ENSURING SAFETY IN BUILDING AUTOMATION SYSTEMS
DOI:
https://doi.org/10.31891/2219-9365-2024-78-31Keywords:
security, building automation system, IoT technologiesAbstract
The work analyzes buildings that are containers of many different types of human activity supported by different types of technologies. A building's type and utility determine its unique security needs. Lack of proper interoperability and security architecture standards creates potential hazards and threats to control, especially for security-critical facilities. On the other hand, buildings are heterogeneous. Different buildings are designed for different purposes and therefore have different requirements. The proposed solution is robust due to minimal kernel-space microkernel functionality and modular architecture. At the same time, it has backward compatibility, since outdated programs can be placed in a virtual environment, and the proxy server architecture is protected by the network communication protocol of building automation systems using network tunneling. To evaluate the proposed solution, various building automation scenarios such as laboratory temperature control scenario, key management scenario and corresponding attacks were implemented. These experiments show the security advantages of the proposed solution and the tangible efficiency.
The presented virtualization approach uses a formally proven micro-visor for hosting legacy building automation systems. This approach is based on facilitating adaptation while balancing cost and security trade-offs. In addition, it uses a formally proven microkernel for its unique benefits of proven security assurance and advances in virtualization technology. The system may evolve over time as software products change. A secure computing platform for the next-generation building authentication system based on cyber-physical systems technology has been developed.
Directions for further research are improvements in the approach based on modifications in the software of IoT devices. These improvements will be related to taking into account the protocols of interaction of tools and interfaces of operating systems.