Chapter
Mar 7, 2022

Graph-Based Simulation for Cyber-Physical Attacks on Smart Buildings

Publication: Construction Research Congress 2022

ABSTRACT

As buildings evolve toward the envisioned smart building paradigm, smart buildings’ cybersecurity issues, and physical security issues are mingling. Although research studies have been conducted to detect and prevent physical (or cyber) intrusions to smart building systems (SBS), it is still unknown (1) how one type of intrusion facilitates the other and (2) how such synergic attacks compromise the security protection of whole systems. To investigate both research questions, the authors propose a graph-based testbed to simulate cyber-physical attacks on smart buildings. The testbed models both cyber and physical accesses of a smart building in an integrated graph and simulates diverse cyber-physical attacks to assess their synergic impacts on the building and its systems. In this paper, the authors present the testbed design and the developed prototype, SHSim. An experiment is conducted to simulate attacks on multiple smart home designs and to demonstrate the functions and feasibility of the proposed simulation system.

Get full access to this article

View all available purchase options and get full access to this chapter.

REFERENCES

Chi, Z., Li, Y., Liu, X., Wang, W., Yao, Y., Zhu, T., and Zhang, Y. (2020). “Countering Cross- Technology Jamming Attack.” Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec ’20, New York, NY, USA, Association for Computing Machinery, 99–110.
Ciholas, P., Lennie, A., Sadigova, P., and Such, J. M. (2019). “The security of smart buildings: a systematic literature review.
Dong, B., Prakash, V., Feng, F., and O’Neill, Z. (2019). A review of smart building sensing system for better indoor environment control. Energy and Buildings, 199, 29–46.
Gao, X., Tang, S., Pishdad-Bozorgi, P., and Shelden, D. (2019). Foundational research in integrated building Internet of Things (IoT) data standards. Center for the Development and Application of Internet of Things Technologies.
Gartner. (2019). Predicts 2020: Security and Risk Management Programs, <https://www.gartner.com/en/documents/3976275/predicts-2020-security-and-risk-management-programs>. [Accessed August 25st, 2021].
Google. (2021). Google Nest, build your connected home, <https://store.google.com/us/category/connected_home?>. [Accessed August 25st, 2021].
Gómez, J. R., Vargas Montoya, H. F., and Henao, A. L. (2018). “Implementation of a wormhole attack on wireless sensor networks with xbee s2c devices.” Advances in Computing, J. E. Serrano C. and J. C. Martínez-Santos, eds., Cham, Springer International Publishing, 98–112.
Grinberg, M. (2018). Flask web development: developing web applications with Python. O’Reilly Media, Inc.
Hager, M., Schellenberg, S., Seitz, J., Mann, S., and Schorcht, G. (2012). “Secure and qos-aware communications for smart home services.” 2012 35th International Conference on Telecommu- nications and Signal Processing (TSP), 11–17.
Hu, Y., Castro-Lacouture, D., Eastman, C. M., and Navathe, S. B. (2021). Component Change List Prediction for BIM-Based Clash Resolution from a Graph Perspective. Journal of Construction Engineering and Management, 147(8), 04021085.
Huraj, L., Šimon, M., and Horák, T. (2020). “Resistance of iot sensors against ddos attack in smart home environment.” Sensors, 20(18).
Mamonova, G., and Maidaniuk, N. (2020). Mathematical Tools for the Internet of Things Analysis. Cybernetics and Systems Analysis, 56(4), 621–627.
Mundt, T., and Wickboldt, P. (2016). “Security in building automation systems - a first analysis.” 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 1–8.
Node.js. “About Node.js.” Node.js, <https://nodejs.org/en/about/>. [Accessed April 21st, 2021].
Porter, S., Tan, T., Tan, T., and West, G. (2014). “Breaking into bim: Performing static and dynamic security analysis with the aid of bim.” Automation in Construction, 40, 84–95.
React. (2021). “About React.js, <https://reactjs.org/>. [Accessed April 20th, 2021].
Skandhakumar, N., Salim, F., Reid, J., Drogemuller, R., and Dawson, E. (2016). “Graph theory based representation of building information models for access control applications.” Automation in Construction, 68, 44–51.
Sugawara, T., Cyr, B., Rampazzi, S., Genkin, D., and Fu, K. (2020). “Light commands: Laser-based audio injection attacks on voice-controllable systems.
System, S. (2021). “Smart Home Layout, <https://www.surrealsystems.com/solutions/home- solutions/smart-home-layout>. [Accessed April 18, 2021].
Trudeau, R. (1993). Introduction to Graph Theory. Dover Books on Mathematics.
West, D. B. (2001). Introduction to graph theory (Vol. 2). Upper Saddle River: Prentice hall.
Wilhelm, M., Martinovic, I., Schmitt, J., and Lenders, V. (2011). “Short Paper: Reactive Jamming in Wireless Networks—How Realistic is the Threat?.” 47–52 (06).
Zargar, S. T., Joshi, J., and Tipper, D. (2013). “A survey of defense mechanisms against distributed denial of service (ddos) flooding attacks.” IEEE Communications Surveys Tutorials, 15(4), 2046–2069.

Information & Authors

Information

Published In

Go to Construction Research Congress 2022
Construction Research Congress 2022
Pages: 28 - 37

History

Published online: Mar 7, 2022

Permissions

Request permissions for this article.

Authors

Affiliations

Rahul Agarwal [email protected]
1Dept. of Computer Science, Virginia Polytechnic Institute and State Univ., Blacksburg, VA. Email: [email protected]
2Dept. of Computer Science, Virginia Polytechnic Institute and State Univ., Blacksburg, VA. Email: [email protected]
Xinghua Gao [email protected]
3Myers-Lawson School of Construction, Virginia Polytechnic Institute and State Univ., Blacksburg, VA. Email: [email protected]
4Dept. of Computer Science, Virginia Polytechnic Institute and State Univ., Blacksburg, VA. Email: [email protected]

Metrics & Citations

Metrics

Citations

Download citation

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.

View Options

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Paper
$35.00
Add to cart
Buy E-book
$138.00
Add to cart

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Paper
$35.00
Add to cart
Buy E-book
$138.00
Add to cart

Media

Figures

Other

Tables

Share

Share

Copy the content Link

Share with email

Email a colleague

Share