Security in Building Automation Systems
Published on : Tuesday 30-11--0001
Rohit Waghadhare is a Research/Consulting Team Lead at MarketsandMarkets in Semiconductor and Electronics practices
Building automation system (BAS) deals in controlling and monitoring the buildings. The aspects that BAS monitors include monitoring heating, ventilation, and air conditioning equipment (HVAC); monitoring the security of inhabitants through access control systems; and fire alarm systems. It also generates reports on facility management and performs energy management functions to reduce energy and operating costs. BAS offers new proficiencies and features through a connected set of devices and applications. The building temperature variation due to external weather conditions and occupancy can be controlled or monitored by BAS. The systems installed can alert the security personnel when the protected area is trespassed. BAS play a role in optimizing energy usage for the systems.
Building automation systems encompass open architectures, standard connectivity platforms, and automation functions that help in generating data, which can be further optimized for efficient allocation of resources. The emergence of Internet of Things (IoT) and its subsequent implementation is providing unmatched analytical insights that are helping in improving the efficiency. Implementation of IoT enables a centralized access and control various building management systems operational in the same building. As buildings become data intensive, traditional storage solutions are being replaced by cloud infrastructures that are both scalable and cost-effective.
During the initial years of BAS consisted of only the HVAC equipment. However, the success of this system led to the adoption of other services such as lighting, water and waste management, and security services. Physical security applications in BAS consist of fire suppression systems, CCTV, and access control systems. This article mainly revolves around network security threats that have been affecting the buildings.
Security issues concerning the BAS
Currently, BAS industry is at a point where genuine concerns are emerging on the security of building control systems. Nowadays, cyberattacks on companies, government institutions, and other newly built buildings are increasing. Malicious software can penetrate a building system through unsecured networks and cause disruptions. Many times threats can result in loss of communications, access to sensitized data, and it may also affect the operations of equipment such as CCTV located in the buildings. Such cyberattacks are not only limited to buildings but also breach the securities or firewalls of other systems connecting the buildings. In recent years, we have witnessed, many buildings are installed with two-way communication systems for advanced monitoring and controlling of resources from the data center. These data centers are also vulnerable to cyberattacks.
Measures adopted to reduce or avoid security threats
Securing the BAS is an ongoing process, and the safety measures need to be followed regularly for its efficient performance.
- Appoint a team of network administrators to monitor the building management systems regularly.
- Adopt a holistic approach when installing all the components/systems in the buildings.
- Identify the vulnerable pockets and monitor them closely.
- Mark the areas where communication lines are running and monitor the installed physical security systems, such as CCTVs.
- Ensure that information technology systems have adequate firewalls.
- Take back-ups of all the data generated and secure it to prevent data theft.
Conclusion
The increase in data transfer between the devices and the resulting automation is creating unmatched opportunity to save cost and efficiently use resources. This, in turn, results in increased business value. Integration of cloud, data analytics, and IoT also provide a broad platform for innovation that can translate a humongous energy-consuming giant to run an enterprise efficiently. However, with the increased data connectivity nodes and presence of huge data generation comes the risk of cybersecurity threats. These threats if managed properly with adequate monitoring than the risks can be mitigated.