2020
DOI: 10.1109/access.2020.3005134
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Monitoring System for the Data Integrity of Reactor Protection System Using Blockchain Technology

Abstract: Nuclear Power Plants (NPPs) are physically isolated from external networks and have different operational environments than conventional information technology (IT) systems. Accordingly, NPPs were regarded as safe from external cyber-attacks. However, it was later determined that isolated networks are not safe from cyber-attacks. Malicious data injection attacks on Programmable Logic Controllers (PLCs) deployed in the safety system of NPPs are critical to nuclear facilities, as they were in the Stuxnet attack.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 54 publications
(14 citation statements)
references
References 12 publications
0
14
0
Order By: Relevance
“…Besides, Yazdinejad et al [25] presented cluster architecture where SDN controllers with block-chain are applied on IoT network to provide advanced routing protocols and to remove POWs for increased protection. Choi et al [26] developed an innovative model with block-chain and fabricated RPS prototype in order to monitor the data-integrity as PoM and identifed cyber-attacks in real-time of PLCs due to PoW network associated with lot of nodes.…”
Section: Block-chain Based Intelligent Cyber Defensementioning
confidence: 99%
“…Besides, Yazdinejad et al [25] presented cluster architecture where SDN controllers with block-chain are applied on IoT network to provide advanced routing protocols and to remove POWs for increased protection. Choi et al [26] developed an innovative model with block-chain and fabricated RPS prototype in order to monitor the data-integrity as PoM and identifed cyber-attacks in real-time of PLCs due to PoW network associated with lot of nodes.…”
Section: Block-chain Based Intelligent Cyber Defensementioning
confidence: 99%
“…The worm attacks involve the injection of codes to the networks that target the operating system weaknesses to steal, modify, and delete data at the web client and the webserver. Examples of worm attacks have been discussed in Section 5.2 (such as Stuxnet, Flame, and Duqu, i.e., Code Red/Code Red II (2001), Nimda (2001), Triton (2017) [ 7 , 34 , 35 ].…”
Section: Smart City Layered Adversariesmentioning
confidence: 99%
“…Blockchain is made up of strings of interconnected block headers and blocks bodies [195]. The block body consists of all transactions in the block.…”
Section: Intelligent Thingsmentioning
confidence: 99%