SlideShare ist ein Scribd-Unternehmen logo
1 von 58
Downloaden Sie, um offline zu lesen
Securing Your Critical Real-time
Data: Are You Ready?
©2020 Real-TimeInnovations,Inc.
Agenda
• RTI Company Overview
• Security requirements of modern distributed systems
• Step-by-step guidance on implementing a secure
connectivity model
• Considerations when upgrading to Connext DDS Secure
• Leveraging RTI’s tool suite to develop and debug DDS Secure
applications
• Wrap Up
©2020 Real-TimeInnovations,Inc.
Goals
• 3 main goals:
– Understand basic DDS Secure concepts
– Steps to move non-secure app to DDS Secure
– Learn how to use RTI tools w/ Secure
• Focus is on setting up as a CA & self-signing artifacts
• Leverage Shapes to demo the concepts & artifacts
• Wireshark to show crypto is working
• Instrument Secure
• Consider a Secure Architecture Review
©2020 Real-TimeInnovations,Inc.
RTI Overview
©2020 Real-TimeInnovations,Inc.
RTI is the largest IIoT connectivity
software vendor
– Focus on autonomous systems
– 1600+ designs, many real-world
programs across industries
– 600+ research programs
– Technology Readiness Level (TRL) 9
Evolving threats to Modern
Distributed Systems
©2020 Real-TimeInnovations,Inc.
Automotive News
©2020 Real-TimeInnovations,Inc.
Infotainment Head Unit
Execute()
CANBus
ARM V850
SPI Bus
©2020 Real-TimeInnovations,Inc.
Avionics News
©2020 Real-TimeInnovations,Inc.
DDS Security
©2020 Real-TimeInnovations,Inc.
Data-Centric- Better for Integration
Data centricity reduces complexity and enables interoperation and integration
Unstructured files
Data Centricity
Database
Data at Rest
Data Centricity Data in Motion
Databus (DDS)Connectivity software
©2020 Real-TimeInnovations,Inc.
Data-Centric Publish/Subscribe
Connext Databus
Track Topic
sensorId id
location
x float
y float
z float
velocity
x float
y float
z float
Command Topic
deviceId id
command string
©2020 Real-TimeInnovations,Inc.
location.z
< 5000
Status Topic
deviceId id
status enum
Alice: Allowed to publish topic T
Bob: Allowed to subscribe to topic T
Eve: Non-authorized eavesdropper
Trudy: Intruder
Trent: Trusted infrastructure service
Mallory: Malicious insider
1. Unauthorized subscription
2. Unauthorized publication
3. Tampering and replay
4. Unauthorized access to data by
infrastructure services
DDS Databus
Alice Bob Eve
Trudy Trent Mallory
Threats
©2020 Real-TimeInnovations,Inc.
(2)
(1)
(3, 4)
The network is the adversary
The adversary has the following capabilities:
– can obtain any message passing through the network
– is a legit user of the network and thus can initiate and participate
in a conversation with any other user
– can become the receiver of messages
– can send messages to anybody through impersonation
– any message sent will go through adversary
– any message received has gone through adversary
©2020 Real-Time Innovations, Inc.
Defense in depth
1. System edge
2. Host
– Machine/OS/Applications/Files
3. Network transport
– Media access (layer 2)
– Network (layer 3)
– Session/Endpoint (layer 4/5)
4. Dataflow
– Control observations and modifications of data
– This is addressed by DDS Security
1
2
3
4
Brokered Security vs DDS Security
App App
App
App
DDS Secure Multicast
Server
or
Broker
App App
App
AppServer-based system
©2020 Real-TimeInnovations,Inc.
RTI Connext DDS Secure
• Based on the OMG DDS Security Standard
• Built-in Plugins
– Little to no application development
• Run over any transport
– UDP, shared memory, TCP, …
• Completely decentralized
– High performance and scalability
– No single point of failure
• Connext Security Customization Package
©2020 Real-TimeInnovations,Inc.
RTI Core
Library
Authentication
Access Control
Cryptography
Data Tagging
Logging
Application
Any Transport*
(e.g., UDP uni/multicast,
shared memory, TCP, …)
Security Designed for Real-Time Systems
• Configure the right level of
security for each topic
– Unprotected for non-sensitive data
– Integrity Protection for data that must
be trusted but not private
– Additional confidentiality for data that
must be private
• Optimize tradeoffs between security,
CPU overhead, throughput and
latency
©2020 Real-TimeInnovations,Inc.
Operator
SetPoint
Data Topic Security model:
• State: Integrity
• Statistics: Unprotected
• SetPoint: Confidentiality + Integrity
Control
CBM
Analysis
Sensor
State Statistics
Security Designed for Real-Time Systems
• Apply Principle of Least Privilege
– Authorize or deny access to trusted
parties on a “need-to-know” basis
– Share symmetric keys accordingly
• Trust Participants via mutual
authentication
– Trust is the foundation of access
authorization
– Built-in authentication mechanisms
are based on PKI
©2020 Real-TimeInnovations,Inc.
Operator
SetPoint
Data Topic Security model:
• Sensor: State(w)
• CBM: State(r); Statistics(w)
• Control: State(r), SetPoint(w)
• Operator: *(r), Setpoint(w)
Control
CBM
Analysis
Sensor
State Statistics
Builtin Security Plugins
©2020 Real-TimeInnovations,Inc.
Security Plugin Plugin Description
Authentication
 X.509 Public Key Infrastructure (PKI) with a pre-configured shared
Certificate Authority (CA)
 RSA or (EC) Digital Signature Algorithm ((EC)DSA) with (EC) Diffie-
Hellman for shared secret establishment
Access Control
 Specified via permissions file signed by shared CA
 Control over ability to join systems, read or write data topics
Cryptography
 Protected symmetric key distribution
 AES-GCM-128 and AES-GCM-256 for authenticated encryption
 GMAC variants for integrity protection only
Data Tagging
 Tags specify security metadata, such as classification level
 Can be used to determine access privileges (via plugin)
Logging  Log security events to a file or distribute securely over Connext DDS
DDS Secure
Connext DDS Secure
Connext Tools
Code
Generation
3rd Party
Tools
Excel
Admin DDS Spy
MonitoringWire Shark
Ping
Connext Services
Data
Routing
Data
Queuing
Web
Integration
Recording
& Replay
Database
Integration
Persistence
Connext DDS Core
Security
API’s: C C++ C#
Java Ada
DDS Pub/Sub
Messaging/RPC
DDS XTYPES
RTPS
Pluggable
Transports
Windows, Linux,
Unix, macOS, RTOS
©2020 Real-TimeInnovations,Inc.
DDS Secure Performance
©2020 Real-TimeInnovations,Inc.
Latency and Throughput Benchmarks
• Platforms
– Intel i7 6-core CPU 3.33GHz
– Intel I350 Gigabit NIC
– 12 GB RAM
– CentOS Linux 7.1
– API: C++
• Cryptography
– OpenSSL 1.0.2o built-in algorithms
– GMAC-AES128 for MAC only (without encryption)
– AES-128-GCM for encrypt
• Network
– D-Link DXS-3350 SR Switch
– Dual 10-Gigabit stackable ports
– 4MB packet buffer size
– 10/100/1000 Base-T interfaces
©2020 Real-TimeInnovations,Inc.
Latency for 1024 Byte Samples
©2020 Real-TimeInnovations,Inc.
0
20
40
60
80
No Security HMACed RTPS HMACed RTPS, Encrypt User Data, Encrypt
Submessage
Latency(μs)
Throughput for 1024 Byte Sample
©2020 Real-TimeInnovations,Inc.
0
250
500
750
1000
No Security HMACed RTPS HMACed RTPS, Encrypt User Data, Encrypt
Submessage
Throughput(Mbps)
Discovery Benchmarks
0
20
40
60
80
100
120
140
160
50 100 150 200 250 300
DiscoveryTime(s)
No Security
Authentication Only
Discovery Encrypted
Number of Participants
©2020 Real-TimeInnovations,Inc.
DDS Secure Configuration
©2020 Real-TimeInnovations,Inc.
Configuring & Deploying DDS Security
Identity
Certificate
P1 Private Key
Permissions File
Governance
File
Identity CA
Certificate
Permissions
CA
Certificate
Signs
Configuring & Deploying DDS Security
Identity
Certificate
P1 Private Key
Permissions File
Governance
File
Identity CA
Certificate
Permissions
CA
Certificate
Signs
Configuring & Deploying DDS Security
Identity
Certificate
P1 Private Key
Permissions File
Governance
File
Identity CA
Certificate
Permissions
CA
Certificate
Configuring & Deploying DDS Security
Identity
Certificate
P1 Private Key
Permissions File
Governance
File
Identity CA
Certificate
Permissions
CA
Certificate
Configuring & Deploying DDS Security
Identity
Certificate
P1 Private Key
Permissions File
Governance
File
Identity CA
Certificate
Permissions
CA
Certificate
Configuring & Deploying DDS Security
Identity
Certificate
P1 Private Key
Permissions File
QoS XML Config
Governance
File
Identity CA
Certificate
Permissions
CA
Certificate
Configuring & Deploying DDS Security
Identity
Certificate
P1 Private Key
Permissions File
QoS XML Config
Governance
File
Identity CA
Certificate
Permissions
CA
Certificate
Configuring & Deploying DDS Security
Identity
Certificate
P1 Private Key
Permissions File
QoS XML Config
Governance
File
Identity CA
Certificate
Permissions
CA
Certificate
Identity
Certificate
P1 Private Key
Permissions File
QoS XML Config
Governance
File
Identity CA
Certificate
Permissions
CA
Certificate
Common to/installed on all participants
A Sample Governance File
©2020 Real-TimeInnovations,Inc.
A Sample Permissions File
©2020 Real-TimeInnovations,Inc.
Security Configuration
©2020 Real-Time Innovations, Inc.
<qos_profile name="SecurityExample“ base_name=“BuiltinQosLib::Generic.Security">
<participant_qos>
<property>
<value>
<element>
<name>dds.sec.auth.identity_ca</name>
<value>file:../../../dds_security/cert/cacertECdsa.pem</value>
</element>
<element>
<name>dds.sec.auth.identity_certificate</name>
<value>file:../../../dds_security/cert/peer1ECdsa.pem</value>
</element>
<element>
<name>dds.sec.auth.private_key</name>
<value>file:../../../dds_security/cert/peer1keyECdsa.pem</value>
</element>
<element>
<name>dds.sec.access.permissions_ca</name>
<value>file:../../../dds_security/cert/cacertECdsa.pem</value>
</element>
<element>
<name>dds.sec.access.governance</name>
<value>file:../../../dds_security/xml/signed/signed_Governance.p7s</value>
</element>
<element>
<name>dds.sec.access.permissions</name>
<value>file:../../../dds_security/xml/signed/signed_PermissionsA.p7s</value>
</element>
</value>
</property>
</participant_qos>
</qos_profile>
Functional Requirements
• Algorithms
• Business Logic
• Data Content
• Events and Reports
• Explicit dependencies
©2020 Real-TimeInnovations,Inc.
Transition to DDS Secure changes none of these!
Non-Functional Requirements
• Scalability – Affected?
• Performance – Affected?
• Capacity – Affected?
• Availability – Not Affected
• Reliability – Not Affected
• Resiliency – Not Affected
• Maintainability – Affected?
• Serviceability – Affected?
• Usability – Not Affected
• Interoperability – Affected?
©2020 Real-TimeInnovations,Inc.
Adding DDS Secure
©2020 Real-TimeInnovations,Inc.
Steps to add DDS Secure to your system: Phase 1
1. Download & install
2. Setup to self-sign certificates
3. Generate some certs to use for testing w/ Shapes
4. Use Shapes to setup basic governance and permissions
files
5. Start w/ basic authentication (point to certs in QoS file)
6. Add read/write permissions
7. Add crypto last
©2020 Real-TimeInnovations,Inc.
Steps to add DDS Secure to your system: Phase 2
1. Modify your build system to link w/ Secure libraries
2. and/or modify your QoS files to load Secure libs & point to
certs, etc.
3. Start w/ basic authentication
4. Add read/write permissions
5. Add crypto last
6. Benchmark performance
©2020 Real-TimeInnovations,Inc.
DDS Secure Demo
©2020 Real-TimeInnovations,Inc.
Domains used in demo
©2020 Real-TimeInnovations,Inc.
Domain Notes Effect/How to demo
0 No protections, allow unauthorized participants Share data between all apps
1 Add R access control to Squares
Add W access control to Circle
Add R/W access control on Triangle
Pub/sub all 3 topics, non-secure on the left, secure
on the right; pub on top, sub on bottom.
Have trireader try to publish triangles
2 Don’t allow unauthenticated participants Show no data flows between secure & non-secure
Shapes
3 RTPS data now signed Wireshark
4 Topic payload now encrypted Wireshark
5 Topic metadata now encrypted Wireshark
6 RTPS data now encrypted Wireshark
Topic Read access Write access
Square True False Only secure readers get data from secure writers. (L to H, not H to L)
Circle False True Readers only get data from Secure writers (H to L, not L to H)
Triangle True True Readers and writers must both be Secure (L to L, H to H, no others)
DDS Secure Demo
©2020 Real-TimeInnovations,Inc.
Domain 0 – No protections
©2020 Real-TimeInnovations,Inc.
Non-Secure App Secure App
Domain 1 – Write protections on Circles, Triangles
©2020 Real-TimeInnovations,Inc.
Non-Secure App Secure App
Domain 2 – Unauthenticated NOT allowed
©2020 Real-TimeInnovations,Inc.
Non-Secure App Secure App
Domain 3 – rtps_protection_kind = SIGN
©2020 Real-TimeInnovations,Inc.
HMAC added to message
No encryption
Domain 4 – Add encryption of topic data
©2020 Real-TimeInnovations,Inc.
Payload now encrypted
Metadata visible (i.e. sequence #)
Domain 5 – Encrypt topic metadata and payload
©2020 Real-TimeInnovations,Inc.
Payload encrypted
Metadata not visible
Domain 6 – rtps_protection_kind = ENCRYPT
©2020 Real-TimeInnovations,Inc.
Entire RTPS message encrypted
Free RTI Connext Evaluation
©2020 Real-Time Innovations, Inc.
https://www.rti.com/free-trial
• Fully functional version of
Connext DDS Professional
• With monitoring, debug
and visualization tools
• Includes Shapes Demo
• Runs on Windows, Linux
and MacOS
• Runs for 30 days
©2020 Real-TimeInnovations,Inc.
RTI’s Resources
• Community.rti.com
– Complete RTI product documentation
– Best Practices
– Forum
– Knowledge Base
– Getting Started Videos
– HOWTO’s
• DDS Secure Getting Started Guide
• DDS Secure User’s Guide
• Why You Should Use TPM with RTI Connext DDS Secure
• Using Connext DDS Secure 6.0 to Protect your Data
• OMG DDS Secure site: https://www.omg.org/spec/DDS-SECURITY/1.1/PDF
©2020 Real-TimeInnovations,Inc.
RTI Account Team – VA/WV/NC
Ken McInerney, Field Application Engineer
Phone: (410) 707 - 5889| kenm@rti.com
How we help you:
• Support for Connext Product Evaluations / Proof of Concept Efforts
• Account Management – Licensing, Customer Service, Project Management
• Customer Success Meetings/Calls – Best Practices, Troubleshooting Guidance, Education on
Tools and New Products, New Platform Builds and Feature Requests, Support Case Escalation
Lisa Ray, Connext Account Manager
Phone: (919) 949 - 6115| lray@rti.com
John Breitenbach, FAE Manager
Phone: (919) 597 – 9386 johnb@rti.com
©2020 Real-TimeInnovations,Inc.
Questions?
• IIC: www.iiconsortium.org
• DDS
– DDS portal: portals.omg.org/dds/
– RTI: www.rti.com
– Email: johnb@rti.com
– Examples, forum, papers:
community.rti.com
©2020 Real-TimeInnovations,Inc.
Thank You!
John Breitenbach
johnb@rti.com
LinkedIn: https://www.linkedin.com/in/atlantex/
©2020 Real-TimeInnovations,Inc.
©2020 Real-TimeInnovations,Inc.
Non-Secure Apps Secure Apps
WritersReaders

Weitere ähnliche Inhalte

Was ist angesagt?

Tuning and Troubleshooting OpenSplice DDS Applications
Tuning and Troubleshooting OpenSplice DDS ApplicationsTuning and Troubleshooting OpenSplice DDS Applications
Tuning and Troubleshooting OpenSplice DDS Applications
Angelo Corsaro
 

Was ist angesagt? (20)

RTI DDS Intro with DDS Secure
RTI DDS Intro with DDS SecureRTI DDS Intro with DDS Secure
RTI DDS Intro with DDS Secure
 
DDS Security
DDS SecurityDDS Security
DDS Security
 
DDS Best Practices
DDS Best PracticesDDS Best Practices
DDS Best Practices
 
Getting Started in DDS with C++ and Java
Getting Started in DDS with C++ and JavaGetting Started in DDS with C++ and Java
Getting Started in DDS with C++ and Java
 
Distributed Algorithms with DDS
Distributed Algorithms with DDSDistributed Algorithms with DDS
Distributed Algorithms with DDS
 
The DDS Security Standard
The DDS Security StandardThe DDS Security Standard
The DDS Security Standard
 
OMG DDS: The Data Distribution Service for Real-Time Systems
OMG DDS: The Data Distribution Service for Real-Time SystemsOMG DDS: The Data Distribution Service for Real-Time Systems
OMG DDS: The Data Distribution Service for Real-Time Systems
 
The Data Distribution Service Tutorial
The Data Distribution Service TutorialThe Data Distribution Service Tutorial
The Data Distribution Service Tutorial
 
DDS QoS Unleashed
DDS QoS UnleashedDDS QoS Unleashed
DDS QoS Unleashed
 
OpenSplice DDS Tutorial -- Part II
OpenSplice DDS Tutorial -- Part IIOpenSplice DDS Tutorial -- Part II
OpenSplice DDS Tutorial -- Part II
 
DDS: The IoT Data Sharing Standard
DDS: The IoT Data Sharing StandardDDS: The IoT Data Sharing Standard
DDS: The IoT Data Sharing Standard
 
Best Practices Using RTI Connext DDS
Best Practices Using RTI Connext DDSBest Practices Using RTI Connext DDS
Best Practices Using RTI Connext DDS
 
DDS Advanced Tutorial - OMG June 2013 Berlin Meeting
DDS Advanced Tutorial - OMG June 2013 Berlin MeetingDDS Advanced Tutorial - OMG June 2013 Berlin Meeting
DDS Advanced Tutorial - OMG June 2013 Berlin Meeting
 
RTI Data-Distribution Service (DDS) Master Class 2011
RTI Data-Distribution Service (DDS) Master Class 2011RTI Data-Distribution Service (DDS) Master Class 2011
RTI Data-Distribution Service (DDS) Master Class 2011
 
Introduction to DDS
Introduction to DDSIntroduction to DDS
Introduction to DDS
 
DDS In Action Part II
DDS In Action Part IIDDS In Action Part II
DDS In Action Part II
 
OMG Data-Distribution Service (DDS) Tutorial - 2009
OMG Data-Distribution Service (DDS) Tutorial - 2009OMG Data-Distribution Service (DDS) Tutorial - 2009
OMG Data-Distribution Service (DDS) Tutorial - 2009
 
Tuning and Troubleshooting OpenSplice DDS Applications
Tuning and Troubleshooting OpenSplice DDS ApplicationsTuning and Troubleshooting OpenSplice DDS Applications
Tuning and Troubleshooting OpenSplice DDS Applications
 
DDS Over Low Bandwidth Data Links
DDS Over Low Bandwidth Data LinksDDS Over Low Bandwidth Data Links
DDS Over Low Bandwidth Data Links
 
Cyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT AgeCyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT Age
 

Ähnlich wie DDS Secure Intro

Using DDS to Secure the Industrial Internet of Things (IIoT)
Using DDS to Secure the Industrial Internet of Things (IIoT)Using DDS to Secure the Industrial Internet of Things (IIoT)
Using DDS to Secure the Industrial Internet of Things (IIoT)
Gerardo Pardo-Castellote
 
Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)
Real-Time Innovations (RTI)
 

Ähnlich wie DDS Secure Intro (20)

Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and Solutions
 
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkThe Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
 
Drobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applicationsDrobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applications
 
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Using DDS to Secure the Industrial Internet of Things (IIoT)
Using DDS to Secure the Industrial Internet of Things (IIoT)Using DDS to Secure the Industrial Internet of Things (IIoT)
Using DDS to Secure the Industrial Internet of Things (IIoT)
 
Deep Dive into the OPC UA / DDS Gateway Specification
Deep Dive into the OPC UA / DDS Gateway SpecificationDeep Dive into the OPC UA / DDS Gateway Specification
Deep Dive into the OPC UA / DDS Gateway Specification
 
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxCIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
 
DEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellamDEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellam
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoT
 
Fog Computing is the Future of the Industrial Internet of Things
Fog Computing is the Future of the Industrial Internet of ThingsFog Computing is the Future of the Industrial Internet of Things
Fog Computing is the Future of the Industrial Internet of Things
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future Challanges
 
Cyber Security for the Connected Car
Cyber Security for the Connected Car Cyber Security for the Connected Car
Cyber Security for the Connected Car
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT Networks
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
 
Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 

Mehr von John Breitenbach

Mehr von John Breitenbach (6)

RIoT.org RTI Lunch & Learn: The IIC Connectivity Framework
RIoT.org RTI Lunch & Learn: The IIC Connectivity FrameworkRIoT.org RTI Lunch & Learn: The IIC Connectivity Framework
RIoT.org RTI Lunch & Learn: The IIC Connectivity Framework
 
Salmon, lasers, IoT and...dentists?
Salmon, lasers, IoT and...dentists?Salmon, lasers, IoT and...dentists?
Salmon, lasers, IoT and...dentists?
 
Edge-controlled, cloud-connected: Design patterns for the IIoT
Edge-controlled, cloud-connected: Design patterns for the IIoTEdge-controlled, cloud-connected: Design patterns for the IIoT
Edge-controlled, cloud-connected: Design patterns for the IIoT
 
Edge-controlled, cloud-connected: Design patterns for the IIoT
Edge-controlled, cloud-connected: Design patterns for the IIoTEdge-controlled, cloud-connected: Design patterns for the IIoT
Edge-controlled, cloud-connected: Design patterns for the IIoT
 
Introduction to RTI DDS
Introduction to RTI DDSIntroduction to RTI DDS
Introduction to RTI DDS
 
The IIC Connectivity Framework for IIoT
The IIC Connectivity Framework for IIoTThe IIC Connectivity Framework for IIoT
The IIC Connectivity Framework for IIoT
 

Kürzlich hochgeladen

Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
sexy call girls service in goa
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
ellan12
 

Kürzlich hochgeladen (20)

VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 

DDS Secure Intro

  • 1. Securing Your Critical Real-time Data: Are You Ready? ©2020 Real-TimeInnovations,Inc.
  • 2. Agenda • RTI Company Overview • Security requirements of modern distributed systems • Step-by-step guidance on implementing a secure connectivity model • Considerations when upgrading to Connext DDS Secure • Leveraging RTI’s tool suite to develop and debug DDS Secure applications • Wrap Up ©2020 Real-TimeInnovations,Inc.
  • 3. Goals • 3 main goals: – Understand basic DDS Secure concepts – Steps to move non-secure app to DDS Secure – Learn how to use RTI tools w/ Secure • Focus is on setting up as a CA & self-signing artifacts • Leverage Shapes to demo the concepts & artifacts • Wireshark to show crypto is working • Instrument Secure • Consider a Secure Architecture Review ©2020 Real-TimeInnovations,Inc.
  • 4. RTI Overview ©2020 Real-TimeInnovations,Inc. RTI is the largest IIoT connectivity software vendor – Focus on autonomous systems – 1600+ designs, many real-world programs across industries – 600+ research programs – Technology Readiness Level (TRL) 9
  • 5. Evolving threats to Modern Distributed Systems ©2020 Real-TimeInnovations,Inc.
  • 6. Automotive News ©2020 Real-TimeInnovations,Inc. Infotainment Head Unit Execute() CANBus ARM V850 SPI Bus
  • 10. Data-Centric- Better for Integration Data centricity reduces complexity and enables interoperation and integration Unstructured files Data Centricity Database Data at Rest Data Centricity Data in Motion Databus (DDS)Connectivity software ©2020 Real-TimeInnovations,Inc.
  • 11. Data-Centric Publish/Subscribe Connext Databus Track Topic sensorId id location x float y float z float velocity x float y float z float Command Topic deviceId id command string ©2020 Real-TimeInnovations,Inc. location.z < 5000 Status Topic deviceId id status enum
  • 12. Alice: Allowed to publish topic T Bob: Allowed to subscribe to topic T Eve: Non-authorized eavesdropper Trudy: Intruder Trent: Trusted infrastructure service Mallory: Malicious insider 1. Unauthorized subscription 2. Unauthorized publication 3. Tampering and replay 4. Unauthorized access to data by infrastructure services DDS Databus Alice Bob Eve Trudy Trent Mallory Threats ©2020 Real-TimeInnovations,Inc. (2) (1) (3, 4)
  • 13. The network is the adversary The adversary has the following capabilities: – can obtain any message passing through the network – is a legit user of the network and thus can initiate and participate in a conversation with any other user – can become the receiver of messages – can send messages to anybody through impersonation – any message sent will go through adversary – any message received has gone through adversary ©2020 Real-Time Innovations, Inc.
  • 14. Defense in depth 1. System edge 2. Host – Machine/OS/Applications/Files 3. Network transport – Media access (layer 2) – Network (layer 3) – Session/Endpoint (layer 4/5) 4. Dataflow – Control observations and modifications of data – This is addressed by DDS Security 1 2 3 4
  • 15. Brokered Security vs DDS Security App App App App DDS Secure Multicast Server or Broker App App App AppServer-based system ©2020 Real-TimeInnovations,Inc.
  • 16. RTI Connext DDS Secure • Based on the OMG DDS Security Standard • Built-in Plugins – Little to no application development • Run over any transport – UDP, shared memory, TCP, … • Completely decentralized – High performance and scalability – No single point of failure • Connext Security Customization Package ©2020 Real-TimeInnovations,Inc. RTI Core Library Authentication Access Control Cryptography Data Tagging Logging Application Any Transport* (e.g., UDP uni/multicast, shared memory, TCP, …)
  • 17. Security Designed for Real-Time Systems • Configure the right level of security for each topic – Unprotected for non-sensitive data – Integrity Protection for data that must be trusted but not private – Additional confidentiality for data that must be private • Optimize tradeoffs between security, CPU overhead, throughput and latency ©2020 Real-TimeInnovations,Inc. Operator SetPoint Data Topic Security model: • State: Integrity • Statistics: Unprotected • SetPoint: Confidentiality + Integrity Control CBM Analysis Sensor State Statistics
  • 18. Security Designed for Real-Time Systems • Apply Principle of Least Privilege – Authorize or deny access to trusted parties on a “need-to-know” basis – Share symmetric keys accordingly • Trust Participants via mutual authentication – Trust is the foundation of access authorization – Built-in authentication mechanisms are based on PKI ©2020 Real-TimeInnovations,Inc. Operator SetPoint Data Topic Security model: • Sensor: State(w) • CBM: State(r); Statistics(w) • Control: State(r), SetPoint(w) • Operator: *(r), Setpoint(w) Control CBM Analysis Sensor State Statistics
  • 19. Builtin Security Plugins ©2020 Real-TimeInnovations,Inc. Security Plugin Plugin Description Authentication  X.509 Public Key Infrastructure (PKI) with a pre-configured shared Certificate Authority (CA)  RSA or (EC) Digital Signature Algorithm ((EC)DSA) with (EC) Diffie- Hellman for shared secret establishment Access Control  Specified via permissions file signed by shared CA  Control over ability to join systems, read or write data topics Cryptography  Protected symmetric key distribution  AES-GCM-128 and AES-GCM-256 for authenticated encryption  GMAC variants for integrity protection only Data Tagging  Tags specify security metadata, such as classification level  Can be used to determine access privileges (via plugin) Logging  Log security events to a file or distribute securely over Connext DDS
  • 20. DDS Secure Connext DDS Secure Connext Tools Code Generation 3rd Party Tools Excel Admin DDS Spy MonitoringWire Shark Ping Connext Services Data Routing Data Queuing Web Integration Recording & Replay Database Integration Persistence Connext DDS Core Security API’s: C C++ C# Java Ada DDS Pub/Sub Messaging/RPC DDS XTYPES RTPS Pluggable Transports Windows, Linux, Unix, macOS, RTOS ©2020 Real-TimeInnovations,Inc.
  • 21. DDS Secure Performance ©2020 Real-TimeInnovations,Inc.
  • 22. Latency and Throughput Benchmarks • Platforms – Intel i7 6-core CPU 3.33GHz – Intel I350 Gigabit NIC – 12 GB RAM – CentOS Linux 7.1 – API: C++ • Cryptography – OpenSSL 1.0.2o built-in algorithms – GMAC-AES128 for MAC only (without encryption) – AES-128-GCM for encrypt • Network – D-Link DXS-3350 SR Switch – Dual 10-Gigabit stackable ports – 4MB packet buffer size – 10/100/1000 Base-T interfaces ©2020 Real-TimeInnovations,Inc.
  • 23. Latency for 1024 Byte Samples ©2020 Real-TimeInnovations,Inc. 0 20 40 60 80 No Security HMACed RTPS HMACed RTPS, Encrypt User Data, Encrypt Submessage Latency(μs)
  • 24. Throughput for 1024 Byte Sample ©2020 Real-TimeInnovations,Inc. 0 250 500 750 1000 No Security HMACed RTPS HMACed RTPS, Encrypt User Data, Encrypt Submessage Throughput(Mbps)
  • 25. Discovery Benchmarks 0 20 40 60 80 100 120 140 160 50 100 150 200 250 300 DiscoveryTime(s) No Security Authentication Only Discovery Encrypted Number of Participants ©2020 Real-TimeInnovations,Inc.
  • 26. DDS Secure Configuration ©2020 Real-TimeInnovations,Inc.
  • 27. Configuring & Deploying DDS Security Identity Certificate P1 Private Key Permissions File Governance File Identity CA Certificate Permissions CA Certificate Signs
  • 28. Configuring & Deploying DDS Security Identity Certificate P1 Private Key Permissions File Governance File Identity CA Certificate Permissions CA Certificate Signs
  • 29. Configuring & Deploying DDS Security Identity Certificate P1 Private Key Permissions File Governance File Identity CA Certificate Permissions CA Certificate
  • 30. Configuring & Deploying DDS Security Identity Certificate P1 Private Key Permissions File Governance File Identity CA Certificate Permissions CA Certificate
  • 31. Configuring & Deploying DDS Security Identity Certificate P1 Private Key Permissions File Governance File Identity CA Certificate Permissions CA Certificate
  • 32. Configuring & Deploying DDS Security Identity Certificate P1 Private Key Permissions File QoS XML Config Governance File Identity CA Certificate Permissions CA Certificate
  • 33. Configuring & Deploying DDS Security Identity Certificate P1 Private Key Permissions File QoS XML Config Governance File Identity CA Certificate Permissions CA Certificate
  • 34. Configuring & Deploying DDS Security Identity Certificate P1 Private Key Permissions File QoS XML Config Governance File Identity CA Certificate Permissions CA Certificate Identity Certificate P1 Private Key Permissions File QoS XML Config Governance File Identity CA Certificate Permissions CA Certificate Common to/installed on all participants
  • 35. A Sample Governance File ©2020 Real-TimeInnovations,Inc.
  • 36. A Sample Permissions File ©2020 Real-TimeInnovations,Inc.
  • 37. Security Configuration ©2020 Real-Time Innovations, Inc. <qos_profile name="SecurityExample“ base_name=“BuiltinQosLib::Generic.Security"> <participant_qos> <property> <value> <element> <name>dds.sec.auth.identity_ca</name> <value>file:../../../dds_security/cert/cacertECdsa.pem</value> </element> <element> <name>dds.sec.auth.identity_certificate</name> <value>file:../../../dds_security/cert/peer1ECdsa.pem</value> </element> <element> <name>dds.sec.auth.private_key</name> <value>file:../../../dds_security/cert/peer1keyECdsa.pem</value> </element> <element> <name>dds.sec.access.permissions_ca</name> <value>file:../../../dds_security/cert/cacertECdsa.pem</value> </element> <element> <name>dds.sec.access.governance</name> <value>file:../../../dds_security/xml/signed/signed_Governance.p7s</value> </element> <element> <name>dds.sec.access.permissions</name> <value>file:../../../dds_security/xml/signed/signed_PermissionsA.p7s</value> </element> </value> </property> </participant_qos> </qos_profile>
  • 38. Functional Requirements • Algorithms • Business Logic • Data Content • Events and Reports • Explicit dependencies ©2020 Real-TimeInnovations,Inc. Transition to DDS Secure changes none of these!
  • 39. Non-Functional Requirements • Scalability – Affected? • Performance – Affected? • Capacity – Affected? • Availability – Not Affected • Reliability – Not Affected • Resiliency – Not Affected • Maintainability – Affected? • Serviceability – Affected? • Usability – Not Affected • Interoperability – Affected? ©2020 Real-TimeInnovations,Inc.
  • 40. Adding DDS Secure ©2020 Real-TimeInnovations,Inc.
  • 41. Steps to add DDS Secure to your system: Phase 1 1. Download & install 2. Setup to self-sign certificates 3. Generate some certs to use for testing w/ Shapes 4. Use Shapes to setup basic governance and permissions files 5. Start w/ basic authentication (point to certs in QoS file) 6. Add read/write permissions 7. Add crypto last ©2020 Real-TimeInnovations,Inc.
  • 42. Steps to add DDS Secure to your system: Phase 2 1. Modify your build system to link w/ Secure libraries 2. and/or modify your QoS files to load Secure libs & point to certs, etc. 3. Start w/ basic authentication 4. Add read/write permissions 5. Add crypto last 6. Benchmark performance ©2020 Real-TimeInnovations,Inc.
  • 43. DDS Secure Demo ©2020 Real-TimeInnovations,Inc.
  • 44. Domains used in demo ©2020 Real-TimeInnovations,Inc. Domain Notes Effect/How to demo 0 No protections, allow unauthorized participants Share data between all apps 1 Add R access control to Squares Add W access control to Circle Add R/W access control on Triangle Pub/sub all 3 topics, non-secure on the left, secure on the right; pub on top, sub on bottom. Have trireader try to publish triangles 2 Don’t allow unauthenticated participants Show no data flows between secure & non-secure Shapes 3 RTPS data now signed Wireshark 4 Topic payload now encrypted Wireshark 5 Topic metadata now encrypted Wireshark 6 RTPS data now encrypted Wireshark Topic Read access Write access Square True False Only secure readers get data from secure writers. (L to H, not H to L) Circle False True Readers only get data from Secure writers (H to L, not L to H) Triangle True True Readers and writers must both be Secure (L to L, H to H, no others)
  • 45. DDS Secure Demo ©2020 Real-TimeInnovations,Inc.
  • 46. Domain 0 – No protections ©2020 Real-TimeInnovations,Inc. Non-Secure App Secure App
  • 47. Domain 1 – Write protections on Circles, Triangles ©2020 Real-TimeInnovations,Inc. Non-Secure App Secure App
  • 48. Domain 2 – Unauthenticated NOT allowed ©2020 Real-TimeInnovations,Inc. Non-Secure App Secure App
  • 49. Domain 3 – rtps_protection_kind = SIGN ©2020 Real-TimeInnovations,Inc. HMAC added to message No encryption
  • 50. Domain 4 – Add encryption of topic data ©2020 Real-TimeInnovations,Inc. Payload now encrypted Metadata visible (i.e. sequence #)
  • 51. Domain 5 – Encrypt topic metadata and payload ©2020 Real-TimeInnovations,Inc. Payload encrypted Metadata not visible
  • 52. Domain 6 – rtps_protection_kind = ENCRYPT ©2020 Real-TimeInnovations,Inc. Entire RTPS message encrypted
  • 53. Free RTI Connext Evaluation ©2020 Real-Time Innovations, Inc. https://www.rti.com/free-trial • Fully functional version of Connext DDS Professional • With monitoring, debug and visualization tools • Includes Shapes Demo • Runs on Windows, Linux and MacOS • Runs for 30 days ©2020 Real-TimeInnovations,Inc.
  • 54. RTI’s Resources • Community.rti.com – Complete RTI product documentation – Best Practices – Forum – Knowledge Base – Getting Started Videos – HOWTO’s • DDS Secure Getting Started Guide • DDS Secure User’s Guide • Why You Should Use TPM with RTI Connext DDS Secure • Using Connext DDS Secure 6.0 to Protect your Data • OMG DDS Secure site: https://www.omg.org/spec/DDS-SECURITY/1.1/PDF ©2020 Real-TimeInnovations,Inc.
  • 55. RTI Account Team – VA/WV/NC Ken McInerney, Field Application Engineer Phone: (410) 707 - 5889| kenm@rti.com How we help you: • Support for Connext Product Evaluations / Proof of Concept Efforts • Account Management – Licensing, Customer Service, Project Management • Customer Success Meetings/Calls – Best Practices, Troubleshooting Guidance, Education on Tools and New Products, New Platform Builds and Feature Requests, Support Case Escalation Lisa Ray, Connext Account Manager Phone: (919) 949 - 6115| lray@rti.com John Breitenbach, FAE Manager Phone: (919) 597 – 9386 johnb@rti.com ©2020 Real-TimeInnovations,Inc.
  • 56. Questions? • IIC: www.iiconsortium.org • DDS – DDS portal: portals.omg.org/dds/ – RTI: www.rti.com – Email: johnb@rti.com – Examples, forum, papers: community.rti.com ©2020 Real-TimeInnovations,Inc.
  • 57. Thank You! John Breitenbach johnb@rti.com LinkedIn: https://www.linkedin.com/in/atlantex/ ©2020 Real-TimeInnovations,Inc.