the ATOM [10] and CORDA [8] models. In the ATOM model, whenever a robot is activated by the scheduler, it performs a full computation cycle. Thus, the execution of the system can be viewed as an infinite sequence of rounds. In a round one or more robots are activated by the scheduler and perform a computation cycle. The fully-synchronous ATOM model refers to the fact that the scheduler activates all robots in each round, while the regular ATOM model enables the scheduler to activate only a subset of the robots. In the CORDA model, robots may be interrupted by the scheduler after performing only a portion of a computation cycle. In particular, phases (Look, Compute, Move) of different robots may be interleaved. For example, a robot a may perform a Look phase, then a robot b performs a Look-Compute-Move complete cycle, then a computes and moves based on its previous observation (that does not correspond to the current configuration anymore). As a result, the set of executions that are possible in the 2Unless stated otherwise, we make no specific assumption regarding the respective positions of robots in initial configurations. 4 CORDA model are a strict superset of those that are possible in the ATOM model. So, an impossibility result that holds in the ATOM model also holds in the CORDA model, while an algorithm that performs in the CORDA model is also correct in the ATOM model. Note that the converse is not necessarily true. The faults we address in this paper are Byzantine faults. A byzantine (or malicious) robot may behave in arbitrary and unforeseeable way. In each cycle, the scheduler determines the course of action of faulty robots and the distance to which each non-faulty robot will move in this cycle. However, a robot i is guaranteed to move a distance of at least δi towards its destination before it can be stopped by the scheduler. Our convergence algorithm performs operations on multisets. A multiset or a bag S is a generalization of a set where an element can have more than one occurrence. The number of occurrences of an element a is referred as its multiplicity. The total number of elements of a multiset, including their repeated occurrences, is referred as the cardinality and is denoted by |S|. min(S)(resp. max(S)) is the smallest (resp. largest) element of S. If S is nonempty, range(S) denotes the set [min(S), max(S)] and diam(S) (diameter of S) denotes max(S) −min(S). Given an initial configuration of n autonomous mobile robots (m of which are correct such that m ≥n−f), the point convergence problem requires that all correct robots asymptotically approach the exact same, but unknown beforehand, location. In other words, for every ǫ > 0, there is a time tǫ from which all correct robots are within distance of at most ǫ of each other. Definition 2.1 (Byzantine Convergence) A system of oblivious robots satisfies the Byzan- tine convergence specification if and only if ∀ǫ > 0, ∃tǫ such that ∀t > tǫ, ∀i, j ≤m, distance(Ui(t), Uj(t)) < ǫ, where Ui(t) and Uj(t) are the positions of some correct robots i and j at time t, and where distance(a, b) denote the Euclidian distance between two positions. Definition 2.1 requires the convergence property only from the correct robots. Note that it is impossible to obtain the convergence for all robots since Byzantine robots may exhibit arbitrary behavior and never join the position of correct robots. 3 Impossibility for n ≤5f and a fully asynchronous scheduler In this section we prove the fact that, when the number of robots in the network does not exceed 5f (with f of those robots possibly being Byzantine), the problem of Byzantine resilient convergence is impossible to solve under a fully asynchronous scheduler. The result is proved for the weaker ATOM model, and thus extends to the CORDA model. Our proof is based on a particular initial setting from which we prove that no cautious convergence algorithm is possible if the activation of robots is handled by a fully asynchronous scheduler. Consider a network N of n robots placed on a line segment [A, B], f of which may be Byzantine with n ≤5f. We consider that robots are ordered from left to right. This order is only given for ease of presentation of the proof and is unknown to robots that can not use it in their algorithms. It was proved in [1] that the problem is impossible to solve when n ≤3f, we thus consider here the case when 3f < n ≤5f only. The initial placement of correct robots is illustrated in Figure 1: f robots are at location A, f others robots are at location B and the remaining m −2f ones are located at some intermediate location between A and B. The impossibility proof depends on the ability of the adversary to move these m −2f robots along [A, B], so their position is denoted by a variable X, with X belonging to interval 5 (A, B). In the following, these three groups of robots located at A, B and X will be referred as SetA, SetB and SetX respectively. The positions of the Byzantine robots are determined by the adversary. Figure 1: Robot Network N (Configuration C1) for (n = 9, f = 2) We show by contradiction that in these conditions, no cautious convergence algorithm is possible. Assume that there exists a cautious convergence algorithm P that is correct when the robots are activated by a fully asynchronous scheduler, then we show that in this setting, any cautious algorithm P satisfies properties that can by used by the adversary to prevent convergence of P, which is a contradiction. The properties satisfied by all cautious protocols are captured in the following two basic facts: • Fact 1: If all Byzantine robots are inside [A, X] (resp. [X, B]) then when robots of SetA (resp. SetB) are activated, their calculated destination points are necessarily inside [A, X] (resp. [X, B]). This fact is proved by Lemma 3.1. • Fact 2: The adversary is able to move the robots of SetX as close as desired to location A (resp. B). This is proved by Lemmas 3.2, 3.3 and 3.4. Based on this, the adversary first moves the robots of SetX very close to A (using Fact 2) and then activates the robots of SetA that remain in the neighborhood of A (due to Fact 1). Afterward, it moves the intermediate robots of SetX very close to B (using Fact 2) and activates the robots of SetB which also remain in the neighborhood of B (due to Fact 1). By repeating these actions indefinitely, the adversary ensures that every robot is activated infinitely often in the execution yet prevents convergence at the same time since robots at A and B remain always arbitrarily close to their initial positions and never converge. In the following, we prove Fact1 and Fact2 by a sequence of lemmas, and then give a formal presentation of the algorithm used by the adversary to prevent any cautious protocol from achieving convergence. Lemma 3.1 In N, ∀X ∈(A, B), if all Byzantine robots are inside [A, X] (resp. [X, B]) then when robots of SetA (resp. SetB) are activated, their destination points computed by any cautious algorithm are necessarily inside [A, X] (resp. [X, B]). To prove Fact2, we use the network N described above (see Figure 1). We prove only the capability of the adversary to move the intermediate robots at X as close as wanted to B, the other case being symmetric. Fact2 implies that if the number of robots in the network is lower or equal to 5f then it always exists a judicious placement of the Byzantine robots that permits the adversary to make the intermediate robots in X move in the direction of B up to a location that is as close as desired to B. We divide the analysis in two cases depending on the parity of (n −f). 6 Case 1: (n −f) is even To push the robots of SetX as close to A or B as wanted, the adversary uses algorithm GoToBorder1 (G2B1) described as Algorithm 1. Informally, the algorithm divides Byzantines robots between position X and the target border to which the adversary wants to push the robots of SetX (e.g. B in what follows). The aim of the adversary is to maintain the same number of robots in X and B (this is possible because n −f is even). We prove that in this case, any cautious convergence algorithm makes the robots of SetX move towards B. However, the distance traveled by them may be too small to bring them sufficiently close to B. Since the scheduler is fully asynchronous, it is authorized to activate the robots of SetX as often as necessary to bring them close to B, as long as it does so for a finite number of times. Algorithm 1 GoToBorder1 (G2B1) Input: Border: the border towards which robots of SetX move (equal to A or B). Input: d: a distance. Actions: while distance(X, Border) > d do Place (n −3f)/2 byzantine robots at Border. Place (5f −n)/2 byzantine robots at X. Activate simultaneously all robots of SetX and make them move to their computed destination D. X ←D end while Lemma 3.2 If (n−f) is even, ∀d < distance(A, B), ∀Border ∈A, B, algorithm G2B1(Border, d) terminates. Case 2: (n −f) is odd To prove Lemma 3.2, we relied on the symmetry induced by the placement of Byzantine robots. This symmetry is possible only because (n −f) is even. Indeed, having the same number of robots in B and X implies that convergence responsibility is delegated to both robots at X and at B (there is no asymmetry to exploit to get one of these two groups play a role that would be different from the other group. Robots of SetX and SetB have thus no other choice but to move toward each other when they are activated. The distance traveled at each activation must be large enough to ensure the eventual convergence of the algorithm. However, the situation is quite different when (n −f) is odd. Indeed, the number of robots is necessarily different in X and B, which means that one of the two points has a greater multiplicity than the other. Then in this case there is no guarantee that a cautious convergence algorithm will order the robots of SetX to move toward B when they are activated (the protocol could delegate the convergence responsibility to robots of SetB). Nevertheless, we observe that whatever the cautious algorithm is, if it does not move the robots that are located at the greatest point of multiplicity, it must do so for those at the smallest one (and vice versa), otherwise no convergence is ever possible. The convergence is thus either under the responsibility of robots at the larger point of multiplicity or those at the smaller one (or both). This observation is exploited by Algorithm GoToBorder2 (G2B2) that is presented as Algorithm 2, that tries the two possible cases to ensure its proper functioning when confronted 7 to any cautious algorithm. The algorithm forms the larger point of multiplicity at B at one cycle, and the next cycle at X. Thus, point X will be the larger point of multiplicity one time, and the smallest one the next time. This implies that the robots of SetX must move towards B at least once every two cycles. So by repeatedly alternating between the two configurations where robots of SetX are successively the set of larger and smaller multiplicity, the adversary ensures that they end up moving towards B. The fully asynchrony of the scheduler ensures that they are activated as many times as it takes to move them as close to B as wanted, provided that the algorithm terminates. Algorithm 2 GoToBorder2 (G2B2) Input: Border: the border towards which the robots of SetX move (equal to A or B). Input: d: a distance. Actions: Place (n −3f + 1)/2 Byzantine robots at Border. Place (5f −n −1)/2 Byzantine robots at X. while distance(X, Border) > d do Activate simultaneously all robots at X and make them move to their computed destination D. X ←D. Move a Byzantine robot from Border to X. Activate simultaneously all robots at X and make them move to their computed destination D. X ←D Move a Byzantine robot from X to Border. end while Lemma 3.3 If (n−f) is odd, ∀d < distance(A, B), ∀Border ∈A, B, algorithm G2B2(Border, d) terminates. We are now ready to prove Fact2. Lemma 3.4 For n ≤5f, ∀d < distance(A, B), if the robots run a cautious convergence algorithm, the fully distributed scheduler is able to move the robots of SetX into a position ≥B −d or ≤A + d. Proof : The proof follows directly from Lemmas 3.2 and 3.3. □ The Split function The purpose of Algorithms G2B1 and G2B2 is to push the intermedi- ate robots of SetX as close the adversary want to the extremities of the network. For ease of the description, we assume in what follows that the adversary want to push them towards the extremity B. These two routines are then used by the adversary to prevent the convergence of the algorithm. For the algorithm of the adversary to work, it is necessary to keep the robots of SetA, SetB and SetX separated from each other and to avoid for example that the robots of SetX merge with those of SetB and form a single point of multiplicity. Yet, functions G2B1 and G2B2 cannot prevent such a situation to appear because the destinations are computed by the convergence algorithm which can order the robots to move exactly towards B. If the distance to travel is too small (distance(X, B) ≤δi for all i ∈SetX), then the adversary can not stop the robots of SetX before they arrive at B. To recover from this situation and separate the robots that have merged, we define a new function Split(Set, Border) which 8 separates the robots of Set from those located at Border. For example, Split(SetX, B) sepa- rates the robots of SetX from those of SetB by directing them towards A. Lemma 3.5 is used to prove that function Split performs as planned. Let N be a network of n robots divided between two positions A and B. let p and q be the number of robots at A and B respectively. These robots are endowed with a cautious convergence algorithm that tolerate the presence of up to f Byzantine robots. Lemma 3.5 proves that if a robot in A or B is activated, it cannot remain in its position and moves toward the robots located in the other point. Lemma 3.5 If |p−q| ≥f, then if a robot at A (resp. B) is activated, its destination computed by any cautious convergence algorithm lays inside (A, B] (resp. [A, B)). We now present Function Split(Set, Border) that is presented as Algorithm 3. We first define Maxδ as max{δi/i is a correct robot} such that δi is the minimum distance that can be traveled by a robot i before it may be stopped by the adversary. This means that if a group of robots (SetX in our case) are distant from their destination by more than Maxδ, the adversary is able to stop them all before they reach their destination. Notice now that in the setting of network N described in Figure 1, SetA and SetB contain each exactly f correct robots. If robots of SetX merge with those of SetB for example, they form a set of n −2f correct robots colocated in the same multiplicity point. By placing all the Byzantine robots at A, this location contains a set of 2f robots. The difference between the two sets of robots in A and B is lower or equal to f (because 3f < n ≤5f). Then if we activate the robots of SetX (which are located at B), they will move towards A according to Lemma 3.5. By stopping these robots once they all travelled a distance equal to Maxδ or reached they destination before, we ensure that the three sets SetA, SetX and SetB are disjoint, because the initial distance between A and B is > Maxδ. Algorithm 3 Function Split(Set, Border) Require: distance(A, B) > Maxδ Variables: Input: Border: is equal to A or to B. Input: Set: the set of robots to move away from Border. OppositeBorder: is equalt to B if the input Border is equal to A, and vice versa. Actions: Place all Byzantine robots in OppositeBorder. Activate the robots of Set, and stop them at a point Maxδ away from Border. The fully asynchronous scheduler algorithm Theorem 3.6 In the ATOM model, the problem of Byzantine resilient convergence is impos- sible to solve with a cautious algorithm under a fully asynchronous scheduler. Proof : We prove that for network N, there can be no cautious convergence algorithm for n ≤5f if the robots are activated by a fully asynchronous scheduler. The algorithm of the adversary is given as Algorithm 4 and it can prevent any cautious algorithm to converge. Indeed, if the initial distance between robots at A and B is equal to d, then these robots will always remain distant from each other by a distance at least equal to 6d/10. The proof of algorithm 4 follows directly from Lemmas 3.1, 3.4 and 3.5. □ 9 Algorithm 4 Adversary Algorithm Require: distance(A, B) > Maxδ Definitions: d0: any distance that is strictly smaller than distance(A, B)/4, let d0 ←distance(A, B)/10. G2B(Border, d): equal to G2B1(Border, d) if n −f is even and equal to G2B2(Border, d) if n −f is odd Actions: while true do G2B(A, d0). Activate the robots at A. if the robots of SetX are at A, then Split(SetX, A). G2B(B, d0). Activate the robots at B. if the robots of SetX are at B, then Split(SetX, B). d0 ←d0/2 end while 4 Deterministic Asynchronous Convergence In this section, we propose a deterministic convergence algorithm and prove its correctness in CORDA model under a fully asynchronous scheduler when there are at least 5f + 1 robots, f of which may be Byzantine. Algorithm Description The idea of our algorithm is based on three mechanisms: (1) a trimming function for the computation of destinations, (2) location dependency and (3) an election procedure. The purpose of the trimming function is to ignore the most extreme positions in the network when computing the destination. Robots move hence towards the center of the remaining positions. Consequently, the effect of Byzantine robots is canceled since they cannot drag the correct robots away from the range of correct positions. Location dependency affects the computation of the trimming function such that the re- turned result depends on the position of the calling robot. This leads to interesting properties on the relation between the position of a robot and its destination that are critical to conver- gence. The election procedure instructs to move only the robots located at the two extremes of the network. Thus, by the combined effect of these three mechanisms, as the algorithm progresses, the extreme robots come together towards the middle of the range of correct positions which ensures the eventual convergence of the algorithm. The algorithm uses three functions as follows. The trimming function trimi 2f() removes among the 2f largest positions of the multiset given in parameter only those that are greater than the position of the calling robot i. Similarly, it removes among the 2f smallest positions only those that are smaller than the position of the calling robot. It is clear that the output of trimi 2f() depends on the position of the calling robot. Formally, let minindexi be the index of the minimum position between Pi(t) and P2f+1(t) (if Pi(t) < P2f+1(t) then minindexi is equal to i, otherwise it is equal to 2f + 1). Similarly, let maxindexi be the index of the maximum position between Pi(t) and Pn−2f(t) (if Pi(t) > Pn−2f(t) then maxindexi is equal to i, otherwise it is equal to n −2f). trimi 2f(P(t)) is the multiset consisting of positions {Pminindexi(t), Pminindexi+1(t), . . . , Pmaxindexi(t)}. 10 The function center() simply returns the median point of the input range. The two functions are illustrated in Figure 2). The election function returns true if the calling robot is allowed to move. Only the robots that are located at the extremes of the networks are allowed to move, that is those whose position is either ≤Pf+1(t) or ≥Pn−f(t). Figure 2: Illustration of functions trimi 2f and center for robots A in a system of (n = 16, f = 3) robots. Algorithm 5 Convergence Algorithm under a fully asynchronous Scheduler Functions: trimi 2f(P(t)): removes up to 2f largest positions that are larger than Pi(t) and up to 2f smallest positions that are smaller than Pi(t) from the multiset P(t) given in parameter. center(): returns the point that is in the middle of the range of points given in parameter. elected() ≡((Pi(t) ≤Pf+1(t)) or (Pi(t) ≥Pn−f(t))). This function returns true if the calling robot is allowed to move. Actions: if elected() move towards center(trimi 2f(P(t))) By definition, convergence aims at asymptotically decreasing the range of possible posi- tions for the correct robots. The shrinking property captures this property. An algorithm is shrinking if there exists a constant factor α ∈(0, 1) such that starting in any configuration the range of correct robots eventually decreases by a multiplicative α factor. Note that to deal with the asynchrony of the model, the diameter calculation takes into account both the positions and destinations of correct robots. Definition 4.1 (Shrinking Algorithm) An algorithm is shrinking if and only if ∃α ∈ (0, 1) such that ∀t, ∃t′ > t, such that diam(U(t′)∪D(t′)) < α ∗diam(U(t)∪D(t)), where U(t) and D(t) are respectively the the multisets of positions and destinations of correct robots. A natural way to solve convergence is to never let the algorithm increase the diameter of correct robot positions. In this case the algorithm is called cautious. This notion was first introduced in [7]. A cautious algorithm is particularly appealing in the context of Byzantine failures since it always instructs a correct robot to move inside the range of the positions held by the correct robots regardless of the locations of Byzantine ones. The following definition introduced first in [1] customizes the definition of cautious algorithm proposed in [7] to robot networks. Definition 4.2 (Cautious Algorithm) Let Di(t) be the last destination calculated by the robot i before time t and let U i(t) the positions of the correct robots as seen by robot i before 11 time t. 3 An algorithm is cautious if it meets the following conditions: (i) cautiousness: ∀t, Di(t) ∈range(U i(t)) for each robot i, and (ii) non-triviality: ∀t, if diameter(U(t)) ̸= 0 then ∃t′ > t and a robot i such that Di(t′) ̸= Ui(t′) (at least one correct robot changes its position whenever convergence is not achieved). Theorem 4.1 [1] Any algorithm that is both cautious and shrinking solves the convergence problem in faulty robots networks. In the appendix we prove the correctness of Algorithm 5 in the CORDA model under a fully asynchronous scheduler. In order to show that Algorithm 5 converges, we prove first that it is cautious then we prove that it satisfies the specification of a shrinking algorithm. Convergence then follows from Theorem 4.1. 5 Concluding remarks Our work closes the study of the convergence problem for unidimensional robot networks. We studied the convergence problem under the most generic settings: asynchronous robots under unbounded adversaries and byzantine fault model. We proved that in these settings the byzantine resilience lower bound is 5f + 1 and we propose and prove correct the first deterministic convergence algorithm that meets this lower bound. We curently investigate the extension of the curent work to the multi-dimensional spaces. References [1] Byzantine-resilient convergence in oblivious robot networks. International Conference on Distributed Systems and Networks (ICDCN 2009), pages 275–280, January 2009. [2] N. Agmon and D. Peleg. Fault-tolerant gathering algorithms for autonomous mobile robots. Symposium on Discrete Algorithms: Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms, 11(14):1070–1078, 2004. [3] Z. Bouzid, M. G. Potop-Butucaru, and S. Tixeuil. Optimal byzantine resilient convergence in asynchronous robot networks. CoRR, abs/0906.0651, 2009. [4] R. Cohen and D. Peleg. Robot convergence via center-of-gravity algorithms. Proc. of the 11th Int. Colloquium on Structural Information and Communication Complexity, pages 79–88, 2004. [5] R. Cohen and D. Peleg. Convergence properties of the gravitational algorithm in asynchronous robot systems. SIAM Journal on Computing, 34(6):1516–1528, 2005. [6] X. Defago, M. Gradinariu, S. Messika, and P.R. Parvedy. Fault-tolerant and self-stabilizing mobile robots gathering. DISC06, the 20th International Conference on Distributed Computing. LNCS, 3274:46–60, 2006. [7] D. Dolev, N.A. Lynch, S.S. Pinter, E.W. Stark, and W.E. Weihl. Reaching approximate agreement in the presence of faults. Journal of the ACM (JACM), 33(3):499–516, 1986. [8] G. Prencipe. Corda: Distributed coordination of a set of autonomous mobile robots. In Proc. 4th European Research Seminar on Advances in Distributed Systems (ERSADS’01), pages 185–190, Bertinoro, Italy, May 2001. [9] G. Prencipe. On the feasibility of gathering by autonomous mobile robots. In A. Pelc and M. Raynal, editors, Proc. Structural Information and Communication Complexity, 12th Intl Coll., SIROCCO 2005, volume 3499 of LNCS, pages 246–261, Mont Saint-Michel, France, May 2005. Springer. [10] I. Suzuki and M. Yamashita. Distributed anonymous mobile robots: Formation of geometric patterns. SIAM Journal of Computing, 28(4):1347–1363, 1999. 3If the last calculation was executed at time t′ ≤t then Di(t) = Di(t′). 12 Appendix Proof of Lemma 3.1 Proof : We prove the lemma only for the case when all Byzantine robots are inside [A, X], and we denote the corresponding configuration by C1 (see Figure 1). The case where all Byzantine robots are inside [X, B] is symmetric. Figure 3: Illustration of Lemma 3.1, configuration C2 Let C2 (see Figure 3) be a similar configuration of n robots where the distribution of positions is isomorphic to that of C1, but where the correct and Byzantine robots are located differently: all robots at B are byzantine (there are f such robots), and all robots inside [A, X] are correct. Since the robot convergence algorithm is cautious, the diameter of correct robots in C2 must never decrease, and then all their calculated destination points must lay inside [A, X]. Since C1 and C2 are indistinguishable to individual robots of SetA, the Look and Compute phases give the same result in the two cases, which proves our lemma. □ Proof of Lemma 3.2 Proof : We prove the Lemma by contradiction. We assume that the algorithm does not terminate for a given input distance d0, and we prove that this leads to a contradiction. We consider only the case where Border = B, the other case being symmetric. The non- termination of the algorithm implies that there exists some distance d1 ≤d0 such that robots at X and B always remain distant by at least d1 from each other, even if robots at X are activated indefinitely. Note that the placement of Byzantine robots in G2B1 implies that initially, and for n ≤5f, the number of robots located at X and B is the same and is equal to (n −f)/2 as illustrated in Figure 4.(a). We denote by C1 the resulting configuration. We now construct a configuration C2 (see Figure 4.(b)) that is isomorphic to C1 but with a different distribution of Byzantine and correct robots: correct robots are divided equally between X and B, (n−f)/2 correct robots at X and (n −f)/2 others at B. By hypothesis, these robots are supposed to converge to a single point (located between X and B as the convergence point is computed by a cautious algorithm). The placement of Byzantine robots and the choice of activated robots at each cycle is divided into two parts. During even cycles, Byzantine robots are placed at point A and robots located at X are activated. During odd cycles, the scheduler constructs a strictly symmetrical configuration by moving Byzantine robots from A to a point E with E > B and distance(B, E) = distance(A, X). In this case, the scheduler activates robots at B. In these conditions, activating robots at X ensures that they always remain at a distance of at least d1 from those located at B (as in configuration C1). Indeed, configurations C1 and C2 are equivalent and completely indistinguishable to individual robots which must behave similarily in both cases (as the algorithm is deterministic). And by symmetry, the activation i (a) Configuration C1 for (n = 13, f = 3) (b) Configuration C2 for (n = 13, f = 3) Figure 4: Illustration of lemma 3.2 (Fact2, (n −f) even) of robots at B during odd cycles also ensures that minimum distance of d1 between the two groups of robots. Hence, robots at X and B remain separated by a distance of at least d1 forever even if activated indefinitely, which prevents the convergence of the algorithm and leads to a contradiction. This proves our Lemma. □ Proof of Lemma 3.3 Proof : We consider in our proof only the case when Border = B since the other case is symmetric. The placement of Byzantine robots in G2B2 is such that the multiplicity of X exceeds that of B by 1 during even cycles, and lowers it by 1 during odd cycles. We denote by C0 the initial configuration (in which the multiplicity of X is less than of B by 1 as illustrated in Figure 5.(a)). We assume for the purpose of contradiction that G2B2 does not terminate for some input distance d0. This means that robots of SetX and SetB remain always distant from each others by a distance at least equal to d1 with d1 being some distance ≤d0. The resulting execution in this case is denoted by E0 = {C0, C1, C2, C3, ...}. A configuration Ci+1 is obtained from Ci by activating robots at X, letting them execute their Move phases, and moving one Byzantine robot from X to B or vice versa. (a) Initial configuration C0 for (n = 12, f = 3) (b) Initial configuration C′ 0 for (n = 12, f = 3) Figure 5: Illustration of lemma 3.3 (Fact2, (n −f) odd) We construct a configuration C′ 0 equivalent to C0 but where correct robots are divided between X and B with⌊(n−f)/2⌋robots at X and ⌈(n−f)/2⌉robots at B (see Figure 5.(b)) . By definition, these robots must converge to a point between X and B since they are endowed with a cautious convergence algorithm. Byzantine robots are at A. Since C′ 0 and C0 are equivalent, the activation of robots at X and the displacement of Byzantine robots to ii the right of B will produce a configuration C′ 1 that is equivalent to C1 by symmetry. This time, activated robots are those at B. By moving them to their calculated destination points and by moving Byzantine robots again to the left of X the scheduler can form a configuration C′ 2 which is equivalent to C2. This process can be repeated: during odd cycles, Byzantine robots are at the left of X and robots at X are activated. During even cycles, the situation is symmetrical: Byzan- tine robots are to the right of B and robots at B are activated. The obtained execution E′ 0 = {C′ 0, C′ 1, C′ 2, C′ 3, ...} is equivalent to E0, and robots at X and B remain separated by a distance at least equal to d1 forever even if they are activated indefinitely. This prevents the convergence of the convergence protocol while ensuring fairness of activations, which contradicts the assumptions and proves our Lemma. □ Proof of Lemma 3.5 Proof : Let C1 be the initial configuration, and consider the computed destination by an activated robot located at A (the case of a robot located at B is symmetric). Since the algorithm is cautious, this destination point is necessarily located inside [A, B]. For the lemma to be correct, it suffices to prove that this destination is different from A. In other words, we must prove that the robot moves towards B upon its activation. So assume for the sake of contradiction that it is not the case, that is, the computed destination is A and let us separate the analysis into three cases depending on the relationship between p and q: • Case 1 (p > q): Let C2 be a configuration isomorphic to C1 with the following place- ment of robots: At A there are min(f, p) Byzantine robots and p −min(f, p) corrects ones, and at B are located f −min(f, p) Byzantine robots and q−f +min(f, p) corrects ones. Since Configurations C1 and C2 are indistinguishable to individual robots, the destinations computed in the two cases are the same. So when the robots at A are ac- tivated, they do not move. The next cycle, the adversary moves p −q Byzantine robots from A to B to obtain a configuration C3 symmetric to C2. This time, the adversary activates the robots at B which do not move either since C2 and C3 are symmetric. Then, the adversary brings the p −q Byzantine robots to A to get again the configura- tion C2 and then activates the robots at A. The process repeats, and by placing these p−q Byzantine robots in one cycle at A and the next cycle at B, the adversary prevents the convergence of the algorithm. This is a contradiction. • Case 2 (p < q): We can reach a contradiction by using an argument similar to Case 1. • Case 3 (p = q): If the activated robots at A do not move upon their activation, it is also the case at B since the configuration is symmetric. This prevents the convergence of the algorithm and leads also to a contradiction. Consequently, the lemma is proved. □ Proof of Algorithm 5 Algorithm 5 is cautious In this section we prove that Algorithm 5 is a cautious algorithm (see Definition 4.2) for n > 5f. The following lemma states that the range of the trimmed multiset trimi 2f(P(t)) is contained in the range of correct positions. iii Lemma 5.1 Let i be a correct robot executing Algorithm 5, it holds that ∀t, range(trimi 2f(P(t))) ⊆range(U(t)) Proof : We prove that for any correct robot, i, the following conditions hold: 1. ∀t, min(trimi 2f(P(t))) ∈range(U(t)). 2. ∀t, max(trimi 2f(P(t))) ∈range(U(t)). 1. By definition, min(trimi 2f(P(t))) = min{Pi(t), P2f+1(t)}. Hence proving Property (1) reduces to proving Pi(t) ∈range(U(t)) and P2f+1(t) ∈range(U(t)). (a) Pi(t) ∈range(U(t)) directly follows from the assumption that robot i is correct. (b) Pf+1(t) ∈range(U(t)). Suppose the contrary: there exists some time instant t such that P2f+1(t) /∈range(U(t)) and prove that this leads to a contradiction. If P2f+1(t) /∈range(U(t)) then either P2f+1(t) < U1(t) or P2f+1(t) > Um(t). i. If P2f+1(t) < U1(t) then there are at least 2f + 1 positions {P1(t), P2(t), . . . , P2f(t), P2f+1(t)} that are smaller than U1(t) which is the first correct position in the network at time t. This means that there would be at least 2f + 1 byzantine robots in the system. But this contradicts the assumption that at most f byzantine robots are present in the system. ii. If P2f+1(t) > Um(t) then since n > 5f there are more than 3f positions {P2f+1(t), ..., Pn(t)} that are greater than Um(t), which is the last correct po- sition in the system at time t. This also leads to a contradiction. 2. The property is symmetric to 2) and can be proved using the same argument. □ A direct consequence of the above property is that correct robots always compute a destination within the range of positions held by correct robots, whatever the behavior of Byzantine ones. Thus, the diameter of positions held by correct robots never increases. Consequently, the algorithm is cautious. The formal proof is proposed in the following lemma. Lemma 5.2 Algorithm 5 is cautious for n > 5f. Proof : We have to prove the two properties of cautious algorithms, namely cautiousness and non-triviality. Cautiouness: We start by the cautiousness property of our algorithm. According to Lemma 5.1, range(trimi 2f(P(t))) ⊆range(U(t)) for each correct robot i, thus center(trimi 2f(P(t))) ∈ range(U(t)). It follows that all destinations computed by correct robots are located inside range(U(t)) which proves the cautiousness property. Non-triviality: By fairness, the robots at positions U1(t) and Um(t) are guaranteed to be eventually elected irrespective of the positions of byzantine robots. And at least one of them will move unless all correct robots are colocated in the same point.This proves the non-triviality condition. □ iv 5.0.1 Algorithm 5 is Shrinking The following lemma proves that the only robots that can be elected are those located at the extremes of the network, namely those whose position is either less equal than Uf+1(t) or greater equal than Um−f(t). The activation of these robots move them away from the extremes of the network, thereby reducing the diameter of positions held by correct robots which leads to convergence. Lemma 5.3 If some correct robot i is activated at time t, then either Ui(t) ≤Uf+1(t) or Ui(t) ≥Um−f(t) where m is the number of correct robots in the network and Ui(t) denotes the position of correct robot i at t; Proof : By definition of the algorithm, a robot is activated only if its position is either ≤Pf+1(t) or ≥Pn−f(t). To prove the lemma, it suffices then to show that Pf+1(t) ≤Uf+1(t) and Pn−f(t) ≥Um−f(t): To prove that Pf+1(t) ≤Uf+1(t), we suppose to the contrary that Pf+1(t) > Uf+1(t). In this case, Pf+1(t) would be strictly greater than all the positions {U1(t), ..., Uf+1(t)}, which contradicts the definition of Pf+1(t) as the (f + 1)-th position in the network. This proves that Pf+1(t) ≤Uf+1(t) and the same argument is used to prove that Pn−f(t) ≥Um−f(t), since the two cases are symmetric. □ The following lemma proves an important property on the relationship between the posi- tion of a robot and its computed destination. Indeed, knowing the position Ui(t) held by a correct robot i at time t, it is possible to give bounds on the possible value of its destination point Di(t). Interestingly, this bound holds irrespective of the positions of Byzantine robots and the actions of the adversary. Formally, consider any initial configuration at time t0, such that U(t0) and D(t0) are respectively the multiset of positions and destinations of correct robots at time t0. Define UD(t0) to be the union of U(t0) and D(t0). By considering the cycles started by correct robots after t0, the following property holds: Lemma 5.4 For each correct robot i that starts a cycle after t0, the following inequalities hold: Di(t) ∈[Ui(t) + Min(UD(t0)) 2 , Ui(t) + Max(UD(t0)) 2 ] . Proof : The proof is twofold. First, we show that (1) Di(t) ≥(Ui(t) + Min(UD(t0)))/2. Then, we prove the symmetric property (2) Di(t) ≤(Ui(t) + Max(UD(t0)))/2. 1. Di(t) ≥(Ui(t) + Min(UD(t0)))/2 : Assume towards contradiction that for some robot i that start a cycle at time t1 ≥t0, there exists a time t ≥t1 in this cycle such that: Di(t) < Ui(t) + min(UD(t0)) 2 Note that Ui(t1) ≥Ui(t) because if robot i moves between t1 and t, it becomes closer to its destination Di(t). Thus: Di(t) < Ui(t1) + min(UD(t0)) 2 . . . (1) v This means that distance(min(UD(t0)), Di(t)) < distance(Di(t), U1(t)). Denote by d the distance between Ui(t1) and Di(t). Note that Di(t) < Ui(t1). The computation of Di(t) by i is based on the configuration of the network as last seen by robot i. That is, the configuration of the system at the beginning of its cycle P(t1). This implies that: Di(t) = center(trimi 2f(P(t1))) . . . (2) We prove that (1) and (2) combined lead to a contradiction. The location dependency property of the trimming function implies that Ui(t1) ∈ trimi 2f(P(t1)). So, up to this point we proved that there exists a point Ui(t1) ∈trimi 2f(P(t1)) such that Ui(t1) > Di(t) and distance(Ui(t1), Di(t)) = d. But since by (2), Di(t) is the center of trimi 2f(P(t1)), there must exists another point q ∈trimi 2f(P(t1)), such that q < Di(t) and distance(q, Di(t)) = d. But we observed from (1) that distance(min(UD(t0)), Di(t1)) < d, which implies that distance(min(UD(t0)), Di(t1)) < distance(q, Di(t)). This means that q < min(UD(t0)). But q ∈trimi 2f(P(t1)), so min(trimi 2f(P(t1))) < min(UD(t0)). This contradicts lemma 5.1, which proves the first part of our lemma. 2. (2) Di(t) ≤(Ui(t) + Max(UD(t0)))/2 : The property is symmetric to (1) and can be proved using the same argument. □ Let S be a subset of correct robots, and define UDS(t) to be the multiset of their positions and destinations at time t. Lemma 5.5 If |S| ≥m −2f and there exists a time t1 ≥t0 such that for each t > t1, max(UDS(t)) ≤max(UD(t0)) −b, then all computed destinations by all correct robots in cycles that start after t1 are ≤max(UD(t0)) −b/2. Proof : Let i be any correct robot that computes its destination Di in a cycle started after t1, say at t. We prove in the following that Di < max(UD(t0)) −b/2: First, observe that since max(UDS(t)) < max(UD(t0)) −b and |S| ≥m −2f > 2f, then min(Trimi 2f(P(t)) < max(UD(t0)) −b . Otherwise, min(Trimi 2f(P(t)) would be greater than all the positions in S (> 2f po- sitions), which contradicts the definition of Trimi 2f (at most the 2f smallest positions are removed). According to lemma 5.1, we have max(Trimi 2f(P(t)) < max(UD(t0)) vi But Di is the center of trimi 2f(P(t)), which means that distance(Di, min(trimi 2f(P(t)))) must be equal to distance(Di, max(trimi 2f(P(t)))). Hence, Di < max(UD(t0)) −b/2 □ Lemma 5.6 If |S| ≥m −f and at some time t1 ≥t0, max(UDS(t1)) ≤max(UD(t0)) −b, then all computed destinations by all correct robots in cycles that start after t1 are less or equal to max(UD(t0)) −b/2. Proof : First, we prove that after t1, the robots in S remains always at positions < max(UD(t0))−b, meaning that all their computed destinations after t1 are < max(UD(t0))− b. Assume the contrary: Let i be the first robot in S that starts a cycle after t1 such that its computed destination in this cycle is > max(UD(t0))−b. This implies that max(trimi 2f(P(t1))) > max(UD(t0)) −b, which means that at least 2f + 1 positions in the network at t1 are strictly greater than max(UD(t0)) −b. If we add to these 2f+1 positions that are greater than max(UD(t0))−b, the m−f ≥n−2f positions in S that are less or equal than max(UD(t0))−b, we get a total number of robots in the network that is strictly greater than n, which leads to contradiction. This proves that all positions and destinations of robots in S after t1 are less than or equal to max(UD(t0)) −b. Thus by lemma 5.5, the destinations computed by all correct robots in the network are less than or equal to max(UD(t0)) −b/2. □ The next Lemma states that if some computed destination is located in the neighborhood of one extreme of the network, then a majority of correct robots (at least m−2f) are located in the neighborhood of this extreme. Lemma 5.7 Let Di be a destination point computed by a correct robot i in a cycle started at time t. If Di < min(UD(t)) + b, then at least m −2f correct robots are located at positions that are < min(UD(t)) + 2b at t. Proof : The computation of Di is based on the configuration of the network as last seen by robot i, that is the configuration at the beginning of the cycle at t, P(t). So we first prove that at t, max(trimi 2f(P(t))) < min(UD(t)) + 2b: By hypothesis, Di < min(UD(t)) + b. But according to lemma 5.1 , min(UD(t)) ≤ min(trimi 2f(P(t))). Thus, Di < min(trimi 2f(P(t))) + b. This means that distance(Di, min(trimi 2f(P(t)))) < b But Di is the center of trimi 2f(P(t)), which means that distance(Di, min(trimi 2f(P(t)))) must be equal to distance(Di, max(trimi 2f(P(t)))). Hence, max(trimi 2f(P(t)))) < Di + b But since by hypothesis Di < min(UD(t)) + b, we have max(trimi 2f(P(t)))) < min(UD(t)) + 2b vii This means that at most 2f positions (which may be correct) are ≥min(UD(t)) + 2b at t. This completes the proof. □ Let U(t0) and D(t0) be respectively the multisets of positions and destinations of correct robots at the initial time t0, and define UD(t0) to be the union of U(t0) and D(t0). Take b to be any distance < diameter(UD(t0))/4, for example b = diameter(UD(t0))/10. The next lemma states that if a correct robot elected at t > t0 is located inside the range (min(UD(t0))+b, max(UD(t0))−b), then the destinations points computed by correct robots after t are either all ≤max(UD(t0)) −b/4 or all ≥min(UD(t0)) + b/4. This means that the election of a robot located inside (min(UD(t0))+b, max(UD(t0))−b) is a sufficient condition to convergence. Lemma 5.8 Let t1 be the first time at which all correct robots in the network executed a complete cycle at least once since t0. If a correct robot is elected at t > t1 and is located inside [min(UD(t0))+b, max(UD(t0))− b], then the destination points computed by correct robots in cycles that start after t are either all located at positions ≤max(UD(t0))−b/4 or all located at positions ≥min(UD(t0))+b/4. Proof : Let i be a correct robot that is elected at time t > t1 and whose position Ui(t) is inside [min(UD(t0)) + b, max(UD(t0)) −b]. According to lemma 5.3, either Ui(t) ≥Um−f(t) or Ui(t) ≤Uf+1(t). Thus, we separate the analysis into two cases depending on the rank of the elected robot: • Case 1: Ui(t) ≥Um−f(t). Define S(t) to be the set of correct positions {U1(t), ..., Um−f (t), ..., Ui(t)}, and note that |S(t)| ≥m −f. By hypothesis, Ui(t) ≤max(UD(t)) −b which implies that the positions of all robots in S(t) are ≤min(UD(t)) + b. Thus by lemma 5.4, the destinations of all robots in S(t) are ≤max(UD(t0)) −b/2. This means that rangeS(t), the range of positions and destinations of robots in S(t) is such that at t, max(rangeS(t)) ≤max(UD(t0)) −b/2. Hence, according to lemma 5.6, all destinations points computed by correct robots in cycles that start after t are ≤max(UD(t0)) −b/4. • Case 2: Ui(t) ≤Uf+1(t). The case is symmetric and we prove by a similar argument to Case 1 that all destination points computed by correct robots are ≥min(UD(t0)) + b/4, which proves our lemma. □ Lemma 5.9 Algorithm 1 is shrinking in CORDA model under a fully asynchronous scheduler when n > 5f. Proof : Let U(t0) = {U1(t0), Um(t0)} be the configuration of correct robots at initial time t0, and let D(t0) = {D1(t0), ..., Dm(t0)} the multiset of their destinations at t0. Define UD(t0) to be viii the union of U(t0) and D(t0), and let diam(t0), the diameter at t0, be equal to max(UD(t0))− min(UD(t0)). U(t), D(t), UD(t) and diam(t) for each t > t0 are defined similarly. Let t1 be the first time at which every correct robot in the network has executed a whole cycle at least once since t0. We consider the evolution of the network after t1. The aim of this is to apply lemma 5.4, that is, based only on the position of a correct robot, we can give bounds on its destination point which is especially interesting in the case of a robot executing a Move phase of its cycle. We take into account all the computed destinations by correct robots after t1 and we distinguish between two cases: (1) the case when all destinations computed after t1 are inside [min(UD(t0)) + diam(t0) 10 , max(UD(t0)) −diam(t0) 10 ]. and (2) the case when a computed destination after t1 lay outside this range. We show that in both cases, there is a time at which the diameter of correct positions decreases by a factor of at least 39/40. • Case 1: All destinations computed by correct robots in cycles started after t1 are inside the range [min(UD(t0)) + diam(t0)/10, max(UD(t0)) −diam(t0)/10]. In this case, since each robot i is guaranteed to move a minimal distance of δi before it can be stopped by the adversary, there is a time t2 ≥t1 when all correct robots are located inside [min(UD(t0)) + diam(t0)/10, max(UD(t0)) −diam(t0)/10]. Thus diam(t2) = diam(t0) ∗4/5, and by setting α = 4/5, our algorithm is shrinking. • Case 2: There is a destination Di, computed by a correct robot i in a cycle started after t1, that is outside the range [min(UD(t0)) + diam(t0)/10, max(UD(t0)) −diam(t0)/10]. This means that either Di < min(UD(t0)) + diam(t0)/10 or Di > max(UD(t0)) − diam(t0)/10. Since the two cases are symmetric, there is no loss of generality to assume that Di < min(UD(t0)) + diam(t0)/10. The calculation of Di is based on the configuration of the network as seen by robot i at the beginning of the cycle, say at t2 (with t2 ≥t1). Thus, according to lemma 5.7, at t2, at least m−2f correct robots are located at positions < min(UD(t0))+diam(t0)/5. Denote by S(t2) the set of these robots. By lemma 5.4, the destinations of robots in S(t2) are < min(UD(t0)) + diam(t0) ∗(3/5). Thus, the positions and destinations of robots in S(t2) are < max(UD(t0)) −diam(t0) ∗2/5. We now observe the positions of elected robots whose rank is ≤f + 1 and which are activated after t2. We separate the analysis into two subcases: – Subcase 2A: There is a time t > t2 at which is elected a correct robot i whose rank is ≤f + 1 and whose position Ui(t) is > min(UD(t0)) + diam(t0)/10. No- tice that since |S(t2)| > m −2f, Ui(t) is also < max(UD(t0)) −diam(t0) ∗2/5 which is the upper bound on the positions of robots in S(t2). Thus, Ui(t) ∈ [min(UD(t0))+diam(t0)/10, max(UD(t0))−diam(t0)/10] and according to lemma 5.8, the diameter eventually decreases by a multiplicative factor of 1−1/40. Hence, by setting α = 39/40 the lemma follows. ix – Subcase 2B: All elected correct robots that are activated after t2 and whose rank is ≤f + 1 are located at positions < min(UD(t0)) + diam(t0)/10. This implies, according to lemma 5.4, that the positions of these elected robots remain always at positions < max(UD(t0)) −diam(t0) ∗9/20. Thus, all robots in S(t2) remain always at positions < max(UD(t0)) −diam(t0) ∗9/20 (∀t > t2). According to lemma 5.5, all destinations computed at cycle that start after t2 are < max(UD(t0)) −diam(t0) ∗9/40. And since robots are guaranteed to move toward destinations by a minimum distance before they can be stopped by the adversary, they all end up located at positions < max(UD(t0)) −diam(t0) ∗9/40. Hence there is a time t > t2 such that diam(t) = diam(t0) ∗(1 −9/40). It suffices to set α = 31/40 and the lemma follows. Consequently, we set α = 39/40 and the lemma is proved. □ x