Adapting ROS Logs to Facilitate Transparency and Accountability in Service Robotics
Abstract
Understanding why a particular robot behavior was triggered is a cornerstone for having human-acceptable social robots. Thus, every robot action should be explained in order to audit, recognize, and control expected and unexpected behaviors using usual sources of information provided by robot software components. Enabling intelligibility goes through a correct translation of system logs. This paper presents an initial approach for arranging low-level knowledge extracted from logs available in the de facto standard for service robotics ROS in order to be useful for developers and regulators.
Keywords
Accountable robotics ROS Trusted robotic platform Accountability Logging Continuous auditingNotes
Acknowledgment
This work has been partially funded by Junta de Castilla y León and FEDER funds, Spain under Research Grant No. LE028P17, by Ministerio de Ciencia, Innovación y Universidades under Research Grant RTI2018-100683-B-I00 and by Ministerio de Economía and Competitividad of the Kingdom of Spain under RETOGAR project (TIN2016-76515-R).
References
- 1.Bihlmaier, A., Hadlich, M., Wörn, H.: Advanced ROS network introspection (ARNI), pp. 651–670. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-26054-9_25
- 2.Butin, D., Chicote, M., Le Métayer, D.: Log design for accountability. In: 2013 IEEE Security and Privacy Workshops, pp. 1–7. IEEE (2013)Google Scholar
- 3.Thomas, D., Scholz, D., Kruse, T., Blasdel, A., Saito, I.: RQT common plugins (2013). http://wiki.ros.org/rqt_common_plugins. Accessed 29 Aug 2019
- 4.Guerrero-Higueras, Á.M., Rodríguez-Lera, F.J., Martín-Rico, F., Balsa-Comerón, J., Matellán-Olivera, V.: Accountability in mobile service robots. In: Workshop of Physical Agents, pp. 242–254. Springer (2018)Google Scholar
- 5.Le Metayer, D., Mazza, E., Potet, M.L.: Designing log architectures for legal evidence. In: 2010 8th IEEE International Conference on Software Engineering and Formal Methods, pp. 156–165. IEEE (2010)Google Scholar
- 6.Schwarz, M.: Rosmon (2018). http://wiki.ros.org/rosmon. Accessed 29 Aug 2019
- 7.Schneier, B., Kelsey, J.: Secure audit logs to support computer forensics. ACM Trans. Inf. Syst. Secur. (TISSEC) 2(2), 159–176 (1999)CrossRefGoogle Scholar
- 8.Shirey, R.: RFC 2828: Internet Security Glossary. Internet Soc. 13, 151 (2000)Google Scholar
- 9.Waters, B.R., Balfanz, D., Durfee, G., Smetters, D.K.: Building an encrypted and searchable audit log. NDSS 4, 5–6 (2004)Google Scholar
- 10.Wickramage, C., Sahama, T., Fidge, C.: Anatomy of log files: implications for information accountability measures. In: 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom), pp. 1–6. IEEE (2016)Google Scholar
- 11.Willow Garage, Inc.: Maye, J., Kaestner, R.: ROS-system-monitor (2015). https://github.com/ethz-asl/ros-system-monitor. Accessed 29 Aug 2019
- 12.Xiao, Y., Yue, S., Fu, B., Ozdemir, S.: GlobalView: building global view with log files in a distributed/networked system for accountability. Secur. Commun. Netw. 7(12), 2564–2586 (2014)CrossRefGoogle Scholar