SECURITY AND AVAILABILITY MODELS FOR SMART BUILDING AUTOMATION SYSTEMS

Authors

  • Vyacheslav Kharchenko
  • Yuriy Ponochovnyi
  • Al-Sudani Mustafa Qahtan Abdulmunem
  • Artem Boyarchuk

DOI:

https://doi.org/10.47839/ijc.16.4.907

Keywords:

Markov model, building automation system, smart home, maintenances strategies, common maintenance.

Abstract

This article presents the information on control system of smart building, which is considered as a set of subsystems including a building automation system. The paper considers the three-level architecture of the building automation system components, including FPGA, communication and management levels. It is determined that the causes of failures and inaccessibility of the BAS architecture component can be both internal system and external factors, among which software defects and vulnerabilities are identified. BAS security and availability during its life cycle are assessed using the Fault-, Attack- and Availability-Tree and Markov models. Markov model is used to develop a number of strategies which help to recover system and to eliminate all the possible threats during systems life time. The models of BAS architecture with software defects and attacked vulnerabilities with general reliability (defect) and security (vulnerability) maintenance are analyzed in detail. The recommendations on the choice of strategies and service parameters are given.

References

ISO 16484-1:2010 Building Automation and Control Systems (BACS) – Part 1: Project Specification and Implementation, European Committee for Electrotechnical Standardization, Brussels, 2010, 24 p.

ISO 16484-2:2004 Building Automation and Control Systems (BACS) – Part 2: Hardware. European Committee for Electrotechnical Standardization, Brussels, 2004, 58 p.

A.-S. M. Q. Abdulmunem and V. S. Kharchenko, “Availability and security assessment of smart building automation systems: combining of attack tree analysis and Markov models,” in Proceedings of the Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI), Chania, 2016, pp. 302-307.

A.-S. M. Q. Abdulmunem, W. A.-K. Ahmed, V. Kharchenko, “Ata-based security assessment of smart building automation systems,” Radioelectronic and Computer Systems, Vol. 3, No. 77, pp. 30-40, 2016.

ISO/IEC 15408-1:2009 Information Technology – Security Techniques – Evaluation Criteria for IT Security - Part 1: Introduction and General Model, European Committee for Electrotechnical Standardization, Brussels, 2009, 74 p.

ISO/IEC 15408-2:2008 Information Technology – Security Techniques – Evaluation Criteria for IT Security – Part 2: Security Functional Components, European Committee for Electrotechnical Standardization, Brussels, 2008, 218 p.

U. Farooq, Z. Marrakchi, H. Mehrez, Tree-based Heterogeneous FPGA Architectures: Application Specific Exploration and Optimization, Springer, New York, 2012, 188 p.

L. Boyanov, Z. Minchev, “Cyber security challenges in smart homes,” in Proceedings of NATO-ARW “Best Practices and Innovative Approaches to Develop Cybersecurity and Resiliency Policy Framework”, Ohrid, Macedonia, June 10-12, 2013, pp. 99-114.

Du Suguo, Zhu Haojin, Security Assessment via Attack Tree Model, in: Security Assessment in Vehicular Networks, Springer, New York, 2013, pp. 9-16.

M. Grottke, H. Sun, R. M. Fricks, and K. S. Trivedi, “Ten fallacies of availability and reliability analysis,” in Proceedings of the 5th International Conference on Service Availability (ISAS’08), T. Nanya, F. Maruyama, A. Pataricza, and M. Malek (Eds.), Springer-Verlag, Berlin, Heidelberg, 2008, pp. 187-206.

T. Huffmire et al., “Managing security in FPGA-based embedded systems,” IEEE Design & Test of Computers, Vol. 25, No. 6, pp. 590-598, Nov.-Dec. 2008.

D. M. Nicol, W. H. Sanders, K. S. Trivedi, “Model-based evaluation: from dependability to security,” IEEE Transactions on Dependable and Secure Computing, Vol. 1, No. 1, pp. 48-65, 2004.

M. K. Binu, K. P. Zachariah, “New techniques to enhance FPGA based system security,” International Journal of Advanced Research in Computer Engineering & Technology, Vol. 1, Issue 5, pp. 91-94, 2012.

X. Ban, T. Xin, “Scenario-based information security risk evaluation method,” International Journal of Security and its Applications, Vol. 8, No. 5, pp.21-30, 2014.

W. Granzer, W. Kastner, G. Neugschwandtner, F. Praus, “Security in networked building automation systems,” in Proceedings of the IEEE International Workshop on Factory Communication Systems, 2006, pp. 283-292.

G. Osma, L. Amado, R. Villamizar, G. Ordoñez, “Building automation systems as tool to improve the resilience from energy behavior approach,” Procedia Engineering, Vol. 118, pp. 861-868, 2015.

S. V. Bhusari, Smart building integration, 2014, [Online]. Available: http://www.csemag.com/single-article/smart-building-integration/

E. L. Ler, Intelligent Building Automation System, [USQ Project], 2006, [Online]. Available: https://eprints.usq.edu.au/2507/

I. Kuon, R. Tessier. and J. Rose, “FPGA architecture: survey and challenges,” Foundations and Trends in Electronic Design Automation, Vol. 2(2), pp. 135-253, 2008.

V. S. Kharchenko, A.-S. M. Q. Abdulmunem, Y. L. Ponochovnyi, “Markov availability model of smart building automation system with separate and common reliability-security related maintenance,” Systems of Control, Navigation and Communication, Vol. 4(36), pp. 88-94. 2015.

ISO/IEC 61508-4:2010, Functional Safety of Electrical/Electronic/Programmable Electronic Safety-related Systems. Part 4: Definitions and Abbreviations, European Committee for Electrotechnical Standardization, Brussels, 2010, 42 p.

Downloads

Published

2017-12-30

How to Cite

Kharchenko, V., Ponochovnyi, Y., Abdulmunem, A.-S. M. Q., & Boyarchuk, A. (2017). SECURITY AND AVAILABILITY MODELS FOR SMART BUILDING AUTOMATION SYSTEMS. International Journal of Computing, 16(4), 194-202. https://doi.org/10.47839/ijc.16.4.907

Issue

Section

Articles