You are on page 1of 6

2020 59th IEEE Conference on Decision and Control (CDC)

Jeju Island, Republic of Korea, December 14-18, 2020

A Distributed Connectivity Maintenance Algorithm for a Network of


Unmanned Underwater Vehicles Under Communication Constraints
Devaprakash Muniraj, Mazen Farhood, and Daniel J. Stilwell

Abstract— This work presents a distributed connectivity Different communication protocols, such as time-division
maintenance algorithm for a multi-agent system consisting of multiple access (TDMA) and code-division multiple access
unmanned underwater vehicles (UUVs). The vehicles in the (CDMA), have been used for UUV networks [8]. In this
network communicate through a time-division multiple-access
(TDMA) protocol, where only one vehicle can broadcast its work, we assume that the UUVs communicate using the
information at any time instant. The TDMA protocol presents a TDMA protocol, whereby only one UUV is allowed to
significant challenge in developing a connectivity maintenance communicate at any given time. As a result, the UUVs
algorithm, as the vehicles do not have access to the present do not have access to the present positions and velocities
positions of their neighbors. We consider a homogeneous of their neighbors. Additionally, due to the nature of the
network of UUVs that move in a two-dimensional plane with
bounded linear and angular speeds. The algorithm presented TDMA protocol, there is asymmetry in the information
here uses only local information from an agent’s neighbors available to each UUV. With this communication structure,
and provides motion constraints, which, if satisfied, ensure the we present a distributed algorithm that provides connectivity-
connectivity of the network. We provide mathematical guaran- preserving motion constraints for each UUV in the network.
tees of network connectivity for the presented algorithm under Specifically, we consider a homogeneous network of UUVs
suitable assumptions on each vehicle’s motion planner and
controller. Finally, we present simulation results to demonstrate with similar communication capabilities and assume planar
the effectiveness of the proposed algorithm. motions where the linear and angular speeds of each UUV
are bounded. Each agent i uses information from its neigh-
I. I NTRODUCTION bors, which includes their past positions and orientations,
to estimate a measure called the geometric connectivity
Multi-agent unmanned underwater vehicle (UUV) mis- robustness, denoted by R̂i (t) at time t. Informally, R̂i (t)
sions, such as mine countermeasures, seabed mapping, represents the maximum distance an agent could move over
and surveillance, involve cooperation among a group of a planning horizon [t0 , t0 + Tf ] without losing connectivity
UUVs [1]. In many cases, efficient task execution during with the network, where t0 > t and Tf is the length of the
such missions necessitates each vehicle to be able to com- planning horizon. The algorithm computes R̂i (t) such that
municate with other vehicles in the network through a multi- even if R̂i (t) ≤ 0, agent i could still loiter within a disk
hop link [2]. In graph-theoretic parlance, this requirement of radius DL without losing connectivity. When an agent
translates to maintaining the connectivity of the proximity receives information from one of its neighbors, it estimates
graph that represents the underlying communication network. the connectivity robustness, which could then be used by the
There are many approaches in the literature that deal with agent’s motion planner to generate a new plan, if needed.
identifying motion constraints to maintain network connec- Although the connectivity maintenance algorithm pro-
tivity; see [3] for a detailed survey. Most of these works posed herein makes use of the notion of geometric connec-
involve estimating the second smallest eigenvalue of the tivity robustness from [7], [9], it differs from these works in
Laplacian matrix while assuming that the agents exchange the following respects: i) the agents in the UUV network are
information when their inter-agent distance is less than some not assumed to have access to the current positions of their
prespecified value [4]–[6]. In contrast to these works, the neighbors; ii) the UUVs are not required to replan at the same
authors in [7] introduce a measure called the geometric time; and iii) when R̂i (t) ≤ 0, the algorithm still guarantees
connectivity robustness, which is then used to determine the network connectivity by having agent i loiter within a disk of
motion constraints. In the aforementioned works, each agent some prespecified radius. This paper is organized as follows:
is assumed to have access to the current positions of its Section II defines some important notions that are used in
neighbors. These approaches are not directly applicable to the paper; Section III describes the connectivity maintenance
UUVs because of the unique challenges presented by the algorithm; Section IV provides results that establish network
underwater environment, such as extremely low communi- connectivity for the proposed algorithm; Section V presents
cation bandwidth and frequent dropouts. illustrative simulation results for a UUV network with 4
agents; and Section VI provides some concluding remarks.
Devaprakash Muniraj and Mazen Farhood are with the Kevin T. Crofton
Department of Aerospace and Ocean Engineering, Virginia Tech, Blacks- II. P RELIMINARIES
burg, VA 24061, USA. Daniel J. Stilwell is with the Bradley Department
of Electrical and Computer Engineering, Virginia Tech, Blacksburg, VA A. Notation
24061, USA. Email addresses: devapm@vt.edu, farhood@vt.edu, and stil-
well@vt.edu. This work was supported by the Office of Naval Research The sets of non-negative integers and real vectors of size
under Award No. N00014-18-1-2627. m×1 are denoted by N and Rm , respectively. Given a vector

978-1-7281-7447-1/20/$31.00 ©2020 IEEE 5255

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on March 20,2023 at 10:57:37 UTC from IEEE Xplore. Restrictions apply.

x ∈ Rn , kxk := xT x denotes the Euclidean norm of III. C ONNECTIVITY M AINTENANCE A LGORITHM
x. Xi (t) ∈ R2 and X(t) = [X1 (t)T , . . . , Xn (t)T ]T denote From Proposition 1 and the definitions in the previous
the position vector of agent i and the concatenated position section, we can infer that if the communication graph
vector of all the agents at time t ∈ N, respectively. The P(X(t)) is connected and each agent i moves by a distance
interaction among the UUVs is represented by a proximity no greater than Ri (X(t)), then each agent i is guaranteed
graph, whereby the UUVs form the nodes of the graph and to maintain connectivity in the new configuration with all
the communication links between the UUVs constitute the of its neighbors Ni (t) by at most a two-edge path from i.
edges of the graph. Two agents communicate with each Thus, a simple connectivity maintenance algorithm can be
other if their inter-agent distance is less than or equal to devised when each agent has access to the current positions
the communication range R. We assume that all the agents of all of its neighbors. However, in this work, the agents have
in the network have similar capabilities. A proximity graph access only to the past positions of their neighbors. In such
is a dynamic graph, as edges can be added or removed a scenario, designing a connectivity maintenance algorithm
based on the positions of the agents. To reflect this fact, that guarantees network connectivity while not being overly
we represent the set of edges of a proximity graph as a conservative is a challenging task. In the rest of this section,
function of X(·). A proximity graph with a set of vertices we describe a connectivity maintenance algorithm for a
V and a set of undirected edges E(X(t)) is denoted by UUV network where the agents interact using the TDMA
P(X(t)) = (V, E(X(t))). We denote the set of neighbors communication protocol.
of agent i at time t by Ni (t) = {j ∈ V | (i, j) ∈ E(X(t))}.
Given a proximity graph P(X(t)), (v1 , v2 , . . . , vk ) denotes a A. Communication Protocol
path in P(X(t)) if vi ∈ V for i = 1, . . . , k and (vj , vj+1 ) ∈ Under the TDMA protocol, each agent is assigned a
E(X(t)) for j = 1, . . . , k−1. time slot to broadcast information to its neighbors. At any
time slot, only one agent is allowed to communicate. The
B. Geometric Connectivity Robustness broadcasted information is received by the agents that are
The connectivity maintenance algorithm proposed in this within the communication range of the broadcasting agent.
work makes use of the notion of geometric connectivity We denote the duration of a time slot by δt , and T = nδt
robustness [9], a brief overview of which is provided here. denotes the duration of one cycle of communication between
Consider a network of n agents whose interactions are rep- the agents. Agent i broadcasts information at time instants
resented by the proximity graph P(X(·)). Before explaining (i+k−1)δt for k = ln, where l ∈ N. This information is
how geometric connectivity robustness is computed for a received by an agent j if kXj (t)−Xi ((i+k−1)δt )k ≤ R for
network of n agents moving in a 2-D plane, we define the all t ∈ [(i+k−1)δt , (i+k)δt ]. Agent j is assumed to receive
path robustness for a two-edge path (i, j, k) as given below. the broadcasted information before t = (i + k)δt . Agent i at
Definition 1: Given a two-edge path (i, j, k) from agent time t has information about agent j that was broadcasted
i to agent k in the proximity graph P(X(t)), its path at time t − pj δt , where pj = n − j + mod(t/δt , n) + 1, if
robustness P (i, j, k, t) is defined as min{R − kXi (t) − j ≥ mod(t/δt , n)+1, or pj = mod(t/δt , n) + 1 − j, other-
Xj (t)k, R − kXj (t) − Xk (t)k}. wise. Consequently, we cannot compute the actual con-
If P (i, j, k, t) > 0, then agents i and k are connected nectivity robustness of the agents as in (1) and can only
through agent j at time t. P (i, j, k, t) represents the max- estimate its value by making certain assumptions on the
imum distance that the agents i, j, and k can move with dynamical behavior of the UUVs. Specifically, we make
respect to each other without breaking the path from i to the following assumptions: i) the UUVs in the network
k. Path robustness is used to define an agent’s connectivity do not travel at speeds greater than V m/s, and ii) the
robustness as follows. maximum angular velocity of each UUV is Ω rad/s. Also,
we assume that each UUV has a motion planner and a
Definition 2: Given a network of n agents whose interac- controller that accomplish the following tasks: i) the motion
tions are represented by the proximity graph P(X(·)), the planner generates a dynamically feasible trajectory while
connectivity robustness of agent i at state X(t) is given by satisfying the motion constraints provided by the connectivity
1 maintenance algorithm, and ii) the controller ensures that
Ri (X(t)) = min max P (i, j, k, t). (1)
2 k∈Ni (t) j∈Ni (t) the UUV tracks the reference trajectory commanded by the
Ri (X(t)) represents the maximum distance that agent i motion planner.
could move at time t without breaking connectivity with We define some additional terms that are used in the
any of its neighbors Ni (t). Ri (X(t)) can be computed algorithm. Nir (t) for agent i at time t denotes the set of
in a distributed manner, as it only uses information from agents that have transmitted their information to agent i till
an agent’s neighbors. The following result from [9] relates time t. Nir (t) is updated under one of the following two
connectivity robustness and network connectivity. scenarios: if agent i receives data from an agent that does
Proposition 1: If the proximity graph P(X(t)) is con- not belong to the set Nir (t), then the broadcasting agent is
nected and Ri (X(t)) > 0 for all i, then each agent can be dis- added to Nir (t), or if the data from one of the agents in
placed arbitrarily by a distance Ri (X(t)) while maintaining Nir (t) is more than nδt s old, then that agent is removed
the connectivity of the graph in the displaced configuration. from Nir (t). The agents in the set Nir (·) are called the

5256

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on March 20,2023 at 10:57:37 UTC from IEEE Xplore. Restrictions apply.
N̄ based on the data received by agent i, if any, during the
time interval [t − δt , t]. ir and is denote the agents that are
scheduled to broadcast during the time intervals [t − δt , t)
and [t, t + δt ), respectively. If t = nδt (line 6) or if agent
i receives data from one of the agents in the set Nic (t−δt )
(lines 8 and 10), then N̄ = Nic (t). If agent i receives data
Fig. 1. Classification of the reachable sets into three different types. from an agent that is not in the set Nic (t−δt ) (lines 12 and
14), then N̄ is computed as in lines 13 to 18. If t > nδt and
no new data is received during the time interval (t − δt , t],
then the estimated connectivity robustness is not updated
(line 50) and Nic (t) is updated using Nir (t) (line 51). If
agent i receives new data during the time interval (t − δt , t],
then agent i determines whether to update its connectivity
robustness based on the computations given in lines 19 to
48, which are explained next.
Fig. 2. Bounding convex polygons for the three types of reachable sets. For an agent k, the set Ñk consists of agents that can be
communication neighbors of agent i. Nic (t) ⊆ Nir (t) for the potential intermediate agents in the two-edge path (i, j, k)
agent i at time t denotes the subset of agents in Nir (t) that between agents i and k. The set Ñk is computed in lines 25
are used to estimate the connectivity robustness of agent i and 27 depending on whether or not agent i is broadcasting
at time t. NiF n (t) ⊆ Nic (t) is the set of agents k ∈ Nic (t) during the time interval [t, t + δt ). Algorithm 2 computes
such that (i, k) is the most robust path between agents i and the function getRpath, whose output is the robustness of the
k as estimated by agent i. The agents in the set NiF n (·) path (i, j, k). To compute the path robustness P̄ (i, j, k, t),
are referred to as the first-degree neighbors of agent i. The agent i computes the reachable sets of agent j, for j ∈
information broadcasted by an agent i at time t is composed Ñk , over the time interval [t − pj δt , t+(n+1)δt ]. Based on
of its position Xi (t), orientation ψi (t), and the set Nic (t). our assumption that the agents move in a 2-D plane and
that their angular speeds are bounded by Ω rad/s, we can
B. Algorithm Description compute the reachable set using the equations of motion for
At time t = 0, we assume that P(X(0)) is connected. a Dubins vehicle with a maximum speed of V m/s and a
We also assume that there is time synchronization among maximum angular speed of Ω rad/s. The reachable sets can
the UUVs in the network and that there is no clock drift. be classified into three different types as shown in Fig. 1.
To enable information exchange during initialization, we To account for all possible trajectories of the agents during
assume that the agents remain stationary for t ≤ nδt . As the time interval [t + δt , t + (n + 1)δt ], we need to compute
a consequence, Nic ((n−1)δt ) = Nic (nδt ) = Nir ((n−1)δt ). the maximum distance between two such reachable sets.
For t ≥ nδt , each agent estimates its connectivity robustness, Recognizing that the reachable sets are non-convex regions
denoted by R̂i (t), using Algorithm 1. The motion planner of in the 2-D plane, it is computationally expensive to estimate
agent i uses R̂i (t) to plan a path that is implemented at time the maximum distance between the reachable sets and is
t+δt . If R̂i (t) ≤ 0, the motion planner commands agent i to not suitable for implementation on a UUV with limited
loiter within a disk of radius DL starting from Xi (t + δt ). computational capabilities. To overcome this difficulty, we
When the UUV is loitering, we say that it is in the loiter approximate the reachable sets by bounding them inside
phase. When an agent is not in the loiter phase, it is in convex polygons. Once this is accomplished, the maximum
the mission phase, where it is executing a plan computed distance between any two convex polygons can be computed
by the motion planner. For convenience, we assume that by simply finding the distance between the vertices of the two
an agents exits the loiter phase at the same position where polygons and taking the maximum of those distances [10].
it entered. In the loiter phase, instead of broadcasting the Given two polygons with p and q vertices, computing the
current position and orientation, the agent broadcasts the maximum distance between them only requires pq oper-
position and orientation corresponding to the point of entry ations. Consequently, in computing the bounding convex
into the loiter phase. Since the connectivity maintenance polygons, we must keep the number of vertices to a minimum
algorithm is identical for all the agents, we describe the while at the same time minimizing the error volume between
algorithm for an arbitrary agent i. The different steps in the the convex polygon and the convexified reachable set.
algorithm are explained next. To compute the bounding convex polygons, we first con-
The inputs to the algorithm are the current position of vexify the non-convex reachable sets. Once the reachable
agent i, the estimated position of agent i at the next time step sets are convexified, we then select the number of vertices of
(X̂i (t+δt )), past positions and heading angles of the com- the bounding polygon bearing in mind the need to minimize
munication neighbors, the connectivity robustness estimated the error volume. We select 5, 7, and 4 as the number of
at the previous time step, and the set Nir (t). Based on these vertices of the bounding polygons for the reachable sets of
inputs, the algorithm estimates the connectivity robustness at type I, II, and III, respectively. Once the number of vertices
time t and updates the set Nic (t). First, we compute a set for each polygon is selected, the polygons are computed

5257

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on March 20,2023 at 10:57:37 UTC from IEEE Xplore. Restrictions apply.
Algorithm 2: getRpath
Algorithm 1: Connectivity maintenance algorithm for agent i
1: Inputs: current time t, agent indices i, j, k, estimated position
1: Inputs: current position (Xi (t)), estimated position at the of agent i at the next time step (X̂i (t + δt )), and past positions
next time step (X̂i (t+δt )), past positions, heading angles, and and heading angles of agents j and k (Xj (t − pj δt ), ψj (t −
the set Njc of the communication neighbors (Xj (t − pj δt ), pj δt ), Xk (t − pk δt ), and ψk (t − pk δt ) for j, k ∈ Nir (t))
ψj (t − pj δt ), and Njc (t − pj δt ) for j ∈ Nir (t)), the estimated 2: Outputs: estimated robustness of path (i, j, k) (P̄ (i, j, k, t))
connectivity robustness at the previous time step R̂i (t − δt ), 3: procedure
and the set Nir (t), where t = lδt for l = n, (n + 1), . . . 4: if j 6= h i(then
2: Outputs: estimated connectivity robustness R̂i (t) and Nic (t) n + is − j if j ≥ is
3: procedure 5: p1 = ; p̄1 = p1 + n + 1
is − j if j < is
4: ir = mod((t − δt )/δt , n) + 1; is = mod(t/δt , n) + 1
6: poly1 = bound poly(p̄1 )
5: if ir ∈ Nir (t) or t = nδt then
6: if t = nδt then 7: poly1r = rotate poly(poly1 , Xj (t−pj δt ), ψj (t−pj δt ))
7: Nic (t) = Nic (t − δt ); N̄ = Nic (t) 8: d¯ij = maxD poly(X̂i (t+δt ), poly1r ) + DL
else if ir ∈ Nic (t − δt ) and i ∈ Nicr (t − δt ) then
(
8: n + is − k if k ≥ is
9: Nic (t) = Nic (t − δt ) ∩ Nir (t); N̄ = Nic (t) 9: p2 = ; p̄2 = p2 + n + 1
is − k if k < is
10: else if ir ∈ Nic (t − δt ) and i ∈ / Nicr (t − δt ) then 10: poly2 = bound poly(p̄2 )
11: Ni (t) = (Ni (t − δt )\{ir }) ∩ Nir (t); N̄ = Nic (t)
c c
11: poly2r = rotate poly(poly2 , Xk (t−pk δt ), ψk (t−pk δt ))
12: else if ir ∈ / Nic (t − δt ) and i ∈ Nicr (t − δt ) then
12: d¯jk = maxD poly(poly1r , poly2r ) + 2DL
13: c
Ni (t)=(Nic (t−δt ) ∪ {ir }) ∩ Nir (t); N̄ = Nic (t)
14: else if ir ∈ / Nic (t − δt ) and i ∈
/ Nicr (t − δt ) then 13: P̄ (i, j, k, t) = min{R − d¯ij , R − d¯jk }
14: else
15: if is == i then (
n + is − k if k ≥ is
16: Nic (t) = Nic (t − δt ) ∩ Nir (t); N̄ = { } 15: p1 = ; p̄1 = p1 + n + 1
is − k if k < is
17: else
18: N̄ = (Nic (t − δt ) ∪ {ir }) ∩ Nir (t) 16: poly1 = bound poly(p̄1 )
19: if N̄ 6= { } then 17: poly1r = rotate poly(poly1 , Xk (t−pk δt ), ψk (t−pk δt ))
20: for k ∈ N̄ do 18: d¯ik = maxD poly(X̂i (t+δt ), poly1r ) + DL
21: if t = nδt then 19: P̄ (i, j, k, t) = R − d¯ik
22: Ñk = { }
23: else if i ∈ Nkc (t − pk δt ) then using a result from [11] that provides conditions for bounding
24: if is == i then a convex set with a convex polygon while minimizing the
25: Ñk = {j | j ∈ N̄ , i ∈ Njc (t − pj δt ), error volume. Using that procedure, we compute the three
k ∈ Njc (t − pj δt ), j ∈ Nkc (t − pk δt )}
bounding convex polygons as given in Fig. 2. Given the
26: else
27: Ñk = {j | j ∈ N̄ , j ∈ Nkc (t − pk δt ), values of V , Ω, and δt , we compute n bounding polygons
k ∈ Njc (t − pj δt )} corresponding to time horizons of length (n+m+1)δt , for
28: else m = 1, 2, . . . , n, using the three types of bounding polygons
29: Ñk = { } shown in Fig. 2. The n bounding polygons are computed a
30: if Ñk 6= { } then priori with the UUV position assumed to be at (0, 0) and
31: for j ∈ Ñk do a heading angle of 0 deg. While the function bound poly
32: P̄ (i, j, k, t) = getRpath(i, j, k, t, X̂i (t+δt )) in Algorithm 2 is used to select the appropriate bounding
33: q̄1 (i, k) = maxj∈Ñk {P̄ (i, j, k, t)} polygon, the function rotate poly is employed to translate the
34: q̄2 (i, k) = getRpath(i, h i, k, t, X̂i (t+δt )) polygon to the UUV position and rotate it by the heading
35: q̄(i, k) = max{q̄1 (i, k), q̄2 (i, k)} angle that were broadcasted.
36: else Although R̄i (t) in line 38 looks similar to the formula
37: q̄(i, k) = getRpath(i, h i, k, t, X̂i (t+δt ))
given in (1), it is different in the following respects. First,
38: R̄i (t) = max(mink∈N̄ {q̄(i, k)} − DL , 0)
since we do not have access to the actual neighbors of
39: if t > nδt and ir ∈ / Nic (t−δt ) and i ∈
/ Nicr (t−δt ) then
agent i at time t, we use the agents in the set N̄ to
40: if is 6= i and R̄i (t) > R̂i (t−δt ) then
estimate R̄i (t). Second, R̄i (t) is computed considering all
41: R̂i (t) = R̄i (t)
possible trajectories of the agents in the set N̄ over the time
42: Nic (t) = N̄
43: else
interval [t, t+(n+1)δt ] rather than just the current position
44: R̂i (t) = R̂i (t − δt ) of the agents as in (1). Third, the factor 1/2 is absent in
45: if is 6= i then line 38, as the motions of the other agents over the time
46: Nic (t) = Nic (t − δt ) ∩ Nir (t) interval [t, t+(n+1)δt ] have already been accounted for in
47: else the computation of q̄(·, ·). Fourth, the term DL in line 38
48: R̂i (t) = R̄i (t) ensures that even if agent i loiters within a disk of radius
49: else DL during the time interval [t+δt , t+(n+1)δt ], it does not
50: R̂i (t) = R̂i (t − δt ) lose connectivity with the agents in N̄ .
51: Nic (t) = Nic (t − δt ) ∩ Nir (t) If t = nδt or the data received by agent i during the time
interval (t − δt , t] is from one of the agents in the set

5258

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on March 20,2023 at 10:57:37 UTC from IEEE Xplore. Restrictions apply.
Nic (t − δt ) (line 47), then the estimated robustness at time Inequality (4) accounts for all three possible scenarios for
t, R̂i (t), is equal to R̄i (t) that is computed in line 38. If agent k over the time interval [t̄ − (p1 +1)δt , t+δt ], namely,
t > nδt and the data received by agent i is not from one the mission phase, the loiter phase, or a combination thereof.
of the agents in Nic (t − δt ) and i ∈ / Nir (t − δt ) (line 39), Noting that t ≥ t̄ ≥ t−(n−1)δt , and from (3) and (4), we get
then R̂i (t) is updated if R̄i (t) is greater than the estimated kXi (t+δt ) − Xk (t+δt )k ≤ R − DL ≤ R. (5)
robustness at the previous time step and i is not broadcasting
during the interval [t, t+δt ) (lines 40-42). From (5), we can conclude that agents i and k are connected
at time t+δt . We can write an inequality analogous to (4) for
IV. P ROVING N ETWORK C ONNECTIVITY any time t̃ ∈ [t, t+δt ) and show that i and k are connected
at time t̃, thereby proving the claim.
We now show that under the following assumptions on Next, we present Lemmas 2-7, whose proofs will appear in
the initial configuration of the UUVs and the motion planner the journal version of this paper.
and the controller of each UUV, the UUVs maintain network Lemma 2: Given an agent i that implements a new plan
connectivity under Algorithm 1. over the time interval [t+δt , t+(n+1)δt ], then for all k ∈
A1. The initial positions of the UUVs are such that the NiF n (t), if k ∈ NiF n (t̄) for all t̄ ∈ [t + δt , t + (n−1)δt ], then
underlying proximity graph P(X(0)) is connected. Algorithm 1 guarantees that agents i and k are connected
A2. The motion planner of each UUV generates a dynam- over the time interval [t + δt , t + (n + 1)δt ].
ically feasible trajectory, by which we mean that the Lemma 3: Given k ∈ / Nic (t − δt ) and i ∈ / Nkc (t − δt ),
maximum demanded speed and angular speed of the if k ∈ Ni (t), then Algorithm 1 guarantees that i ∈ Nkc (t̄),
c
agent is not greater than V m/s and Ω rad/s, respectively, where t + δt < t̄ ≤ t + nδt .
such that kXid (t+(j+1)δt )−Xid (t+jδt )k ≤ R̂i (t)/n for Lemma 4: Given an agent i that implements a new plan
j = 1, . . . , n, where Xid (·) denotes the reference position over the time interval [t + δt , t + (n + 1)δt ], if agent i does
commanded by the motion planner. If R̂i (t) ≤ 0, then the not replan during the time interval [t+δt , t+(n+1)δt ], then,
motion planner of agent i commands agent i to loiter for all k ∈ Nic (t) and k ∈ / NiF n (t), there exists j ∈ Nic (t)
within a disk of radius DL starting from Xid (t + δt ). such that the following hold:
A3. Each agent has a controller which ensures that the UUV 1) During the time interval [t + δt , t + (n + 1)δt ], agents
tracks the commanded reference trajectory. i and j are connected and agents j and k are connected;
With the above assumptions, we prove that Algorithm 1 2) j ∈ Nkc (t̂), k ∈ Njc (t̂), and j ∈ Nic (t̂) for all
always guarantees network connectivity. Before proving the t̂ ∈ [t + δt , t + (n+1)δt ];
main result, we present some useful lemmas. 3) j ∈ Nic (t̄) for all t̄ ∈ [t̃, t + (n+1)δt ], where t + δt ≤
Lemma 1: Given k ∈ NiF n (t−δt ) and R̂i (t−δt ) > 0, then t̃ ≤ t + nδt .
Algorithm 1 guarantees that agents i and k remain connected Lemma 5: Given k ∈ Nic (t), k ∈ / Nic (t+δt ), and agent i
over the time interval [t, t + δt ]. is in the mission phase during the time interval [t, t+δt ], then
Proof: Since R̂i (t−δt ) > 0, agent i is in the mission Algorithm 1 guarantees that there exists j ∈ Nic (t) such that
phase executing a plan that is implemented at some time t̄, j ∈ Nkc (t̃), k ∈ Njc (t̃), and j ∈ Nic (t̃) for all t̃ ∈ [t, t + δt ],
where t ≥ t̄ ≥ t−(n−1)δt . The plan implemented at t̄ is and i ∈ Njc (t̄) for some t̄ ≥ t + δt with agents i and j being
computed based on the connectivity robustness estimated at connected during the time interval [t, t̄+δt ].
time t̄−δt . Since k ∈ NiF n (t−δt ) and agent i is executing the Lemma 6: Given k ∈ Nic (t), k ∈ / Nic (t+δt ), and agents i
same plan that is implemented at t̄, we have k ∈ NiF n (t̄−δt ) and k are in the loiter phase and the mission phase, respec-
and R̂i (t̄−δt ) = R̂i (t−δt ). Consequently, (i, k) is the most tively, during the time interval [t, t+δt ], then Algorithm 1
robust path from i to k and from lines 38 and 18 in guarantees that there exists j ∈ Nic (t) such that j ∈ Nkc (t̃),
Algorithm 1 and Algorithm 2, respectively, we can write i ∈ Njc (t̃), and j ∈ Nic (t̃) for all t̃ ∈ [t, t+δt ], and k ∈ Njc (t̄)
R − d¯ik ≥ R̂i (t̄−δt ) + DL (2) for some t̄ ≥ t + δt with agents j and k being connected
where d¯ik = maxD poly(X̂i (t̄), poly1r ) + DL , poly1r = during the time interval [t, t̄+δt ].
rotate poly(poly1 , Xk (t̄−(p1 +1)δt ), ψk (t̄−(p1 +1)δt )), and Lemma 7: Given k ∈ Nic (t), k ∈ / Nic (t+δt ), and agents i
poly1 = bound poly(p1 +n+1). Recognizing that X̂i (t̄) = and k are in the loiter phase during the time interval [t, t+δt ],
Xi (t̄) from assumption A3, we can rewrite (2) as then Algorithm 1 guarantees that there exists a sequence
of agents j1 , . . . , jm , where 1 ≤ m ≤ n−2, such that the
maxD poly(X̂i (t̄), poly1r ) ≤ R − R̂i (t̄−δt ) − 2DL . (3)
following hold:
Since Algorithm 1 computes maxD poly(X̂i (t̄), poly1r ) by 1) The agent pairs (i, j1 ), (j1 , j2 ), . . . , (jm , k) are con-
considering all the possible positions of agent k over the nected during the time interval [t, t+δt ];
time interval [t̄, t̄+nδt ], under assumptions A2 and A3 and 2) j1 ∈ Nic (t̃) and jm ∈ Nkc (t̃) for all t̃ ∈ [t, t + δt ];
using the triangle inequality, we can write 3) For any agent pair (jp , jp+1 ), where p = 0, 1, . . . , m,
kXi (t+δt ) − Xk (t+δt )k ≤ maxD poly(Xi (t̄), poly1r ) + j0 = i, and jm+1 = k , jp ∈ Njcp+1 (t̄p ) and jp+1 ∈
Njcp (t̄p ) for some t̄p ≥ t + δt with agents jp and jp+1
(t + δt − t̄)R̂i (t̄−δt )/(nδt ) + DL . (4) being connected during the time interval [t, t̄p + δt ].

5259

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on March 20,2023 at 10:57:37 UTC from IEEE Xplore. Restrictions apply.
Theorem 1: Given k ∈ Nic (nδt ) and the assumptions A1-
A3, then Algorithm 1 guarantees that agents i and k are
connected for all t ≥ nδt .
Proof: From assumption A1 and the initial conditions
of Algorithm 1, we have k ∈ NiF n (nδt ), i ∈ NkF n (nδt ), and
agents i and k are connected over the interval [nδt , (n+1)δt ].
Agents i and k implement their plan at time t = (n+1)δt ,
and from Lemma 2, they are guaranteed to be connected
over the time interval [(n+1)δt , (2n+1)δt ] if they do not
replan during [(n+1)δt , 2nδt ]. If one of the agents, say
agent i, replans and implements a new plan at some
time t̄ ∈ [(n+2)δt , (2n+1)δt ], then depending on whether
k ∈ NiF n (t̄) or k ∈ / NiF n (t̄), Lemma 2 and Lemma 4, re-
spectively, can be used to show connectivity over the time Fig. 3. Time history of the estimated connectivity robustness and the
interval [t̄, t̄+nδt ]. This reasoning can be extended, and using algebraic connectivity (λ2 (L)) for the 4-agent UUV network.
Lemmas 5-7, we can show that at any time t ≥ nδt , there
the Laplacian matrix L. A well-known result in graph theory
exists a sequence of agents j0 , . . . , jm , where 0 ≤ m ≤ n−2
states that if λ2 (L) > 0, then the graph is connected [12].
with j0 = i, such that the agent pairs (j0 , j1 ), (j1 , j2 ), . . . ,
Fig. 3 shows the time histories of R̂i and λ2 (L) for i =
(jm , k) are connected at time t, thereby proving connectivity
1, . . . , 4 from a representative simulation. It can be seen from
between agents i and k at time t.
the figure that λ2 (L) is never equal to zero, indicating that
Theorem 2: Given assumptions A1-A3, then Algorithm 1 network connectivity is maintained at all times.
guarantees that at any time t > 0, the network represented
VI. C ONCLUSION
by the proximity graph P(X(t)) is connected.
Proof: Since P(X(0)) is connected by assumption A1, This paper presents a distributed connectivity maintenance
there exists a path in P(X(0)) between any two agents i algorithm for a network of UUVs that interact using the
and k. From the initial conditions, it is trivial to show that TDMA communication protocol. The algorithm provides
P(X(t)) is connected for t ∈ [0, (n+1)δt ]. Let (l0 , . . . , lp ) motion constraints, which can be used by any motion planner
be the path in P(X(nδt )) between two arbitrary agents i and to generate a connectivity-preserving reference trajectory.
k, where l0 = i, lp = k, and p ≤ (n − 1). From the initial Under appropriate assumptions on the initial configuration,
conditions, we know that for any pair (lm , lm+1 ), where the motion planner, and the controller of each UUV, we prove
0 ≤ m ≤ p − 1, lm ∈ Nlcm+1 (nδt ) and lm+1 ∈ Nlcm (nδt ). that the proposed algorithm guarantees network connectivity.
Then, using Theorem 1, we can conclude that lm and lm+1 Finally, simulation results are presented for a 4-agent UUV
are connected at any time t > nδt , thereby maintaining the network to show the effectiveness of the proposed algorithm.
connectivity between agents i and k at any time t > nδt . R EFERENCES
[1] “The Navy unmanned undersea vehicle (UUV) master plan,” US Navy,
V. S IMULATION R ESULTS vol. 9, p. 90, 2004.
[2] M. L. Seto, Marine robot autonomy. Springer, 2012.
This section presents simulation results with the connec- [3] M. M. Zavlanos, M. B. Egerstedt, and G. J. Pappas, “Graph-theoretic
tivity maintenance algorithm for a UUV network composed connectivity control of mobile robot networks,” Proc. IEEE, vol. 99,
no. 9, pp. 1525–1540, 2011.
of 4 UUVs. The UUVs communicate with each other using [4] L. Sabattini, N. Chopra, and C. Secchi, “Decentralized connectivity
the TDMA protocol, where the duration of one time slot maintenance for cooperative control of mobile robotic systems,” Int.
is 10 s. The maximum speed and angular speed of each J. Robot. Res., vol. 32, no. 12, pp. 1411–1423, 2013.
[5] M. C. De Gennaro and A. Jadbabaie, “Decentralized control of
UUV are 1.5 m/s and 0.15 rad/s, respectively. The value connectivity for multi-agent systems,” in Proc. Conf. Decis. Control,
of DL , which is the radius of the disk within which the 2006, pp. 3628–3633.
UUVs loiter if R̂i (·) ≤ 0, is 10 m. The communication range [6] P. Yang, R. A. Freeman, G. J. Gordon, K. M. Lynch, S. S. Srinivasa,
and R. Sukthankar, “Decentralized estimation and control of graph
of the agents, R, is 200 m. Given the motion constraints connectivity for mobile sensor networks,” Automatica, vol. 46, no. 2,
from Algorithm 1, a simple motion planner is used to pp. 390–396, 2010.
generate a dynamically feasible trajectory. For this simulation [7] D. P. Spanos and R. M. Murray, “Motion planning with wireless
network constraints,” in Proc. Am. Control Conf., 2005, pp. 87–92.
study, the motion planner generates a dynamically feasible [8] J. Heidemann, M. Stojanovic, and M. Zorzi, “Underwater sensor
trajectory by first non-deterministically selecting a value for networks: applications, advances and challenges,” Philos. Trans. R.
the angular speed that is less than or equal to 0.15 rad/s. Soc. A, vol. 370, no. 1958, pp. 158–175, 2012.
[9] D. P. Spanos and R. M. Murray, “Robust connectivity of networked
By assuming a constant angular speed over the planning vehicles,” in Proc. Conf. Decis. Control, vol. 3, 2004, pp. 2893–2898.
horizon, the motion planner then generates a plan satisfying [10] H. Edelsbrunner, “Computing the extreme distances between two
the motion constraints. For the sake of demonstration, we convex polygons,” J. Algorithms, vol. 6, no. 2, pp. 213–224, 1985.
[11] E. Trost, “Über eine extremalaufgabe,” Nieuw Archief voor Wiskunde,
assume that each UUV executes its plan without any position vol. 2, pp. 1–3, 1949.
errors. To analyze the connectivity of the UUV network, we [12] M. Fiedler, “Algebraic connectivity of graphs,” Czech. Math. J.,
compute λ2 (L), which is the second smallest eigenvalue of vol. 23, no. 2, pp. 298–305, 1973.

5260

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on March 20,2023 at 10:57:37 UTC from IEEE Xplore. Restrictions apply.

You might also like