arXiv:1106.0113v1 [cs.DC] 1 Jun 2011 The BG-simulation for Byzantine Mobile Robots1 Taisuke Izumi24 Zohir Bouzid3 S´ebastien Tixeuil3 Koichi Wada2 Abstract This paper investigates the task solvability of mobile robot systems subject to Byzantine faults. We first consider the gathering problem, which requires all robots to meet in finite time at a non-predefined location. It is known that the solvability of Byzantine gathering strongly depends on a number of system attributes, such as synchrony, the number of Byzantine robots, scheduling strategy, obliviousness, orientation of local coordinate systems and so on. However, the complete characterization of the attributes making Byzantine gathering solvable still remains open. In this paper, we show strong impossibility results of Byzantine gathering. Namely, we prove that Byzantine gathering is impossible even if we assume one Byzantine fault, an atomic exe- cution system, the n-bounded centralized scheduler, non-oblivious robots, instantaneous move- ments and a common orientation of local coordinate systems (where n denote the number of correct robots). Those hypotheses are much weaker than used in previous work, inducing a much stronger impossibility result. At the core of our impossibility result is a reduction from the distributed consensus problem in asynchronous shared-memory systems. In more details, we newly construct a generic reduc- tion scheme based on the distributed BG-simulation. Interestingly, because of its versatility, we can easily extend our impossibility result for general pattern formation problems. 1This work was supported in part by ANR projects, KAKENHI no.21500013 and no.22700010. 2Nagoya Institute of Technology, Gokiso-cho, Showa-ku, Nagoya, Aichi, 466-8555, Japan. E-mail: {t- izumi,wada}@nitech.ac.jp. 3Universit´e Pierre et Marie Curie - Paris 6, LIP6 CNRS 7606, France. E-mail: zohir.bouzid@gmail.com, Se- bastien.Tixeuil@lip6.fr. 4Corresponding Author. E-mail: t-izumi@nitech.ac.jp. Tel:+81-52-735-5567, Fax:+81-52-735-5408 1 Introduction Motivation Robot networks have recently become a challenging research area for distributed computing researchers. At the core of scientific studies lies the characterization of the minimum robots capabilities that are necessary to achieve non-trivial tasks, such as the formation of geo- metric patterns, scattering, gathering, etc. The considered robots are often very weak: They are anonymous (i.e. that do not have any means to perform distinct tasks based on a distinguishable identifier), oblivious (i.e. they cannot remember past observations, computations, or movements), disoriented (i.e. they share neither a common coordinate system nor a common length unit), and most importantly dumb (i.e. they don’t have any explicit mean of communication). The last property means that robots cannot communicate explicitly by sending messages to one another. Instead, their communication is indirect (or spatial): a robot ’writes’ a value to the network by moving toward a certain position, and a robot ’reads’ the state of the network by observing the positions of other robots in terms of its local coordinate system. The problem we consider in this paper is the gathering of fault-prone robots [20]. Given a set of oblivious robots with arbitrary initial locations and no agreement on a global coordinate system, the gathering problem requires that all correct robots reach and stabilize the same, but unknown beforehand, location. A number of solvability issues about the gathering problem are studied in previous works because of its fundamental importance in both theory and practice. One can easily find an analogy of the gathering problem to the consensus problem, and thus may think that its solvability issue are straightforwardly deduced from the known results about the consensus solvability (e.g., FLP impossibility). However, many differences lies between those two problems and the solvability of the gathering problem is still non-trivial. We can enumerate at least three factors that strongly affect the solvability of the gathering problem: (i) the absence of a common coordinate system, (ii) the fact that there is no explicit termination, and (iii) the lack of a validity requirement. In fault-free environments, the non-triviality of the existence of a solution mainly results from (i) that hardens symmetry breaking. Actually, gathering is known to be impossible to solve with n = 2 robots in atomic-execution (ATOM) models1. One direction of the study of gathering is to explore the weaker assumptions breaking this hardness. For example, endowing robots with a small amount of memory [5, 20], or weak agreement of local coordinate systems [15, 16, 19]. On the other hand, in fault-prone environments, the remaining two factors arise as the primary difference to the consensus in classical computation models. An important witness encouraging the difference is that the gathering problem can be solved in a certain kind of crash-prone asynchronous robot networks [1, 10], while the consensus cannot be solved under the asynchrony and one crash fault [11]. Our Contribution In this paper, we investigate the solvability of the gathering problem in robot networks subject to Byzantine faults. While crash-faulty robots just stop the execution of the deployed algorithm, a Byzantine-faulty robot may execute arbitrary code (including malicious code) and try to defeat the proper operation of correct robots. As we mentioned, the solvability of Byzantine gathering is quite non-trivial. Actually, the Byzantine-tolerant gathering problem still has the large gap between possibility and impossibility. As known results, Byzantine gathering is feasible only under very strong assumptions (fully-synchronous ATOM models or small number of robots) [1], and also the impossibility results are proved only for severe models (asynchrony, oblivious and uniform robots, and/or without agreement of coordinate systems) [1, 10]. Filling this gap has remained an open question until now. In this paper, we respond negatively: Namely, we prove that Byzantine gathering is impossible even if we assume an ATOM models, n-bounded centralized scheduler, non-oblivious and non-uniform robots, and a common orientation of local coordinate systems, for only one Byzantine robot (where n denotes the number of correct robots). 1While ATOM models are often called semi-synchronous models, we do not use that word because this model actually has no bound for the processing/moving speed of each robot. We adapt the notion of bounded schedulers for characterizing the bound for processing speed of robots, and thus apply the word “asynchronous ATOM models” to the conventional semi-synchronous models. 1 Those assumptions are much stronger than that shown in previous work, inducing a much stronger impossibility result. At the core of our impossibility result is a reduction to 1-Byzantine-resilient gathering in mobile robot systems from the distributed 1-crash-resilient consensus problem in asynchronous shared- memory systems. In more details, based on the distributed BG-simulation by Borowsky and Gafni [3, 4], we newly construct a 1-crash-resilient consensus algorithm using any 1-Byzantine- resilient gathering algorithm on the system with several constraints. Thus, we can deduce impos- sibility results of Byzantine gathering for the model stated above. More interestingly, because of its versatility, we can easily extend our impossibility result for general pattern formation problems: We show that the impossibility also holds for a broad class of pattern formation problems including line and circle formation. To the best of our knowledge, this paper is the first study explicitly bridging algorithmic mobile robotics and conventional distributed computing theory for proving impossibility results. It is remarkable that we assume a certain kind of synchrony assumption for robot systems. The assumption of n-bounded scheduler restricts the relative speed of each robot (formally, n- bounded scheduler only allows the activation schedules where each robot is activated at most n times between any two consecutive activations of some robot). An interesting insight we can find from our result is that it is possible to trade the synchrony and Byzantine behavior of robot networks to the asynchrony and crash behavior of shared memory systems, which implies that the gap between synchronous robot networks and classical distributed computation models is as large as that between synchrony and asynchrony in classical models. Related works Since the pioneering work of Suzuki and Yamashita [20], the formation of a specific patterns, including the gathering and the convergence problems, by mobile robots has been addressed first in fault-free systems for a broad class of settings. Prencipe [18] studied the problem of gathering in both atomic and non-atomic movement models, and showed that the problem is unsolvable without additional assumptions such as being able to detect the multiplicity of a location (i.e., knowing if there is more than one robot in a given location). Following their work, the gathering and the convergence problems were considered on several restricted settings such as with limited visibility [2, 12], and with inaccurate sensors and movements [8, 15, 16, 19, 21]. The case of fault-prone robot networks was recently tackled by several academic studies. The faults that have been investigated fall in two categories: crash faults and Byzantine faults. The deterministic fault-tolerant gathering is first addressed in [1] where the authors propose a gathering algorithm that tolerates one crash in ATOM models with arbitrary schedulers and another algo- rithm working under the fully synchronous scheduling, which tolerates up to f Byzantine faults for n > 2f robot systems, where n is the number of correct robots. In [10], the authors study the feasibility of probabilistic gathering in crash-prone and Byzantine-prone environments. It also improves the impossibility of Byzantine gathering, but the impossibility still relies on the weakness of models, including obliviousness and no agreement of coordinate systems. The convergence problem, which is a variation of the gathering problem, was first addressed by Cohen and Peleg [8], where algorithms based on convergence to the center of gravity of the system are presented. Those algorithms work in non-atomic models with asynchronous schedulers. The study of convergence in Byzantine-prone environments are addressed by Bouzid et al. A series of their papers [6, 7] investigates the relationship between the maximum number of faulty robots and the synchrony and the atomicity of robots. As impossibility results are hard to get, it is often interesting to start from a small set of such impossibility results and derive others through reduction. The distributed BG-simulation lies as one of the powerful reduction schemes in distributed computing. There are many applications of it with a variety of modified reduction strategies [3, 4, 13, 14]. Roadmap The organization of the paper is as follows: In section 2, we explain the system model, including both robot and shared-memory models, and the problem definitions. Section 3 introduces our reduction scheme. To clarify the concept of our idea, this section shows a weaker version of the 2 reduction, which is be extended and generalized at Section 4. 2 Preliminaries 2.1 Asynchronous Shared Memory System We consider a single-writer multi-reader (SWMR) asynchronous shared memory system of mS processes {p0, · · · , pmS−1}. The shared memory consists of a number of memory cells, one of which can be atomically read and written by each process. That is, we assume linearizable shared memory. We also employ atomic snapshot for access to the shared memory. It provides atomic read of all shared memory cells. Since atomic snapshot operation can be implemented by only using read/write operations, it gives no additional computational power to the model. Any impossibility result on asynchronous shared memory systems also holds even if we assume atomic snapshot operation. Since all of three operations to access the shared memory are performed atomically and instantaneously, we see it as an event in execution. To explain the order of events easily, we often use the notion of discrete global time. Each event is assigned the global timestamp of its occurrence. Since we assume linearizability, all events are consistently serialized. Thus, without loss of generality, we assume any two events necessarily have different timestamps. Note that the global time is introduced only for ease of explanation, and no process is aware of the time. Processes are subject to crash faults. When a process crashes, it stops all of the following operations and becomes silent. In this paper, we assume that only one process can be crashed. 2.2 Consensus Problem In a consensus algorithm, each correct process initially proposes a value, and eventually chooses a decision value from the values proposed by processes so that all processes decide the same value. The standard specification of the consensus problem assumes that the tree following properties are satisfied: (i) Termination Every correct process eventually decides, (ii) Agreement No two correct processes decide different values, and (iii) Validity If a process decides a value v, then, v is a value proposed by a process. Throughout this paper, we only consider the binary consensus, where only value zero or one is the possible proposal. It is well-known that the consensus problem is not solvable in asynchronous shared-memory systems with one crash fault [17]. Theorem 1 (Impossibility of 1-resilient Consensus) There is no binary consensus algorithm on the asynchronous SWMR shared-memory model even if mS = 2 and only one process can be crashed. 2.3 Byzantine Mobile Robot System The robot system consists of n + 1 autonomous mobile robots R = {r0, · · · , rn+1} for n > 2. Each robot is non-oblivious (it can memorize a history of execution) and can be non-uniform (all robots can execute different codes)2 3 It does not have any device for direct communication, but is capable of observing its environment (i.e., the positions of other robots in its local coordinate system). One robot is modeled as a point located on a two-dimensional space. To specify the location of each robot consistently, we use a global Cartesian coordinate system. Notice that this global coordinate system is introduced only to ease the explanations, and that each robot is not aware of it. Each robot executes the deployed 2Note that our non-uniformity does not means that each robot has a different identity and any other robot can read this identity from the observation. That is, each robot has a different identity but it can not visibly identify the labels of other robots. These difference are inherently important. Actually, it yields a different computational power to the robot system[9]. 3Note that the model of this paper is stronger than the standard one, which usually assumes that each robot is anonymous, oblivious and uniform. However our aim is proving the impossibility, and thus to assuming stronger assumptions gives a stronger impossibility result. 3 algorithm in computational cycles (or briefly cycles). At the beginning of a cycle, the robot observes the current environment (i.e., the positions of other robots) and determines the destination point based on the deployed algorithm. Then, the robot moves toward the computed destination4, which concludes the cycle. The local coordinate system of a robot is the Cartesian coordinate system whose origin is the current position of the robot. Moreover, x and y axes of each robot are parallel, i.e. robots share a common direction. We assume strong multiplicity detection for the observation of points with two or more robots: Each robot can detect the exact number of robots that are located at a particular point. We assume the ATOM execution model, where an execution is divided into consecutive rounds. The scheduler determines the set of performing robots for each round. At any round r = 0, 1, 2, · · · , the scheduler determines whether each robot is active or inactive. Active robots perform one cycle in an atomic manner, and inactive ones wait during the round. The scheduler is fair in the sense that every robot is activated infinitely often. In this paper, we assume that the scheduler is also k-bounded, which guarantees that if a robot is activated at round r1 and r2 (r1 < r2), any robot is activated at most k times during [r1, r2]. We also consider another constraint for the scheduler, called centralized scheduler, which allows only one robot to be activated at each round. In our model, robot may exhibit Byzantine faults. A Byzantine robot is allowed not to follow the deployed algorithm, and thus behaves arbitrarily. However, if we consider the k-bounded scheduler, the constraint is also incurred to faulty robots: Even a Byzantine robot may change its position at most k times during two consecutive activations of any correct robot. We call robots that are not Byzantine correct. Throughout this paper, we assume that the system has one Byzantine robot. In what follows, we give a formalisms of the robot model we now consider: Let S be the set of all possible internal states of the algorithm {A0, A1, · · · An}, where Ai is the algorithm deployed to ri. We can define the local state of a robot as a pair of its current internal state and its location in terms of global coordinate systems. A system configuration (or configuration for short), is an (n + 1)-tuple of local states where each corresponds to the local configuration of a robot. We also define a location configuration L(C) of C as an (n+1)-tuple of the global coordinates each of which corresponds to locations of each robot at C. We sometimes treat L(C) as a multiset. The location of robot ri at C is denoted by ri(C). Algorithm Ai is defined as a mapping Ai : {R2}n+1×S →R2×S. That is, each robot computes the destination and its poststate from the observation result (i.e., the multiset of locations in terms of its local coordinate system) and the current internal state. An execution of an algorithm is a sequence of configurations C0, C1, C2, · · · where Ci+1 can be obtained from Ci by making a number of robots move following the deployed algorithm and by changing the location of Byzantine robot arbitrarily. 2.4 Gathering Problem The gathering problem must ensure that all correct robots eventually meet at a point that is not predefined, starting from any configuration. Formally, we say that an algorithm A solves the gathering problem if any execution of A eventually reaches a configuration where all correct robots are on a single point and never leave there. Given an execution E = C0, C1, · · · , Cj, · · · , we say a configuration Cj is legitimate if all correct robots keeps a common location at Cj′ for any j′ > j. For any configuration Cj, we define m(Cj) as the point at which the most robots are located in Cj5, and M(Cj) as its number. 4We also assume that the robot can reach the computed destination in the move phase for proving the impossibility 5If two or more points has the same and maximum number of robots, an arbitrary one from them is determinis- tically chosen as the value of m(Cj). 4 3 Impossibility of Byzantine Gathering 3.1 Discussion and Outline Our impossibility proof is derived from the reduction of 1-crash-resilient binary consensus on asyn- chronous shared memory systems from 1-Byzantine-resilient gathering on mobile robot systems. More precisely, we show that the 1-crash-resilient binary consensus algorithm can be constructed using any 1-Byzantine-resilient gathering algorithm. The primary part of this reduction is a simu- lator algorithm of Byzantine mobile robot systems, which is “synchronous” in a certain sense, on the top of “asynchronous” shared-memory systems. Let us first start the explanation of our idea from an analogy bridging those two models. It is easy to find some correspondence between atomic snapshot models and mobile robots: We see one memory cell of the shared memory as the local state (i.e., the location) of one robot. Then, taking a snapshot implies an observation, and writing some value to the cell implies move. This analogy makes us look at a framework of the simulation as follows: 1. Consider the shared memory system of n + 1 processes, each of which corresponds to one simulated robot. At the beginning of the simulation, each process “encodes” its proposal to the initial location of the robot (e.g., put the robot on (1, 0) if the proposal is one and on (0, 0) if zero). 2. Each process pi repeats the following task: The process pi first takes a snapshot. Using the resultant value of the snapshot as the observed configuration, it activates robot ri and calculates the destination of gathering algorithm. Then, it actually makes ri move to the computed destination by writing its coordinate to the corresponding shared-memory cell. 3. If the observed configuration is legitimate, each process “decodes” the decision value from the coordinate of the gathering point. Unfortunately, the above framework does not work correctly. We can point out at least two flaws: 1) The above simulation framework is not wait-free: To simulate (n + 1)-robot systems correctly, all n + 1 robots must appear on any configuration. However, if a faulty process is initially crashed, the initial location is never set to the corresponding robot. 2) The observation and movement is not atomic: To simulate semi-synchronous mobile robots, any concurrent cycle must be performed in synchronized manner, which is not guaranteed in the above framework. For example, the following behavior is possible: A process takes a snapshot at t, and writing the destination at t′ (t < t′). Then, during the period [t, t′], another process may simulate two or more activations. That behavior never matches the ATOM execution. Our reduction circumvents the above difficulties by employing the concept of the BG-simulation by Borowski and Gafni [3]. The BG-simulation is originally invented to extend the wait-free im- possibility into 1-resilient impossibility. Its principle is to simulate the system of n processes with single fault by only two processes with single fault. To make such a simulation successful, we cannot statically assign the role of simulated processes to simulator processes (because all of the processes assigned to a process pi are simultaneously crashed if pi is crashed). Instead, in the original BG- simulation, each process simulates all processes in round-robin manner. Then, one process can be simulated by two processes, which may brings some inconsistency problem between two simulations. The original BG-simulation resolves those situations by a mutual-exclusion-like mechanism. This approach is wait-free as the simulation of 1-resilient systems: Assume that one of two simulating processes can be crashed when it is in simulation of a process pi. Then, pi’s simulation can be blocked forever, but such a block occurs at most once since the number of simulator processes is two. Thus, we can regard pi as faulty in the simulation. This feature will be helpful to resolve the flaw 1) we mentioned. Yet another problem of simulating ATOM, however, still remains even if we simply use the BG- simulation. This is because the original BG-simulation does not intend to simulate synchronous systems. To clarify this problem, let us consider the following cases: Two simulator processes concurrently simulate the consecutive two behaviors x and y of two different processes. First, 5 both processes simulate the behavior x but their simulations are inconsistent. Then, to decide the behavior x, both processes must complete the simulation of x. However, since one of two simulator processes may be faulty, the process completing the simulation of x cannot wait for the other process. It must proceed to the simulation of y in spite of uncertainty of x, which can result in the inconsistency between x and y after both of them are fixed. The original BG-simulation avoids this uncertainty by reading the past state at the simulation of y. That is, any simulation following x is performed as if the behavior x does not occur, which continues until the behavior x is completely fixed. Then, importantly, we cannot know when x is fixed because the simulator processes are completely asynchronous, and thus the simulation also becomes asynchronous. Consequently, the straightforward use of BG-simulation fails to achieve the simulation of our reduction. The trick of our reduction algorithm is to make Byzantine behavior absorb this uncertainty. 3.2 Reduction 3.2.1 Object slot Our reduction algorithm uses a slot shared object, which partly abstracts the idea of the original BG-simulation. Informally, a Slot object is the write-once register shared by two processes, which is guaranteed to decide one submitted value as the committed value only if no process crashes during submission, or two submissions by different processes are not contended. It provides two operations submiti(v) and readi(). The operation submiti(v) denotes that pi writes a value v to the slot. Since slot is write-once, it can be activated at most once by each process. The read operation by pi returns the triple (v0, v1, s), which respectively mean the values submitted by p0 and p1, and the status of the object (if vi is not submitted yet, vi = ⊥). The status indicates whether the stored value is committed or not, and which is the committed value if committed. If the value is committed, the status entry in the returned triple holds the process ID submitting the committed value. Otherwise, it holds value ⊥, which means the slot is not committed yet. Formally, we can define the specification of slot object as follows: Definition 1 Let O be a slot object. The time when operation O.submiti(vi) begins and ends is denoted by bi and ei 6. Then, the following properties are guaranteed: Validity For any triple (w0, w1, s) returned by a read operation, wi ∈{vi, ⊥} holds for any i ∈ {0, 1}. Contended Value Detection If a read operation returns (w0, w1, ⊥), w0 ̸= ⊥and w1 ̸= ⊥hold. Persistency If a read operation returns a non-⊥status s at t, any read operation invoked after t returns status s. Commitment Any read operation invoked at t′ > max{e0, e1} returns a non-⊥status. No Contention Commitment If ei < b1−i, any read operation invoked after ei returns the status s = i. Common Value Commitment If v0 = v1 holds, any read operation invoked at t′ > min{e0, e1} returns a non-⊥status. In this paper, we do not present the implementation of slot object because it is implicitly addressed in the original BG-simulation paper [3, 4]. The readers who are interested in the imple- mentation can refer that paper or a standard textbook of distributed computing. 6If the operation O.submiti(vi) does not begin (or does not ends by pi’s crash), we define bi = ∞(or ei = ∞). 6 3.2.2 Details of Simulation Algorithm 1 shows the pseudocode description of our simulation. As explained, this algorithm is designed for two-processor asynchronous shared memory systems. In the following argument, let {p0, p1} be the set of simulator processes running this algorithm. As the simulation target, we consider the robot system of f = 1. Hence the total number of robots is n + 1 . In the simulation, rn is regarded as the Byzantine robot. The shared memory has an array E of slot objects. Each element of E stores the result of an activation of a robot (represented as a pair of its internal state and location), and the whole of array E corresponds to the round-robin scheduling of all correct robots. Thus, each slot E[j] stores the behavior of robot rj mod n. Note that E does not explicitly contain the behavior of faulty robot rn. The simulation algorithm consists of two blocks: The first for-loop constructs the initial con- figuration of the simulated execution, where each process submits the initial configuration of each robot with location (0, 0) or (1, 0) to E[0..n −1] according to the simulator’s proposal value. Sim- ulating one-step movement of a robot corresponds to one pass of the following loop block (referred as “main loop” in the following argument). The variable u counts the number of simulated steps. That is, u-th loop simulates (u −n)-th time step of the simulated execution. Recall that the first n slots are used for the construction of the initial configuration. In the loop, the simulation exploits the subroutine called getview. It constructs the configuration as the observation result of robot ru mod n by referring last n slots: The subroutine first takes a snapshot of E (referred as E′ in the algorithm), and copies the committed values of E′[u−n], E′[u− n+1], · · · E′[u−1] to local variable C[0], C[1], · · · C[n−1]. If some slot E[u−n+g] (0 ≤g ≤n−1) is uncommitted, one cannot determine the value to be committed, but only obtain two submitted values v0 and v1. Then, we store vi into C[g] (i is the ID of the simulator process) and v1−i into C[n]. The implication of this scheme is to “assume” vi is the committed value and regard v1−i as a Byzantine behavior. If there is no uncommitted slot, one does not have to use the Byzantine behavior for conflict resolution of uncommitted slot, and thus an arbitrary location can be given to Byzantine robot rn. In our simulation, a “helping” location, which is m(C), is given. The getview subroutine also returns a flag q, which returns TRUE if all slots of E′[u −n..u −1] are committed. This information is used to determine whether the simulator process can decide a value or not. After the construction of the observation result C, if q = TRUE and the constructed configuration is legitimate. pi decides a value decoded from m(C). Note that this decode function cannot be defined as decode((0, 0)) = 0 and decode(v) = 1 for all other v. Even if all correct robots are initially placed on a common point v, the point of gathering is not necessarily v because we consider non-oblivious robots. The way of defining function decode is argued in the following correctness proof. 3.3 Outline of the Correctness Proof We informally show how and why our simulation algorithm correctly solves the consensus. We first introduce several notations: Each slot consisting in the array E is identified by its index. We say that a process pi enters a slot j (or finishes j −1) at t if it takes j-th snapshot at t. The time when pi enters slot j is denoted by ti j. Let c(j) be the process ID submitting the committed value of slot E[j] (say “pc(j) commits E[j]” or “pc(j) is committer of E[j]” in what follows), and Ci j be the observation result that pi obtains at the j-th main loop. We define α(j) = j mod n for short (i.e., α(j) is the ID of the robot to be activated at the j-th main loop). We also introduce swap operator πk. For a given configuration C, we define πkC to be the configuration obtained by swapping two entries C[k] and C[n]. By the definition, πnC = C clearly holds. Intuitively, the role of swap operators is to correct “misunderstanding” of uncertain slots. An example can be shown as follows: Let t be the time when the committer p0 of slot j takes j-th snapshot E′. Assume a slot g is uncommitted in E′ and p1 commits both slots g and j +1. Letting (x0, x1) be two values submitted to g, since g is uncommitted in E′, the constructed observation result C0 j satisfies C0 j [α(g)] = x0 and C0 j [n] = x1. On the other hand, since g is committed at the construction of C1 j , C1 j [α(g)] = x1 holds. In this case, we cannot have the execution connecting C0 j 7 Algorithm 1 ConsensusToGathering: Reduction from Consensus to Byzantine Gathering 1: E[0..∞] of slot (shared objects) 2: procedure getviewi(j): 3: q ←TRUE; E′ ←snapshot(E) 4: for l ←0 to n −1 do 5: (v0, v1, s) ←E′[l + j −n].readi() 6: if s ̸= ⊥then /∗when s is committed ∗/ 7: C[l] ←vs 8: else /∗when s is uncommitted ∗/ 9: C[l] ←vi; C[n] ←v1−i; q ←FALSE 10: endif 11: endfor 12: if all slots in E′[j −n, j −1] are committed then 13: C[n] ←m(C) 14: endif 15: return(q, C) 16: endprocedure 17: when proposei(v) : 18: for u ←0 to n −1 do /∗Construction of initial configuration ∗/ 19: E[u].submiti((v, 0), INITu)) /∗INITu is the initial state of ru ∗/ 20: endfor 21: u ←n 22: loop 23: (q, C) ←getviewi(u) 24: if q = TRUE and C is legitimate then 25: decidei(decode(m(C))) and exit 26: endif 27: E[u].submiti(move(A(u mod n), C, r(u mod n), )) ; u ←u + 1 28: endloop and C1 j+1, but the connection between πα(g)C0 j and C1 j+1 is possible. We describe C x −→C′ if the activation of Byzantine robot rn followed by that of rx makes C reach C′. Then, it is assumed that the activation of Byzantine robot rn provides the best case movement. That is, C x −→C′ implies that C can reach C′ if the Byzantine robot appropriately moves after the activation of rx. The intended (but not attained) principle of our simulation is that one can organize the simulated execution E = πγnCc(n) n α(n) −→πγn+1Cc(n) n+1 α(n+1) −→ · · · α(j−1) −→ πγjCc(j) j α(j) −→πγj+1Cc(j+1) j+1 , · · · for an appropriate sequence γn, γn+1, γn+2 · · · . Unfortunately, that intention is broken in some critical case, which is explained below: Consider the situation where some process pi starts the (j + n)-th loop before the commitment of slot j. In this situation, pi has to make rα(j+n) move in spite of the uncertainty of its location (because E[j] is not committed yet and thus there are two possibilities x0 and x1 of rα(j)’s current local state). Then, pi chooses xi as if E[j] already committed with value xi. However, if E[j] is actually committed with the value x1−i by the other process p1−i, the inconsistency arises: We cannot construct a single execution that reflects two committed values of slots j and j + n. To achieve the consistency in the above scenario, we need to correct the committers of j and j + n as if they are committed by the same value. That scenario and the correction scheme is formalized by the notions of critical slots and validators, which are defined as follows: Definition 2 Let E = [n + 1, n + l] be a finite-length sequence of slots. A slot j is critical in E if it is uncommitted at tc(j) j+n in the (j + n)-th snapshot taken by pc(j) and c(j) ̸= c(j + n) holds. 8 Definition 3 Let E = [n + 1, n + l] be a finite-length sequence of slots. The validator pval(j) of slot j in E is defined as, pval(j) =  pval(j+n), if j is critical and j ≤l pc(j), otherwise Note that the criticality and validator of each slot is determined for a fixed finite-length E. Thus, if we consider a longer sequence E′ obtained by adding a postfix sequence into E, those can change because the criticality and the validators of last n slots [j−n+1, j] depends on the following n slots [j + 1, j + n]. Intuitively validators are the processes whose observation results constitute the simulated execution. Actually, the simulated configuration corresponding to each slot is defined as follows: Definition 4 Given a finite-length sequence E of slots, the simulated configuration Cj of slot j for E is defined as follows: • Cj = Cval(j) j if no slot in [j −n, j −1] is uncommitted at tval(j) j . • If a slot k ∈[j −n, j −1] is uncommitted at tval(j) j , Cj = πγCval(j) j for appropriate γ (∈ {α(k), n}) such that πγCval(j) j [α(k)] = vval(j) k holds. The key lemma of our reduction scheme is the sequence of simulated configurations (say simu- lated execution) constitutes a possible execution. Lemma 1 Given a finite-length sequence of slots E and any j that is smaller than the length of E, Cj α(j) −→Cj+1 holds. The above lemma implies that there exists an execution Cn, Cn+1, Cn+2, · · · under the (n −1)- bounded centralized scheduler. Informally, the uniform agreement and termination properties are deduced from this lemma and the correctness of the gathering algorithm. However, the validity must be considered more carefully. An important notice is that the validity property is strongly related to the way of defining function decode. In the rest of this subsection, we state the appropriate definition of function decode guaranteeing the validity of ConsensusToGathering. Let us consider the situation where both p0 and p1 propose the same value (assume zero). Then all robots are placed on (0, 0) initially in the simulation. As we mentioned in the previous section, however, it does not implies that all robots are gathered at (0, 0) because they are non- oblivious. Let C be the configuration where all robots are placed on (0, 0). To guarantee the validity, we need to decode the point of gathering in any simulated execution starting from C to zero. Fortunately since p0 and p1 has a common proposal, it is ensured that the simulated execution of A is uniquely determined: They submit the same value to each slot in [0..n−1] From the common value commitment property of Slot objects, any slot in [0..n −1] is immediately committed when at least one process finishes it. Thus, when a process enters slot n, all slots of [0..n −1] has been committed. That is, the configurations constructed at slot n are the same among p0 and p1, and thus the submissions of p0 and p1 at slot n are also the same. Inductively we can conclude that the submission values of two processes to any slot are the same. That is, the simulated execution (and thus the point of gathering) is uniquely determined from the initial configuration. Let x be the point of gathering corresponding to C. Provided decode(v) as the function returning zero if v = x and one otherwise, we can guarantee that the algorithm decides zero if all processes propose zero. For the case that all processes propose one, we need to show that the gathering is never achieved at x. It can be proved as follows: Let C′ be the configuration where all robots are placed on (1, 0). By the same reason as the case of all proposing zero, the simulated execution starting from C′ is also uniquely determined. Furthermore, its activation schedule is completely same as the case of all proposing zero. Since each robot does not aware of global coordinates, it follows that the robot is gathered at x + (1, 0) in the simulated execution starting from C′. The above argument clearly provides the validity of the consensus, and thus the following theorem is obtained. 9 Theorem 2 The algorithm ConsensusToGathering correctly solves the consensus problem, and thus there exists no gathering algorithm tolerating up to one Byzantine fault even if we assume agreed direction of local coordinate systems, instantaneous movements, n-bounded centralized scheduler, and non-oblivious and non-uniform robots. 4 General Formation While the algorithm ConsensusToGathering is constructed for leading the impossibility of Byzantine gathering, it is easy to use its scheme for obtaining the impossibility of a more general class of formation problems. We first formally define the general formation problem. A Byzantine formation problem on n+f robots is defined by a family F of multisets of locations with cardinality (n + f). An algorithm B solves the Byzantine formation problem F if in any execution of B all correct robots eventually form and keep the location set that is a subset of an element in F. Clearly, it is not possible to show the impossibility of any formation F. For example, if F = (R × R)n+f (i.e., any multiset of n + f locations belongs to F), F can be solved trivially. In the following argument, we consider the family of patterns to which we can apply our reduction technique, and explain how we apply it. We only consider the case of f = 1. We define a 1-neighborhood relation between two location configurations P and P ′, which holds if and only if |P ∩P ′| ≥n. The transitive closure of 1- neighborhood relation is denoted by ∼. Given a formation problem F, we define its 1-neighborhood extension F1 = {P ′|∃P ∈F, P ′ ∼P}. Since the relation ∼is an equivalence relation, we can define an equivalent class over F1, which is denoted by [F1]. Given P = {v0, v1, · · · , vn+1}, we define P + x = {v0 + x, v1 + x, · · · , vn+1 + x}. We first define the formation problems we can handle in our reduction algorithm. Definition 5 A formation problem F is said to be bivalent if there exists xP for any P ∈F such that P and P + xP belong to different classes in [F1]. It can be shown that many well-known pattern formation problems (circle, line, and so on) are bivalent. We present several examples in the appendix. We introduce the modification of the algorithm ConsensusToGathering to lead the impossibility of bivalent pattern formation problems. The framework is completely same as the reduction to gathering. Each simulator process first tries to place all robots on some coordinates according to its proposal, and run the simulation. Finally, the process decodes a decision value when the simulation reaches a legitimate configuration. The points to be addressed are (i) the definition of functions M(C) and m(C), and (ii) the locations of robots initially placed and the definition of function decode. We explain the modification of the simulation algorithm for those points: Defining M(C) and m(C) The function M(C) is defined as M(C) = maxP ∈F |L(C) ∩P|. Let P ′ be the pattern in F maximizing |L ∩P| (if two or more patterns in F maximize it, an arbitrary one is deterministically chosen). We define m(C) as a coordinate in P ′ \ L, which is also chosen deterministically if |P ′ \ L| > 1. Initial location and decoding function decode For the proposal zero, we define the initial location configuration of n robots ((0, 0), (1, 0), (2, 0), · · · , (n−1, 0)). That is, the process proposing zero submits value ((i, 0), INITi) to slot i (INITi is the initial local state of robot ri). By the same argument as the case of gathering, for that initial configuration, we can uniquely determine the legitimate configuration C that the simulated execution eventually reaches. From the definition of bivalent formation problems, there exists a vector x such that L(C) + x belongs to a class of [F1] different from what L(C) belongs to. We define the initial location configuration for proposal one as ((0, 0) + x, (1, 0) + x, (2, 0) + x, · · · , (n −1, 0)). We further define decode as the function from a (legitimate) configuration to {0, 1}. It returns zero if the given configuration belongs to a class of F1 where L belongs, and one otherwise. 10 We can prove similarly as Theorem 2 that the modified algorithm correctly solves the consensus. Consequently the following theorem is obtained. Theorem 3 Any bivalent formation problem is unsolvable in the system with f = 1 even if we assume a common orientation of local coordinate systems, instantaneous movements, n-bounded centralized scheduler, and non-oblivious and non-uniform robots. References [1] N. Agmon and D. Peleg. Fault-tolerant gathering algorithms for autonomous mobile robots. SIAM J. Comput., 36(1):56–82, 2006. [2] H. Ando, Y. Oasa, I. Suzuki, and M. Yamashita. Distributed memoryless point convergence al- gorithm for mobile robots with limited visibility. Robotics and Automation, IEEE Transactions on, 15(5):818–828, 1999. [3] E. Borowsky and E. Gafni. Generalized FLP impossibility result for t-resilient asynchronous computations. In Proceedings of the twenty-fifth annual ACM symposium on Theory of com- puting, pages 91–100. ACM, 1993. [4] E. Borowsky, E. Gafni, N. A. Lynch, and S. Rajsbaum. The BG distributed simulation algorithm. Distributed Computing, 14(3), 2001. [5] Z. Bouzid, S. Dolev, M. Potop-Butucaru, and S. Tixeuil. Robocast: Asynchronous communi- cation in robot networks. In Proceedings of OPODIS 2010, Lecture Notes in Computer Science, Tozeur, Tunisia, December 2010. Springer Berlin / Heidelberg. [6] Z. Bouzid, M. Potop-Butucaru, and S. Tixeuil. Byzantine convergence in robots networks: The price of asynchrony. CoRR, December 2009. [7] Z. Bouzid, M. G. Potop-Butucaru, and S. Tixeuil. Optimal byzantine-resilient convergence in uni-dimensional robot networks. Theoretical Computer Science, 2010. to appear. [8] R. Cohen and D. Peleg. Convergence of autonomous mobile robots with inaccurate sensors and movements. SIAM J. Comput., 38(1):276–302, 2008. [9] S. Das, P. Flocchini, N. Santoro, and M. Yamashita. On the computational power of oblivious robots: Forming a series of geometric patterns. In PODC, 2010. to appear. [10] X. Defago, M. Gradinariu, S. Messika, and P. Parvedy. Fault-tolerant and self-stabilizing mo- bile robots gathering. DISC06, the 20th International Conference on Distributed Computing. LNCS, 3274:46–60, 2006. [11] M. Fischer, N. Lynch, and M. Paterson. Impossibility of distributed consensus with one faulty process. Journal of the ACM (JACM), 32(2):374–382, 1985. [12] P. Flocchini, G. Prencipe, N. Santoro, and P. Widmayer. Gathering of asynchronous robots with limited visibility. Theor. Comput. Sci., 337(1-3):147–168, 2005. [13] E. Gafni. The extended BG-simulation and the characterization of t-resiliency. In STOC, pages 85–92, 2009. [14] E. Gafni, R. Guerraoui, and B. Pochon. From a static impossibility to an adaptive lower bound: the complexity of early deciding set agreement. In STOC, pages 714–722, 2005. [15] N. Inuzuka, Y. Tomida, T. Izumi, Y. Katayama, and K. Wada. Gathering problem of two asynchronous mobile robots with semi-dynamic compasses. In A. A. Shvartsman and P. Felber, editors, SIROCCO, volume 5058 of Lecture Notes in Computer Science, pages 5–19. Springer, 2008. 11 [16] T. Izumi, Y. Katayama, N. Inuzuka, and K. Wada. Gathering autonomous mobile robots with dynamic compasses: An optimal result. In Proc. of 21st International Symposium on Distributed Computing (DISC), volume 4731 of LNCS, pages 298–312, 2007. [17] M. C. Loui and H. H. Abu-Amara. Memory requirements for agreement among unreliable asynchronous processes. [18] G. Prencipe. On the feasibility of gathering by autonomous mobile robots. In A. Pelc and M. Raynal, editors, Proc. Structural Information and Communication Complexity, 12th Intl Coll., SIROCCO 2005, volume 3499 of LNCS, pages 246–261, Mont Saint-Michel, France, May 2005. Springer. [19] S. Souissi, X. D´efago, and M. Yamashita. Using eventually consistent compasses to gather oblivious mobile robots with limited visibility. In A. K. Datta and M. Gradinariu, editors, SSS, volume 4280 of Lecture Notes in Computer Science, pages 484–500. Springer, 2006. [20] I. Suzuki and M. Yamashita. Distributed anonymous mobile robots: Formation of geometric patterns. SIAM Journal of Computing, 28(4):1347–1363, 1999. [21] K. Yamamoto, T. Izumi, Y. Katayama, N. Inuzuka, and K. Wada. Convergence of mobile robots with uniformly-inaccurate sensors. In S. Kutten and J. Zerovnik, editors, SIROCCO, volume 5869 of Lecture Notes in Computer Science, pages 309–322. Springer, 2009. 12 A Correctness Proof of Lemma 1 In the following argument, we use the notation tj = tval(j) j and vj = vval(j) j for short. We first show two lemmas that are used in the main proof: Lemma 2 For any j, Cj+1[α(j)] = vj holds. Proof This trivially holds from the definition of validators and simulated configurations. ✷ Lemma 3 tj < tj+1. Proof Suppose for contradiction that tj > tj+1 holds. Then pval(j) ̸= pval(j+1) clearly holds and thus pval(j+1) finishes slot j before p(1−val(j+1)) enters j. It implies that pval(j) is not the committer of j and thus j is critical. However, to make j critical, pval(j) must enter j + n at tj+1 or earlier because j has been committed at tj+1 or earlier, which contradicts tj > tj+1. ✷ By using these lemmas, we prove Lemma 1. Proof From Lemma 2, it suffices to show that Cj[x] = Cj+1[x] holds for any x ∈[0, n]\{α(j), n}. Since Cj[α(k)] = Cj+1[α(k)] holds if slot k has the same status at tj and tj+1, only the scenario we have to consider is that the status of some slot k ∈[j −n + 1, j −1] changes from uncommitted to committed between tj and tj+1 (recall tj < tj+1 from Lemma 3). We show that Cj[α(k)] = Cj+1[α(k)] holds in this scenario, which is sufficient to prove the lemma. Suppose for contradiction that Cj[α(k)] ̸= Cj+1[α(k)]. From the definition of simulated configurations, we have Cj[α(k)] = vval(k) k and Cj+1[α(k)] = vc(k) k . Thus, val(k) ̸= c(k), which implies that k is critical. Then pval(k) must stay slot k until p1−val(k) enter k + n(> j + 1). It however contradicts the fact k is committed at tj+1 because tj+1 is the time when p1−val(k) commits j + 1. ✷ B Proof of Theorem 2 The theorem is proved by showing that the algorithm ConsensusToGathering guarantees the uniform agreement, termination, We say that a simulated configuration C is semi-legitimate if there exists γ ∈[0, n −1] such that πγC is legitimate. Note that any legitimate configuration is semi-legitimate because of πγnC = C. The following lemma takes an important role in the following proof. Lemma 4 Let A be an an arbitrary Byzantine gathering algorithm tolerating up to one fault, and E = C′ 0, C′ 1, C′ 2, · · · C′ j be an arbitrary execution of A such that C′ 0 is semi-legitimate and rn(C′ k) = m(C′ k) or rn(C′ k−1) holds for any k (1 ≤k ≤j). Then, for any configuration C′ h in E, M(C′ h) ≥n and m(C′ 0) = m(C′ h) hold. Proof We show that M(C′ 1) ≥n and m(C′ 0) = m(C′ 1) holds. About the following configurations C′ 2, C′ 3 · · · , we can inductively apply the same argument as C′ 1. If all correct robots are located on m(C′ 0) at C′ 0, C′ 0 is already legitimate and the lemma clearly holds. Otherwise, we have rn(C′ 0) = m(C′ 0) and M(C′ 0) = n. We show that any robot on m(C′ 0) never moves during the transition from C′ 0 to C′ 1. Let rγ be the robot not on m(C′ 0) at C′ 0. Since C′ 0 is semi-legitimate, the configuration πγC′ 0 is a legitimate configuration. Then the robots on m(C′ 0) cannot distinguish C′ 0 and πγC′ 0, and thus they never change their positions. Since we assume that rn(C′ 1) = m(C′ 1)(= rn(C′ 0)), we can conclude all robots on m(C′ 0) keep their positions at C′ 1. The lemma is proved. ✷ Lemma 5 (Uniform Agreement) If p0 and p1 decide, their decision values are same. Proof Without loss of generality, we assume that p0 decides at a slot earlier than or equal to p1’s . Let j and j + h be the slots where p0 and p1 decide respectively. Since p0 exits at the beginning of slot j, all slots [j, j + h] are solely committed by p1. From the definition, those slots 13 are not critical. It follows that m(C1 k) = m(Ck) holds for any k ∈[j, j + h]. In addition, we can obtain m(C1 j ) = m(Cj) because all slots of [j −n, j −1] are committed at the construction of C1 j (from the definition of simulate configuration Cj, each entry Cj[x] for any x ∈[0, n] is the committed value of the corresponding slot in [j −n, j −1]). Assume that Cj is semi-legitimate and rn(Ck) = m(Ck) or rn(Ck−1) holds for any k ∈[j + 1, j + h]. Then, from Lemma 4, we can conclude m(C0 j ) = m(Cj) = m(Cj+h) = m(C1 j+h) and thus the lemma holds. The rest of the proof is to show that those assumptions hold. We first show that the first one holds: Since C0 j is legitimate and all slots of [j −n, j −1] are committed at t0 j, C1 j is legitimate if those slots are already committed at t1 j. Otherwise, letting l be the slot in [j−n, j−1] uncommitted at t1 j, πlC1 j or C1 j is legitimate, which implies that C1 j is semi-legitimate. Next we look at the second assumption. We give the proof for the case of k = j + 1. For any following slot k > j + 1, we can inductively prove the assumption in the same way as that case. Consider the following two cases: 1) If all slots in [k −n, k −1] are committed at t1 k, we obviously have rn(C1 k) = m(C1 k). 2)A slot l ∈[k −n, k −1] is uncommitted at t1 k, l is uncommitted during [t1 j, t1 k] because any slot processed after t1 j is immediately committed when p1 finishes it. This implies that the status of l is the same at t1 k and t1 k−1 and thus rn(C1 k) = rn(C1 k−1) holds. The lemma is proved. ✷ Lemma 6 (Termination) Each process pi eventually decides unless it crashes. Proof We first show that at least one of p0 and p1 eventually decides. Lemma 1 implies that we can have an admissible execution E = C0, C1, · · · Cj for sufficiently large j where the last n slots are eventually committed (that is, no process crashes during the processing of those slots) and the simulated configurations Cj−n+1, Cj−n+2, · · · , Cj corresponding to them are converged to a legitimate one. Let m be the point of gathering, that is, m = m(Cj−n+1) = m(Cj−n+2) =, · · · = m(Cj). From the definition of simulated executions the last n configurations are the observation results by the committer of each slot. Since Ck for any k ∈[j −n+1, j] is legitimate, its committed value is m. Let pi be the process such that no process enters j + 1 after pi does. Since all slots in [j −n + 1, j] have been committed with m when pi enters j + 1, pi decides at j + 1. The remaining part of the proof is to show that the decision of pi implies that of p1−i. Since pi exits the algorithm at the beginning of j + 1, its behavior from the viewpoint of p1−i is equivalent to the crash at j + 1. If pi crashes, p1−i necessarily decides because we have already proved that at least one process eventually decides. Consequently, we can conclude that p1−i eventually decides after the decision of pi. ✷ C Examples of Bivalent Formation Problems We show that two well-known formation problems, circle and line, belongs to the class of bivalent formation problems. Example 1 The circle formation is the problem requiring that all robots are placed on different locations on the boundary of a common circle7. The specification Fcircle of this problem can be stated as follows: Fcircle = {{v0, v1, · · · vn+f}|∀vi, vj : vi ̸= vj ∧∃c, r ∈R : ∀vi : |vi −c| = r}. Example 2 The line formation is the problem requiring that all robots are placed on different locations on a common line, which can be specified as Fline = {{v0, v1, · · · vn+f}|∀vi, vj : vi ̸= vj ∧∃a2, a3, · · · , an+f ∈R : ∀i ∈[2, n + f] : vi −v0 = ai(v1 −v0)}. Theorem 4 If n + 1 > 4, the circle formation and the line formation are bivalent. 7Exactly, we consider the non-uniform circle formation problem. A stronger variant is uniform circle formation, which must guarantees that all robots are placed evenly on the boundary of a common circle. 14 Proof We only show the proof for the circle formation because the bivalency of the line formation can be proved in the same way as the circle. From the definition of the circle formation problem, we can associate the circle containing at least n robots to each pattern P ∈F1 circle, which are denoted by cir(P). Let P be an arbitrary pattern in Fcircle. To prove the theorem, it suffices to show that there exists a vector x such that P ′ = P + x satisfies P ′ ̸∼P. Suppose for contradiction that P ∼P ′ holds for any x. Since P ∼P ′ holds, we have a chain P = P0 ∼P1 ∼P2 · · · ∼Pk = P ′ where Pi ∈F1 circle and |Pi ∩Pi+1| ≥n hold for any i (0 ≤i ≤k). Since cir(P0) ̸= cir(Pk) clearly holds, there necessarily exists h satisfying cir(Ph) ̸= cir(Ph+1). However, it contradicts the fact that |Ph ∩Ph+1| ≥n > 3 because at most three robots can be placed on the intersection of cir(Ph) and cir(Ph+1) in Ph and Ph+1 (recall that the circle formation requires that all correct robots must be located on different positions in legitimate configurations). ✷ We further present a formation problem that is not bivalent. Example 3 The 2-gathering is the problem requiring that all robots are placed on at most two locations. It is specified as F2gat = {v0, v1, · · · vn+f|∃x0, x1 : ∀i ∈[0, n + f] : vi = x0 ∨vi = x1}. Theorem 5 The 2-gathering problem is not bivalent. Proof We show the theorem by showing that [F2gat] consists of a single class. That is, for any two patterns P, P ′ ∈F2gat, we prove P ∼P ′. Let {p0, p1}, and {p′ 0, p′ 1} be the set of locations constituting P and P ′ respectively. Taking two patterns Q and Q′ in F2gat where all robots are placed in p0 and p′ 0, we can easily show that P ∼Q ∼Q′ ∼P ′ holds: One-by-one replacement of all robots at p1 to p0 transforms P into Q, which implies P ∼Q. The relations Q ∼Q′ and Q′ ∼P can be obtained similarly. Consequently, we have P ∼P ′. ✷ Because of the above theorem, we cannot prove the impossibility of the 2-gathering problem from our reduction. We conjecture that the 2-gathering is solvable if we assume that f = 1 and the agreement of the orientations of local coordinate systems. 15