Abstract
A secure and highly reliable communication network is a crucial component of the distributed control system (DCS) in nuclear power plants (NPPs), particularly for the protection system. However, there have been numerous reported cases of cyber-attacks in the field of nuclear power, and the cybersecurity threats faced by a DCS are increasing. Given that the DCS is a complex integrated system combining computers, communication, and control with a large number of interactions between components and external interferences, traditional linear safety analysis methods fail to meet its requirements. To minimize cybersecurity accidents caused by potential vulnerabilities, it is necessary to conduct systematic safety analysis on DCS cybersecurity accidents in NPPs. Therefore, this paper selected a specific case of cybersecurity accidents in a NPP for abstract modeling and reproduction. The causal analysis based on system theory (CAST) method was applied to conduct an analysis of the accident causes. It can identify existing vulnerabilities and potential factors impacting the safe operation of NPPs, and countermeasures and recommendations can be proposed. The reference for assessing potential risks and devising solutions can be provided for other DCS communication networks.
Funding source: the Science and Technology Project of Fujian Province
Award Identifier / Grant number: No. 2022H0004
Acknowledgments
This work was supported by the Science and Technology Project of Fujian Province (No. 2022H0004).
-
Research ethics: Not applicable.
-
Author contributions: Xiong Beini: Conceptualization, Methodology, Data Curation, Software, Visualization, Writing- Original draft preparation. Wang Jieling: Data curation, Investigation, Writing- Reviewing and Editing. Wu Yichun: Supervision, Writing- Reviewing and Editing. Fang Jiayan: Formal analysis, Resources, Writing- Reviewing and Editing. All authors have accepted responsibility for the entire content of this manuscript and approved its submission.
-
Competing interests: The authors state no conflict of interest.
-
Research funding: The Fund for the Science and Technology Project of Fujian Province (No. 2022H0004).
-
Data availability: Not applicable.
References
Cui, J., Cai, Y., and Wu, Y. (2021). Criticality analysis for safety-critical software in nuclear power plant distributed control system. Kerntechnik 86: 343–352, https://doi.org/10.1515/kern-2021-0027.Search in Google Scholar
Dawson, L.A., Muna, A.B., Wheeler, T.A., Turner, P.L., Wyss, G.D., and Gibson, M. (2015). Assessment of the Utility and Efficacy of Hazard Analysis Methods for the Prioritization of Critical Digital Assets for Nuclear Power Cyber Security (No. SAND2015-3576C). Sandia National Lab, Albuquerque, NM, United States.Search in Google Scholar
Dilipraj, E. (2019). Supposed cyber attack on kudankulam nuclear infrastructure - a benign reminder of a possibile reality. Cent. Air Power Stud. 129: 1–5.Search in Google Scholar
Gong, Y. and Li, Y. (2018). STAMP-based causal analysis of China-Donghuang oil transportation pipeline leakage and explosion accident. J. Loss Prev. Process Ind. 56: 402–413, https://doi.org/10.1016/J.JLP.2018.10.001.Search in Google Scholar
Hollnagel, E. (2011). Understanding accidents, or how (Not) to learn from the past. Presentation. University of Southern Denmark, Odense.Search in Google Scholar
Hulin, B. and Tschachtli, R. (2011). Identifying software hazards with a modified CHAZOP. In: PESARO 2011: The First International Conference on Performance,Safety and Robustness in Complex Systems and Applications. XPS (Expert Publishing Systems), Wilmington, DE, pp. 7–12.Search in Google Scholar
Kesler, B. (2011). The vulnerability of nuclear facilities to cyber attack. Strat. Insights 10: 15–25.Search in Google Scholar
Kim, S., Heo, G., Zio, E., Shin, J., and Song, J.-G. (2020). Cyber attack taxonomy for digital environment in nuclear power plants. Nucl. Eng. Technol. 52: 995–1001, https://doi.org/10.1016/j.net.2019.11.001.Search in Google Scholar
Lee, C., Yim, H.B., and Seong, P.H. (2018). Development of a quantitative method for evaluating the efficacy of cyber security controls in NPPs based on intrusion tolerant concept. Ann. Nucl. Energy 112: 646–654, https://doi.org/10.1016/j.anucene.2017.11.002.Search in Google Scholar
Leveson, N. (2004). A new accident model for engineering safer systems. Saf. Sci. 42: 237–270, https://doi.org/10.1016/S0925-7535(03)00047-X.Search in Google Scholar
Leveson, N.G. (2019). CAST handbook: how to learn more from incidents and accidents. MIT Press, Cambridge.Search in Google Scholar
Li, F., Wang, W., Xu, J., Dubljevic, S., Khan, F., and Yi, J. (2020). A CAST-based causal analysis of the catastrophic underground pipeline gas explosion in Taiwan. Eng. Fail. Anal. 108: 104343, https://doi.org/10.1016/j.engfailanal.2019.104343.Search in Google Scholar
Liu, H. (2023). Application research of fieldbus techniques in nuclear power plants (in Chinese). Instrumentation 30: 41–45+25.Search in Google Scholar
MathWorks. Inc (2021). Simulink® user’s guide. MathWorks, Natick.Search in Google Scholar
Pasqualetti, F., Dorfler, F., and Bullo, F. (2015). Control-theoretic methods for cyberphysical security: geometric principles for optimal cross-layer resilient control systems. IEEE Control Syst. Mag. 35: 110–127, https://doi.org/10.1109/MCS.2014.2364725.Search in Google Scholar
Peng, H.-M., Wang, X.-K., Wang, T.-L., Liu, Y.-H., and Wang, J.-Q. (2021). Extended failure mode and effect analysis approach based on hesitant fuzzy linguistic Z-numbers for risk prioritisation of nuclear power equipment failures. J. Intell. Fuzzy Syst. 40: 10489–10505, https://doi.org/10.3233/JIFS-201154.Search in Google Scholar
Puisa, R., Williams, S., and Vassalos, D. (2019). Towards an explanation of why onboard fires happen: the case of an engine room fire on the cruise ship “Le Boreal”. Appl. Ocean Res. 88: 223–232, https://doi.org/10.1016/j.apor.2019.04.020.Search in Google Scholar
Raja, M.A.Z., Naz, H., Shoaib, M., and Mehmood, A. (2022). Design of backpropagated neurocomputing paradigm for Stuxnet virus dynamics in control infrastructure. Neural Comput. Appl. 34: 5771–5790, https://doi.org/10.1007/s00521-021-06721-0.Search in Google Scholar
Rasmussen, J. (1997). Risk management in a dynamic society: a modelling problem. Saf. Sci. 27: 183–213, https://doi.org/10.1016/S0925-7535(97)00052-0.Search in Google Scholar
Reason, J. (2016). Managing the risks of organizational accidents. Routledge, London.10.4324/9781315543543Search in Google Scholar
Rimkevičius, S., Vaišnoras, M., Babilas, E., and Ušpuras, E. (2016). HAZOP application for the nuclear power plants decommissioning projects. Ann. Nucl. Energy 94: 461–471, https://doi.org/10.1016/j.anucene.2016.04.027.Search in Google Scholar
Shin, J., Heo, G., and Son, H. (2017a). Risk-informed cyber security evaluation of nuclear facilities. In: 10th Nuclear plant instrumentation, control and human-machine interface technologies (NPIC&HMIT 2017). San Francisco, California, pp. 11–15.Search in Google Scholar
Shin, J., Son, H., and Heo, G. (2017b). Cyber security risk evaluation of a nuclear I&C using BN and ET. Nucl. Eng. Technol. 49: 517–524, https://doi.org/10.1016/j.net.2016.11.004.Search in Google Scholar
Sulaman, S.M., Beer, A., Felderer, M., and Höst, M. (2019). Comparison of the FMEA and STPA safety analysis methods–a case study. Software Qual. J. 27: 349–387, https://doi.org/10.1007/s11219-017-9396-0.Search in Google Scholar
Tesfaye, M. (2012). Secure reprogramming of a network connected device: securing programmable logic controllers, master thesis. KTH Royal Institute of Technology, Stockholm.Search in Google Scholar
Wang, W., Cammi, A., Di Maio, F., Lorenzi, S., and Zio, E. (2018). A Monte Carlo-based exploration framework for identifying components vulnerable to cyber threats in nuclear power plants. Reliab. Eng. Syst. Saf. 175: 24–37, https://doi.org/10.1016/j.ress.2018.03.005.Search in Google Scholar
Wang, Y. and Vassileva, J. (2003). Bayesian network-based trust model. In: Proceedings IEEE/WIC international conference on web intelligence (WI 2003). IEEE, New York, pp. 372–378.10.1109/WI.2003.1241218Search in Google Scholar
Watson, H.A. (1961). Launch control safety study. Bell Telephone Laboratories, Murray Hill, N.J. USA.Search in Google Scholar
WSC, LLC (2016). 3KEYMASTERTM platform product sheet. Western Services Corporation, Frederick, Maryland.Search in Google Scholar
Yousefi, A., Rodriguez Hernandez, M., and Lopez Peña, V. (2019). Systemic accident analysis models: a comparison study between AcciMap, FRAM, and STAMP. Process Saf. Prog. 38: e12002, https://doi.org/10.1002/prs.12002.Search in Google Scholar
© 2024 Walter de Gruyter GmbH, Berlin/Boston
Articles in the same Issue
- Frontmatter
- Multilateral evaluation of the effects of utilizing thorium oxide in the Bushehr VVER-1000 reactor
- Comparison of modeling methods for the effective diffusivities of IO3− estimated in compacted bentonite using through-diffusion tests under aerobic conditions
- Analysis of initial core and time dependent fuel burnup for high temperature testing reactors (HTTRs)
- A detection and defense security system design for nuclear waste storage against stealth terrorists attack
- Optimization of ECR assisted pre-ionization in GLAST-III via Multiphysics simulation
- Fuzzy reliability algorithm for the shutdown system of research reactor
- System theory safety analysis of network malfunction in nuclear power plant distributed control systems
- Two phase flow analysis of micro channel evaporator to investigate effect of geometry on pressure and heat transfer coefficient with respect to volume of fraction
- Methodology for analyzing dose consequence using atmospheric dispersion code A2CDOSE
- Reliability analysis of digital reactor protection systems in floating nuclear power plants
- Study on comprehensive evaluation method of mental workload level
- Integrating reliability analysis into MBSE for FPGA-based safety critical I&C system design in nuclear power plants
- Calendar of events
Articles in the same Issue
- Frontmatter
- Multilateral evaluation of the effects of utilizing thorium oxide in the Bushehr VVER-1000 reactor
- Comparison of modeling methods for the effective diffusivities of IO3− estimated in compacted bentonite using through-diffusion tests under aerobic conditions
- Analysis of initial core and time dependent fuel burnup for high temperature testing reactors (HTTRs)
- A detection and defense security system design for nuclear waste storage against stealth terrorists attack
- Optimization of ECR assisted pre-ionization in GLAST-III via Multiphysics simulation
- Fuzzy reliability algorithm for the shutdown system of research reactor
- System theory safety analysis of network malfunction in nuclear power plant distributed control systems
- Two phase flow analysis of micro channel evaporator to investigate effect of geometry on pressure and heat transfer coefficient with respect to volume of fraction
- Methodology for analyzing dose consequence using atmospheric dispersion code A2CDOSE
- Reliability analysis of digital reactor protection systems in floating nuclear power plants
- Study on comprehensive evaluation method of mental workload level
- Integrating reliability analysis into MBSE for FPGA-based safety critical I&C system design in nuclear power plants
- Calendar of events