SlideShare a Scribd company logo
Data Centric Security for the Industrial IoT
Stan Schneider, RTI CEO
IIC Steering Committee Member
The smart machine era will be the most disruptive in the history of IT
-- Gartner 2015
The Industrial Internet of Things
Industrial Internet of Things (IIoT)
Consumer Internet of Things (CIoT)
Cyber-Physical Systems (CPS)
Embedded Security and the IoT – Challenges, Trends and Solutions
The Industrial Internet Consortium
• Goal: Interoperability for the IIoT
• 159+ companies!
• RTI role
– Steering committee, data
management (co-lead), architecture,
security (co-lead), use case (co-lead),
marketing
– Lead or co-lead 4 testbed teams
RTI Named Most Influential IIoT Company
RTI’s Experience
• ~800 Designs
– Healthcare
– Transportation
– Communications
– Energy
– Industrial
– Defense
• 15+ Standards &
Consortia Efforts
Why Choose DDS?
• Reliability: Severe consequences if offline for 5
minutes?
• Performance/scale:
– Measure in ms or µs?
– Or scale > 20+ applications or 10+ teams?
– Or 10k+ data values?
• Architecture: Code active lifetime >3 yrs?
2 or 3 Checks?
DDS is Different!
Point-to-Point
TCP
Sockets
Publish/Subscribe
Fieldbus
CANbus
Queuing
AMQP
Active
MQ
Client/Server
MQTT
REST
XMPP
OPC
CORBA
Brokered
Daemon
Data-Centric
DDS
Shared Data Model
DataBus
Data Centric is the Opposite of OO
Object Oriented
• Encapsulate data
• Expose methods
Data Centric
• Encapsulate methods
• Expose data
Explicit
Shared
Data
Model
Data-Centric Connection = Data-Path Control
• Global Data Space
– Automatic discovery
– Read & write data in
any OS, language,
transport
– Redundant
sources/sinks/nets
• Type Aware
• QoS control
– Timing, Reliability,
Ownership,
Redundancy,
Filtering, Security
Shared Global Data Space
DDS DataBus
Patient Hx
Device
Identity
Devices
SupervisoryCDS
Physiologic
State
NursingStation
Cloud
Offer: Write this
1000x/sec
Reliable for 10 secs
Request: Read this 10x/sec
If patient = “Joe”
Data-Centric Security Model
• Per-Topic Security
– Control r,w access for each
function
– Enforce each dataflow
• Complete Protection
– Discovery authentication
– Data-centric access control
– Cryptography
– Tagging & logging
– Non-repudiation
– Secure multicast
– 100% standards compliant
• No code changes!
• Plugin architecture for
advanced uses
• Topic Security model:
– PMU: State(w)
– CBM: State(r); Alarms(w)
– Control: State(r), SetPoint(w)
– Operator: *(r), Setpoint(w)
CBM AnalysisPMU Control Operator
State Alarms SetPoint
Demanding Use Cases
• The USS SECURE
cybersecurity test bed is a
collaboration between:
– The National Security Agency
– Department of Defense
Information Assurance Range
Quantico
– Combat Systems Direction
Activity Dam Neck
– NSWCDD
– NSWC Carderock/Philadelphia
– Office of Naval Research
– Johns Hopkins University
Applied Physics Lab
– Real Time Innovations, Inc.
• Objectives
– Immunize against cyberattack
and to rapidly recover when
impacted
– Determine the best
cyberdefense technologies
without impacting real time
deadline scheduled
performance
http://www.navy.mil/submit/display.asp?story_id=79228
DDS Security Standard
• DDS entities are
authenticated
• DDS enforces
topic-level access
control
• DDS maintains
data integrity and
confidentiality
• DDS enforces non-
repudiation
• DDS provides
availability
…while maintaining DDS interoperability & high performance
Pluggable Security Architecture
App.
Other
DDS
System
Secure DDS
middleware
Authentication
Plugin
Access Control
Plugin Cryptographic
Plugin
Secure Kernel
Crypto
Module
(e.g. TPM )
Transport (e.g. UDP)
application componentcertificates
?
Data
cache
Protocol
Engine
Kernel
Policies
DDS Entities
Network
Driver
?
Network
Encrypted Data
Other
DDS
System
Other
DDS
System
App.App.
Logging
Plugin
DataTagging
Plugin
MAC
Standard Capabilities (Built-in Plugins)
Authentication  X.509 Public Key Infrastructure (PKI) with a pre-configured
shared Certificate Authority (CA)
 Digital Signature Algorithm (DSA) with Diffie-Hellman and
RSA for authentication and key exchange
Access Control  Configured by domain using a (shared) Governance file
 Specified via permissions file signed by shared CA
 Control over ability to join systems, read or write data
topics
Cryptography  Protected key distribution
 AES128 and AES256 for encryption
 HMAC-SHA1 and HMAC-SHA256 for message
authentication and integrity
Data Tagging  Tags specify security metadata, such as classification level
 Can be used to determine access privileges (via plugin)
Logging  Log security events to a file or distribute securely over
Connext DDS
Secure DDS
over UDP
Control Station
Master
Device
Transmission Substation
Slave
Device
Security Needs Protection and Detection
DNP3 over
RS232/485
DNP3 over
Ethernet DNP3 over DDS
Attack Detector
Display
Anomaly
Detector
(Lua)
Scada
Converter
(C++)
Slave
Device
Existing DNP3
RTI Routing
Service
ComProcessor
RTI Routing
Service
ComProcessor
Secure DDS
DDS DDS
About RTI
• Market Leader
– 800+ designs; $1T designed-in value
• Over 70% DDS mw market share1
• Largest embedded middleware vendor2
– By far the most DDS designs
– 2013 Gartner Cool Vendor for technology and Open Community
Source model
• Standards Leader
– Active in 15 standards efforts
– DDS authors, chair, wire spec, security, more
– IIC steering committee; OMG board
• Team Quality Leader
– Stanford research pedigree
– High-performance, control, systems experts
– Top quality product, processes, execution
– Consistent head-to-head victors
1Embedded Market Forecasters
2VDC Analyst Report
Industrial Internet of Things Thought Leader
• RTI FastTrax IIoT
Strategic Consulting
– Architectural guidance
– Security design
– Cloud integration
– Business objectives
For More Information
• RTI site: www.rti.com
• Examples, forum, papers: community.rti.com
• IIC website: www.iiconsortium.org
• Email: stan@rti.com
• Connect on LinkedIn
• Free RTI Connext DDS Pro:
www.rti.com/downloads
The DDS Data-Centric Standard for the IIoT
• OMG’s Data Distribution Service is
the Proven Data Connectivity
Standard for the IoT
• OMG: world’s largest systems
software standards org
– UML, DDS, Industrial Internet
Consortium
• DDS: open & cross-vendor
– Open Standard & Open Source
– 12 implementations
Interoperability between source
written for different vendors
Interoperability between applications
running on different implementations
DDS-RTPS Protocol
Real-Time Publish-Subscribe
Distribution Fabric
DDS API
This is addressed by DDS Security
Security Boundaries
• System Boundary
• Network Transport
– Media access (layer 2)
– Network (layer 3) security
– Session/Endpoint (layer 4/5) security
• Host
– Machine/OS/Applications/Files
• Data & Information flows
Ultimately, you need to implement all!
DDS Security Model
Concept Unix Filesystem Security Model DDS Security Model
Subject User
Process executing for a user
DomainParticipant
Application joining a DDS domain
Protected
Objects
Directories
Files
Domain (by domain_id)
Topic (by Topic name)
DataObjects (by Instance/Key)
Protected
Operations
Directory.list,
Directory.create (File, Dir)
Directory.remove (File, Dir)
Directory.rename (File, Dir)
File.read,
File.write,
File.execute
Domain.join
Topic.create
Topic.read (includes QoS)
Topic.write (includes QoS)
Data.createInstance
Data.writeInstance
Data.deleteInstance
Access Control
Policy Control
Fixed in Kernel Configurable via Plugin
Builtin Access
Control Mode
Per-File/Dir Read/Write/Execute
permissions for OWNER, GROUP,
USERS
Per-DomainParticipant Permissions :
What Domains and Topics it can
JOIN/READ/WRITE

More Related Content

PPTX
Managing Avionics Safety Certification for Unmanned Aircraft
Real-Time Innovations (RTI)
 
PPTX
Data Distribution Service Security and the Industrial Internet of Things
Real-Time Innovations (RTI)
 
PPTX
Space Rovers and Surgical Robots: System Architecture Lessons from Mars
Real-Time Innovations (RTI)
 
PPTX
Cyber Security for the Connected Car
Real-Time Innovations (RTI)
 
PDF
What Does Interoperability Mean for the IoT?
Real-Time Innovations (RTI)
 
PDF
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Real-Time Innovations (RTI)
 
PPTX
Advancing Active Safety for Next-Gen Automotive
Real-Time Innovations (RTI)
 
PDF
ISO 26262 Approval of Automotive Software Components
Real-Time Innovations (RTI)
 
Managing Avionics Safety Certification for Unmanned Aircraft
Real-Time Innovations (RTI)
 
Data Distribution Service Security and the Industrial Internet of Things
Real-Time Innovations (RTI)
 
Space Rovers and Surgical Robots: System Architecture Lessons from Mars
Real-Time Innovations (RTI)
 
Cyber Security for the Connected Car
Real-Time Innovations (RTI)
 
What Does Interoperability Mean for the IoT?
Real-Time Innovations (RTI)
 
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Real-Time Innovations (RTI)
 
Advancing Active Safety for Next-Gen Automotive
Real-Time Innovations (RTI)
 
ISO 26262 Approval of Automotive Software Components
Real-Time Innovations (RTI)
 

What's hot (20)

PPTX
Internet of Things (IoT) Costs, Connectivity, Resources and Software
Real-Time Innovations (RTI)
 
PDF
How to Cut $2 Million of Your Safety Cert Costs
Real-Time Innovations (RTI)
 
PPTX
The Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
Real-Time Innovations (RTI)
 
PDF
Security and Safety Assurance in Industrial IoT
Vladimir Sklyar
 
PDF
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...
Real-Time Innovations (RTI)
 
PPTX
Accelerating Safety and Security Certification with FACE™ COTS Solutions
Real-Time Innovations (RTI)
 
PPTX
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity Software
Real-Time Innovations (RTI)
 
PDF
The Industrial Internet of Things and RTI
Real-Time Innovations (RTI)
 
PPTX
October Southern CA Road Shows - Build Safe and Secure Distributed Systems
Real-Time Innovations (RTI)
 
PDF
Secure IOT Gateway
LF Events
 
PDF
Introduction to Operational Technology 0.1
Richard Hudson
 
PPSX
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
Byres Security Inc.
 
PPTX
Building converged plantwide ethernet architectures
IntelligentManufacturingInstitute
 
PDF
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Honeywell
 
PDF
Secure Systems Security and ISA99- IEC62443
Yokogawa1
 
PDF
Developing Interoperable Components for an Open IoT Foundation
Eurotech
 
PDF
Architectural Patterns in IoT Cloud Platforms
Roshan Kulkarni
 
PDF
Operational Technology Security Solution for Utilities
Krishna Chennareddy
 
PDF
Iot gateways march 2015
sgadgil2002
 
PDF
Csa dar-air-pitch-deck-102316
ClearSpace Aeronautics
 
Internet of Things (IoT) Costs, Connectivity, Resources and Software
Real-Time Innovations (RTI)
 
How to Cut $2 Million of Your Safety Cert Costs
Real-Time Innovations (RTI)
 
The Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
Real-Time Innovations (RTI)
 
Security and Safety Assurance in Industrial IoT
Vladimir Sklyar
 
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...
Real-Time Innovations (RTI)
 
Accelerating Safety and Security Certification with FACE™ COTS Solutions
Real-Time Innovations (RTI)
 
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity Software
Real-Time Innovations (RTI)
 
The Industrial Internet of Things and RTI
Real-Time Innovations (RTI)
 
October Southern CA Road Shows - Build Safe and Secure Distributed Systems
Real-Time Innovations (RTI)
 
Secure IOT Gateway
LF Events
 
Introduction to Operational Technology 0.1
Richard Hudson
 
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
Byres Security Inc.
 
Building converged plantwide ethernet architectures
IntelligentManufacturingInstitute
 
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Honeywell
 
Secure Systems Security and ISA99- IEC62443
Yokogawa1
 
Developing Interoperable Components for an Open IoT Foundation
Eurotech
 
Architectural Patterns in IoT Cloud Platforms
Roshan Kulkarni
 
Operational Technology Security Solution for Utilities
Krishna Chennareddy
 
Iot gateways march 2015
sgadgil2002
 
Csa dar-air-pitch-deck-102316
ClearSpace Aeronautics
 
Ad

Viewers also liked (20)

PPTX
10 Keys to Data-Centric Security
Sirius
 
PDF
Embedded Systems Security: Building a More Secure Device
Priyanka Aash
 
PPT
Opportunities and Challenges of Large-scale IoT Data Analytics
PayamBarnaghi
 
PDF
Sqrrl May Webinar: Data-Centric Security
Sqrrl
 
PDF
Big Data Requires Big Protection
IBM Security
 
PDF
How to Design Distributed Robotic Control Systems
Real-Time Innovations (RTI)
 
PPTX
Fiware Developers Week IoT Agents (Advanced)
dmoranj
 
PPTX
IoT-market-estimative
Cleber Gomes
 
PDF
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
Real-Time Innovations (RTI)
 
PPTX
Your Thing is Pwned - Security Challenges for the IoT
WSO2
 
PPTX
Internet of Things Service Level Agreements: Market Outlook and Forecast for ...
Market Research Reports, Inc.
 
PPTX
IoT Security Middleware: evaluating the threats and protecting against them
Nick Allott
 
PDF
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
IBM_Info_Management
 
PPTX
Edge-Fog Cloud
Nitinder Mohan
 
PDF
The Platform for the Industrial Internet of Things (IIoT)
Gerardo Pardo-Castellote
 
PDF
Will Internet of Things (IoT) be secure enough?
Ravindra Dastikop
 
PPT
Semantic Technologies for the Internet of Things: Challenges and Opportunities
PayamBarnaghi
 
PPTX
Building the internet of things with ibm (slideshare)
Bernard Kufluk
 
PPTX
RFID with INTERNET OF THINGS
Bino Mathew Varghese
 
PDF
20170101 RILHEVA HVAC IOT PLATFORM
Massimiliano Cravedi
 
10 Keys to Data-Centric Security
Sirius
 
Embedded Systems Security: Building a More Secure Device
Priyanka Aash
 
Opportunities and Challenges of Large-scale IoT Data Analytics
PayamBarnaghi
 
Sqrrl May Webinar: Data-Centric Security
Sqrrl
 
Big Data Requires Big Protection
IBM Security
 
How to Design Distributed Robotic Control Systems
Real-Time Innovations (RTI)
 
Fiware Developers Week IoT Agents (Advanced)
dmoranj
 
IoT-market-estimative
Cleber Gomes
 
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
Real-Time Innovations (RTI)
 
Your Thing is Pwned - Security Challenges for the IoT
WSO2
 
Internet of Things Service Level Agreements: Market Outlook and Forecast for ...
Market Research Reports, Inc.
 
IoT Security Middleware: evaluating the threats and protecting against them
Nick Allott
 
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
IBM_Info_Management
 
Edge-Fog Cloud
Nitinder Mohan
 
The Platform for the Industrial Internet of Things (IIoT)
Gerardo Pardo-Castellote
 
Will Internet of Things (IoT) be secure enough?
Ravindra Dastikop
 
Semantic Technologies for the Internet of Things: Challenges and Opportunities
PayamBarnaghi
 
Building the internet of things with ibm (slideshare)
Bernard Kufluk
 
RFID with INTERNET OF THINGS
Bino Mathew Varghese
 
20170101 RILHEVA HVAC IOT PLATFORM
Massimiliano Cravedi
 
Ad

Similar to Embedded Security and the IoT – Challenges, Trends and Solutions (20)

PPTX
Blueprint for the Industrial Internet: The Architecture
Real-Time Innovations (RTI)
 
PDF
DDS Secure Intro
John Breitenbach
 
PPTX
How to Build the Connectivity Architecture for the Industrial Internet of Thi...
Real-Time Innovations (RTI)
 
PDF
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
Gerardo Pardo-Castellote
 
PDF
Industrial IOT Data Connectivity Standard
Gerardo Pardo-Castellote
 
PDF
Fog Computing is the Future of the Industrial Internet of Things
Real-Time Innovations (RTI)
 
PDF
Data Virtualization: An Introduction
Denodo
 
PPTX
Cyber security within Organisations: A sneaky peak of current status, trends,...
Marco Casassa Mont
 
PDF
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
Charles "Chuck" Speicher Jr.
 
PPTX
Nreca kickoff meeting
Charles "Chuck" Speicher Jr.
 
PPTX
Blueprint for the Industrial Internet of Things
Real-Time Innovations (RTI)
 
PPTX
Interoperability and the Internet of Things – To standardize or not to standa...
Real-Time Innovations (RTI)
 
PDF
Denodo DataFest 2017: Conquering the Edge with Data Virtualization
Denodo
 
PPTX
Cyber security event
Tryzens
 
PDF
Architecting the Enterprise Internet of Things
Dell World
 
PPTX
Cloud & Big Data - Digital Transformation in Banking
Sutedjo Tjahjadi
 
PPTX
DT Company Overview January 2013
DataTactics
 
PPTX
MBSE meets Industrial IoT: Introducing the New MagicDraw Plug-in for RTI Co...
Istvan Rath
 
PDF
MT81 Keys to Successful Enterprise IoT Initiatives
Dell EMC World
 
PPTX
Iia 2012 Spring Conference Philly V Final
Danny Miller
 
Blueprint for the Industrial Internet: The Architecture
Real-Time Innovations (RTI)
 
DDS Secure Intro
John Breitenbach
 
How to Build the Connectivity Architecture for the Industrial Internet of Thi...
Real-Time Innovations (RTI)
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
Gerardo Pardo-Castellote
 
Industrial IOT Data Connectivity Standard
Gerardo Pardo-Castellote
 
Fog Computing is the Future of the Industrial Internet of Things
Real-Time Innovations (RTI)
 
Data Virtualization: An Introduction
Denodo
 
Cyber security within Organisations: A sneaky peak of current status, trends,...
Marco Casassa Mont
 
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
Charles "Chuck" Speicher Jr.
 
Nreca kickoff meeting
Charles "Chuck" Speicher Jr.
 
Blueprint for the Industrial Internet of Things
Real-Time Innovations (RTI)
 
Interoperability and the Internet of Things – To standardize or not to standa...
Real-Time Innovations (RTI)
 
Denodo DataFest 2017: Conquering the Edge with Data Virtualization
Denodo
 
Cyber security event
Tryzens
 
Architecting the Enterprise Internet of Things
Dell World
 
Cloud & Big Data - Digital Transformation in Banking
Sutedjo Tjahjadi
 
DT Company Overview January 2013
DataTactics
 
MBSE meets Industrial IoT: Introducing the New MagicDraw Plug-in for RTI Co...
Istvan Rath
 
MT81 Keys to Successful Enterprise IoT Initiatives
Dell EMC World
 
Iia 2012 Spring Conference Philly V Final
Danny Miller
 

More from Real-Time Innovations (RTI) (18)

PPTX
A Tour of RTI Applications
Real-Time Innovations (RTI)
 
PDF
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
Real-Time Innovations (RTI)
 
PDF
The Low-Risk Path to Building Autonomous Car Architectures
Real-Time Innovations (RTI)
 
PPTX
Introduction to RTI DDS
Real-Time Innovations (RTI)
 
PPTX
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
Real-Time Innovations (RTI)
 
PPTX
How the fusion of time sensitive networking, time-triggered ethernet and data...
Real-Time Innovations (RTI)
 
PPTX
Secrets of Autonomous Car Design
Real-Time Innovations (RTI)
 
PPTX
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
Real-Time Innovations (RTI)
 
PDF
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
Real-Time Innovations (RTI)
 
PPTX
Developing Mission-Critical Avionics and Defense Systems with Ada and DDS
Real-Time Innovations (RTI)
 
PPTX
IoT and M2M Safety and Security
Real-Time Innovations (RTI)
 
PDF
Tech Mahindra - Connected Engineering
Real-Time Innovations (RTI)
 
PPTX
Generic Vehicle Architecture – DDS at the Core.
Real-Time Innovations (RTI)
 
PPTX
Weather Information System Airport and Decision Support (WISADS)
Real-Time Innovations (RTI)
 
PDF
System integration in offshore supply vessels – how we applied DDS and redefi...
Real-Time Innovations (RTI)
 
PDF
Integrating DDS into AXCIOMA - The Component Approach
Real-Time Innovations (RTI)
 
PDF
Distributed Communication and Control for a Network of Melting Probes in Extr...
Real-Time Innovations (RTI)
 
PDF
MiroSurge: Research Platform for Robotic Surgery
Real-Time Innovations (RTI)
 
A Tour of RTI Applications
Real-Time Innovations (RTI)
 
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
Real-Time Innovations (RTI)
 
The Low-Risk Path to Building Autonomous Car Architectures
Real-Time Innovations (RTI)
 
Introduction to RTI DDS
Real-Time Innovations (RTI)
 
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
Real-Time Innovations (RTI)
 
How the fusion of time sensitive networking, time-triggered ethernet and data...
Real-Time Innovations (RTI)
 
Secrets of Autonomous Car Design
Real-Time Innovations (RTI)
 
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
Real-Time Innovations (RTI)
 
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
Real-Time Innovations (RTI)
 
Developing Mission-Critical Avionics and Defense Systems with Ada and DDS
Real-Time Innovations (RTI)
 
IoT and M2M Safety and Security
Real-Time Innovations (RTI)
 
Tech Mahindra - Connected Engineering
Real-Time Innovations (RTI)
 
Generic Vehicle Architecture – DDS at the Core.
Real-Time Innovations (RTI)
 
Weather Information System Airport and Decision Support (WISADS)
Real-Time Innovations (RTI)
 
System integration in offshore supply vessels – how we applied DDS and redefi...
Real-Time Innovations (RTI)
 
Integrating DDS into AXCIOMA - The Component Approach
Real-Time Innovations (RTI)
 
Distributed Communication and Control for a Network of Melting Probes in Extr...
Real-Time Innovations (RTI)
 
MiroSurge: Research Platform for Robotic Surgery
Real-Time Innovations (RTI)
 

Recently uploaded (20)

PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PPTX
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
PPT
Coupa-Kickoff-Meeting-Template presentai
annapureddyn
 
PPTX
Coupa-Overview _Assumptions presentation
annapureddyn
 
PDF
This slide provides an overview Technology
mineshkharadi333
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
REPORT: Heating appliances market in Poland 2024
SPIUG
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Architecture of the Future (09152021)
EdwardMeyman
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PPTX
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Software Development Methodologies in 2025
KodekX
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
Coupa-Kickoff-Meeting-Template presentai
annapureddyn
 
Coupa-Overview _Assumptions presentation
annapureddyn
 
This slide provides an overview Technology
mineshkharadi333
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
REPORT: Heating appliances market in Poland 2024
SPIUG
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Architecture of the Future (09152021)
EdwardMeyman
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Software Development Methodologies in 2025
KodekX
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 

Embedded Security and the IoT – Challenges, Trends and Solutions

  • 1. Data Centric Security for the Industrial IoT Stan Schneider, RTI CEO IIC Steering Committee Member
  • 2. The smart machine era will be the most disruptive in the history of IT -- Gartner 2015
  • 3. The Industrial Internet of Things Industrial Internet of Things (IIoT) Consumer Internet of Things (CIoT) Cyber-Physical Systems (CPS)
  • 5. The Industrial Internet Consortium • Goal: Interoperability for the IIoT • 159+ companies! • RTI role – Steering committee, data management (co-lead), architecture, security (co-lead), use case (co-lead), marketing – Lead or co-lead 4 testbed teams
  • 6. RTI Named Most Influential IIoT Company
  • 7. RTI’s Experience • ~800 Designs – Healthcare – Transportation – Communications – Energy – Industrial – Defense • 15+ Standards & Consortia Efforts
  • 8. Why Choose DDS? • Reliability: Severe consequences if offline for 5 minutes? • Performance/scale: – Measure in ms or µs? – Or scale > 20+ applications or 10+ teams? – Or 10k+ data values? • Architecture: Code active lifetime >3 yrs? 2 or 3 Checks?
  • 10. Data Centric is the Opposite of OO Object Oriented • Encapsulate data • Expose methods Data Centric • Encapsulate methods • Expose data Explicit Shared Data Model
  • 11. Data-Centric Connection = Data-Path Control • Global Data Space – Automatic discovery – Read & write data in any OS, language, transport – Redundant sources/sinks/nets • Type Aware • QoS control – Timing, Reliability, Ownership, Redundancy, Filtering, Security Shared Global Data Space DDS DataBus Patient Hx Device Identity Devices SupervisoryCDS Physiologic State NursingStation Cloud Offer: Write this 1000x/sec Reliable for 10 secs Request: Read this 10x/sec If patient = “Joe”
  • 12. Data-Centric Security Model • Per-Topic Security – Control r,w access for each function – Enforce each dataflow • Complete Protection – Discovery authentication – Data-centric access control – Cryptography – Tagging & logging – Non-repudiation – Secure multicast – 100% standards compliant • No code changes! • Plugin architecture for advanced uses • Topic Security model: – PMU: State(w) – CBM: State(r); Alarms(w) – Control: State(r), SetPoint(w) – Operator: *(r), Setpoint(w) CBM AnalysisPMU Control Operator State Alarms SetPoint
  • 13. Demanding Use Cases • The USS SECURE cybersecurity test bed is a collaboration between: – The National Security Agency – Department of Defense Information Assurance Range Quantico – Combat Systems Direction Activity Dam Neck – NSWCDD – NSWC Carderock/Philadelphia – Office of Naval Research – Johns Hopkins University Applied Physics Lab – Real Time Innovations, Inc. • Objectives – Immunize against cyberattack and to rapidly recover when impacted – Determine the best cyberdefense technologies without impacting real time deadline scheduled performance http://www.navy.mil/submit/display.asp?story_id=79228
  • 14. DDS Security Standard • DDS entities are authenticated • DDS enforces topic-level access control • DDS maintains data integrity and confidentiality • DDS enforces non- repudiation • DDS provides availability …while maintaining DDS interoperability & high performance
  • 15. Pluggable Security Architecture App. Other DDS System Secure DDS middleware Authentication Plugin Access Control Plugin Cryptographic Plugin Secure Kernel Crypto Module (e.g. TPM ) Transport (e.g. UDP) application componentcertificates ? Data cache Protocol Engine Kernel Policies DDS Entities Network Driver ? Network Encrypted Data Other DDS System Other DDS System App.App. Logging Plugin DataTagging Plugin MAC
  • 16. Standard Capabilities (Built-in Plugins) Authentication  X.509 Public Key Infrastructure (PKI) with a pre-configured shared Certificate Authority (CA)  Digital Signature Algorithm (DSA) with Diffie-Hellman and RSA for authentication and key exchange Access Control  Configured by domain using a (shared) Governance file  Specified via permissions file signed by shared CA  Control over ability to join systems, read or write data topics Cryptography  Protected key distribution  AES128 and AES256 for encryption  HMAC-SHA1 and HMAC-SHA256 for message authentication and integrity Data Tagging  Tags specify security metadata, such as classification level  Can be used to determine access privileges (via plugin) Logging  Log security events to a file or distribute securely over Connext DDS
  • 17. Secure DDS over UDP Control Station Master Device Transmission Substation Slave Device Security Needs Protection and Detection DNP3 over RS232/485 DNP3 over Ethernet DNP3 over DDS Attack Detector Display Anomaly Detector (Lua) Scada Converter (C++) Slave Device Existing DNP3 RTI Routing Service ComProcessor RTI Routing Service ComProcessor Secure DDS DDS DDS
  • 18. About RTI • Market Leader – 800+ designs; $1T designed-in value • Over 70% DDS mw market share1 • Largest embedded middleware vendor2 – By far the most DDS designs – 2013 Gartner Cool Vendor for technology and Open Community Source model • Standards Leader – Active in 15 standards efforts – DDS authors, chair, wire spec, security, more – IIC steering committee; OMG board • Team Quality Leader – Stanford research pedigree – High-performance, control, systems experts – Top quality product, processes, execution – Consistent head-to-head victors 1Embedded Market Forecasters 2VDC Analyst Report
  • 19. Industrial Internet of Things Thought Leader • RTI FastTrax IIoT Strategic Consulting – Architectural guidance – Security design – Cloud integration – Business objectives
  • 20. For More Information • RTI site: www.rti.com • Examples, forum, papers: community.rti.com • IIC website: www.iiconsortium.org • Email: [email protected] • Connect on LinkedIn • Free RTI Connext DDS Pro: www.rti.com/downloads
  • 21. The DDS Data-Centric Standard for the IIoT • OMG’s Data Distribution Service is the Proven Data Connectivity Standard for the IoT • OMG: world’s largest systems software standards org – UML, DDS, Industrial Internet Consortium • DDS: open & cross-vendor – Open Standard & Open Source – 12 implementations Interoperability between source written for different vendors Interoperability between applications running on different implementations DDS-RTPS Protocol Real-Time Publish-Subscribe Distribution Fabric DDS API
  • 22. This is addressed by DDS Security Security Boundaries • System Boundary • Network Transport – Media access (layer 2) – Network (layer 3) security – Session/Endpoint (layer 4/5) security • Host – Machine/OS/Applications/Files • Data & Information flows Ultimately, you need to implement all!
  • 23. DDS Security Model Concept Unix Filesystem Security Model DDS Security Model Subject User Process executing for a user DomainParticipant Application joining a DDS domain Protected Objects Directories Files Domain (by domain_id) Topic (by Topic name) DataObjects (by Instance/Key) Protected Operations Directory.list, Directory.create (File, Dir) Directory.remove (File, Dir) Directory.rename (File, Dir) File.read, File.write, File.execute Domain.join Topic.create Topic.read (includes QoS) Topic.write (includes QoS) Data.createInstance Data.writeInstance Data.deleteInstance Access Control Policy Control Fixed in Kernel Configurable via Plugin Builtin Access Control Mode Per-File/Dir Read/Write/Execute permissions for OWNER, GROUP, USERS Per-DomainParticipant Permissions : What Domains and Topics it can JOIN/READ/WRITE