4.7 Article

Application of data-driven attack detection framework for secure operation in smart buildings

期刊

SUSTAINABLE CITIES AND SOCIETY
卷 69, 期 -, 页码 -

出版社

ELSEVIER
DOI: 10.1016/j.scs.2021.102816

关键词

Building management system (BMS); Smart buildings; Anomaly detection; Industrial control system (ICS); HVAC systems; Isolation Forest (IF); Convolutional Neural Network (CNN)

资金

  1. Qatar National Research Fund (a member of Qatar Foundation) through the National Priorities Research Program (NPRP) [NPRP 10-0206-170360]

向作者/读者索取更多资源

This paper presents an analysis of the security of the HVAC system using a TRNSYS model and a data-driven attack detection strategy. Three schemes were investigated, including PCA feature extraction and 1D CNN-based encoder for temporal feature extraction, showing promising capabilities in attack detection with high reliability and low computational cost compared to standard machine-learning approaches.
With the rapid advancement in the industrial control technologies and the increased deployment of the industrial Internet of Things (IoT) in the buildings sector, this work presents an analysis of the security of the Heating, Ventilation, and Air Conditioning (HVAC) system which is a major component of the Building Management System (BMS), has become critical. This paper presents a Transient System Simulation Tool (TRNSYS) model of a 12-zone HVAC system that allows assessing the cybersecurity aspect of HVAC systems. The thermal comfort model and the estimated total power usage are used to assess the magnitude of the malicious actions launched against the HVAC system. Simulation data are collected and used to develop and validate a semi-supervised, data-driven attack detection strategy using Isolation Forest (IF) for the system under study. Three schemes of the proposed approach are investigated, which are: using raw data, using Principal Component Analysis (PCA) for feature extraction, and using 1D Convolutional Neural Network (CNN)-based encoder for temporal feature extraction. The proposed approach is compared with standard machine-learning approaches, and it demonstrates a promising capability in attack detection for a range of attack scenarios with high reliability and low computational cost.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据