-
Verification and Validation of a Vision-Based Landing System for Autonomous VTOL Air Taxis
Authors:
Ayoosh Bansal,
Duo Wang,
Mikael Yeghiazaryan,
Yangge Li,
Chuyuan Tao,
Hyung-Jin Yoon,
Prateek Arora,
Christos Papachristos,
Petros Voulgaris,
Sayan Mitra,
Lui Sha,
Naira Hovakimyan
Abstract:
Autonomous air taxis are poised to revolutionize urban mass transportation, however, ensuring their safety and reliability remains an open challenge. Validating autonomy solutions on air taxis in the real world presents complexities, risks, and costs that further convolute this challenge. Verification and Validation (V&V) frameworks play a crucial role in the design and development of highly relia…
▽ More
Autonomous air taxis are poised to revolutionize urban mass transportation, however, ensuring their safety and reliability remains an open challenge. Validating autonomy solutions on air taxis in the real world presents complexities, risks, and costs that further convolute this challenge. Verification and Validation (V&V) frameworks play a crucial role in the design and development of highly reliable systems by formally verifying safety properties and validating algorithm behavior across diverse operational scenarios. Advancements in high-fidelity simulators have significantly enhanced their capability to emulate real-world conditions, encouraging their use for validating autonomous air taxi solutions, especially during early development stages. This evolution underscores the growing importance of simulation environments, not only as complementary tools to real-world testing but as essential platforms for evaluating algorithms in a controlled, reproducible, and scalable manner.
This work presents a V&V framework for a vision-based landing system for air taxis with vertical take-off and landing (VTOL) capabilities. Specifically, we use Verse, a tool for formal verification, to model and verify the safety of the system by obtaining and analyzing the reachable sets. To conduct this analysis, we utilize a photorealistic simulation environment. The simulation environment, built on Unreal Engine, provides realistic terrain, weather, and sensor characteristics to emulate real-world conditions with high fidelity. To validate the safety analysis results, we conduct extensive scenario-based testing to assess the reachability set and robustness of the landing algorithm in various conditions. This approach showcases the representativeness of high-fidelity simulators, offering an effective means to analyze and refine algorithms before real-world deployment.
△ Less
Submitted 11 December, 2024;
originally announced December 2024.
-
Bayesian Data Augmentation and Training for Perception DNN in Autonomous Aerial Vehicles
Authors:
Ashik E Rasul,
Humaira Tasnim,
Hyung-Jin Yoon,
Ayoosh Bansal,
Duo Wang,
Naira Hovakimyan,
Lui Sha,
Petros Voulgaris
Abstract:
Learning-based solutions have enabled incredible capabilities for autonomous systems. Autonomous vehicles, both aerial and ground, rely on DNN for various integral tasks, including perception. The efficacy of supervised learning solutions hinges on the quality of the training data. Discrepancies between training data and operating conditions result in faults that can lead to catastrophic incidents…
▽ More
Learning-based solutions have enabled incredible capabilities for autonomous systems. Autonomous vehicles, both aerial and ground, rely on DNN for various integral tasks, including perception. The efficacy of supervised learning solutions hinges on the quality of the training data. Discrepancies between training data and operating conditions result in faults that can lead to catastrophic incidents. However, collecting vast amounts of context-sensitive data, with broad coverage of possible operating environments, is prohibitively difficult. Synthetic data generation techniques for DNN allow for the easy exploration of diverse scenarios. However, synthetic data generation solutions for aerial vehicles are still lacking.
This work presents a data augmentation framework for aerial vehicle's perception training, leveraging photorealistic simulation integrated with high-fidelity vehicle dynamics. Safe landing is a crucial challenge in the development of autonomous air taxis, therefore, landing maneuver is chosen as the focus of this work. With repeated simulations of landing in varying scenarios we assess the landing performance of the VTOL type UAV and gather valuable data. The landing performance is used as the objective function to optimize the DNN through retraining. Given the high computational cost of DNN retraining, we incorporated Bayesian Optimization in our framework that systematically explores the data augmentation parameter space to retrain the best-performing models. The framework allowed us to identify high-performing data augmentation parameters that are consistently effective across different landing scenarios. Utilizing the capabilities of this data augmentation framework, we obtained a robust perception model. The model consistently improved the perception-based landing success rate by at least 20% under different lighting and weather conditions.
△ Less
Submitted 10 December, 2024;
originally announced December 2024.
-
Backup Plan Constrained Model Predictive Control with Guaranteed Stability
Authors:
Ran Tao,
Hunmin Kim,
Hyung-Jin Yoon,
Wenbin Wan,
Naira Hovakimyan,
Lui Sha,
Petros Voulgaris
Abstract:
This article proposes and evaluates a new safety concept called backup plan safety for path planning of autonomous vehicles under mission uncertainty using model predictive control (MPC). Backup plan safety is defined as the ability to complete an alternative mission when the primary mission is aborted. To include this new safety concept in control problems, we formulate a feasibility maximization…
▽ More
This article proposes and evaluates a new safety concept called backup plan safety for path planning of autonomous vehicles under mission uncertainty using model predictive control (MPC). Backup plan safety is defined as the ability to complete an alternative mission when the primary mission is aborted. To include this new safety concept in control problems, we formulate a feasibility maximization problem aiming to maximize the feasibility of the primary and alternative missions. The feasibility maximization problem is based on multi-objective MPC, where each objective (cost function) is associated with a different mission and balanced by a weight vector. Furthermore, the feasibility maximization problem incorporates additional control input horizons toward the alternative missions on top of the control input horizon toward the primary mission, denoted as multi-horizon inputs, to evaluate the cost for each mission. We develop the backup plan constrained MPC algorithm, which designs the weight vector that ensures asymptotic stability of the closed-loop system, and generates the optimal control input by solving the feasibility maximization problem with computational efficiency. The performance of the proposed algorithm is validated through simulations of a UAV path planning problem.
△ Less
Submitted 6 October, 2023; v1 submitted 9 June, 2023;
originally announced June 2023.
-
An Information-Theoretic Analysis of Discrete-Time Control and Filtering Limitations by the I-MMSE Relationships
Authors:
Neng Wan,
Dapeng Li,
Naira Hovakimyan,
Petros G. Voulgaris
Abstract:
Fundamental limitations or performance trade-offs/limits are important properties and constraints of both control and filtering systems. Among various trade-off metrics, total information rate that characterizes the sensitivity trade-offs and time-averaged performance of control and filtering systems was conventionally studied by using the differential entropy rate and Kolmogorov-Bode formula. In…
▽ More
Fundamental limitations or performance trade-offs/limits are important properties and constraints of both control and filtering systems. Among various trade-off metrics, total information rate that characterizes the sensitivity trade-offs and time-averaged performance of control and filtering systems was conventionally studied by using the differential entropy rate and Kolmogorov-Bode formula. In this paper, by extending the famous I-MMSE (mutual information -- minimum mean-square error) relationships to the discrete-time additive white Gaussian channels with and without feedback, a new paradigm is introduced to estimate and analyze total information rate as a control and filtering trade-off metric. Under this framework, we explore the trade-off properties of total information rate for a variety of the discrete-time control and filtering systems, e.g., LTI, LTV, and nonlinear, and propose an alternative approach to investigate total information rate via optimal estimation.
△ Less
Submitted 17 March, 2025; v1 submitted 18 April, 2023;
originally announced April 2023.
-
Learning When to Use Adaptive Adversarial Image Perturbations against Autonomous Vehicles
Authors:
Hyung-Jin Yoon,
Hamidreza Jafarnejadsani,
Petros Voulgaris
Abstract:
The deep neural network (DNN) models for object detection using camera images are widely adopted in autonomous vehicles. However, DNN models are shown to be susceptible to adversarial image perturbations. In the existing methods of generating the adversarial image perturbations, optimizations take each incoming image frame as the decision variable to generate an image perturbation. Therefore, give…
▽ More
The deep neural network (DNN) models for object detection using camera images are widely adopted in autonomous vehicles. However, DNN models are shown to be susceptible to adversarial image perturbations. In the existing methods of generating the adversarial image perturbations, optimizations take each incoming image frame as the decision variable to generate an image perturbation. Therefore, given a new image, the typically computationally-expensive optimization needs to start over as there is no learning between the independent optimizations. Very few approaches have been developed for attacking online image streams while considering the underlying physical dynamics of autonomous vehicles, their mission, and the environment. We propose a multi-level stochastic optimization framework that monitors an attacker's capability of generating the adversarial perturbations. Based on this capability level, a binary decision attack/not attack is introduced to enhance the effectiveness of the attacker. We evaluate our proposed multi-level image attack framework using simulations for vision-guided autonomous vehicles and actual tests with a small indoor drone in an office environment. The results show our method's capability to generate the image attack in real-time while monitoring when the attacker is proficient given state estimates.
△ Less
Submitted 15 March, 2023; v1 submitted 27 December, 2022;
originally announced December 2022.
-
Multi-time Predictions of Wildfire Grid Map using Remote Sensing Local Data
Authors:
Hyung-Jin Yoon,
Petros Voulgaris
Abstract:
Due to recent climate changes, we have seen more frequent and severe wildfires in the United States. Predicting wildfires is critical for natural disaster prevention and mitigation. Advances in technologies in data processing and communication enabled us to access remote sensing data. With the remote sensing data, valuable spatiotemporal statistical models can be created and used for resource mana…
▽ More
Due to recent climate changes, we have seen more frequent and severe wildfires in the United States. Predicting wildfires is critical for natural disaster prevention and mitigation. Advances in technologies in data processing and communication enabled us to access remote sensing data. With the remote sensing data, valuable spatiotemporal statistical models can be created and used for resource management practices. This paper proposes a distributed learning framework that shares local data collected in ten locations in the western USA throughout the local agents. The local agents aim to predict wildfire grid maps one, two, three, and four weeks in advance while online processing the remote sensing data stream. The proposed model has distinct features that address the characteristic need in prediction evaluations, including dynamic online estimation and time-series modeling. Local fire event triggers are not isolated between locations, and there are confounding factors when local data is analyzed due to incomplete state observations. Compared to existing approaches that do not account for incomplete state observation within wildfire time-series data, on average, we can achieve higher prediction performance.
△ Less
Submitted 15 September, 2022;
originally announced September 2022.
-
Distributed Primal-dual Optimization for Heterogeneous Multi-agent Systems
Authors:
Yichuan Li,
Petros Voulgaris,
Nikolaos M. Freris
Abstract:
Heterogeneous networks comprise agents with varying capabilities in terms of computation, storage, and communication. In such settings, it is crucial to factor in the operating characteristics in allowing agents to choose appropriate updating schemes, so as to better distribute computational tasks and utilize the network more efficiently. We consider the multi-agent optimization problem of coopera…
▽ More
Heterogeneous networks comprise agents with varying capabilities in terms of computation, storage, and communication. In such settings, it is crucial to factor in the operating characteristics in allowing agents to choose appropriate updating schemes, so as to better distribute computational tasks and utilize the network more efficiently. We consider the multi-agent optimization problem of cooperatively minimizing the sum of local strongly convex objectives. We propose an asynchronous distributed primal-dual protocol, which allows for the primal update steps to be agent-dependent (an agent can opt between first-order or Newton updates). Our analysis introduces a unifying framework for such hybrid optimization scheme and establishes global linear convergence in expectation, under strongly convex objectives and general agent activation schemes. Numerical experiments on real life datasets attest to the merits of the proposed algorithm.
△ Less
Submitted 2 September, 2022;
originally announced September 2022.
-
Path Integral Methods with Stochastic Control Barrier Functions
Authors:
Chuyuan Tao,
Hyung-Jin Yoon,
Hunmin Kim,
Naira Hovakimyan,
Petros Voulgaris
Abstract:
Safe control designs for robotic systems remain challenging because of the difficulties of explicitly solving optimal control with nonlinear dynamics perturbed by stochastic noise. However, recent technological advances in computing devices enable online optimization or sampling-based methods to solve control problems. For example, Control Barrier Functions (CBFs), a Lyapunov-like control algorith…
▽ More
Safe control designs for robotic systems remain challenging because of the difficulties of explicitly solving optimal control with nonlinear dynamics perturbed by stochastic noise. However, recent technological advances in computing devices enable online optimization or sampling-based methods to solve control problems. For example, Control Barrier Functions (CBFs), a Lyapunov-like control algorithm, have been proposed to numerically solve convex optimizations that determine control input to stay in the safe set. Model Predictive Path Integral (MPPI) uses forward sampling of stochastic differential equations to solve optimal control problems online. Both control algorithms are widely used for nonlinear systems because they avoid calculating the derivatives of the nonlinear dynamic function. In this paper, we utilize Stochastic Control Barrier Functions (SCBFs) constraints to limit sample regions in the sample-based algorithm, ensuring safety in a probabilistic sense and improving sample efficiency with a stochastic differential equation. We provide a sampling complexity analysis for the required sample size of our algorithm and show that our algorithm needs fewer samples than the original MPPI algorithm does. Finally, we apply our algorithm to a path planning problem in a cluttered environment and compare the performance of the algorithms.
△ Less
Submitted 23 June, 2022;
originally announced June 2022.
-
Communication Efficient Curvature Aided Primal-dual Algorithms for Decentralized Optimization
Authors:
Yichuan Li,
Petros G. Voulgaris,
Dusan M. Stipanovic,
Nikolaos M. Freris
Abstract:
This paper presents a family of algorithms for decentralized convex composite problems. We consider the setting of a network of agents that cooperatively minimize a global objective function composed of a sum of local functions plus a regularizer. Through the use of intermediate consensus variables, we remove the need for inner communication loops between agents when computing curvature-guided upd…
▽ More
This paper presents a family of algorithms for decentralized convex composite problems. We consider the setting of a network of agents that cooperatively minimize a global objective function composed of a sum of local functions plus a regularizer. Through the use of intermediate consensus variables, we remove the need for inner communication loops between agents when computing curvature-guided updates. A general scheme is presented which unifies the analysis for a plethora of computing choices, including gradient descent, Newton updates, and BFGS updates. Our analysis establishes sublinear convergence rates under convex objective functions with Lipschitz continuous gradients, as well as linear convergence rates when the local functions are further assumed to be strongly convex. Moreover, we explicitly characterize the acceleration due to curvature information. Last but not the least, we present an asynchronous implementation for the proposed algorithms, which removes the need for a central clock, with linear convergence rates established in expectation under strongly convex objectives. We ascertain the effectiveness of the proposed methods with numerical experiments on benchmark datasets.
△ Less
Submitted 10 February, 2023; v1 submitted 13 April, 2022;
originally announced April 2022.
-
Sampling Complexity of Path Integral Methods for Trajectory Optimization
Authors:
Hyung-Jin Yoon,
Chuyuan Tao,
Hunmin Kim,
Naira Hovakimyan,
Petros Voulgaris
Abstract:
The use of random sampling in decision-making and control has become popular with the ease of access to graphic processing units that can generate and calculate multiple random trajectories for real-time robotic applications. In contrast to sequential optimization, the sampling-based method can take advantage of parallel computing to maintain constant control loop frequencies. Inspired by its wide…
▽ More
The use of random sampling in decision-making and control has become popular with the ease of access to graphic processing units that can generate and calculate multiple random trajectories for real-time robotic applications. In contrast to sequential optimization, the sampling-based method can take advantage of parallel computing to maintain constant control loop frequencies. Inspired by its wide applicability in robotic applications, we calculate a sampling complexity result applicable to general nonlinear systems considered in the path integral method, which is a sampling-based method. The result determines the required number of samples to satisfy the given error bounds of the estimated control signal from the optimal value with the predefined risk probability. The sampling complexity result shows that the variance of the estimated control value is upper-bounded in terms of the expectation of the cost. Then we apply the result to a linear time-varying dynamical system with quadratic cost and an indicator function cost to avoid constraint sets.
△ Less
Submitted 18 March, 2022;
originally announced March 2022.
-
A Communication Efficient Quasi-Newton Method for Large-scale Distributed Multi-agent Optimization
Authors:
Yichuan Li,
Petros G. Voulgaris,
Nikolaos M. Freris
Abstract:
We propose a communication efficient quasi-Newton method for large-scale multi-agent convex composite optimization. We assume the setting of a network of agents that cooperatively solve a global minimization problem with strongly convex local cost functions augmented with a non-smooth convex regularizer. By introducing consensus variables, we obtain a block-diagonal Hessian and thus eliminate the…
▽ More
We propose a communication efficient quasi-Newton method for large-scale multi-agent convex composite optimization. We assume the setting of a network of agents that cooperatively solve a global minimization problem with strongly convex local cost functions augmented with a non-smooth convex regularizer. By introducing consensus variables, we obtain a block-diagonal Hessian and thus eliminate the need for additional communication when approximating the objective curvature information. Moreover, we reduce computational costs of existing primal-dual quasi-Newton methods from $\mathcal{O}(d^3)$ to $\mathcal{O}(cd)$ by storing $c$ pairs of vectors of dimension $d$. An asynchronous implementation is presented that removes the need for coordination. Global linear convergence rate in expectation is established, and we demonstrate the merit of our algorithm numerically with real datasets.
△ Less
Submitted 16 February, 2022; v1 submitted 10 January, 2022;
originally announced January 2022.
-
Learning Wildfire Model from Incomplete State Observations
Authors:
Alissa Chavalithumrong,
Hyung-Jin Yoon,
Petros Voulgaris
Abstract:
As wildfires are expected to become more frequent and severe, improved prediction models are vital to mitigating risk and allocating resources. With remote sensing data, valuable spatiotemporal statistical models can be created and used for resource management practices. In this paper, we create a dynamic model for future wildfire predictions of five locations within the western United States thro…
▽ More
As wildfires are expected to become more frequent and severe, improved prediction models are vital to mitigating risk and allocating resources. With remote sensing data, valuable spatiotemporal statistical models can be created and used for resource management practices. In this paper, we create a dynamic model for future wildfire predictions of five locations within the western United States through a deep neural network via historical burned area and climate data. The proposed model has distinct features that address the characteristic need in prediction evaluations, including dynamic online estimation and time-series modeling. Between locations, local fire event triggers are not isolated, and there are confounding factors when local data is analyzed due to incomplete state observations. When compared to existing approaches that do not account for incomplete state observation within wildfire time-series data, on average, we are able to achieve higher prediction performances.
△ Less
Submitted 27 November, 2021;
originally announced November 2021.
-
Control Barrier Function Augmentation in Sampling-based Control Algorithm for Sample Efficiency
Authors:
Chuyuan Tao,
Hunmin Kim,
Hyungjin Yoon,
Naira Hovakimyan,
Petros Voulgaris
Abstract:
For a nonlinear stochastic path planning problem, sampling-based algorithms generate thousands of random sample trajectories to find the optimal path while guaranteeing safety by Lagrangian penalty methods. However, the sampling-based algorithm can perform poorly in obstacle-rich environments because most samples might violate safety constraints, invalidating the corresponding samples. To improve…
▽ More
For a nonlinear stochastic path planning problem, sampling-based algorithms generate thousands of random sample trajectories to find the optimal path while guaranteeing safety by Lagrangian penalty methods. However, the sampling-based algorithm can perform poorly in obstacle-rich environments because most samples might violate safety constraints, invalidating the corresponding samples. To improve the sample efficiency of sampling-based algorithms in cluttered environments, we propose an algorithm based on model predictive path integral control and control barrier functions. The proposed algorithm needs fewer samples and time-steps and has a better performance in cluttered environments compared to the original model predictive path integral control algorithm.
△ Less
Submitted 12 November, 2021;
originally announced November 2021.
-
Accelerated Almost-Sure Convergence Rates for Nonconvex Stochastic Gradient Descent using Stochastic Learning Rates
Authors:
Theodoros Mamalis,
Dusan Stipanovic,
Petros Voulgaris
Abstract:
Large-scale optimization problems require algorithms both effective and efficient. One such popular and proven algorithm is Stochastic Gradient Descent which uses first-order gradient information to solve these problems. This paper studies almost-sure convergence rates of the Stochastic Gradient Descent method when instead of deterministic, its learning rate becomes stochastic. In particular, its…
▽ More
Large-scale optimization problems require algorithms both effective and efficient. One such popular and proven algorithm is Stochastic Gradient Descent which uses first-order gradient information to solve these problems. This paper studies almost-sure convergence rates of the Stochastic Gradient Descent method when instead of deterministic, its learning rate becomes stochastic. In particular, its learning rate is equipped with a multiplicative stochasticity, producing a stochastic learning rate scheme. Theoretical results show accelerated almost-sure convergence rates of Stochastic Gradient Descent in a nonconvex setting when using an appropriate stochastic learning rate, compared to a deterministic-learning-rate scheme. The theoretical results are verified empirically.
△ Less
Submitted 9 November, 2021; v1 submitted 25 October, 2021;
originally announced October 2021.
-
Stochastic Learning Rate Optimization in the Stochastic Approximation and Online Learning Settings
Authors:
Theodoros Mamalis,
Dusan Stipanovic,
Petros Voulgaris
Abstract:
In this work, multiplicative stochasticity is applied to the learning rate of stochastic optimization algorithms, giving rise to stochastic learning-rate schemes. In-expectation theoretical convergence results of Stochastic Gradient Descent equipped with this novel stochastic learning rate scheme under the stochastic setting, as well as convergence results under the online optimization settings ar…
▽ More
In this work, multiplicative stochasticity is applied to the learning rate of stochastic optimization algorithms, giving rise to stochastic learning-rate schemes. In-expectation theoretical convergence results of Stochastic Gradient Descent equipped with this novel stochastic learning rate scheme under the stochastic setting, as well as convergence results under the online optimization settings are provided. Empirical results consider the case of an adaptively uniformly distributed multiplicative stochasticity and include not only Stochastic Gradient Descent, but also other popular algorithms equipped with a stochastic learning rate. They demonstrate noticeable optimization performance gains, with respect to their deterministic-learning-rate versions.
△ Less
Submitted 21 March, 2022; v1 submitted 20 October, 2021;
originally announced October 2021.
-
BFGS-ADMM for Large-Scale Distributed Optimization
Authors:
Yichuan Li,
Yonghai Gong,
Nikolaos M. Freris,
Petros Voulgaris,
Dusan Stipanovic
Abstract:
We consider a class of distributed optimization problem where the objective function consists of a sum of strongly convex and smooth functions and a (possibly nonsmooth) convex regularizer. A multi-agent network is assumed, where each agent holds a private cost function and cooperates with its neighbors to compute the optimum of the aggregate objective. We propose a quasi-Newton Alternating Direct…
▽ More
We consider a class of distributed optimization problem where the objective function consists of a sum of strongly convex and smooth functions and a (possibly nonsmooth) convex regularizer. A multi-agent network is assumed, where each agent holds a private cost function and cooperates with its neighbors to compute the optimum of the aggregate objective. We propose a quasi-Newton Alternating Direction Method of Multipliers (ADMM) where the primal update is solved inexactly with approximated curvature information. By introducing an intermediate consensus variable, we achieve a block diagonal Hessian which eliminates the need for inner communication loops within the network when computing the update direction. We establish global linear convergence to the optimal primal-dual solution without the need for backtracking line search, under the assumption that component cost functions are strongly convex with Lipschitz continuous gradients. Numerical simulations on real datasets demonstrate the advantages of the proposed method over state of the art.
△ Less
Submitted 29 September, 2021;
originally announced September 2021.
-
Time Coordination of Multiple UAVs over Switching Communication Networks with Digraph Topologies
Authors:
Hyungsoo Kang,
Hyung-Jin Yoon,
Venanzio Cichella,
Naira Hovakimyan,
Petros Voulgaris
Abstract:
This paper presents a time-coordination algorithm for multiple UAVs executing cooperative missions. Unlike previous algorithms, it does not rely on the assumption that the communication between UAVs is bidirectional. Thus, the topology of the inter-UAV information flow can be characterized by digraphs. To achieve coordination with weak connectivity, we design a switching law that orchestrates swit…
▽ More
This paper presents a time-coordination algorithm for multiple UAVs executing cooperative missions. Unlike previous algorithms, it does not rely on the assumption that the communication between UAVs is bidirectional. Thus, the topology of the inter-UAV information flow can be characterized by digraphs. To achieve coordination with weak connectivity, we design a switching law that orchestrates switching between jointly connected digraph topologies. In accordance with the law, the UAVs with a transmitter switch the topology of their coordination information flow. A Lyapunov analysis shows that a decentralized coordination controller steers coordination errors to a neighborhood of zero. Simulation results illustrate that the algorithm attains coordination objectives with significantly reduced inter-UAV communication compared to previous work.
△ Less
Submitted 12 April, 2022; v1 submitted 29 September, 2021;
originally announced September 2021.
-
DN-ADMM: Distributed Newton ADMM for Multi-agent Optimization
Authors:
Yichuan Li,
Nikolaos M. Freris,
Petros Voulgaris,
Dusan Stipanovic
Abstract:
In a multi-agent network, we consider the problem of minimizing an objective function that is expressed as the sum of private convex and smooth functions, and a (possibly) non-differentiable convex regularizer. We propose a novel distributed second-order method based on the framework of Alternating Direction Method of Multipliers (ADMM), by invoking approximate Newton iterations to the primal upda…
▽ More
In a multi-agent network, we consider the problem of minimizing an objective function that is expressed as the sum of private convex and smooth functions, and a (possibly) non-differentiable convex regularizer. We propose a novel distributed second-order method based on the framework of Alternating Direction Method of Multipliers (ADMM), by invoking approximate Newton iterations to the primal update corresponding to the differentiable part. In order to achieve a distributed implementation, the total Hessian matrix is split into a diagonal component (locally computable) and an off-diagonal component (that requires communication between neighboring agents). Subsequently, the Hessian inverse is approximated by a truncation of the Taylor expansion to $K$ terms: this amounts to fully distributed updates entailing $K$ distributed communication rounds. We establish global linear convergence to the primal-dual optimal solution under the assumption that the private functions are strongly convex and have Lipschitz continuous gradient. Numerical experiments demonstrate the merits of the approach comparatively with state-of-the-art methods.
△ Less
Submitted 29 September, 2021;
originally announced September 2021.
-
Constrained Attack-Resilient Estimation of Stochastic Cyber-Physical Systems
Authors:
Wenbin Wan,
Hunmin Kim,
Naira Hovakimyan,
Petros Voulgaris
Abstract:
In this paper, a constrained attack-resilient estimation algorithm (CARE) is developed for stochastic cyber-physical systems. The proposed CARE can simultaneously estimate the compromised system states and attack signals. It has improved estimation accuracy and attack detection performance when physical constraints and operational limitations are available. In particular, CARE is designed for simu…
▽ More
In this paper, a constrained attack-resilient estimation algorithm (CARE) is developed for stochastic cyber-physical systems. The proposed CARE can simultaneously estimate the compromised system states and attack signals. It has improved estimation accuracy and attack detection performance when physical constraints and operational limitations are available. In particular, CARE is designed for simultaneous input and state estimation that provides minimum-variance unbiased estimates, and these estimates are projected onto the constrained space restricted by inequality constraints subsequently. We prove that the estimation errors and their covariances from CARE are less than those from unconstrained algorithms and confirm that this property can further reduce the false negative rate in attack detection. We show that estimation errors of CARE are practically exponentially stable in mean square. Finally, an illustrative example of attacks on a vehicle is given to demonstrate the improved estimation accuracy and detection performance compared to an existing unconstrained algorithm.
△ Less
Submitted 10 October, 2022; v1 submitted 24 September, 2021;
originally announced September 2021.
-
Learning Image Attacks toward Vision Guided Autonomous Vehicles
Authors:
Hyung-Jin Yoon,
Hamidreza Jafarnejadsani,
Petros Voulgaris
Abstract:
While adversarial neural networks have been shown successful for static image attacks, very few approaches have been developed for attacking online image streams while taking into account the underlying physical dynamics of autonomous vehicles, their mission, and environment. This paper presents an online adversarial machine learning framework that can effectively misguide autonomous vehicles' mis…
▽ More
While adversarial neural networks have been shown successful for static image attacks, very few approaches have been developed for attacking online image streams while taking into account the underlying physical dynamics of autonomous vehicles, their mission, and environment. This paper presents an online adversarial machine learning framework that can effectively misguide autonomous vehicles' missions. In the existing image attack methods devised toward autonomous vehicles, optimization steps are repeated for every image frame. This framework removes the need for fully converged optimization at every frame to realize image attacks in real-time. Using reinforcement learning, a generative neural network is trained over a set of image frames to obtain an attack policy that is more robust to dynamic and uncertain environments. A state estimator is introduced for processing image streams to reduce the attack policy's sensitivity to physical variables such as unknown position and velocity. A simulation study is provided to validate the results.
△ Less
Submitted 17 May, 2021; v1 submitted 9 May, 2021;
originally announced May 2021.
-
Backup Plan Constrained Model Predictive Control
Authors:
Hunmin Kim,
Hyungjin Yoon,
Wenbin Wan,
Naira Hovakimyan,
Lui Sha,
Petros Voulgaris
Abstract:
This article proposes a new safety concept: backup plan safety. The backup plan safety is defined as the ability to complete one of the alternative missions in the case of primary mission abortion. To incorporate this new safety concept in control problems, we formulate a feasibility maximization problem that adopts additional (virtual) input horizons toward the alternative missions on top of the…
▽ More
This article proposes a new safety concept: backup plan safety. The backup plan safety is defined as the ability to complete one of the alternative missions in the case of primary mission abortion. To incorporate this new safety concept in control problems, we formulate a feasibility maximization problem that adopts additional (virtual) input horizons toward the alternative missions on top of the input horizon toward the primary mission. Cost functions for the primary and alternative missions construct multiple objectives, and multi-horizon inputs evaluate them. To address the feasibility maximization problem, we develop a multi-horizon multi-objective model predictive path integral control (3M) algorithm. Model predictive path integral control (MPPI) is a sampling-based scheme that can help the proposed algorithm deal with nonlinear dynamic systems and achieve computational efficiency by parallel computation. Simulations of the aerial vehicle and ground vehicle control problems demonstrate the new concept of backup plan safety and the performance of the proposed algorithm.
△ Less
Submitted 27 March, 2021;
originally announced March 2021.
-
Estimation and Planning of Exploration Over Grid Map Using A Spatiotemporal Model with Incomplete State Observations
Authors:
Hyung-Jin Yoon,
Hunmin Kim,
Kripash Shrestha,
Naira Hovakimyan,
Petros Voulgaris
Abstract:
Path planning over spatiotemporal models can be applied to a variety of applications such as UAVs searching for spreading wildfire in mountains or network of balloons in time-varying atmosphere deployed for inexpensive internet service. A notable aspect in such applications is the dynamically changing environment. However, path planning algorithms often assume static environments and only consider…
▽ More
Path planning over spatiotemporal models can be applied to a variety of applications such as UAVs searching for spreading wildfire in mountains or network of balloons in time-varying atmosphere deployed for inexpensive internet service. A notable aspect in such applications is the dynamically changing environment. However, path planning algorithms often assume static environments and only consider the vehicle's dynamics exploring the environment. We present a spatiotemporal model that uses a cross-correlation operator to consider spatiotemporal dependence. Also, we present an adaptive state estimator for path planning. Since the state estimation depends on the vehicle's path, the path planning needs to consider the trade-off between exploration and exploitation. We use a high-level decision-maker to choose an explorative path or an exploitative path. The overall proposed framework consists of an adaptive state estimator, a short-term path planner, and a high-level decision-maker. We tested the framework with a spatiotemporal model simulation where the state of each grid transits from normal, latent, and fire state. For the mission objective of visiting the grids with fire, the proposed framework outperformed the random walk (baseline) and the single-minded exploitation (or exploration) path.
△ Less
Submitted 24 June, 2021; v1 submitted 4 March, 2021;
originally announced March 2021.
-
Distributed Algorithms for Linearly-Solvable Optimal Control in Networked Multi-Agent Systems
Authors:
Neng Wan,
Aditya Gahlawat,
Naira Hovakimyan,
Evangelos A. Theodorou,
Petros G. Voulgaris
Abstract:
Distributed algorithms for both discrete-time and continuous-time linearly solvable optimal control (LSOC) problems of networked multi-agent systems (MASs) are investigated in this paper. A distributed framework is proposed to partition the optimal control problem of a networked MAS into several local optimal control problems in factorial subsystems, such that each (central) agent behaves optimall…
▽ More
Distributed algorithms for both discrete-time and continuous-time linearly solvable optimal control (LSOC) problems of networked multi-agent systems (MASs) are investigated in this paper. A distributed framework is proposed to partition the optimal control problem of a networked MAS into several local optimal control problems in factorial subsystems, such that each (central) agent behaves optimally to minimize the joint cost function of a subsystem that comprises a central agent and its neighboring agents, and the local control actions (policies) only rely on the knowledge of local observations. Under this framework, we not only preserve the correlations between neighboring agents, but moderate the communication and computational complexities by decentralizing the sampling and computational processes over the network. For discrete-time systems modeled by Markov decision processes, the joint Bellman equation of each subsystem is transformed into a system of linear equations and solved using parallel programming. For continuous-time systems modeled by Itô diffusion processes, the joint optimality equation of each subsystem is converted into a linear partial differential equation, whose solution is approximated by a path integral formulation and a sample-efficient relative entropy policy search algorithm, respectively. The learned control policies are generalized to solve the unlearned tasks by resorting to the compositionality principle, and illustrative examples of cooperative UAV teams are provided to verify the effectiveness and advantages of these algorithms.
△ Less
Submitted 17 February, 2021;
originally announced February 2021.
-
Finite-Time Model Inference From A Single Noisy Trajectory
Authors:
Yanbing Mao,
Naira Hovakimyan,
Petros Voulgaris,
Lui Sha
Abstract:
This paper proposes a novel model inference procedure to identify system matrix from a single noisy trajectory over a finite-time interval. The proposed inference procedure comprises an observation data processor, a redundant data processor and an ordinary least-square estimator, wherein the data processors mitigate the influence of observation noise on inference error. We first systematically inv…
▽ More
This paper proposes a novel model inference procedure to identify system matrix from a single noisy trajectory over a finite-time interval. The proposed inference procedure comprises an observation data processor, a redundant data processor and an ordinary least-square estimator, wherein the data processors mitigate the influence of observation noise on inference error. We first systematically investigate the comparisons with naive least-square-regression based model inference and uncover that 1) the same observation data has identical influence on the feasibility of the proposed and the naive model inferences, 2) the naive model inference uses all of the redundant data, while the proposed model inference optimally uses the basis and the redundant data. We then study the sample complexity of the proposed model inference in the presence of observation noise, which leads to the dependence of the processed bias in the observed system trajectory on time and coordinates. Particularly, we derive the sample-complexity upper bound (on the number of observations sufficient to infer a model with prescribed levels of accuracy and confidence) and the sample-complexity lower bound (high-probability lower bound on model error). Finally, the proposed model inference is numerically validated and analyzed.
△ Less
Submitted 1 January, 2021; v1 submitted 13 October, 2020;
originally announced October 2020.
-
Cooperative Path Integral Control for Stochastic Multi-Agent Systems
Authors:
Neng Wan,
Aditya Gahlawat,
Naira Hovakimyan,
Evangelos A. Theodorou,
Petros G. Voulgaris
Abstract:
A distributed stochastic optimal control solution is presented for cooperative multi-agent systems. The network of agents is partitioned into multiple factorial subsystems, each of which consists of a central agent and neighboring agents. Local control actions that rely only on agents' local observations are designed to optimize the joint cost functions of subsystems. When solving for the local co…
▽ More
A distributed stochastic optimal control solution is presented for cooperative multi-agent systems. The network of agents is partitioned into multiple factorial subsystems, each of which consists of a central agent and neighboring agents. Local control actions that rely only on agents' local observations are designed to optimize the joint cost functions of subsystems. When solving for the local control actions, the joint optimality equation for each subsystem is cast as a linear partial differential equation and solved using the Feynman-Kac formula. The solution and the optimal control action are then formulated as path integrals and approximated by a Monte-Carlo method. Numerical verification is provided through a simulation example consisting of a team of cooperative UAVs.
△ Less
Submitted 20 March, 2021; v1 submitted 30 September, 2020;
originally announced September 2020.
-
Robust Vehicle Lane Keeping Control with Networked Proactive Adaptation
Authors:
Hunmin Kim,
Wenbin Wan,
Naira Hovakimyan,
Lui Sha,
Petros Voulgaris
Abstract:
Road condition is an important environmental factor for autonomous vehicle control. A dramatic change in the road condition from the nominal status is a source of uncertainty that can lead to a system failure. Once the vehicle encounters an uncertain environment, such as hitting an ice patch, it is too late to reduce the speed, and the vehicle can lose control. To cope with future uncertainties in…
▽ More
Road condition is an important environmental factor for autonomous vehicle control. A dramatic change in the road condition from the nominal status is a source of uncertainty that can lead to a system failure. Once the vehicle encounters an uncertain environment, such as hitting an ice patch, it is too late to reduce the speed, and the vehicle can lose control. To cope with future uncertainties in advance, we study a proactive robust adaptive control architecture for autonomous vehicles' lane-keeping control problems. The data center generates a prior environmental uncertainty estimate by combining weather forecasts and measurements from anonymous vehicles through a spatio-temporal filter. The prior estimate contributes to designing a robust heading controller and nominal longitudinal velocity for proactive adaptation to each new abnormal condition. Then the control parameters are updated based on posterior information fusion with on-board measurements.
△ Less
Submitted 28 September, 2020; v1 submitted 25 September, 2020;
originally announced September 2020.
-
SL1-Simplex: Safe Velocity Regulation of Self-Driving Vehicles in Dynamic and Unforeseen Environments
Authors:
Yanbing Mao,
Yuliang Gu,
Naira Hovakimyan,
Lui Sha,
Petros Voulgaris
Abstract:
This paper proposes a novel extension of the Simplex architecture with model switching and model learning to achieve safe velocity regulation of self-driving vehicles in dynamic and unforeseen environments. To guarantee the reliability of autonomous vehicles, an $\mathcal{L}_{1}$ adaptive controller that compensates for uncertainties and disturbances is employed by the Simplex architecture as a ve…
▽ More
This paper proposes a novel extension of the Simplex architecture with model switching and model learning to achieve safe velocity regulation of self-driving vehicles in dynamic and unforeseen environments. To guarantee the reliability of autonomous vehicles, an $\mathcal{L}_{1}$ adaptive controller that compensates for uncertainties and disturbances is employed by the Simplex architecture as a verified safe controller to tolerate concurrent software and physical failures. Meanwhile, safe switching controller is incorporated into the Simplex for safe velocity regulation through the integration of the traction control system and anti-lock braking system. Specifically, the vehicle's angular and longitudinal velocities asymptotically track the provided references that vary with driving environments, while the wheel slips are restricted to safety envelopes to prevent slipping and sliding. Due to the high dependence of vehicle dynamics on the driving environments, the proposed Simplex leverages the finite-time model learning to timely learn and update the vehicle model for $\mathcal{L}_{1}$ adaptive controller, when any deviation from the safety envelope or the uncertainty measurement threshold occurs in the unforeseen driving environments. Finally, the effectiveness of the proposed Simplex architecture for safe velocity regulation is validated by the AutoRally platform.
△ Less
Submitted 1 February, 2022; v1 submitted 4 August, 2020;
originally announced August 2020.
-
Safety Constrained Multi-UAV Time Coordination: A Bi-level Control Framework in GPS Denied Environment
Authors:
Wenbin Wan,
Hunmin Kim,
Yikun Cheng,
Naira Hovakimyan,
Petros G. Voulgaris,
Lui Sha
Abstract:
Unmanned aerial vehicles (UAVs) suffer from sensor drifts in GPS denied environments, which can cause safety issues. To avoid intolerable sensor drifts while completing the time-critical coordination task for multi-UAV systems, we propose a safety constrained bi-level control framework. The first level is the time-critical coordination level that achieves a consensus of coordination states and pro…
▽ More
Unmanned aerial vehicles (UAVs) suffer from sensor drifts in GPS denied environments, which can cause safety issues. To avoid intolerable sensor drifts while completing the time-critical coordination task for multi-UAV systems, we propose a safety constrained bi-level control framework. The first level is the time-critical coordination level that achieves a consensus of coordination states and provides a virtual target which is a function of the coordination state. The second level is the safety-critical control level that is designed to follow the virtual target while adapting the attacked UAV(s) at a path re-planning level to support resilient state estimation. In particular, the time-critical coordination level framework generates the desired speed and position profile of the virtual target based on the multi-UAV cooperative mission by the proposed consensus protocol algorithm. The safety-critical control level is able to make each UAV follow its assigned path while detecting the attacks, estimating the state resiliently, and driving the UAV(s) outside the effective range of the spoofing device within the escape time. The numerical simulations of a three-UAV system demonstrate the effectiveness of the proposed safety constrained bi-level control framework.
△ Less
Submitted 19 May, 2020; v1 submitted 14 May, 2020;
originally announced May 2020.
-
A Safety Constrained Control Framework for UAVs in GPS Denied Environment
Authors:
Wenbin Wan,
Hunmin Kim,
Naira Hovakimyan,
Lui Sha,
Petros G. Voulgaris
Abstract:
Unmanned aerial vehicles (UAVs) suffer from sensor drifts in GPS denied environments, which can lead to potentially dangerous situations. To avoid intolerable sensor drifts in the presence of GPS spoofing attacks, we propose a safety constrained control framework that adapts the UAV at a path re-planning level to support resilient state estimation against GPS spoofing attacks. The attack detector…
▽ More
Unmanned aerial vehicles (UAVs) suffer from sensor drifts in GPS denied environments, which can lead to potentially dangerous situations. To avoid intolerable sensor drifts in the presence of GPS spoofing attacks, we propose a safety constrained control framework that adapts the UAV at a path re-planning level to support resilient state estimation against GPS spoofing attacks. The attack detector is used to detect GPS spoofing attacks based on the resilient state estimation and provides a switching criterion between the robust control mode and emergency control mode. To quantify the safety margin, we introduce the escape time which is defined as a safe time under which the state estimation error remains within a tolerable error with designated confidence. An attacker location tracker (ALT) is developed to track the location of the attacker and estimate the output power of the spoofing device by the unscented Kalman filter (UKF) with sliding window outputs. Using the estimates from ALT, an escape controller (ESC) is designed based on the constrained model predictive controller (MPC) such that the UAV escapes from the effective range of the spoofing device within the escape time.
△ Less
Submitted 12 April, 2020; v1 submitted 23 October, 2019;
originally announced October 2019.
-
A Youla Operator State-Space Framework for Stably Realizable Distributed Control
Authors:
Mohammad Naghnaeian,
Petros G. Voulgaris,
Nicola Elia
Abstract:
This paper deals with the problem of distributed control synthesis. We seek to find structured controllers that are stably realizable over the underlying network. We address the problem using an operator form of discrete-time linear systems. This allows for uniform treatment of various classes of linear systems, e.g., Linear Time Invariant (LTI), Linear Time Varying (LTV), or linear switched syste…
▽ More
This paper deals with the problem of distributed control synthesis. We seek to find structured controllers that are stably realizable over the underlying network. We address the problem using an operator form of discrete-time linear systems. This allows for uniform treatment of various classes of linear systems, e.g., Linear Time Invariant (LTI), Linear Time Varying (LTV), or linear switched systems. We combine this operator representation for linear systems with the classical Youla parameterization to characterize the set of stably realizable controllers for a given network structure. Using this Youla Operator State-Space (YOSS) framework, we show that if the structure satisfies certain subspace like assumptions, then both stability and performance problems can be formulated as convex optimization and more precisely as tractable model-matching problems to any a priori accuracy. Furthermore, we show that the structured controllers found from our approach can be stably realized over the network and provide a generalized separation principle.
△ Less
Submitted 2 October, 2019;
originally announced October 2019.
-
Maya: Falsifying Power Sidechannels with Dynamic Control
Authors:
Raghavendra Pradyumna Pothukuchi,
Sweta Yamini Pothukuchi,
Petros Voulgaris,
Alexander Schwing,
Josep Torrellas
Abstract:
The security of computers is at risk because of information leaking through physical outputs such as power, temperature, or electromagnetic (EM) emissions. Attackers can use advanced signal measurement and analysis to recover sensitive data from these sidechannels. To address this problem, this paper presents Maya, a simple and effective solution against power side-channels. The idea is to re-shap…
▽ More
The security of computers is at risk because of information leaking through physical outputs such as power, temperature, or electromagnetic (EM) emissions. Attackers can use advanced signal measurement and analysis to recover sensitive data from these sidechannels. To address this problem, this paper presents Maya, a simple and effective solution against power side-channels. The idea is to re-shape the power dissipated by an application in an application-transparent manner using control theory techniques - preventing attackers from learning any information. With control theory, a controller can reliably keep power close to a desired target value even when runtime conditions change unpredictably. Then, by changing these targets intelligently, power can be made to appear in any desired form, appearing to carry activity information which, in reality, is unrelated to the application. Maya can be implemented in privileged software or in simple hardware. In this paper, we implement Maya on two multiprocessor machines using Operating System (OS) threads, and show its effectiveness and ease of deployment.
△ Less
Submitted 18 August, 2019; v1 submitted 22 July, 2019;
originally announced July 2019.
-
Towards Resilient UAV: Escape Time in GPS Denied Environment with Sensor Drift
Authors:
Hyung-Jin Yoon,
Wenbin Wan,
Hunmin Kim,
Naira Hovakimyan,
Lui Sha,
Petros G. Voulgaris
Abstract:
This paper considers a resilient state estimation framework for unmanned aerial vehicles (UAVs) that integrates a Kalman filter-like state estimator and an attack detector. When an attack is detected, the state estimator uses only IMU signals as the GPS signals do not contain legitimate information. This limited sensor availability induces a sensor drift problem questioning the reliability of the…
▽ More
This paper considers a resilient state estimation framework for unmanned aerial vehicles (UAVs) that integrates a Kalman filter-like state estimator and an attack detector. When an attack is detected, the state estimator uses only IMU signals as the GPS signals do not contain legitimate information. This limited sensor availability induces a sensor drift problem questioning the reliability of the sensor estimates. We propose a new resilience measure, escape time, as the safe time within which the estimation errors remain in a tolerable region with high probability. This paper analyzes the stability of the proposed resilient estimation framework and quantifies a lower bound for the escape time. Moreover, simulations of the UAV model demonstrate the performance of the proposed framework and provide analytical results.
△ Less
Submitted 11 June, 2019;
originally announced June 2019.
-
Attack-resilient Estimation for Linear Discrete-time Stochastic Systems with Input and State Constraints
Authors:
Wenbin Wan,
Hunmin Kim,
Naira Hovakimyan,
Petros G. Voulgaris
Abstract:
In this paper, an attack-resilient estimation algorithm is presented for linear discrete-time stochastic systems with state and input constraints. It is shown that the state estimation errors of the proposed estimation algorithm are practically exponentially stable.
In this paper, an attack-resilient estimation algorithm is presented for linear discrete-time stochastic systems with state and input constraints. It is shown that the state estimation errors of the proposed estimation algorithm are practically exponentially stable.
△ Less
Submitted 19 March, 2019;
originally announced March 2019.
-
On the Computation of Worst Attacks: a LP Framework
Authors:
Nabil H. Hirzallah,
Petros G. Voulgaris
Abstract:
We consider the problem of false data injection attacks modeled as additive disturbances in various parts of a general LTI feedback system and derive necessary and sufficient conditions for the existence of stealthy unbounded attacks. We also consider the problem of characterizing the worst, bounded and stealthy attacks. This problem involves a maximization of a convex function subject to convex c…
▽ More
We consider the problem of false data injection attacks modeled as additive disturbances in various parts of a general LTI feedback system and derive necessary and sufficient conditions for the existence of stealthy unbounded attacks. We also consider the problem of characterizing the worst, bounded and stealthy attacks. This problem involves a maximization of a convex function subject to convex constraints, and hence, in principle, it is not easy to solve. However, by employing a $\ell_\infty$ framework, we show how tractable Linear Programming (LP) methods can be used to obtain the worst attack design. Moreover, we provide a controller synthesis iterative method to minimize the worst impact of such attacks.
△ Less
Submitted 17 July, 2017;
originally announced July 2017.
-
Dual Rate Control for Security in Cyber-physical Systems
Authors:
Mohammad Naghnaeian,
Nabil Hirzallah,
Petros G. Voulgaris
Abstract:
We consider malicious attacks on actuators and sensors of a feedback system which can be modeled as additive, possibly unbounded, disturbances at the digital (cyber) part of the feedback loop. We precisely characterize the role of the unstable poles and zeros of the system in the ability to detect stealthy attacks in the context of the sampled data implementation of the controller in feedback with…
▽ More
We consider malicious attacks on actuators and sensors of a feedback system which can be modeled as additive, possibly unbounded, disturbances at the digital (cyber) part of the feedback loop. We precisely characterize the role of the unstable poles and zeros of the system in the ability to detect stealthy attacks in the context of the sampled data implementation of the controller in feedback with the continuous (physical) plant. We show that, if there is a single sensor that is guaranteed to be secure and the plant is observable from that sensor, then there exist a class of multirate sampled data controllers that ensure that all attacks remain detectable. These dual rate controllers are sampling the output faster than the zero order hold rate that operates on the control input and as such, they can even provide better nominal performance than single rate, at the price of higher sampling of the continuous output.
△ Less
Submitted 28 April, 2015;
originally announced April 2015.
-
Target Assignment in Robotic Networks: Distance Optimality Guarantees and Hierarchical Strategies
Authors:
Jingjin Yu,
Soon-Jo Chung,
Petros G. Voulgaris
Abstract:
We study the problem of multi-robot target assignment to minimize the total distance traveled by the robots until they all reach an equal number of static targets. In the first half of the paper, we present a necessary and sufficient condition under which true distance optimality can be achieved for robots with limited communication and target-sensing ranges. Moreover, we provide an explicit, non-…
▽ More
We study the problem of multi-robot target assignment to minimize the total distance traveled by the robots until they all reach an equal number of static targets. In the first half of the paper, we present a necessary and sufficient condition under which true distance optimality can be achieved for robots with limited communication and target-sensing ranges. Moreover, we provide an explicit, non-asymptotic formula for computing the number of robots needed to achieve distance optimality in terms of the robots' communication and target-sensing ranges with arbitrary guaranteed probabilities. The same bounds are also shown to be asymptotically tight.
In the second half of the paper, we present suboptimal strategies for use when the number of robots cannot be chosen freely. Assuming first that all targets are known to all robots, we employ a hierarchical communication model in which robots communicate only with other robots in the same partitioned region. This hierarchical communication model leads to constant approximations of true distance-optimal solutions under mild assumptions. We then revisit the limited communication and sensing models. By combining simple rendezvous-based strategies with a hierarchical communication model, we obtain decentralized hierarchical strategies that achieve constant approximation ratios with respect to true distance optimality. Results of simulation show that the approximation ratio is as low as 1.4.
△ Less
Submitted 31 July, 2014; v1 submitted 19 August, 2013;
originally announced August 2013.