2018
DOI: 10.1016/j.net.2018.01.018
|View full text |Cite
|
Sign up to set email alerts
|

Development of field programmable gate array–based encryption module to mitigate man-in-the-middle attack for nuclear power plant data communication network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…A growing trend in the modernization of nuclear power plants is splitting digital and analog instrumentation and control [12]. Future research will investigate the cyber security implications of this modernization on non-critical nuclear power plant instrumentation, including the implementation of mitigation techniques involving field programmable gate arrays [7], fault-tolerant operations and self-repairing designs [12]. Additionally, future research will investigate other cyber attacks such as baseline response replay and direct slave control [9] to verify the effectiveness of the mitigation techniques.…”
Section: Discussionmentioning
confidence: 99%
“…A growing trend in the modernization of nuclear power plants is splitting digital and analog instrumentation and control [12]. Future research will investigate the cyber security implications of this modernization on non-critical nuclear power plant instrumentation, including the implementation of mitigation techniques involving field programmable gate arrays [7], fault-tolerant operations and self-repairing designs [12]. Additionally, future research will investigate other cyber attacks such as baseline response replay and direct slave control [9] to verify the effectiveness of the mitigation techniques.…”
Section: Discussionmentioning
confidence: 99%
“…Jae Cheon Jung et al, developed a field-programmable gate array security mechanism to minimize information-gathering attacks based on a cryptographic approach to secure data confidentiality and prevent the injection of malware into the vital digital assets data communication system of NPP [113]. In [114], researchers have developed a secure access control scheme based on certificate-less signcryption with a proxy re-encryption scheme which can secure in ROM.…”
Section: ) Cyber-security For Communication Channel Attacksmentioning
confidence: 99%
“…To ensure the confidentiality and integrity of the data in the nuclear power plant. Mohamed Abdallah Elakrat et al [303] developed an encryption-based security model on Field Programmable Gate Array (FPGA) to mitigate MitMA. This model uses the AES algorithm with a 128-bit key to encrypt the data.…”
Section: ) Spoofing Attackmentioning
confidence: 99%