SRPNetOS Goals
Technical goals of SRPNetOS:
Core Architecture requirements include:
Support data centric security.
Security must be baked into core operations to secure information, users, resources and devices.
Securing data creation, data in motion, data at rest and data in use.
Path management must include data custody and data provenance.
Key technologies such as TSN, DDS and DSC must be supported.
The architecture must be standardized and extendable.
The architecture must be flexible to support both technical and business needs through the use of policy.
Quality of Service (QoS) must be definable, measurable and relevant.
There must be a comprehensive monitoring, logging and support strategy to minimize problems that occur.
The weaknesses of TCP/IP related to providence, pathing and DDOS are resolved.
There are three communication stack requirements:
A communication stack that supports low power operation
A communication stack with high reliability and low latency
A communication stack that enables secure communication environment
Security design must support:
High security implementation for devices, information and services.
Secure distributed device computing.
Secure distributed information sharing
Secure Relationship Management
Secure integration with peer interoperability
Health and Support Ecosystem
Policy driven security implementation
Pathway Design
How many routes are available from A to B?
What is the best path based on policy x?
Telemetry gathering
Telemetry analysis
Disaster recovery
Disaster prevention
Privacy
Disposable ID’s are required for privacy.
This system has to define when to expose privacy to prevent abuse
Telemetry gathering, traceroute function
Information Exchange Framework Integration Advantages:
Data and resource identification - what and where data resides.
Definition of policy based access control for data management
Manage who, how and what data is accessed when and where.
Detailed monitoring of behavior and information movement.
Information (data) that is self-describing and defending.
Businesses define policies and controls
Data movement is encrypted and managed