Skip to main content
Erschienen in: The Journal of Supercomputing 3/2018

13.04.2017

An analytical method for developing appropriate protection profiles of Instrumentation & Control System for nuclear power plants

verfasst von: Manhyun Chung, Woogeun Ahn, Byunggil Min, Jungtaek Seo, Jongsub Moon

Erschienen in: The Journal of Supercomputing | Ausgabe 3/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A very important target of Instrumentation & Control System used in nuclear power plants is to ensure the safe operation of these plants. Until recently, an analog technology has been used for this purpose; however, this is now being replaced by the digital technology. Such replacement is facilitated by the wide use of real-time distribution of data that are collected by sensor devices of machine-to-machine technology. This, however, provides possibility of exposing Instrumentation & Control System to cyber-attack, as was the case for the Iranian Bushehr nuclear power plant, which the centrifuge was destroyed by the malicious code, Stuxnet. Therefore, security products which are exclusively developed for the prevention of cyber-attack on nuclear power plants are particularly needed in the development and operation of Instrumentation & Control System. However, the currently available security guidelines for such Instrumentation & Control System cover only security policies and protocols, without any specific reference urgent issues of cyber-attack. This paper proposes an implementable Instrumentation & Control System analysis model having focus on cyber security and technology evaluation. The model has been already implemented in reactor protection systems that is operating in Republic of Korea.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Lee C-K (2012) Cyber security technology trends of instrumentation and control system in nuclear power plants. Rev Korean Inst Inf Secur Cryptol 22(5):28–34 Lee C-K (2012) Cyber security technology trends of instrumentation and control system in nuclear power plants. Rev Korean Inst Inf Secur Cryptol 22(5):28–34
2.
Zurück zum Zitat Koo I-S, Kim K-W, Hong S-B, Park G-O, Park J-Y (2011) Digital asset analysis methodology against cyber threat to instrumentation and control system in nuclear power plants. J Korean Inst Electron Commun Sci 6(6):839–847 Koo I-S, Kim K-W, Hong S-B, Park G-O, Park J-Y (2011) Digital asset analysis methodology against cyber threat to instrumentation and control system in nuclear power plants. J Korean Inst Electron Commun Sci 6(6):839–847
3.
Zurück zum Zitat Symantec Security Response (2011) W32.Stuxnet Dossier, Rev. 1.4 Symantec Security Response (2011) W32.Stuxnet Dossier, Rev. 1.4
5.
Zurück zum Zitat 10 CFR 73.54 Protection of digital computer and communication systems and networks, March 2009 10 CFR 73.54 Protection of digital computer and communication systems and networks, March 2009
6.
Zurück zum Zitat NRC Regulatory Guide 5.71. Cyber security programs for nuclear power facilities. US NRC, Jan 2010 NRC Regulatory Guide 5.71. Cyber security programs for nuclear power facilities. US NRC, Jan 2010
7.
Zurück zum Zitat National Institute of Criteria and Technology (2009) Special publication 800-53, Aug 2009 National Institute of Criteria and Technology (2009) Special publication 800-53, Aug 2009
8.
Zurück zum Zitat National Institute of Criteria and Technology (2011) Special publication 800-82, June 2011 National Institute of Criteria and Technology (2011) Special publication 800-82, June 2011
9.
Zurück zum Zitat International Atomic Energy Agency (2011) IAEA nuclear security series no. 17, Computer security at nuclear facilities. IAEA, Vienna International Atomic Energy Agency (2011) IAEA nuclear security series no. 17, Computer security at nuclear facilities. IAEA, Vienna
10.
Zurück zum Zitat Suo H, Wan J, Zou C, Liu J (2012) Security in the internet of things: a review. In: 2012 International Conference on Computer Science and Electronics Engineering, pp 648–651, 23–25 March 2012 Suo H, Wan J, Zou C, Liu J (2012) Security in the internet of things: a review. In: 2012 International Conference on Computer Science and Electronics Engineering, pp 648–651, 23–25 March 2012
11.
Zurück zum Zitat Roman R, Najera P, Lopez J (2011) Securing the internet of things. Comput Mag 44(9):51–58CrossRef Roman R, Najera P, Lopez J (2011) Securing the internet of things. Comput Mag 44(9):51–58CrossRef
12.
Zurück zum Zitat Li N (2010) Research on Diffie–Hellman key exchange protocol. In: Computer Engineering and Technology (ICCET), vol 4, pp 634–637, 16–18 Apr 2010 Li N (2010) Research on Diffie–Hellman key exchange protocol. In: Computer Engineering and Technology (ICCET), vol 4, pp 634–637, 16–18 Apr 2010
15.
Zurück zum Zitat European Network and Information Security Agency (2013) ENISA threat landscape, Jan 2013 European Network and Information Security Agency (2013) ENISA threat landscape, Jan 2013
20.
Zurück zum Zitat International Organization for Standardization. ISO/IEC 27001:2005 (information technology—security techniques—information security management systems—requirements) International Organization for Standardization. ISO/IEC 27001:2005 (information technology—security techniques—information security management systems—requirements)
21.
Zurück zum Zitat Lee D-Y, Choi J-G, Lyou J (2006) A safety assessment methodology for a digital reactor protection system. Int J Control Autom Syst 4(1):105–112 Lee D-Y, Choi J-G, Lyou J (2006) A safety assessment methodology for a digital reactor protection system. Int J Control Autom Syst 4(1):105–112
22.
Zurück zum Zitat Song J-G, Lee J-W, Lee C-K, Kwon K-C, Lee D-Y (2012) A cyber security risk assessment for the design of I&C systems in nuclear power plants. Nucl Eng Technol 44(8):919–928 Song J-G, Lee J-W, Lee C-K, Kwon K-C, Lee D-Y (2012) A cyber security risk assessment for the design of I&C systems in nuclear power plants. Nucl Eng Technol 44(8):919–928
Metadaten
Titel
An analytical method for developing appropriate protection profiles of Instrumentation & Control System for nuclear power plants
verfasst von
Manhyun Chung
Woogeun Ahn
Byunggil Min
Jungtaek Seo
Jongsub Moon
Publikationsdatum
13.04.2017
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 3/2018
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-017-2034-6

Weitere Artikel der Ausgabe 3/2018

The Journal of Supercomputing 3/2018 Zur Ausgabe

Premium Partner