Industrial Internet of Things: Protocols and
Standards
Javier Povedano Molina, PhD. <javier@rti.com>
Senior Software Engineer
©2018 Real-Time Innovations, Inc.
Ask me
Anything
At any time during the
presentation
©2017 Real-Time Innovations, Inc.
Recognized Industrial IoT Leader
©2016 Real-Time Innovations, Inc.
©2018 Real-Time Innovations, Inc.
What is the
Industrial
Internet of Things?
©2016 Real-Time Innovations, Inc.
©2015 Real-Time Innovations, Inc.
#oktoberfestofthings
The Industrial IoT is about Systems
©2016 Real-Time Innovations, Inc.
Consumer Internet of Things (CIoT) Industrial Internet of Things (IIoT)
Cyber-Physical Systems (CPS)
80% of hype 80% of value
IIoT vs HIoT
Industrial Internet of things
Industrial Internet of Things is Everywhere
Industrial IoT is disrupting entire industries
©2016 Real-Time Innovations, Inc.
Disrupting Energy
Industry
Disrupting Medical
Industry
Disrupting
Transportation
Industry
Medical and HealthCare
Patient Monitoring:
Can NASA-inspired
Command Centers
help the hospital of
the future? This
hospital thinks so [2]
Connected Medical
Devices
Image: source
Transportation
Hyperloop:
Planes, Trains and Hyperloops:
The Importance of Connectivity
in the IIoT (video)
Autonomous Cars:
Whitepaper: DDS in Autonomous
Car Design
Accelerate Autonomous Car
Development
Energy
● Siemens Wind Power
○ IT integration for maintenance
● LocalGrid
○ Monitor and control
● Grand Coulee Dam
○ Largest Electricity Producer
○ in US
● Green Energy IIC Testbed
©2018 Real-Time Innovations, Inc.
It's all about
Standards
Object Management Group (OMG)
● The authors of CORBA and UML
○ standards
● Focused in Interoperability
● DDS Standards family
○ DDS 1.2 (API)
○ RTPS 2.1 (Wire prototocol)
○ X-Types (Extensibility)
○ WEB-DDS
○ PSM (C++, Java)
○ Security
○ RPC
Industrial Internet Consortium (IIC)
IIC Connectivity Framework
http://www.iiconsortium.org/IICF.htm
IIC Connectivity Framework
http://www.iiconsortium.org/IICF.htm
Industry 4.0
● German Government Initiative
● Focused on manufacturing
Smart Factory = Cyber Physical Systems + Cloud Computing + IoT
AUTOSAR
AUTOSAR (AUTomotive Open System ARchitecture) is a
worldwide development partnership of vehicle manufacturers,
suppliers, service providers and companies from the automotive
electronics, semiconductor and software industry.
> 100 partners including
• Core Partners: BMW, Bosch, Continental, Daimler, Ford, GM,
PSA, Toyota, and VW.
• RTI joined as a Development Partner in 2017
https://www.autosar.org/
AUTOSAR Standards
Classic Platform
• Defines a solution for embedded systems with hard real-time and safety constraints.
Adaptive Platform
Defines a solution for high-performance computing ECUs to build fail-operational systems for use cases such as
autonomous driving.
Implements the AUTOSAR Runtime for Adaptive Applications (ARA)
Characteristics
• Uses C++
• Defines a Service-oriented Architecture
• Leverages existing standards
• Focuses on safety and security
• Defined in terms of functional clusters (see next slides)
Adaptive AUTOSAR
Open FMB
● Standard for Grid Control
● COW (+25)
©2018 Real-Time Innovations, Inc.
Protocols for the
Industrial Internet
CoAP
● COnstrained Application Protocol
● Web of Things
○ REST model for small devices
● Pull model
● RFC7252
● http://coap.technology/
Source: openmobilealliance.org
AMQP
● Advanced Message Queuing
Protocol
● Wire-level protocol
○ Multiple Interfaces
● One to One and One To Many
● Broker based
● Message centric
● Implementations:
○ RabbitMQ, ActiveMQ, Apache
QPid
2014 © Real-Time Innovations Inc.
XMPP: Access Device Data
© 2014 Real-Time Innovations, Inc.
Extensible Messaging and Presence Protocol (XMPP)
JMS
● Java Messaging Service
● API
● Broker based
● Message centric
● Implementations:
○ Websphere, ActiveMQ,...
MQTT: Collect Device Data
© 2014 Real-Time Innovations, Inc.
Message Queuing Telemetry Transport (MQTT)
● Brokered
● Lightweight
● Wire protocol
● Implementations:
○ paho, mosquitto, ...
Data Distribution Service
● Data Centric Approach
● Fully distributed Architecture
● Advanced QoS
● Stantard
○ Both Wire-protocol and API
● Implementations:
○ Connext, Vortex OpenSplice, OpenDDS, CoreDX
Pub/Sub Protocol Comparison
AMQP JMS MQTT DDS
Architecture Broker Broker Broker Descentralized
Type Topic Topic Topic Content/Type
Standard API N Y N Y
Standard Wire Y N Y Y
Transport TCP TCP TCP UDP*
QoS Y(3) Y(4) Y(3) Y (20*)
Standard Payload
Format
N N N CDR
Filtering Content Content N Content/Time
...so which one to use?
IT DEPENDS!
2014 © Real-Time Innovations Inc.
Choose AMQP If…
• Distributing work, not information?
• Just send A to B?
• Speed & CPU use not important?
• Can’t lose anything?
• 3 or 4 => AMQP
© 2014 Real-Time Innovations, Inc.
Process: AMQP
2014 © Real-Time Innovations Inc.
Choose MQTT If…
• Think of it as collection?
• Little device-device communications?
• Large number of devices?
• Very small devices?
• 3 or 4 => MQTT
© 2014 Real-Time Innovations, Inc.
Collect:
MQTT, CoAP
2014 © Real-Time Innovations Inc.
Choose XMPP/REST If…
• Use the word “my”?
• Few connectivity points in large space?
• Speed & CPU use not important?
• “Always” connected?
• 3 or 4 => XMPP or REST
© 2014 Real-Time Innovations, Inc.
2014 © Real-Time Innovations Inc.
Choose DDS If…
• Disaster if offline for 5 minutes?
• Measure performance in ms or us? Or scale >100+
applications? Or 10k+ data values?
• Code actively developed for >3 yrs?
• 2 or 3 => DDS
© 2014 Real-Time Innovations, Inc.
Control: DDS
2014 © Real-Time Innovations Inc.
There is strength in numbers
• IIoT will need many protocols
– Server to Server: MQ, AMQP, SOAP,...
– Device to Server: MQTT, CoAP
– Device to Device: DDS
– Control Plane: Melting pot
• An example:
– MQTT to collect device information
– DDS shares device data to build intelligent system
– AMQP messages between servers
2014 © Real-Time Innovations Inc.
DDS & IoT
• Access
– Link sparse endpoints
– XMPP
• Process
– Biz intelligence
– Centralized/ESB
– ~100ms
– MQ/AMQP
• Collect
– Collect data
– Hub & spoke
– ~10ms
– MQTT/CoAP
• Control, distribute
– DataBus
– ~.01ms
– DDS
Devices and Intelligent Systems
Web services and Bussiness aps
Control
Collect
ProcessAccess
2014 © Real-Time Innovations Inc.
Protocol Collaboration
2014 © Real-Time Innovations Inc.
Many Others
© 2014 Real-Time Innovations, Inc.
©2018 Real-Time Innovations, Inc.
DDS:
A real-time
connectivity platform
Data Distribution Service is a Databus
©2018 Real-Time Innovations, Inc.
Application
Application
Message centric
Client/Server
Remote Objects
Publish-subscribe
SOA
DDS is the standard
that defines a databus
Application
Application
Data
Data-centric technology
connects applications to
the data, not to each other
The Databus is Different!
©2018 Real-Time Innovations, Inc.
Data-Centric
DDS
Shared Data Model
DataBus
Point-to-Point
TCP
Sockets
Client/Server
MQTT
XMPP
OPC
CORBA
Brokered
ESB
Daemon
Publish/Subscribe
Fieldbus
CANbus
ZeroMQ
JMS
Queuing
AMQP
Active MQ
Architecture
Database and Databus are Data Centric
• Common “truth” for integration
• Natural redundancy
• Right data, right time, right place
• Complexity in infrastructure, not code
• No startup dependencies
• Generic tools and analyzers
©2018 Real-Time Innovations, Inc.
Database Databus
Stores & searches old data Seeks & filters future data
Why Data Centricity?
Data Distribution Service
● Object Management Group
Standards
● Data Distribution Service (DDS)
○ API
○ QoS
● Real-Time Publish Subscribe (RTPS)
○ Data encoding
○ Interaction Protocol
○ On the Wire Format
● Extensions:
○ XTypes
○ Security
©2018 Real-Time Innovations, Inc.
Connectivity Gateway
Database Integration
Service
Persistence Service
Visualization
& Debug
Tools
Recording &
Playback
Services
Application
Prototyper
Data
Modeling
Tools
Connectivity
SDKs
(C, C++, Java, .NET,
Javascript, Python …)
Tools &
SDKs
Connectivity
Services
Quality
of
Service
Security
Publish-Subscribe Request-Reply Discovery
ID and Addressing
Data Type
System
Lifecycle (CRUD)
Exception Handling
State
Management
API Governance
Databus
DDS-RTPS Messaging Protocol
Data Resource Model
Cloud Services
Sensing
Planning
Radar, LIDAR Vehicle Platform Navigation
Error
Management
Cockpit/Dashboard
Situation Analysis
Situation Awareness
Vision Fusion
Cameras, LIDAR,
Radar
…
Data Fusion
LoggingVehicle Control
Localization
Connext Databus
Traffic Maps
Connext Databus
Example: Autonomous Car
DDS Quality of Service (QoS)
Quality of Service Quality of service
DURABILITY USER_DATA
HISTORY TOPIC_DATA
READER DATA LIFECYCLE GROUP_DATA
WRITER DATA LIFECYCLE PARTITION
LIFESPAN PRESENTATION
ENTITY FACTORY DESTINATION ORDER
RESOURCE LIMITS OWNERSHIP
RELIABILITY OWNERSHIP STRENGTH
TIME BASED FILTER LIVELINESS
DEADLINE LATENCY BUDGET
CONTENT FILTERS TRANSPORT PRIORITY
VolatilityInfrastructureDelivery
UserPresentationRedundancyTransport
QoS Example: Reliable alarms/events
Quality of Service Quality of service
DURABILITY USER_DATA
HISTORY TOPIC_DATA
READER DATA LIFECYCLE GROUP_DATA
WRITER DATA LIFECYCLE PARTITION
LIFESPAN PRESENTATION
ENTITY FACTORY DESTINATION ORDER
RESOURCE LIMITS OWNERSHIP
RELIABILITY OWNERSHIP STRENGTH
TIME BASED FILTER LIVELINESS
DEADLINE LATENCY BUDGET
CONTENT FILTERS TRANSPORT PRIORITY
VolatilityInfrastructureDelivery
UserPresentationRedundancyTransport
QoS Example: Data Redundancy
Quality of Service Quality of service
DURABILITY USER_DATA
HISTORY TOPIC_DATA
READER DATA LIFECYCLE GROUP_DATA
WRITER DATA LIFECYCLE PARTITION
LIFESPAN PRESENTATION
ENTITY FACTORY DESTINATION ORDER
RESOURCE LIMITS OWNERSHIP
RELIABILITY OWNERSHIP STRENGTH
TIME BASED FILTER LIVELINESS
DEADLINE LATENCY BUDGET
CONTENT FILTERS TRANSPORT PRIORITY
VolatilityInfrastructureDelivery
UserPresentationRedundancyTransport
©2018 Real-Time Innovations, Inc.
Security in IIoT
Security Topologies
System
Transport
Host/Application
Data
©2017 Real-Time Innovations, Inc
Threats
Alice: Allowed to publish topic T
Bob: Allowed to subscribe to topic T
Eve: Non-authorized eavesdropper
Trudy: Intruder
Trent: Trusted infrastructure service
Mallory: Malicious insider
1. Unauthorized subscription
2. Unauthorized publication
3. Tampering and replay
4. Unauthorized access to data by
infrastructure services
App 2
Limitations of TLS: Security Is at a Very Gross Level
•Inefficient: all data is encrypted and signed
– Application data and metadata
– Regardless of whether privacy and/or integrity are required
•Poor latency and jitter: usually runs over TCP
•Not scalable: no multicast support
– Even with DTLS over UDP
App 1
Limitations of TLS: No Inherent Access Control
• Apps are authenticated or they’re not
• No inherent protection against insider threats
– E.g.: authorized subscriber but unauthorized publisher
• Access control has to be done by centralized broker or at application
level
Device
App App App
Device Device
Message Broker
• Poor performance and
scalability
• Single point of
failure/failover
• Single point of
vulnerability
The Alarm Limit is attacked. A
hacker compromises a device and
makes it change the alarm limits for
the entire system. Devices are
allowed to read this, but should not
write it.
RTI Connext Databus
Sensor Device(s)
Supervisor
Numeric
Image
AlarmLimit
Numeric
Image
AlarmLimit
Transport-Level Security
63
RTI Connext Databus
Compromised Sensor
Device
Supervisor
Numeric
Image
AlarmLimit
Numeric
Image
AlarmLimit
Transport-level security does
not prevent an insider from
attacking, writing data it
should not be allowed to
modify.
AlarmLimit
Transport-Level Security
64
RTI Connext Databus
Compromised Sensor
Device
Supervisor
Numeric
Image
AlarmLimit
Numeric
Image
AlarmLimit
AlarmLimitDDS security contains
fine-grained permissions that
prevent an application from
writing (or reading) something
it is not entitled to.
DDS Security: Access Control
65
DDS Secures the Data, Not the Pipe
DDS Domain
Line Flight Dest Arv
UA 567 SFO 7:32
AA 432 LAX 9:15
Squawk Long Lat Alt
1234 37.4 -122.0 500.0
7654 40.7 -74.0 250.0
Squawk Line Flight
1234 UA 567
7654 AA 432
Topi
c
©2018 Real-Time Innovations, Inc.
The Developer
Tools
and Processes
A whirlwind tour
©2017 Real-Time Innovations, Inc. Confidential.
Coding Standards and Practices
SEI CERT Coding Standards
● Coding Rules and
Conventions
○ MISRA
● Certifications
©2018 Real-Time Innovations, Inc. Confidential.
Developer Tools
• Code Coverage
– In some industries it is required 100% coverage!
– LCov
• Static Analysis
– Clang
• Memory Tools
– Valgrind
©2018 Real-Time Innovations, Inc.
Vulnerability
Management
Process
Vulnerability Management process
•What is considered a vulnerability?
•How do catalog vulnerabilities in your bug management system?
•What should you pay attention to when fixing vulnerabilities and
who should be involved in the code reviews?
•Where and how do you document vulnerabilities?
•How do you communicate the information both internally and
externally?
•How do you set up secure channels to receive and discuss
vulnerability reports?
©2018 Real-Time Innovations, Inc. Confidential.
“It's important to understand that the
definition isn't the final word on whether
an issue warrants a security bulletin —
instead, it's the first word.”
- Microsoft
©2018 Real-Time Innovations, Inc. Confidential.
TLP –
Traffic
Light
Protocol
Critical infrastructure requires more discreet
management of vulnerabilities
©2018 Real-Time Innovations, Inc. Confidential.
©2018 Real-Time Innovations, Inc
©2018 Real-Time Innovations, Inc.
We’re hiring
software engineers
in Granada
https://www.rti.com/careers
©2018 Real-Time Innovations, Inc. Confidential.

Industrial Internet of Things: Protocols an Standards

  • 1.
    Industrial Internet ofThings: Protocols and Standards Javier Povedano Molina, PhD. <javier@rti.com> Senior Software Engineer
  • 2.
    ©2018 Real-Time Innovations,Inc. Ask me Anything At any time during the presentation
  • 3.
  • 4.
    Recognized Industrial IoTLeader ©2016 Real-Time Innovations, Inc.
  • 6.
    ©2018 Real-Time Innovations,Inc. What is the Industrial Internet of Things?
  • 7.
  • 8.
    ©2015 Real-Time Innovations,Inc. #oktoberfestofthings
  • 9.
    The Industrial IoTis about Systems ©2016 Real-Time Innovations, Inc. Consumer Internet of Things (CIoT) Industrial Internet of Things (IIoT) Cyber-Physical Systems (CPS) 80% of hype 80% of value
  • 11.
  • 12.
  • 13.
    Industrial Internet ofThings is Everywhere
  • 14.
    Industrial IoT isdisrupting entire industries ©2016 Real-Time Innovations, Inc. Disrupting Energy Industry Disrupting Medical Industry Disrupting Transportation Industry
  • 15.
    Medical and HealthCare PatientMonitoring: Can NASA-inspired Command Centers help the hospital of the future? This hospital thinks so [2] Connected Medical Devices Image: source
  • 16.
    Transportation Hyperloop: Planes, Trains andHyperloops: The Importance of Connectivity in the IIoT (video) Autonomous Cars: Whitepaper: DDS in Autonomous Car Design Accelerate Autonomous Car Development
  • 17.
    Energy ● Siemens WindPower ○ IT integration for maintenance ● LocalGrid ○ Monitor and control ● Grand Coulee Dam ○ Largest Electricity Producer ○ in US ● Green Energy IIC Testbed
  • 18.
    ©2018 Real-Time Innovations,Inc. It's all about Standards
  • 21.
    Object Management Group(OMG) ● The authors of CORBA and UML ○ standards ● Focused in Interoperability ● DDS Standards family ○ DDS 1.2 (API) ○ RTPS 2.1 (Wire prototocol) ○ X-Types (Extensibility) ○ WEB-DDS ○ PSM (C++, Java) ○ Security ○ RPC
  • 22.
  • 23.
  • 24.
  • 25.
    Industry 4.0 ● GermanGovernment Initiative ● Focused on manufacturing Smart Factory = Cyber Physical Systems + Cloud Computing + IoT
  • 26.
    AUTOSAR AUTOSAR (AUTomotive OpenSystem ARchitecture) is a worldwide development partnership of vehicle manufacturers, suppliers, service providers and companies from the automotive electronics, semiconductor and software industry. > 100 partners including • Core Partners: BMW, Bosch, Continental, Daimler, Ford, GM, PSA, Toyota, and VW. • RTI joined as a Development Partner in 2017 https://www.autosar.org/
  • 27.
    AUTOSAR Standards Classic Platform •Defines a solution for embedded systems with hard real-time and safety constraints. Adaptive Platform Defines a solution for high-performance computing ECUs to build fail-operational systems for use cases such as autonomous driving. Implements the AUTOSAR Runtime for Adaptive Applications (ARA) Characteristics • Uses C++ • Defines a Service-oriented Architecture • Leverages existing standards • Focuses on safety and security • Defined in terms of functional clusters (see next slides)
  • 28.
  • 29.
    Open FMB ● Standardfor Grid Control ● COW (+25)
  • 30.
    ©2018 Real-Time Innovations,Inc. Protocols for the Industrial Internet
  • 31.
    CoAP ● COnstrained ApplicationProtocol ● Web of Things ○ REST model for small devices ● Pull model ● RFC7252 ● http://coap.technology/ Source: openmobilealliance.org
  • 32.
    AMQP ● Advanced MessageQueuing Protocol ● Wire-level protocol ○ Multiple Interfaces ● One to One and One To Many ● Broker based ● Message centric ● Implementations: ○ RabbitMQ, ActiveMQ, Apache QPid
  • 33.
    2014 © Real-TimeInnovations Inc. XMPP: Access Device Data © 2014 Real-Time Innovations, Inc. Extensible Messaging and Presence Protocol (XMPP)
  • 34.
    JMS ● Java MessagingService ● API ● Broker based ● Message centric ● Implementations: ○ Websphere, ActiveMQ,...
  • 35.
    MQTT: Collect DeviceData © 2014 Real-Time Innovations, Inc. Message Queuing Telemetry Transport (MQTT) ● Brokered ● Lightweight ● Wire protocol ● Implementations: ○ paho, mosquitto, ...
  • 36.
    Data Distribution Service ●Data Centric Approach ● Fully distributed Architecture ● Advanced QoS ● Stantard ○ Both Wire-protocol and API ● Implementations: ○ Connext, Vortex OpenSplice, OpenDDS, CoreDX
  • 37.
    Pub/Sub Protocol Comparison AMQPJMS MQTT DDS Architecture Broker Broker Broker Descentralized Type Topic Topic Topic Content/Type Standard API N Y N Y Standard Wire Y N Y Y Transport TCP TCP TCP UDP* QoS Y(3) Y(4) Y(3) Y (20*) Standard Payload Format N N N CDR Filtering Content Content N Content/Time
  • 38.
    ...so which oneto use? IT DEPENDS!
  • 39.
    2014 © Real-TimeInnovations Inc. Choose AMQP If… • Distributing work, not information? • Just send A to B? • Speed & CPU use not important? • Can’t lose anything? • 3 or 4 => AMQP © 2014 Real-Time Innovations, Inc. Process: AMQP
  • 40.
    2014 © Real-TimeInnovations Inc. Choose MQTT If… • Think of it as collection? • Little device-device communications? • Large number of devices? • Very small devices? • 3 or 4 => MQTT © 2014 Real-Time Innovations, Inc. Collect: MQTT, CoAP
  • 41.
    2014 © Real-TimeInnovations Inc. Choose XMPP/REST If… • Use the word “my”? • Few connectivity points in large space? • Speed & CPU use not important? • “Always” connected? • 3 or 4 => XMPP or REST © 2014 Real-Time Innovations, Inc.
  • 42.
    2014 © Real-TimeInnovations Inc. Choose DDS If… • Disaster if offline for 5 minutes? • Measure performance in ms or us? Or scale >100+ applications? Or 10k+ data values? • Code actively developed for >3 yrs? • 2 or 3 => DDS © 2014 Real-Time Innovations, Inc. Control: DDS
  • 43.
    2014 © Real-TimeInnovations Inc. There is strength in numbers • IIoT will need many protocols – Server to Server: MQ, AMQP, SOAP,... – Device to Server: MQTT, CoAP – Device to Device: DDS – Control Plane: Melting pot • An example: – MQTT to collect device information – DDS shares device data to build intelligent system – AMQP messages between servers
  • 44.
    2014 © Real-TimeInnovations Inc. DDS & IoT • Access – Link sparse endpoints – XMPP • Process – Biz intelligence – Centralized/ESB – ~100ms – MQ/AMQP • Collect – Collect data – Hub & spoke – ~10ms – MQTT/CoAP • Control, distribute – DataBus – ~.01ms – DDS Devices and Intelligent Systems Web services and Bussiness aps Control Collect ProcessAccess
  • 45.
    2014 © Real-TimeInnovations Inc. Protocol Collaboration
  • 46.
    2014 © Real-TimeInnovations Inc. Many Others © 2014 Real-Time Innovations, Inc.
  • 47.
    ©2018 Real-Time Innovations,Inc. DDS: A real-time connectivity platform
  • 48.
    Data Distribution Serviceis a Databus ©2018 Real-Time Innovations, Inc. Application Application Message centric Client/Server Remote Objects Publish-subscribe SOA DDS is the standard that defines a databus Application Application Data Data-centric technology connects applications to the data, not to each other
  • 49.
    The Databus isDifferent! ©2018 Real-Time Innovations, Inc. Data-Centric DDS Shared Data Model DataBus Point-to-Point TCP Sockets Client/Server MQTT XMPP OPC CORBA Brokered ESB Daemon Publish/Subscribe Fieldbus CANbus ZeroMQ JMS Queuing AMQP Active MQ
  • 50.
  • 51.
    Database and Databusare Data Centric • Common “truth” for integration • Natural redundancy • Right data, right time, right place • Complexity in infrastructure, not code • No startup dependencies • Generic tools and analyzers ©2018 Real-Time Innovations, Inc. Database Databus Stores & searches old data Seeks & filters future data Why Data Centricity?
  • 52.
    Data Distribution Service ●Object Management Group Standards ● Data Distribution Service (DDS) ○ API ○ QoS ● Real-Time Publish Subscribe (RTPS) ○ Data encoding ○ Interaction Protocol ○ On the Wire Format ● Extensions: ○ XTypes ○ Security
  • 53.
    ©2018 Real-Time Innovations,Inc. Connectivity Gateway Database Integration Service Persistence Service Visualization & Debug Tools Recording & Playback Services Application Prototyper Data Modeling Tools Connectivity SDKs (C, C++, Java, .NET, Javascript, Python …) Tools & SDKs Connectivity Services Quality of Service Security Publish-Subscribe Request-Reply Discovery ID and Addressing Data Type System Lifecycle (CRUD) Exception Handling State Management API Governance Databus DDS-RTPS Messaging Protocol Data Resource Model
  • 54.
    Cloud Services Sensing Planning Radar, LIDARVehicle Platform Navigation Error Management Cockpit/Dashboard Situation Analysis Situation Awareness Vision Fusion Cameras, LIDAR, Radar … Data Fusion LoggingVehicle Control Localization Connext Databus Traffic Maps Connext Databus Example: Autonomous Car
  • 55.
    DDS Quality ofService (QoS) Quality of Service Quality of service DURABILITY USER_DATA HISTORY TOPIC_DATA READER DATA LIFECYCLE GROUP_DATA WRITER DATA LIFECYCLE PARTITION LIFESPAN PRESENTATION ENTITY FACTORY DESTINATION ORDER RESOURCE LIMITS OWNERSHIP RELIABILITY OWNERSHIP STRENGTH TIME BASED FILTER LIVELINESS DEADLINE LATENCY BUDGET CONTENT FILTERS TRANSPORT PRIORITY VolatilityInfrastructureDelivery UserPresentationRedundancyTransport
  • 56.
    QoS Example: Reliablealarms/events Quality of Service Quality of service DURABILITY USER_DATA HISTORY TOPIC_DATA READER DATA LIFECYCLE GROUP_DATA WRITER DATA LIFECYCLE PARTITION LIFESPAN PRESENTATION ENTITY FACTORY DESTINATION ORDER RESOURCE LIMITS OWNERSHIP RELIABILITY OWNERSHIP STRENGTH TIME BASED FILTER LIVELINESS DEADLINE LATENCY BUDGET CONTENT FILTERS TRANSPORT PRIORITY VolatilityInfrastructureDelivery UserPresentationRedundancyTransport
  • 57.
    QoS Example: DataRedundancy Quality of Service Quality of service DURABILITY USER_DATA HISTORY TOPIC_DATA READER DATA LIFECYCLE GROUP_DATA WRITER DATA LIFECYCLE PARTITION LIFESPAN PRESENTATION ENTITY FACTORY DESTINATION ORDER RESOURCE LIMITS OWNERSHIP RELIABILITY OWNERSHIP STRENGTH TIME BASED FILTER LIVELINESS DEADLINE LATENCY BUDGET CONTENT FILTERS TRANSPORT PRIORITY VolatilityInfrastructureDelivery UserPresentationRedundancyTransport
  • 58.
    ©2018 Real-Time Innovations,Inc. Security in IIoT
  • 59.
  • 60.
    Threats Alice: Allowed topublish topic T Bob: Allowed to subscribe to topic T Eve: Non-authorized eavesdropper Trudy: Intruder Trent: Trusted infrastructure service Mallory: Malicious insider 1. Unauthorized subscription 2. Unauthorized publication 3. Tampering and replay 4. Unauthorized access to data by infrastructure services
  • 61.
    App 2 Limitations ofTLS: Security Is at a Very Gross Level •Inefficient: all data is encrypted and signed – Application data and metadata – Regardless of whether privacy and/or integrity are required •Poor latency and jitter: usually runs over TCP •Not scalable: no multicast support – Even with DTLS over UDP App 1
  • 62.
    Limitations of TLS:No Inherent Access Control • Apps are authenticated or they’re not • No inherent protection against insider threats – E.g.: authorized subscriber but unauthorized publisher • Access control has to be done by centralized broker or at application level Device App App App Device Device Message Broker • Poor performance and scalability • Single point of failure/failover • Single point of vulnerability
  • 63.
    The Alarm Limitis attacked. A hacker compromises a device and makes it change the alarm limits for the entire system. Devices are allowed to read this, but should not write it. RTI Connext Databus Sensor Device(s) Supervisor Numeric Image AlarmLimit Numeric Image AlarmLimit Transport-Level Security 63
  • 64.
    RTI Connext Databus CompromisedSensor Device Supervisor Numeric Image AlarmLimit Numeric Image AlarmLimit Transport-level security does not prevent an insider from attacking, writing data it should not be allowed to modify. AlarmLimit Transport-Level Security 64
  • 65.
    RTI Connext Databus CompromisedSensor Device Supervisor Numeric Image AlarmLimit Numeric Image AlarmLimit AlarmLimitDDS security contains fine-grained permissions that prevent an application from writing (or reading) something it is not entitled to. DDS Security: Access Control 65
  • 66.
    DDS Secures theData, Not the Pipe DDS Domain Line Flight Dest Arv UA 567 SFO 7:32 AA 432 LAX 9:15 Squawk Long Lat Alt 1234 37.4 -122.0 500.0 7654 40.7 -74.0 250.0 Squawk Line Flight 1234 UA 567 7654 AA 432 Topi c
  • 67.
    ©2018 Real-Time Innovations,Inc. The Developer Tools and Processes A whirlwind tour
  • 68.
    ©2017 Real-Time Innovations,Inc. Confidential. Coding Standards and Practices SEI CERT Coding Standards ● Coding Rules and Conventions ○ MISRA ● Certifications
  • 69.
  • 70.
    Developer Tools • CodeCoverage – In some industries it is required 100% coverage! – LCov • Static Analysis – Clang • Memory Tools – Valgrind
  • 71.
    ©2018 Real-Time Innovations,Inc. Vulnerability Management Process
  • 72.
    Vulnerability Management process •Whatis considered a vulnerability? •How do catalog vulnerabilities in your bug management system? •What should you pay attention to when fixing vulnerabilities and who should be involved in the code reviews? •Where and how do you document vulnerabilities? •How do you communicate the information both internally and externally? •How do you set up secure channels to receive and discuss vulnerability reports? ©2018 Real-Time Innovations, Inc. Confidential.
  • 73.
    “It's important tounderstand that the definition isn't the final word on whether an issue warrants a security bulletin — instead, it's the first word.” - Microsoft
  • 74.
    ©2018 Real-Time Innovations,Inc. Confidential. TLP – Traffic Light Protocol
  • 75.
    Critical infrastructure requiresmore discreet management of vulnerabilities ©2018 Real-Time Innovations, Inc. Confidential.
  • 76.
  • 77.
    ©2018 Real-Time Innovations,Inc. We’re hiring software engineers in Granada https://www.rti.com/careers
  • 78.