Ahoy there! A bit late of a reply, but for future readers:
With respect to engineering trade offs and performance benchmark analysis of ROS2 networks using Secure DDS, there are as of writing a number of previous works on this subject. Some recent publications include:
Security and Performance Considerations in ROS 2: A Balancing Act
Jongkil Kim, Jonathon M. Smereka, Calvin Cheung, Surya Nepal, Marthie Grobler
https://doi.org/10.48550/arXiv.1809.0...
Robot Operating System 2: The need for a holistic security approach to robotic architectures
DiLuoffo V, Michalson WR, Sunar B.
https://doi.org/10.1177/1729881418770011
Performance Study of the Robot Operating System 2 with QoS and Cyber Security Settings
Fernandez, J. and Allen, B. and Thulasiraman, P. and Bingham, B.
https://doi.org/10.1109/SysCon47679.2...
As an oversimplification summary: enabling of Secure DDS does incur some overhead costs, the impact of which may be application specific but also dependent upon the configuration of Secure DDS itself. Such impacts can be mitigated by tuning this configuration, but again, not without trade-offs, nor a free lunch.
For example, one could disable encryption for certain topics while retaining message authentication and integrity features. While this would no longer prevent an external observer from reading the contents of the clear text messages, it would still allow topic write access to remain access controlled. This could be beneficial for high bandwidth topics comprised of already publicly discernible data, such as global weather reports or current time, enabling better relocation of computational resources to encrypt more sensitive topics, such as robot sensor data or current global coordinates.
Just be wary of what topics you configure accordingly, as even innocuous seeming topic data can potentially leak sensitive information. For example, by filtering or integrating high frequency odometric ticks and inertial messages, an attacker could infer robot trajectories, and by transitivity any facility floor plans. As with most matters in cyber security, it all remains a matter of managing risk.