SlideShare a Scribd company logo
1 of 59
Your systems. Working as one. 
Four Keys to Securing Distributed Control 
Systems and the Industrial IoT 
David Barnett
Agenda 
• Industrial Internet of Things 
• Four Keys to IIoT Security 
• Data Distribution Service 
• Example: Securing the Power Grid 
• Next Steps 
• Q&A 
2014-Nov-13 © 2014 RTI 2
Industrial Internet of Things (IIoT) 
2014-Nov-13 © 2014 RTI 3
IIoT Systems Are Distributed 
HMI/UI IT, Cloud & SoS 
Connectivity 
Sensors Actuators 
Streaming 
Analytics & 
Control 
2014-Nov-13 © 2014 RTI 4
IIoT Systems Are Distributed 
2014-Nov-13 © 2014 RTI 5
Unit DataBus 
Unit DataBus 
Example 
Intelligent 
Industrial 
Internet 
Intelligent 
Systems 
Intelligent 
Machines 
Cloud 
Enterprise LAN 
Intelligent 
System of 
Systems 
Unit LAN Segment 
Think HMI 
Intra-machine 
Think HMI 
Think HMI 
Intra-machine 
Sense Intra-machine 
Act 
Sense Act 
2014-Nov-13 © 2014 RTI 6
IIoT Unique Requirements 
• Real-time performance 
• Safety 
• Security 
2014-Nov-13 © 2014 RTI 7
Four Keys to Securing the IIoT
#1: Decentralized Architecture
Consumer Internet of Things 
Centralized, Hub and Spoke 
Information Technology Systems 
Premises or Cloud 
2014-Nov-13 © 2014 RTI 10
Consumer IoT and Traditional IT 
• Limited scalability and performance 
• Centralized ESB, Message 
Broker or Server 
• E.g.: MQTT, XMPP, AMQP, 
CoAP, Web Services 
– Intermediary = poor latency and determinism 
– Centralized broker/server is bottleneck and choke point 
– Expensive to scale: need more servers 
– Capacity constrained by individual links and switch ports 
• Poor robustness 
– Single point of failure/failover 
– Tied to server maintenance and failures 
– Single point of vulnerability 
• Lessens capabilities and utility 
– Single centralized “brain” 
– No autonomy or intelligence at the edge 
2014-Nov-13 © 2014 RTI 11
IIoT Needs Analytics & Control at the Edge 
IT/Cloud 
• Lower latency control for faster response 
• Highly resilient, no single point of failure 
• Analyze orders of magnitude more data 
2014-Nov-13 © 2014 RTI 12
#2: Access Control
Can’t Rely on Physical Security or 
Limited Access 
Unit DataBus 
Unit DataBus 
Cloud 
Enterprise LAN 
Unit LAN Segment 
Think HMI 
Sense Intra-machine 
Act 
2014-Nov-13 © 2014 RTI 14
Q4 2013 Reported Cyber Incidents to 
U.S. Critical Infrastructure 
http://ics-cert.us-cert.gov/monitors/ICS-MM201312 
2014-Nov-13 © 2014 RTI 15
Threats 
2014-Nov-13 © 2014 RTI 16
Threats 
Alice: Allowed to publish topic T 
Bob: Allowed to subscribe to topic T 
Eve: Non-authorized eavesdropper 
Trudy: Intruder 
Trent: Trusted infrastructure service 
Mallory: Malicious insider 
1. Unauthorized subscription 
2. Unauthorized publication 
3. Tampering and replay 
4. Unauthorized access to data by 
infrastructure services 
2014-Nov-13 © 2014 RTI 17
#3: No Dependence on TCP or 
Transport Layer Security
Problems with TCP and IP 
• TCP 
– No control over latency 
– No multicast: inefficient onemany and 
manymany communication 
– Requires reliable network with reasonable 
bandwidth 
• IP can also be inefficient… 
– Over very low bandwidth networks(e.g., satellite) 
– Over high speed interconnects (e.g., shared 
memory and RDMA) 
2014-Nov-13 © 2014 RTI 19
Transport Layer Security (TLS/SSL) 
1. Authenticate 
– Verify identity 
2. Securely exchange cryptographic keys 
3. Use keys to: 
– Encrypt data 
– Add a message authentication code 
App 1 App 2 
2014-Nov-13 © 2014 RTI 20
Limitations of Transport Security: 
No Inherent Access Control 
• You’re authenticated or you’re not 
• Less an issue for centralized systems 
– E.g.: non-real-time IT and consumer IoT systems 
– Broker centrally manages access control 
App App App 
Device 
Message 
Broker 
Device Device 
• Poor performance 
and scalability 
• Single point of 
failure/failover 
2014-Nov-13 © 2014 RTI 21
Limitations of Transport Security: 
Overall Poor Performance and Scalability 
• No multicast support (even with DTLS over UDP) 
– Broad data distribution is very inefficient 
• Usually runs over TCP: poor latency and jitter 
• Requires a network robust enough to support IP 
and TCP 
• All data treated as reliable 
– Even fast changing data that could be “best effort” 
• Always encrypts all data, metadata and protocol 
headers 
– Even if some data does not have to be private 
• Security is at a very gross level 
2014-Nov-13 © 2014 RTI 22
#4: Interoperability (Open Architecture)
Need for Interoperability 
• IIoT systems typically composed of 
components from many suppliers 
• IIoT systems have long lifecycles 
– Interoperability enables modularity
Traditional Approach 
2014-Nov-13 © 2014 RTI 25
Traditional Approach 
2014-Nov-13 © 2014 RTI 26
Traditional Approach 
2014-Nov-13 © 2014 RTI 27
Traditional Approach 
• Hard coded 
connections 
• Up to O(n2) 
• Complex 
• Hard to maintain, 
evolve, re-use 
E.g., sockets, RPC 
2014-Nov-13 © 2014 RTI 28
Result 
Time & cost of 
integration, 
maintenance 
and upgrades 
System Scale and Age 
O(n2) 
2014-Nov-13 © 2014 RTI 29
Solution: Modularity 
2014-Nov-13 © 2014 RTI 30
Key: Interoperability 
Well-defined: 
• Interfaces 
• Semantics 
2014-Nov-13 © 2014 RTI 31
Data Distribution Service 
Designed for the Industrial Internet of Things
For loose coupling, provides: 
• Discovery 
• Routing 
• High-availability 
• QoS enforcement 
• Well-define interfaces 
• Standard interoperability 
Protocol 
Data Distribution Service 
2014-Nov-13 © 2014 RTI 33
DDS Standard 
• Interoperability and 
portability 
– Data model specification 
and discovery 
– Network protocol 
– Programming interface 
• Managed by Object 
Management Group (OMG) 
Cross-vendor source portability 
Standard API 
Data 
Model 
DDS Implementation 
Standard Protocol 
Cross-vendor interoperability 
2014-Nov-13 © 2014 RTI 34
Peer-to-Peer Communication 
DDS-RTPS Wire Interoperability Protocol 
• Completely decentralized 
• No intermediate servers, 
message brokers or ESB 
• Low latency 
• High scalability 
• No single point of failure 
App or 
Component 
DDS Library 
App or 
Component 
DDS Library 
DDS 
API 
2014-Nov-13 © 2014 RTI 35
Easy Integration of Existing Components 
Unmodified 
App 
Adapter 
DDS Routing 
Service 
DDS-RTPS Wire Interoperability Protocol 
Unmodified 
App 
Adapter 
DDS Routing 
Service 
App or 
Component 
DDS Library 
App or 
Component 
DDS Library 
DDS or other protocol 
DDS 
API 
New and Updated Applications Existing, Unmodified Applications 
2014-Nov-13 © 2014 RTI 36
Seamless Sensor-to-Cloud Connectivity 
Connect Everything, Everywhere 
Data Distribution Service 
Seamless data sharing regardless of: 
• Proximity 
• Platform 
• Language 
• Physical network 
• Transport protocol 
• Network topology 
2014-Nov-13 © 2014 RTI 37
Example: RTI Connext Availability 
• Programming languages and 
environments 
– C, C++, C#/.NET, Java, Ada 
– Lua, Python 
– LabVIEW, MATLAB, Simulink, UML 
– REST/HTTP 
• Operating systems 
– Windows, Linux, Unix, Mac OS 
– Mobile 
– Embedded, real time 
– Safety critical, partitioned 
• Processor families 
– x86, ARM, PowerPC… 
– 32- and 64-bit 
• Transport types 
– Shared memory 
– LAN (incl. multicast) 
– WAN / Internet 
– Wireless 
– Low bandwidth 
2014-Nov-13 © 2014 RTI 38
Foundation: Publish/Subscribe 
Data Distribution Service 
Commands 
Control 
App 
Sensor Data 
Sensor 
Sensor Data 
Display 
App 
Sensor Actuator 
2014-Nov-13 © 2014 RTI 39
Support for Mission-Critical Systems 
• Autonomous operation 
– Automatic discovery 
– No sys admin or centralized 
infrastructure 
• Non-stop: no single point of failure 
• QoS control and visibility into 
real-time behavior, system health 
• Embeddable 
• Proven in 100,000s of deployed 
devices 
2014-Nov-13 © 2014 RTI 40
DDS Security 
• Security extensions to DDS standard 
• Requires trivial or no change to 
existing DDS apps and adapters 
• Runs over any transport 
– Including low bandwidth, unreliable 
– Does not require TCP or IP 
– Multicast for scalability, low latency 
• Plugin architecture 
– Built-in defaults 
– Customizable via standard API 
• Completely decentralized 
– High performance and scalability 
– No single point of failure 
Secure DDS 
library 
Authentication 
Access Control 
Encryption 
Data Tagging 
Logging 
Application 
Any Transport 
(e.g., TCP, UDP, multicast, 
shared memory, satellite) 
2014-Nov-13 © 2014 RTI 41
2014-Nov-13 © 2014 RTI 42
Standard Capabilities 
Authentication  X.509 Public Key Infrastructure (PKI) with a pre-configured 
shared Certificate Authority (CA) 
 Digital Signature Algorithm (DSA) with Diffie-Hellman and 
RSA for authentication and key exchange 
Access Control  Specified via permissions file signed by shared CA 
 Control over ability to join systems, read or write data 
topics 
Cryptography  Protected key distribution 
 AES128 and AES256 for encryption 
 HMAC-SHA1 and HMAC-SHA256 for message 
authentication and integrity 
Data Tagging  Tags specify security metadata, such as classification level 
 Can be used to determine access privileges (via plugin) 
Logging  Log security events to a file or distribute securely over 
Connext DDS 
2014-Nov-13 © 2014 RTI 43
Protections 
Protected 
Objects 
Domain (by domain_id) 
Topic (by Topic name) 
DataObjects (by Instance/Key) 
Protected 
Operations 
Domain.join 
Topic.create 
Topic.read (includes QoS) 
Topic.write (includes QoS) 
Data.createInstance 
Data.writeInstance 
Data.deleteInstance 
2014-Nov-13 © 2014 RTI 44
Control over Encryption 
• Scope 
– Discovery data 
– Metadata 
– Data 
• For each: 
– Encrypt 
– Sign 
• Optimizes performance by only encrypting 
data that must be private 
2014-Nov-13 © 2014 RTI 45
Example Domain Governance 
2014-Nov-13 © 2014 RTI 46
Example Permissions 
2014-Nov-13 © 2014 RTI 47
DDS Security Status 
• Standard adopted March 2014 
• Considered “Beta” for 1 year 
• RTI chairing Finalization Task Force 
• Available now from RTI 
2014-Nov-13 © 2014 RTI 48
Security Example: 
Power Grid 
In Partnership with PNNL 
© 2014 RTI
Data Security Requirements 
Data Item Authentica-tion 
Access 
Control 
Integrity Non-repudiation 
Confidentiality 
Control traffic X X X X X 
Data 
X X 
Telemetry 
traffic 
Physical 
Security Data 
X X X 
Engineering 
maintenance 
X 
Source: www.sxc.hu 
2014-Nov-13 © 2014 RTI 50
Test Environment 
• Real World Environment 
– Transmission switching 
substation 
– Real substation equipment 
• PNNL powerNET Testbed 
– Remote connectivity 
– Local control room 
demonstration environment 
– Dynamically reconfigurable 
2014-Nov-13 © 2014 RTI 51
SCADA Equipment Setup 
2014-Nov-13 © 2014 RTI 52
RTI and PNNL Grid Security Retrofit 
Control Station 
DNP3 
Master 
Device 
Transmission Substation 
DNP3 
Slave 
Device 
RTI Routing 
Service 
Gateway 
RTI Routing 
Service 
ComProcessor 
DNP3 
Slave 
Device 
DNP3 over 
Ethernet DNP3 over DDS 
DNP3 over 
RS232/485 
RTI Routing 
Service 
Gateway 
DDS 
LAN 
DDS 
LAN 
RTI Routing 
Service 
ComProcessor 
IP 
Router 
IP 
Router 
DDS over WAN 
Attack Detector 
Scada 
Converter 
Anomaly 
Detector 
Secure DDS 
over UDP 
Display 
Effective DNP3 
connection 
Details at http://blogs.rti.com 
2014-Nov-13 © 2014 RTI 53
About RTI 
• Market Leader 
– 1,000+ projects use Connext DDS 
– Over 70% DDS middleware market share1 
– Largest embedded middleware vendor2 
– 2013 Gartner Cool Vendor for technology and 
Open Community Source model 
• Standards Leader 
– Active in 15 standards efforts 
– DDS authors, chair, wire spec, security, more 
– IIC steering committee; OMG board 
• Team Quality Leader 
– Stanford research pedigree 
– High-performance, control, systems experts 
– Top quality product, processes, execution 
© 2014 RTI 
1Embedded Market Forecasters 
2VDC Analyst Report 
2014-Nov-13 54
IIoT Infrastructure Trusts RTI 
• World’s largest Wind Power company 
• World’s largest Underground Mining Equipment company 
• World’s largest Navy (all surface ships) 
• World’s largest Automotive company 
• World’s largest Emergency Medical System company 
• World’s largest Medical Imaging provider 
• World’s 2nd largest Patient Monitoring manufacturer 
• World’s 2nd largest Air Traffic control system 
• World’s largest Broadcast Video Equipment manufacturer 
• World’s largest Launch Control System 
• World’s largest Telescope (under construction) 
• World’s 5th-largest Oil & Gas company 
• World’s 6th-largest power plant (largest in US) 
• All of world’s top ten defense companies 
RTI designed into 
over $1 trillion 
2014-Nov-13 © 2014 RTI 55
RTI Named Most Influential IIoT Company 
2014-Nov-13 © 2014 RTI 56
Four Keys to Securing the IIoT 
• Decentralized architecture 
• Access control 
• No dependence on TCP or 
Transport Security 
• Interoperability (Open Architecture) 
2014-Nov-13 © 2014 RTI 57
Next Steps – Learn More 
• Contact RTI 
– Demo, Q&A 
• Download software 
– www.rti.com/downloads 
– Free trial with comprehensive tutorial 
– RTI Shapes Demo 
• Watch videos & webinars, read 
whitepapers 
– www.rti.com/resources 
– www.youtube.com/realtimeinnovatio 
ns 
2014-Nov-13 © 2014 RTI 58
dds.omg.org 
www.rti.com 
community.rti.com 
demo.rti.com 
www.youtube.com/realtimeinnovations 
blogs.rti.com 
www.twitter.com/RealTimeInnov 
www.facebook.com/RTIsoftware 
www.omg.org 
www.slideshare.net/GerardoPardo 
www.slideshare.net/RealTimeInnovations 
2014-Nov-13 © 2014 RTI 59

More Related Content

What's hot

The Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 WorkshopThe Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 WorkshopFatih Ozavci
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access Er. Ajay Sirsat
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT securityJulien Vermillard
 
ThingsBoard - Open-source IoT Platform
ThingsBoard - Open-source IoT PlatformThingsBoard - Open-source IoT Platform
ThingsBoard - Open-source IoT Platformaliali1391
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Ahmed Mohamed Mahmoud
 
Protecting web aplications with machine learning and security fabric
Protecting web aplications with machine learning and security fabricProtecting web aplications with machine learning and security fabric
Protecting web aplications with machine learning and security fabricDATA SECURITY SOLUTIONS
 
The DDS Security Standard
The DDS Security StandardThe DDS Security Standard
The DDS Security StandardAngelo Corsaro
 
5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to PracticeAlgoSec
 
IoT vs IIoT vs Industry 4.0
IoT vs IIoT vs Industry 4.0IoT vs IIoT vs Industry 4.0
IoT vs IIoT vs Industry 4.0SMACAR Solutions
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of ThingsBryan Len
 
Hacking SIP Like a Boss!
Hacking SIP Like a Boss!Hacking SIP Like a Boss!
Hacking SIP Like a Boss!Fatih Ozavci
 
Group 5 IoT Architecture Layer
Group 5 IoT Architecture LayerGroup 5 IoT Architecture Layer
Group 5 IoT Architecture LayerMarcus Maneja
 

What's hot (20)

IOT Security
IOT SecurityIOT Security
IOT Security
 
The Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 WorkshopThe Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 Workshop
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
ThingsBoard - Open-source IoT Platform
ThingsBoard - Open-source IoT PlatformThingsBoard - Open-source IoT Platform
ThingsBoard - Open-source IoT Platform
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
Protecting web aplications with machine learning and security fabric
Protecting web aplications with machine learning and security fabricProtecting web aplications with machine learning and security fabric
Protecting web aplications with machine learning and security fabric
 
The DDS Security Standard
The DDS Security StandardThe DDS Security Standard
The DDS Security Standard
 
5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice
 
2. secure web gateway
2. secure web gateway2. secure web gateway
2. secure web gateway
 
IoT vs IIoT vs Industry 4.0
IoT vs IIoT vs Industry 4.0IoT vs IIoT vs Industry 4.0
IoT vs IIoT vs Industry 4.0
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
 
Hacking SIP Like a Boss!
Hacking SIP Like a Boss!Hacking SIP Like a Boss!
Hacking SIP Like a Boss!
 
Future Wireless Networks
Future Wireless NetworksFuture Wireless Networks
Future Wireless Networks
 
Group 5 IoT Architecture Layer
Group 5 IoT Architecture LayerGroup 5 IoT Architecture Layer
Group 5 IoT Architecture Layer
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
NMAP - The Network Scanner
NMAP - The Network ScannerNMAP - The Network Scanner
NMAP - The Network Scanner
 
IoT Networking Part 2
IoT Networking Part 2IoT Networking Part 2
IoT Networking Part 2
 

Viewers also liked

7. advantages of digital system
7. advantages of digital system7. advantages of digital system
7. advantages of digital systemSajjad Mehmood
 
DCS ( Distributed Control System )
DCS ( Distributed Control System )DCS ( Distributed Control System )
DCS ( Distributed Control System )Automation123
 
Ch1.number systems
Ch1.number systemsCh1.number systems
Ch1.number systemsteba
 
Digital and Logic Design Chapter 1 binary_systems
Digital and Logic Design Chapter 1 binary_systemsDigital and Logic Design Chapter 1 binary_systems
Digital and Logic Design Chapter 1 binary_systemsImran Waris
 
Digital logic gates
Digital logic gatesDigital logic gates
Digital logic gatesjsearle11
 
Digital logic gate and its application
Digital logic gate and its applicationDigital logic gate and its application
Digital logic gate and its applicationAbdullah Al Masud
 
faults in digital systems
faults in digital systemsfaults in digital systems
faults in digital systemsdennis gookyi
 
Digital Logic & Design (DLD) presentation
Digital Logic & Design (DLD) presentationDigital Logic & Design (DLD) presentation
Digital Logic & Design (DLD) presentationfoyez ahammad
 
Chapter 1 digital systems and binary numbers
Chapter 1 digital systems and binary numbersChapter 1 digital systems and binary numbers
Chapter 1 digital systems and binary numbersMohammad Bashartullah
 
digital control Chapter1 slide
digital control Chapter1 slidedigital control Chapter1 slide
digital control Chapter1 slideasyrafjpk
 
digital logic design number system
digital logic design number systemdigital logic design number system
digital logic design number systemNallapati Anindra
 
Mrs. Noland's Binary System ppt
Mrs. Noland's Binary System pptMrs. Noland's Binary System ppt
Mrs. Noland's Binary System pptdsparone
 
Distributed Shared Memory Systems
Distributed Shared Memory SystemsDistributed Shared Memory Systems
Distributed Shared Memory SystemsArush Nagpal
 
Binary code - Beginning
Binary code - BeginningBinary code - Beginning
Binary code - BeginningDebbie Eitner
 

Viewers also liked (20)

7. advantages of digital system
7. advantages of digital system7. advantages of digital system
7. advantages of digital system
 
Semestrario tic
Semestrario ticSemestrario tic
Semestrario tic
 
Why SIL3 (ENG)
Why SIL3 (ENG)Why SIL3 (ENG)
Why SIL3 (ENG)
 
DCS ( Distributed Control System )
DCS ( Distributed Control System )DCS ( Distributed Control System )
DCS ( Distributed Control System )
 
DCS
DCSDCS
DCS
 
Ch1.number systems
Ch1.number systemsCh1.number systems
Ch1.number systems
 
Digital and Logic Design Chapter 1 binary_systems
Digital and Logic Design Chapter 1 binary_systemsDigital and Logic Design Chapter 1 binary_systems
Digital and Logic Design Chapter 1 binary_systems
 
Digital logic gates
Digital logic gatesDigital logic gates
Digital logic gates
 
Digital logic gate and its application
Digital logic gate and its applicationDigital logic gate and its application
Digital logic gate and its application
 
faults in digital systems
faults in digital systemsfaults in digital systems
faults in digital systems
 
Introduction to digital system
Introduction to digital systemIntroduction to digital system
Introduction to digital system
 
Digital Logic & Design (DLD) presentation
Digital Logic & Design (DLD) presentationDigital Logic & Design (DLD) presentation
Digital Logic & Design (DLD) presentation
 
Chapter 1 digital systems and binary numbers
Chapter 1 digital systems and binary numbersChapter 1 digital systems and binary numbers
Chapter 1 digital systems and binary numbers
 
digital control Chapter1 slide
digital control Chapter1 slidedigital control Chapter1 slide
digital control Chapter1 slide
 
digital logic design number system
digital logic design number systemdigital logic design number system
digital logic design number system
 
Chapter 8 - Main Memory
Chapter 8 - Main MemoryChapter 8 - Main Memory
Chapter 8 - Main Memory
 
Mrs. Noland's Binary System ppt
Mrs. Noland's Binary System pptMrs. Noland's Binary System ppt
Mrs. Noland's Binary System ppt
 
Working of DCS systems
Working of DCS systemsWorking of DCS systems
Working of DCS systems
 
Distributed Shared Memory Systems
Distributed Shared Memory SystemsDistributed Shared Memory Systems
Distributed Shared Memory Systems
 
Binary code - Beginning
Binary code - BeginningBinary code - Beginning
Binary code - Beginning
 

Similar to Four keys to securing distributed control systems and the industrial (IoT)

October Southern CA Road Shows - Build Safe and Secure Distributed Systems
October Southern CA Road Shows -  Build Safe and Secure Distributed SystemsOctober Southern CA Road Shows -  Build Safe and Secure Distributed Systems
October Southern CA Road Shows - Build Safe and Secure Distributed SystemsReal-Time Innovations (RTI)
 
Build Safe & Secure Distributed Systems - RTI Boston Roadshow- 2014 09 30
Build Safe & Secure Distributed Systems - RTI Boston Roadshow- 2014 09 30Build Safe & Secure Distributed Systems - RTI Boston Roadshow- 2014 09 30
Build Safe & Secure Distributed Systems - RTI Boston Roadshow- 2014 09 30Real-Time Innovations (RTI)
 
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...Real-Time Innovations (RTI)
 
Is Your Power Utility Smart Enough to Survive Another Decade
Is Your Power Utility Smart Enough to Survive Another DecadeIs Your Power Utility Smart Enough to Survive Another Decade
Is Your Power Utility Smart Enough to Survive Another DecadeReal-Time Innovations (RTI)
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Digital Bond
 
Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25
Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25
Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25Real-Time Innovations (RTI)
 
Comparison of MQTT and DDS as M2M Protocols for the Internet of Things
Comparison of MQTT and DDS as M2M Protocols for the Internet of ThingsComparison of MQTT and DDS as M2M Protocols for the Internet of Things
Comparison of MQTT and DDS as M2M Protocols for the Internet of ThingsReal-Time Innovations (RTI)
 
SDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_NetworksSDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_NetworksSrinivasa Addepalli
 
DDS Security for the Industrial Internet - London Connext DDS Conference
DDS Security for the Industrial Internet - London Connext DDS ConferenceDDS Security for the Industrial Internet - London Connext DDS Conference
DDS Security for the Industrial Internet - London Connext DDS ConferenceGerardo Pardo-Castellote
 
[CLASS 2014] Palestra Técnica - Ilan Barda
[CLASS 2014] Palestra Técnica - Ilan Barda[CLASS 2014] Palestra Técnica - Ilan Barda
[CLASS 2014] Palestra Técnica - Ilan BardaTI Safe
 
Connectivité temps réel et bi-directionnelle ​ pour solutions IOT
Connectivité temps réel et bi-directionnelle ​ pour solutions IOTConnectivité temps réel et bi-directionnelle ​ pour solutions IOT
Connectivité temps réel et bi-directionnelle ​ pour solutions IOTSolace
 

Similar to Four keys to securing distributed control systems and the industrial (IoT) (20)

October Southern CA Road Shows - Build Safe and Secure Distributed Systems
October Southern CA Road Shows -  Build Safe and Secure Distributed SystemsOctober Southern CA Road Shows -  Build Safe and Secure Distributed Systems
October Southern CA Road Shows - Build Safe and Secure Distributed Systems
 
Build Safe and Secure Distributed Systems
Build Safe and Secure Distributed SystemsBuild Safe and Secure Distributed Systems
Build Safe and Secure Distributed Systems
 
Build Safe and Secure Distributed Systems
Build Safe and Secure Distributed Systems Build Safe and Secure Distributed Systems
Build Safe and Secure Distributed Systems
 
Build Safe & Secure Distributed Systems - RTI Boston Roadshow- 2014 09 30
Build Safe & Secure Distributed Systems - RTI Boston Roadshow- 2014 09 30Build Safe & Secure Distributed Systems - RTI Boston Roadshow- 2014 09 30
Build Safe & Secure Distributed Systems - RTI Boston Roadshow- 2014 09 30
 
DDS Enabling Open Architecture
DDS Enabling Open ArchitectureDDS Enabling Open Architecture
DDS Enabling Open Architecture
 
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
 
Is Your Power Utility Smart Enough to Survive Another Decade
Is Your Power Utility Smart Enough to Survive Another DecadeIs Your Power Utility Smart Enough to Survive Another Decade
Is Your Power Utility Smart Enough to Survive Another Decade
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security
 
Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25
Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25
Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25
 
Comparison of MQTT and DDS as M2M Protocols for the Internet of Things
Comparison of MQTT and DDS as M2M Protocols for the Internet of ThingsComparison of MQTT and DDS as M2M Protocols for the Internet of Things
Comparison of MQTT and DDS as M2M Protocols for the Internet of Things
 
Cyber Security for the Connected Car
Cyber Security for the Connected Car Cyber Security for the Connected Car
Cyber Security for the Connected Car
 
SDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_NetworksSDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_Networks
 
DDS Secure Intro
DDS Secure IntroDDS Secure Intro
DDS Secure Intro
 
DDS Security for the Industrial Internet - London Connext DDS Conference
DDS Security for the Industrial Internet - London Connext DDS ConferenceDDS Security for the Industrial Internet - London Connext DDS Conference
DDS Security for the Industrial Internet - London Connext DDS Conference
 
An introduction to the prpl foundation
An introduction to the prpl foundationAn introduction to the prpl foundation
An introduction to the prpl foundation
 
[CLASS 2014] Palestra Técnica - Ilan Barda
[CLASS 2014] Palestra Técnica - Ilan Barda[CLASS 2014] Palestra Técnica - Ilan Barda
[CLASS 2014] Palestra Técnica - Ilan Barda
 
Understanding the Internet of Things Protocols
Understanding the Internet of Things ProtocolsUnderstanding the Internet of Things Protocols
Understanding the Internet of Things Protocols
 
Connectivité temps réel et bi-directionnelle ​ pour solutions IOT
Connectivité temps réel et bi-directionnelle ​ pour solutions IOTConnectivité temps réel et bi-directionnelle ​ pour solutions IOT
Connectivité temps réel et bi-directionnelle ​ pour solutions IOT
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 

More from Real-Time Innovations (RTI)

Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...Real-Time Innovations (RTI)
 
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...Real-Time Innovations (RTI)
 
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...Real-Time Innovations (RTI)
 
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkThe Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkReal-Time Innovations (RTI)
 
ISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsReal-Time Innovations (RTI)
 
The Low-Risk Path to Building Autonomous Car Architectures
The Low-Risk Path to Building Autonomous Car ArchitecturesThe Low-Risk Path to Building Autonomous Car Architectures
The Low-Risk Path to Building Autonomous Car ArchitecturesReal-Time Innovations (RTI)
 
How to Design Distributed Robotic Control Systems
How to Design Distributed Robotic Control SystemsHow to Design Distributed Robotic Control Systems
How to Design Distributed Robotic Control SystemsReal-Time Innovations (RTI)
 
Fog Computing is the Future of the Industrial Internet of Things
Fog Computing is the Future of the Industrial Internet of ThingsFog Computing is the Future of the Industrial Internet of Things
Fog Computing is the Future of the Industrial Internet of ThingsReal-Time Innovations (RTI)
 
The Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
The Inside Story: How OPC UA and DDS Can Work Together in Industrial SystemsThe Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
The Inside Story: How OPC UA and DDS Can Work Together in Industrial SystemsReal-Time Innovations (RTI)
 
Space Rovers and Surgical Robots: System Architecture Lessons from Mars
Space Rovers and Surgical Robots: System Architecture Lessons from MarsSpace Rovers and Surgical Robots: System Architecture Lessons from Mars
Space Rovers and Surgical Robots: System Architecture Lessons from MarsReal-Time Innovations (RTI)
 
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...Real-Time Innovations (RTI)
 
How the fusion of time sensitive networking, time-triggered ethernet and data...
How the fusion of time sensitive networking, time-triggered ethernet and data...How the fusion of time sensitive networking, time-triggered ethernet and data...
How the fusion of time sensitive networking, time-triggered ethernet and data...Real-Time Innovations (RTI)
 
Data Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of ThingsData Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of ThingsReal-Time Innovations (RTI)
 
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...Real-Time Innovations (RTI)
 
Developing Mission-Critical Avionics and Defense Systems with Ada and DDS
Developing Mission-Critical Avionics and Defense Systems with Ada and DDSDeveloping Mission-Critical Avionics and Defense Systems with Ada and DDS
Developing Mission-Critical Avionics and Defense Systems with Ada and DDSReal-Time Innovations (RTI)
 

More from Real-Time Innovations (RTI) (20)

A Tour of RTI Applications
A Tour of RTI ApplicationsA Tour of RTI Applications
A Tour of RTI Applications
 
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
 
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
 
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...
 
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkThe Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
 
ISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software Components
 
The Low-Risk Path to Building Autonomous Car Architectures
The Low-Risk Path to Building Autonomous Car ArchitecturesThe Low-Risk Path to Building Autonomous Car Architectures
The Low-Risk Path to Building Autonomous Car Architectures
 
Introduction to RTI DDS
Introduction to RTI DDSIntroduction to RTI DDS
Introduction to RTI DDS
 
How to Design Distributed Robotic Control Systems
How to Design Distributed Robotic Control SystemsHow to Design Distributed Robotic Control Systems
How to Design Distributed Robotic Control Systems
 
Fog Computing is the Future of the Industrial Internet of Things
Fog Computing is the Future of the Industrial Internet of ThingsFog Computing is the Future of the Industrial Internet of Things
Fog Computing is the Future of the Industrial Internet of Things
 
The Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
The Inside Story: How OPC UA and DDS Can Work Together in Industrial SystemsThe Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
The Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
 
Space Rovers and Surgical Robots: System Architecture Lessons from Mars
Space Rovers and Surgical Robots: System Architecture Lessons from MarsSpace Rovers and Surgical Robots: System Architecture Lessons from Mars
Space Rovers and Surgical Robots: System Architecture Lessons from Mars
 
Advancing Active Safety for Next-Gen Automotive
Advancing Active Safety for Next-Gen AutomotiveAdvancing Active Safety for Next-Gen Automotive
Advancing Active Safety for Next-Gen Automotive
 
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
 
How the fusion of time sensitive networking, time-triggered ethernet and data...
How the fusion of time sensitive networking, time-triggered ethernet and data...How the fusion of time sensitive networking, time-triggered ethernet and data...
How the fusion of time sensitive networking, time-triggered ethernet and data...
 
Secrets of Autonomous Car Design
Secrets of Autonomous Car DesignSecrets of Autonomous Car Design
Secrets of Autonomous Car Design
 
Data Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of ThingsData Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of Things
 
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
 
Developing Mission-Critical Avionics and Defense Systems with Ada and DDS
Developing Mission-Critical Avionics and Defense Systems with Ada and DDSDeveloping Mission-Critical Avionics and Defense Systems with Ada and DDS
Developing Mission-Critical Avionics and Defense Systems with Ada and DDS
 
IoT and M2M Safety and Security
IoT and M2M Safety and Security 	IoT and M2M Safety and Security
IoT and M2M Safety and Security
 

Recently uploaded

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Recently uploaded (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Four keys to securing distributed control systems and the industrial (IoT)

  • 1. Your systems. Working as one. Four Keys to Securing Distributed Control Systems and the Industrial IoT David Barnett
  • 2. Agenda • Industrial Internet of Things • Four Keys to IIoT Security • Data Distribution Service • Example: Securing the Power Grid • Next Steps • Q&A 2014-Nov-13 © 2014 RTI 2
  • 3. Industrial Internet of Things (IIoT) 2014-Nov-13 © 2014 RTI 3
  • 4. IIoT Systems Are Distributed HMI/UI IT, Cloud & SoS Connectivity Sensors Actuators Streaming Analytics & Control 2014-Nov-13 © 2014 RTI 4
  • 5. IIoT Systems Are Distributed 2014-Nov-13 © 2014 RTI 5
  • 6. Unit DataBus Unit DataBus Example Intelligent Industrial Internet Intelligent Systems Intelligent Machines Cloud Enterprise LAN Intelligent System of Systems Unit LAN Segment Think HMI Intra-machine Think HMI Think HMI Intra-machine Sense Intra-machine Act Sense Act 2014-Nov-13 © 2014 RTI 6
  • 7. IIoT Unique Requirements • Real-time performance • Safety • Security 2014-Nov-13 © 2014 RTI 7
  • 8. Four Keys to Securing the IIoT
  • 10. Consumer Internet of Things Centralized, Hub and Spoke Information Technology Systems Premises or Cloud 2014-Nov-13 © 2014 RTI 10
  • 11. Consumer IoT and Traditional IT • Limited scalability and performance • Centralized ESB, Message Broker or Server • E.g.: MQTT, XMPP, AMQP, CoAP, Web Services – Intermediary = poor latency and determinism – Centralized broker/server is bottleneck and choke point – Expensive to scale: need more servers – Capacity constrained by individual links and switch ports • Poor robustness – Single point of failure/failover – Tied to server maintenance and failures – Single point of vulnerability • Lessens capabilities and utility – Single centralized “brain” – No autonomy or intelligence at the edge 2014-Nov-13 © 2014 RTI 11
  • 12. IIoT Needs Analytics & Control at the Edge IT/Cloud • Lower latency control for faster response • Highly resilient, no single point of failure • Analyze orders of magnitude more data 2014-Nov-13 © 2014 RTI 12
  • 14. Can’t Rely on Physical Security or Limited Access Unit DataBus Unit DataBus Cloud Enterprise LAN Unit LAN Segment Think HMI Sense Intra-machine Act 2014-Nov-13 © 2014 RTI 14
  • 15. Q4 2013 Reported Cyber Incidents to U.S. Critical Infrastructure http://ics-cert.us-cert.gov/monitors/ICS-MM201312 2014-Nov-13 © 2014 RTI 15
  • 16. Threats 2014-Nov-13 © 2014 RTI 16
  • 17. Threats Alice: Allowed to publish topic T Bob: Allowed to subscribe to topic T Eve: Non-authorized eavesdropper Trudy: Intruder Trent: Trusted infrastructure service Mallory: Malicious insider 1. Unauthorized subscription 2. Unauthorized publication 3. Tampering and replay 4. Unauthorized access to data by infrastructure services 2014-Nov-13 © 2014 RTI 17
  • 18. #3: No Dependence on TCP or Transport Layer Security
  • 19. Problems with TCP and IP • TCP – No control over latency – No multicast: inefficient onemany and manymany communication – Requires reliable network with reasonable bandwidth • IP can also be inefficient… – Over very low bandwidth networks(e.g., satellite) – Over high speed interconnects (e.g., shared memory and RDMA) 2014-Nov-13 © 2014 RTI 19
  • 20. Transport Layer Security (TLS/SSL) 1. Authenticate – Verify identity 2. Securely exchange cryptographic keys 3. Use keys to: – Encrypt data – Add a message authentication code App 1 App 2 2014-Nov-13 © 2014 RTI 20
  • 21. Limitations of Transport Security: No Inherent Access Control • You’re authenticated or you’re not • Less an issue for centralized systems – E.g.: non-real-time IT and consumer IoT systems – Broker centrally manages access control App App App Device Message Broker Device Device • Poor performance and scalability • Single point of failure/failover 2014-Nov-13 © 2014 RTI 21
  • 22. Limitations of Transport Security: Overall Poor Performance and Scalability • No multicast support (even with DTLS over UDP) – Broad data distribution is very inefficient • Usually runs over TCP: poor latency and jitter • Requires a network robust enough to support IP and TCP • All data treated as reliable – Even fast changing data that could be “best effort” • Always encrypts all data, metadata and protocol headers – Even if some data does not have to be private • Security is at a very gross level 2014-Nov-13 © 2014 RTI 22
  • 23. #4: Interoperability (Open Architecture)
  • 24. Need for Interoperability • IIoT systems typically composed of components from many suppliers • IIoT systems have long lifecycles – Interoperability enables modularity
  • 28. Traditional Approach • Hard coded connections • Up to O(n2) • Complex • Hard to maintain, evolve, re-use E.g., sockets, RPC 2014-Nov-13 © 2014 RTI 28
  • 29. Result Time & cost of integration, maintenance and upgrades System Scale and Age O(n2) 2014-Nov-13 © 2014 RTI 29
  • 31. Key: Interoperability Well-defined: • Interfaces • Semantics 2014-Nov-13 © 2014 RTI 31
  • 32. Data Distribution Service Designed for the Industrial Internet of Things
  • 33. For loose coupling, provides: • Discovery • Routing • High-availability • QoS enforcement • Well-define interfaces • Standard interoperability Protocol Data Distribution Service 2014-Nov-13 © 2014 RTI 33
  • 34. DDS Standard • Interoperability and portability – Data model specification and discovery – Network protocol – Programming interface • Managed by Object Management Group (OMG) Cross-vendor source portability Standard API Data Model DDS Implementation Standard Protocol Cross-vendor interoperability 2014-Nov-13 © 2014 RTI 34
  • 35. Peer-to-Peer Communication DDS-RTPS Wire Interoperability Protocol • Completely decentralized • No intermediate servers, message brokers or ESB • Low latency • High scalability • No single point of failure App or Component DDS Library App or Component DDS Library DDS API 2014-Nov-13 © 2014 RTI 35
  • 36. Easy Integration of Existing Components Unmodified App Adapter DDS Routing Service DDS-RTPS Wire Interoperability Protocol Unmodified App Adapter DDS Routing Service App or Component DDS Library App or Component DDS Library DDS or other protocol DDS API New and Updated Applications Existing, Unmodified Applications 2014-Nov-13 © 2014 RTI 36
  • 37. Seamless Sensor-to-Cloud Connectivity Connect Everything, Everywhere Data Distribution Service Seamless data sharing regardless of: • Proximity • Platform • Language • Physical network • Transport protocol • Network topology 2014-Nov-13 © 2014 RTI 37
  • 38. Example: RTI Connext Availability • Programming languages and environments – C, C++, C#/.NET, Java, Ada – Lua, Python – LabVIEW, MATLAB, Simulink, UML – REST/HTTP • Operating systems – Windows, Linux, Unix, Mac OS – Mobile – Embedded, real time – Safety critical, partitioned • Processor families – x86, ARM, PowerPC… – 32- and 64-bit • Transport types – Shared memory – LAN (incl. multicast) – WAN / Internet – Wireless – Low bandwidth 2014-Nov-13 © 2014 RTI 38
  • 39. Foundation: Publish/Subscribe Data Distribution Service Commands Control App Sensor Data Sensor Sensor Data Display App Sensor Actuator 2014-Nov-13 © 2014 RTI 39
  • 40. Support for Mission-Critical Systems • Autonomous operation – Automatic discovery – No sys admin or centralized infrastructure • Non-stop: no single point of failure • QoS control and visibility into real-time behavior, system health • Embeddable • Proven in 100,000s of deployed devices 2014-Nov-13 © 2014 RTI 40
  • 41. DDS Security • Security extensions to DDS standard • Requires trivial or no change to existing DDS apps and adapters • Runs over any transport – Including low bandwidth, unreliable – Does not require TCP or IP – Multicast for scalability, low latency • Plugin architecture – Built-in defaults – Customizable via standard API • Completely decentralized – High performance and scalability – No single point of failure Secure DDS library Authentication Access Control Encryption Data Tagging Logging Application Any Transport (e.g., TCP, UDP, multicast, shared memory, satellite) 2014-Nov-13 © 2014 RTI 41
  • 43. Standard Capabilities Authentication  X.509 Public Key Infrastructure (PKI) with a pre-configured shared Certificate Authority (CA)  Digital Signature Algorithm (DSA) with Diffie-Hellman and RSA for authentication and key exchange Access Control  Specified via permissions file signed by shared CA  Control over ability to join systems, read or write data topics Cryptography  Protected key distribution  AES128 and AES256 for encryption  HMAC-SHA1 and HMAC-SHA256 for message authentication and integrity Data Tagging  Tags specify security metadata, such as classification level  Can be used to determine access privileges (via plugin) Logging  Log security events to a file or distribute securely over Connext DDS 2014-Nov-13 © 2014 RTI 43
  • 44. Protections Protected Objects Domain (by domain_id) Topic (by Topic name) DataObjects (by Instance/Key) Protected Operations Domain.join Topic.create Topic.read (includes QoS) Topic.write (includes QoS) Data.createInstance Data.writeInstance Data.deleteInstance 2014-Nov-13 © 2014 RTI 44
  • 45. Control over Encryption • Scope – Discovery data – Metadata – Data • For each: – Encrypt – Sign • Optimizes performance by only encrypting data that must be private 2014-Nov-13 © 2014 RTI 45
  • 46. Example Domain Governance 2014-Nov-13 © 2014 RTI 46
  • 48. DDS Security Status • Standard adopted March 2014 • Considered “Beta” for 1 year • RTI chairing Finalization Task Force • Available now from RTI 2014-Nov-13 © 2014 RTI 48
  • 49. Security Example: Power Grid In Partnership with PNNL © 2014 RTI
  • 50. Data Security Requirements Data Item Authentica-tion Access Control Integrity Non-repudiation Confidentiality Control traffic X X X X X Data X X Telemetry traffic Physical Security Data X X X Engineering maintenance X Source: www.sxc.hu 2014-Nov-13 © 2014 RTI 50
  • 51. Test Environment • Real World Environment – Transmission switching substation – Real substation equipment • PNNL powerNET Testbed – Remote connectivity – Local control room demonstration environment – Dynamically reconfigurable 2014-Nov-13 © 2014 RTI 51
  • 52. SCADA Equipment Setup 2014-Nov-13 © 2014 RTI 52
  • 53. RTI and PNNL Grid Security Retrofit Control Station DNP3 Master Device Transmission Substation DNP3 Slave Device RTI Routing Service Gateway RTI Routing Service ComProcessor DNP3 Slave Device DNP3 over Ethernet DNP3 over DDS DNP3 over RS232/485 RTI Routing Service Gateway DDS LAN DDS LAN RTI Routing Service ComProcessor IP Router IP Router DDS over WAN Attack Detector Scada Converter Anomaly Detector Secure DDS over UDP Display Effective DNP3 connection Details at http://blogs.rti.com 2014-Nov-13 © 2014 RTI 53
  • 54. About RTI • Market Leader – 1,000+ projects use Connext DDS – Over 70% DDS middleware market share1 – Largest embedded middleware vendor2 – 2013 Gartner Cool Vendor for technology and Open Community Source model • Standards Leader – Active in 15 standards efforts – DDS authors, chair, wire spec, security, more – IIC steering committee; OMG board • Team Quality Leader – Stanford research pedigree – High-performance, control, systems experts – Top quality product, processes, execution © 2014 RTI 1Embedded Market Forecasters 2VDC Analyst Report 2014-Nov-13 54
  • 55. IIoT Infrastructure Trusts RTI • World’s largest Wind Power company • World’s largest Underground Mining Equipment company • World’s largest Navy (all surface ships) • World’s largest Automotive company • World’s largest Emergency Medical System company • World’s largest Medical Imaging provider • World’s 2nd largest Patient Monitoring manufacturer • World’s 2nd largest Air Traffic control system • World’s largest Broadcast Video Equipment manufacturer • World’s largest Launch Control System • World’s largest Telescope (under construction) • World’s 5th-largest Oil & Gas company • World’s 6th-largest power plant (largest in US) • All of world’s top ten defense companies RTI designed into over $1 trillion 2014-Nov-13 © 2014 RTI 55
  • 56. RTI Named Most Influential IIoT Company 2014-Nov-13 © 2014 RTI 56
  • 57. Four Keys to Securing the IIoT • Decentralized architecture • Access control • No dependence on TCP or Transport Security • Interoperability (Open Architecture) 2014-Nov-13 © 2014 RTI 57
  • 58. Next Steps – Learn More • Contact RTI – Demo, Q&A • Download software – www.rti.com/downloads – Free trial with comprehensive tutorial – RTI Shapes Demo • Watch videos & webinars, read whitepapers – www.rti.com/resources – www.youtube.com/realtimeinnovatio ns 2014-Nov-13 © 2014 RTI 58
  • 59. dds.omg.org www.rti.com community.rti.com demo.rti.com www.youtube.com/realtimeinnovations blogs.rti.com www.twitter.com/RealTimeInnov www.facebook.com/RTIsoftware www.omg.org www.slideshare.net/GerardoPardo www.slideshare.net/RealTimeInnovations 2014-Nov-13 © 2014 RTI 59