5 CONCLUSIONS
In this paper we presented C-SEC, a tool to support
cybersecurity decision making across new technolo-
gies by enabling streamlined, flexible, and repeatable
evaluations. C-SEC has three components, a soft-
ware evaluation tool a laboratory environment, and an
online collaborative environment, and is designed to
assist non-SCADA security personnel in addressing
vulnerabilities in their networks. The C-SEC soft-
ware Laboratory environment provides opportunities
for testing security products on controlled SCADA
networks as well as modeling how they will affect net-
work vulnerabilities. We have also developed metrics
for scoring security product capabilities, as well as al-
gorithms for matching users to suites of products that
address their individual needs.
Many of the security vulnerabilities that charac-
terize SCADA networks are common to the IoT. The
diversity of IoT devices, their resource limitations,
and lifespans that will outlast vendor support mean
that security technology cannot be broadly applied to
smart devices. An internet-oriented approach to IoT
security that takes devices into account is the only fea-
sible strategy for addressing security concerns. C-
SEC focuses on improving the cyber-security pos-
ture of SCADA networks that have long been used
in machine-to-machine communication, and given the
inherent difficulties of building secure smart devices,
C-SEC is an ideal technology to integrate up-to-date
security into the IoT.
REFERENCES
Atzori, L., Iera, A., and Morabito, G. (2010). The internet of
things: A survey. Comput. Netw., 54(15):2787–2805.
Axelrod, C. W. (2015). Enforcing security, safety and pri-
vacy for the internet of things. In Systems, Applica-
tions and Technology Conference (LISAT), 2015 IEEE
Long Island, pages 1–6. IEEE.
Curtis, S. and Wolfe, A. W. (2013). Energy-focused fusion
information system integration, a nise funded capabil-
ity investment project. year 1 fy 2013 report. Techni-
cal report, DTIC Document.
Drias, Z., Serhrouchni, A., and Vogel, O. (2015). Taxonomy
of attacks on industrial control protocols. In Proto-
col Engineering (ICPE) and International Conference
on New Technologies of Distributed Systems (NTDS),
2015 International Conference on, pages 1–6. IEEE.
Ecosteer (2014). Open scada and the internet of things.
Technical report.
Hallman, R., Romero-Mariona, J., Kline, M., and
San Miguel, J. (2014). Ditec user priority designation
(upd) algorithm: An approach to prioritizing technol-
ogy evaluations. Technical report, DTIC Document.
Jajodia, S., Noel, S., Kalapa, P., Albanese, M., and
Williams, J. (2011). Cauldron mission-centric cyber
situational awareness with defense in depth. In MIL-
ITARY COMMUNICATIONS CONFERENCE, 2011 -
MILCOM 2011, pages 1339–1344.
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., and Qiu, D.
(2014). Security of the internet of things: perspectives
and challenges. Wireless Networks, 20(8):2481–2501.
Kezunovic, M. (2002). Future trends in protective relay-
ing, substation automation, testing and related stan-
dardization. In Transmission and Distribution Con-
ference and Exhibition 2002: Asia Pacific. IEEE/PES,
volume 1, pages 598–602 vol.1.
Meltzer, D. (2015). Securing the industrial internet of
things. Technical report, Information Systems Secu-
rity Association.
ONR (2012). Energize: Onr supports new energy partner-
ship. Technical report.
Romero-Mariona, J. (2014). Ditec (dod-centric and inde-
pendent technology evaluation capability): A process
for testing security. In Software Testing, Verification
and Validation Workshops (ICSTW), 2014 IEEE Sev-
enth International Conference on, pages 24–25.
Russell, J. (2012). Scada history. Technical report,
http://scadahistory.com.
Sim
˜
oes, P., Cruz, T., Proenc¸a, J., and Montiero, E. (2015).
Specialized honeypots for scada systems. In Cyberse-
curity: Analytics, Technology and Automation.
Stackowiak, R., Licht, A., Mantha, V., and Nagode, L.
(2015). Internet of things standards. In Big Data and
the Internet of Things, pages 185–190. Springer.
Wilhoit, K. (2013). Who’s really attacking your ics equip-
ment? Trend Micro.
Yu, T., Sekar, V., Seshan, S., Agarwal, Y., and Xu, C.
(2015). Handling a trillion (unfixable) flaws on a
billion devices: Rethinking network security for the
internet-of-things. In Proceedings of the 14th ACM
Workshop on Hot Topics in Networks, HotNets-XIV,
pages 5:1–5:7, New York, NY, USA. ACM.
Zhu, B. and Sastry, S. (2010). Scada-specific intrusion de-
tection/prevention systems: a survey and taxonomy.
In Proc. of the 1st Workshop on Secure Control Sys-
tems (SCS).
IoTBD 2016 - International Conference on Internet of Things and Big Data
428