Emulation and detection of physical faults and cyber-attacks on building energy systems through real-time hardware-in-the-loop experiments

•A flexible HIL framework to emulate faults and attacks in building energy systems.•Energy performance, controller dynamics and network traffic are real-time monitored.•A joint classification framework to differentiate physical faults and cyber-attacks.•Real-time HIL experiments conducted to validat...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Energy and buildings 2024-10, Vol.320, p.114596, Article 114596
Hauptverfasser: Li, Guowen, Ren, Lingyu, Pradhan, Ojas, O’Neill, Zheng, Wen, Jin, Yang, Zhiyao, Fu, Yangyang, Chu, Mengyuan, Huang, Jiajing, Wu, Teresa, Candan, K. Selcuk, Adetola, Veronica, Zhu, Qi
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page 114596
container_title Energy and buildings
container_volume 320
creator Li, Guowen
Ren, Lingyu
Pradhan, Ojas
O’Neill, Zheng
Wen, Jin
Yang, Zhiyao
Fu, Yangyang
Chu, Mengyuan
Huang, Jiajing
Wu, Teresa
Candan, K. Selcuk
Adetola, Veronica
Zhu, Qi
description •A flexible HIL framework to emulate faults and attacks in building energy systems.•Energy performance, controller dynamics and network traffic are real-time monitored.•A joint classification framework to differentiate physical faults and cyber-attacks.•Real-time HIL experiments conducted to validate the threat detection algorithms. The increasing use of remote or mobile access, integrated wearable technologies, data exchange, and cloud-based data analytics in modern smart buildings is steering the building industry towards open communication technologies. The increased connectivity and accessibility could lead to more cyber-attacks in smart buildings. On the other hand, physical faults (e.g., HVAC − heating, ventilation, and air-conditioning faults) may have similar adverse impacts as those from the cyber-attacks on building energy systems, such as occupant discomfort, energy wastage, and equipment downtime. However, current physical behavior-based anomaly detection methods fail to differentiate between cyber-attacks and physical faults in building energy systems. Moreover, the challenge in collecting real-world threat data with ground truth has led researchers to rely on numerical models with user-defined assumptions, which may not accurately reflect real-world conditions due to the lack of in-situ experimental datasets. To address these challenges and gaps, this paper presents a flexible hardware-in-the-loop (HIL) testbed for generating cyber-attack and physical fault datasets and demonstrating threat detection algorithms in a real building automation system (BAS) environment. This testbed combines hardware (i.e., real BAS with local HVAC controllers and a physical network) with software (i.e., high-fidelity models to represent behaviors of building envelope and HVAC energy systems), enabling emulations of realistic threats. Five HIL experiments, including one baseline without any threats, two with physical faults, and two with cyber-attacks, were conducted to generate datasets containing detailed network traffic and system states. A joint classification framework, incorporating a network analyzer and a physical HVAC fault detector, was proposed to automatically detect cyber-physical abnormalities on BAS at both the network and the physical HVAC levels. The network analyzer comprises a conditional random fields (CRF) based command validator and a statistics-based detection strategy. The fault detector employs a weather and schedule-based pattern matchin
doi_str_mv 10.1016/j.enbuild.2024.114596
format Article
fullrecord <record><control><sourceid>elsevier_osti_</sourceid><recordid>TN_cdi_osti_scitechconnect_2458230</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0378778824007126</els_id><sourcerecordid>S0378778824007126</sourcerecordid><originalsourceid>FETCH-LOGICAL-c214t-4342269fe3001e1dc2f8a0f1b0abd9cd580368c6ba4f18f1ffca8e4685b7f623</originalsourceid><addsrcrecordid>eNqFUMlOwzAQzQEkSuETkCzuLrazuSeEqrJISFx6txx73LikdmU7QH6BryZpe-c0Gs1b5r0su6NkQQmtHnYLcE1vO71ghBULSotyWV1kM5LXHNc151fZdYw7QkhV1nSW_a73fSeT9Q5Jp5GGBOq4eYMO7RCtkh0ysu9SPALU0EDAMiWpPiMacUcz67YIHITtgOIQE-wjSm3w_bZFAWSHk90DamXQ3zIAtg6nFnDn_QHBzwHCeHUp3mSXRnYRbs9znm2e15vVK37_eHlbPb1jxWiRcJEXjFVLAzkhFKhWzHBJDG2IbPRS6ZKTvOKqamRhKDfUGCU5FBUvm9pULJ9n9ydZH5MVUdkxcau8c2NwwYqSs5yMoPIEUsHHGMCIw_ilDIOgRExFi504Fy2mosWp6JH3eOLBGODLQpgMwCnQNkz62tt_FP4Ao-KPew</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Emulation and detection of physical faults and cyber-attacks on building energy systems through real-time hardware-in-the-loop experiments</title><source>Elsevier ScienceDirect Journals</source><creator>Li, Guowen ; Ren, Lingyu ; Pradhan, Ojas ; O’Neill, Zheng ; Wen, Jin ; Yang, Zhiyao ; Fu, Yangyang ; Chu, Mengyuan ; Huang, Jiajing ; Wu, Teresa ; Candan, K. Selcuk ; Adetola, Veronica ; Zhu, Qi</creator><creatorcontrib>Li, Guowen ; Ren, Lingyu ; Pradhan, Ojas ; O’Neill, Zheng ; Wen, Jin ; Yang, Zhiyao ; Fu, Yangyang ; Chu, Mengyuan ; Huang, Jiajing ; Wu, Teresa ; Candan, K. Selcuk ; Adetola, Veronica ; Zhu, Qi ; Pacific Northwest National Laboratory (PNNL), Richland, WA (United States)</creatorcontrib><description>•A flexible HIL framework to emulate faults and attacks in building energy systems.•Energy performance, controller dynamics and network traffic are real-time monitored.•A joint classification framework to differentiate physical faults and cyber-attacks.•Real-time HIL experiments conducted to validate the threat detection algorithms. The increasing use of remote or mobile access, integrated wearable technologies, data exchange, and cloud-based data analytics in modern smart buildings is steering the building industry towards open communication technologies. The increased connectivity and accessibility could lead to more cyber-attacks in smart buildings. On the other hand, physical faults (e.g., HVAC − heating, ventilation, and air-conditioning faults) may have similar adverse impacts as those from the cyber-attacks on building energy systems, such as occupant discomfort, energy wastage, and equipment downtime. However, current physical behavior-based anomaly detection methods fail to differentiate between cyber-attacks and physical faults in building energy systems. Moreover, the challenge in collecting real-world threat data with ground truth has led researchers to rely on numerical models with user-defined assumptions, which may not accurately reflect real-world conditions due to the lack of in-situ experimental datasets. To address these challenges and gaps, this paper presents a flexible hardware-in-the-loop (HIL) testbed for generating cyber-attack and physical fault datasets and demonstrating threat detection algorithms in a real building automation system (BAS) environment. This testbed combines hardware (i.e., real BAS with local HVAC controllers and a physical network) with software (i.e., high-fidelity models to represent behaviors of building envelope and HVAC energy systems), enabling emulations of realistic threats. Five HIL experiments, including one baseline without any threats, two with physical faults, and two with cyber-attacks, were conducted to generate datasets containing detailed network traffic and system states. A joint classification framework, incorporating a network analyzer and a physical HVAC fault detector, was proposed to automatically detect cyber-physical abnormalities on BAS at both the network and the physical HVAC levels. The network analyzer comprises a conditional random fields (CRF) based command validator and a statistics-based detection strategy. The fault detector employs a weather and schedule-based pattern matching and feature-based principal component analysis (WPM-FPCA) method. Evaluation of the classification using four metrics from the multi-class confusion matrix revealed an average accuracy of 90.2 %, recall of 89.7 %, precision of 88.5 % and F1-score of 89.2 %. These results demonstrate that the proposed joint classification framework can effectively differentiate between specific types of cyber-attacks (e.g., device reinitialization attack, network Denial-of-Service attack) and physical faults (e.g., air handling unit operational fault, cooling coil valve stuck) in real time for improved building energy management.</description><identifier>ISSN: 0378-7788</identifier><identifier>DOI: 10.1016/j.enbuild.2024.114596</identifier><language>eng</language><publisher>United States: Elsevier B.V</publisher><subject>Building energy management system ; Cyber-attacks ; Hardware-in-the-loop ; Physical faults ; smart building ; Smart buildings</subject><ispartof>Energy and buildings, 2024-10, Vol.320, p.114596, Article 114596</ispartof><rights>2024 Elsevier B.V.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c214t-4342269fe3001e1dc2f8a0f1b0abd9cd580368c6ba4f18f1ffca8e4685b7f623</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S0378778824007126$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>230,314,776,780,881,3537,27901,27902,65306</link.rule.ids><backlink>$$Uhttps://www.osti.gov/biblio/2458230$$D View this record in Osti.gov$$Hfree_for_read</backlink></links><search><creatorcontrib>Li, Guowen</creatorcontrib><creatorcontrib>Ren, Lingyu</creatorcontrib><creatorcontrib>Pradhan, Ojas</creatorcontrib><creatorcontrib>O’Neill, Zheng</creatorcontrib><creatorcontrib>Wen, Jin</creatorcontrib><creatorcontrib>Yang, Zhiyao</creatorcontrib><creatorcontrib>Fu, Yangyang</creatorcontrib><creatorcontrib>Chu, Mengyuan</creatorcontrib><creatorcontrib>Huang, Jiajing</creatorcontrib><creatorcontrib>Wu, Teresa</creatorcontrib><creatorcontrib>Candan, K. Selcuk</creatorcontrib><creatorcontrib>Adetola, Veronica</creatorcontrib><creatorcontrib>Zhu, Qi</creatorcontrib><creatorcontrib>Pacific Northwest National Laboratory (PNNL), Richland, WA (United States)</creatorcontrib><title>Emulation and detection of physical faults and cyber-attacks on building energy systems through real-time hardware-in-the-loop experiments</title><title>Energy and buildings</title><description>•A flexible HIL framework to emulate faults and attacks in building energy systems.•Energy performance, controller dynamics and network traffic are real-time monitored.•A joint classification framework to differentiate physical faults and cyber-attacks.•Real-time HIL experiments conducted to validate the threat detection algorithms. The increasing use of remote or mobile access, integrated wearable technologies, data exchange, and cloud-based data analytics in modern smart buildings is steering the building industry towards open communication technologies. The increased connectivity and accessibility could lead to more cyber-attacks in smart buildings. On the other hand, physical faults (e.g., HVAC − heating, ventilation, and air-conditioning faults) may have similar adverse impacts as those from the cyber-attacks on building energy systems, such as occupant discomfort, energy wastage, and equipment downtime. However, current physical behavior-based anomaly detection methods fail to differentiate between cyber-attacks and physical faults in building energy systems. Moreover, the challenge in collecting real-world threat data with ground truth has led researchers to rely on numerical models with user-defined assumptions, which may not accurately reflect real-world conditions due to the lack of in-situ experimental datasets. To address these challenges and gaps, this paper presents a flexible hardware-in-the-loop (HIL) testbed for generating cyber-attack and physical fault datasets and demonstrating threat detection algorithms in a real building automation system (BAS) environment. This testbed combines hardware (i.e., real BAS with local HVAC controllers and a physical network) with software (i.e., high-fidelity models to represent behaviors of building envelope and HVAC energy systems), enabling emulations of realistic threats. Five HIL experiments, including one baseline without any threats, two with physical faults, and two with cyber-attacks, were conducted to generate datasets containing detailed network traffic and system states. A joint classification framework, incorporating a network analyzer and a physical HVAC fault detector, was proposed to automatically detect cyber-physical abnormalities on BAS at both the network and the physical HVAC levels. The network analyzer comprises a conditional random fields (CRF) based command validator and a statistics-based detection strategy. The fault detector employs a weather and schedule-based pattern matching and feature-based principal component analysis (WPM-FPCA) method. Evaluation of the classification using four metrics from the multi-class confusion matrix revealed an average accuracy of 90.2 %, recall of 89.7 %, precision of 88.5 % and F1-score of 89.2 %. These results demonstrate that the proposed joint classification framework can effectively differentiate between specific types of cyber-attacks (e.g., device reinitialization attack, network Denial-of-Service attack) and physical faults (e.g., air handling unit operational fault, cooling coil valve stuck) in real time for improved building energy management.</description><subject>Building energy management system</subject><subject>Cyber-attacks</subject><subject>Hardware-in-the-loop</subject><subject>Physical faults</subject><subject>smart building</subject><subject>Smart buildings</subject><issn>0378-7788</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNqFUMlOwzAQzQEkSuETkCzuLrazuSeEqrJISFx6txx73LikdmU7QH6BryZpe-c0Gs1b5r0su6NkQQmtHnYLcE1vO71ghBULSotyWV1kM5LXHNc151fZdYw7QkhV1nSW_a73fSeT9Q5Jp5GGBOq4eYMO7RCtkh0ysu9SPALU0EDAMiWpPiMacUcz67YIHITtgOIQE-wjSm3w_bZFAWSHk90DamXQ3zIAtg6nFnDn_QHBzwHCeHUp3mSXRnYRbs9znm2e15vVK37_eHlbPb1jxWiRcJEXjFVLAzkhFKhWzHBJDG2IbPRS6ZKTvOKqamRhKDfUGCU5FBUvm9pULJ9n9ydZH5MVUdkxcau8c2NwwYqSs5yMoPIEUsHHGMCIw_ilDIOgRExFi504Fy2mosWp6JH3eOLBGODLQpgMwCnQNkz62tt_FP4Ao-KPew</recordid><startdate>20241001</startdate><enddate>20241001</enddate><creator>Li, Guowen</creator><creator>Ren, Lingyu</creator><creator>Pradhan, Ojas</creator><creator>O’Neill, Zheng</creator><creator>Wen, Jin</creator><creator>Yang, Zhiyao</creator><creator>Fu, Yangyang</creator><creator>Chu, Mengyuan</creator><creator>Huang, Jiajing</creator><creator>Wu, Teresa</creator><creator>Candan, K. Selcuk</creator><creator>Adetola, Veronica</creator><creator>Zhu, Qi</creator><general>Elsevier B.V</general><general>Elsevier</general><scope>AAYXX</scope><scope>CITATION</scope><scope>OTOTI</scope></search><sort><creationdate>20241001</creationdate><title>Emulation and detection of physical faults and cyber-attacks on building energy systems through real-time hardware-in-the-loop experiments</title><author>Li, Guowen ; Ren, Lingyu ; Pradhan, Ojas ; O’Neill, Zheng ; Wen, Jin ; Yang, Zhiyao ; Fu, Yangyang ; Chu, Mengyuan ; Huang, Jiajing ; Wu, Teresa ; Candan, K. Selcuk ; Adetola, Veronica ; Zhu, Qi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c214t-4342269fe3001e1dc2f8a0f1b0abd9cd580368c6ba4f18f1ffca8e4685b7f623</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Building energy management system</topic><topic>Cyber-attacks</topic><topic>Hardware-in-the-loop</topic><topic>Physical faults</topic><topic>smart building</topic><topic>Smart buildings</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Guowen</creatorcontrib><creatorcontrib>Ren, Lingyu</creatorcontrib><creatorcontrib>Pradhan, Ojas</creatorcontrib><creatorcontrib>O’Neill, Zheng</creatorcontrib><creatorcontrib>Wen, Jin</creatorcontrib><creatorcontrib>Yang, Zhiyao</creatorcontrib><creatorcontrib>Fu, Yangyang</creatorcontrib><creatorcontrib>Chu, Mengyuan</creatorcontrib><creatorcontrib>Huang, Jiajing</creatorcontrib><creatorcontrib>Wu, Teresa</creatorcontrib><creatorcontrib>Candan, K. Selcuk</creatorcontrib><creatorcontrib>Adetola, Veronica</creatorcontrib><creatorcontrib>Zhu, Qi</creatorcontrib><creatorcontrib>Pacific Northwest National Laboratory (PNNL), Richland, WA (United States)</creatorcontrib><collection>CrossRef</collection><collection>OSTI.GOV</collection><jtitle>Energy and buildings</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, Guowen</au><au>Ren, Lingyu</au><au>Pradhan, Ojas</au><au>O’Neill, Zheng</au><au>Wen, Jin</au><au>Yang, Zhiyao</au><au>Fu, Yangyang</au><au>Chu, Mengyuan</au><au>Huang, Jiajing</au><au>Wu, Teresa</au><au>Candan, K. Selcuk</au><au>Adetola, Veronica</au><au>Zhu, Qi</au><aucorp>Pacific Northwest National Laboratory (PNNL), Richland, WA (United States)</aucorp><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Emulation and detection of physical faults and cyber-attacks on building energy systems through real-time hardware-in-the-loop experiments</atitle><jtitle>Energy and buildings</jtitle><date>2024-10-01</date><risdate>2024</risdate><volume>320</volume><spage>114596</spage><pages>114596-</pages><artnum>114596</artnum><issn>0378-7788</issn><abstract>•A flexible HIL framework to emulate faults and attacks in building energy systems.•Energy performance, controller dynamics and network traffic are real-time monitored.•A joint classification framework to differentiate physical faults and cyber-attacks.•Real-time HIL experiments conducted to validate the threat detection algorithms. The increasing use of remote or mobile access, integrated wearable technologies, data exchange, and cloud-based data analytics in modern smart buildings is steering the building industry towards open communication technologies. The increased connectivity and accessibility could lead to more cyber-attacks in smart buildings. On the other hand, physical faults (e.g., HVAC − heating, ventilation, and air-conditioning faults) may have similar adverse impacts as those from the cyber-attacks on building energy systems, such as occupant discomfort, energy wastage, and equipment downtime. However, current physical behavior-based anomaly detection methods fail to differentiate between cyber-attacks and physical faults in building energy systems. Moreover, the challenge in collecting real-world threat data with ground truth has led researchers to rely on numerical models with user-defined assumptions, which may not accurately reflect real-world conditions due to the lack of in-situ experimental datasets. To address these challenges and gaps, this paper presents a flexible hardware-in-the-loop (HIL) testbed for generating cyber-attack and physical fault datasets and demonstrating threat detection algorithms in a real building automation system (BAS) environment. This testbed combines hardware (i.e., real BAS with local HVAC controllers and a physical network) with software (i.e., high-fidelity models to represent behaviors of building envelope and HVAC energy systems), enabling emulations of realistic threats. Five HIL experiments, including one baseline without any threats, two with physical faults, and two with cyber-attacks, were conducted to generate datasets containing detailed network traffic and system states. A joint classification framework, incorporating a network analyzer and a physical HVAC fault detector, was proposed to automatically detect cyber-physical abnormalities on BAS at both the network and the physical HVAC levels. The network analyzer comprises a conditional random fields (CRF) based command validator and a statistics-based detection strategy. The fault detector employs a weather and schedule-based pattern matching and feature-based principal component analysis (WPM-FPCA) method. Evaluation of the classification using four metrics from the multi-class confusion matrix revealed an average accuracy of 90.2 %, recall of 89.7 %, precision of 88.5 % and F1-score of 89.2 %. These results demonstrate that the proposed joint classification framework can effectively differentiate between specific types of cyber-attacks (e.g., device reinitialization attack, network Denial-of-Service attack) and physical faults (e.g., air handling unit operational fault, cooling coil valve stuck) in real time for improved building energy management.</abstract><cop>United States</cop><pub>Elsevier B.V</pub><doi>10.1016/j.enbuild.2024.114596</doi></addata></record>
fulltext fulltext
identifier ISSN: 0378-7788
ispartof Energy and buildings, 2024-10, Vol.320, p.114596, Article 114596
issn 0378-7788
language eng
recordid cdi_osti_scitechconnect_2458230
source Elsevier ScienceDirect Journals
subjects Building energy management system
Cyber-attacks
Hardware-in-the-loop
Physical faults
smart building
Smart buildings
title Emulation and detection of physical faults and cyber-attacks on building energy systems through real-time hardware-in-the-loop experiments
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T09%3A56%3A17IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-elsevier_osti_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Emulation%20and%20detection%20of%20physical%20faults%20and%20cyber-attacks%20on%20building%20energy%20systems%20through%20real-time%20hardware-in-the-loop%20experiments&rft.jtitle=Energy%20and%20buildings&rft.au=Li,%20Guowen&rft.aucorp=Pacific%20Northwest%20National%20Laboratory%20(PNNL),%20Richland,%20WA%20(United%20States)&rft.date=2024-10-01&rft.volume=320&rft.spage=114596&rft.pages=114596-&rft.artnum=114596&rft.issn=0378-7788&rft_id=info:doi/10.1016/j.enbuild.2024.114596&rft_dat=%3Celsevier_osti_%3ES0378778824007126%3C/elsevier_osti_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_els_id=S0378778824007126&rfr_iscdi=true