Obsidian/200. Library Papers/chenFullscopeHighfidelitySimulatorbased2024.md

64 lines
2.3 KiB
Markdown
Executable File

---
readstatus: false
dateread:
title: "A full-scope, high-fidelity simulator-based hardware-in-the-loop testbed for comprehensive nuclear power plant cybersecurity research"
year: 2024
authors:
- "Chen, Xiangyi"
- "Coble, Jamie"
- "Zhang, Fan"
DOI: "10.1016/j.pnucene.2024.105348"
ISBN: ""
citekey: "chenFullscopeHighfidelitySimulatorbased2024"
itemType: "journalArticle"
journal: "_Progress in Nuclear Energy_"
volume: 175
pages: 105348
---
#### DOI
[10.1016/j.pnucene.2024.105348](https://doi.org/10.1016/j.pnucene.2024.105348)
#### ISBN
[](https://www.isbnsearch.org/isbn/)
### Tags:
#Cybersecurity, #Hardware-in-the-loop, #Nuclear-power-plants
**Contribution**::
**Related**::
> [!LINK]
>.
> [!Abstract]
>
> Nuclear power plant (NPP) cybersecurity research often relies on hardware-in-the-loop (HIL) testbeds that integrate real hardware components into simulated environments. These testbeds allow researchers to identify vulnerabilities, evaluate attack impacts, and test security measures in a controlled setting. However, previous HIL testbeds lacked fidelity to accurately represent real nuclear systems, limiting the scope of cybersecurity analysis. This study presents the creation of a HIL testbed, devised upon a full-scope, high-fidelity NPP simulator, to facilitate realistic and comprehensive cybersecurity research. To demonstrate its capabilities, the control logic for the steam generator water level was migrated from the simulator to an external programmable logic controller. As a practical application of the developed testbed, supply chain attack scenarios were simulated by injecting malicious code into the controller logic, and the effects of manipulating sensor inputs and control commands were observed. While this HIL testbed provides more detailed simulations, enhanced realism, and wider applicability compared to other options utilizing a less complex simulator, it is also more intricate and costly. For this reason, we include a detailed comparison with some alternative architectures to aid fellow researchers and practitioners in the selection of a suitable HIL architecture based on specific research objectives.
>.
>
# Notes
>.
# Annotations%% begin annotations %%
%% end annotations %%
%% Import Date: 2024-08-08T14:06:54.985-04:00 %%