Abstract
We consider a scenario of deploying multiple robots to capture all intruders in a cluttered workspace with many obstacles. Here, we say that a robot captures an intruder in the case where the intruder is within the maximum range of a weapon on the robot. All robots use the Voronoi diagram as the topological map of the workspace. Due to obstacles, intruders are confined to move along a passage between obstacles. Suppose the weapons on every robot are powerful enough to cover a passage in the workspace. Then, we can consider a simplified scenario such that robots and intruders are restricted to stay on the Voronoi diagram. We assume that a robot can detect the position of any intruder using the information network. This article presents an intruder capturing strategy that is robust to time delay in data transfer using the network. Our strategy does not require the localization of a node or a robot. Based on this strategy, we provide an upper bound for the minimum number of robots required to capture all intruders on a general graph, which leads to a result of the Voronoi diagram. Lastly, we provide MATLAB (version 7.10.0 R2010a) simulations to verify the effectiveness of our capturing strategy.
Keywords
Introduction
Monitoring and securing of large complex environments are important tasks in military scenarios. We consider a scenario of deploying multiple robots to capture all intruders in the workspace. Here, we say that a robot captures an intruder in the case where the intruder is within the maximum range of a weapon on the robot.
Suppose that an information (sensor) network is embedded in the workspace. Such an information network becomes feasible due to the research advances in ad hoc networking. 1 –8 In this workspace, each information node can detect a nearby intruder and let a robot access the position of the intruder in real time.
Voronoi diagrams have been widely used for topological maps in robotics. 9 –15 Choset and Burdick 16 argued that a Voronoi vertex whose degree is bigger than three is not “stable.” For example, suppose that there exists a circle that is tangential to four obstacles. If we slightly perturb the position of one obstacle, then the circle is not tangential to four obstacles anymore. 16 Hence, Choset and Burdick 16 assumed that all Voronoi vertices have degree three. This assumption is called the equidistant surface transversality assumption. This article also assumes that all Voronoi vertices have degree three.
In our article, we consider a workspace such that information nodes are deployed along a Voronoi diagram in the workspace. The exploration and networking strategy in the study by Kim 15 can be applied to build the information network along the Voronoi diagram. Information nodes are deployed to cover the entire workspace.
All robots use the Voronoi diagram as the topological map of the workspace. A robot can use the control law introduced in the study by Kim et al. 9 to move along a Voronoi edge. Due to obstacles, intruders are confined to move along a passage between obstacles. Suppose the weapons on every robot are powerful enough to cover a passage in the workspace. Then, we can consider a simplified scenario such that robots and intruders are restricted to stay on the Voronoi diagram.
Traditionally, search and pursuit-evasion problems have been addressed using two approaches. 17 The first approach is to design strategies that maximize searcher performance against a worst-case intruder. In such settings, a worst-case intruder is characterized by unbounded speed, complete awareness of searcher location and intent, and full knowledge of the search environment. The second approach uses probabilistic formulations addressing false alarms in intruder detection. This approach considers optimization of maximal probability of detection or minimal time until an intruder is detected. The assumption of knowledge about an intruder’s behavior model allows incorporating probabilistic uncertainty in an intruder’s position.
This article takes the first approach that maximizes searcher performance against a worst-case intruder. More specifically, we study the minimum number of robots (searchers) required to capture worst-case intruders on the topological map of the workspace. Many articles exist on capturing worst-case intruders on graphs. 15,18 –31 Parsons 18 defined the graph searching problem initially. In this problem, searchers and worst-case intruders move along edges of a graph. We introduce several definitions used in this problem. An edge is cleared in the case where it does not contain an intruder. An edge is contaminated in the case where it contains an intruder. A monotone strategy is an intruder capturing strategy satisfying that once an edge is cleared, then the edge is not contaminated again.
There are many variants of the graph searching problem originated from the study by Parsons.
18
A closely related work to ours is the helicopter cops and robbers game.
30,31
In this game,
30,31
an intruder is visible, since the cops have complete knowledge of robbers’ positions as if the cops are using helicopters. Furthermore, the cops can be placed on or removed from vertices of the graph. A robber is captured when a cop lands on the vertex occupied by the robber and it cannot make any move to escape. Seymour and Thomas
30
proved that if k cops can catch a visible intruder, then there is a monotone search strategy using k cops. Douglas
31
provided an upper bound for the minimum number of searchers to clear a graph G using a monotone strategy as
In this article, we assume that a robot utilizes the information network to detect intruders, similar to a cop using a helicopter in the studies by Seymour and Thomas 30 and Richerby and Thilikos. 31 However, a robot moves along edges of a graph continuously, which is distinct from the studies by Seymour and Thomas 30 and Richerby and Thilikos, 31 and is suitable for mobile robots. Also, our searching strategy is not a monotone, which is distinct from the studies by Seymour and Thomas 30 and Richerby and Thilikos. 31
The intruder capturing strategy in the study by Kim 15 used information networks as the basis to capture intruders. The strategy in the study by Kim 15 showed that the minimum number of searchers required to clear a graph G is equal to or less than MinGuard(G) + 1, where MinGuard(G) is the minimum number of searchers (guards) to block all cycles in G. The intruder capturing strategy in this article is inspired by the strategy in the study by Kim. 15
Kim 15 did not consider the localization problem of both a robot and a node. In other words, Kim 15 simply assumed that all nodes and robots are localized in global coordinate systems. As far as we know, no article on graph searching problems has considered localization of a searcher. In this article, we consider an environment where Global Positioning Systems (GPS) signal cannot reach. Considering this environment, localization of distributed nodes is not trivial. (There are many articles on localization of distributed sensor nodes. 34 –40 The classic methods for the localization of distributed sensor nodes are time of arrival, time difference of arrival, angle of arrival, and received signal strength.) Our intruder capturing strategy does not require the localization of a node or a robot. To enable this, each information node is given a special functionality, which will be presented in the section “Information network structure.” As a robot visits an information node, the task of the node is to recommend a preferred direction of movement for the robot. In other words, an information node functions as a “signpost” for the robot.
Suppose that a node detects a nearby intruder. Then, the node broadcasts this detection event to a robot using the information network. As we use the information network, it is inevitable that time delay in data transfer occurs. This article presents an intruder capturing strategy that is robust to time delay in data transfer using the network. As far as we know, our intruder capturing strategy is unique in robustness to time delay in data transfer. (Using the same argument as presented in this article, we can prove that the strategy in the study by Kim 15 is robust to time delay using the network. However, Kim 15 did not discuss its robustness to time delay.)
Based on the strategy, we provide an upper bound for the minimum number of robots required to capture all intruders on a general graph, which leads to a result of the Voronoi diagram. We show that, under the transversality assumption, the upper bound for the minimum number of robots required to clear the Voronoi diagram can be calculated in polynomial time. Finally, we provide MATLAB simulations to verify the effectiveness of our capturing strategy.
The article is organized as follows. Section “Preliminaries and background” provides preliminaries and background information. Section “Information network structure” introduces the information network structure considered in our article. Section “Capturing intruders based on the Voronoi diagram assisted by the information network” discusses capturing intruders based on the Voronoi diagram assisted by the information network. Section “MATLAB simulations” provides MATLAB simulations to verify our results. Section “Conclusions” provides conclusions.
Preliminaries and background
This section provides background information and previous works that are used to provide the new contributions.
Graph theory
We review some general notions in graph theory.
32
An undirected graph G is defined by a set
A walk is an alternating sequence of nodes and edges in a graph such that each node belongs to the edge immediately before and after it in the sequence. A graph G is connected if there is a walk between every pair of distinct nodes. The subgraph of G induced by a set of nodes
A cycle is a graph consists of vertices connected in a closed chain. A tree is a connected graph without cycles. Suppose n is a node of a tree graph T. Then, we define a branch of T at n as the maximal subtree of T, denoted by T′ if n has degree one in T′.
A feedback vertex set of a graph is a set of vertices whose removal leaves a graph without cycles. Finding a minimum feedback vertex set in a graph is an NP-complete problem. 41,42 However, finding a minimum feedback vertex set in a graph of maximum degree three can be solved in polynomial time. 41,42
The workspace and its Voronoi diagram
Consider a connected and compact workspace W ⊂ R2 whose boundary, ∂W, is a simple closed curve that is continuous and has no self-intersection. Let
Obeying the conventions established in the literature on Voronoi diagrams, 10,43 let Vi be the Voronoi cell of Oi and ∂Vi be the boundary of the Voronoi cell Vi. A Voronoi edge is a common boundary edge shared by two Voronoi cells. A Voronoi vertex is a node where at least three Voronoi edges meet.
The following assumptions, which were also used in our previous articles, 4,9 are made about the workspace.
Assumption 1
The boundary ∂Vi of every Voronoi cell Vi is a simple closed curve.
Assumption 2
Since ∂Vi is a simple closed curve for each Oi, Voronoi cells correspond to faces of the Voronoi diagram. In the weak dual graph of the Voronoi diagram, each Voronoi cell Vi will be represented by a node ni. And each Voronoi edge shared by ∂Vi and ∂Vj corresponds to an edge
Cooperative exploration and networking strategy in 15
In our article, we consider a workspace such that information nodes are deployed along the Voronoi diagram in the workspace. The networking strategy in the study by Kim 15 can be applied to build the information network along the Voronoi diagram. In this section, we briefly introduce the networking strategy in the study by Kim. 15
Using the networking strategy described in the study by Kim,
15
multiple robots explore an unknown workspace while deploying information nodes at Voronoi vertices. Moreover, information nodes are deployed along long Voronoi edges in order to relay data from one node to another node out of the maximum sensing range. Information nodes are deployed to satisfy that the sensor footprints cover
Suppose N robots are deployed in an unknown workspace to build the information network. A robot, say Ri where i ≤ N, can use the control law introduced in the study by Kim et al. 9 to move along a Voronoi edge.
While Ri explores the workspace using the networking strategy in the study by Kim,
15
the Voronoi information graph Gv is constructed. (The Voronoi information graph is called the combined graph in the study by Kim.
15
) Every node in
At each Voronoi vertex, if every edge adjacent to this vertex has been visited by any robot, then the vertex is considered as explored, otherwise unexplored. We say that a robot Ri explores a Voronoi edge when the edge has not been traversed by any other robot before Ri traverses the edge. An unexplored vertex corresponds to a node
In the case where a robot meets an unexplored vertex, it simply moves along an unexplored edge emanating from the node. Consider the case where a robot, say Ri, meets an explored vertex. Then, the robot searches for an unexplored edge using Gv.
In the case where Ri meets an explored vertex, Ri searches for the nearest unexplored edge
Information network structure
Figure 1 depicts the information network built using the exploration and networking strategy in the study by Kim. 15 The obstacle boundaries are shown as thick red curves. Deployed information nodes are marked with large green dots. By removing all edges intersecting an obstacle boundary in Figure 1, we derive Gv for the environment in Figure 1.

The information network built using the exploration and networking strategy in the study by Kim. 15
In this article, we present an intruder capturing strategy that does not require the localization of a node or a robot. As a robot visits an information node, the task of the node is to recommend a preferred direction of movement for the robot. In other words, an information node functions as a signpost for the robot. To enable this, we introduce a new concept as follows. The angle of an edge e at a node n is the angle of the line tangential to e at n measured clockwise from the north direction. An illustration of the angle of an edge e at each end point of e is shown in Figure 2.

The angle of an edge e at each end point of e.
We assume that every information node has the following functionality: an information node stores the angle of every edge adjacent to the node. This assumption is called the angle assumption.
In the case where information nodes are deployed using the networking strategy in the study by Kim, 15 each node does not have the above functionality. To provide a node with the above functionality, we modify the networking strategy in the work by Kim 15 to algorithm 1. Lemma 1 shows that every node deployed using algorithm 1 has the above functionality. The features of algorithm 1 distinct from the networking strategy in the work by Kim 15 are marked with bold sentences.
Networking strategy to satisfy the angle assumption.
Lemma 1
As a result of algorithm 1, every information node stores the angle of every Voronoi edge adjacent to the node.
Proof
We prove by contradiction. Suppose that algorithm 1 ends and that a node n does not store the angle of an adjacent Voronoi edge, say e. e must be traversed by a robot, since there exists no unexplored edge after algorithm 1 ends. Every end point of e stores the angle of e using algorithm 1. This is a contradiction to the statement that n does not store the angle of e. Thus, every information node stores the angle of every Voronoi edge adjacent to the node. □
To make algorithm 1 feasible, each information node must be equipped with a sensor to measure the angle of an adjacent edge. For example, we can consider the case where each node is equipped with 360° scanning camera. (A camera is useful for detecting intruders. Using a camera, a node can detect and identify a nearby intruder.) Consider the case where an information node, say i, measures the angle of an adjacent edge e. Suppose that a robot moves along e and that the robot is sufficiently close to i. Since i is equipped with a camera, i can measure the bearing of the robot close to i. Then, the bearing of the robot can be used to estimate the angle of e.
Capturing intruders based on the Voronoi diagram assisted by the information network
Suppose that the information network is built along the Voronoi diagram of the workspace using algorithm 1. All robots use the Voronoi diagram as the topological map of the workspace. Due to obstacles, intruders are confined to move along a passage between obstacles. Suppose the weapons on every robot are powerful enough to cover a passage in the workspace. Then, we can consider a simplified scenario such that robots and intruders are restricted to stay on the Voronoi diagram.
Before tackling capturing intruders in the Voronoi diagram, we study capturing intruders in a topological map of a workspace assisted by the information network.
Definitions and assumptions
Let G denotes a topological map of a workspace. Suppose that each node in G is associated to an information node in the workspace. Let us consider an environment where robots and intruders are restricted to stay on G.
We introduce a guard, whose role is to guard a node in G. Only one robot, say free robot, moves along edges of G continuously.
The free robot utilizes the information network to detect intruders. The free robot obtains the position of any intruder whenever the robot visits a node in G. This is feasible, since information nodes are deployed to cover the entire workspace.
Obeying the conventions established in the literature on capturing intruders on graphs, 19,26 –29 we assume that an intruder has full knowledge of the environment, searching strategies, and positions of both the free robot and guards. In addition, an intruder moves along edges of G at unbounded speed to avoid both the free robot and guards.
An intruder is captured if (1) it is on an edge whose one end point is guarded while the free robot moves through the edge from the opposite end point or (2) it is on an edge one end point of which has degree one while the free robot moves through the edge starting from the opposite end point. The minimum number of robots to capture all intruders on G is denoted as sI(G) where I indicates the information network.
Capturing intruders on a general graph
In this subsection, we derive an upper bound for sI(G) for G. Lemma 2 provides the capturing strategy to derive the bound.
Lemma 2
Suppose that one free robot and one intruder move along a tree graph T. Then, the robot can capture the intruder in finite time using the following strategy:
Whenever the robot meets a node, it obtains the branch containing the intruder. Then, it moves through the edge contained in the branch until it meets another node. Iterate this until the intruder is captured.
Lemma 3 shows that the capturing strategy in lemma 2 is robust to time delay in data transfer using the information network.
Lemma 3
Using the capturing strategy in lemma 2, the intruder is captured in finite time regardless of time delay in data transfer using the information network.
Proof
Suppose that the free robot is at a node n. Suppose that an intruder at a branch, say b, is detected at time step t1 and that the detection event is broadcasted to the free robot at time step t2. According to the definition of a branch, n is the only node connecting b with T\b. Blocked by the free robot at n, the intruder cannot escape from b between two time steps t1 and t2. Thus, as the robot chooses b and moves through the edge contained in b, the intruder cannot escape from b. As we iterate this, the intruder is captured in finite time. □
To make lemma 2 feasible, the free robot must be able to choose the branch containing the intruder and move through the edge contained in the branch until it meets another node. Suppose that the robot is located at a node n and that a node na is adjacent to n in the branch containing the intruder. We assume that an information node is not localized and that the robot cannot access the position of a node.
Suppose that the free robot visits n and that the next node to visit is na. Using the angle assumption, n stores the angle of one edge leading to na. Hence, n recommends the moving direction for the robot. By simply following the edge corresponding to the recommended direction, the robot can visit na.
Since an intruder can move at unbounded speed, an intruder can escape from the free robot using a cycle in a general graph G. To block escape of an intruder, we deploy guards at nodes in G. If a guard is deployed at a node, then the node becomes unavailable to intruders. Hence, once a guard is deployed at a node, we mark the node as guarded. We say that a cycle C is blocked if any node in N(C) is guarded.
We define
In our problem of searching for
Suppose
Lemma 4
For a general graph G,
For a general graph G, algorithm 2 describes our graph searching strategy using one free robot and
Capturing all intruders on a general graph G.
Capturing intruders on the Voronoi diagrams
We consider capturing intruders in the topological map of a workspace, represented by the Voronoi diagram defined in section “The workspace and its Voronoi diagram.” We compute
Note that finding a minimum feedback vertex set in a graph of maximum degree three can be solved in polynomial time.
41,42
Hence, under the transversality assumption,
MATLAB simulations
Since we suppose the weapons on every robot are powerful enough to cover a passage in the workspace, we can simplify a scenario such that a searcher and an intruder move along Voronoi edges.
Figure 3 shows the Voronoi diagram D as well as obstacle environments. Thick red curves indicate obstacle boundaries. We use the exploration strategy in the study by Kim et al. 9 to build D. See that D contains four cycles and that no Voronoi edge intersects an obstacle boundary. There are six vertices in D, and every vertex has degree three.

The Voronoi diagram as well as obstacle environments.
In Figure 3, deployed guards are marked with large blue dots. Two guards are deployed at two vertices in D to block all cycles. Since every vertex in D has degree three, the minimum number of guards can be found in polynomial time using methods in the studies by Li and Liu 41 and Ueno et al. 42
Once two guards are deployed to block all cycles, one free robot chases one intruder at a time to capture all intruders. Blocked by two guards, no intruder can escape from the free robot. Our algorithm robustly works against any number of worst-case intruders with infinite speed.
Conclusions
We consider a scenario of deploying multiple robots to capture intruders in a cluttered workspace with many obstacles. We consider a simplified scenario such that robots and intruders are restricted to stay on the Voronoi diagram. Assuming that one free robot can access the position of any intruder utilizing the information network, a capturing strategy is proposed so that robots capture all intruders in finite time. Our capturing strategy is simple to implement and is guaranteed to capture all intruders regardless of the number of intruders. Based on this strategy, we derive an upper bound for the minimum number of robots required to capture all intruders on a general graph, which leads to a result of the Voronoi diagram.
Footnotes
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Funding
The author(s) received no financial support for the research, authorship, and/or publication of this article.
