Managing Security Risks in Smart Lighting Systems, Part 3

Managing Security Risk

Feb 3, 2020

This is the third article of a four-part introductory series on managing security risks in smart lighting systems. In this series, learn about best practices, based on NIST standards and guidelines, for identifying and mitigating cybersecurity risks and threats, as well as implementing cybersecurity controls on an organizational level. The first article introduced the concept of a multi-tiered approach to smart lighting system cybersecurity. The second article focused on two key security control families: access control/identification and authentication. In this third article, we’ll focus on building automation and control system security control families that relate to system and communication protection, and system and information integrity.

A smart lighting system is a base building control system that can also be an important, integral part of a building automation and control system (BACS). At a fundamental level, every type of BACS facilitates the flow of information as well as automated control through connectivity. This information flow reduces operating costs and provides better and more timely information about a building function or asset. BACS are a form of business information system (BIS) and, like any other BIS, can pose potential security threats and risks to the business.

System and communications protection

System and communications protection security control strategies focus on attacks that target the system configuration, system resources, communications channels and private or classified information.

• System partitioning and application separation — one of the easiest ways to protect a smart lighting system is to partition the system into different network segments that separate user functions from system control and management functions. This creates logical and physical boundaries that can be monitored and protected for added security. One common approach is to have a private control network, only accessible to system administrators, that hosts all lighting controllers and management applications, and have a public network that users can access via personal control, web or mobile applications. Within the lighting control network, wired and wireless field bus technology further separates device control from system management traffic so that basic lighting control will still work should there be a management network failure.

• Secure system communication, session management and boundary protection — secure network connections and encryption of data in transit protects from man-in-the-middle attacks trying to gain access to information, as well as malicious or accidental alteration of information during transmission. Connection and session management ensures that sessions are unique and valid only for the duration of use. For example, session cookies with unique identifiers, timeouts, and password protected locks can be used.

• Cryptography and key management — secure control systems use cryptography to protect information, including personally identifiable data, passwords and certificates, while in transit or at rest. As part of the encryption process, the information protected is scrambled and is made readable only by using the matching keys. Also, it is common for secure connections to change the keys periodically. It is good practice to separate the security functions that generate and manage keys from user functions, and store the encryption keys in protected storage areas.

• System resources, denial of service and boundary protection — in case of attacks, malfunction or failure, the smart lighting system should provide a graceful degradation of services by maintaining limited functionality such as failsafe operations and default configuration sets, to prevent catastrophic failure. Firewalls, resources and traffic management functions can identify targeted or accidental denial of service attacks or monitor resource availability. Segregating services creates boundaries that help protect the operation of essential system functions from external influences.

• Remote access, wireless access and access from mobile devices — the system should protect remote, wireless or mobile access to the system using virtual private networks (VPNs), secure wireless access, and secure mobile interfaces. This allows only trusted users to have access to the system.

System and information integrity

It is essential for a system to operate flawlessly and for the integrity of both the system and information to be guaranteed. The following security controls help the system administrator maintain the integrity of the system:

• Malicious code protection — virus and malware scanners protect the system from viruses, Trojan horses, ransomware, backdoor attacks and many other forms of malicious code and malware. They continuously scan the control system for file transfers via network connections or sharable data mediums, and periodically scan the control system’s file system. When threats are detected, files are either quarantined or protected from opening or execution. To remain effective against evolving threats, malicious code protection tools must be updated on a regular basis and only the latest version must be run.

• System monitoring and system-generated events — to detect attacks or unauthorized use, smart lighting systems should notify the operator of any suspicious activity and provide the operator with a history of system activities.  Receiving such information allows an operator to troubleshoot or audit the system and detect current or future problems.

• Software, firmware, and information integrity — it is essential that operators and users trust that the system is running the correct software and firmware, and that neither is accidentally or maliciously altered. The integrity of both can be protected by various integrity checks and functions. For instance, validated digital signatures can be required to execute software and firmware. In the same way, the system needs to check the integrity of critical system and personal information by applying various types of integrity checks.

• Information input validation and error handling — input validation protects the system from accidental or malicious malfunction due to invalid inputs that could result in system or application crashes, system restarts, or system lock ups. It ensures maximum system availability and filters malicious input vectors that could be used to exploit the system. Proper error messages indicate user and system errors. They need to be meaningful enough that a user or system operator can easily understand the error and take proper action to correct the error. However, it is also important that these error messages can’t be used by an attacker to exploit the system.

• Fail-safe procedures — in the case of a system or system component failure, the control system should switch to a known fail-safe state and be able to execute fail-safe procedures. A fail-safe state could be a defined default state, error state, or other state that allows basic system functions to run independently of the failed system components. It is important that these states and procedures protect the safety of the system and its users, as well as the security functions of the system.

• Security function verification — the control system operator needs to trust system security functions. In many cases, control systems provide an integrated verification of these security functions. It is important that the operator or administrator of the system check the critical security functions on a regular basis.

The Encelium Extend Light Management System has been accepted as a secure system by the GSA (General Services Administration), an independent agency of the United States government, and is currently used for smart lighting in government and commercial buildings. Learn more: www.osram.us/ds/products/light-management-systems/encelium/index.jsp.

Part 4, available shortly, will focus on insider threats and more. 
Source https://info.osram.us/blog/smart-lighting-system-security-system-and-communications-protection-strategies

Related Articles


Latest Articles

  • Electrical Permit Requirements for Alarm System and Voice, Data, Video Installations

    Electrical Permit Requirements for Alarm System and Voice, Data, Video Installations

    January 19, 2026 Other than the exceptions listed below, electrical permits and inspections are required for all electrical work involved in the installation of intrusion and similar alarm systems in all structures. Electrical permits and inspections ensure that low -voltage systems are installed safely and in compliance with Code requirements. A permit and inspections must Read More…

  • The Role of Lighting in the AI-Powered Home

    The Role of Lighting in the AI-Powered Home

    January 14, 2026 Elizabeth Parks, President and CMO of Parks Associates, joins Derek Richardson, Founder and CEO of Deako, for a wide-ranging conversation on how lighting is becoming a core layer of the intelligent home. The discussion explores how Deako’s plug-and-play lighting approach is removing long-standing barriers to adoption by simplifying installation, reducing costs, and Read More…

  • What Canada’s Lighting Pulse Means for Contractors and Plant Buyers in 2026

    What Canada’s Lighting Pulse Means for Contractors and Plant Buyers in 2026

    January 14, 2025 By John Kerr From the ground, many contractors and plant teams are experiencing the same thing: jobs are there, but they are smaller, more price‑sensitive, and slower to release compared to past years. The Canadian Pulse of Lighting confirms that impression and offers some clear signals about how contractors and plant electrical Read More…

  • Guide to the Canadian Electrical Code, Part 1 – 26th Edition[i] – A Road Map: Section 54

    Guide to the Canadian Electrical Code, Part 1 – 26th Edition[i] – A Road Map: Section 54

    January 12, 2026 By Bill Burr The Code is a comprehensive document. Sometimes it can seem quite daunting to quickly find the information you need. This series of articles provides a guide to help users find their way through this critical document. This is not intended to replace the notes in Appendix B or the Read More…


Changing Scene

  • Leviton Canada Partners with The Titan Group to Strengthen Midwest Presence

    Leviton Canada Partners with The Titan Group to Strengthen Midwest Presence

    January 19, 2026 Leviton Canada is proud to announce its partnership with The Titan Group, who will now represent Leviton’s Residential and Commercial & Industrial product lines across the Midwest provinces, effective January 1, 2026. “We’re excited to begin our partnership with Titan,” said Bill Tischner, Western Sales Director. “Their industry expertise, commitment to service, Read More…

  • Hammond Power Solutions Appoints Xavier Biot as Vice President, Strategic Accounts

    Hammond Power Solutions Appoints Xavier Biot as Vice President, Strategic Accounts

    January 19, 2026 Hammond Power Solutions is pleased to announce the appointment of Xavier Biot as Vice President, Strategic Accounts. In this role, he will lead HPS’s strategic account teams. He will partner with customers to align transformer and power quality solutions with evolving electrification, sustainability, and operational needs. His focus will be on helping Read More…

  • Hammond Manufacturing Expands to Western Canada

    Hammond Manufacturing Expands to Western Canada

    January 13, 2026 Hammond Manufacturing have announced that they are opening a new distribution facility in the Southeast of Calgary, Alberta. The new facility includes over 50,000 sq ft of warehouse space. “This addition will better serve our customers in Western Canada and stock volume and larger products to ensure our distributors have an improve stock Read More…

  • ABB Chosen to Supply Technology for BC Ferries’ New Major Vessels

    ABB Chosen to Supply Technology for BC Ferries’ New Major Vessels

    January 12, 2026 ABB will supply a complete package of power, propulsion and control technology for four new double-ended passenger and car ferries operated by British Columbia Ferry Services (BC Ferries). One of the largest ferry operators in the world, BC Ferries provides year-round vehicle and passenger service on 25 routes to 47 terminals, carrying Read More…