Difference between revisions of "ROSRV"

From FSL
Jump to: navigation, search
Line 148: Line 148:
 
Watch our demo to see how the monitors interact with the robot LandShark [2]:
 
Watch our demo to see how the monitors interact with the robot LandShark [2]:
  
<iframe width="854" height="514" src="//www.youtube.com/embed/JSFqvPoD13s" frameborder="0" allowfullscreen></iframe>
+
<iframe width="854" height="514" src="//www.youtube.com/embed/JSFqvPoD13s" frameborder="0" modestbranding="1" showinfo="0" allowfullscreen></iframe>
  
 
== References ==
 
== References ==

Revision as of 07:53, 26 May 2014

ROSRV is a runtime verification framework for the Robot Operating System (ROS) [1]. ROS is an open-source framework for robot software development, providing operating system-like functionality on heterogeneous computer clusters. With the wide adoption of ROS, its safety and security are becoming an important problem. ROSRV integrates seamlessly with ROS and works as a transparent monitoring infrastructure that intercepts the commands and messages passing through the system and performs monitoring actions upon events of interest. Safety and security properties can be defined in a formal specification language, and are ensured by monitors generated automatically from specifications.

Contents

Getting Started

Download

rvmaster

Compile

To generate monitors out of event specifications, first you have to compile the RosMOP tool.

Go to rosmop directory and call

ant

For the monitor generation and the compilation of RVMaster with the generated code, call the script rosmop with event specification(s) as input

rosmop monitors/landshark_monitors/


Run

rvcore: runs ROSMaster and RVMaster

rvsim: runs the LandShark simulator (requires Webots)

rvjoystick: runs the joystick controller


Monitoring options

rosrv

-enable: enables given monitor(s)
-disable: disables given monitor(s)
-list: lists active monitors
-rvstate: lists the status of RVMaster regarding monitors


Event Specification

All the specifications are provided by users. ROSRV generates C++ code automatically based on those specifications. Each event generates one call back method and all the call back methods are registered by RVMaster. Parameters of events are treated as references to fields in monitored messages, so users can modify messages in event handler code. Event handlers (i.e. actions) are inserted in call back methods and called by RVMaster at runtime.

Basic form of a user-defined event specification is the following:

#include <library>
spec(){
int i;
bool b;
 
event event1(parameters) topic messageType '{pattern}'
<<
//action code
>>
}

Event specification names are used to identify the monitors. By using those names, one can enable or disable desired monitors, and hence control which events take place.

The following event specification defines the monitor which makes sure the robot doesn't shoot itself. For clarity, please check out our demo.

#include <stdint.h>
 
safeTrigger() {
bool isSafeTrigger = false;
 
event checkPoint(std::string monitored_name, double monitored_position) /landshark/joint_states sensor_msgs/JointState '{name[1]:monitored_name, position[1]:monitored_position}'
<<
if(monitored_name=="turret_tilt")
{
if(monitored_position > -0.45){
isSafeTrigger = true;
ROS_INFO("Safe to trigger");
}else{
isSafeTrigger = false;
ROS_INFO("Not safe to trigger");
}
}
>>
 
event safeTrigger() /landshark_control/trigger landshark_msgs/PaintballTrigger '{}'
<<
if(!isSafeTrigger)
{
ROS_WARN("Monitor: Not allowed to trigger in this pose!");
return;
}
>>
}

Access Control

ROSRV enforces access control based on a user-provided specification of access policies as input configuration. On receiving any XMLRPC request from nodes, RVMaster decides whether the request is allowed to go to the ROSMaster according to the specification.

The policies are currently categorized into four different sections. Under each section, the access policy is written as a key followed by an assignment symbol and a list of values.


[Nodes]: key = node name, value = machine identity allowed to create the specified nodes

[Subscribers]: key = topic name, value = node identity allowed to subscribe to the topic

[Publishers]: key = topic name, value = node identity allowed to publish to the topic

[Commands]: key = command name, value = node identity allowed to perform the command


The following is a sample access control policy for LandShark:

[Groups]
# Aliases
localhost = 127.0.0.1
certikos = ip1 ip2 ip3 ip4
ocu = ip5 ip6 ip7 ip8
 
[Nodes]
# by default, allowed to create any node
default=localhost
/landshark_radar=certikos
 
[Publishers]
default=localhost certikos
/landshark_control/trigger= ocu
 
[Subscribers]
default = localhost certikos
/landshark/gps = ocu
 
[Commands]
# Commands: full access
getSystemState = localhost certikos ocu
# Commands: limited access
lookupNode = localhost certikos
# Commands: local access only
shutdown = localhost

Demo

Watch our demo to see how the monitors interact with the robot LandShark [2]:

References

[1] ROS

[2] The LandShark UGV is a product of Black-i Robotics

Personal tools
Namespaces

Variants
Actions
Navigation