Application of data-driven attack detection framework for secure operation in smart buildings

  • Mariam Elnour
  • , Nader Meskin
  • , Khaled Khan
  • , Raj Jain

Research output: Contribution to journalArticlepeer-review

51 Scopus citations

Abstract

With the rapid advancement in the industrial control technologies and the increased deployment of the industrial Internet of Things (IoT) in the buildings sector, this work presents an analysis of the security of the Heating, Ventilation, and Air Conditioning (HVAC) system which is a major component of the Building Management System (BMS), has become critical. This paper presents a Transient System Simulation Tool (TRNSYS) model of a 12-zone HVAC system that allows assessing the cybersecurity aspect of HVAC systems. The thermal comfort model and the estimated total power usage are used to assess the magnitude of the malicious actions launched against the HVAC system. Simulation data are collected and used to develop and validate a semi-supervised, data-driven attack detection strategy using Isolation Forest (IF) for the system under study. Three schemes of the proposed approach are investigated, which are: using raw data, using Principal Component Analysis (PCA) for feature extraction, and using 1D Convolutional Neural Network (CNN)-based encoder for temporal feature extraction. The proposed approach is compared with standard machine-learning approaches, and it demonstrates a promising capability in attack detection for a range of attack scenarios with high reliability and low computational cost.

Original languageEnglish
Article number102816
JournalSustainable Cities and Society
Volume69
DOIs
StatePublished - Jun 2021

Keywords

  • Anomaly detection
  • Building management system (BMS)
  • Convolutional Neural Network (CNN)
  • HVAC systems
  • Industrial control system (ICS)
  • Isolation Forest (IF)
  • Smart buildings

Fingerprint

Dive into the research topics of 'Application of data-driven attack detection framework for secure operation in smart buildings'. Together they form a unique fingerprint.

Cite this