Boost PC performance: How more available memory can improve productivity
Is your distributed system secure?
1.
2. The Industrial Internet of
Things is kind of a big
deal.You may have heard of it. Basically it’s
going to enable things like flying cars,
smart houses, and intelligent systems that
are actually, well… intelligent.
3. The IIoT is a massive
distributed system.
In fact, the IIoT is inherently
distributed.
10. RTI Connext DDS Secure
provides you with the power
to build real-time IIoT
systems that are Scalable,
Secure, & Reliable.
11. Connext DDS Secure runs ove
any Connext DDS transport.
UDP
TCP
Shared Memory
Even unreliable transports with low-bandwidth.
Also: multicast to support scalability and low-latency.
#winning
12. The architecture is distributed
and decentralized.
translation: high-performance and no
single points of failure
Connext DDS DataBus
13. And using the SDK, you
can build your own plug-ins.
Read: customizable and allows for integration with
your existing security infrastructure.
Connext DDS
Library
Authentication
Access Control
Encryption
Data Tagging
Logging
Application
Transport
SECURITYPLUG-INS
15. RTI Connext DDS Secure: Standard Capabilities
Authentication
– X.509 Public Key Infrastructure
(PKI) with a pre-configured shared
Certificate Authority (CA)
– Digital Signature Algorithm (DSA)
with Diffie-Hellman and RSA for
authentication and key exchange
Access Control
– Specifications via permissions file
signed by shared CA
– Control over ability to join DDS
Domains and Partitions, read or
write Topics
– Control on individual objects and
Quality of Service (QoS) via
plugins
Cryptography
– Protected key distribution
– AES128 and AES256 for
encryption
– HMAC-SHA1 and HMAC-SHA256
for message authentication and
integrity
Data Tagging
– Used to specify security metadata,
such as classification level
– Sent during endpoint discovery
– Can be used to determine access
privileges (via plugin)
Logging
– Log security events to a local file
or distribute securely over
Connext DDS
16. RTI Connext DDS Secure: Features & Benefits
• Provides authentication, authorization, non-repudiation, confidentiality
and integrity
• Protects discovery information, metadata and data
• Defends against unauthorized access, tampering and replay
• Operates without centralized servers for high performance, scalability and
availability
• Runs over any transport including TCP, UDP, multicast and shared memory
• Integrates with existing security infrastructures and hardware acceleration
• Secures unmodified existing DDS applications