Adapting ROS Logs to Facilitate Transparency and Accountability in Service Robotics

  • Francisco Javier Rodríguez-LeraEmail author
  • Ángel Manuel Guerrero-Higueras
  • Francisco Martín-Rico
  • Jonathan Gines
  • Juan Felipe García Sierra
  • Vicente Matellán-Olivera
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1093)


Understanding why a particular robot behavior was triggered is a cornerstone for having human-acceptable social robots. Thus, every robot action should be explained in order to audit, recognize, and control expected and unexpected behaviors using usual sources of information provided by robot software components. Enabling intelligibility goes through a correct translation of system logs. This paper presents an initial approach for arranging low-level knowledge extracted from logs available in the de facto standard for service robotics ROS in order to be useful for developers and regulators.


Accountable robotics ROS Trusted robotic platform Accountability Logging Continuous auditing 



This work has been partially funded by Junta de Castilla y León and FEDER funds, Spain under Research Grant No. LE028P17, by Ministerio de Ciencia, Innovación y Universidades under Research Grant RTI2018-100683-B-I00 and by Ministerio de Economía and Competitividad of the Kingdom of Spain under RETOGAR project (TIN2016-76515-R).


  1. 1.
    Bihlmaier, A., Hadlich, M., Wörn, H.: Advanced ROS network introspection (ARNI), pp. 651–670. Springer, Cham (2016).
  2. 2.
    Butin, D., Chicote, M., Le Métayer, D.: Log design for accountability. In: 2013 IEEE Security and Privacy Workshops, pp. 1–7. IEEE (2013)Google Scholar
  3. 3.
    Thomas, D., Scholz, D., Kruse, T., Blasdel, A., Saito, I.: RQT common plugins (2013). Accessed 29 Aug 2019
  4. 4.
    Guerrero-Higueras, Á.M., Rodríguez-Lera, F.J., Martín-Rico, F., Balsa-Comerón, J., Matellán-Olivera, V.: Accountability in mobile service robots. In: Workshop of Physical Agents, pp. 242–254. Springer (2018)Google Scholar
  5. 5.
    Le Metayer, D., Mazza, E., Potet, M.L.: Designing log architectures for legal evidence. In: 2010 8th IEEE International Conference on Software Engineering and Formal Methods, pp. 156–165. IEEE (2010)Google Scholar
  6. 6.
    Schwarz, M.: Rosmon (2018). Accessed 29 Aug 2019
  7. 7.
    Schneier, B., Kelsey, J.: Secure audit logs to support computer forensics. ACM Trans. Inf. Syst. Secur. (TISSEC) 2(2), 159–176 (1999)CrossRefGoogle Scholar
  8. 8.
    Shirey, R.: RFC 2828: Internet Security Glossary. Internet Soc. 13, 151 (2000)Google Scholar
  9. 9.
    Waters, B.R., Balfanz, D., Durfee, G., Smetters, D.K.: Building an encrypted and searchable audit log. NDSS 4, 5–6 (2004)Google Scholar
  10. 10.
    Wickramage, C., Sahama, T., Fidge, C.: Anatomy of log files: implications for information accountability measures. In: 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom), pp. 1–6. IEEE (2016)Google Scholar
  11. 11.
    Willow Garage, Inc.: Maye, J., Kaestner, R.: ROS-system-monitor (2015). Accessed 29 Aug 2019
  12. 12.
    Xiao, Y., Yue, S., Fu, B., Ozdemir, S.: GlobalView: building global view with log files in a distributed/networked system for accountability. Secur. Commun. Netw. 7(12), 2564–2586 (2014)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Francisco Javier Rodríguez-Lera
    • 1
    Email author
  • Ángel Manuel Guerrero-Higueras
    • 1
  • Francisco Martín-Rico
    • 2
  • Jonathan Gines
    • 2
  • Juan Felipe García Sierra
    • 1
  • Vicente Matellán-Olivera
    • 3
  1. 1.Robotics Group, Department of Mechanical, Computer and Aerospace EngineeringUniversity of LeónLeónSpain
  2. 2.Intelligent Robotics LabUniversidad Rey Juan CarlosMadridSpain
  3. 3.Supercomputación de Castilla y León (SCAYLE)LeónSpain

Personalised recommendations