Composite vulnerabilities and hybrid threats for smart sensors and field busses in building automation: a review

  • Michael Gerhalter
  • , Keshav Dahal*
  • *Corresponding author for this work

Research output: Contribution to journalReview articlepeer-review

5 Downloads (Pure)

Abstract

In the IT sector, the relevance of looking at security from many different angles and the inclusion of different areas is already known and understood. This approach is much less pronounced in the area of cyber physical systems and not present at all in the area of building automation. Increasing interconnectivity, undefined responsibilities, connections between secured and unsecured areas, and a lack of understanding of security among decision-makers pose a particular threat. This systematic review demonstrates a paucity of literature addressing real-world scenarios, asymmetric/hybrid threats, or composite vulnerabilities. In particular, the attack surface is significantly increased by the deployment of smart sensors and actuators in unprotected areas. Furthermore, a range of additional hybrid threats are cited, with practical examples being provided that have hitherto gone unnoticed in the extant literature. It will be shown whether solutions are available in neighboring areas and whether these can be transferred to building automation to increase the security of the entire system. Consequently, subsequent studies can be developed to create more accurate behavioral models, enabling more rapid and effective analysis of potential attacks to building automation.
Original languageEnglish
Article number5218
Number of pages26
JournalSensors
Volume25
Issue number17
DOIs
Publication statusPublished - 22 Aug 2025

Keywords

  • intelligent control
  • digital twin
  • fault diagnosis
  • building management system (BMS)
  • attack vector
  • risk appetite
  • Modbus
  • M-Bus
  • KNX
  • BACnet

Fingerprint

Dive into the research topics of 'Composite vulnerabilities and hybrid threats for smart sensors and field busses in building automation: a review'. Together they form a unique fingerprint.

Cite this