Skip to main content

Cybersecurity and Optimization in Smart “Autonomous” Buildings

  • Chapter
  • First Online:
Autonomy and Artificial Intelligence: A Threat or Savior?

Abstract

Significant resources have been invested in making buildings “smart” by digitizing, networking and automating key systems and operations. Smart autonomous buildings create new energy efficiency, economic and environmental opportunities. But as buildings become increasingly networked to the Internet, they can also become more vulnerable to various cyber threats. Automated and Internet-connected buildings systems, equipment, controls, and sensors can significantly increase cyber and physical vulnerabilities that threaten the confidentiality, integrity, and availability of critical systems in organizations. Securing smart autonomous buildings presents a national security and economic challenge to the nation. Ignoring this challenge threatens business continuity and the availability of critical infrastructures that are enabled by smart buildings. In this chapter, the authors address challenges and explore new opportunities in securing smart buildings that are enhanced by machine learning, cognitive sensing, artificial intelligence (AI) and smart-energy technologies. The chapter begins by identifying cyber-threats and challenges to smart autonomous buildings. Then it provides recommendations on how AI enabled solutions can help smart buildings and facilities better protect, detect and respond to cyber-physical threats and vulnerabilities. Next, the chapter will provide case studies that examine how combining AI with innovative smart-energy technologies can increase both cybersecurity and energy efficiency savings in buildings. The chapter will conclude by proposing recommendations for future cybersecurity and energy optimization research for examining AI enabled smart-energy technology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    As defined by Wikipedia at https://en.wikipedia.org/wiki/Zero-day_(computing), a zero-day (also known as zero-hour or 0-day) vulnerability is an undisclosed computer-software vulnerability that hackers can exploit to adversely affect computer programs, data, additional computers or a network. It is known as a “zero-day” because once the flaw becomes known, the software’s author has zero days in which to plan and advise any mitigation against its exploitation (for example, by advising workarounds or by issuing patches).

  2. 2.

    As defined by Wikipedia at https://en.wikipedia.org/wiki/Whitelist, A whitelist is a list or register of entities that are being provided a privilege, service, mobility, access or recognition. Entities on the list will be accepted, approved and/or recognized. Whitelisting is the reverse of blacklisting, the practice of identifying entities that are denied, unrecognized, or ostracized.

  3. 3.

    According to Technopedia at https://www.techopedia.com/definition/13835/patch-management, Patch management is a strategy for managing patches or upgrades for software applications and technologies. A patch management plan can help a business or organization handle these changes efficiently. Technopedia defined Network Inventory Management at https://www.techopedia.com/definition/29987/network-inventory-management as, Network inventory management is the process of keeping records of all the IT or network assets that make up the network.

Abbreviations

AI:

Artificial Intelligence

AITA:

Artificial Intelligence based Insider Threat Analyzer

B2G:

Buildings-to-Grid

BACnet:

Building Automation Control network

BAS:

Building Automation System

B-C2M2:

Building Cybersecurity Capability Maturity Model

BCF:

Building Cybersecurity Framework

BEMS:

Building Energy Management System

CCA:

Critical Cyber Assets

CCTV:

Closed-Circuit Television

CFR:

Commercial, Federal, Residential buildings

CI:

Critical Infrastructure

CMT:

Configuration Management Tool

DDoS:

Distributed Denial of Service

DER:

Distributed Energy Resource

DHS:

Department of Homeland Security

DOE:

Department of Energy

DoS:

Denial of Service

EERE:

Office of Energy Efficiency and Renewable Energy

EIA:

U.S. Energy Information Administration

EIoT:

Energy Internet of Things

FCU:

Fan Coil Unit

FPS:

Federal Protective Service

GAO:

U.S. Government Accountability Office

HIDPS:

Host Intrusion Detection and Prevention System

HIDS:

Host Intrusion Detection System

HVAC:

Heating, Ventilation and Air Conditioning

ICS:

Industrial Control System

ICS-CERT:

Industrial Control Systems Cyber Emergency Response Team

ICT:

Information and Communications Technology

ID:

Identification

IDPS:

Intrusion Detection and Prevention System

IDS:

Intrusion Detection System

IED:

Intelligent Electronic Device

IoT:

Internet of Things

IPS:

Intrusion Prevention System

IT:

Information Technology

MAC:

Media Access Control

NBAD:

Network Behavior Anomaly Detection

NCA:

Network Connected Assets

NIDPS:

Network Intrusion Detection and Prevention System

NIDS:

Network Intrusion Detection System

NIST:

National Institute of Standards and Technology

OT:

Operations Technology

PIDS:

Physical Intrusion Detection System

PLC:

Programmable Logic Controller

PNNL:

Pacific Northwest National Laboratory

RCM:

Risk Characterization Matrix

RFID:

Radio Frequency Identification

RTU:

Remote Terminal Unit

SCADA:

Supervisory Control and Data Acquisition

SCI-RAD:

Social Engineering Autonomy for Cyber Intrusion Monitoring and Real-time Anomaly Detecting

SIEM:

Security Information and Event Management/ Log Analyzer

SSID:

Service Set Identifier

References

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael Mylrea .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Mylrea, M., Gourisetti, S.N.G. (2017). Cybersecurity and Optimization in Smart “Autonomous” Buildings. In: Lawless, W., Mittu, R., Sofge, D., Russell, S. (eds) Autonomy and Artificial Intelligence: A Threat or Savior?. Springer, Cham. https://doi.org/10.1007/978-3-319-59719-5_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-59719-5_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-59718-8

  • Online ISBN: 978-3-319-59719-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics