Tenable Smart Building Security Flow Architecture Using Open Source Tools

  • Alexandru Caranica
  • Alexandru Vulpe
  • Octavian Fratu
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 747)

Abstract

Nowadays it’s rare to find newly opened buildings or under construction sites that don’t aspire to be “smart” or “intelligent”. There are wired systems through the building that offer the basic infrastructure for VoIP systems, TCP/IP communication, IP or CCTV cameras, systems that require low latency and great amounts of bandwidth. Complementary to these systems, we also find a variety of wireless devices, from data collection sensors to access points, environmental panels or light control systems. Buildings today are certainly “smarter” and more power efficient than they were five or ten years ago, and all these new devices, that comprise the Internet of Things (IoT) category, pose new issues to all building managers: securing and enforcing digital policies to all these IoT nodes and devices. This paper focuses on building a “vendor neutral” security architecture, based on open source tools, suitable for a wide range of scenarios and building types: school campuses, small or home offices, small building shops, etc. The proposed system architecture is described, together with a preliminary evaluation of the prototype system.

Keywords

Building security Unified threat systems Proxy servers Intelligent buildings 

Notes

Acknowledgements

This work was supported by a grant of the Ministry of Innovation and Research, UEFISCDI, project number 5 Sol/2017 within PNCDI III.

References

  1. 1.
    Firstpost: Smart building tech spending forecast to grow to $17.4 bn in 2019: IDC. Insight Report (2015). http://www.firstpost.com/business/smart-building-tech-spending-forecast-grow-17-4-bn-2019-idc-2180865.html
  2. 2.
    ZDNet: 2017’s biggest hacks, leaks, and data breaches. Online article (2017). http://www.zdnet.com/pictures/biggest-hacks-leaks-and-data-breaches-2017/
  3. 3.
    Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013)CrossRefGoogle Scholar
  4. 4.
    Sfar, A.R., Natalizio, E., Challal, Y., Chtourou, Z.: A roadmap for security challenges in the Internet of Things. In: Digital Communications and Networks (2017)Google Scholar
  5. 5.
    Weber, R.: Accountability in the Internet of things. Comput. Law Secur. Rev. 27, 133–138 (2011)CrossRefGoogle Scholar
  6. 6.
    Raza, S. Duquennoy, S., Chung, T., Yazar, D., Voigt, T., Roedig, U.: Securing Communication in 6LoWPAN with compressed IPsec. In: Proceedings of 7th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS 2011), Barcelona, Spain, 7–29 June 2011Google Scholar
  7. 7.
    Bagci, I.E., Raza, S., Chung, T., Roedig, U., Voigt, T.: Combined secure storage and communication for the Internet of Things. In: IEEE International Conference on Sensing, Communications and Networking (SECON), New Orleans, LA, pp. 523–531 (2013)Google Scholar
  8. 8.
    Cisco Corporate website (2017). https://www.cisco.com/
  9. 9.
    Fortinet Corporate website (2017). https://www.fortinet.com/
  10. 10.
    CheckPoint Corporate website (2017). https://www.checkpoint.com/
  11. 11.
    Cyberoam Corporate website (2017). https://www.cyberoam.com/
  12. 12.
    pfSense open-source firewall (2017). https://www.pfsense.org/
  13. 13.
    SME Server Linux distribution (2017). https://wiki.contribs.org/Main_Page
  14. 14.
    Netfilter, home of IPTables. http://www.netfilter.org/. Accessed 2017
  15. 15.
    Squid Open Source Proxy Server. http://www.squid-cache.org/. Accessed 2017
  16. 16.
    Squidguard Open Source Filter. http://www.squidguard.org/. Accessed 2017
  17. 17.
    Snord Open Source IPS/IDS. https://www.snort.org/. Accessed 2017
  18. 18.
    C-ICAP server. http://c-icap.sourceforge.net/. Accessed 2017
  19. 19.
    ClamAV Open Source Antivirus. https://www.clamav.net/. Accessed 2017
  20. 20.
    IEEE 802.1X standard. https://en.wikipedia.org/wiki/IEEE_802.1X. Accessed 2017
  21. 21.
    Sanesecurity ClamAV addon signatures. http://sanesecurity.com/. Accessed 2017
  22. 22.
    Cisco Blog: Cisco announces OpenAppID the next open source game changer in cybersecurity. https://blogs.cisco.com/security/cisco-announces-openappid-the-next-open-source-game-changer-in-cybersecurity. Accessed 2017
  23. 23.
    European Expert Group for IT-Security: EICAR malware test download. http://www.eicar.org/86-0-Intended-use.html. Accessed 2017
  24. 24.
    Check Point Software CheckMe test: Accessed 2017Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Alexandru Caranica
    • 1
  • Alexandru Vulpe
    • 2
  • Octavian Fratu
    • 2
  1. 1.Speech and Dialogue Research LaboratoryUniversity Politehnica of BucharestBucharestRomania
  2. 2.Telecommunications DepartmentUniversity Politehnica of BucharestBucharestRomania

Personalised recommendations