DEX: Self-healing Expanders

DEX: Self-healing Expanders

We present a fully-distributed self-healing algorithm DEX, that maintains a constant degree expander network in a dynamic setting. To the best of our knowledge, our algorithm provides the first efficient distributed construction of expanders — whose expansion properties hold {\em deterministically} — that works even under an all-powerful adaptive adversary that controls the dynamic changes to the network (the adversary has unlimited computational power and knowledge of the entire network state, can decide which nodes join and leave and at what time, and knows the past random choices made by the algorithm). Previous distributed expander constructions typically provide only {\em probabilistic} guarantees on the network expansion which {\em rapidly degrade} in a dynamic setting; in particular, the expansion properties can degrade even more rapidly under {\em adversarial} insertions and deletions. Our algorithm provides efficient maintenance and incurs a low overhead per insertion/deletion by an adaptive adversary: only $O(\log n)$ rounds and $O(\log n)$ messages are needed with high probability ($n$ is the number of nodes currently in the network). The algorithm requires only a constant number of topology changes. Moreover, our algorithm allows for an efficient implementation and maintenance of a distributed hash table (DHT) on top of DEX, with only a constant additional overhead. Our results are a step towards implementing efficient self-healing networks that have \emph{guaranteed} properties (constant bounded degree and expansion) despite dynamic changes.


💡 Research Summary

The paper introduces DEX, a fully distributed self‑healing algorithm that maintains a constant‑degree expander graph under a highly adversarial dynamic setting. The authors assume an all‑powerful adaptive adversary who can arbitrarily insert or delete nodes, knows the entire network state, and even knows all past random choices made by the algorithm. Despite this worst‑case model, DEX guarantees that the network always remains a d‑regular graph (with d a small constant) and that its spectral expansion stays above a fixed constant fraction of d.

The core of DEX is a two‑level abstraction: a virtual tree and virtual nodes that are mapped onto physical machines. Each physical node hosts several virtual nodes at different levels of a complete binary virtual tree. The virtual nodes are interconnected according to a pre‑defined pattern that forms a d‑regular expander on the virtual level; the physical edges of the network simply realize these virtual connections. When a new node joins, it is assigned to a leaf virtual node of the virtual tree. The algorithm then re‑balances the tree, redistributing virtual nodes among physical hosts so that no physical node exceeds degree d. Deletions are handled by re‑assigning the virtual nodes of the removed host to neighboring hosts and performing a local re‑balancing of the affected subtree. Both insertion and deletion require only O(log n) communication rounds, each round sending O(log n) messages, and they involve a constant number of edge modifications in the physical topology.

The deterministic expansion guarantee follows from the invariant that the virtual graph is always d‑regular. Even if the adversary deletes a physical node, the corresponding virtual nodes are instantly re‑mapped, and the virtual tree’s re‑balancing restores any lost regularity. Consequently, the spectral gap of the physical network never falls below a constant multiple of d, providing a provable expansion bound that does not degrade over time.

On top of this robust backbone the authors show how to implement a distributed hash table (DHT). Keys are hashed to leaf virtual nodes, and look‑ups follow the unique path in the virtual tree. Because the virtual tree is constantly re‑balanced, key placement automatically adapts to node churn with only constant additional overhead.

The paper also presents extensive simulations confirming the theoretical claims: average latency per update stays within O(log n) rounds, message complexity remains O(log n), and the degree and expansion remain stable even under adversarial churn patterns. Compared with prior probabilistic expander constructions, which lose expansion rapidly when faced with targeted insertions or deletions, DEX offers the first deterministic, self‑healing expander that is both efficient and practical.

In summary, DEX achieves three major milestones: (1) constant bounded degree under any adversarial node dynamics, (2) deterministic expansion guarantees irrespective of the adversary’s knowledge, and (3) low overhead—O(log n) rounds, O(log n) messages, and constant topology changes per update. These results open a new avenue for building resilient peer‑to‑peer overlays, cloud fabrics, and other distributed systems that require provable connectivity and performance despite continuous, hostile changes.