
3
With the increasing usage of remote/mobile access, integrated wearable technologies, data exchange, and
cloud-based data analytics in modern intelligent buildings, the BAS moves towards open communication
technologies. Providing access to the BAS through the building’s intranet, or even remotely through the
Internet, has become a common practice.
BASs were historically developed as closed environments. BACnet (Liaisons, et al., 2012), the most
popular communication protocol for BAS in commercial buildings, was not designed with security as a
primary requirement because: (1) the original intention and implementation of BASs were isolated from
external connections (Peacock, 2019); and (2) physical wiring was typically installed without easily
accessible sockets as we find today with Ethernet installations. Hence, security did not play a particular
role in the original design of BAS. Today, it is challenging to enhance the legacy BAS protocols with
appropriate mechanisms because the existing BAS architecture does not provide sufficient hardware and
software resources for these adaptations. For example, a challenging problem for implementing security
approaches is the limitation of BAS field devices. Even when existing standards allow for extensions, full-
blown security mechanisms need computing resources and time for execution, which are typically
unavailable on field devices (Sauter, Soucek, Kastner, & Dietrich, 2011).
Since the originally isolated BASs were designed with little cyber-security considerations, BASs could be
attack targets. Several known real-world cyber-attacks (Griffiths, 2014, Higgins, 2021, Koh, 2018, Kumar,
2016, McMullen, Sanchez, & Reilly-Allen, 2016, Molina, 2015, Zetter, 2013) on buildings were reported
from 2013 to 2021, as shown in Figure 1. In May 2013, the BAS of Google Australia Office was hacked
by two security researchers by exploiting BAS software vulnerabilities (Zetter, 2013). In November 2013,
Target Corporation, a large retailer in the United States, saw its network hacked and broken into. The
attacker utilized network credentials stolen from a vendor of refrigeration, heating and air conditioning
equipment (McMullen, et al., 2016). In July 2014, the St. Regis Shenzhen 5-star hotel was hacked by a
hacker who took control of around a hundred rooms in the hotel (Griffiths, 2014). The hotel’s BAS had
several flaws that allowed Molina (Molina, 2015) to create a remote control to access the hotel rooms. In
October 2016, hackers used Distributed Denial of Service (DDoS) attack to shut down two apartments’
heating systems in Finland (Kumar, 2016). In August 2018, a security engineer hacked into the WiFi of a
hotel while attending a cybersecurity conference in Singapore. The engineer hacked into the server and
blogged about it online, where he published the hotel administrator’s server passwords (Koh, 2018). In
December 2021, a firm located in Germany discovered that three-quarters of the BAS devices in the office
building system network had been mysteriously locked down with the system’s own digital security key,
which was under the attackers’ control. It suddenly lost contact with hundreds of its BAS devices including
light switches, motion detectors, shutter controllers, etc. The firm had to revert to manually flipping on
and off the central circuit breakers in order to power on the lights in the building (Higgins, 2021). As of
2019, 37.8% of computers used to control BASs were subject to some kind of malicious attacks according
to Kaspersky's report (Kaspersky, 2019). The growing interest from adversary individuals and agents in
BAS is driven by the deep integration of building services, especially the safety-critical (e.g., fire or social
alarm systems) and security-critical (e.g., access control systems) services (Granzer, Praus, & Kastner,
2009). This integration enables low-cost functionality improvement via data sharing and cooperative
control. However, it also breaks the physical isolation of the subsystems and thus enlarges the BAS cyber-
attack surface (King, 2016). Furthermore, modern buildings are also capable of providing grid ancillary
services, such as demand response and frequency regulation (Fu, O'Neill, Wen, Pertzborn, & Bushby,