 Intelligent Control and Automation, 2011, 2, 196-202 doi:10.4236/ica.2011.23024 Published Online August 2011 (http://www.SciRP.org/journal/ica) Copyright © 2011 SciRes. ICA Autonomous Target Interception Using Hybrid Sensor Networks* Wenzhe Zhang1, Yihuai Wang1, Ying Li1, Minglu Li2 1School of Computer Science and Technology, Soochow University, Soochow, China 2Department of Com p uter Science and En gineering , Shanghai Jiaotong University, Shanghai, China E-mail: wzzhang@suda.edu.cn Received December 2, 2010; revised May 20, 2011; accepted May 27,2011 Abstract Hybrid sensor networks (HSNs) comprise of mobile and static sensor nodes setup for purpose of collabora- tively performing tasks like sensing a phenomenon or monitoring a region. In this paper, we present target interception as a novel application using mobile sensor nodes as executor. Static sensor nodes sense, com- pute and communicate with each other for navigation. Mobile nodes are guided to intercept target by the static nodes nearby. Our approach does not require any prior maps of the environment thus, cutting down the cost of the overall energy consumption. As to multi-targets multi-mobile nodes case, we present a PMB al- gorithm for task assignment. Simulation results have verified the feasibility and effectiveness of our ap- proach proposed. Keywords: Target, Hybrid Sensor Networks, Interception, CoS, Intercepting Strategy, PMB Task Assignment 1. Introduction A networked system of hybrid sensor networks opens new frontiers in variety of civilian and military applica- tions and in some scientific disciplines. A mixture of networked mobile robots and static sensors reduce the cost but preserves the flexibility and advantageous capa- bilities of a multi-robot system. We are broadly interested in the mutually beneficial collaboration between mobile and static sensor networks. The underlying principle in this hybrid network between the mobile and static nodes is th at: the static nodes serve as the sensing, computation and communication medium, whereas the robots provide action and finish the task of blocking with the help of static sensors. In this work we describe results from such a system which accurately and reliably solves the problem of target interception. Some properties of our appr oach are summarized below: 1) The sensor network is pre-deployed into the envi- ronment deterministically or randomly for the full cov- erage of the region. 2) After deployment, static sensor nodes can sense the condition of its environment. By the multi-hop commu- nication, static nodes compute the distributions of local environment and evaluate appearance of the target. 3) The nodes of the sensor network are synchronized in time (high precision is not required). 4) The mobile node is made up of a static sensor and a robot, so it can communicate with any static nodes nearby. 5) The environment is not required to be static. Sensor networks are deployed in the field of interest. They are expected to monitor the field and intercept any intruding target as soon as possible in an unmanned manner[1]. The concept of artificial potential fields for the purpose of obstacle avoidance was presented in [2-6]. The concept of Vector Field Histograms (VFH) based on locally constructed polar histograms for robot navigation was presented in [7]. It may be noted that a parallel ap- proach for the construction of a navigation field has been proposed in sensor network. It uses potential fields and the hop count to compute the magnitude of the direc- tional vectors. In our paper, we only use the static node nearby to guide the mobile node, which cut down the complication of computation greatly. *This paper is supported by the Natural Science Foundation of China, o. 61070169, National Basic Research Program of China, No. 2006 CB303000 and Jiangsu Natural Sc ience Foundation No. 10KJB 520017.In this paper we propose a landmark-based pursuit
 W. Z. ZHANG ET AL.197 strategy to address the problem of target interception. i.e. When the target intrudes the sensory field, static sensor nodes that detect the events collectively elect one head that has sensed the largest intensity of signal. After data computing, it will generate a sensing report and flood over the network by multi-hops. We call the sensing re- port data stimulus and the head node as center of stimu- lus. Mobile sensor node acquires the position of target and decides its optimal pursuit direction with the help of sensors nearby. When the target moves, center of stimu- lus is re-elected and static sensor node keeps the proper position of the target. Only if the update of the network is enough, can the mobile node select its optimal strateg y to intercept the target. Instead of a mobile node wander- ing randomly, in sign-based approach each static node decides the direction to guide the mobile node. As a re- sult, our approach with refreshing stimulus packets adapts to the mobile target, and can guide the mobile node to block the target as soon as possible. We rely on the communication network to establish the navigation paths. Also, in our approach the mobile robots only need a local sense of target in order to move toward the correct direction. The obvious merit is that the mobile node does not need a pre-decided environ- ment map, or a compass. The rest of the paper is organized as follows: We pre- sent sensing model, stimulus election and target localiza- tion in Section 2 Mobile node navigation is presented in Section 3. In Section 4 we extend the case to multiple targets and mobile nodes and design the task assignment algorithms. Section 5 presents the simulation and evalu- ates its performance. Section 6 summarizes the work and sketches out our future plan. 2. Sensor Network Surveillance 2.1. Sensing Model Let N be the number of static senor nodes, deployed over the surveillance region . Let 2 R i R be the location of the i-th sensor node and let is . Let iN:1Ss ,GSE be a communica- tion graph such that , ij sE if and only if node i can communicate with node j. Let mbe the number of mobile nodes (for simplicity, s NN 1 m N ) and Let s be the sensing range of each static/mobile sensor node. If there is a targ et at R R, the sensor node can detect the presence of the target. Each sensor records the sensor’s signal strength, 1ii i i ii wifsx R sx S wifsx where , and are constants specific to the sen- sor type and they are normalized such that i has the standard Gaussian distribution. This signal-strength based sensor model is general for sensors available in sensor networks, such as acoustic and magnetic sensors, and has been used frequently [8-10]. For each sensori, if i w S , where is a threshold set for appropriate val- ues of detection and false-positiv e probabilities, the node is activated and join in the mesh as shown in Figure 1. It will participate in the stimulus election in the next sec- tion and may transmit itsto its neighboring nodes if necessary. i S 2.2. Stimulus Election and Its Update The election of a source follows the mechanism bellow. We want only one node to generate the report since it would be a waste of resour ces if every nod e detecting th e target sends a report. The target creates a field of sensing signal strength, the nearer the sensor is, the signal strength it collects is larger. Each node broadcasts a message indicating its signal strength and Cartesian coordinate (with some random delay to avoid collision). A node rebroadcasts its signal strength whenever it hears a neighbor’s message with a weaker signal, but stops broadcasting when it hears a stronger one. In this way, messages roll throughout the whole network of the signal strength field. Finally the node with the strongest signal is elected as the Center of Stimulus (CoS) and generates the sensing reports. Vt Figure 1. The stimulus starts from a source and ends at the mobile node. The black nodes forward the packet to the source collectively. Notice that some nodes outside of the mesh also receive the packet but do not forward it. s s R (1) Copyright © 2011 SciRes. ICA
 W. Z. ZHANG ET AL. 198 2.3. Target Localization and Velocity Estimation Computation of target’s information is performed by the node CoS. Let i be the Cartesian coordinate of sen- sor , the position of a target is estimated as i 1 1 * ˆ j j k ii j ik i j Sx xS (2) then ˆi is broadcasted as stimulus data all through the network. In this way, although each sensor cannot give an accurate estimate of target’s position, as more sensors collaborate, the accuracy of estimates improves [11]. We assume mobile sensor node can move at some cer- tain velocity, here we note it as m. Target may intrude into the monitoring region and move with the speed of maximum . v t Based on the target location, we can calculate the ve- locity of the moving target as well. For simplicity, sup- pose the estimated positions of target at time 1and 2are v t t 111 ˆ, xyand 222 ˆ, xyrespectively, the velocity of the target is computed as: 22 12 12 12 ˆt xx yy vtt (3) And the direction of velocity 12 ˆˆ : t x . 3. Mobile Node Navigation 3.1. Interception Strategy We suppose the mobile node moves at a constant speed. In order to intercept the intruding target as soon as possi- ble, we need select the optimal direction of movement m according to the instant target. The target may in- trude the field of interest at any time with the velo city of . At first, we consider the case of static target, i.e. . As to the static target, the optimal strategy is intercepting towards the target as shown in Figure 2. So the intercept strategy is computed as: max t vv0 t v t 222 arccos 2 SMMT TS mSM MT ddd dd (4) where are Euclidean distances of Static node-Mobile node, Mobile node-Target and Target-Sta- tic node. ,, SMMT TS ddd As to the mobile target, interception strategy needs modified according to the update of targ et’s position and velocity. Based on the velocity esti mation in Section 2C, the additional offset of interception direction is computed as: arcsin sin t mm v v m (5) So the optimal strategy of mobile target interception is computed as shown in Figure 3: mm (6) 3.2. Target Intercepting During the interception perfo rmance, there are four states for mobile sensor node, i.e. WAIT, LONG-DISTANCE: NAVIGATE, SHORT-DISTANCE: TRACKING and INTERCEPTED. In the beginning there is no target in- truding into the region, so mobile node is waiting for a command, maybe wandering randomly. When the target appears in the region, CoS node injects the stimulus packet into the sensor network and activates the compu- tation to the position and velocity of the target. Receiv- ing the stimulus Message, mobile node come to the LONG-DISTANCE state and begins to navigate with the guidance of static node nearby. When the sensor of mo- bile node receives enough signal strength (above ), it Figure 2. Intercepting static target. Figure 3. Intercepting mobile target. Copyright © 2011 SciRes. ICA
 W. Z. ZHANG ET AL.199 will track the target in the current direction. Finally if the position and velocity of mobile node is the same with that of target, mission is completed. Note that when the signal strength received is less than the threshold , mo- bile node’s state will transit from SHOT-DISTANCE to LONG-DISTANCE, and co me back to navigate with the help o f static nodes as shown in Figure 4. 3.3. Metrics of Interception In the mission of target interception, sev eral criteria may be chosen to evaluate the performance, such as minimi- zation of mobile node’s energy while guaranteeing cap- ture of all targets or maximization of number of captured targets within a certain amount of time. In this work we focus on minimizing the Time-to-Interception (TI) of mobile node. Since target’s motion is not known, exact TI is not known either; therefore we need to define a metric to estimate TI. We will use the following defini- tion of TI: Definition 1. Let 2 00 , tt pt vt t 2 the posi- tion and velocity of a target at time 0, and t 22 tt t 00 the position and velocity of a mobile node at time 10 . We define the mini- mum time TI necessary for the mobile node to reach the target with the same velocity, assuming that the target will keep moving with constant velocity, i.e., , mm pt vt 1111 min , tmtm T TI TptTptTvtT vtT where 101001 *, tt pt Tptt TtvtvtTvt 0 . This definition allows us to quantify TI in an unambi- guous way. Although target can change trajectories over time, it is a more accurate estimate than, for example, some metric based on the distance between the target and WAIT: Wait for start LONG- DISTANCE: NAVIGATE Msg: Stimulus SHORT- DISTANCE: TRACKING m S < CAPTURED |MT| =0 m S > Figure 4. States transition diagram of mobile node. the mobile node, since TI incorporates the dynamics of mobile node. Moreover, it is well-defined for any arbi- trary time delay 10d ttt in the estimate of target’s position and velocity relative to current time 1. Given this definition and the constraints on the dynamics of the mobile node, it is possible to calculate explicitly TI. t 4. Task Assignment Algorithms In the previous section, we presented mobile sensor node interception and its metric for an intercepting pa ir. In this section we consider the case of multiple targets and mo- bile nodes. Given positions and velocities of all targets and mobile nodes, it is possible to compute TI matrix ,mt N ij Cc c , where m and t are the total number of mobile nodes and targets, respectively, and the entry ,ij of the matrix C corresponds to the ex- pected TI between mobile node i and target j. When co- ordinating multiple mobile nodes to intercept multiple targets, it is necessary to select an assignment. Our ob- jective is to select an assignment that minimizes the ex- pected TI of all mobile nodes. N N Assume that we have the same number of mobile nodes and targets, i.e. . An assignment can be represented as a matrix , m NNtmt N ij Xx , where the entry ,ij of the matrix X is equal to 1 if mobile node i is assigned to target j, and equal to 0 otherwise. The as- signment problem can therefore be written formally as follows: ,,, 0,1 ,1,, ,, 11 min max subject to 1, 1. ij ijij xij N NN ij ij ij cx xx (7) As formulated in the equation above, the assignment problem appears as a combinatorial problem. One simple greedy assignment algorithm that tries to solve the optimization problem above is to look for the smallest TI entry in the matrix C, assign the correspond- ing interception pair, and remove the corresponding row and column from the matrix C which now becomes of dimension 1NN1 , and repeat the same process until each mobile node is assigned to a target. Although it is straightforward and easy to implement, this is a suboptimal algorithm, since there are cases when the greedy assignment gives the worst solution. In this section we present a collaborative task assign- ment protocol as Figure 5. The protocol assigns the task based on probe message in a distributed manner. Previ- ous work [11-13] gives a hierarchical multiple task as- signment protocol for the similar problem. But all of them are not distributed and is not scalable well. Besides, we describe a simple random task assignment algorithm as Randomly Task Assignment (RTA), i.e. in Copyright © 2011 SciRes. ICA
 W. Z. ZHANG ET AL. 200 Mobile sensor M j a) M j received request messages for blocking targets, 1,, n TT , Com put e th e dist anc e fr om S jm to each T i , , m ji DS T , 1in and sort them in ascending order as 1 ,,, , n mm ji ji DS TDS T .and 1 ip TT . Select T p as th e ta rget candidate to block b) M j broadcast Pr obe Mes sage to all mobile sensors c) M j upon receivin g Probe Message T p from M k If M j will block T p , reply Reject Message else if M j received Probe Message from other M k’ , reply Reject Message else reply Accept Message, delete T p from M j d) M j stay here for a period of time after sending Probe Message If M j received Reject Message, pick a larger Distance and selec t its target as candidate to block else if received Accept Message, begin to block it else s end Probe Mess age again, go to b). Figure 5. Pseudo-code of probe message based distributed task assignment. multiple target and multiple mobile nodes, stimulus as- signs every target to one mobile node randomly in spite of negotiation among nodes. We will compare PMB al- gorithm with RTA in the latter simulation program. 5. Experimental Results In order to gain a better understanding of landmark- based target interception, we have performed a wide range of simulation studies. In this section, we present several interesting results and discuss their implications and possible applications. The main simulation platform is written in C++. The visualization and user interface elements are currently implemented with Visual C++ and OpenGL libraries. Network Simulator (ns2) and CrossBow® MICAZ sen- sor nodes are also used to verify the sensing models and the qualitative performance of the exposure model in a realistic environment. The sensor field in our experi- ments is defined as a 500 * 500 square. 80 static nodes are randomly deployed in the region. For simplicity, parameters t and t is set to 0 and respectively. Suppose a target intrudes from a point of the left edge and monitored by the networked sensors. The mobile node starts interception from the midpoint of the right edge. As shown in Figure 6, we calculate the intercepting path with m of 10 unit/s and 8 unit/s re- spectively. And the velocity of the target is 6 unit/s. v max t v vmax t v If the target intrudes the field from different points, mobile node needs different time for interception. In- truding point of target has a great impact on the per- 10 m v 8 m v Figure 6. Intercepting paths with different speed . m v formance of algorithms. We conducted 50 independent trials and the outcome is averaged. The mobile node is deployed over the field randomly. When the target intru des the field of interest from the left edge with 0, 100, 200, 300, 400 and 500 units, TI for target interception is shown in Figure 7. From Figure 7, we can conclude that TI is largest when the target in- trudes along the upper boundary (i.e. 0 unit) or bottom boundary (i.e. 500 units). This is because the mobile node is deployed randomly over the field of interest. When the target intrudes the field along the upper or bottom boundary, the relative distance between the targ et and the mobile node is the larg est, so it needs the largest TI for interception. On the contrary, if the target intrudes from the midline point (i.e. 300 units), TI for interception is smaller. The mobile node waits for the stimulus for intercep- tion from the original po sition and begins to intercep t the target. The original position has important impact on the Figure 7. TI vs. different intruding point. Copyright © 2011 SciRes. ICA
 W. Z. ZHANG ET AL.201 TI. We build Cartesian coordinate in the monitored re- gion with the upper-left point as original point. And we select 9 referred points as the start point of the mobile node (See Table 1). Intruding point of the target is se- lected randomly from the left boundary and we con- ducted 50 ind ependent trials. The average of TI is sh own in Figure 8. From Figure 8, we can see that the mobile node needs least time for interception when starting from the referred point 5, i.e. TI of the mobile node from the center point of the monitored region is the smallest. So we can conclude that the center point of the region is the best guard point for the mobile node and the referred points of 1 and 7 are the worst. In order to validate the effectiveness of PMB multiple task assignment, we conducted simulation as follows. Suppose the number of the targets is equal to that of the mobile nodes, i.e. mt . Velocity of all targets is 6 unit/s and velocity of all mobile nodes is 8 un it/s. All mobile nodes are deployed over the field randomly and all targets intrude the field from the random point of the left edge. We conducted 50 independent trials and the outcome is averaged. TI changes with the number of targets N as shown in Figure 9. From Figure 9, we can see that TI of PMB algorithm reduces with the number of targets/ mobile nodes N grows, while TI of RTA algo- rithm almost holds the line. Besides, the advantage of PMB algorithm appears more distinctly when N grows. With the nu mber of targ ets N growing, TI of PMB algo- rithm decrease more slowly. It can be explained by the fact that TI is mainly determined by the distance between the entry point and escaping point of the target. Because the distance of entry-escaping points is fixed, TI of PMB algorithm is asymptotic with the expected time of inter- ception between target and mobile node with the same Y coordinates. NNN 6. Conclusions and Future Works In this paper we consider target interception and propo se Table 1. Starting points of the mobile node. Referred point Coordinates (unit, unit) 1 (500,0) 2 (250,0) 3 (0,0) 4 (500,250) 5 (250,250) 6 (0,250) 7 (500,500) 8 (250,500) 9 (0,500) Figure 8. TI vs. different starting point of mobile node. Figure 9. TI of two task allocation algorithms vs. N. a sign-based strategy to solve it using hybrid sensor net- works. In our approach, static sensor nodes detect the target, compute the velocity and guide the mobile node. With the help of static node nearby, the mobile node transits between four states and manage the interception. In addition, we consider multiple targets and mobile nodes, and present a collaborative task assignment pro- tocol to minimize the time of intercep tion. Obstacles may appear in the field of interest, other barrier may be a trap for mobile nodes, e.g. pond. Hence, future work includ es interception using mobile nodes with obstacle avoidance. 7. References [1] E. Biagioni and K. Bridges, “The Application of Remote Sensor Technology to Assist the Recovery of Rare and Endangered Species,” International Journal of High Per- formance Computing Applications, Vol. 16, No. 3, 2002, pp. 315-324. doi:10.1177/10943420020160031001 [2] M. A. Batalin, G. S. Sukhatme and M. Hattig, “Mobile Robot Navigation Using a Sensor Network,” Proceedings Copyright © 2011 SciRes. ICA
 W. Z. ZHANG ET AL. Copyright © 2011 SciRes. ICA 202 of the IEEE International Conference on Robotics and Automation, New Orleans, April 2003, pp. 636-642. [3] J. Borenstein and H. R. Everett, “Navigating Mobile Ro- bots: Sensors and Techniques,” A. K. Peters Ltd., Welles- ley, 1992. [4] Q. Li, M. D. Rosa and D. Rus, “Distributed Algorithms for Guiding Navigation across a Sensor Network,” Pro- ceedings of the 9th Annual International Conference on Mobile Computing and Networking, San Diego, 2003, pp. 313-325. [5] A. J. Briggs, C. Detweiler, D. Scharstein and A. Vanden- berg-Rodes, “Expected Shortest Paths for Landmark- Based Robot Navigation,” International Journal of Ro- botics Research, Vol. 23, No. 7-8, July 2004, pp. 717-728. doi:10.1177/0278364904045467 [6] A. Verma, H. Sawant, J. Tan, “Selection and Navigation of Mobile Sensor Nodes Using a Sensor Network,” Pro- ceedings of Third IEEE International Conference on Per- vasive Computing and Communications, Pisa, March 2005, pp. 41-50. [7] J. Borenstein and Y. Koren, “The Vector Field Histo- gram-Fast Obstacle Avoidance for Mobile Robots,” IEEE Journal of Robotics and Automation, Vol. 7, No. 3, 1991, pp. 278-288. doi:10.1109/70.88137 [8] J. Liu, J. Liu, M. Chu, J. E. Reich and F. Zhao, “Distrib- uted State Representation for Tracking Problems in Sen- sor Networks,” Proceedings of third Workshop on Infor- mation Processing in Sensor Networks (IPSN), New York, April 2004, pp. 234-242.doi:10.1145/984622.984657 [9] J. Liu, J. Liu, J. Reich, P. Cheung and F. Zhao, “Distrib- uted Group Management for Track Initiation and Main- tenance in Target Localization Applications,” Proceed- ings of 2nd workshop on Information Processing in Sensor Networks (IPSN), Berlin, April 2003, pp. 113-128. [10] S. Meguerdichian, F. Koushanfar, G. Qu and I. Potkonjak, “Exposure in Wireless Ad-Hoc Sensor Networks,” Pro- ceedings of 7th Annual International Conference on Mo- bile Computing and Networking, New York, July 2001, pp. 139-150. [11] S. Oh, L. Schenato and S. Sastry, “A Hierarchical Multi- ple-Target Tracking Algorithm for Sensor Networks,” Proceedings of the International Conference on Robotics and Automation, Barcelona, April 2005, pp. 2197- 2202. [12] L. Schenato, S. Oh, P. Bose and S. Sastry, “Swarm Coor- dination for Pursuit Evasion Games Using Sensor Net- works,” Proceedings of the International Conference on Robotics and Automation, Padova, April 2005, pp. 2493- 2498. doi:10.1109/ROBOT.2005.1570487 [13] J. P. Hespanha, H. J. Kim and S. S. Sastry, “Multi- ple-Agent Probabilistic Pursuit-Evasion Games,” Pro- ceedings of the IEEE International Conference on Deci- sion and Control, Phoenix, 1999, pp. 2432-2437.
|