• Title/Summary/Keyword: Digital I&C system

Search Result 201, Processing Time 0.022 seconds

The Strategy for Intelligent Integrated Instrumentation and Control System Development

  • Kwon, Kee-Choon;Ham, Chang-Shik
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1995.10a
    • /
    • pp.153-158
    • /
    • 1995
  • All of the nuclear power plants in Korea we operating with analog instrumentation and control (I&C) equipment which are increasingly faced with frequent troubles, obsolescence and high maintenance expenses. Electrical and computer technology has improved rapidly in recent years and has been applied to other industries. So it is strongly recommended we adopt modern digital and computer technology to improve plant safety and availability. The advanced I&C system, namely, Integrated Intelligent Instrumentation and Control System (I$^3$CS) will be developed for beyond the next generation nuclear power plant. I$^3$CS consists of three major parts, the advanced compact workstation, distributed digital control and protection system including Automatic Start-up/shutdown Intelligent Control System (ASICS) and the computer-based alarm processing and operator support system, namely, Diagnosis, Response, and operator Aid Management System (DREAMS).

  • PDF

RELIABILITY ANALYSIS OF DIGITAL SYSTEMS IN A PROBABILISTIC RISK ANALYSIS FOR NUCLEAR POWER PLANTS

  • Authen, Stefan;Holmberg, Jan-Erik
    • Nuclear Engineering and Technology
    • /
    • v.44 no.5
    • /
    • pp.471-482
    • /
    • 2012
  • To assess the risk of nuclear power plant operation and to determine the risk impact of digital systems, there is a need to quantitatively assess the reliability of the digital systems in a justifiable manner. The Probabilistic Risk Analysis (PRA) is a tool which can reveal shortcomings of the NPP design in general and PRA analysts have not had sufficient guiding principles in modelling particular digital components malfunctions. Currently digital I&C systems are mostly analyzed simply and conventionally in PRA, based on failure mode and effects analysis and fault tree modelling. More dynamic approaches are still in the trial stage and can be difficult to apply in full scale PRA-models. As basic events CPU failures, application software failures and common cause failures (CCF) between identical components are modelled.The primary goal is to model dependencies. However, it is not clear which failure modes or system parts CCF:s should be postulated for. A clear distinction can be made between the treatment of protection and control systems. There is a general consensus that protection systems shall be included in PRA, while control systems can be treated in a limited manner. OECD/NEA CSNI Working Group on Risk Assessment (WGRisk) has set up a task group, called DIGREL, to develop taxonomy of failure modes of digital components for the purposes of PRA. The taxonomy is aimed to be the basis of future modelling and quantification efforts. It will also help to define a structure for data collection and to review PRA studies.

METHOD FOR THE ANALYSIS OF TEMPORAL CHANGE OF PHYSICAL STRUCTURE IN THE INSTRUMENTATION AND CONTROL LIFE-CYCLE

  • Goring, Markus;Fay, Alexander
    • Nuclear Engineering and Technology
    • /
    • v.45 no.5
    • /
    • pp.653-664
    • /
    • 2013
  • The design of computer-based instrumentation and control (I&C) systems is determined by the allocation of I&C functions to I&C systems and components. Due to the characteristics of computer-based technology, component failures can negatively affect several I&C functions, so that the reliability proof of the I&C systems requires the accomplishment of I&C system design analyses throughout the I&C life-cycle. On one hand, this paper proposes the restructuring of the sequential IEC 61513 I&C life-cycle according to the V-model, so as to adequately integrate the concept of verification and validation. On the other hand, based on a metamodel for the modeling of I&C systems, this paper introduces a method for the modeling and analysis of the effects with respect to the superposition of failure combinations and event sequences on the I&C system design, i.e. the temporal change of physical structure is analyzed. In the first step, the method is concerned with the modeling of the I&C systems. In the second step, the method considers the analysis of temporal change of physical structure, which integrates the concepts of the diversity and defense-in-depth analysis, fault tree analysis, event tree analysis, and failure mode and effects analysis.

A Study on Efficient Key Management Model for Digital Pay-TV System (디지털 유료 방송시스템에 적합한 키 관리 모델에 관한 연구)

  • Yang Hyung-kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.2C
    • /
    • pp.200-207
    • /
    • 2006
  • Recently, with the development of information and communication technology, digital pay-TV technology is paid attention. So the Protection of the provided contents is becoming more important. However, in order to encourage an active based on digital TV, the contents and information sent and received respectively by the broadcaster and the subscriber must be protected. Therefore, in this paper, I analyze the requirements to protect the digital contents, the security and efficiency of the previous digital pay-TV system model. Then I proposed a key management model for digital pay-TV system.

Risk Rating Process of Cyber Security Threats in NPP I&C (원전 계측제어시스템 사이버보안 위험도 산정 프로세스)

  • Lee, Woomyo;Chung, Manhyun;Min, Byung-Gil;Seo, Jungtaek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.639-648
    • /
    • 2015
  • SInce 2000, Instrumentation and Control(I&C) systems of Nuclear Power Plant(NPP) based on analog technology began to be applied to the digital technology. NPPs under construction in the country with domestic APR1400 I&C system, most devices were digitalized. Cyber security of NPP I&C systems has emerged as an important issue because digital devices compared to the existing analog equipment are vulnerable to cyber attacks. In this paper, We proposed the risk rating process of cyber security threats in NPP I&C system and applied the proposed process to the Reactor Protection System(RPS) developed through Korea Nuclear Instrumentation & Control System(KINCS) project for evaluating the risk of cyber security threats.

An Architecture Model on Artificial Intelligence for Ground Tactical Echelons (지상 전술 제대 인공지능 아키텍처 모델)

  • Kim, Jun Sung;Park, Sang Chul
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.5
    • /
    • pp.513-521
    • /
    • 2022
  • This study deals with an AI architecture model for collecting battlefield data using the tactical C4I system. Based on this model, the artificial staff can be utilized in tactical echelon. In the current structure of the Army's tactical C4I system, Servers are operated by brigade level and above and divided into an active and a standby server. In this C4I system structure, the AI server must also be installed in each unit and must be switched when the C4I server is switched. The tactical C4I system operates a server(DB) for each unit, so data matching is partially delayed or some data is not matched in the inter-working process between servers. To solve these issues, this study presents an operation concept so that all of alternate server can be integrated based on virtualization technology, which is used as an source data for AI Meta DB. In doing so, this study can provide criteria for the AI architectural model of the ground tactical echelon.

The Fault Tolerant Evaluation Model due to the Periodic Automatic Fault Detection Function of the Safety-critical I&C Systems in the Nuclear Power Plants (원전 안전필수 계측제어시스템의 주기적 자동고장검출기능에 따른 고장허용 평가모델)

  • Hur, Seop;Kim, Dong-Hoon;Choi, Jong-Gyun;Kim, Chang-Hwoi;Lee, Dong-Young
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.62 no.7
    • /
    • pp.994-1002
    • /
    • 2013
  • This study suggests a generalized availability and safety evaluation model to evaluate the influences to the system's fault tolerant capabilities depending on automatic fault detection function such as the automatic periodic testings. The conventional evaluation model of automatic fault detection function deals only with the self diagnostics, and supposes that the fault detection coverage of self diagnostics is always constant. But all of the fault detection methods could be degraded. For example, the periodic surveillance test has the potential human errors or test equipment errors, the self diagnostics has the potential degradation of built-in logics, and the automatic periodic testing has the potential degradation of automatic test facilities. The suggested evaluation models have incorporated the loss or erroneous behaviors of the automatic fault detection methods. The availability and the safety of each module of the safety grade platform have been evaluated as they were applied the automatic periodic test methodology and the fault tolerant evaluation models. The availability and safety of the safety grade platform were improved when applied the automatic periodic testing. Especially the fault tolerant capability of the processor module with a weak self-diagnostics and the process parameter input modules were dramatically improved compared to the conventional cases. In addition, as a result of the safety evaluation of the digital reactor protection system, the system safety of the digital parts was improved about 4 times compared to the conventional cases.

A Study on the Army Tactical C4I System Information Security Plan for Future Information Warfare (미래 정보전에 대비한 육군전술지휘정보체계(C4I) 정보보호대책 연구)

  • Woo, Hee-Choul
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.1-13
    • /
    • 2012
  • This study aims to analyze actual conditions of the present national defense information network operation, the structure and management of the system, communication lines, security equipments for the lines, the management of network and software, stored data and transferred data and even general vulnerable factors of our army tactical C4I system. Out of them, by carrying out an extensive analysis of the army tactical C4I system, likely to be the core of future information warfare, this study suggested plans adaptive to better information security, based on the vulnerable factors provided. Firstly, by suggesting various information security factor technologies, such as VPN (virtual private network), IPDS (intrusion prevention & detection system) and firewall system against virus and malicious software as well as security operation systems and validation programs, this study provided plans to improve the network, hardware (computer security), communication lines (communication security). Secondly, to prepare against hacking warfare which has been a social issue recently, this study suggested plans to establish countermeasures to increase the efficiency of the army tactical C4I system by investigating possible threats through an analysis of hacking techniques. Thirdly, to establish a more rational and efficient national defense information security system, this study provided a foundation by suggesting several priority factors, such as information security-related institutions and regulations and organization alignment and supplementation. On the basis of the results above, this study came to the following conclusion. To establish a successful information security system, it is essential to compose and operate an efficient 'Integrated Security System' that can detect and promptly cope with intrusion behaviors in real time through various different-type security systems and sustain the component information properly by analyzing intrusion-related information.

A Study on Method to Establish Cyber Security Technical System in NPP Digital I&C (원전 디지털 계측제어시스템 사이버보안 기술 체계 수립 방법 연구)

  • Chung, Manhyun;Ahn, Woo-Geun;Min, Byung-Gil;Seo, Jungtaek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.561-570
    • /
    • 2014
  • Nuclear Power Plant Instrumentation and Control System(NPP I&C) which is used to operate safely is changing from analog technology to digital technology. Ever since NPP Centrifuge of Iran Bushehr was shut down by Stuxnet attack in 2010, the possibility of cyber attacks against the NPP has been increasing. However, the domestic and international regulatory guidelines that was published to strengthen the cyber security of the NPP I&C describes security requirements and method s to establish policies and procedures. These guidelines are not appropriate for the development of real applicable cyber security technology. Therefore, specialized cyber security technologies for the NPP I&C need to be developed to enhance the security of nuclear power plants. This paper proposes a cyber security technology development system which is exclusively for the development of nuclear technology. Furthermore, this method has been applied to the ESF-CCS developed by The KINCS R&D project.

Proposal of the development plan for the ROK military data strategy and shared data model through the US military case study (미군 사례 고찰을 통한 한국군 데이터 전략 및 공유 데이터 모델 개발방안 제안)

  • Lee, Hak-rae;Kim, Wan-ju;Lim, Jae-sung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.6
    • /
    • pp.757-765
    • /
    • 2021
  • To carry out multi-domain operations included in the U.S. Department of Defense's national security strategy in 2018, timely data sharing between C4I systems is critical. Several studies of the Korean military have also raised the problems of interface and standardization between C4I systems, and it is necessary to establish a new plan to solve this problem. In this study, a solution to the problem was derived through case analysis that the U.S. Department of Defense has been pursuing for about 20 years to implement the data strategy after establishing the data strategy in 2003. and by establishing a data strategy suitable for the ROK military C4I system operating environment, developing a data model, selecting a standard for data sharing, and proposing a shared data development procedure, we intend to improve the data sharing capability between ROK military C4I systems.