Building Automation Systems (BASs) support facilities management by connecting building actuators and sensors to data networks and enabling computer control. Such systems have great potential for applications, but many of these applications open new security risks because they increase the attack surface of the BAS. This project is developing security architectures and principles for BAS middleware, with a focus on strategies for limiting the risks in connecting the BAS to an enterprise information system. This project received support from NSF CNS 07-16421 and NSF CNS 05-24695.
Publications
Improving the Security in Interconnecting Building Automation Systems to Outside Networks
Hee Dong Jung
Master of Science Thesis, University of Illinois at Urbana-Champaign, July 2011. [BIB]
Distributed Non-Intrusive Load Monitoring
David C. Bergman, Dong Jin, Joshua P. Juen, Naoki Tanaka, Carl A. Gunter and Andrew Wright
IEEE/PES Conference on Innovative Smart Grid Technologies (ISGT ’11), Anaheim, CA, January 2011. [BIB][Related]
Nonintrusive Load-Shed Verification
David C. Bergman, Dong Jin, Joshua P. Juen, Naoki Tanaka, Carl A. Gunter and Andrew K. Wright
IEEE Pervasive Computing, Special Issue on Smart Energy Systems, volume 10, number 1, pages 49-57, 2011. [BIB][Related]
Reflective Database Access Control
Lars E. Olson
Doctoral Thesis, University of Illinois at Urbana-Champaign, October 2009. [PPT]
Safety in Discretionary Access Control for Logic-based Publish-Subscribe Systems
Kazuhiro Minami, Nikita Borisov and Carl A. Gunter
ACM Access Control Models and Technologies (Sacmat ’09), Stresa, Italy, June 2009.
Confidentiality-Preserving Distributed Proofs of Conjunctive Queries,
Adam J. Lee, Kazuhiro Minami, and Nikita Borisov.
ACM Symposium on Information, Computer and Communication Security (ASIACCS ’09), Sydney Australia, March 2009.
Collaborative Recommender Systems for Building Automation
Michael LeMay, Jason J. Haas and Carl A. Gunter
IEEE Hawaii International Conference on System Sciences (HICSS ’09), Waikoloa, HI, January 2009. [PPT][BIB][Related]
An Integrated Architecture for Demand Response Communications and Control (awarded best paper)
Michael LeMay, Rajesh Nelli, George Gross and Carl A. Gunter
IEEE Hawaii International Conference on System Sciences (HICSS ’08), Waikoloa, HI, January 2008. [PPT][BIB][Related]
Improving Multi-Tier Security Using Redundant Authentication
Jodie P. Boyer, Ragib Hasan, Lars E. Olson, Nikita Borisov, Carl A. Gunter and David Raila
ACM Computer Security Architecture Workshop (CSAW ’07), Fairfax, VA, November 2007. [PPT][BIB][PSTR]
PolicyMorph: Interactive Policy Transformations for a Logical Attribute-Based Access Control Framework
Michael LeMay, Omid Fatemieh and Carl A. Gunter
ACM Symposium on Access Control Models And Technologies (SACMAT ’07), Sophia Antipolis, France, Jun 2007. [PPT][BIB]
Privacy Sensitive Location Information Systems in Smart Buildings
Jodie P. Boyer, Kaijun Tan and Carl A. Gunter
Springer Security in Pervasive Computing (SPC ’06), Lecture Notes in Computer Science, pages 149-164, York, UK, April 2006. [PPT][BIB]
Related Resources
- BAM White Paper
- Janus's Map
- OBIX Overview Slides
- Risk Analysis Presentation
- Monitoring and Surveillance , Lecture by Carl Gunter for UIUC course CS563.
This page is maintained Hee-Dong Jung
Last updated on Monday, July 25, 2011, 4:28 pm