Management Solutions for Cyber-Physical Security in Smart Built Environment
Publication: Construction Research Congress 2022
ABSTRACT
Cybersecurity risks, together with the associated physical security risks, are hindering the advancement of smart building innovations and applications. The cyber-physical (CP) security for smart built environments is an emerging, critical challenge that cannot be addressed solely by existing cybersecurity means nor traditional physical security means. Currently, because of rapid developments in smart building-related technologies, such as the Internet of Things (IoT), Cyber-physical Systems, and Artificial Intelligence (AI), researchers and industry professionals need a state-of-the-art overview of the solutions for CP security threats in smart built environments. Through a systematic literature review, this paper summarizes and discusses existing management means and methods to achieve more secured built environments. The content analysis results show that most research studies are in the area of smart grids and power systems’ CP security, with focuses such as intrusion detection, cyberattack impact mitigation, system status monitoring, and system resilience improvement. The existing gaps of built-environment CP security research include human factors, coordinated attacks, preventive solutions, and the interactions between cybersecurity and physical security.
Get full access to this article
View all available purchase options and get full access to this chapter.
References
Agarwal, R. (2021). Graph-based Simulation for Cyber-physical Attacks on Smart Buildings. Master of Science in Computer Science.
Ashok, A., Govindarasu, M., and Wang, J. (2017). “Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid.” Proceedings of the IEEE, 105(7), 1389–1407.
Backhaus, S., Bent, R., Bono, J., Lee, R., Tracey, B., Wolpert, D., Xie, D., and Yildiz, Y. (2013). “Cyber-Physical Security: A Game Theory Model of Humans Interacting Over Control Systems.” IEEE Transactions on Smart Grid, 4(4), 2320–2327.
Bretas, A. S., Bretas, N. G., Carvalho, B., Baeyens, E., and Khargonekar, P. P. (2017). “Smart grids cyber-physical security as a malicious data attack: An innovation approach.” Electric Power Systems Research, 149, 210–219.
Cardenas, A. A., Amin, S., Sinopoli, B., Giani, A., Perrig, A., and Sastry, S. (2009). “Challenges for Securing Cyber Physical Systems.” Workshop on Future Directions in Cyber-physical Systems Security, DHS, 23, July, 2009.
Caviglione, L., Lalande, J.-F., Mazurczyk, W., and Wendzel, S. (2015). “Analysis of Human Awareness of Security and Privacy Threats in Smart Environments.” Human Aspects of Information Security, Privacy, and Trust. HAS 2015. Lecture Notes in Computer Science, Springer.
Čeleda, P., Krejčí, R., and Krmíček, V. (2012). “Flow-Based Security Issue Detection in Building Automation and Control Networks.” 18th European Conference on Information and Communications Technologies (EUNICE) 2012, Springer, Budapest, Hungary.
Clark, R. M., and Hakim, S. (2017). “Protecting Critical Infrastructure at the State, Provincial, and Local Level: Issues in Cyber-Physical Security.” Cyber-Physical Security: Protecting Critical Infrastructure at the State and Local Level, Springer-Verlag Berlin, Berlin, 1–17.
He, X., Yang, X., Yu, W., Lin, J., and Yang, Q. (2018). “Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems.” Sensors (Basel), 18(2).
Hong, J., Nuqui, R. F., Kondabathini, A., Ishchenko, D., and Martin, A. (2019). “Cyber Attack Resilient Distance Protection and Circuit Breaker Control for Digital Substations.” IEEE Transactions on Industrial Informatics, 15(7), 4332–4341.
Jiow, H. J. (2017). “Efforts to Get People Involved in Cyber-Physical Security: Case Studies of Australia and Singapore.” Cyber-Physical Security: Protecting Critical Infrastructure at the State and Local Level, Springer-Verlag Berlin, Berlin, 221–232.
Krejčí, R., Čeleda, P., and Dobrovolný, J. (2012). “Traffic measurement and analysis of building automation and control networks.” IFIP International Conference on Autonomous Infrastructure, Management and Security, Springer, 62–73.
Lo, C.-H., and Ansari, N. (2013). “CONSUMER: A Novel Hybrid Intrusion Detection System for Distribution Networks in Smart Grid.” IEEE Transactions on Emerging Topics in Computing, 1(1), 33–44.
Moslehi, K., and Kumar, R. “Smart Grid - A Reliability Perspective.” Proc., IEEE PES Conference on “Innovative Smart Grid Technologies” January 19-20, 2010.
Rao, N. S. V., Ma, C. Y. T., Hausken, K., He, F., Yau, D. K. Y., and Zhuang, J. (2018). “Defense Strategies for Asymmetric Networked Systems with Discrete Components.” Sensors (Basel), 18(5).
Roof, K., and Oleru, N. (2008). “Public Health: Seattle and King County’s Push for the Built Environment.” Journal of Environmental Health, 71(1), 24–27.
Shan, X. G., and Zhuang, J. (2020). “A game-theoretic approach to modeling attacks and defenses of smart grids at three levels.” Reliability Engineering & System Safety, 195.
Sjelin, N., and White, G. (2017). “The Community Cyber Security Maturity Model.” Cyber-Physical Security: Protecting Critical Infrastructure at the State and Local Level, 161–183.
Srivastava, A. K., Ernster, T. A., Liu, R., and Krishnan, V. G. (2018). “Graph-theoretic algorithms for cyber-physical vulnerability analysis of power grid with incomplete information.” Journal of Modern Power Systems and Clean Energy, 6(5), 887–899.
Stefanov, A., Liu, C.-C., Govindarasu, M., and Wu, S.-S. (2015). “SCADA modeling for performance and vulnerability assessment of integrated cyber-physical systems.” International Transactions on Electrical Energy Systems, 25(3), 498–519.
Sugawara, T., Cyr, B., Rampazzi, S., Genkin, D., and Fu, K. “Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems.” Proc., the 29th USENIX Security Symposium, 2631–2648.
Symantec Corporation. (2014). Internet security threat report 2014 (Vol. 19).
Vellaithurai, C., Srivastava, A., Zonouz, S., and Berthier, R. (2015). “CPIndex: Cyber-Physical Vulnerability Assessment for Power-Grid Infrastructures.” IEEE Transactions on Smart Grid, 6(2), 566–575.
Venkataramanan, V., Hahn, A., and Srivastava, A. (2020). “CP-SAM: Cyber-Physical Security Assessment Metric for Monitoring Microgrid Resiliency.” IEEE Transactions on Smart Grid, 11(2), 11.
Weerakkody, S., and Sinopoli, B. (2019). “Challenges and Opportunities: Cyber-Physical Security in the Smart Grid.” Smart Grid Control: Overview and Research Opportunities, Springer, New York, 257–273.
Zhang, Y., Krishnan, V. V. G., Pi, J., Kaur, K., Srivastava, A., Hahn, A., and Suresh, S. (2020). “Cyber Physical Security Analytics for Transactive Energy Systems.” IEEE Transactions on Smart Grid.
Zonouz, S., Davis, C. M., Davis, K. R., Berthier, R., Bobba, R. B., and Sanders, W. H. (2014). “SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures.” IEEE Transactions on Smart Grid, 5(1), 3–13.
Xiang, Y., Wang, L., and Liu, N. (2017). “Coordinated attacks on electric power systems in a cyber-physical environment.” Electric Power Systems Research, 149, 156–168.
Xu, Z., and Zhuang, J. (2019). “A Study on a Sequential One‐Defender‐N‐Attacker Game.” Risk Analysis, 39(6), 1414–1432.
Zhu, Q. (2019). “Multilayer Cyber-Physical Security and Resilience for Smart Grid.” Smart Grid Control: Overview and Research Opportunities, Springer, New York, 225–239.
Information & Authors
Information
Published In
History
Published online: Mar 7, 2022
Authors
Metrics & Citations
Metrics
Citations
Download citation
If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.