Richard H. Paine, from Boeing, 802.11 and the open group

July 23, 2007
The Boeing Company default wireless infrastructure is 802.11. Paine has been a network technologist since 1977, has been leading wireless at Boeing since 1993, was the co-chair of the Secure Mobile Architecture working group of the Open Group, and is co-chair of IEEE802.11k
  • BCAG business segment need is total secure communications in the factory
  • IDS business segment need is secure mobile communications
  • Works with any MAX has uniform method of security and handles L...
The Boeing Company default wireless infrastructure is 802.11. Paine has been a network technologist since 1977, has been leading wireless at Boeing since 1993, was the co-chair of the Secure Mobile Architecture working group of the Open Group, and is co-chair of IEEE802.11k
  • BCAG business segment need is total secure communications in the factory
  • IDS business segment need is secure mobile communications
  • Works with any MAX has uniform method of security and handles Layer 2 Mobility
  • utilizes crypographic identities and authorization
  • addresses most major communications and security concerns in Networking
  • need to treat IP as an insecure transport layer
  • includes VoIP.
There are four basic elements to SMA: Public Key Infrastructure Host Identity Protocol NDS Network directory services LENS location architecture and Network location service (NLS) They tested the system in the Everett facility in the big 787 assembly building. They've moved it into the C-17 facility in Long Beach, and the F-15 and F-18 plant in St. Louis. They can shift from cellular to wireless LAN and between VoIP and VoWLAN for CIP (Factory Net) They developed a publish-subscribe (Pub-Sub_ messaging architecture. They believe this will be incredibly useful for asset tracking and supply chain connectivity. Advantages: secure identity-based client-to-client communications. Allows moving most hosts outside of the security perimeter. Office/home/starbucks connections essentially identical Backwards compatible, works within existing IP network and routing architecture. Non HIP-aware hosts could still be allowed, depending on network policy. Mobile: HIP's multihoming capability allows hosts to seamlessly cross subnet boundaries or even wireless domains. Key enabler for Voip over Wlan: high speed roaming across subnets and network domains, inexpensive IP telephony for the factory, and deperimeterization. Network based policy enforcement using middleboxes and some other advantages. The project is ongoing. Automation security implications: Identity based end to end security required IT robust networks required proprietary wireless solutions not desirable SIM chip technology enables identity for secure end-to-end over existing wired and wireless networks SMA HIP Bridge enables secure Internet and Intranet communications for Ethernet-enabled tools.

Sponsored Recommendations

IEC 62443 4-1 Cyber Certification – Why ML 3 is So Important

The IEC 62443 Security for Industrial Automation and Control Systems - Part 4-1: Secure Product Development Lifecycle Requirements help increase resilience for control systems...

Multi-Server SCADA Maintenance Made Easy

See how the intuitive VTScada Services Page ensures your multi-server SCADA application remains operational and resilient, even when performing regular server maintenance.

Your Industrial Historical Database Should be Designed for SCADA

VTScada's Chief Software Architect discusses how VTScada's purpose-built SCADA historian has created a paradigm shift in industry expectations for industrial redundancy and performance...

Linux and SCADA – What You May Not Have Considered

There’s a lot to keep in mind when considering the Linux® Operating System for critical SCADA systems. See how the Linux security model compares to Windows® and Mac OS®.