SlideShare a Scribd company logo
DDS Security
[PrismTech Initial Submission for the OMG RFP mars/2010-12-37]




Angelo CORSARO, Ph.D.
Chief Technology Officer
OMG DDS Sig Co-Chair
PrismTech
angelo.corsaro@prismtech.com
Agenda
¨   Context




                          Copyright	
  2010,	
  PrismTech	
  –	
  	
  All	
  Rights	
  Reserved.
¨   Security Model
¨   Transport Security
¨   Key Distribution
¨   Data Protection
¨   Next Steps
Context   The DDS Security specification
          focuses on three orthogonal
          aspects




                                               Copyright	
  2010,	
  PrismTech	
  –	
  	
  All	
  Rights	
  Reserved.
          ¨   A definition of the DDS
               security model

          ¨   A set of API defining the
               interface for pluggable
               security plugins

          ¨   A set extensions to the DDSI/
               RTPS protocol to enable
               interoperable security
Submission Approach
¨   Address key requirements commonly raising in




                                                         Copyright	
  2010,	
  PrismTech	
  –	
  	
  All	
  Rights	
  Reserved.
     systems and system of systems
¨   Allow both endpoint as well as perimeter security
     approaches
¨   Leverage existing standards when possible
¨   Preserve DDS scalability do not limit the use of
     multicast when available
Security Properties
This submission focuses on providing DDS with the following desirable properties:




                                                                                    Copyright	
  2010,	
  PrismTech	
  –	
  	
  All	
  Rights	
  Reserved.
¨   Confidentiality of the data samples being exchanged
¨   Integrity of DDS messages, data and the overall system
¨   Authentication of DDS readers and writers
¨   Authorization of DDS Entities (e.g. DomainParticipants, DataReader,
     DataWriters)
¨   Non-repudiation of data being sent
¨   Availability
Security Model
What can I Access?
¨   The submission proposes to define the security policies in terms of




                                                                           Copyright	
  2010,	
  PrismTech	
  –	
  	
  All	
  Rights	
  Reserved.
     operations that “Subjects” can perform on “Objects”
¨   This submission considers the following classification:
     ¨   Subjects
          ¨   DomainParticipants
     ¨   Objects
          ¨   Topics

¨   As a consequence a DomainParticipant might be provided with
     rights to Create, Read, Update or Dispose Topics or a specific set
     of Topics
What can we secure?
This submission provides two composable level of security




                                                                                     Copyright	
  2010,	
  PrismTech	
  –	
  	
  All	
  Rights	
  Reserved.
¨   Topic-Level
     ¨   A topic can be secure as a whole thus making its access unavailable
          to un-authorized applications

¨   Attribute-Level
     ¨   An attribute can be “obfuscated” to further control its availability. In
          this case some DomainParticipants might have the right to see the
          Topic but not the specific attribute
Examples
Topic Security
                              enum BloodType {
                                  A, B, AB, O, An, Bn, ABn, On };
                              struct Person {
                                  string name;
                                  string surname;
                                  string ssn;
                                  string email;
                                  sequence<string> telephone;
                                  sequence<string> pathologies;




                                                                                          Copyright	
  2010,	
  PrismTech	
  –	
  	
  All	
  Rights	
  Reserved.
                                  BloodType bloodType;
¨   The entire topic             long   salary };
                                                        Payload

     content is secured                               encipherment
                                                         in Core

                                    DDS Application                     DDS Application

¨   Uniform access to                 xxxxx
                                       xxxxx
                                                         Data Sample
                                                                           xxxxx
                                                                           xxxxx


     topic attributes is
                                       xxxxx            Hash               xxxxx


                                       DDS Core                            DDS Core

     provided to authorized            Hash
                                       Hash                                Hash



     users                                             DDS Durability
                                                         Service
                                                          Hash
                                                         Hash
Field-Based Security                 enum BloodType {
                                         A, B, AB, O, An, Bn, ABn, On };
                                     struct Person {
¨   Sometimes, for a secured            string name;
                                         string surname;
     topic you need to provide           string ssn;




                                                                                                                   Copyright	
  2010,	
  PrismTech	
  –	
  	
  All	
  Rights	
  Reserved.
                                         string email;
     non-uniform access to               sequence<string> telephone;
                                         @protected sequence<string> pathologies;
     some of its fields                  BloodType bloodType;
                                         @protected long   salary };
     ¨   example: Salary, Medical
          Records, etc.                                                             Field
                                                                               encipherment by
                                                                                 application

¨   Field-based security                                    DDS Application                     DDS Application


     provides a way to control
                                                                xxxxx                               xxxxx
                                                                                  Data Sample
                                                                xxxxx                               xxxxx
                                                                                   Hash

     access at a field level via
                                                                xxxxx                               xxxxx
                                                                                  xxxxx

                                                                DDS Core                            DDS Core
     security containers                                         Hash
                                                                                  xxxxx
                                                                                                     Hash
                                                                xxxxx                               xxxxx

¨   Field-based security can be                                xxxxx
                                                                                DDS Durability
                                                                                  Service           xxxxx
                                                                                    Hash
     overlaid over a secure topic
                                                                                   Hash
                                                                                   xxxxx
                                                                                  xxxxx

                                                                                    xxxxx
                                                                                   xxxxx
Field vs. Topic Security
¨   The current proposal makes Topic security completely transparent to




                                                                             Copyright	
  2010,	
  PrismTech	
  –	
  	
  All	
  Rights	
  Reserved.
     the application
¨   The infrastructures takes care of transparently dealing with key
     distribution, encryption, decryption, etc.
¨   Field-based security is based on the concept of security container
¨   The infrastructure generates secure containers for “secured-fields”
     but will not automatically distribute keys
¨   The keys necessary to “open” the secured field are to be distributed
     by an application specific logic. Notice that a specific secure topic
     could be used for this purpose
Transport Security
TLS & DTLS
TLS and DTLS are commonly used cryptographic protocols in “client/server”




                                                                                       Copyright	
  2010,	
  PrismTech	
  –	
  	
  All	
  Rights	
  Reserved.
applications. However for DDS they present some shortcomings
¨   TLS and DTLS use in-band, blocking key-negotiation, in the default setup, thus
     interrupting the data exchange for a non-predictable amount of time
¨   At anytime one of the two peers may initiate a key re-negotiation, causing
     interruption of the data-transfer until a new session-key has been negotiated.
¨   A major drawback is that both, TLS and D-TLS, can not deal with multicast
     communication. A TLS based transport security would degrade a DDS system
     to a client-server system. Both, TLS and DLTS, are not suited for DDS transport
     layer security protocols.
SRTP & DDS
¨   The Secure Real-time Transport Protocol (or SRTP) defines a




                                                                    Copyright	
  2010,	
  PrismTech	
  –	
  	
  All	
  Rights	
  Reserved.
     profile of RTP (Real-time Transport Protocol), intended to
     provide encryption, message authentication and integrity,
     and replay protection to the RTP data in both unicast and
     multicast applications It was first published by the IETF in
     March 2004 as RFC 3711.
¨   This submission proposes the use of the SRTP approach for
     securing DDS transport while maintaining support for
     unicast and multicast!
Key Distribution
MIKEY & DDS
¨   The Multimedia Internet KEYing (MIKEY) is a key management protocol that is
     intended for use with real-time applications. It can specifically be used to set
     up encryption keys for multimedia sessions that are secured using SRTP. MIKEY




                                                                                                                Copyright	
  2010,	
  PrismTech	
  –	
  	
  All	
  Rights	
  Reserved.
     is defined in RFC 3830.
¨   MIKEY supports five different methods to set up a Common Secret:
     ¨   Pre-Shared Key (PSK): This is the most efficient way to handle the transport of the Common Secret,
          since only symmetric encryption is used and only a small amount of data has to be exchanged.
     ¨   Public-Key: The Common Secret is exchanged with the help of public key encryption.
     ¨   Diffie-Hellman: A Diffie-Hellman key exchange is used to set up the Common Secret.
     ¨   DH-HMAC (HMAC-Authenticated Diffie-Hellman): This is a light-weight version of Diffie-Hellman MIKEY
     ¨   RSA-R (Reverse RSA): The Common Secret is exchanged with the help of public key encryption in a
          way that doesn't require any PKI

¨   The RSA-R method is the appropriate concept for DDS (see submission for
     details)
Data Protection
Payload Protection
¨   The header contains the relevant
     attributes to fetch the required secrets




                                                                                                      Copyright	
  2010,	
  PrismTech	
  –	
  	
  All	
  Rights	
  Reserved.
     and keys from originator or key-
     archive
¨   The key-archive shall operate similar to
     a durability service, storing keys for
     late joiners
                                                                    Data Submessage
¨   The tail contains the digest, which        DATA
                                                header
                                                         Security Header   Payload    Security Tail
     allows to verify integrity of the
     payload
¨   The concept of header and tail allows
     re-fragmentation of the serialized data
Next Steps




                                                          Copyright	
  2010,	
  PrismTech	
  –	
  	
  All	
  Rights	
  Reserved.
¨   Detail the use of SRTP and MIKEY in the context of
     the DDSI/RTPS wire-protocol
¨   Finalize the API for security plugin
¨   Vote for adoption
:: Connect with Us ::




                                                                                              Copyright	
  2010,	
  PrismTech	
  –	
  	
  All	
  Rights	
  Reserved.
  ¥ opensplice.com         ¥ forums.opensplice.org
                                                                      ¥ @acorsaro
  ¥ opensplice.org         ¥ opensplicedds@prismtech.com                 ¥ @prismtech




                                                                     ¥ crc@prismtech.com
                                                                     ¥ sales@prismtech.com
¥ youtube.com/opensplicetube     ¥ slideshare.net/angelo.corsaro

More Related Content

PDF
Getting Started in DDS with C++ and Java
PPTX
Introduction to RTI DDS
PPTX
Application Layer and Protocols
PDF
Micro XRCE-DDS: Bringing DDS into microcontrollers
PPTX
Best Practices Using RTI Connext DDS
PPT
OSI layer by cisco
PDF
DDS QoS Unleashed
PDF
OpenID Connect のビジネスチャンス
Getting Started in DDS with C++ and Java
Introduction to RTI DDS
Application Layer and Protocols
Micro XRCE-DDS: Bringing DDS into microcontrollers
Best Practices Using RTI Connext DDS
OSI layer by cisco
DDS QoS Unleashed
OpenID Connect のビジネスチャンス

What's hot (20)

PPTX
Comparison of MQTT and DDS as M2M Protocols for the Internet of Things
PDF
The Data Distribution Service
PPTX
DDS Advanced Tutorial - OMG June 2013 Berlin Meeting
PDF
Cyclone DDS: Sharing Data in the IoT Age
PDF
ROS 2 Foxy with Eclipse Cyclone DDS | Philly ROS Meetup July 20th 2020
PDF
Communication Patterns Using Data-Centric Publish/Subscribe
PDF
OpenSplice DDS Tutorial -- Part II
PPTX
20220409 AWS BLEA 開発にあたって検討したこと
PDF
DDS in Action -- Part I
PDF
動画配信プラットフォーム on AWS
PDF
MinIO January 2020 Briefing
PDF
DDS Tutorial -- Part I
PPTX
PDF
Cisco Security Presentation
PDF
DDS for Internet of Things (IoT)
PDF
Dns security
PPTX
Distributed database system
PPT
PDF
OMG DDS: The Data Distribution Service for Real-Time Systems
PDF
The DDS Security Standard
Comparison of MQTT and DDS as M2M Protocols for the Internet of Things
The Data Distribution Service
DDS Advanced Tutorial - OMG June 2013 Berlin Meeting
Cyclone DDS: Sharing Data in the IoT Age
ROS 2 Foxy with Eclipse Cyclone DDS | Philly ROS Meetup July 20th 2020
Communication Patterns Using Data-Centric Publish/Subscribe
OpenSplice DDS Tutorial -- Part II
20220409 AWS BLEA 開発にあたって検討したこと
DDS in Action -- Part I
動画配信プラットフォーム on AWS
MinIO January 2020 Briefing
DDS Tutorial -- Part I
Cisco Security Presentation
DDS for Internet of Things (IoT)
Dns security
Distributed database system
OMG DDS: The Data Distribution Service for Real-Time Systems
The DDS Security Standard
Ad

Viewers also liked (20)

PDF
DDS In Action Part II
PDF
DDS and OPC UA Explained
PDF
Getting Started with DDS in C++, Java and Scala
PDF
The Cloudy, Foggy and Misty Internet of Things -- Toward Fluid IoT Architect...
PDF
Building IoT Applications with Vortex and the Intel Edison Starter Kit
PDF
Micro services Architecture with Vortex -- Part I
PDF
OpenSplice Security Module
PDF
OpenSplice DDS v6
PDF
The DDS Tutorial - Part I
PDF
What's the Right Messaging Standard for the IoT?
PDF
OMG DDS Security Specification - 4th revised submission document
PDF
OMG Data-Distribution Service Security
PPTX
DDS Security for the Industrial Internet - London Connext DDS Conference
PDF
Hello World in OMG DDS and ZeroMQ
PDF
"Hello World" in OMG DDS and MQTT
PDF
OMG DDS Security Standard
PDF
Open splice dds security
PPTX
Practical Security with MQTT and Mosquitto
PPTX
Learn About the FACE Standard for Avionics Software and a Ready-to-Go COTS Pl...
DDS In Action Part II
DDS and OPC UA Explained
Getting Started with DDS in C++, Java and Scala
The Cloudy, Foggy and Misty Internet of Things -- Toward Fluid IoT Architect...
Building IoT Applications with Vortex and the Intel Edison Starter Kit
Micro services Architecture with Vortex -- Part I
OpenSplice Security Module
OpenSplice DDS v6
The DDS Tutorial - Part I
What's the Right Messaging Standard for the IoT?
OMG DDS Security Specification - 4th revised submission document
OMG Data-Distribution Service Security
DDS Security for the Industrial Internet - London Connext DDS Conference
Hello World in OMG DDS and ZeroMQ
"Hello World" in OMG DDS and MQTT
OMG DDS Security Standard
Open splice dds security
Practical Security with MQTT and Mosquitto
Learn About the FACE Standard for Avionics Software and a Ready-to-Go COTS Pl...
Ad

Similar to DDS Security (14)

PDF
Stream Processing with DDS and CEP
PDF
Data Sharing in Extremely Resource Constrained Envionrments
PDF
DDS ISO C++ PSM
PDF
Open splicedds espercep-webinar
PDF
DDS-PSM-Cxx and simd-cxx
PDF
The DDS Tutorial Part II
PDF
Dds the ideal_bus_for_event_processing_engines
PDF
DDS: The IoT Data Sharing Standard
PDF
Vortex Tutorial -- Part I
PDF
PrismTech Vortex Tutorial Part 1
PDF
Layer 7 & Oracle: Cyber Defense for SOA & REST
PDF
Presentation cyber defense for soa & rest
PDF
Cyber defense for soa & rest oracle
PDF
Advanced OpenSplice Programming - Part II
Stream Processing with DDS and CEP
Data Sharing in Extremely Resource Constrained Envionrments
DDS ISO C++ PSM
Open splicedds espercep-webinar
DDS-PSM-Cxx and simd-cxx
The DDS Tutorial Part II
Dds the ideal_bus_for_event_processing_engines
DDS: The IoT Data Sharing Standard
Vortex Tutorial -- Part I
PrismTech Vortex Tutorial Part 1
Layer 7 & Oracle: Cyber Defense for SOA & REST
Presentation cyber defense for soa & rest
Cyber defense for soa & rest oracle
Advanced OpenSplice Programming - Part II

More from Angelo Corsaro (20)

PDF
Zenoh: The Genesis
PDF
zenoh: The Edge Data Fabric
PDF
Zenoh Tutorial
PDF
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
PDF
zenoh: zero overhead pub/sub store/query compute
PDF
zenoh -- the ZEro Network OverHead protocol
PDF
zenoh -- the ZEro Network OverHead protocol
PDF
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
PDF
Eastern Sicily
PDF
fog05: The Fog Computing Infrastructure
PDF
fog05: The Fog Computing Platform
PDF
Programming in Scala - Lecture Four
PDF
Programming in Scala - Lecture Three
PDF
Programming in Scala - Lecture Two
PDF
Programming in Scala - Lecture One
PDF
RUSTing -- Partially Ordered Rust Programming Ruminations
PDF
Vortex II -- The Industrial IoT Connectivity Standard
PDF
Fog Computing Defined
PDF
Fluid IoT Architectures
PDF
Microservices Architecture with Vortex — Part II
Zenoh: The Genesis
zenoh: The Edge Data Fabric
Zenoh Tutorial
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
zenoh: zero overhead pub/sub store/query compute
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Eastern Sicily
fog05: The Fog Computing Infrastructure
fog05: The Fog Computing Platform
Programming in Scala - Lecture Four
Programming in Scala - Lecture Three
Programming in Scala - Lecture Two
Programming in Scala - Lecture One
RUSTing -- Partially Ordered Rust Programming Ruminations
Vortex II -- The Industrial IoT Connectivity Standard
Fog Computing Defined
Fluid IoT Architectures
Microservices Architecture with Vortex — Part II

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
project resource management chapter-09.pdf
PPTX
1. Introduction to Computer Programming.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Getting Started with Data Integration: FME Form 101
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
A Presentation on Touch Screen Technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Hybrid model detection and classification of lung cancer
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Encapsulation theory and applications.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
1 - Historical Antecedents, Social Consideration.pdf
project resource management chapter-09.pdf
1. Introduction to Computer Programming.pptx
A Presentation on Artificial Intelligence
MIND Revenue Release Quarter 2 2025 Press Release
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Chapter 5: Probability Theory and Statistics
WOOl fibre morphology and structure.pdf for textiles
Getting Started with Data Integration: FME Form 101
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
A Presentation on Touch Screen Technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Hindi spoken digit analysis for native and non-native speakers
Hybrid model detection and classification of lung cancer
A novel scalable deep ensemble learning framework for big data classification...
Encapsulation theory and applications.pdf
Assigned Numbers - 2025 - Bluetooth® Document

DDS Security

  • 1. DDS Security [PrismTech Initial Submission for the OMG RFP mars/2010-12-37] Angelo CORSARO, Ph.D. Chief Technology Officer OMG DDS Sig Co-Chair PrismTech angelo.corsaro@prismtech.com
  • 2. Agenda ¨ Context Copyright  2010,  PrismTech  –    All  Rights  Reserved. ¨ Security Model ¨ Transport Security ¨ Key Distribution ¨ Data Protection ¨ Next Steps
  • 3. Context The DDS Security specification focuses on three orthogonal aspects Copyright  2010,  PrismTech  –    All  Rights  Reserved. ¨ A definition of the DDS security model ¨ A set of API defining the interface for pluggable security plugins ¨ A set extensions to the DDSI/ RTPS protocol to enable interoperable security
  • 4. Submission Approach ¨ Address key requirements commonly raising in Copyright  2010,  PrismTech  –    All  Rights  Reserved. systems and system of systems ¨ Allow both endpoint as well as perimeter security approaches ¨ Leverage existing standards when possible ¨ Preserve DDS scalability do not limit the use of multicast when available
  • 5. Security Properties This submission focuses on providing DDS with the following desirable properties: Copyright  2010,  PrismTech  –    All  Rights  Reserved. ¨ Confidentiality of the data samples being exchanged ¨ Integrity of DDS messages, data and the overall system ¨ Authentication of DDS readers and writers ¨ Authorization of DDS Entities (e.g. DomainParticipants, DataReader, DataWriters) ¨ Non-repudiation of data being sent ¨ Availability
  • 7. What can I Access? ¨ The submission proposes to define the security policies in terms of Copyright  2010,  PrismTech  –    All  Rights  Reserved. operations that “Subjects” can perform on “Objects” ¨ This submission considers the following classification: ¨ Subjects ¨ DomainParticipants ¨ Objects ¨ Topics ¨ As a consequence a DomainParticipant might be provided with rights to Create, Read, Update or Dispose Topics or a specific set of Topics
  • 8. What can we secure? This submission provides two composable level of security Copyright  2010,  PrismTech  –    All  Rights  Reserved. ¨ Topic-Level ¨ A topic can be secure as a whole thus making its access unavailable to un-authorized applications ¨ Attribute-Level ¨ An attribute can be “obfuscated” to further control its availability. In this case some DomainParticipants might have the right to see the Topic but not the specific attribute
  • 10. Topic Security enum BloodType { A, B, AB, O, An, Bn, ABn, On }; struct Person { string name; string surname; string ssn; string email; sequence<string> telephone; sequence<string> pathologies; Copyright  2010,  PrismTech  –    All  Rights  Reserved. BloodType bloodType; ¨ The entire topic long salary }; Payload content is secured encipherment in Core DDS Application DDS Application ¨ Uniform access to xxxxx xxxxx Data Sample xxxxx xxxxx topic attributes is xxxxx Hash xxxxx DDS Core DDS Core provided to authorized Hash Hash Hash users DDS Durability Service Hash Hash
  • 11. Field-Based Security enum BloodType { A, B, AB, O, An, Bn, ABn, On }; struct Person { ¨ Sometimes, for a secured string name; string surname; topic you need to provide string ssn; Copyright  2010,  PrismTech  –    All  Rights  Reserved. string email; non-uniform access to sequence<string> telephone; @protected sequence<string> pathologies; some of its fields BloodType bloodType; @protected long salary }; ¨ example: Salary, Medical Records, etc. Field encipherment by application ¨ Field-based security DDS Application DDS Application provides a way to control xxxxx xxxxx Data Sample xxxxx xxxxx Hash access at a field level via xxxxx xxxxx xxxxx DDS Core DDS Core security containers Hash xxxxx Hash xxxxx xxxxx ¨ Field-based security can be xxxxx DDS Durability Service xxxxx Hash overlaid over a secure topic Hash xxxxx xxxxx xxxxx xxxxx
  • 12. Field vs. Topic Security ¨ The current proposal makes Topic security completely transparent to Copyright  2010,  PrismTech  –    All  Rights  Reserved. the application ¨ The infrastructures takes care of transparently dealing with key distribution, encryption, decryption, etc. ¨ Field-based security is based on the concept of security container ¨ The infrastructure generates secure containers for “secured-fields” but will not automatically distribute keys ¨ The keys necessary to “open” the secured field are to be distributed by an application specific logic. Notice that a specific secure topic could be used for this purpose
  • 14. TLS & DTLS TLS and DTLS are commonly used cryptographic protocols in “client/server” Copyright  2010,  PrismTech  –    All  Rights  Reserved. applications. However for DDS they present some shortcomings ¨ TLS and DTLS use in-band, blocking key-negotiation, in the default setup, thus interrupting the data exchange for a non-predictable amount of time ¨ At anytime one of the two peers may initiate a key re-negotiation, causing interruption of the data-transfer until a new session-key has been negotiated. ¨ A major drawback is that both, TLS and D-TLS, can not deal with multicast communication. A TLS based transport security would degrade a DDS system to a client-server system. Both, TLS and DLTS, are not suited for DDS transport layer security protocols.
  • 15. SRTP & DDS ¨ The Secure Real-time Transport Protocol (or SRTP) defines a Copyright  2010,  PrismTech  –    All  Rights  Reserved. profile of RTP (Real-time Transport Protocol), intended to provide encryption, message authentication and integrity, and replay protection to the RTP data in both unicast and multicast applications It was first published by the IETF in March 2004 as RFC 3711. ¨ This submission proposes the use of the SRTP approach for securing DDS transport while maintaining support for unicast and multicast!
  • 17. MIKEY & DDS ¨ The Multimedia Internet KEYing (MIKEY) is a key management protocol that is intended for use with real-time applications. It can specifically be used to set up encryption keys for multimedia sessions that are secured using SRTP. MIKEY Copyright  2010,  PrismTech  –    All  Rights  Reserved. is defined in RFC 3830. ¨ MIKEY supports five different methods to set up a Common Secret: ¨ Pre-Shared Key (PSK): This is the most efficient way to handle the transport of the Common Secret, since only symmetric encryption is used and only a small amount of data has to be exchanged. ¨ Public-Key: The Common Secret is exchanged with the help of public key encryption. ¨ Diffie-Hellman: A Diffie-Hellman key exchange is used to set up the Common Secret. ¨ DH-HMAC (HMAC-Authenticated Diffie-Hellman): This is a light-weight version of Diffie-Hellman MIKEY ¨ RSA-R (Reverse RSA): The Common Secret is exchanged with the help of public key encryption in a way that doesn't require any PKI ¨ The RSA-R method is the appropriate concept for DDS (see submission for details)
  • 19. Payload Protection ¨ The header contains the relevant attributes to fetch the required secrets Copyright  2010,  PrismTech  –    All  Rights  Reserved. and keys from originator or key- archive ¨ The key-archive shall operate similar to a durability service, storing keys for late joiners Data Submessage ¨ The tail contains the digest, which DATA header Security Header Payload Security Tail allows to verify integrity of the payload ¨ The concept of header and tail allows re-fragmentation of the serialized data
  • 20. Next Steps Copyright  2010,  PrismTech  –    All  Rights  Reserved. ¨ Detail the use of SRTP and MIKEY in the context of the DDSI/RTPS wire-protocol ¨ Finalize the API for security plugin ¨ Vote for adoption
  • 21. :: Connect with Us :: Copyright  2010,  PrismTech  –    All  Rights  Reserved. ¥ opensplice.com ¥ forums.opensplice.org ¥ @acorsaro ¥ opensplice.org ¥ opensplicedds@prismtech.com ¥ @prismtech ¥ crc@prismtech.com ¥ sales@prismtech.com ¥ youtube.com/opensplicetube ¥ slideshare.net/angelo.corsaro