Browse > Article
http://dx.doi.org/10.13067/JKIECS.2014.9.2.267

Security Criteria for Design and Evaluation of Secure Plant Data Network on Nuclear Power Plants  

Kim, Do-Yeon (순천대학교 컴퓨터공학과)
Publication Information
The Journal of the Korea institute of electronic communication sciences / v.9, no.2, 2014 , pp. 267-271 More about this Journal
Abstract
Nuclear power plant data networks and their associated safety systems are being modernized to include many information technology (IT) networks and applications. Along with the advancement of plant data networks (PDN), instrumentation and control systems are being upgraded with modern digital, microprocessor-based systems. However, nuclear PDN is confronted significant side-effects, which PDN is exposed to prevalent cyber threats typically found in IT environments. Therefore, cyber security vulnerabilities and possibilities of cyber incidents are dramatically increased in nuclear PDN. Consequently, it should be designed fully ensuring the PDN meet all reliability, performance and security requirements in order to overcome the disadvantages raised from adaption of IT technology. In this paper, we provide technical security criteria should be used in design and evaluation of secure PDN. It is believed PDN, which is designed and operated along with these technical security critera, effectively protect against possible outside cyber threats.
Keywords
Nuclear Power Plant; Technical Security Criteria; Secure Plant Data Network;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 N. Falliere, L. O. Murchu, and E. Chien, Win32.stuxnet Dossier. Symantec Security Response, 2011.
2 Y. Choi, Y. Choi, J. Lee, C. Wan, I. Koo, and S. Hong "Study on the Construction of Cyber Security for the Nuclear Power Plants," Fall Conf. from Korea Society of IT Services, 2009, pp. 537-538.   과학기술학회마을
3 Y. Cha, B. Cho, and J. Na, "Security Technology Trends and Prospective of Industrial Control System," KEIT PD Issue Report, vol. 13, no. 6, 2013, pp. 79-100.
4 NRC Information Notice 2003-14, Potential Vulnerability of Plant Computer Network to Worm Infection. Nuclear Regulatory Commission, 2003.
5 NRC Information Notice 2007-15, Effects of Ethenet based, no-safety related controls on the safe and continued operation of nuclear power stations. Nuclear Regulatory Commission, 2007.
6 W. Seo and M. Jun, "A Direction of Convergence and Security of Smart Grid and Information Communication Network," J. of the Korea Institute of Electronic Communication Sciences, vol. 5, no. 5, 2010, pp. 477-486.   과학기술학회마을
7 I. Koo, K. Kim, S. Hong, G. Park, and J. Park, "Digital Asset Analysis Methodology against Cyber Threat to I&C System in NPP," J. of the Korea Institute of Electronic Communication Sciences, vol. 6, no. 6, 2011, pp. 839-847.   과학기술학회마을
8 C. Yoon, G. Kim, and C. Jang, "Embedded-based Power Monitoring Security Module Design," J. of the Korea Institute of Electronic Communication Sciences, vol. 8, no. 10, 2013, pp. 1485-1490.   과학기술학회마을   DOI   ScienceOn
9 C. K. Veitch, S. Wade, and J. T. Michalski, Cyber Security Assessment Tools and Methodologies for the Evaluation of Secure Network Design at Nuclear Power Plants. Sandia National Laboratories, 2012.
10 NRC NUREG/CR-7117, Secure Network Design. Nuclear Regulatory Commission, 2012.
11 J. T. Michalski, F. J. Wyant, and D. Duggan, Secure Network Design Techniques for Safety System Applications at Nuclear Power Plants. Sandia National Laboratories, 2010.