Abstract
Software verification and validation is the principal and most common type of activity for ensuring the quality of software systems, including those with a rising risk of the operation, throughout the entire life cycle. The software for systems important for nuclear power-plant (NPP safety) is subject to increased requirements for reliability and stability of operation, and for cybersecurity. The complex structure of automated process control systems of NPP and a large number of cybersecurity management tools make it difficult to verify and use cybersecurity management tools at all stages of the object’s life cycle from design to operation. The paper proposes a methodology for verifying and validating software for systems important to NPP safety, based on a high-qualitative cybersecurity management model to ensure the required level of cybersecurity. The methodology allows it to apply the concept of adaptive testing and simulate making and eliminating errors at each stage of software development. This methodology is using in the development of top-level systems of NPP APCS.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Baylon, C., Brunt, R., Livingstone, D.: Cyber security at civil nuclear facilities: understanding the risks. Chatham House, London (2016)
Regulatory guide 5.71: Cyber security programs for nuclear facilities. U.S. Nuclear Regulatory Commission (2010)
IEEE Std 7-4.3.2-2016: IEEE Standard criteria for programmable digital devices in safety systems of nuclear power generating stations
International Atomic Energy Agency: Computer security at nuclear facilities. IAEA Nuclear security series, no. 17 (2011)
Song, J.G., Lee, J.W., Park, G.Y., et al.: An analysis of technical security control requirements for digital I&C systems in nuclear power plants. Nuclear Eng. Technol. 45(5), 637–652 (2013). https://doi.org/10.5516/NET.04.2012.091
Poletykin, A., Jharko, E., Mengazetdinov, N., et al.: The new generation of upper levels systems and industry 4.0 conception in NPP APCS. In: Proceedings of the 2017 Tenth International Conference Management of Large-Scale System Development, Moscow, 2–4 October 2017, pp. 1–5. IEEE (2017)
Byvaikov, M.E., Zharko, E.F., Mengazetdinov, N.E., et al.: Experience from design and application of the top-level system of the process control system of nuclear power-plant. Autom. Remote Control 67(5), 735–747 (2006). https://doi.org/10.1134/S0005117906050067
Litherland, P., Orr, R., Piggin, R.: Cyber security of operational technology: understanding differences and achieving balance between nuclear safety and nuclear security. In: Proceedings of the 11th International Conference on System safety and cyber-security, London, 11–13 October 2016, pp. 1–6 (2016)
Kaur, R.K., Pandey, B., Singh, L.K.: Dependability analysis of safety critical systems: issues and challenges. Ann. Nucl. Energy 120, 127–154 (2018). https://doi.org/10.1016/j.anucene.2018.05.027
Chou, I.H.: Secure software configuration management processes for nuclear safety software development environment. Ann. Nucl. Energy 38, 2174–2179 (2011). https://doi.org/10.1016/j.anucene.2011.06.016
Lee, S.J., Jung, W.Y., Joon, E.: PSA model with consideration of the effect of fault-tolerant techniques in digital I&C systems. Ann. Nucl. Energy 87(2), 375–384 (2016). https://doi.org/10.1016/j.anucene.2015.07.039
Li, W., Peng, M., Wang, Q.: Fault detectability analysis in PCA method during condition monitoring of sensors in a nuclear power plant. Ann. Nucl. Energy 119, 342–351 (2018). https://doi.org/10.1016/j.anucene.2018.05.024
Promyslov, V., Semenkov, K., Shumov, A.: A Clustering method of asset cybersecurity classification. IFAC-Papers Online 52(13), 928–933 (2019). https://doi.org/10.1016/j.ifacol.2019.11.313
Promyslov, V., Sakrutina, E., Meshcheryakov, R.: Coherence criterion for security architecture of digital control system. In: Proceedings of the 2019 International Russian Automation Conference, Sochi, 8–14 September 2019, pp. 1–5 (2019)
Kang, H.G., Lee, S.H., Lee, S.J., et al.: Development of a bayesian belief network model for software reliability quantification of digital protection systems in nuclear power plants. Ann. Nucl. Energy 120, 62–73 (2018). https://doi.org/10.1016/j.anucene.2018.04.045
Eom, H.S., Park, G.Y., Jang, S.C., et al.: V&V-based remaining fault estimation model for safety-critical software of a nuclear power plant. Ann. Nucl. Energy 51, 38–49 (2013). https://doi.org/10.1016/j.anucene.2012.06.030
Jharko, E.: Evaluation of the quality of a program code for high operation risk plants. IFAC Proc. Vol. 47(3), 8060–8065 (2014). https://doi.org/10.3182/20140824-6-ZA-1003.02140
Jharko, E.: The methodology of software quality assurance for safety-critical systems. In: Proceedings of the 2015 International Siberian Conference on Control and communications, Omsk, 21–23 May 2015, pp. 1–5 (2015)
MacCormack, A., Sturtevant, D.J.: Technical debt and system architecture: the impact of coupling on defect-related activity. J. Syst. Softw. 120, 170–182 (2016). https://doi.org/10.1016/j.jss.2016.06.007
Myers, G.J., Sandler, C., Badgett, T.: The Art of Software Testing. Wiley, New Jersey (2011)
Elberzhager, F., Kremer, S., Munch, J., et al.: Focusing testing by using inspection and product metrics. Int. J. Softw. Eng. Knowl. Eng. 23(04), 433–462 (2013). https://doi.org/10.1142/S0218194013400093
Jharko, E.: Safety function of soft and hardware complex within aspect of NPP safety important systems. In: Proceedings of the 2019 International Russian Automation Conference, Sochi, 8–14 September 2019, pp. 1–6 (2019)
Acknowledgments
The reported study was partially (Section III) funded by RFBR, project number 19–29-06044.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Jharko, E. (2021). Systems Important for NPP Safety: Software Verification and Cybersecurity. In: Radionov, A.A., Gasiyarov, V.R. (eds) Advances in Automation II. RusAutoCon 2020. Lecture Notes in Electrical Engineering, vol 729. Springer, Cham. https://doi.org/10.1007/978-3-030-71119-1_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-71119-1_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-71118-4
Online ISBN: 978-3-030-71119-1
eBook Packages: EngineeringEngineering (R0)