CS Measures for Nuclear Power Plant Protection: A Systematic Literature Review
Abstract
:1. Introduction
2. Research Method
2.1. Objectives and Scope
- –
- RQ1: What measures and solutions have been proposed in the literature for nuclear power plant CS?
- –
- RQ2: What are the interdependencies among the measures and solutions?
- –
- RQ3: How can these measures be utilized and implemented in NPPs to offer comprehensive and complementary CS?
2.2. Review Protocol
2.3. Literature Search
2.4. Practical Screening, Quality Assessment, and Selection of Studies
- –
- Only articles written in English were selected;
- –
- Only scientific articles published in conferences, workshops, and journals were selected;
- –
- Articles published before January 2010 were excluded;
- –
- Duplicates found through multiple databases were excluded;
- –
- Articles that were not accessible to the author were excluded.
2.5. Data Extraction and Monitoring
- –
- Title and Year: title of the paper and year of publishing;
- –
- Authors: list of contributing authors;
- –
- Domain: area or domain of focus of the article;
- –
- Proposed/Discussed Method: CS measures proposed or analyzed by the authors;
- –
- Description: brief description of the content of the paper;
- –
- Conclusions: final conclusions and outputs presented by the authors;
- –
- Discussion and Review: Our own analysis and evaluation of the content of the individual papers. This included any criticism and suggestions for potential improvements.
2.6. Composing the Review
3. Related Work
- –
- Development and testing;
- –
- Secure design;
- –
- Biological approaches to security;
- –
- Usable security;
- –
- CS metrics;
- –
- Anomaly and misuse detection systems;
- –
- Policy security;
- –
- Cyber retaliation;
- –
- CS related to legal issues;
- –
- The economics of CS;
- –
- In security cyber defense;
- –
- Spam dealing.
4. Literature Review
4.1. Critical Digital Assets in Nuclear Power Plants
4.2. Risk Assessment and Threat Analysis for NPPs
- –
- Lack of assessment methods for computer security conditions and identification of security vulnerabilities;
- –
- Lack of assessment methods for computer risks and threats;
- –
- The development stage does not consider computer security issues;
- –
- Lack of consideration for aspects of training and attestation of personnel concerning computer security.
- –
- Information-gathering attacks;
- –
- Active attacks to disable or compromise the proper functioning of one or several computers or other devices critical to a facility’s safety or security;
- –
- Concurrent modes of attack.
4.3. Measures for NPP Protection
- –
- A simulated power market for providing the cost of the provided energy;
- –
- An actual Programmable Logic Controller (PLC), which is interconnected with a specific bus of the power network;
- –
- An emulated cyber network that interconnects and controls all of the aforementioned elements.
5. Discussion
6. Conclusions
7. Future Research
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Porthin, M.; Liinasuo, M.; Kling, T. Effects of digitalization of nuclear power plant control rooms on human reliability analysis–A review. Reliab. Eng. Syst. Saf. 2020, 194, 106415. [Google Scholar] [CrossRef]
- Kim, D.Y. Cyber security issues imposed on nuclear power plants. Ann. Nucl. Energy 2014, 65, 141–143. [Google Scholar] [CrossRef]
- Langner, R. Stuxnet: Dissecting a cyberwarfare weapon. IEEE Comput. Secur. 2011, 9, 49–51. [Google Scholar] [CrossRef]
- Chen, T.M.; Abu-Nimeh, S. Lessons from stuxnet. Computer 2011, 44, 91–93. [Google Scholar] [CrossRef]
- Farwell, J.P.; Rohozinski, R. Stuxnet and the future of cyber war. Survival 2011, 53, 23–40. [Google Scholar] [CrossRef]
- Park, J.; Suh, Y.; Park, C. Implementation of cyber security for safety systems of nuclear facilities. Prog. Nucl. Energy 2016, 88, 88–94. [Google Scholar] [CrossRef]
- Kim, S.; Kim, S.; Nam, K.H.; Kim, S.; Kwon, K.h. Cyber Security Strategy for Nuclear Power Plant through Vital Digital Assets. In Proceedings of the 2019 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 5–7 December 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 224–226. [Google Scholar]
- Cherdantseva, Y.; Burnap, P.; Blyth, A.; Eden, P.; Jones, K.; Soulsby, H.; Stoddart, K. A review of cyber security risk assessment methods for SCADA systems. Comput. Secur. 2016, 56, 1–27. [Google Scholar] [CrossRef] [Green Version]
- Ganin, A.A.; Quach, P.; Panwar, M.; Collier, Z.A.; Keisler, J.M.; Marchese, D.; Linkov, I. Multicriteria decision framework for cybersecurity risk assessment and management. Risk Anal. 2020, 40, 183–199. [Google Scholar] [CrossRef]
- Hadlington, L. Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours. Heliyon 2017, 3, e00346. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Gupta, D.; Bajramovic, E.; Hoppe, H.; Ciriello, A. The need for integrated cybersecurity and safety training. J. Nucl. Eng. Radiat. Sci. 2018, 4, 041006. [Google Scholar] [CrossRef]
- Moher, D.; Liberati, A.; Tetzlaff, J.; Altman, D.G.; PRISMA Group. Preferred reporting items for systematic reviews and meta-analyses: The PRISMA statement. PLoS Med. 2009, 6, e1000097. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Kofod-Petersen, A. How to Do a Structured Literature Review in Computer Science. Ver. 0.1. 1 October 2012. Available online: https://docplayer.net/43782220-How-to-do-a-structured-literature-review-in-computer-science.html (accessed on 10 May 2021).
- Khattak, M.A.; Shaharuddin, M.K.H.; Islam, M.S.; Ahmad, M.H.N. Review of cyber security applications in nuclear power plants. J. Adv. Res. Appl. Sci. Eng. Technol. 2017, 7, 43–54. [Google Scholar]
- Baumeister, T. Literature Review on Smart Grid Cyber Security. Available online: https://csdl.ics.hawaii.edu/techreports/2010/10-11/10-11.pdf (accessed on 10 May 2021).
- Walker-Roberts, S.; Hammoudeh, M.; Dehghantanha, A. A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure. IEEE Access 2018, 6, 25167–25177. [Google Scholar] [CrossRef]
- Henrie, M. Cyber security risk management in the SCADA critical infrastructure environment. Eng. Manag. J. 2013, 25, 38–45. [Google Scholar] [CrossRef]
- Kim, Y.S.; Moon, I.S.; Lee, S.I. A design of cyber security test-bed for DPPS and PMAS in Korean operating nuclear power plant. In Proceedings of the 2016 16th International Conference on Control, Automation and Systems (ICCAS), Gyeongju, Korea, 16–19 October 2016; pp. 1480–1483. [Google Scholar]
- Symonov, A.; Klevtsov, A. About the problem of regulatory activity for computer security of NPP instrumentation and control systems in Ukraine. In Proceedings of the 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), Kyiv, UKraine, 24–27 May 2018; pp. 6–11. [Google Scholar]
- Wang, W.; Cammi, A.; Di Maio, F.; Lorenzi, S.; Zio, E. A Monte Carlo-based exploration framework for identifying components vulnerable to cyber threats in nuclear power plants. Reliab. Eng. Syst. Saf. 2018, 175, 24–37. [Google Scholar] [CrossRef] [Green Version]
- Song, J.G.; Lee, J.W.; Park, G.Y.; Kwon, K.C.; Lee, D.Y.; Lee, C.K. An analysis of technical security control requirements for digital I&C systems in nuclear power plants. Nucl. Eng. Technol. 2013, 45, 637–652. [Google Scholar]
- Chung, M.; Ahn, W.; Min, B.; Seo, J.; Moon, J. An analytical method for developing appropriate protection profiles of Instrumentation & Control System for nuclear power plants. J. Supercomput. 2018, 74, 1378–1393. [Google Scholar]
- Peterson, J.; Haney, M.; Borrelli, R. An overview of methodologies for cybersecurity vulnerability assessments conducted in nuclear power plants. Nucl. Eng. Des. 2019, 346, 75–84. [Google Scholar] [CrossRef]
- Park, J.W.; Lee, S.J. A quantitative assessment framework for cyber-attack scenarios on nuclear power plants using relative difficulty and consequence. Ann. Nucl. Energy 2020, 142, 107432. [Google Scholar] [CrossRef]
- Ibrahim, M.; Al-Hindawi, Q. Attack graph modeling for nuclear power plant. In Proceedings of the 2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Iasi, Romania, 28–30 June 2018; pp. 1–6. [Google Scholar]
- Soupionis, Y.; Piccinelli, R.; Benoist, T. Cyber security impact on power grid including nuclear plant. In Proceedings of the 2016 Federated Conference on Computer Science and Information Systems (FedCSIS), Gdansk, Poland, 1–14 September 2016; pp. 767–773. [Google Scholar]
- Cho, H.S.; Woo, T.H. Cyber security in nuclear industry–Analytic study from the terror incident in nuclear power plants (NPPs). Ann. Nucl. Energy 2017, 99, 47–53. [Google Scholar] [CrossRef]
- Shin, J.; Son, H.; Heo, G. Cyber security risk evaluation of a nuclear I&C using BN and ET. Nucl. Eng. Technol. 2017, 49, 517–524. [Google Scholar]
- Kim, S.; Heo, G.; Zio, E.; Shin, J.; Song, J.g. Cyber attack taxonomy for digital environment in nuclear power plants. Nucl. Eng. Technol. 2020, 52, 995–1001. [Google Scholar] [CrossRef]
- Cho, C.S.; Chung, W.H.; Kuo, S.Y. Cyberphysical security and dependability analysis of digital control systems in nuclear power plants. IEEE Trans. Syst. Man Cybern. Syst. 2015, 46, 356–369. [Google Scholar] [CrossRef]
- Kim, J.H.; Choi, Y.S.; Na, J.C. Cybersecurity Vulnerability Scanner for Digital Nuclear Power Plant Instrumentation and Control Systems. In Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, Shenzhen, China, 8–10 December 2018; pp. 463–467. [Google Scholar]
- Gupta, D.; Bajramovic, E.; Parekh, M.; Waedt, K. Cyber threat scenarios for electrical systems of nuclear power plants. In Proceedings of the 2018 26th International Conference on Nuclear Engineering, London, UK, 22–26 July 2018. [Google Scholar]
- Lee, C.; Yim, H.B.; Seong, P.H. Development of a quantitative method for evaluating the efficacy of cyber security controls in NPPs based on intrusion tolerant concept. Ann. Nucl. Energy 2018, 112, 646–654. [Google Scholar] [CrossRef]
- Vaddi, P.K.; Pietrykowski, M.C.; Kar, D.; Diao, X.; Zhao, Y.; Mabry, T.; Ray, I.; Smidts, C. Dynamic bayesian networks based abnormal event classifier for nuclear power plants in case of cyber security threats. Prog. Nucl. Energy 2020, 128, 103479. [Google Scholar] [CrossRef]
- Jharko, E.; Promyslov, V.; Iskhakov, A. Extending Functionality of Early Fault Diagnostic System for Online Security Assessment of Nuclear Power Plant. In Proceedings of the 2019 International Russian Automation Conference (RusAutoCon), Sochi, Russia, 8–14 September 2019; pp. 1–6. [Google Scholar]
- Zhao, Y.; Huang, L.; Smidts, C.; Zhu, Q. Finite-horizon semi-Markov game for time-sensitive attack response and probabilistic risk assessment in nuclear power plants. Reliab. Eng. Syst. Saf. 2020, 201. [Google Scholar] [CrossRef]
- 692-1997—IEEE Standard Criteria for Security Systems for Nuclear Power Generating Stations; IEEE: Piscataway, NJ, USA, 1997; ISBN 978-0-7381-0711-0. [CrossRef]
- Adams, S.S.; Murchison, N.; Bruneau, R.J. Investigating Cyber Threats in a Nuclear Power Plant. Available online: https://www.osti.gov/servlets/purl/1593630 (accessed on 10 May 2021).
- Son, J.; Choi, J.; Yoon, H. New Complementary Points of Cyber Security Schemes for Critical Digital Assets at Nuclear Power Plants. IEEE Access 2019, 7, 78379–78390. [Google Scholar] [CrossRef]
- Boring, R.L.; Ulrich, T.A.; Medema, H.M.; Lew, R. Operator Resilience to Cyber Interdictions in Nuclear Power Plants. In Proceedings of the 2019 Resilience Week (RWS), San Antonio, TX, USA, 4–7 November 2019; pp. 247–251. [Google Scholar]
- Park, J.W.; Lee, S.J. Probabilistic safety assessment-based importance analysis of cyber-attacks on nuclear power plants. Nucl. Eng. Technol. 2019, 51, 138–145. [Google Scholar] [CrossRef]
- Yan, Z.Y.; Chun, Z.J.; Liu, G.J.; Zou, L.L. Risk analysis of cyber security in nuclear power plant. In Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems. SICPNPP 2017. Lecture Notes in Electrical Engineering; Springer Nature Singapore Pte Ltd.: Singapore, 2017. [Google Scholar]
- Zhang, F.; Coble, J.B. Robust localized cyber-attack detection for key equipment in nuclear power plants. Prog. Nucl. Energy 2020, 128, 103446. [Google Scholar] [CrossRef]
- Jharko, E.P. Safety Functions in the Software Quality Assurance of NPP Safety Important Systems. In Proceedings of the 2019 International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM), Sochi, Russia, 25–29 March 2019; pp. 1–6. [Google Scholar]
- Liu, D.; Chen, Y.; Shi, J.; Chen, D. Study on Cyber Security Risk Assessment of Digital Instrumentation &Control System of Nuclear Power Plant. In Proceedings of the 2018 International Conference on Power System Technology (POWERCON), Guangzhou, China, 6–8 November 2018; pp. 4742–4750. [Google Scholar]
- Kim, H.E.; Son, H.S.; Kim, J.; Kang, H.G. Systematic development of scenarios caused by cyber-attack-induced human errors in nuclear power plants. Reliab. Eng. Syst. Saf. 2017, 167, 290–301. [Google Scholar] [CrossRef]
- Jones, R.A.; Nguyen, T.V.; Horowitz, B.M. System-aware security for nuclear power systems. In Proceedings of the 2011 IEEE International Conference on Technologies for Homeland Security (HST), Waltham, MA, USA, 15–17 November 2011; pp. 224–229. [Google Scholar]
- Barker, R.; Cheese, C. The application of data diodes for securely connecting nuclear power plant safety systems to the corporate it network. In Proceedings of the 7th IET International Conference on System Safety, Incorporating the Cyber Security Conference 2012, Edinburgh, UK, 15–18 October 2012. [Google Scholar]
- Li, J.; Guo, C.; Si, W.; Huang, X. The Approaches of Prevention, Detection, and Response for Cybersecurity of I&C Systems in NPPs. In Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems. SICPNPP 2018. Lecture Notes in Electrical Engineering; Springer Nature Singapore Pte Ltd.: Singapore, 2018; pp. 283–290. [Google Scholar]
- International Atomic Energy Agency. Computer Security at Nuclear Facilities: Reference Manual: Technical Guidance; International Atomic Energy Agency: Vienna, Austria, 2012. (In Chinese)
- Kang, Y.D.; Chong, K.T. Development of cyber security assessment methodology for the instrumentation & control systems in nuclear power plants. J. Korea Acad.-Ind. Coop. Soc. 2010, 11, 3451–3457. [Google Scholar]
- Han, S.M.; Seong, P.H. Suggestion of Initiating Threats and Bounding Groups for NPP Cyber Risk Assessment. In Proceedings of the Transactions of the Korean Nuclear Society Autumn Meeting, Yeosu, Korea, 25–26 October 2018. [Google Scholar]
Scopus | IEEE Xplore | ACM | Total | |
---|---|---|---|---|
CS + Nuclear | 207 | 45 | 281 | 533 |
Section/Topic | Checklist Item |
---|---|
|
|
Work | Domain | Recommendations | Challenges | Shortcomings |
---|---|---|---|---|
Khattak et al. [14] | NPP CS | Establish SC framework composed of policies, CS team, security instrumentation, and a CS plan. | Lack of research and experience in NPP digital security and process control frameworks. | Work heavily relies on the outdated and regional RG 1.152 US regulation. The proposed NPP security framework is not very cohesive and is described at a high level of abstraction for various components. |
Baumeister [15] | Smart Grid security | Used IDS in smart meters and other Smart Grid components; secure communication challenges; used a simulation to evaluate Smart Grid security. | Challenges due to the physical nature of Smart Grids, which causes them to be spread over large areas and be composed of many pieces. There is a need for advancements in current Smart Grid simulators. | The work describes various CS solutions for Smart Grids in a granular fashion instead of proposing a holistic model. |
Walker-Roberts et al. [16] | Healthcare CI security | Use of multiple security measures at once. Ensured that confidential information is accessible only to authorized personnel. Improved the accuracy of current instrumentation. | Current machine learning techniques used to predict and prevent attacks and incidents are not accurate enough. Algorithms need optimization. | The work only considered certain aspects of healthcare CI CS, excluding others, such as personnel unawareness and lack of sophisticated policies. |
Henrie [17] | SCADA CI security | Mitigation approach based on policies, procedures, technological solutions, standards, and best practices. | It is hard to prevent unintentional internal incidents. Risk analysis techniques sometimes do not consider the ratio of incident likelihood to possible damages. | While the work does suggest a well-structured and multi-layered mitigation approach, it does not describe the layers with enough detail to aid in developing an appropriate framework. |
Work | Domain | Proposed Measure |
---|---|---|
Kim et al. [18] | Digital plant protection system; plant monitoring annunciator system | CS testbeds. |
Symonov and Klevtsov [19] | Cyber threats in an NPP regulatory framework in the area of computer security of NPPs | Protection plans and attack mitigation; normative document. |
Wang et al. [20] | NPPs’ vulnerable components and failure points | Monte-Carlo-based exploration framework for identifying components vulnerable to cyber threats in NPPs. |
Song et al. [21] | Technical definition control | Analysis of attack vectors and penetration tests. |
Chung et al. [22] | Digital Instrumentation and Control (I&C) Systems | Implementable instrumentation and control system analysis model. |
Peterson et al. [23] | Digital I&C systems | Review of past cyber-vulnerability incidents. |
Park and Lee [24] | Digital I&C Systems | Quantitative assessment framework for evaluating NPP risk due to cyber attack scenarios. |
Ibrahim and Al-Hindawi [25] | NPP modeling and verification | Attack graph modeling for a nuclear power plant modeled using the Architecture Analysis and Design Language (AADL). |
Soupionis et al. [26] | Distributed Control Systems (DCSs) | Simulated the power grid network (including nuclear plant), but emulated the Information and Communications Technology (ICT). |
Cho and Woo [27] | Cyber terror attacks | Defense-in-depth concept. |
Shin et al. [28] | Digital equipment and digital systems | CS risk evaluation model. |
Kim et al. [29] | Industrial Control Systems (ICSs) and Supervisory Control and Data Acquisition (SCADA) | Template for cyber attack taxonomy. |
Cho et al. [30] | Digital and cyber-based systems | Levels/layers of protection to manage cyber/physical security. |
Kim et al. [7] | Digital assets | Criteria for identifying digital assets. |
Kim et al. [31] | CS incident affecting the NPP I&C | CS vulnerability checking system. |
Cho and Woo [27] | Nuclear terror | Study of twelve nuclear terror cases. |
Kim [2] | Digital control systems | Countermeasures for protecting nuclear power plants against cyber attacks. |
Gupta et al. [32] | Electrical Power System (EPS) design and implementation | Cyber threat scenarios for the EPSs and EPS interfaces. |
Lee et al. [33] | Digital I&C systems’ regulatory documents | Quantitative method for evaluating the efficacy of security controls for DI&C systems in NPPs based on the intrusion-tolerant concept. |
Vaddi et al. [34] | Digital I&C Systems | Event classifier for classifying abnormal events. |
Jharko et al. [35] | Digital I&C Systems | Early fault diagnostic system (EDS). |
Zhao et al. [36] | Risk assessment in NPPs | Finite-horizon semi-Markov general-sum game. |
“IEEE Standard Criteria for Security Systems for Nuclear Power Generating Stations” [37] | NPP design requirements | Criteria for the design of an integrated security system for nuclear-power-generating stations. |
Adams et al. [38] | CS attack prevention in NPPs | Cyber emulation of a digital control system. |
Son et al. [39] | Digital assets | Approach to comparing and analyzing various methods used in the CS field to discover complementary points for the application of CS to critical systems in NPPs. |
Boring et al. [40] | Role of reactor operators in detecting and mitigating cyber attacks in NPPs | Cyber concept of operations. |
Park and Lee [41] | Digital assets | Importance analysis method for cyber attacks on an NPP. |
Khattak et al. [14] | NPPs CS | Review of CS applications in nuclear power plants. |
Zou [42] | NPPs CS | Security risk analysis of NPPs. |
Zhang and Coble [43] | Digital I&C Systems | Localized kit for key equipment in a process as a complementary detection method to improve the robustness of key equipment under cyber attacks. |
Jharko [44] | Faults of safety-critical software | Approach based on the “safety functions” for software verification of upper-level systems of automated process control systems. |
Liu et al. [45] | Digital I&C Systems | General configuration and functions of a digital I&C system of an NPP. |
Kim et al. [46] | Digital I&C Systems | Analysis of the effects of safety system unavailability on plant safety and human actions based on emergency operating procedures. |
Jones et al. [47] | NPPs CS | Systems-engineering-focused approach for addressing NPP cyber threats. |
Barker and Cheese [48] | NPP CS | Diode technology for providing corporate users with real-time plant data. |
Li et al. [49] | Digital I&C Systems | Specific approaches to implementing a framework for I&C systems for prevention, detection, and response. |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Chowdhury, N. CS Measures for Nuclear Power Plant Protection: A Systematic Literature Review. Signals 2021, 2, 803-819. https://doi.org/10.3390/signals2040046
Chowdhury N. CS Measures for Nuclear Power Plant Protection: A Systematic Literature Review. Signals. 2021; 2(4):803-819. https://doi.org/10.3390/signals2040046
Chicago/Turabian StyleChowdhury, Nabin. 2021. "CS Measures for Nuclear Power Plant Protection: A Systematic Literature Review" Signals 2, no. 4: 803-819. https://doi.org/10.3390/signals2040046