SECURITY AND AVAILABILITY MODELS FOR SMART BUILDING AUTOMATION SYSTEMS
Keywords:Markov model, building automation system, smart home, maintenances strategies, common maintenance.
AbstractThis article presents the information on control system of smart building, which is considered as a set of subsystems including a building automation system. The paper considers the three-level architecture of the building automation system components, including FPGA, communication and management levels. It is determined that the causes of failures and inaccessibility of the BAS architecture component can be both internal system and external factors, among which software defects and vulnerabilities are identified. BAS security and availability during its life cycle are assessed using the Fault-, Attack- and Availability-Tree and Markov models. Markov model is used to develop a number of strategies which help to recover system and to eliminate all the possible threats during systems life time. The models of BAS architecture with software defects and attacked vulnerabilities with general reliability (defect) and security (vulnerability) maintenance are analyzed in detail. The recommendations on the choice of strategies and service parameters are given.
ISO 16484-1:2010 Building Automation and Control Systems (BACS) – Part 1: Project Specification and Implementation, European Committee for Electrotechnical Standardization, Brussels, 2010, 24 p.
ISO 16484-2:2004 Building Automation and Control Systems (BACS) – Part 2: Hardware. European Committee for Electrotechnical Standardization, Brussels, 2004, 58 p.
A.-S. M. Q. Abdulmunem and V. S. Kharchenko, “Availability and security assessment of smart building automation systems: combining of attack tree analysis and Markov models,” in Proceedings of the Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI), Chania, 2016, pp. 302-307.
A.-S. M. Q. Abdulmunem, W. A.-K. Ahmed, V. Kharchenko, “Ata-based security assessment of smart building automation systems,” Radioelectronic and Computer Systems, Vol. 3, No. 77, pp. 30-40, 2016.
ISO/IEC 15408-1:2009 Information Technology – Security Techniques – Evaluation Criteria for IT Security - Part 1: Introduction and General Model, European Committee for Electrotechnical Standardization, Brussels, 2009, 74 p.
ISO/IEC 15408-2:2008 Information Technology – Security Techniques – Evaluation Criteria for IT Security – Part 2: Security Functional Components, European Committee for Electrotechnical Standardization, Brussels, 2008, 218 p.
U. Farooq, Z. Marrakchi, H. Mehrez, Tree-based Heterogeneous FPGA Architectures: Application Specific Exploration and Optimization, Springer, New York, 2012, 188 p.
L. Boyanov, Z. Minchev, “Cyber security challenges in smart homes,” in Proceedings of NATO-ARW “Best Practices and Innovative Approaches to Develop Cybersecurity and Resiliency Policy Framework”, Ohrid, Macedonia, June 10-12, 2013, pp. 99-114.
Du Suguo, Zhu Haojin, Security Assessment via Attack Tree Model, in: Security Assessment in Vehicular Networks, Springer, New York, 2013, pp. 9-16.
M. Grottke, H. Sun, R. M. Fricks, and K. S. Trivedi, “Ten fallacies of availability and reliability analysis,” in Proceedings of the 5th International Conference on Service Availability (ISAS’08), T. Nanya, F. Maruyama, A. Pataricza, and M. Malek (Eds.), Springer-Verlag, Berlin, Heidelberg, 2008, pp. 187-206.
T. Huffmire et al., “Managing security in FPGA-based embedded systems,” IEEE Design & Test of Computers, Vol. 25, No. 6, pp. 590-598, Nov.-Dec. 2008.
D. M. Nicol, W. H. Sanders, K. S. Trivedi, “Model-based evaluation: from dependability to security,” IEEE Transactions on Dependable and Secure Computing, Vol. 1, No. 1, pp. 48-65, 2004.
M. K. Binu, K. P. Zachariah, “New techniques to enhance FPGA based system security,” International Journal of Advanced Research in Computer Engineering & Technology, Vol. 1, Issue 5, pp. 91-94, 2012.
X. Ban, T. Xin, “Scenario-based information security risk evaluation method,” International Journal of Security and its Applications, Vol. 8, No. 5, pp.21-30, 2014.
W. Granzer, W. Kastner, G. Neugschwandtner, F. Praus, “Security in networked building automation systems,” in Proceedings of the IEEE International Workshop on Factory Communication Systems, 2006, pp. 283-292.
G. Osma, L. Amado, R. Villamizar, G. Ordoñez, “Building automation systems as tool to improve the resilience from energy behavior approach,” Procedia Engineering, Vol. 118, pp. 861-868, 2015.
S. V. Bhusari, Smart building integration, 2014, [Online]. Available: http://www.csemag.com/single-article/smart-building-integration/
E. L. Ler, Intelligent Building Automation System, [USQ Project], 2006, [Online]. Available: https://eprints.usq.edu.au/2507/
I. Kuon, R. Tessier. and J. Rose, “FPGA architecture: survey and challenges,” Foundations and Trends in Electronic Design Automation, Vol. 2(2), pp. 135-253, 2008.
V. S. Kharchenko, A.-S. M. Q. Abdulmunem, Y. L. Ponochovnyi, “Markov availability model of smart building automation system with separate and common reliability-security related maintenance,” Systems of Control, Navigation and Communication, Vol. 4(36), pp. 88-94. 2015.
ISO/IEC 61508-4:2010, Functional Safety of Electrical/Electronic/Programmable Electronic Safety-related Systems. Part 4: Definitions and Abbreviations, European Committee for Electrotechnical Standardization, Brussels, 2010, 42 p.
How to Cite
LicenseInternational Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:
• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.