Browse > Article
http://dx.doi.org/10.13089/JKIISC.2019.29.4.867

Development of Hardware In the Loop System for Cyber Security Training in Nuclear Power Plants  

Song, Jae-gu (Korea Atomic Energy Research Institute)
Lee, Jung-woon (Korea Atomic Energy Research Institute)
Lee, Cheol-kwon (Korea Atomic Energy Research Institute)
Lee, Chan-young (Korea Advanced Institute of Science and Technology)
Shin, Jin-soo (Korea Atomic Energy Research Institute)
Hwang, In-koo (Korea Atomic Energy Research Institute)
Choi, Jong-gyun (Korea Atomic Energy Research Institute)
Abstract
Security awareness and training are becoming more important as cyber security incidents tend to increase in industrial control systems, including nuclear power plants. For effective cyber security awareness and training for the personnel who manage and operate the target facility, a TEST-BED is required that can analyze the impact of cyber attacks from the sensor level to the operation status of the nuclear power plant. In this paper, we have developed an HIL system for nuclear power plant cyber security training. It includes nuclear power plant status simulations and specific system status simulation together with physical devices. This research result will be used for the specialized cyber security training program for Korean nuclear facilities.
Keywords
HIL; Nuclear I&C; Cyber Security Training;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Regulatory Guide 5.71, "Cyber security programs for nuclear facilities," U.S. Nuclear Regulatory Commission, Jan. 2010.
2 Regulatory Standard 015, "Regulatory standard on computer security of nuclear facilities," KINAC, Dec. 2016.
3 NIST SP800-53A Revision 1, " Guide for assessing the security controls in federal information systems," NIST, Jun. 2010.
4 International Atomic Energy Agency Nuclear Security Series No.17, "Computer security at nuclear Facilities," IAEA, Dec. 2011.
5 International Atomic Energy Agency Nuclear Security Series No.23-G, "Security of nuclear information implementing guide," IAEA, Feb. 2015.
6 C. Foreman and W. Lafayette, "Educational modules in industrial control systems for critical infrastructure cyber security," 122nd American Society for Engineering Education Annual Conference & Exposition, Jun. 2015.
7 T. Alves, R. Das, A. Werth, and T. Morris, "Virtualization of SCADA testbeds for cybersecurity research : a modular approach," Computer & Security, vol. 77, pp. 531-546, Aug. 2018.   DOI
8 G. A. Francia, "Scenario-based learning approach to industrial control systems security training," The 2018 International Conference on Security and Management, USA, pp. 111-116, Aug. 2018.
9 M. Dominguez, M. A. Prada, P. Reguera, J. J. Fuertes, S. Alonso, and A. Moran, "Cybersecurity training in control systems using real equipment," IFAC-Papers OnLine, vol. 50, no. 1, pp. 12179-12184, Jul. 2017.   DOI
10 I. Ahmed, V. Roussev, W. Johnson, and S. Senthivel, "A SCADA system testbed for cybersecurity and forensic research and pedagogy," pp. 1-8, Dec. 2016.
11 OPC Foundation, "Unified architecture," https://opcfoundation.org/about/opc-technologies/opc-ua/ (accessed May 21, 2019).
12 International Atomic Energy Agency, "Enhancing computer security incident analysis at nuclear facilities," https://www.iaea.org/projects/crp/j02008 (accessed May 21, 2019)
13 Jae Geun Kim, Nuclear power plant system, 1st Ed., Yeungnam University Press, Jul. 2013.
14 MathWorks, "Simulink," https://kr.mathworks.com/products/simulink.html(accessed May 21, 2019).