Hostname: page-component-586b7cd67f-r5fsc Total loading time: 0 Render date: 2024-11-25T19:05:51.910Z Has data issue: false hasContentIssue false

Hiding strategies for a mobile robot in hostile obstacle strewn environments

Published online by Cambridge University Press:  04 June 2014

Mohamed. S. Marzouqi*
Affiliation:
ECE Department, Khalifa University
R. A. Jarvis
Affiliation:
Intelligent Robotics Research Centre, Monash University
*
*Corresponding author. E-mail: [email protected]

Summary

A robot working in a hostile environment should be equipped with the necessary risk-avoidance intelligence to survive and accomplish an assigned mission. Covert robotics is a relatively new field in which covert navigation abilities are developed for robots to carry out a mission with minimal potential observation from known or unknown vantage points, with occluding obstacles as the only means of maintaining covertness. The ability to ‘hide’ in order to minimize the risk of being detected is the focus of this paper. A number of strategies are presented that deal with various assumptions about the environment and the hostile observers' locations. The hiding strategies presented for different cases ensure choosing a proper hiding point while taking into account the risk of the chosen path to it.

Type
Articles
Copyright
Copyright © Cambridge University Press 2014 

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

1.Teng, Y., DeMenthon, D. and Davis, L.. “Stealth terrain navigation,” IEEE Trans Syst. Man Cybern. 23 (1), 96110 (1993).CrossRefGoogle Scholar
2.Marzouqi, M. and Jarvis, R., “Covert Path Planning for Autonomous Robot Navigation in Known Environments,” Australasian Conference on Robotics and Automation (ACRA), Brisbane (2003).Google Scholar
3.Birgesson, E., Howard, A. and Sukhatme, G., “Towards Stealthy Behaviors,” IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), Las Vegas (Oct. 2003) pp. 17031708.Google Scholar
4.Tews, A., Sukhatme, G. and Mataric, M., “A Multi-Robot Approach to Stealthy Navigation in the Presence of an Observer,” IEEE International Conference on Robotics and Automation New Orleans, LA (2004) pp. 23792385.Google Scholar
5.Tews, A., Mataric, M. and Sukhatme, G., “Avoiding Detection in a Dynamic Environment,” The International Conference on Intelligent Robots and Systems, Sendai, Japan (2004).Google Scholar
6.Marzouqi, M. and Jarvis, R., “Covert Path Planning in Unknown Environment with Known or Suspected Sentry Location,” IEEE/RSJ International Conferernce on Intelligent Robots and Systems (IROS), Canada (Aug. 2005).Google Scholar
7.Marzouqi, M. and Jarvis, R., “Covert Robotics: Covert Path Planning in Unknown Environments,” Australasian Conference on Robotics and Automation (ACRA), Canberra (Dec. 2004).Google Scholar
8.Page, D., Koschan, A., Abidi, M. and Overholt, J., “Ridge-Valley Path Planning for 3-D Terrains,” IEEE International Conference on Robotics and Automation, pp. 119–124 (May, 2006).Google Scholar
9.Geraerts, R. and Schager, E., “Stealth-Based Path Planning using Corridor Maps,” Computer Animation and Social Agents (CASA) (2010).Google Scholar
10.Ravela, S., Weiss, R., Draper, B., Pinette, B., Hanson, A. and Riseman, E., “Stealth Navigation: Planning and Behaviors,” ARPA Image Understanding Workshop, Monterey, CA (1994) pp. 10931100.Google Scholar
11.Cook, D., Gmytrasiewicz, P. and Holder, L.. “Decision-theoretic cooperative sensor planning,” IEEE Trans. Pattern Anal. Mach. Intell. 18 (10), 10131023 (1996).CrossRefGoogle Scholar
12.Bandyopadhyay, T., Li, Y., Ang, M. H. Jr. and Hsul, D., “Stealth Tracking of an Unpredictable Target Among Obstacles,” International Workshop on the Algorithmic Foundations of Robotics, Netherlands (2004).Google Scholar
13.Marzouqi, M. and Jarvis, R., “Accommodating Uncertainty in Covert and Overt Robot Path Planning,” IEEE TENCON (IEEE International Region 10 Conference), Melbourne, Australia (Nov. 2005).Google Scholar
14.Marzouqi, M. S. and Jarvis, R. A., “New visibility-based path-planning approach for covert robotic navigation,” J. Robot. 24 (6), 759773 (Nov. 2006). Published online by Cambridge University Press 08 Aug 2006.CrossRefGoogle Scholar
15.Markov, S. and Carpin, S., “A Cooperative Distributed Approach to Target Motion Control in Multi Robot Observation of Multiple Targets,” IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), USA (2007).Google Scholar
16.Park, J.-H., Choi, J.-S., Kim, J. and Lee, B. H., “Roadmap-Based Stealth Navigation for Intercepting an Invader”, IEEE International Conference on Robotics and Automation (ICRA), Kobe, Japan (May 12–17, 2009).Google Scholar
17.Marzouqi, M. S. and Jarvis, R. A., “Robotic Covert Path Planning: A Survey,” accepted for publication in the 5th IEEE International Conference on Robotics, Automation and Mechatronics (RAM), Qingdao, China (Sep. 17–19, 2011).Google Scholar
18.Rybski, P., Stoeter, S., Erickson, M., Gini, M., Hougen, D. and Papanikolopoulos, N., “A Team of Robotic Agents for Surveillance,” The Fourth International Conference on Autonomous Agents (ACM), pp. 9–16 (2000).CrossRefGoogle Scholar
19.Kratochvil, B., Implementation of Scout Behaviors Using Analog Sensing Methods, Technical Report, no. 03-044 (University of Minnesota, 2003).Google Scholar
20.Vaughan, R., Sukhatme, G., Mesa-Martinez, F. and Montgomery, J., “Fly spy: Lightweight localization and target tracking for cooperating air and ground robots,” Distrib. Auton. Robot. Syst. 4, 315324 (2000).Google Scholar
21.Mathews, Z., Lechon, M., Calvo, J. M. B., Dhir, A., Duff, A., Bermudez i Badia, S. and Verschure, P. F. M. J., “Insect-Like Mapless Navigation Based on Head Direction Cells and Contextual Learning Using Chemo-Visual Sensors,” IEEE/RSJ International Conference on Intelligent Robots and Systems, 2009. IROS 2009 (Oct. 10–15, 2009) pp. 2243–2250.CrossRefGoogle Scholar
22.Green, W. E., Oh, P. Y. and Barrows, G., “Flying Insect Inspired Vision for Autonomous Aerial Robot Maneuvers in Near-Earth Environments,” Proceedings. ICRA ‘04. 2004 IEEE International Conference on Robotics and Automation, 2004, vol. 3 (26 April-1 May, 2004) pp. 2347–2352.Google Scholar
23.LaValle, S. and Hinrichsen, J., “Visibility Based Pursuit-Evasion: An Extension to Curved Environments,” IEEE International Conference for Robotics and Automation (1999).Google Scholar
24.Vidal, R., Rashid, S., Sharp, C., Shakernia, O., Kim, J. and Sastry, S., “Pursuit Evasion Games with Unmanned Ground and Aerial Vehicles,” IEEE International Conference of Robotics and Automation (2001) pp. 2948–2955.Google Scholar
25.Murrieta-Cid, R., Gonzalez, H. and Tovar, B., “A Reactive Motion Planner to Maintain Visibility of Unpredictable Targets,” IEEE International Conference on Robotics and Automation (2002).Google Scholar
26.Kolling, A. and Carpin, S., “Multi-Robot Pursuit-Evasion without Maps,” IEEE International Conference on Robotics and Automation (ICRA), 2010 (May 3–7, 2010) pp. 3045–3051.CrossRefGoogle Scholar
27.Katsev, M., Yershova, A., Tovar, B., Ghrist, R., LaValle, S. M., “Mapping and pursuit-evasion strategies for a simple wall-following robot,” IEEE Trans. Robot. 27 (1), 113128 (Feb. 2011).CrossRefGoogle Scholar
28.Mann, K., “Evolving robot behavior to play hide and seek”, J. Comput. Small Colleges Arch. 18, 257258 (May, 2003).Google Scholar
29.Marzouqi, M. and Jarvis, R., “Covert Robotics: Hiding in Known Environments,” IEEE Conference on Robotics, Automation and Mechatronics (RAM), Singapore (Dec. 2004).Google Scholar
30.Marzouqi, M. and Jarvis, R., “Enhancing Self Covertness in a Hostile Environment from Expected Observers at Unknown Locations,” The 9th International Conference on Intelligent Autonomous Systems (IAS-9), Intelligent Autonomous Systems 9, IOS press, Tokyo (2006) pp. 189196.Google Scholar
31.Jarvis, R. A., “Collision-Free Path Trajectory using Distance Transforms,” National Conference and Exhibition on Robotics, Melbourne (Aug. 1984). Also in Mechanical Engineering Transactions, Journal of the Institution of Engineers, Australia (1985).Google Scholar