Investigation of the cyber vulnerabilities of construction networks using an agent-based model

Bharadwaj R.K. Mantha, Muammer Semih Sonkor, Borja Garcia de Soto

Research output: Contribution to journalArticlepeer-review

Abstract

Most studies either addressed the technical gaps or adopted technological strategies to enable construction automation and digitalization. However, the cybersecurity implications of such technologies received little attention. Existing cybersecurity studies from other domains cannot be directly adopted because examining the overall security, existence, and spread of vulnerability in a construction network requires comprehensive knowledge of the construction participants and processes. To address these gaps, this study a) proposes an agent-based vulnerability assessment framework and b) presents an example focusing on the interactions between a contractor and a 3D printing system to show the feasibility and effectiveness of the proposed framework. It is expected that the proposed framework and the results from the example will raise more awareness about the cybersecurity implications in the architecture, engineering, and construction (AEC) industry and construction research community. Future work aims to quantify the vulnerability scores of individual participants and construction networks.

Original languageEnglish (US)
Article number100452
JournalDevelopments in the Built Environment
Volume18
DOIs
StatePublished - Apr 2024

Keywords

  • Additive manufacturing
  • Agent-based model
  • Construction 4.0
  • Cyber-physical systems
  • Cybersecurity
  • Digitalization
  • Smart construction sites
  • Vulnerability assessment

ASJC Scopus subject areas

  • Architecture
  • Civil and Structural Engineering
  • Building and Construction
  • Materials Science (miscellaneous)
  • Computer Science Applications
  • Computer Graphics and Computer-Aided Design

Fingerprint

Dive into the research topics of 'Investigation of the cyber vulnerabilities of construction networks using an agent-based model'. Together they form a unique fingerprint.

Cite this