{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T16:57:33Z","timestamp":1770742653466,"version":"3.49.0"},"reference-count":108,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T00:00:00Z","timestamp":1715385600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006248","name":"Anhui University of Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006248","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000015","name":"US Department of Energy","doi-asserted-by":"publisher","award":["DE-EE0009152"],"award-info":[{"award-number":["DE-EE0009152"]}],"id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2325451"],"award-info":[{"award-number":["2325451"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1915780"],"award-info":[{"award-number":["1915780"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1931871"],"award-info":[{"award-number":["1931871"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["High-Confidence Computing"],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1016\/j.hcc.2024.100236","type":"journal-article","created":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T23:47:34Z","timestamp":1716853654000},"page":"100236","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":6,"title":["On building automation system security"],"prefix":"10.1016","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9403-6837","authenticated-orcid":false,"given":"Christopher","family":"Morales-Gonzalez","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1749-7976","authenticated-orcid":false,"given":"Matthew","family":"Harper","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Cash","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5627-3521","authenticated-orcid":false,"given":"Lan","family":"Luo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9691-8702","authenticated-orcid":false,"given":"Zhen","family":"Ling","sequence":"additional","affiliation":[]},{"given":"Qun Z.","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Xinwen","family":"Fu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"15","key":"10.1016\/j.hcc.2024.100236_b1","doi-asserted-by":"crossref","first-page":"7942","DOI":"10.3390\/app12157942","article-title":"Development of an open-source testbed based on the modbus protocol for cybersecurity analysis of nuclear power plants","volume":"12","author":"de Brito","year":"2022","journal-title":"Appl. Sci."},{"key":"10.1016\/j.hcc.2024.100236_b2","series-title":"2020 IEEE Conference on Industrial Cyberphysical Systems, Vol. 1","article-title":"Control of KNX devices over IEEE 11073 service-oriented device connectivity","author":"Kraus","year":"2020"},{"key":"10.1016\/j.hcc.2024.100236_b3","series-title":"Proceedings of the 2011 3rd International Youth Conference on Energetics","article-title":"Implementing an advanced meter reading infrastructure using a z-wave compliant wireless sensor network","author":"Amaro","year":"2011"},{"key":"10.1016\/j.hcc.2024.100236_b4","article-title":"KNX building automations interaction with city resources management system","volume":"12","author":"Sita","year":"2014","journal-title":"Proc. Technol."},{"key":"10.1016\/j.hcc.2024.100236_b5","series-title":"2014 International Conference on Wireless Communication and Sensor Network","article-title":"Design of intelligent home control system based on KNX\/EIB bus network","author":"Pang","year":"2014"},{"key":"10.1016\/j.hcc.2024.100236_b6","series-title":"Research study indicates bacnet global market share over 60%","author":"BACnet International","year":"2023"},{"key":"10.1016\/j.hcc.2024.100236_b7","series-title":"Hackers use ddos attack to cut heat to apartments","author":"Mathews","year":"2021"},{"key":"10.1016\/j.hcc.2024.100236_b8","series-title":"KNXlock - An attack campaign against KNX-based building automation systems","author":"Limes Security","year":"2021"},{"key":"10.1016\/j.hcc.2024.100236_b9","series-title":"Lights out: Cyberattacks shut down building automation systems","author":"Higgins","year":"2021"},{"key":"10.1016\/j.hcc.2024.100236_b10","series-title":"China-backed APT pwns building automation systems with ProxyLogon","author":"Seals","year":"2021"},{"key":"10.1016\/j.hcc.2024.100236_b11","series-title":"2006 IEEE International Workshop on Factory Communication Systems","article-title":"Security in networked building automation systems","author":"Granzer","year":"2006"},{"key":"10.1016\/j.hcc.2024.100236_b12","series-title":"2014 International Carnahan Conference on Security Technology","article-title":"Security challenges in building automation and SCADA","author":"Antonini","year":"2014"},{"key":"10.1016\/j.hcc.2024.100236_b13","series-title":"2015 2nd International Conference on Information Science and Security","first-page":"1","article-title":"A review on ZigBee security enhancement in smart home environment","author":"Karnain","year":"2015"},{"key":"10.1016\/j.hcc.2024.100236_b14","series-title":"2016 International Conference on Cyber Security and Protection of Digital Services","article-title":"Security in building automation systems-a first analysis","author":"Mundt","year":"2016"},{"issue":"6","key":"10.1016\/j.hcc.2024.100236_b15","doi-asserted-by":"crossref","first-page":"1802","DOI":"10.1109\/JIOT.2017.2703172","article-title":"Cyber-physical systems security\u2014A survey","volume":"4","author":"Humayed","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.hcc.2024.100236_b16","series-title":"2017 25th Telecommunication Forum","article-title":"Security survey of the IoT wireless protocols","author":"Krej\u010d\u00ed","year":"2017"},{"key":"10.1016\/j.hcc.2024.100236_b17","series-title":"2018 IEEE International Conference on Consumer Electronics","article-title":"A security evaluation of popular internet of things protocols for manufacturers","author":"Celebucki","year":"2018"},{"key":"10.1016\/j.hcc.2024.100236_b18","article-title":"IoT-based smart homes: A review of system architecture, software, communications, privacy and security","volume":"1","author":"Mocrii","year":"2018","journal-title":"Internet Things"},{"key":"10.1016\/j.hcc.2024.100236_b19","series-title":"The security of smart buildings: A systematic literature review","author":"Ciholas","year":"2019"},{"key":"10.1016\/j.hcc.2024.100236_b20","doi-asserted-by":"crossref","unstructured":"L. Li, P. Podder, E. Hoque, A formal security analysis of ZigBee (1.0 and 3.0), in: Proceedings of the 7th Symposium on Hot Topics in the Science of Security, 2020, pp. 1\u201311.","DOI":"10.1145\/3384217.3385617"},{"issue":"2","key":"10.1016\/j.hcc.2024.100236_b21","doi-asserted-by":"crossref","first-page":"1020","DOI":"10.1109\/COMST.2021.3067354","article-title":"A survey on standards for interoperability and security in the internet of things","volume":"23","author":"Lee","year":"2021","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.hcc.2024.100236_b22","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2021.102527","article-title":"Security of building automation and control systems: Survey and future research directions","volume":"112","author":"Graveto","year":"2022","journal-title":"Comput. Secur."},{"key":"10.1016\/j.hcc.2024.100236_b23","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2021.102728","article-title":"Survey on enterprise internet-of-things systems (E-IoT): A security perspective","volume":"125","author":"Rondon","year":"2022","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.hcc.2024.100236_b24","series-title":"Communication layer security in smart farming: A survey on wireless technologies","author":"Rouzbahani","year":"2022"},{"key":"10.1016\/j.hcc.2024.100236_b25","doi-asserted-by":"crossref","DOI":"10.1016\/j.arcontrol.2023.02.004","article-title":"A critical review of cyber-physical security for building automation systems","author":"Li","year":"2023","journal-title":"Annu. Rev. Control"},{"key":"10.1016\/j.hcc.2024.100236_b26","series-title":"Desigo CC - better. Of course","author":"Siemens","year":"2024"},{"key":"10.1016\/j.hcc.2024.100236_b27","series-title":"ANSI\/ASHRAE Standard 135-2020","author":"ASHRAE Special Publications","year":"2020"},{"key":"10.1016\/j.hcc.2024.100236_b28","series-title":"KNX Standard Specifications","year":"2013"},{"key":"10.1016\/j.hcc.2024.100236_b29","series-title":"Introduction to the LonWorks System","year":"1999"},{"key":"10.1016\/j.hcc.2024.100236_b30","series-title":"Modbus Application Protocol Specification","year":"2012"},{"key":"10.1016\/j.hcc.2024.100236_b31","series-title":"ZigBee Specification","author":"ZigBee Alliance","year":"2015"},{"key":"10.1016\/j.hcc.2024.100236_b32","series-title":"Z-Wave Device Class Specification","year":"2021"},{"key":"10.1016\/j.hcc.2024.100236_b33","series-title":"Radio technology","author":"EnOcean Sustainable IoT","year":"2021"},{"key":"10.1016\/j.hcc.2024.100236_b34","series-title":"13th International Green and Sustainable Computing Conference","article-title":"A review of smart buildings protocol and systems with a consideration of security and energy awareness","author":"Zeng","year":"2022"},{"key":"10.1016\/j.hcc.2024.100236_b35","series-title":"2022 IEEE International Symposium on Hardware Oriented Security and Trust","first-page":"77","article-title":"Error correction attacks on BACnet MS\/tp","author":"Yimer","year":"2022"},{"key":"10.1016\/j.hcc.2024.100236_b36","author":"Holmberg","year":"2003"},{"key":"10.1016\/j.hcc.2024.100236_b37","series-title":"ERNW newsletter 49\/August 2015","author":"Schneider","year":"2015"},{"key":"10.1016\/j.hcc.2024.100236_b38","first-page":"398","article-title":"Smart card based security for fieldbus systems","volume":"vol. 1","author":"Schwaiger","year":"2003"},{"key":"10.1016\/j.hcc.2024.100236_b39","series-title":"2021 IEEE Conference on Communications and Network Security","article-title":"HiveGuard: A network security monitoring architecture for Zigbee networks","author":"Akestoridis","year":"2021"},{"key":"10.1016\/j.hcc.2024.100236_b40","series-title":"2019 10th International Conference on Information and Communication Systems","article-title":"ZigBee security vulnerabilities: Exploration and evaluating","author":"Khanji","year":"2019"},{"key":"10.1016\/j.hcc.2024.100236_b41","series-title":"2014 14th International Conference on Hybrid Intelligent Systems","first-page":"199","article-title":"Three practical attacks against ZigBee security: Attack scenario definitions, practical experiments, countermeasures, and lessons learned","author":"Olawumi","year":"2014"},{"issue":"5","key":"10.1016\/j.hcc.2024.100236_b42","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1109\/JIOT.2016.2516102","article-title":"Ghost-in-Zigbee: Energy depletion attack on Zigbee-based wireless networks","volume":"3","author":"Cao","year":"2016","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.hcc.2024.100236_b43","series-title":"2014 IEEE 12th International Symposium on Applied Machine Intelligence and Informatics","first-page":"345","article-title":"Security attacks to ZigBee technology and their practical realization","author":"\u010eurech","year":"2014"},{"key":"10.1016\/j.hcc.2024.100236_b44","series-title":"2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","first-page":"465","article-title":"ZigBee\/ZigBee PRO security assessment based on compromised cryptographic keys","author":"Radmand","year":"2010"},{"key":"10.1016\/j.hcc.2024.100236_b45","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1016\/j.procs.2014.08.056","article-title":"New security approach for ZigBee weaknesses","volume":"37","author":"Razouk","year":"2014","journal-title":"Procedia Comput. Sci."},{"issue":"4","key":"10.1016\/j.hcc.2024.100236_b46","doi-asserted-by":"crossref","first-page":"579","DOI":"10.3390\/sym12040579","article-title":"A state-of-the-art review on the security of mainstream IoT wireless PAN protocol stacks","volume":"12","author":"Kambourakis","year":"2020","journal-title":"Symmetry"},{"issue":"2","key":"10.1016\/j.hcc.2024.100236_b47","doi-asserted-by":"crossref","DOI":"10.1145\/3285030","article-title":"Looking under the hood of Z-wave: Volatile memory introspection for the ZW0301 transceiver","volume":"3","author":"Badenhop","year":"2018","journal-title":"ACM Trans. Cyber-Phys. Syst."},{"key":"10.1016\/j.hcc.2024.100236_b48","doi-asserted-by":"crossref","DOI":"10.1016\/j.diin.2016.02.002","article-title":"Extraction and analysis of non-volatile memory of the ZW0301 module, a Z-wave transceiver","volume":"17","author":"Badenhop","year":"2016","journal-title":"Digit. Investig."},{"key":"10.1016\/j.hcc.2024.100236_b49","doi-asserted-by":"crossref","DOI":"10.1016\/j.pmcj.2020.101211","article-title":"What\u2019s your protocol: Vulnerabilities and security threats related to Z-Wave protocol","volume":"66","author":"Kim","year":"2020","journal-title":"Pervasive Mob. Comput."},{"key":"10.1016\/j.hcc.2024.100236_b50","series-title":"Bacnet wide area network security threat assessment","author":"Holmberg","year":"2003"},{"key":"10.1016\/j.hcc.2024.100236_b51","doi-asserted-by":"crossref","unstructured":"M. Bashendy, S. Eltanbouly, A. Tantawy, A. Erradi, Design and implementation of cyber-physical attacks on modbus\/tcp protocol, in: World Congress on Industrial Control Systems Security, WCICSS, 2020.","DOI":"10.20533\/WCICSS.2020.0005"},{"key":"10.1016\/j.hcc.2024.100236_b52","doi-asserted-by":"crossref","unstructured":"P. Morgner, S. Mattejat, Z. Benenson, C. M\u00fcller, F. Armknecht, Insecure to the touch: Attacking ZigBee 3.0 via touchlink commissioning, in: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017, pp. 230\u2013240.","DOI":"10.1145\/3098243.3098254"},{"key":"10.1016\/j.hcc.2024.100236_b53","series-title":"Sneak Into Buildings with KNXnet\/IP","article-title":"Sneak into buildings with KNXnet\/IP","author":"Vacherot","year":"2020"},{"key":"10.1016\/j.hcc.2024.100236_b54","doi-asserted-by":"crossref","unstructured":"X. Wang, S. Hao, Don\u2019t Kick Over the Beehive: Attacks and Security Analysis on Zigbee, in: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022, pp. 2857\u20132870.","DOI":"10.1145\/3548606.3560703"},{"key":"10.1016\/j.hcc.2024.100236_b55","article-title":"Riding the IoT wave with VFuzz: Discovering security flaws in smart homes","volume":"10","author":"Nkuba","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.hcc.2024.100236_b56","series-title":"A Practical Wireless Exploitation Framework for Z Wave Networks","author":"Hall","year":"2016"},{"key":"10.1016\/j.hcc.2024.100236_b57","series-title":"ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings 30","first-page":"616","article-title":"Securing BACnet\u2019s pitfalls","author":"Kaur","year":"2015"},{"issue":"2","key":"10.1016\/j.hcc.2024.100236_b58","doi-asserted-by":"crossref","first-page":"11100","DOI":"10.1016\/j.ifacol.2020.12.258","article-title":"Assessment of hidden channel attacks: Targetting modbus\/tcp","volume":"53","author":"Lamsh\u00f6ft","year":"2020","journal-title":"IFAC-PapersOnLine"},{"key":"10.1016\/j.hcc.2024.100236_b59","first-page":"158","article-title":"Security analysis for wireless networks based on ZigBee","volume":"vol. 1","author":"Qianqian","year":"2009"},{"key":"10.1016\/j.hcc.2024.100236_b60","series-title":"2021 Fifth World Conference on Smart Trends in Systems Security and Sustainability (WorldS4)","article-title":"Security analysis of smart home systems applying attack graph","author":"Ibrahim","year":"2021"},{"key":"10.1016\/j.hcc.2024.100236_b61","doi-asserted-by":"crossref","first-page":"3622","DOI":"10.1109\/TIE.2009.2036033","article-title":"Security in building automation systems","volume":"57","author":"Granzer","year":"2010","journal-title":"Ind. Electron., IEEE Trans."},{"key":"10.1016\/j.hcc.2024.100236_b62","first-page":"1","article-title":"Security analysis of Zigbee","volume":"2017","author":"Fan","year":"2017","journal-title":"MWR InfoSecurity"},{"key":"10.1016\/j.hcc.2024.100236_b63","first-page":"426","article-title":"Study on security of wireless sensor network based on ZigBee standard","volume":"vol. 2","author":"Yang","year":"2009"},{"key":"10.1016\/j.hcc.2024.100236_b64","doi-asserted-by":"crossref","unstructured":"D.-G. Akestoridis, M. Harishankar, M. Weber, P. Tague, Zigator: Analyzing the security of zigbee-enabled smart homes, in: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020, pp. 77\u201388.","DOI":"10.1145\/3395351.3399363"},{"key":"10.1016\/j.hcc.2024.100236_b65","series-title":"Crushing the wave\u2013new Z-wave vulnerabilities exposed","author":"Boucif","year":"2020"},{"key":"10.1016\/j.hcc.2024.100236_b66","series-title":"S0-no-more: A Z-wave NonceGet denial of service attack utilizing included but offline nodeids","author":"Cheng","year":"2022"},{"key":"10.1016\/j.hcc.2024.100236_b67","series-title":"2023 International Conference on Computing, Networking and Communications","first-page":"35","article-title":"On false data injection attack against building automation systems","author":"Cash","year":"2023"},{"key":"10.1016\/j.hcc.2024.100236_b68","series-title":"2013 IEEE PES Innovative Smart Grid Technologies Conference","first-page":"1","article-title":"Providing security to a smart grid prosumer system based on a service oriented architecture in an office environment","author":"Camek","year":"2013"},{"key":"10.1016\/j.hcc.2024.100236_b69","article-title":"Learn how to control every room at a luxury hotel remotely: The dangers of insecure home automation deployment","author":"Molina","year":"2014","journal-title":"Black Hat USA"},{"key":"10.1016\/j.hcc.2024.100236_b70","article-title":"Detection and blocking of replay, false command, and false access injection commands in scada systems with modbus protocol","volume":"2021","author":"Rajesh","year":"2021","journal-title":"Secur. Commun. Netw."},{"key":"10.1016\/j.hcc.2024.100236_b71","series-title":"2023 IEEE 20th Consumer Communications & Networking Conference","first-page":"1","article-title":"A stealthy false command injection attack on Modbus based SCADA systems","author":"Alsabbagh","year":"2023"},{"key":"10.1016\/j.hcc.2024.100236_b72","article-title":"Killerbee: Practical Zigbee exploitation framework","volume":"vol. 67","author":"Wright","year":"2009"},{"key":"10.1016\/j.hcc.2024.100236_b73","series-title":"A Multifaceted Security Evaluation of Z Wave, a Proprietary Implementation of the Internet of Things","author":"Badenhop","year":"2017"},{"key":"10.1016\/j.hcc.2024.100236_b74","first-page":"1","article-title":"Security evaluation of the Z-Wave wireless protocol","volume":"24","author":"Fouladi","year":"2013","journal-title":"Black hat USA"},{"key":"10.1016\/j.hcc.2024.100236_b75","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2021.102527","article-title":"Security of building automation and control systems: Survey and future research directions","volume":"112","author":"Graveto","year":"2022","journal-title":"Comput. Secur."},{"key":"10.1016\/j.hcc.2024.100236_b76","doi-asserted-by":"crossref","DOI":"10.1155\/2022\/8104884","article-title":"Formal security analysis and improvement based on LonTalk authentication protocol","volume":"2022","author":"Feng","year":"2022","journal-title":"Secur. Commun. Netw."},{"key":"10.1016\/j.hcc.2024.100236_b77","doi-asserted-by":"crossref","first-page":"2453","DOI":"10.1016\/j.procs.2020.04.265","article-title":"Fooling the master: Exploiting weaknesses in the modbus protocol","volume":"171","author":"Parian","year":"2020","journal-title":"Procedia Comput. Sci."},{"issue":"4","key":"10.1016\/j.hcc.2024.100236_b78","doi-asserted-by":"crossref","first-page":"450","DOI":"10.3390\/iot3040024","article-title":"Living in the dark: MQTT-based exploitation of IoT security vulnerabilities in ZigBee networks for smart lighting control","volume":"3","author":"Hussein","year":"2022","journal-title":"IoT"},{"key":"10.1016\/j.hcc.2024.100236_b79","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1016\/j.cose.2017.04.004","article-title":"The Z-Wave routing protocol and its security implications","volume":"68","author":"Badenhop","year":"2017","journal-title":"Comput. Secur."},{"key":"10.1016\/j.hcc.2024.100236_b80","series-title":"Proceedings of the 2014 IEEE Emerging Technology and Factory Automation","article-title":"Identifying unsecured building automation installations","author":"Praus","year":"2014"},{"issue":"1","key":"10.1016\/j.hcc.2024.100236_b81","doi-asserted-by":"crossref","first-page":"77","DOI":"10.13052\/jcsm2245-1439.614","article-title":"The amplification threat posed by publicly reachable BACnet devices","volume":"6","author":"Gasser","year":"2017","journal-title":"J. Cyber Secur. Mobil."},{"key":"10.1016\/j.hcc.2024.100236_b82","series-title":"ICC 2021-IEEE International Conference on Communications","first-page":"1","article-title":"On automating bacnet device discovery and property identification","author":"Cash","year":"2021"},{"key":"10.1016\/j.hcc.2024.100236_b83","doi-asserted-by":"crossref","DOI":"10.1109\/MCOM.002.2200553","article-title":"Modbus\/RS-485 attack detection on communication signals with machine learning","author":"Ochiai","year":"2023","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.hcc.2024.100236_b84","series-title":"ZigBee exploited: The good, the bad and the ugly","author":"Zillner","year":"2015"},{"issue":"11","key":"10.1016\/j.hcc.2024.100236_b85","doi-asserted-by":"crossref","first-page":"2305","DOI":"10.3390\/app8112305","article-title":"Design and implementation of a security improvement framework of Zigbee network for intelligent monitoring in IoT platform","volume":"8","author":"Rana","year":"2018","journal-title":"Appl. Sci."},{"key":"10.1016\/j.hcc.2024.100236_b86","series-title":"Wireless Communication Protocols for Home Automation Exploring The Security and Privacy Aspects of Smart Home IoT Devices Communicating Over the Z-Wave Protocol","author":"Merdis","year":"2019"},{"key":"10.1016\/j.hcc.2024.100236_b87","series-title":"2015 IEEE 40th Local Computer Networks Conference Workshops","first-page":"734","article-title":"Rogue Z-wave controllers: A persistent attack channel","author":"Fuller","year":"2015"},{"key":"10.1016\/j.hcc.2024.100236_b88","series-title":"Black Hat Europe","article-title":"A universal controller to take over a z-wave network","author":"Rouch","year":"2017"},{"key":"10.1016\/j.hcc.2024.100236_b89","doi-asserted-by":"crossref","unstructured":"A. Antonini, F. Maggi, S. Zanero, A practical attack against a knx-based building automation system, in: 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, ICS-CSR 2014 2, 2014.","DOI":"10.14236\/ewic\/ics-csr2014.7"},{"key":"10.1016\/j.hcc.2024.100236_b90","doi-asserted-by":"crossref","unstructured":"K. Hofer-Schmitz, A formal analysis of EnOcean\u2019s teach-in and authentication, in: Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021, pp. 1\u20138.","DOI":"10.1145\/3465481.3470097"},{"issue":"17","key":"10.1016\/j.hcc.2024.100236_b91","doi-asserted-by":"crossref","first-page":"6713","DOI":"10.3390\/s22176713","article-title":"An anonymous authentication and key update mechanism for IoT devices based on EnOcean protocol","volume":"22","author":"Wu","year":"2022","journal-title":"Sensors"},{"key":"10.1016\/j.hcc.2024.100236_b92","unstructured":"T. Oluwafemi, T. Kohno, S. Gupta, S. Patel, Experimental security analyses of {Non\u2212Networked} compact fluorescent lamps: A case study of home automation security, in: LASER, 2013."},{"key":"10.1016\/j.hcc.2024.100236_b93","series-title":"Security Mechanisms of Wireless Building Automation Systems","author":"Jonas","year":"2017"},{"key":"10.1016\/j.hcc.2024.100236_b94","doi-asserted-by":"crossref","unstructured":"N. Tsalis, G. Stergiopoulos, E. Bitsikas, D. Gritzalis, T.K. Apostolopoulos, Side Channel Attacks over Encrypted TCP\/IP Modbus Reveal Functionality Leaks, in: ICETE (2), 2018, pp. 219\u2013229.","DOI":"10.5220\/0006832700530063"},{"key":"10.1016\/j.hcc.2024.100236_b95","doi-asserted-by":"crossref","unstructured":"J.-C. Liou, S. Jain, S.R. Singh, D. Taksinwarajan, S. Seneviratne, Side-channel information leaks of Z-wave smart home IoT devices: Demo abstract, in: Proceedings of the 18th Conference on Embedded Networked Sensor Systems, 2020.","DOI":"10.1145\/3384419.3430436"},{"key":"10.1016\/j.hcc.2024.100236_b96","series-title":"KNX ets","author":"KNX","year":"2022"},{"issue":"9","key":"10.1016\/j.hcc.2024.100236_b97","doi-asserted-by":"crossref","DOI":"10.1109\/TII.2018.2844955","article-title":"A taxonomy for the security assessment of IP-based building automation systems: The case of thread","volume":"14","author":"Liu","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.hcc.2024.100236_b98","doi-asserted-by":"crossref","unstructured":"L.N. Whitehurst, T.R. Andel, J.T. McDonald, Exploring security in ZigBee networks, in: Proceedings of the 9th Annual Cyber and Information Security Research Conference, 2014, pp. 25\u201328.","DOI":"10.1145\/2602087.2602090"},{"key":"10.1016\/j.hcc.2024.100236_b99","series-title":"Application Note 158\/13 v02 KNX Data Security","year":"2013"},{"key":"10.1016\/j.hcc.2024.100236_b100","series-title":"KNX protocol","author":"CISA","year":"2023"},{"key":"10.1016\/j.hcc.2024.100236_b101","series-title":"Application Note 159\/13 v04 KNXnet\/IP Secure","year":"2013"},{"key":"10.1016\/j.hcc.2024.100236_b102","series-title":"KNX IP secure becomes world\u2019s first vendor-independent security standard for building automation as EN ISO 22510","author":"KNX","year":"2020"},{"key":"10.1016\/j.hcc.2024.100236_b103","series-title":"MODBUS\/TCP Security","year":"2018"},{"key":"10.1016\/j.hcc.2024.100236_b104","series-title":"Security of EnOcean Radio Networks","year":"2018"},{"key":"10.1016\/j.hcc.2024.100236_b105","series-title":"Security of EnOcean radio networks","author":"EnOcean Alliance","year":"2023"},{"key":"10.1016\/j.hcc.2024.100236_b106","series-title":"ZigBee Pro Specification","author":"Alliance","year":"2023"},{"key":"10.1016\/j.hcc.2024.100236_b107","series-title":"Z-Wave Plus v2 Device Type Specification","year":"2021"},{"key":"10.1016\/j.hcc.2024.100236_b108","series-title":"Calimero project","author":"Calimero","year":"2022"}],"container-title":["High-Confidence Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295224000394?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295224000394?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T16:19:48Z","timestamp":1727194788000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2667295224000394"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9]]},"references-count":108,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["S2667295224000394"],"URL":"https:\/\/doi.org\/10.1016\/j.hcc.2024.100236","relation":{},"ISSN":["2667-2952"],"issn-type":[{"value":"2667-2952","type":"print"}],"subject":[],"published":{"date-parts":[[2024,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"On building automation system security","name":"articletitle","label":"Article Title"},{"value":"High-Confidence Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.hcc.2024.100236","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 The Author(s). Published by Elsevier B.V. on behalf of Shandong University.","name":"copyright","label":"Copyright"}],"article-number":"100236"}}