• Title/Summary/Keyword: energy security

Search Result 912, Processing Time 0.028 seconds

A practical challenge-response authentication mechanism for a Programmable Logic Controller control system with one-time password in nuclear power plants

  • Son, JunYoung;Noh, Sangkyun;Choi, JongGyun;Yoon, Hyunsoo
    • Nuclear Engineering and Technology
    • /
    • v.51 no.7
    • /
    • pp.1791-1798
    • /
    • 2019
  • Instrumentation and Control (I&C) systems of nuclear power plants (NPPs) have been continuously digitalized. These systems have a critical role in the operation of nuclear facilities by functioning as the brain of NPPs. In recent years, as cyber security threats to NPP systems have increased, regulatory and policy-related organizations around the world, including the International Atomic Energy Agency (IAEA), Nuclear Regulatory Commission (NRC) and Korea Institute of Nuclear Nonproliferation and Control (KINAC), have emphasized the importance of nuclear cyber security by publishing cyber security guidelines and recommending cyber security requirements for NPP facilities. As described in NRC Regulatory Guide (Reg) 5.71 and KINAC RS015, challenge response authentication should be applied to the critical digital I&C system of NPPs to satisfy the cyber security requirements. There have been no cases in which the most robust response authentication technology like challenge response has been developed and applied to nuclear I&C systems. This paper presents a challenge response authentication mechanism for a Programmable Logic Controller (PLC) system used as a control system in the safety system of the Advanced Power Reactor (APR) 1400 NPP.

Nuclear·Atomic Public Diplomacy: The Possibility of Expanding Toward New Issue Area (핵·원자력 공공외교: 새로운 영역으로의 확장 가능성)

  • Hanhyung Lee
    • Journal of Public Diplomacy
    • /
    • v.3 no.1
    • /
    • pp.43-63
    • /
    • 2023
  • Objectives: Nuclear security and atomic energy industry have always been the domain of political and economical diplomatic affairs. The issue of nuclear proliferation must be resolved politically or militarily given the importance of the problem, the impact it has on global security, the influence of major powers, and non-proliferation regimes. Considering scope of the budget, manpower, and scale of the project, the atomic energy issue was also viewed from an economic perspective. Therefore, the goal of this study is to depart from the conventional viewpoint and investigate if public diplomacy may be extended to a new issue domain of nuclear security and atomic energy. Methods: In order to determine whether there are any areas that overlap, the uniqueness of Korea's position in the nuclear security and atomic power domains is evaluated and compared with the traits of public diplomacy. Results: It seems plausible to broaden the scope and function of public diplomacy in that field given Korea's uniqueness in nuclear security and atomic energy issue and overlap with public diplomacy. This is especially true given that the state must take the leading role and that ongoing policy demands are made in light of Korea's security and economic structure. In reality, it is assessed that the Summer Fellows Program, run by the KAIST Nuclear Nonproliferation Education and Research Center (KAIST NEREC), has had a considerable impact on public diplomacy in the area of nuclear security and atomic energy. Conclusions: Nuclear security and atomic energy issues have traditionally been handled from the perspectives of political diplomacy, summit diplomacy, and economic diplomacy. However, this paper evaluate that the possibility of enhancing the role of public diplomacy in this issue area is high and underscore that the budget support, programs, and manpower for similar public diplomacy activities are needed. Through this, South Korea's nuclear security policy and atomic energy industry could be supported from international community and it will advance national interest.

A Design of an Energy-saving Doorbell with Blinking Light Function using IoT Technology (IoT 기술을 활용한 에너지 절약형 전등점멸 초인종 설계)

  • You, Ho-Gyun;Kim, Ye-Eun;Kim, Hee-Jeong;Jang, Woo-Hee;Kook, Joongjin;Lee, Kwangjae
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.67 no.2
    • /
    • pp.90-93
    • /
    • 2018
  • This paper is a system that visually informs the hearing impaired to visit other people by blinking the light of a room using the IoT(Internet of Things) technology. The system combines the power of home-use lights with low-power IoT devices to provide visual notifications. Using a current sensor, this system can track user location and then turns on and off the light in that room only to save energy. The proposed idea can create a society that is equal to everyone and can live more conveniently.

A New Robust Blind Crypto-Watermarking Method for Medical Images Security

  • Mohamed Boussif;Oussema Boufares;Aloui Noureddine;Adnene Cherif
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.93-100
    • /
    • 2024
  • In this paper, we propose a novel robust blind crypto-watermarking method for medical images security based on hiding of DICOM patient information (patient name, age...) in the medical imaging. The DICOM patient information is encrypted using the AES standard algorithm before its insertion in the medical image. The cover image is divided in blocks of 8x8, in each we insert 1-bit of the encrypted watermark in the hybrid transform domain by applying respectively the 2D-LWT (Lifting wavelet transforms), the 2D-DCT (discrete cosine transforms), and the SVD (singular value decomposition). The scheme is tested by applying various attacks such as noise, filtering and compression. Experimental results show that no visible difference between the watermarked images and the original images and the test against attack shows the good robustness of the proposed algorithm.

Blockchain for Securing Smart Grids

  • Aldabbagh, Ghadah;Bamasag, Omaimah;Almasari, Lola;Alsaidalani, Rabab;Redwan, Afnan;Alsaggaf, Amaal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.255-263
    • /
    • 2021
  • Smart grid is a fully-automated, bi-directional, power transmission network based on the physical grid system, which combines sensor measurement, computer, information communication, and automatic control technology. Blockchain technology, with its security features, can be integrated with Smart Grids to provide secure and efficient power management and transmission. This paper dicusses the deployment of Blockchain technology in Smart Grid. It presents application areas and protocols in which blockchain can be applied to in securing smart grid. One application of each area is explored in detail, such as efficient peer-to-peer transaction, lower platform costs, faster processes, greater flexibility in power generation to transmission, distribution and power consumption in different energy storage systems, current barriers obstructing the implementation of blockchain applications with some level of maturity in financial services but concepts only in energy and other sectors. Wide range of energy applications suggesting a suitable blockchain architecture in smart grid operations, a sample block structure and the potential blockchain technicalities employed in it. Also, added with efficient data aggregation schemes based on the blockchain technology to overcome the challenges related to privacy and security in the smart grid. Later on, consensus algorithms and protocols are discussed. Monitoring of the usage and statistics of energy distribution systems that can also be used to remotely control energy flow to a particular area. Further, the discussion on the blockchain-based frameworks that helps in the diagnosis and maintenance of smart grid equipment. We have also discussed several commercial implementations of blockchain in the smart grid. Finally, various challenges have been discussed for integrating these technologies. Overall, it can be said at the present point in time that blockchain technology certainly shows a lot of potentials from a customer perspective too and should be further developed by market participants. The approaches seen thus far may have a disruptive effect in the future and might require additional regulatory intervention in an already tightly regulated energy market. If blockchains are to deliver benefits for consumers (whether as consumers or prosumers of energy), a strong focus on consumer issues will be needed.

Challenges in nuclear energy adoption: Why nuclear energy newcomer countries put nuclear power programs on hold?

  • Philseo Kim;Hanna Yasmine;Man-Sung Yim;Sunil S. Chirayath
    • Nuclear Engineering and Technology
    • /
    • v.56 no.4
    • /
    • pp.1234-1243
    • /
    • 2024
  • The pressing need to mitigate greenhouse gas emissions has stimulated a renewed interest in nuclear energy worldwide. However, while numerous countries have shown interest in nuclear power over the course of history, many of them have not continued their pursuit and chosen to defer or abandon their peaceful nuclear power projects. Scrapping a national nuclear power program after making initial efforts implies significant challenges in such a course or a waste of national resources. Therefore, this study aims to identify the crucial factors that influence a country's decision to terminate or hold off its peaceful nuclear power programs. Our empirical analyses demonstrate that major nuclear accidents and leadership changes are significant factors that lead countries to terminate or defer their nuclear power programs. Additionally, we highlight that domestic politics (democracy), lack of military alliance with major nuclear suppliers, low electricity demand, and national energy security environments (energy import, crude oil price) can hamper a country's possibility of regaining interest in a nuclear power program after it has been scrapped, suspended, or deferred. The findings of this study have significant implications for policymakers and stakeholders in the energy sector as they strive to balance the competing demands of energy security, and environmental sustainability.

A Study on Unified Security Management System for remote data acquisition of New and Renewable Energy Facilities (신.재생에너지 발전설비의 원격 데이터 수집을 위한 통합 보안 관리시스템에 관한 연구)

  • Kim, Hyoung-Ju;Lim, Jung-Yol
    • Journal of IKEEE
    • /
    • v.13 no.2
    • /
    • pp.186-193
    • /
    • 2009
  • Development and diffusion of a new and renewable energy are acutely required at domestic energy actualities to be inferior as industrialization is accelerated, and use of information electric appliance is increased rapidly. For the diessemination and practical use of new and renewable energy, this paper presents an unified security management system that is efficiently able to acquire operational status date and control distributed generation facilities. Also, the unified security management system is suggested to protect gathered operational status date from unpredictable problems such as computer virus, spy ware, and any other network problems.

  • PDF

Indicators of Economic Evaluation and Case Studies on New & Renewable Energy (신재생에너지 경제성 평가 결과 분석 및 평가지표 연구)

  • Ahn Eun-Young;Kim Seong-Yong
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.600-603
    • /
    • 2005
  • U.S. National Research Council proposed benefits framework for energy R&D project as economic benefits, environmental benefits, security benefits and knowledge benefits. Following this framework, U.S. National Renewable Energy Laboratory evaluated the projected benefits of Federal Energy Efficiency and Renewable Energy Programs in the indicators of energy-expenditure savings, energy system cost savings, $CO_2$ emissions reductions. oil savings, natural gas saving and avoided additions to central conventional power. As this result, geothermal energy have predominant position in the energy-expenditure savings, natural gas saving and avoided addi t ions to central conventional power to FY2050. The projected benefits, in monetary value, of the whole supply-potential of geothermal energy in Korea were evaluated as 480.2 billion Won, 43.1 billion Won and 135.8 billion Won for the private energy-cost savings, social environmental-cost savings, and import energy-cost saving, respectively.

  • PDF

Survey for Renewable Energy Policy of Japan and China (일본과 중국의 신재생에너지정책 조사 연구)

  • Jang, Woon-Jeong;Jeon, Mi-Hwa;Kim, Yoon-Kyung
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2009.11a
    • /
    • pp.289-292
    • /
    • 2009
  • This paper reviewed laws and policies of renewable energy in Japan and China. Japan has enacted laws and implemented policies of renewable energy since 1980 for their energy security and environmental problem, and nowadays renewable energy is one of solutions for UNFCCC and Kyoto Protocol. Japan plays a leading role in photovoltaic power generation. As second largest energy consumer, China generates a lot of pollution from their energy use. However Chinese government attempts to sustainable development among economy, society and environment, suggests to use renewable energy in the way to reduce pollution and improve living standards. Korea focused on renewable energy as one of motive power in Green Growth. Review for renewable energy policy of two countries gives Korean policy implication and helps "Green Growth", national theme of Korea.

  • PDF

A study on the managed security services(MSS) method for energy-based SCADA Systems (에너지 기반보호시설의 보안관제 방안에 관한 연구)

  • Jang, Jeong-Woo;Kim, Woo-Suk;Yoon, Ji-Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.279-292
    • /
    • 2015
  • In this study, we propose an effective network managed security services model that can detect a presence of potential malicious codes inside the energy-based SCADA Systems. Especially, by analyzing the data obtained in the same environment of SCADA Systems, we develop detection factors to applicable to the managed security services and propose the method for the network managed security services. Finally, the proposed network managed security services model through simulation proved possibility to detect malicious traffic in SCADA systems effectively.