23
Data Centric Security for the Industrial IoT Stan Schneider, RTI CEO IIC Steering Committee Member

Embedded Security and the IoT – Challenges, Trends and Solutions

Embed Size (px)

Citation preview

Page 1: Embedded Security and the IoT – Challenges, Trends and Solutions

Data Centric Security for the Industrial IoT

Stan Schneider, RTI CEO

IIC Steering Committee Member

Page 2: Embedded Security and the IoT – Challenges, Trends and Solutions

The smart machine era will be the most disruptive in the history of IT-- Gartner 2015

Page 3: Embedded Security and the IoT – Challenges, Trends and Solutions

The Industrial Internet of Things

Industrial Internet of Things (IIoT)

Consumer Internet of Things (CIoT)

Cyber-Physical Systems (CPS)

Page 4: Embedded Security and the IoT – Challenges, Trends and Solutions
Page 5: Embedded Security and the IoT – Challenges, Trends and Solutions

The Industrial Internet Consortium

• Goal: Interoperability for the IIoT• 159+ companies!• RTI role

– Steering committee, data management (co-lead), architecture, security (co-lead), use case (co-lead), marketing

– Lead or co-lead 4 testbed teams

Page 6: Embedded Security and the IoT – Challenges, Trends and Solutions

RTI Named Most Influential IIoT Company

Page 7: Embedded Security and the IoT – Challenges, Trends and Solutions

RTI’s Experience

• ~800 Designs– Healthcare– Transportation– Communications– Energy– Industrial– Defense

• 15+ Standards & Consortia Efforts

Page 8: Embedded Security and the IoT – Challenges, Trends and Solutions

Why Choose DDS?

• Reliability: Severe consequences if offline for 5 minutes?

• Performance/scale:

– Measure in ms or µs?

– Or scale > 20+ applications or 10+ teams?

– Or 10k+ data values?

• Architecture: Code active lifetime >3 yrs?

2 or 3 Checks?

Page 9: Embedded Security and the IoT – Challenges, Trends and Solutions

DDS is Different!

Point-to-Point

TCP Sockets

Publish/Subscribe

FieldbusCANbus

Queuing

AMQPActive MQ

Client/Server

MQTT RESTXMPPOPCCORBA

BrokeredDaemon

Data-Centric

DDS

Shared Data Model

DataBus

Page 10: Embedded Security and the IoT – Challenges, Trends and Solutions

Data Centric is the Opposite of OO

Object Oriented• Encapsulate data• Expose methods

Data Centric• Encapsulate methods• Expose data

ExplicitShared

Data Model

Page 11: Embedded Security and the IoT – Challenges, Trends and Solutions

Data-Centric Connection = Data-Path Control

• Global Data Space– Automatic discovery

– Read & write data in any OS, language, transport

– Redundant sources/sinks/nets

• Type Aware

• QoS control– Timing, Reliability,

Ownership, Redundancy, Filtering, Security

Shared Global Data Space

DDS DataBus

Patient Hx

Device Identity

Devices

Sup

erv

iso

ry C

DS

Physiologic State

Nu

rsin

g St

atio

n

Cloud

Offer: Write this 1000x/sec

Reliable for 10 secs

Request: Read this 10x/secIf patient = “Joe”

Page 12: Embedded Security and the IoT – Challenges, Trends and Solutions

Data-Centric Security Model

• Per-Topic Security– Control r,w access for each

function– Enforce each dataflow

• Complete Protection– Discovery authentication– Data-centric access control– Cryptography– Tagging & logging– Non-repudiation– Secure multicast– 100% standards compliant

• No code changes!• Plugin architecture for

advanced uses

• Topic Security model:– PMU: State(w)– CBM: State(r); Alarms(w)– Control: State(r), SetPoint(w)– Operator: *(r), Setpoint(w)

CBM AnalysisPMU Control Operator

State Alarms SetPoint

Page 13: Embedded Security and the IoT – Challenges, Trends and Solutions

Demanding Use Cases

• The USS SECURE cybersecurity test bed is a collaboration between:

– The National Security Agency– Department of Defense

Information Assurance Range Quantico

– Combat Systems Direction Activity Dam Neck

– NSWCDD– NSWC Carderock/Philadelphia– Office of Naval Research– Johns Hopkins University

Applied Physics Lab– Real Time Innovations, Inc.

• Objectives– Immunize against cyberattack

and to rapidly recover when impacted

– Determine the best cyberdefense technologies without impacting real time deadline scheduled performance

http://www.navy.mil/submit/display.asp?story_id=79228

Page 14: Embedded Security and the IoT – Challenges, Trends and Solutions

DDS Security Standard

• DDS entities are authenticated

• DDS enforces topic-level access control

• DDS maintains data integrity and confidentiality

• DDS enforces non-repudiation

• DDS provides availability

…while maintaining DDS interoperability & high performance

Page 15: Embedded Security and the IoT – Challenges, Trends and Solutions

Pluggable Security Architecture

App.

Other DDSSystem

Secure DDS middleware

AuthenticationPlugin

Access ControlPlugin Cryptographic

Plugin

Secure Kernel

Crypto Module(e.g. TPM )

Transport (e.g. UDP)

application componentcertificates

?

Datacache

ProtocolEngine

KernelPolicies

DDS Entities

NetworkDriver

?

Network

Encrypted Data

Other DDSSystem

Other DDSSystem

App.App.

LoggingPlugin

DataTaggingPlugin

MAC

Page 16: Embedded Security and the IoT – Challenges, Trends and Solutions

Standard Capabilities (Built-in Plugins)

Authentication X.509 Public Key Infrastructure (PKI) with a pre-configured shared Certificate Authority (CA)

Digital Signature Algorithm (DSA) with Diffie-Hellman and RSA for authentication and key exchange

Access Control Configured by domain using a (shared) Governance file Specified via permissions file signed by shared CA Control over ability to join systems, read or write data

topicsCryptography Protected key distribution

AES128 and AES256 for encryption HMAC-SHA1 and HMAC-SHA256 for message

authentication and integrity Data Tagging Tags specify security metadata, such as classification level

Can be used to determine access privileges (via plugin)Logging Log security events to a file or distribute securely over

Connext DDS

Page 17: Embedded Security and the IoT – Challenges, Trends and Solutions

Secure DDS

over UDP

Control Station

MasterDevice

Transmission Substation

SlaveDevice

Security Needs Protection and Detection

DNP3 overRS232/485

DNP3 overEthernet DNP3 over DDS

Attack Detector

Display

AnomalyDetector

(Lua)

ScadaConverter

(C++)

SlaveDevice

Existing DNP3

RTI Routing Service

ComProcessor

RTI Routing Service

ComProcessor

Secure DDS

DDS DDS

Page 18: Embedded Security and the IoT – Challenges, Trends and Solutions

About RTI

• Market Leader– 800+ designs; $1T designed-in value

• Over 70% DDS mw market share1• Largest embedded middleware vendor2

– By far the most DDS designs– 2013 Gartner Cool Vendor for technology and Open Community

Source model

• Standards Leader– Active in 15 standards efforts– DDS authors, chair, wire spec, security, more– IIC steering committee; OMG board

• Team Quality Leader– Stanford research pedigree– High-performance, control, systems experts– Top quality product, processes, execution– Consistent head-to-head victors

1Embedded Market Forecasters2VDC Analyst Report

Page 19: Embedded Security and the IoT – Challenges, Trends and Solutions

Industrial Internet of Things Thought Leader

• RTI FastTrax IIoTStrategic Consulting– Architectural guidance– Security design– Cloud integration– Business objectives

Page 20: Embedded Security and the IoT – Challenges, Trends and Solutions

For More Information

• RTI site: www.rti.com

• Examples, forum, papers: community.rti.com

• IIC website: www.iiconsortium.org

• Email: [email protected]

• Connect on LinkedIn

• Free RTI Connext DDS Pro: www.rti.com/downloads

Page 21: Embedded Security and the IoT – Challenges, Trends and Solutions

The DDS Data-Centric Standard for the IIoT

• OMG’s Data Distribution Service is the Proven Data Connectivity Standard for the IoT

• OMG: world’s largest systems software standards org

– UML, DDS, Industrial Internet Consortium

• DDS: open & cross-vendor

– Open Standard & Open Source

– 12 implementations

Interoperability between source written for different vendors

Interoperability between applications running on different implementations

DDS-RTPS ProtocolReal-Time Publish-Subscribe

Distribution Fabric

DDS API

Page 22: Embedded Security and the IoT – Challenges, Trends and Solutions

This is addressed by DDS Security

Security Boundaries

• System Boundary

• Network Transport– Media access (layer 2)

– Network (layer 3) security

– Session/Endpoint (layer 4/5) security

• Host– Machine/OS/Applications/Files

• Data & Information flows

Ultimately, you need to implement all!

Page 23: Embedded Security and the IoT – Challenges, Trends and Solutions

DDS Security ModelConcept Unix Filesystem Security Model DDS Security Model

Subject UserProcess executing for a user

DomainParticipantApplication joining a DDS domain

ProtectedObjects

DirectoriesFiles

Domain (by domain_id)Topic (by Topic name)DataObjects (by Instance/Key)

Protected Operations

Directory.list, Directory.create (File, Dir) Directory.remove (File, Dir) Directory.rename (File, Dir) File.read, File.write,File.execute

Domain.joinTopic.createTopic.read (includes QoS)Topic.write (includes QoS)Data.createInstanceData.writeInstanceData.deleteInstance

Access Control Policy Control

Fixed in Kernel Configurable via Plugin

Builtin Access Control Mode

Per-File/Dir Read/Write/Executepermissions for OWNER, GROUP, USERS

Per-DomainParticipant Permissions :What Domains and Topics it can JOIN/READ/WRITE