http://iet.metastore.ingenta.com
1887

Cyber Security of Intelligent Buildings: A Review

Cyber Security of Intelligent Buildings: A Review

For access to this article, please select a purchase option:

Buy article PDF
$19.95
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
— Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The concept of an intelligent building has existed for over 30 years and is seen as a solution to a number of economic and environmental problems. Intelligent buildings are often seen as a means of improving the energy efficiency of the built environment. However, they are increasingly being promoted as a means of improving the operational efficiency of buildings, providing enhanced building and personal security, and improving the availability of management information to support better and quicker decision making. The potential cyber security risks inherent in the adoption of intelligent buildings are rarely discussed.

References

    1. 1)
    2. 2)
      • [2]. Clements-Croome, D.J.: ‘What do we mean by intelligent buildings?’, Autom. Constr., 1997, 6, (5), pp. 395400.
    3. 3)
      • [3]. DEGW & Teknibank: ‘The intelligent building in Europe: executive summary’ (British Council of Offices, London, 1992)(Occasional Paper 3).
    4. 4)
      • [4]. Ehrlich, P.: ‘What is an intelligent building’, 2005. Available at: http://www.automatedbuildings.com/news/aug05/articles/ibtpe.htm, accessed 10 June 2013.
    5. 5)
      • [5]. Harrison, A.: ‘Intelligent building to the distributed workplace’, in Worthington, J. (Ed.): ‘Reinventing the workplace’ (Architectural Press, Oxford, 2006, 2nd edn.), pp. 100103.
    6. 6)
      • [6]. Boyes, H.A.: ‘Resilience and cyber security of technology in the built environment’ (The Institution of Engineering and Technology, London, 2013), pp. 810. Available at: http://www.theiet.org/resources/standards/cyber-buildings.cfm, accessed 18 June 2013.
    7. 7)
      • [7]. International Air Transport Association: ‘Fact sheet: Industry statistics’, Canada, 2012. Available at: http://www.iata.org/pressroom/facts_figures/fact_sheets/Documents/industry-facts.pdf, accessed 10 June 2013.
    8. 8)
      • [8]. Purnell, J.: ‘Information technology systems at airports: a primer’ (Transportation Research Board, Washington, DC, 2012), pp. 7087.
    9. 9)
      • [9]. International Telecommunications Union: ‘Series X: data networks, open system communications and security, telecommunications security: overview of cybersecurity’ (I. T. U., Geneva, Switzerland, 2008)(ITU-T X.1205).
    10. 10)
      • [10]. Greene, S.S.: ‘Security policies and procedures’ (Pearson Education, 2006).
    11. 11)
      • [11]. Norton, R.: ‘Unintended consequences’, in Henderson, D.R. (Ed.): ‘The concise encyclopaedia of economics’ (Liberty Fund Inc, Indianapolis, 2008, 3rd edn.).
    12. 12)
      • [12]. Boyes, H.A.: ‘Resilience and cyber security of technology in the built environment’ (The Institution of Engineering and Technology, London, 2013), p. 17.
    13. 13)
      • [13]. Boyes, H.A.: ‘Resilience and cyber security of technology in the built environment’ (The Institution of Engineering and Technology, London, 2013), pp. 1819.
    14. 14)
      • [14]. Connett, D.: ‘Four jailed after Brink's-Mat bullion trial’. The Independent, 1992. 18 August 1992. Available at: http://www.independent.co.uk/news/uk/four-jailed-after-brinksmat-bullion-trial-1540982.html, accessed 18 June 2013.
    15. 15)
      • [15]. Stewart, J.M., Tittel, E., Chapple, M.: ‘CISSP: certified information systems security professional study guide’ (Wiley, Indianapolis, 2011, 5th edn.), p. 240.
    16. 16)
      • [16]. BIM Taskgroup: ‘BIM protocol – overview’, 2013. Available at: http://www.bimtaskgroup.org/bim-protocol, accessed 26 June 2013.
    17. 17)
      • [17]. Weiss, J.: ‘Protecting industrial control systems from electronic threats’ (Momentum Press, New York, 2010), p. 34.
    18. 18)
      • [18]. Rios, B.: ‘Google's buildings hackable’, 2013. Available at: http://www.cylance.com/techblog/Googles-Buildings-Hackable.shtml, accessed 26 June 2013.
    19. 19)
      • [19]. Symantec: ‘W32.Stuxnet’, 2010. Available at: http://www.symantec.com/security_response/writeup.jsp?docid=2010-071400-3123-99, accessed 26 June 2013.
    20. 20)
      • [20]. Kaspersky Lab.: ‘Kaspersky lab experts provide in-depth analysis of flame's C&C infrastructure’, 2012. Available at: http://www.kaspersky.com/about/news/virus/2012/Kaspersky_Lab_Experts_Provide_In_Depth_Analysis_of_Flames_Infrastructure, accessed 26 June 2013.
    21. 21)
      • [21]. Bencsáth, B., Pék, G., Buttyán, L., Félegyházi, M.: ‘Duqu: analysis, detection, and lessons learned’. ACM European Workshop on System Security (EuroSec), 2012, vol. 2012.
    22. 22)
      • [22]. Hickey, A.R.: ‘Schneider electric: cloud computing key to power, energy management’, 2010. Available at: http://www.crn.com/news/cloud/227500884/schneider-electric-cloud-computing-key-to-power-energy-management.htm, accessed 26 June 2013.
    23. 23)
      • [23]. Sans Institute: ‘The critical security controls’, 2013. Available at: http://www.sans.org/critical-security-controls, accessed 26 June 2013.
    24. 24)
      • [24]. Trustworthy Software Initiative: ‘About the TSI’, 2013. Available at: http://www.uk-tsi.org.uk/?page_id=105, accessed 26 June 2013.
http://iet.metastore.ingenta.com/content/reference/10.1049/etr.2014.0008
Loading

Related content

content/reference/10.1049/etr.2014.0008
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address