By default, VI Server uses TCP to communicate between applications. This stream of data is not encrypted and open to hacking and snooping.
My suggestion is allow VI Server traffic to be encrypted, perhaps using SSL/TLS or an AES algorithm.
The reasons are obvious. There is an increasing number of cyber attacks in industrial control systems. Many cyber attacks are perpetrated internally, so a firewall or air gap is only so helpful. And in certain environments (ie military, medical) you can't even consider transmitting data without encryption. This means VI Server is not an option for many users.
I see that LV2020 now supports SSL/TLS in its TCP functions (see here), so the logical next step would be to make use of this in VI Server also.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.