Browse > Article
http://dx.doi.org/10.1016/j.net.2018.01.018

Development of field programmable gate array-based encryption module to mitigate man-in-the-middle attack for nuclear power plant data communication network  

Elakrat, Mohamed Abdallah (Department of Nuclear Engineering, KEPCO International Nuclear Graduate School)
Jung, Jae Cheon (Department of Nuclear Engineering, KEPCO International Nuclear Graduate School)
Publication Information
Nuclear Engineering and Technology / v.50, no.5, 2018 , pp. 780-787 More about this Journal
Abstract
This article presents a security module based on a field programmable gate array (FPGA) to mitigate man-in-the-middle cyber attacks. Nowadays, the FPGA is considered to be the state of the art in nuclear power plants I&C systems due to its flexibility, reconfigurability, and maintainability of the FPGA technology; it also provides acceptable solutions for embedded computing applications that require cybersecurity. The proposed FPGA-based security module is developed to mitigate information-gathering attacks, which can be made by gaining physical access to the network, e.g., a man-in-the-middle attack, using a cryptographic process to ensure data confidentiality and integrity and prevent injecting malware or malicious data into the critical digital assets of a nuclear power plant data communication system. A model-based system engineering approach is applied. System requirements analysis and enhanced function flow block diagrams are created and simulated using CORE9 to compare the performance of the current and developed systems. Hardware description language code for encryption and serial communication is developed using Vivado Design Suite 2017.2 as a programming tool to run the system synthesis and implementation for performance simulation and design verification. Simple windows are developed using Java for physical testing and communication between a personal computer and the FPGA.
Keywords
AES-128; Cyber Security; Encryption; Field Programmable Gate Array; I&C;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Ronnie Swanink, Persistent Effects of Man-in-the-middle Attacks, Bachelor thesis, Computer Science, Radboud University, January 10th, 2016.
2 William Stallings, Cryptography and Network Security Principal and Practice, fifth ed., Prentice Hall, 2011.
3 TCG, Specifications Architecture Overview, August 2007 version 1.4.
4 B. Badrignans, F. Devic, L. Torres, G. Sassatelli, P. Benoit, Embedded systems security for FPGA, Springer link book, 2011, pp. 189-190.
5 C. Paar, J. Pelzl, Understanding Cryptography Textbook, Springer, 2010.
6 IEC 62566, Nuclear power plants e Instrumentation and control important to safety e development of HDL-programmed integrated circuits for systems performing category a functions, Edition 1.0 2012-01.
7 SAFETY STANDARDS SERIES SSG-39, Design of Instrumentation and Control Systems for Nuclear Power Plants, IAEA, Vienna, 2016.
8 J. Ranta, The current state of FPGA technology in the nuclear domain vol. 10, VTT TECHNOLOGY, 2012.
9 U.S.NRC 10 CFR 73.54, Protection of Digital Computer and Communication Systems and Networks [Last update: 2015, December 2], Available from: http://www.nrc.gov/.
10 U.S.NRC, Regulatory Guide 5.71, Cybersecurity Programs for Nuclear Facilities, January 2010. Available from: http://www.nrc.gov/.
11 Cybersecurity Framework, National Institute of Standards and Technology, February 2014. https://www.nist.gov/cyberframework.
12 Guide for Applying the Risk Management Framework to Federal Information Systems: A security life cycle approach, National Institute of standards and technology NIST, Special Publication, October 2016, pp. 800-837. Revision 1.
13 Recommendation for Key Management,- NIST Special Publication 800-57 Part 1, Revision 3, July 2012, https://doi.org/10.6028/NIST.SP.800-57p1r3.   DOI
14 U.S.NRC, NUREG/CR-7006, Review Guidelines for field-programmable gate arrays in nuclear power plant safety systems, 2009.
15 Nexys $Video^{TM}$ FPGA Board Reference Manual, Digilentinc, May 2017, https://reference.digilentinc.com/reference/...logic/nexys-video.
16 Vitech COREsim User Guide, CORE 9 Version. [Cited 2016 August 16] Available from: http://www.vitechcorp.com/.
17 Vivado Design Suite Tutorial Using Constraints UG945 (v2015.2), June 24, 2015. https://www.xilinx.com/.
18 Block Cipher Modes of Operation, National Institute of Standards and Technology NIST, October 2010.
19 IEEE Standard for Criteria for Digital Computer in Safety System of Nuclear Power Generating Stations, IEEE Std 7-4.3.2TM, 2010.
20 Hu, T. and Desai, J.P. (2004) Soft-Tissue Material properties under large Deformation: Strain rate effect. Proceedings of the 26th Annual International Conference of the IEEE EMBS, San Francisco, 1-5 September 2004, 2758-2761.
21 Y. Aruna, FPGA based implementation of AES encryption and decryption with verilog HDL, in: International Conference on Industrial Automation and Computing, ICIAC, April 2014.
22 IEC, Nuclear power plants e Instrumentation and control important to safety - development of HDL-programmed integrated circuits for systems performing category A.
23 Cybersecurity Plan for Nuclear Power Reactors, NEI 08-09 [Rev. 6], April 2010.