Cyber Security Evaluation of the Wireless Communication for the Mobile Safeguard Systems in uclear Power Plants



Similar documents
Cyber Security Considerations in the Development of I&C Systems for Nuclear Power Plants

A CYBER SECURITY RISK ASSESSMENT FOR THE DESIGN OF I&C SYSTEMS IN NUCLEAR POWER PLANTS

Options for Cyber Security. Reactors. April 9, 2015

AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS

NRC Cyber Security Regulatory

NRC Cyber Security Policy &

A Regulatory Approach to Cyber Security

U.S. NUCLEAR REGULATORY COMMISSION January 2010 REGULATORY GUIDE OFFICE OF NUCLEAR REGULATORY RESEARCH. REGULATORY GUIDE 5.71 (New Regulatory Guide)

United States Nuclear Regulatory Commission Office of Research Washington, DC

Cyber Security R&D (NE-1) and (NEET-4)

Cyber Security for Nuclear Power Plants Matthew Bowman Director of Operations, ATC Nuclear IEEE NPEC Meeting July 2012

Spreading the Word on Nuclear Cyber Security

UNITED STATES NUCLEAR REGULATORY COMMISSION WASHINGTON, D.C March 3, 2011

Integrating Cyber Security into Nuclear Power Plant Safety Systems Design

Closing Wireless Loopholes for PCI Compliance and Security

How To Secure Wireless Networks

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES

The next generation of knowledge and expertise Wireless Security Basics

The U.S. Nuclear Regulatory Commission s Cyber Security Regulatory Framework for Nuclear Power Reactors

Defense in Depth Architecture of Server Systems for the Improvement of Cyber Security

How To Protect A Wireless Lan From A Rogue Access Point

The Impact of Wireless LAN Technology on Compliance to the PCI Data Security Standard

Cynthia Broadwell, Progress Energy. William Gross, Nuclear Energy Institute

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

PCI Solution for Retail: Addressing Compliance and Security Best Practices

CHALLENGES OF CYBER SECURITY FOR NUCLEAR POWER PLANTS. Kwangjo Kim

NUCLEAR REGULATORY COMMISSION. 10 CFR Part 73 [NRC ] RIN 3150-AJ37. Cyber Security Event Notifications

9 Simple steps to secure your Wi-Fi Network.

Improving SCADA Control Systems Security with Software Vulnerability Analysis

Potential Security Vulnerabilities of a Wireless Network. Implementation in a Military Healthcare Environment. Jason Meyer. East Carolina University

FDIC Division of Supervision and Consumer Protection

WLAN Security Why Your Firewall, VPN, and IEEE i Aren t Enough to Protect Your Network

Wireless (In)Security Trends in the Enterprise

Link Layer and Network Layer Security for Wireless Networks

WHITEPAPER. Wireless LAN Security for Healthcare and HIPAA Compliance

A Study on Wireless Intrusion Prevention System based on Snort

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Cyber Security Design Methodology for Nuclear Power Control & Protection Systems. By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC)

Why VPN Alone Will not Secure your Wireless Network

MWR InfoSecurity Security Advisory. BT Home Hub SSID Script Injection Vulnerability. 10 th May Contents

PCI DSS Requirements - Security Controls and Processes

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter

Critical Controls for Cyber Security.

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Wireless Network Security. Pat Wilbur Wireless Networks March 30, 2007

HANDBOOK 8 NETWORK SECURITY Version 1.0

SCADA SYSTEMS AND SECURITY WHITEPAPER

WHITE PAPER. Wireless LAN Security for Healthcare and HIPAA Compliance

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

The Protection Mission a constant endeavor

Security in Wireless Local Area Network

Developing Network Security Strategies

Announcement of a new IAEA Co-ordinated Research Programme (CRP)

PCI Wireless Compliance with AirTight WIPS

Wireless Network Standard

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Industrial Communication. Securing Industrial Wireless

Wireless Security and Healthcare Going Beyond IEEE i to Truly Ensure HIPAA Compliance

How To Secure Your Store Data With Fortinet

Wireless Network Standard and Guidelines

POLICY ISSUE INFORMATION

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

Wireless Intrusion Detection Systems (WIDS)

WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION

Development and Application of POSAFE-Q PLC Platform

All You Wanted to Know About WiFi Rogue Access Points

Understanding WiFi Security Vulnerabilities and Solutions. Dr. Hemant Chaskar Director of Technology AirTight Networks

Wireless Network Security

PCI DSS 3.1 and the Impact on Wi-Fi Security

Link Layer and Network Layer Security for Wireless Networks

Best Practices for Outdoor Wireless Security

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

The following chart provides the breakdown of exam as to the weight of each section of the exam.

TECHNICAL NOTE REFERENCE DOCUMENT. Improving Security for Axis Products. Created: 4 October Last updated: 11 October Rev: 1.

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Cyber Essentials KAMI VANIEA 2

State of Kansas. Interim Wireless Local Area Networks Security and Technical Architecture

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Storage Cloud Infrastructures

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Beyond the Firewall No. 72 March, 2012 Wireless LAN Edition

INFORMATION ASSURANCE DIRECTORATE

Network Security Policy

How to Secure Your Environment

Hole196 Vulnerability in WPA2

CS 356 Lecture 29 Wireless Security. Spring 2013

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

WIRELESS NETWORKING SECURITY

Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack

Evaluation Report. Office of Inspector General

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

How to Set Up a Wireless Router in a Dorm

Ask SME and Learn. NRC Cyber Security Oversight. Cyber Security Directorate

Transcription:

Cyber Security Evaluation of the Wireless Communication for the Mobile Safeguard Systems in uclear Power Plants Sooill Lee a*, Yong Sik Kim a, Song Hae Ye a a Central Research Institute, Korea Hydro and Nuclear Power co., (KHNP-CRI), Daejeon, Korea Abstract. This paper introduces cyber security evaluation results and a design of the wireless communication technology to apply to safety, safeguard, emergency prepared functions in nuclear power plants. While wireless communication technologies can generally make mobility and efficiency on plant operation, those have seldom been installed on the nuclear I&C systems due to the negative concern of unexpected outcomes that stem from electromagnetic interference and cyber attack. New design of advanced digital safeguard and I&C systems uses computer-based systems for those functions. On the other hand, those are being exposed to various types of new and existing cyber threats, vulnerabilities and risks which significantly increase the likelihood that those could be compromised. In order to employ the wireless communication technology in those functions, licensees should assess and manage the potential for adverse effects on safety and safeguard functions so as to provide high assurance that critical functions are properly protected cyber attack. It is expected that the safety and safeguard function, specifically on the area of real-time monitoring, logging, can be enhanced by employing the mobile devices (: smart phone, laptop, smart pad, etc). In this paper, we deal with the cyber security evaluation, which consists of threat analysis, vulnerability test, establishment of security plan, and design solutions for the wireless communication on the basis of IEEE 802.11(Wi-Fi) protocol. Proposed evaluation and design solution could be a basis for the design of wireless communication and mobile safety and safeguard systems in nuclear power plants. 1. Introduction The three requirements, i.e., communication independence, cyber security, reliability in the noisy environments, i.e., EMI, etc., were requested to apply wireless communication to nuclear power plants (NPPs) by United States Nuclear Regulatory Commission (US NRC) and the Oak Ridge National Laboratory [1]. While a wireless communication provides the convenience of using various application services such as mobility increases, there is the fundamental weakness of the empty space is open, not closed conductor transmission medium. Therefore, it can be vulnerable to a variety of cyber attacks such as man-in-the-middle attack (MITM), packet spoofing, packet injection, sniffing, unauthorized tapping and transfer. Also, electromagnetic interference (EMI) is another important factor to employ seldom wireless communication in the instrumentation and control system (I&C System) to perform safety function. The wireless communication technology has been only used for some of the communication and monitoring areas related to the non-safety function in NPPs. The cyber security plan (CSP) for employing the wireless communication is needed through cyber security evaluation to apply wireless communication system, such as mobile devices (e.g., smart phone, laptop, smart pad, etc.), in Han-bit NPP at Korea. Advanced NPP, such as APR1400 (Advanced Power Reactor 1400 MWe), employs the fully digitalized I&C systems for the advantage of digital feature, whereas the vulnerability (e.g., unauthorized malicious access, unintentional access) is increased. US NRC and Korea Institute of Nuclear Safety (KINS) request the cyber security policy and plan by establishing the cyber security program for the entire plant life cycle of NPPs through cyber security * Present address : 70, 1312-gil, Yuseong-daero, Yuseong-gu, Daejeon, Korea

evaluation process of the vulnerability, design features, security requirements on the I&C systems which perform important functions[2-6]. In order to employ the wireless communication technology in safeguard function, licensees should assess and manage the potential for adverse effects on safeguard and safety functions so as to provide high assurance that critical functions are properly protected cyber attack. In this paper, we introduce the criteria establishment, related regulation and application environment analysis, threat and vulnerability analysis, and countermeasures. Also, final plan will be reflected in I&C CSP through future additional test-bed based security evaluation. 2. Cyber Security Plan 2.1. Application Environment of Wireless Communication in PPs In order to employ the wireless communication, firstly, application environment was surveyed and defined as follows in consideration of whether to apply low power of less than 100mW, acceptance of wireless devices as a countermeasure for the EMI. (a) Communication type: Wi-Fi communication (IEEE 802.11) networks (b) Transferring data type: audio (or video data) (c) Using area: nuclear Power Block inside (d) Connection status to critical digital asset (CDA) - Voice and Video: no connection to existing systems and I&C system through a separate network configuration - Variable data: two-way communication to the variable server which separately configured, or one-way communication from non-safety system (e) No direct connection to the Safety system 2.2. Criteria Establishment for the Cyber Security Plan Criteria for the wireless cyber security was established as follows to reflect the existing I&C systems cyber security program. (a) Communication type: reflect the security measures for the connection portion with the wireless communications network to the I&C CSP (b) Apply the latest technology with enhanced security features, such as authentication, encryption, WIPS (Wireless Intrusion Prevention System), etc. (c) Derived to security measures, such as technical, management and operational control measures (d) Create wireless CSP, taking into account the time factor 3. Analysis of uclear Cyber Security Regulation 3.1. Cyber Security Program and Regulation Analysis for the I&C Systems In the United States, March 2009, US NRC required a high level of cyber security for the safety, security and emergency preparedness (SSEP) functions by revising 10CFR73.54, January 2010, Reg. Guide 5.71 was issued. Since 2009, NEI has developed a guideline to meet the requirements of 10CFR73.54 and issued NEI 08-09 Rev.6, which was endorsed by US NRC in 2010[5]. In Korea, KINS issued GT-N27, Reg. Guide 8.22 and has requested the cyber security activities [6]. Life-cycle of NPP consists of a variety of phases (e.g., concept, requirement, design, implementation, test, installation, operation and maintenance, retirement). I&C cyber security program consists of policy and plan documents and configured by management, operational, technical security controls, as shown in Figure 1. Recently, the following strategies are reflected in the CSP [7-8]. (a) CDA classification (b) Defense-in-Depth protection strategy and graded approach to security levels (c) Integration with physical protection program

Figure 1. Architecture of cyber security program 3.2. Regulation Analysis for the Wireless Communication Systems In January 2010, US NRC requested to ensure that the critical systems are adequately protected from cyber attack by issuing Reg. Guide 5.71 as follows. Although wireless communication is not used for SSEP functions, it must ensure no effect on the CDA by the wireless potential path [3]. (a) Only allowing wireless access through a boundary security control device and treating wireless connections as outside of the security boundary, (b) Prohibiting the use of wireless technologies for CDAs associated with safety-related and important-to-safety functions, (c) Disabling wireless capabilities when not utilized, (d) Establishing usage restrictions and implementation guidance for wireless technologies, (e) Documenting, justifying, authorizing, monitoring, and controlling wireless access to CDAs and ensuring that the wireless access restrictions are consistent with defensive strategies and defensive models, and (f) Conducting scans [no less frequently than once every week] for unauthorized wireless access points (AP), in accordance with this document, and disabling access points if unauthorized access points are discovered. Also, KINS presents the assessment methodology and technical issues when applying wireless communication as follows, and requests to ensure that wireless communication does not affect the inherent function of CDA. (a) Prohibiting the use of wireless technologies for CDAs associated with safety-related and important-to-safety functions (b) Permitting design the wireless CDA in non-safety systems, connection to the wire communication network by security control device, data transfer outside of the security boundary when only reliability is same as one of communication related to safety

(c) Do not used safety network when data are transferred from Level 4 to Level 3 in Figure 2 and do not use to play a decisive role. Figure 2. Architecture of cyber security defense-in-depth 4. Cyber Security Evaluation for the Wireless Communication 4.1. Vulnerability Analysis of the Wireless Communication While wired equivalent privacy (WEP) based on the IEEE 802.11b standard has the number of exposed holes, the holes of Wi-Fi protected access (WPA) and WPA2 were complemented through IEEE 802.11i. Known vulnerabilities in terms of key setup and authentication, integrity, confidentiality and availability were reviewed, the example of analysis results is illustrated in Table 1 [10]. Table 1. Example of threat analysis for the wireless communication Table 2. Example of vulnerability analysis for the wireless communication

4.2. Threat Analysis and Countermeasures of the Wireless Communication The types of wireless threat are mainly attack to the internal network, authorized AP, outside AP by internal user, internal network by unauthorized outside user. Table 2 shows example of internal network attack in the threat analysis. The strategy which protect the connection with authorized AP by authorized user and control the connection with unauthorized, or authorized AP by unauthorized user, should be established, depending on the type of threat. The countermeasures, which were reflected in the CSP, were configured by management, operational, technical security controls and those security controls were interconnected to employ defense-in-depth concept. For example, for the vulnerability of SSID (Service Set Identifier) broadcasting, technical controls (e.g., hidden SSID method, 802.1x authentication, WIPS (Wireless Intrusion Prevention System)), operational controls (e.g., periodic scanning, AP stopping) can be considered. 5. Conclusion The cyber security program is being developed and applied in Korea NPPs not to affect inherent functions of I&C systems against the increase of cyber security threat and vulnerability due to application of digital technology. In order to take advantage of mobility and convenience by using wireless communication, cyber security evaluation is needed in terms of wireless communication itself and the connection portion with the wireless communications network to the I&C systems. Therefore, in this paper, we are establishing the wireless CSP through threat analysis, vulnerability analysis, countermeasures in the area of wireless communication to assess and manage the potential for adverse effects on safeguard and safety functions so as to provide high assurance that critical functions are properly protected cyber attack. It is expected that the safety and safeguard function, specifically on the area of real-time monitoring, logging, can be enhanced by employing the mobile devices (: smart phone, laptop, smart pad, etc). Proposed evaluation and design solution could be a basis for the design of wireless communication and mobile safety and safeguard systems in nuclear power plants. REFERE CES [1] NUREG/CR-6992, "Nuclear I&C Emerging Technologies, U.S. NRC, 2008 [2] 10 CFR 73.54, "Protection of Digital Computer and Communications Systems and Networks," U.S. NRC, 2009 [3] Reg. Guide 5.71, "Cyber Security Programs for Nuclear Facilities," U.S. NRC, 2010 [4] Reg. Guide 1.152 Rev.2, "Criteria for Use of Computer Safety Systems of Nuclear Power Plants," U.S. NRC, 2006 [5] NEI 08-09 Rev.6, Cyber Security Plan for Nuclear Power Reactor, NEI, 2010 [6] KINS Reg. Guide 8.22, "Cyber Security of Digital Instrumentation Control Systems in Nuclear Facilities," KINS, 2010 [7] Sooill Lee, Development of Cyber Security Program in APR+, Fall Conference of the Korean Society of Safety, 2012 [8] Sooill Lee, Hong-Ki Jung, Evaluation of the Cyber Security for the Application of Wireless Communication in Korean NPPs, Conference on Information and Control Systems, 2013 [9] KINS/RR-890, "A Study on Evaluation Technique of Wireless Communication Systems for Digital I&C System, KINS, 2011 [10] Praphul Chandra, "Bulletproof Wireless Security," 2005