Skip to main content
Log in

The K-observer problem in computer networks

  • Research Article
  • Published:
Networking Science

Abstract

For any non-negative integer K, a K-observer P of a network N is a set of nodes in N such that each message, that travels at least K hops in N, is guaranteed to reach (and so can be observed by) at least one node in P. A K-observer P of a network N is minimum iff the number of nodes in P is no more than the number of nodes in every K-observer of N. The nodes in a minimum K-observer of a network N can be used to monitor the message traffic in network N and collect traffic statistics, detect patterns of denial-of-service attacks when they occur in N, and act as firewalls to identify and discard attack messages from network N. In this paper, we consider the problem of constructing a minimum K-observer for any given network. We show that the problem is NP hard for general networks, and give linear time algorithms for constructing minimum or near-minimum K-observers for special classes of networks: trees, rings, L-rings, and large grids.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. H. B. Acharya, A. Joshi, and M. G. Gouda, “Firewall modules and modular firewalls,” in Proc. 18th IEEE Int. Conf. Network Protocols (ICNP), Kyoto, Japan, 2010, pp. 174–182.

  2. K. M. Alzoubi, P.-J. Wan, and O. Frieder, “Message-optimal connected dominating sets in mobile ad hoc networks,” in Proc. 3rd ACM Int. Symp. Mobile Ad Hoc Networking & Computing, Lausanne, Switzerland, 2002, pp. 157–164.

  3. B. Armbruster, J. C. Smith, and K. Park, “A packet filter placement problem with application to defense against spoofed denial of service attacks,” Eur. J. Oper. Res., vol. 176, no. 2, pp. 1283–1292, Jan. 2007.

    Article  MATH  Google Scholar 

  4. L. Breslau, I. Diakonikolas, N. Duffield, Y. Gu, M. Hajiaghayi, D. S. Johnson, H. Karloff, M. Resende, and S. Sen, “Disjoint-path facility location: Theory and practice,” in Proc. 13th Workshop Algorithm Engineering and Experiments (ALENEX), San Francisco, USA, 2011, pp. 60–74

  5. K. Calvert, M. B. Doar, A. Nexion, and E. W. Zegura, “Modeling internet topology,” IEEE Commun. Mag., vol. 35, no. 6, pp. 160–163, Jun. 1997.

    Article  Google Scholar 

  6. B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris, “Span: an energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks,” Wireless Netw., vol. 8, no. 5, pp. 481–494, Sept. 2002.

    Article  MATH  Google Scholar 

  7. V. Chvátal, “A combinatorial theorem in plane geometry,” J. Comb. Theory B, vol. 18, no. 1, pp. 39–41, Feb. 1975.

    Article  MATH  Google Scholar 

  8. M. Faloutsos, P. Faloutsos, and C. Faloutsos, “On power-law relationships of the internet topology,” in Proc. Conf. Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM), Cambridge, USA, 1999, pp. 251–262.

  9. M. R. Garey and D. S. Johnson, Computers and Intractability; A Guide to the Theory of NP-Completeness. New York: W. H. Freeman, 1990.

    Google Scholar 

  10. S. Meguerdichian, F. Koushanfar, M. Potkonjak, and M. B. Srivastava, “Coverage problems in wireless ad-hoc sensor networks,” in Proc. IEEE INFOCOM, Anchorage, USA, 2001, vol. 3, pp. 1380–1387.

    Google Scholar 

  11. L. Qiu, V. N. Padmanabhan, and G. M. Voelker, “On the placement of web server replicas,” in Proc. IEEE INFOCOM, Anchorage, USA, 2001, vol. 3, pp. 1587–1596.

  12. T. Qiu, L. Ji, D. Pei, J. Wang, and J. Xu, “Towerdefense: Deployment strategies for battling against ip prefix hijacking,” in Proc. 18th IEEE Int. Conf. Network Protocols (ICNP), Kyoto, Japan, 2010, pp. 134–143.

  13. J. Wu and H. Li, “On calculating connected dominating set for efficient routing in ad hoc wireless networks,” in Proc. 3rd Int. Workshop Discrete Algorithms and Methods for Mobile Computing and Communications (DIALM), Seattle, USA, 1999, pp. 7–14.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hrishikesh B. Acharya.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Acharya, H.B., Choi, T., Bazzi, R.A. et al. The K-observer problem in computer networks. Netw.Sci. 1, 15–22 (2012). https://doi.org/10.1007/s13119-011-0002-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13119-011-0002-7

Keywords

Navigation