Next Article in Journal
Assessing the Potential of LPWAN Communication Technologies for Near Real-Time Leak Detection in Water Distribution Systems
Next Article in Special Issue
Indoor Path-Planning Algorithm for UAV-Based Contact Inspection
Previous Article in Journal
Urban Green Infrastructure Monitoring Using Remote Sensing from Integrated Visible and Thermal Infrared Cameras Mounted on a Moving Vehicle
Previous Article in Special Issue
A Robust Reactive Static Obstacle Avoidance System for Surface Marine Vehicles
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Autonomous Navigation of a Team of Unmanned Surface Vehicles for Intercepting Intruders on a Region Boundary

1
School of Electrical Engineering and Industrial Automation, Engineering Institute of Technology, Wellington St, West Perth, WA 6005, Australia
2
School of Electrical Engineering and Telecommunications, The University of New South Wales, Sydney, NSW 2052, Australia
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(1), 297; https://doi.org/10.3390/s21010297
Submission received: 23 November 2020 / Revised: 21 December 2020 / Accepted: 1 January 2021 / Published: 4 January 2021

Abstract

:
We study problems of intercepting single and multiple invasive intruders on a boundary of a planar region by employing a team of autonomous unmanned surface vehicles. First, the problem of intercepting a single intruder has been studied and then the proposed strategy has been applied to intercepting multiple intruders on the region boundary. Based on the proposed decentralised motion control algorithm and decision making strategy, each autonomous vehicle intercepts any intruder, which tends to leave the region by detecting the most vulnerable point of the boundary. An efficient and simple mathematical rules based control algorithm for navigating the autonomous vehicles on the boundary of the see region is developed. The proposed algorithm is computationally simple and easily implementable in real life intruder interception applications. In this paper, we obtain necessary and sufficient conditions for the existence of a real-time solution to the considered problem of intruder interception. The effectiveness of the proposed method is confirmed by computer simulations with both single and multiple intruders.

1. Introduction

The variety of real-time applications of multi-robot teams has been dramatically increasing due to the rapid development in robotics technology. Therefore, the use of autonomous mobile robots has been increased significantly in real-time applications such as border surveillance, patrolling and monitoring. Navigation and control of a multi-robot team for patrolling the border of a region is a fundamental problem of multi-agent robotics [1,2,3,4]. The coverage control approach is known as the most prevalent method to protect an environment from unwanted intruders where both the problems of sweep and barrier coverage control are studied. In the barrier coverage strategy, a mobile robotic network with sensing capability is deployed to form a barrier of static sensors. Each robot of the team detects any unwanted intrusion that occurs by an intruder on the boundary of the region [5,6]. On the other hand, the sweeping coverage is a strategy for a multi robot team which sweeps along the border of a protected region. Therefore, in any time t, some robots detect every point in some neighbourhood of the boundary [7,8].
In this study, we consider a planar region where each agent of a multi-robot team has to move along the border of the region to protect the most vulnerable point of the boundary. The navigation strategy is decentralised, as the only available information for each robot is the coordinates of its current position and the coordinates of the current positions of a few of the closest team-mates, which are collected by onboard sensors; therefore, each robot navigates independently along the boundary. Such a multi-robot team is quite a typical example of a multi-agent system; see, for example [5,6,7,8,9,10,11]. Intercepting an intruder or several intruders is the objective of the team of mobile robots, in a way that at least one robot must be close to the intrusion point when the intruder is about to cross the boundary of the protected region. Moreover, in this paper we concentrate on navigation of a team of autonomous unmanned surface vehicles (USVs); see, for example [12,13]. Real life examples of the investigated problem are various asset guarding problems. In such problems, a team of autonomous USVs is responsible for guarding the asset that is threatened by hostile boats, by cooperatively patrolling the surrounding region of the asset to actively detect, identify and block any invasive intruders [14,15,16]. Guarding of the civilian harbours from unexpected terrorist attacks, which can possibly occur in the “blue border” (i.e., the sea-side), is an important example of this problem [17]. Another real life application of the problem of autonomous navigation of a team of USVs for intercepting intruders on a region boundary is protecting swimmers and surfers from shark attacks [18].
In this paper, we propose a decentralised navigation control strategy for a group of autonomous USVs with a necessary and sufficient condition, which guaranties intercepting the intruder in the boundary of the region. The decentralised navigation control strategy proposed in this paper does not require complex computations and it is easily implementable in real-time.
The remainder of the paper is organised as follows. Section 2 gives a brief survey of the existing literature in the field that is related to the topic of the current paper. The main definitions and the problem statement are formulated in Section 3. Section 4 presents the proposed autonomous navigation algorithm and its mathematical analysis. In Section 5, the validation of the proposed navigation strategy is conducted by computer simulations and illustrative examples. Finally, a brief conclusion is presented in Section 6.

2. Related Work

In this section, CP is short for Coverage Problem.Three types of coverage problems for mobile robotic sensor networks are defined in the well-known survey article by Gage [19], namely:
CP1. Barrier coverage: to achieve a static arrangement of robotic sensors that minimises the probability of undetected intrusion through the barrier; see, for example [5,6,8].
CP2. Sweep coverage: to move a number of mobile robots across a sensing field so that it addresses a specified balance between maximising the detection rate of events and minimising the number of missed detections per unit area; see, for example [6,7,8,9].
CP3. Blanket coverage: to achieve a static arrangement of robotic sensors that maximises the detection rate of targets appearing in the sensing field; see, for example [6,20].
In barrier coverage, a sensing barrier is formed by an array of mobile robots equipped with sensors so that any intrusion through the barrier is detected. Sweep coverage is achieved by moving a number of mobile robots across a sensed field to search for and detect targets in the field. Finally, the purpose of blanket coverage is to monitor a given area so that targets appearing in this area are detected by the network of mobile robots equipped with sensors.
The approach suggested in this paper can be viewed as a dynamic version of the barrier coverage problem. Unlike the static barrier coverage approach of [5,6,8] where the mobile sensors move along the boundary of a region to reach some static positions without taking into account the intruders’ motion, in the proposed approach, the autonomous robots move along the boundary always reacting to intruders’ motion. Notice that a dynamic version of the blanket coverage problem with unmanned aerial vehicles was considered in [21].
The problem with a single intruder and a single intercepting autonomous vehicle was referred to in [22] as the “Lady in the lake problem". The reactive navigation algorithm proposed in [22] is based on a pursuit-evasion game including a single intruder and a single interceptor. The case of an individual intruder and a couple of interceptors that are protecting the environment by moving on the boundary of a rectangular region was studied in [23]. Furthermore, a scenario with n intruders and n defenders was studied in [24]. A problem with several defenders and an intruder team trying to score by sending as many intruders as possible to the target was studied in [25]. In the problem of [25], the defenders cannot enter the target region but they can move outside its perimeter.
The publication [26] considered a problem of navigating a network of aerial drones along the frontier of an environmental disaster area so that they are able to monitor the faster moving segment of the frontier. A feature of the approach of [26] is that the region is moving and deforming unlike in the problems studied in [5,6,7,8]. The main application of the method of [26] is an important problem of bushfire monitoring (see, e.g., [27]) as well as the problem of oil spill monitoring and mapping [28].
In this paper, we consider the problems with several defenders and a single intruder and with several defenders and several intruders, where the defenders can move only along the region boundary. Unlike coverage control problems of [5,6,8], where the decentralised control algorithms for mobile robotic sensor networks eventually steered the mobile sensors into some uniformly distributed stationary positions or trajectories, the algorithm developed in this paper results in a quite dynamic motion of a team of autonomous USVs where the positions of the autonomous USVs always depend on the intruder’s behaviour in some time t 0 , when, the intruder becomes visible to the USVs, i.e., the planar coordinates of the intruder are known by all the team members after a certain time moment. Unlike the publications [5,6,7,8,9] where mobile ground robots were considered and [21,26] coverage problems with autonomous aerial drones were studied, this paper concentrates on a team of autonomous USVs. Navigating of autonomous USVs is an active area of research of which importance is quickly growing [29,30,31,32,33].

3. Problem Statement

The region R is considered to be a planar closed convex region that is surrounded by a smooth and a piecewise boundary. Notice that R may be unbounded. Furthermore, as shown in Figure 1, S is a segment of the region R that is located between two given points P 1 and P 2 . Based on the scenario, a moving point-wise intruder that is trapped inside the region R strives to escape the terrain through any point of the segment S ; see Figure 1. We assume that the intruder cannot cross the boundary of R outside the segment S . We define x I ( t ) as the point-wise intruder’s planar coordinates. The intruder is supposed to move arbitrarily inside the region R with a vector velocity v I ( t ) = x ˙ I ( t ) that is a time varying vector and satisfies the constraint:
v I ( t ) V I m a x t 0
where V I m a x > 0 is supposed to be constant and · represents the standard Euclidean vector norm. Also, let x I ( t ) be the planar coordinates of the intruder I at time t. Moreover, let n be an integer that satisfies n > 1 and denotes the number of autonomous USVs in the multi-USV team.
Then, the point-wise autonomous USVs are labelled as 1 , 2 , , n , and they prevent the intruder from leaving the region R through the segment S . In this scenario, the USVs are only able to move along the segment S ; however, the invasive intruder is supposed to be a multi directional moving object in the terrain. The planar coordinates of each USV 1 , 2 , , n are denoted as x 1 ( t ) , x 2 ( t ) , , x n ( t ) .
Furthermore, c ( P ) is defined as the curvilinear coordinates of any point P S , which represents the length of any sub-segment ( P , P 1 ) S .; see Figure 1. If the length of the segment S is supposed to be L, then this implies that c ( P 1 ) = 0 and c ( P 2 ) = L . We assume that at time t 0 , the curvilinear coordinate of each USV ( 1 , 2 , , n ) is represented by
( c 1 ( t ) : = c ( x 1 ( t ) ) , c 2 ( t ) : = c ( x 2 ( t ) ) , , c n ( t ) : = c ( x n ( t ) ) .
Furthermore, the team members are labelled based on their curvilinear coordinates such that:
0 c 1 ( t ) c 2 ( t ) c n ( t ) L t 0 .
Based on the requirement (2), none of the team members are allowed to change the formation order of the team on S R . Equation (3) describes the way the USVs move along segment S on the boundary.
c ˙ i ( t ) = u i ( t ) k = 1 , 2 , , n
In Equation (3), u i ( t ) represents the control input of the USV i, which should satisfy the constraint
| u i ( t ) | V R m a x t 0
where V R m a x > 0 is a given constant.
Available measurements: Any USV i , 2 i n 1 knows the curvilinear coordinates of its own c i ( t ) as well as the curvilinear coordinates c i 1 ( t ) , c i + 1 ( t ) of the USVs i 1 and i + 1 , at any time t. The USVs 1 and n know the curvilinear coordinates c 2 ( t ) , c n 1 ( t ) of the USVs 2 and n 1 , respectively. The team members detect the intruder at a time t 0 0 , which means that for t t 0 , all team members know the planar coordinates x I ( t ) of the intruder.
Notice that this assumption usually holds in asset protection problems where a high risk region containing highly significant assets has been guarded by a team of autonomous unmanned surface marine vehicles (USVs) and where a hostile boat becomes visible to the marine vehicles of the team approximately at the same time [14,15,16,17]. Such situations are also in problems where defence robots and an intruder are aerial drones; see, for example [34]. The paper does not discuss how the intruders are detected, as it concentrates on navigation issues and detection issues are beyond its scope. In practice, detection of intruders can be done using radar technology or video cameras.
Definition 1.
We consider a given positive constant ϵ > 0 . Furthermore, we suppose that the trapped intruder aims to escape the region R at time t by crossing the segment S , i.e., x I ( t ) S . Therefore, if there exists any USV i (for i = 1 , 2 , , n ), in which | c ( x I ( t ) ) c i ( t ) | ϵ , the intruder has been ϵ-intercepted by the team of autonomous USVs. The proposed navigation strategy is called ϵ-intercepting strategy, if at least one of the team members ϵ-intercepts the intruder while the intruder is about to cross the segment S through the interception point.
Escaping the region R by crossing the boundary through any interception point P S R without being ϵ -intercepted by any individual member of the team of interceptors is the main objective of the intruder.
The main objective in this paper is to derive a necessary and sufficient condition for existence of a decentralised navigation control strategy, based on available information for the team of autonomous USVs which achieves ϵ -intercepting the intruder or several intruders for any intruders’ motion. Furthermore, another objective is to develop a computationally efficient and easily implementable in real-time ϵ -intercepting strategy for the USV team.
Notice that this problem can be viewed as a problem of decentralised control of a multi-agent system; see, for example [35,36].

4. Main Techniques

4.1. Navigation Algorithm

Suppose that P S and x is a point inside the region R . Then L ( x , P ) represents a straight line segment connecting x and P. Since R is convex, L ( x , P ) is in R and P is the only intersection point of L ( x , P ) and the boundary of R . Moreover, α ( x , P ) is supposed to be the length of L ( x , P ) . Furthermore, let i be a an index such that
| c i ( t ) c ( P ) | | c j ( t ) c ( P ) | j = 1 , , n .
Then, we define the length of a sub-segment of the segment S , which denotes the distance between the current location of the closest USV i to the interception point P at time t by a variable β ( t , P ) : = | c i ( t ) c ( P ) | .
We define F ( s ) as a function from the interval [ 0 , L ] where s [ 0 , L ] is a number. Then we can say that, for any s [ 0 , L ] , F ( s ) = P S , such that c ( P ) = s .
Furthermore, we consider a subsegment [ A 1 , A 2 ] S , which is closed by points A 1 and A 2 . For i = 1 , , n , we introduce sub-segments [ S i ( t ) , S i ( t ) + ] S as follows:
S i ( t ) : = [ F ( c i 1 ( t ) + c i ( t ) 2 ) , F ( c i ( t ) ) ] i f i = 2 , , n ; S i ( t ) : = [ P 1 , F ( c i ( t ) ) ] i f i = 1 ; S i ( t ) + : = [ F ( c i ( t ) ) , F ( c i ( t ) + c i + 1 ( t ) 2 ) ] i f i = 1 , , n 1 ; S i ( t ) + : = [ F ( c i ( t ) ) , P 2 ] i f i = n .
Moreover, for i = 1 , 2 , , n , introduce the numbers M i ( t ) and M i + ( t ) as
M i ( t ) : = sup P S i ( t ) β ( t , P ) α ( x I ( t ) , P ) V R m a x V I m a x ; M i + ( t ) : = sup P S i ( t ) + β ( t , P ) α ( x I ( t ) , P ) V R m a x V I m a x .
Now the decentralised control navigation law for the autonomous USVs is proposed as follows:
u i ( t ) : = V R m a x i f M i ( t ) < M i + ( t ) u i ( t ) : = V R m a x i f M i ( t ) > M i + ( t ) u i ( t ) : = 0 i f M i ( t ) = M i + ( t )
for all i = 1 , , n .
Remark 1.
The following explanation of the navigation law (7) gives a clearer perception behind it. At time t, [ S i ( t ) , S i ( t ) + ] S , represents a set of closest points of segment S to the USV i. Depending on which of them is more “dangerous" with its maximum allowed speed at time t, the team member i drives through either the segment S i ( t ) or the segment S i ( t ) + . The term “dangerous" is applied to either of them ( S i ( t ) or S i ( t ) + ) with the maximum possible distance from the intruder to the USV i while the intruder is about to cross the segment S at interception point. The maximum possible distance between the closest interceptor of the team and the invasive intruder is described by (6).
Remark 2.
The navigation law (7) belongs to the class of sliding mode control laws where switching between two or more continuous controllers occurs; see, for example, [37,38,39].

4.2. Mathematical Analysis of the Navigation Algorithm

Theorem 1.
Suppose that the conditions (1) and (4) are satisfied for the team of autonomous USVs (3) and the intruder I. Then a decentralised ϵ-intercepting navigation strategy exists for the team of autonomous USVs if and only if:
sup P S β ( t 0 , P ) α ( x I ( t 0 ) , P ) V R m a x V I m a x ϵ
where t 0 0 represents the moment at which the interceptors see the intruder. Furthermore, if the inequality (8) holds, then the navigation law (7) is an ϵ-intercepting navigation strategy.
Remark 3.
Notice that since the region R is convex, and the segment S is compact, the supremum in (8) is achieved for some point P.
Proof of Theorem 1.
At the first stage, we consider the case that the inequality (8) does not hold, in this case we prove that the intruder can always cross the segment S without ϵ -intercepting by the team of autonomous USVs. Indeed, if (8) does not hold, then there exists a point P S such that
β ( t 0 , P ) α ( x I ( t 0 ) , P ) V R m a x V I m a x > ϵ .
Now let the intruder move along the straight line segment L ( x I ( t 0 ) , P ) connecting the points x I ( t 0 ) and P with its maximum speed V I m a x . In this case, the intruder reaches the point P at the time
t * = t 0 + | L ( x I ( t 0 ) , P ) | V I m a x .
It obviously follows from (9), that the closest USV to the point P cannot be closer to P at the time t * than ϵ . Therefore, the ϵ -neighbourhood of the point P = x I ( t * ) at the segment S cannot contain any USV at time t * . This implies that the team of autonomous USVs does not ϵ -intercept the intruder.
Then we prove that if the inequality (8) holds, the team of autonomous USVs navigated by the law (7) always ϵ -intercepts the intruder when it crosses the segment S . First, we prove the following claim. Indeed, we introduce the Lyapunov function (see, e.g., [40]) for any trajectory [ x I ( t ) , c 1 ( t ) , , c n ( t ) ] of the USV-interceptors-intruder system as follows:
W [ x I ( t ) , c 1 ( t ) , , c n ( t ) ] : = sup P S β ( t , P ) α ( x I ( t ) , P ) V R m a x V I m a x .
Notice that since the region R is convex, and the segment S is compact, the supremum in (10) is achieved for some point P. Furthermore, by definition, α ( x I ( t ) , P ) is the length of the straight segment L ( x I ( t ) , P ) connecting x I ( t ) and P. Hence, it is obvious that
α ( x I ( t ) , P ) = inf M ( x I ( t ) , P ) M ( x I ( t ) , P ) | M ( x I ( t ) , P ) |
where M ( x I ( t ) , P ) is the set of all smooth paths M ( x I ( t ) , P ) inside R connecting x I ( t ) and P, and | M ( x I ( t ) , P ) | denotes the length of the path M ( x I ( t ) , P ) . In other words, M ( x I ( t ) , P ) is the set of all possible paths of the intruder between x I ( t ) and P. Furthermore, it immediately follows from (10), (11) and (7) that
W [ x I ( t 2 ) , c 1 ( t 2 ) , , c n ( t 2 ) ] W [ x I ( t 1 ) , c 1 ( t 1 ) , , c n ( t 1 ) ] t 2 > t 1 t 0 .
Now (12) and (9) imply that if the intruder reaches a point P S at some time t * t 0 , the closest USV to the point P at time t * cannot be further from P than ϵ . Therefore, the ϵ -neighbourhood of the point P = x I ( t * ) at the segment S contains at least one USV at time t * . This implies that the team of the interceptors ϵ -intercepts the intruder and the Theorem 1 has been proved. □
Now, we simplified the inequality (8) and the navigation law (7) by considering Assumption 1 as follows:
Assumption 1.
The following inequality holds:
V I m a x V R m a x .
Then for i = k , k + 1 , , n k + 1 . First we introduce some points D i ( t ) , D i ( t ) + S as follows:
D i ( t ) : = F ( c i 1 ( t ) + c i ( t ) 2 ) i f i = 2 , , n ; D i ( t ) : = P 1 i f i = 1 ;
D i ( t ) + : = F ( c i ( t ) + c i + 1 ( t ) 2 ) i f i = 1 , , n 1 ;
D i ( t ) + : = P 2 i f i = n .
Second, we introduce numbers H i ( t ) and H i + ( t ) as follows:
H i ( t ) : = c i ( t ) c i 1 ( t ) 2 α ( x I ( t ) , D i ( t ) ) V R m a x V I m a x i f i = 2 , , n ; H i ( t ) : = c i ( t ) α ( x I ( t ) , P 1 ) V R m a x V I m a x i f i = 1 ; H i + ( t ) : = c i + 1 ( t ) c i ( t ) 2 α ( x I ( t ) , D i ( t ) + ) V R m a x V I m a x i f i = 1 , , n 1 ; H i + ( t ) : = L c i ( t ) α ( x I ( t ) , P 2 ) V R m a x V I m a x i f i = n .
Then, the navigation law (7) becomes simplified (for i = 1 , , n ) as follows:
u i ( t ) : = V R m a x i f H i ( t ) < H i + ( t ) u i ( t ) : = V R m a x i f H i ( t ) > H i + ( t ) u i ( t ) : = 0 i f H i ( t ) = H i + ( t ) .
Theorem 2.
Suppose that the conditions (1), (4) and Assumption 1 hold for the team of autonomous USVs (3) and the intruder I. Furthermore, H is supposed to be a set of numbers H i ( t 0 ) , H i + ( t 0 ) in which i = k , k + 1 , , n k + 1 and the intruder I, becomes visible to the team members ( i n t e r c e p t o r s ) at some time t 0 0 . Then there exists an ϵ-intercepting navigation strategy for the team of interceptors if and only if
max H ϵ .
Furthermore, if the inequality (18) holds, the navigation law (17) is an ϵ-intercepting navigation strategy.
Proof of Theorem 2.
We prove that if Assumption 1 holds, then
M i ( t ) = H i ( t ) , M i + ( t ) = H i + ( t )
where M i ( t ) , M i + ( t ) , H i ( t ) , H i + ( t ) are defined by (6), (16). Indeed, let P 3 , P 4 S i ( t ) and c ( P 3 ) < c ( P 4 ) where S i ( t ) is defined by (5). Then, for any x, we obviously have that
α ( x , P 3 ) α ( x , P 4 ) + c ( P 4 ) c ( P 3 ) .
This and Assumption 1 imply that
β ( t , P 3 ) α ( x , P 3 ) V R m a x V I m a x β ( t , P 4 ) α ( x , P 4 ) V R m a x V I m a x
for any x. This implies that
sup P S i ( t ) β ( t , P ) α ( x , P ) V R m a x V I m a x
is achieved at the left end of the interval S i ( t ) . Therefore, M i ( t ) = H i ( t ) . Analogously, M i + ( t ) = H i + ( t ) . Hence, (19) holds and the statement of Theorem 2 follows from Theorem 1. Therefore, Theorem 2 has been proved. □

4.3. Comparison with the Static Barrier Coverage Approach

To make a comparison of the proposed method to the static barrier coverage approach of [5], we consider the following illustrative example. Let the segment S be a straight line segment, and assume that the n USVs are equally spaced on this segment, so that the distances between two neighbouring USVs are L n and the distances between the USV 1 and the USV n and the ends of the segment S are L 2 n . Furthermore, assume that at the time t 0 the intruder is located at the line orthogonal to the middle of the segment interval between two neighbouring USVs at the distance d from this middle point, see Figure 2.
It is obvious that if the USVs are static as in [5], then the USVs are able to ϵ -intercept the intruder if and only if L 2 n ϵ . On the other hand, it obviously follows from Theorem 2, that if Assumption 1 holds, then there exists an ϵ -intercepting navigation strategy for the team of USVs if and only if
L 2 n ϵ + d V R m a x V I m a x .
Furthermore, if the inequality (20) holds, the navigation law (17) is an ϵ -intercepting navigation strategy. Notice that (20) can be viewed as some objective metrics describing the performance of the proposed method as a function of L , n , d , V R m a x , V I m a x . This example shows that the proposed dynamic barrier coverage method has a significant advantage over the static barrier coverage approach of [5].

4.4. The Case of Several Intruders

The problem of a single intruder interception by a team of USVs has been investigated so far. Suppose that I = ( i 1 , i 2 , i m ) represents m intruders trapped inside the bounded region R where m < n . To propose a decision making strategy for the USVs to choose the most dangerous intruder i d I at any time t * t , we define the following distances:
d j ( t ) = [ x j ( t ) , P 1 ] f o r d i ( t ) D f o r j = 1 , , m l c i ( t ) = [ c i ( t ) , P 1 ] f o r l c i ( t ) Q f o r i = 1 , , n .
where d i ( t ) represents the distance between intruder i and point P 1 and l c ( t ) denotes the distance between USV i and point P 1 . Furthermore, D and Q represent sets of distances between the intruders and the robots to the point P 1 , respectively.
Now we introduce a decision making strategy set F for the USVs to choose the most dangerous intruder in any time t * t as follows:
f i j ( t * ) = d j ( t * ) | d j ( t * ) D ! d j ( t * ) < d j ( t * ) , j j = ( 1 , , m ) i f i = 1 f i j ( t * ) = d j ( t * ) | d j ( t * ) D ! d j ( t * ) > d j ( t * ) , j j = ( 1 , , m ) i f i = n f i j ( t * ) = inf | l c i ( t * ) d j ( t * ) | , j j = ( 1 , , m ) i f 1 < i < n .
Then we introduce a set = ( H 1 , H 2 , , H j ) that includes a finite number of subsets H j in which j = 1 , 2 , , m and each subset H j is supposed to be a set of numbers H i j ( t * ) , H i j + ( t * ) in which i = k , k + 1 , , n k + 1 .
Now by considering (22), each USV chooses the most dangerous intruder to intercept by taking a proper subset H j and using navigation law (17) for ϵ -intercepting the intruder j. Figure 3 illustrates the proposed methodology.
Remark 4.
Notice that in this paper, we do not consider the problem of avoiding collisions between autonomous vehicles. However, this problem can be handled by combining the proposed method with various collision avoidance algorithms; see, for example [41,42,43,44,45,46,47].

5. Simulation and Discussion

5.1. The Problem of Intercepting a Single Intruder

In this section, we present a simulation example that illustrates the main results of the paper using MATLAB R2020a. We considered a team of autonomous USVs that contains five individual point-wise USVs. The team members are deployed on the segment S , which represents the boundary of the region R . Each team member is responsible for intercepting the trapped intruder, which strives to escape the region through any interception point P on the boundary. We define the maximum velocity of the intruder as V I m a x = 4.2 and the maximum velocity of each interceptor as V R m a x = 3.0 , which guarantees that Assumption 1 holds. Now, we apply Theorem 2 and the navigation law (17).
Figure 4 shows the positions and the motion directions of the USVs when the intruder tends to exit the region R and is at the points a, b, c, and d. The autonomous USVs are indexed in a counter-clockwise direction from point P 1 to point P 2 . As it is obvious in Figure 4, the USVs 4 and 5 protect the dangerous point while the intruder I reaches point a. Then the team members are following the intruder while the intruder decided to change its direction towards point b. Then, after the USV 2 protects the dangerous point when the intruder reaches point c and finally the USV 1 intercepts the intruder at point d.
The evolution of the y-coordinates of the interceptors while the invasive intruder is moving along the trajectory is shown in Figure 5.

5.2. The Problem of Intercepting Multiple Intruders

To confirm the robustness and reliability of navigation law (17) as well as decision making strategy algorithm (22), a simulation scenario is presented for intercepting multiple intruders that are trapped in a region as they attempt to escape through some points P k j in which P 1 < P k j < P 2 and j represents the number of intruders. In this scenario, we consider five USVs moving along the border of the region R between points P 1 and P 2 and labelled 1, …, 5. We consider two intruders that attempt to escape the region through different points in the boundary. We assume that the robots are using onboard sensors (e.g., sonar) to avoid any collision and each team member maintains its position during the operation. We define the maximum velocity of the intruder as V I m a x = 4.2 and the maximum velocity of each interceptor as V R m a x = 3.0 , which guarantees that Assumption 1 holds. Now, we apply Theorem 2, decision making strategy algorithm (22) and the navigation law (17).
Figure 6 shows the positions and the motion directions of the USVs when the intruder1 and intruder2 tend to exit the region R and are at the points ( a 1 , a 2 ), ( b 1 , b 2 ), ( c 1 , c 2 ), and ( d 1 , d 2 ), respectively. The autonomous USVs are indexed in a counter-clockwise direction from point P 1 to point P 2 . As it is obvious in Figure 6, the USVs 4, 5 and 3 protect the dangerous point while the intruder1 i 1 reaches point a 1 as well as USVs 1, and 2 which are protecting the dangerous point while intruder2 i 2 reaches the point a 2 . Then the team members follow the intruders while the intruders decide to change their direction towards point b 1 and b 2 . Then after, the USVs 2 and 3 protect the dangerous points when the intruder1 and intruder2 reach point c 1 and c 2 and finally the USVs 4 and 5 intercept the intruder at point d 1 while USV 1 intercepts the intruder2 at point d 2 .
The evolution of the Y-coordinates of the interceptors while the invasive intruders are moving along the trajectories is shown in Figure 7 and Figure 8.
In conclusion, in this section, we have simulated the proposed decentralised autonomous navigation algorithm for scenarios with both a single intruder and multiple intruders. The results of computer simulations show the effectiveness of the developed navigation method.

6. Conclusions

A decentralised navigation control strategy for a group of autonomous USVs that are protecting a planar region by patrolling the boundary is presented in this study. On the other hand, there are trapped intruders that try to escape the region through some segments on the region’s boundary while trying to avoid being intercepted by the autonomous USVs. We derived a necessary and sufficient condition for the existence of a navigation algorithm that guarantees that the intruder is always intercepted on the boundary of the region for the case of a single intruder. The proposed navigation algorithm is based on some simple rules in which each autonomous USV only has information about the intruders and the closest team members. The proposed decentralised algorithm of autonomous navigation belongs to the class of sliding mode control laws. The effectiveness of the developed algorithm has been confirmed by computer simulations with both single and multiple intruders. An interesting possible future direction for this research will be to extend the obtained results to the case of ground unmanned autonomous vehicles moving not along a line in a perfect plane, but operating on uneven (very non-flat) terrains [48], or to the case of a team of aerial drones flying over uneven terrains [49]. In this case, a much more challenging problem of decentralised 3D autonomous navigation should be addressed. Another important direction of future research will be conducting real-world experiments with real USVs to evaluate the proposed navigation method.

Author Contributions

Conceptualization, A.V.S.; methodology, A.V.S.; software, A.M.; validation, A.M.; formal analysis, A.V.S., A.M.; investigation, A.V.S., A.M.; writing—original draft preparation, A.M., A.V.S.; writing—review and editing, A.M., A.V.S.; visualization, A.M.; supervision, A.V.S.; project administration, A.V.S.; funding acquisition, A.V.S. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Australian Research Council. Moreover, this work received funding from the Australian Government, via grant AUSMURIB000001 associated with ONR MURI grant N00014-19-1-2571.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Matveev, A.S.; Teimoori, H.; Savkin, A.V. A method for guidance and control of an autonomous vehicle in problems of border patrolling and obstacle avoidance. Automatica 2011, 47, 515–524. [Google Scholar] [CrossRef]
  2. Matveev, A.S.; Wang, C.; Savkin, A.V. Real-Time Navigation of Mobile Robots in Problems of Border Patrolling and Avoiding Collisions with Moving and Deforming Obstacles. Rob. Auton. Syst. 2012, 60, 769–788. [Google Scholar] [CrossRef]
  3. Portugal, D.; Rocha, R.P. Distributed Multi-Robot Patrol: A Scalable and Fault-Tolerant Framework. Rob. Auton. Syst. 2013, 61, 1572–1587. [Google Scholar] [CrossRef]
  4. Marino, A.; Parker, L.E.; Antonelli, G.; Caccavale, F. A decentralized architecture for multi-robot systems based on the null-space-behavioral control with application to multi-robot border patrolling. J. Intell. Robot Syst. 2013, 71, 423–444. [Google Scholar] [CrossRef]
  5. Cheng, T.M.; Savkin, A.V. A distributed self-deployment algorithm for the coverage of mobile wireless sensor networks. IEEE Commun. Lett. 2009, 13, 877–879. [Google Scholar] [CrossRef]
  6. Savkin, A.V.; Cheng, T.M.; Xi, Z.; Javed, F.; Matveev, A.S.; Nguyen, H. Decentralized Coverage Control Problems for Mobile Robotic Sensor and Actuator Networks; John Wiley & Sons: Hoboken, NJ, USA, 2015. [Google Scholar]
  7. Cheng, T.M.; Savkin, A.V.; Javed, F. Decentralized control of a group of mobile robots for deployment in sweep coverage. Rob. Auton. Syst. 2011, 59, 497–507. [Google Scholar] [CrossRef]
  8. Cheng, T.M.; Savkin, A.V. Decentralized control for mobile robotic sensor network self-deployment: Barrier and sweep coverage problems. Robotica 2011, 29, 283–294. [Google Scholar] [CrossRef]
  9. Semakova, A.A.; Ovchinnikov, K.S.; Matveev, A.S. Self-deployment of mobile robotic networks: An algorithm for decentralized sweep boundary coverage. Robotica 2017, 35, 1816–1844. [Google Scholar] [CrossRef]
  10. Savkin, A.V.; Marzoughi, A. Distributed control of a robotic network for protection of a region from intruders. In Proceedings of the 2017 IEEE International Conference on Robotics and Biomimetics (ROBIO), Macau, China, 5–8 December 2017; pp. 804–808. [Google Scholar]
  11. Marzoughi, A. Maximizing the probability of intrusion detection by a fleet of mobile robots using an intelligent game theoretic approach. In Proceedings of the 2017 36th Chinese Control Conference (CCC), Dalian, China, 26–28 July 2017; pp. 8342–8348. [Google Scholar]
  12. Polvara, R.; Sharma, S.; Wan, J.; Manning, A.; Sutton, R. Obstacle avoidance approaches for autonomous navigation of unmanned surface vehicles. J. Navig. 2018, 71, 241–256. [Google Scholar] [CrossRef] [Green Version]
  13. Xin, J.; Li, S.; Sheng, J.; Zhang, Y.; Cui, Y. Application of improved particle swarm optimization for navigation of unmanned surface vehicles. Sensors 2019, 19, 3096. [Google Scholar] [CrossRef] [Green Version]
  14. Mahacek, P.; Kitts, C.A.; Mas, I. Dynamic guarding of marine assets through cluster control of automated surface vessel fleets. IEEE ASME Trans. Mechatron. 2012, 17, 65–75. [Google Scholar] [CrossRef]
  15. Raboin, E.; Svec, P.; Nau, D.; Gupta, S.K. Model-predictive target defense by team of unmanned surface vehicles operating in uncertain environments. In Proceedings of the 2013 IEEE International Conference on Robotics and Automation, Karlsruhe, Germany, 17 October 2013; pp. 3517–3522. [Google Scholar]
  16. Raboin, E.; Svec, P.; Nau, D.S.; Gupta, S.K. Model-predictive asset guarding by team of autonomous surface vehicles in environment with civilian boats. Auton. Robot. 2015, 38, 261–282. [Google Scholar] [CrossRef]
  17. Simetti, E.; Turetta, A.; Casalino, G.; Storti, E.; Cresta, M. Protecting assets within a civilian harbour through the use of a team of USVs: Interception of possible menaces. In IARP Workshop on Robots for Risky Interventions and Environmental Surveillance-Maintenance (RISE-10); Sheffield Hallam University: Sheffield, UK, 2010. [Google Scholar]
  18. Li, X.; Huang, H.; Savkin, A.V. A Novel Method for Protecting Swimmers and Surfers from Shark Attacks using Communicating Autonomous Drones. IEEE Internet Things J. 2020, 7, 9884–9894. [Google Scholar] [CrossRef]
  19. Gage, D.W. Command control for many-robot systems. In Proceedings of the 19th Annual AUVS Technical Symposium, Hunstville, AL, USA, 22–24 April 1992. [Google Scholar]
  20. Sharma, V.; Patel, R.B.; Bhadauria, H.S.; Prasad, D. Deployment schemes in wireless sensor network to achieve blanket coverage in large-scale open area: A review. Egypt. Inform. J. 2016, 17, 45–56. [Google Scholar] [CrossRef] [Green Version]
  21. Huang, H.; Savkin, A.V.; Li, X. Reactive Autonomous Navigation of UAVs for Dynamic Sensing Coverage of Mobile Ground Targets. Sensors 2020, 20, 3720. [Google Scholar] [CrossRef]
  22. Isaacs, R. Differential Games. A Mathematical Theory with Applications to Warfare and Pursuit, Control and Optimization; Courier Corporation: New York, NY, USA, 1999. [Google Scholar]
  23. Yan, R.; Shi, Z.; Zhong, Y. Reach-Avoid Games With Two Defenders and One Attacker: An Analytical Approach. IEEE Trans. Cybern. 2018, 99, 1–12. [Google Scholar] [CrossRef] [PubMed]
  24. Chen, M.; Zhou, Z.; Tomlin, C.J. Multiplayer reach-avoid games via low dimensional solutions and maximum matching. In Proceedings of the American Control Conference, Portland, OR, USA, 4–6 June 2014; pp. 1444–1449. [Google Scholar]
  25. Shishika, D.; Kumar, V. Local-game decomposition for multiplayer perimeter-defense problem. In Proceedings of the IEEE Conference on Decision and Control, Miami Beach, FL, USA, 17–19 December 2018; pp. 2093–2100. [Google Scholar]
  26. Savkin, A.V.; Huang, H. Navigation of a Network of Aerial Drones for Monitoring a Frontier of a Moving Environmental Disaster Area. IEEE Syst. J. 2020, 14, 4746–4749. [Google Scholar] [CrossRef]
  27. Cruz, H.; Eckert, M.; Meneses, J.; Martínez, J.-F. Efficient forest fire detection index for application in unmanned aerial systems (UASs). Sensors 2016, 16, 893. [Google Scholar] [CrossRef] [Green Version]
  28. Odonkor, P.; Ball, Z.; Chowdhury, S. Distributed operation of collaborating unmanned aerial vehicles for time-sensitive oil spill mapping. Swarm Evol. Comput. 2019, 46, 52–68. [Google Scholar] [CrossRef]
  29. Jorge, V.A.; Granada, R.; Maidana, R.G.; Jurak, D.A.; Heck, G.; Negreiros, A.P.; dos Santos, D.H.; Gonçalves, L.M.; Amory, A.M. A survey on unmanned surface vehicles for disaster robotics: Main challenges and directions. Sensors 2019, 19, 702. [Google Scholar] [CrossRef] [Green Version]
  30. Kum, B.C.; Shin, D.H.; Lee, J.H.; Moh, T.; Jang, S.; Lee, S.Y.; Cho, J.H. Monitoring applications for multifunctional unmanned surface vehicles in marine coastal environments. J. Coast Res. 2018, 85, 1381–1385. [Google Scholar] [CrossRef]
  31. Liu, Z.; Zhang, Y.; Yu, X.; Yuan, C. Unmanned surface vehicles: An overview of developments and challenges. Annu. Rev. Control. 2016, 41, 71–93. [Google Scholar] [CrossRef]
  32. Singh, Y.; Sharma, S.; Sutton, R.; Hatton, D. Towards use of Dijkstra Algorithm for Optimal Navigation of an Unmanned Surface Vehicle in a Real-Time Marine Environment with results from Artificial Potential Field. TransNav 2018, 12, 125–131. [Google Scholar] [CrossRef]
  33. Campbell, S.; Naeem, W.; Irwin, G.W. A review on improving the autonomy of unmanned surface vehicles through intelligent collision avoidance manoeuvres. Annu. Rev. Control 2012, 36, 267–283. [Google Scholar] [CrossRef] [Green Version]
  34. Savkin, A.V.; Huang, H. Asymptotically optimal deployment of drones for surveillance and monitoring. Sensors 2019, 19, 2068. [Google Scholar] [CrossRef] [Green Version]
  35. Cheng, F.; Yu, W.; Wan, Y.; Cao, J. Distributed robust control for linear multiagent systems with intermittent communications and parameter uncertainties. IEEE Trans. Circuits Syst. II Express Briefs 2016, 63, 838–842. [Google Scholar] [CrossRef]
  36. Hong, H.; Yu, W.; Yu, X.; Wen, G.; Alsaedi, A. Fixed-time connectivity-preserving distributed average tracking for multiagent systems. IEEE Trans. Circuits Syst. II Express Briefs 2017, 64, 1192–1196. [Google Scholar] [CrossRef]
  37. Skafidas, E.; Evans, R.J.; Savkin, A.V.; Petersen, I.R. Stability results for switched controller systems. Automatica 1999, 35, 553–564. [Google Scholar] [CrossRef]
  38. Utkin, V.I. Sliding Modes in Control and Optimization; Springer: London, UK, 2013. [Google Scholar]
  39. Savkin, A.V.; Evans, R.J. Hybrid Dynamical Systems. Controller and Sensor Switching Problems; Birkhauser: Boston, MA, USA, 2002. [Google Scholar]
  40. Petersen, I.R.; Ugrinovskii, V.A.; Savkin, A.V. Robust Control Design Using H-Infinity Methods; Springer: London, UK, 2000. [Google Scholar]
  41. Savkin, A.V.; Wang, C. A Simple Biologically-Inspired Algorithm for Collision Free Navigation of a Unicycle-like Robot in Dynamic Environments with Moving Obstacles. Robotica 2013, 31, 993–1001. [Google Scholar] [CrossRef]
  42. Matveev, A.S.; Savkin, A.V.; Hoy, M.; Wang, C. Safe Robot Navigation among Moving and Steady Obstacles; Elsevier: Cambridge, MA, USA, 2015. [Google Scholar]
  43. Hoy, M.; Matveev, A.S.; Savkin, A.V. Algorithms for Collision Free Navigation of Mobile Robots in Complex Cluttered Environments: A Survey. Robotica 2015, 33, 463–497. [Google Scholar] [CrossRef] [Green Version]
  44. Marzoughi, A. Decentralised Navigation Control of a Multi-Robot Team to Minimising Energy Consumption in an Unknown Obstacle-Ridden Area. In Proceedings of the 2018 37th Chinese Control Conference (CCC), Wuhan, China, 8 October 2018; pp. 4922–4927. [Google Scholar]
  45. Marzoughi, A. Switching Navigation for a Fleet of Mobile Robots in Multi-Obstacle Regions. Int. J. Mech. Eng. Robot. Res. 2019, 8, 1–5. [Google Scholar] [CrossRef]
  46. Marzoughi, A. Navigating a mobile robot to avoid moving obstacles using virtual source/sink force field. In Proceedings of the 2017 IEEE International Conference on Robotics and Biomimetics (ROBIO), Macau, China, 5–8 December 2017; pp. 344–349. [Google Scholar]
  47. Marzoughi, A. A decentralized position estimation switching algorithm to avoid a convex obstacle. In Proceedings of the 2017 36th Chinese Control Conference (CCC), Dalian, China, 11 September 2017; pp. 603–6036. [Google Scholar]
  48. Ganganath, N.; Yuan, W.; Fernando, T.; Iu, H.H.C.; Cheng, C.-T. Energy-efficient anti-flocking control for mobile sensor networks on uneven terrains. IEEE Trans. Circuits Syst. II Express Briefs 2018, 65, 2022–2026. [Google Scholar] [CrossRef]
  49. Savkin, A.V.; Huang, H. Proactive deployment of aerial drones for coverage over very uneven terrains: A version of the 3D art gallery problem. Sensors 2019, 19, 1438. [Google Scholar] [CrossRef] [PubMed] [Green Version]
Figure 1. R : The closed convex planar region, S : The segment of the boundary needs to be protected, c ( P ) : The curvilinear coordinate.
Figure 1. R : The closed convex planar region, S : The segment of the boundary needs to be protected, c ( P ) : The curvilinear coordinate.
Sensors 21 00297 g001
Figure 2. Deployment of autonomous unmanned surface vehicles (USVs) on a straight line segment S .
Figure 2. Deployment of autonomous unmanned surface vehicles (USVs) on a straight line segment S .
Sensors 21 00297 g002
Figure 3. Decision making on multiple intruder detection.
Figure 3. Decision making on multiple intruder detection.
Sensors 21 00297 g003
Figure 4. The intruder trajectory and the positions and the motion directions of the USVs when the intruder is at points a , b , c and d.
Figure 4. The intruder trajectory and the positions and the motion directions of the USVs when the intruder is at points a , b , c and d.
Sensors 21 00297 g004
Figure 5. The evolution of the y-coordinates of the intruder and the USVs in segment S.
Figure 5. The evolution of the y-coordinates of the intruder and the USVs in segment S.
Sensors 21 00297 g005
Figure 6. The intruder trajectory and the positions and the motion directions of the USVs when the intruder is at points a 1 , a 2 , b 1 , b 2 , c 1 , c 2 , d 1 and d 2 .
Figure 6. The intruder trajectory and the positions and the motion directions of the USVs when the intruder is at points a 1 , a 2 , b 1 , b 2 , c 1 , c 2 , d 1 and d 2 .
Sensors 21 00297 g006
Figure 7. The evolution of the y-coordinates of the intruder1 and the USVs in segment S.
Figure 7. The evolution of the y-coordinates of the intruder1 and the USVs in segment S.
Sensors 21 00297 g007
Figure 8. The evolution of the y-coordinates of the intruder2 and the USVs in segment S.
Figure 8. The evolution of the y-coordinates of the intruder2 and the USVs in segment S.
Sensors 21 00297 g008
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Marzoughi, A.; Savkin, A.V. Autonomous Navigation of a Team of Unmanned Surface Vehicles for Intercepting Intruders on a Region Boundary. Sensors 2021, 21, 297. https://doi.org/10.3390/s21010297

AMA Style

Marzoughi A, Savkin AV. Autonomous Navigation of a Team of Unmanned Surface Vehicles for Intercepting Intruders on a Region Boundary. Sensors. 2021; 21(1):297. https://doi.org/10.3390/s21010297

Chicago/Turabian Style

Marzoughi, Ali, and Andrey V. Savkin. 2021. "Autonomous Navigation of a Team of Unmanned Surface Vehicles for Intercepting Intruders on a Region Boundary" Sensors 21, no. 1: 297. https://doi.org/10.3390/s21010297

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop