Evaluation on Passive System Identification and Covert Misappropriation Attacks in Large Pressurized Heavy Water Reactors

The recent literature on nuclear science demonstrates the feasibility and the benefits of controlling large Pressurized Heavy Water Reactors (PHWR) through Networked Control Systems (NCS). However, the use of NCSs in PHWRs may also expose such critical systems to threats launched from the cyber domain. In the present paper, we propose a novel combination of two cyber-physical attacks (Passive System Identification attack and Covert Misappropriation attack) and evaluate their impact in a PHWR. The results indicate that, with this two attacks, the attacker is able to manipulate the power of the PHWR achieving, at the same time, a high degree of covertness. Moreover, the outcomes suggest the sensitivity and accuracy required for a monitoring system to detect this kind of attack, which may be considered in the development of standards and requirements for PHWR monitoring systems.

[1]  Roy S. Smith,et al.  A Decoupled Feedback Structure for Covertly Appropriating Networked Control Systems , 2011 .

[2]  Pinar Çivicioglu,et al.  Backtracking Search Optimization Algorithm for numerical optimization problems , 2013, Appl. Math. Comput..

[3]  Amitava Gupta,et al.  An Interval Approach for Robust Control of a Large PHWR with PID Controllers , 2015, IEEE Transactions on Nuclear Science.

[4]  Roy S. Smith,et al.  Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure , 2015, IEEE Control Systems.

[5]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.

[6]  Raphael Machado,et al.  Covert Attacks in Cyber-Physical Control Systems , 2016, IEEE Transactions on Industrial Informatics.

[7]  Alan Oliveira de Sá,et al.  Bio-inspired Active System Identification: a Cyber-Physical Intelligence Attack in Networked Control Systems , 2020, Mob. Networks Appl..

[8]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[9]  Raphael Machado,et al.  A controller design for mitigation of passive system identification attacks in networked control systems , 2017, Journal of Internet Services and Applications.

[10]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.

[11]  Amitava Gupta,et al.  Stability of Networked Control System (NCS) with discrete time-driven PID controllers , 2015 .

[12]  Manoj Kumar,et al.  Networked Control of a Large Pressurized Heavy Water Reactor (PHWR) With Discrete Proportional-Integral-Derivative (PID) Controllers , 2013, IEEE Transactions on Nuclear Science.

[13]  B. Goswami,et al.  Network Control System Applied to a Large Pressurized Heavy Water Reactor , 2006, IEEE Transactions on Nuclear Science.