is your distributed system secure?
DESCRIPTION
Securing your distributed system for the IIoT.TRANSCRIPT
The Industrial Internet of Things is kind of a big deal.
You may have heard of it. Basically it’s going to enable things like flying cars, smart houses, and intelligent
systems that are actually, well… intelligent.
The IIoT is a massive distributed system.In fact, the IIoT is inherently distributed.
And this massive distributed system
has 3 key requirements:
1. Real-Time Performance
2. Scalability3. Security
To meet those 3 requirements, you need to start doing things differently.
But today?Today is your lucky day.
Yes. It’s true.
Because building real-time, decentralized,
distributed, scalable systems that boast both
security & reliability?
It’s in our DNA.
So we built a product that empowers you to defend your systems
and protect your data.
(See, I told you that today was your lucky day.)
RTI Connext DDS SecureTM
RTI Connext DDS Secureprovides you with the power
to build real-time IIoT systems that are Scalable,
Secure, & Reliable.
Connext DDS Secure runs overany Connext DDS transport.
UDP TCP
Shared Memory
Even unreliable transports with low-bandwidth. Also: multicast to support scalability and low-latency.
#winning
The architecture is distributedand decentralized.
translation: high-performance and no single points of failure
Connext DDS DataBus
And using the SDK, youcan build your own plug-ins.
Read: customizable and allows for integration with your existing security infrastructure.
Connext DDSLibrary
Authentication
Access Control
Encryption
Data Tagging
Logging
Application
Transport
SEC
UR
ITY P
LUG
-IN
S
Interested? Want moretechnical details?
No problem.
RTI Connext DDS Secure: Standard CapabilitiesAuthentication
– X.509 Public Key Infrastructure (PKI) with a pre-configured shared Certificate Authority (CA)
– Digital Signature Algorithm (DSA) with Diffie-Hellman and RSA for authentication and key exchange
Access Control– Specifications via permissions
file signed by shared CA– Control over ability to join DDS
Domains and Partitions, read or write Topics
– Control on individual objects and Quality of Service (QoS) via plugins
Cryptography– Protected key distribution– AES128 and AES256 for
encryption– HMAC-SHA1 and HMAC-
SHA256 for message authentication and integrity
Data Tagging– Used to specify security
metadata, such as classification level
– Sent during endpoint discovery
– Can be used to determine access privileges (via plugin)
Logging– Log security events to a local
file or distribute securely over Connext DDS
RTI Connext DDS Secure: Features & Benefits• Provides authentication, authorization, non-repudiation, confidentiality and integrity
• Protects discovery information, metadata and data
• Defends against unauthorized access, tampering and replay
• Operates without centralized servers for high performance, scalability and availability
• Runs over any transport including TCP, UDP, multicast and shared memory
• Integrates with existing security infrastructures and hardware acceleration
• Secures unmodified existing DDS applications
RTI Connext DDS Secure• Product Data Sheet
http://www.rti.com/products/secure.html
• Product Page http://www.rti.com/docs/RTI_DDS_Secure.pdf
• Press Release http://www.rti.com/company/news/secure-messaging-for-iiot.html
• RTI Blog http://blogs.rti.com/2014/06/17/connext-dds-secure/
RTI Connext DDS Secure
Your systems. Working As One.
Securely.