Security in the Industrial Internet of Things - The C-SEC Approach

Jose Romero-Mariona, Roger Hallman, Megan Kline, John San Miguel, Maxine Major, Lawrence Kerr

2016

Abstract

A revolutionary development in machine-to-machine communications, the “Internet of Things” (IoT) is often characterized as an evolution of Supervisory Control and Data Acquisition (SCADA) networks. SCADA networks have been used for machine-to-machine communication and controlling automated processes since before the widespread use of the Internet. The adoption of open internet protocols within these systems has created unforeseen security vulnerabilities. In this paper we detail the Cyber-SCADA Evaluation Capability (C-SEC), a US Department of Defense research effort aimed at securing SCADA networks. We also demonstrate how the C-SEC framework could enhance the security posture of the emerging IoT paradigm.

References

  1. Atzori, L., Iera, A., and Morabito, G. (2010). The internet of things: A survey. Comput. Netw., 54(15):2787-2805.
  2. Axelrod, C. W. (2015). Enforcing security, safety and privacy for the internet of things. In Systems, Applications and Technology Conference (LISAT), 2015 IEEE Long Island, pages 1-6. IEEE.
  3. Curtis, S. and Wolfe, A. W. (2013). Energy-focused fusion information system integration, a nise funded capability investment project. year 1 fy 2013 report. Technical report, DTIC Document.
  4. Drias, Z., Serhrouchni, A., and Vogel, O. (2015). Taxonomy of attacks on industrial control protocols. In Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS), 2015 International Conference on, pages 1-6. IEEE.
  5. Ecosteer (2014). Open scada and the internet of things. Technical report.
  6. Hallman, R., Romero-Mariona, J., Kline, M., and San Miguel, J. (2014). Ditec user priority designation (upd) algorithm: An approach to prioritizing technology evaluations. Technical report, DTIC Document.
  7. Jajodia, S., Noel, S., Kalapa, P., Albanese, M., and Williams, J. (2011). Cauldron mission-centric cyber situational awareness with defense in depth. In MILITARY COMMUNICATIONS CONFERENCE, 2011 - MILCOM 2011, pages 1339-1344.
  8. Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., and Qiu, D. (2014). Security of the internet of things: perspectives and challenges. Wireless Networks, 20(8):2481-2501.
  9. Kezunovic, M. (2002). Future trends in protective relaying, substation automation, testing and related standardization. In Transmission and Distribution Conference and Exhibition 2002: Asia Pacific. IEEE/PES, volume 1, pages 598-602 vol.1.
  10. Meltzer, D. (2015). Securing the industrial internet of things. Technical report, Information Systems Security Association.
  11. ONR (2012). Energize: Onr supports new energy partnership. Technical report.
  12. Romero-Mariona, J. (2014). Ditec (dod-centric and independent technology evaluation capability): A process for testing security. In Software Testing, Verification and Validation Workshops (ICSTW), 2014 IEEE Seventh International Conference on, pages 24-25.
  13. Russell, J. (2012). Scada history. http://scadahistory.com.
  14. Simo˜es, P., Cruz, T., Proenc¸a, J., and Montiero, E. (2015). Specialized honeypots for scada systems. In Cybersecurity: Analytics, Technology and Automation.
  15. Stackowiak, R., Licht, A., Mantha, V., and Nagode, L. (2015). Internet of things standards. In Big Data and the Internet of Things, pages 185-190. Springer.
  16. Wilhoit, K. (2013). Who's really attacking your ics equipment? Trend Micro.
  17. Yu, T., Sekar, V., Seshan, S., Agarwal, Y., and Xu, C. (2015). Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the internet-of-things. In Proceedings of the 14th ACM Workshop on Hot Topics in Networks, HotNets-XIV, pages 5:1-5:7, New York, NY, USA. ACM.
  18. Zhu, B. and Sastry, S. (2010). Scada-specific intrusion detection/prevention systems: a survey and taxonomy. In Proc. of the 1st Workshop on Secure Control Systems (SCS).
Download


Paper Citation


in Harvard Style

Romero-Mariona J., Hallman R., Kline M., San Miguel J., Major M. and Kerr L. (2016). Security in the Industrial Internet of Things - The C-SEC Approach . In Proceedings of the International Conference on Internet of Things and Big Data - Volume 1: IoTBD, ISBN 978-989-758-183-0, pages 421-428. DOI: 10.5220/0005877904210428


in Bibtex Style

@conference{iotbd16,
author={Jose Romero-Mariona and Roger Hallman and Megan Kline and John San Miguel and Maxine Major and Lawrence Kerr},
title={Security in the Industrial Internet of Things - The C-SEC Approach},
booktitle={Proceedings of the International Conference on Internet of Things and Big Data - Volume 1: IoTBD,},
year={2016},
pages={421-428},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005877904210428},
isbn={978-989-758-183-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Internet of Things and Big Data - Volume 1: IoTBD,
TI - Security in the Industrial Internet of Things - The C-SEC Approach
SN - 978-989-758-183-0
AU - Romero-Mariona J.
AU - Hallman R.
AU - Kline M.
AU - San Miguel J.
AU - Major M.
AU - Kerr L.
PY - 2016
SP - 421
EP - 428
DO - 10.5220/0005877904210428