A proposed design for security system for nuclear waste warehouses against terrorists attack

被引:1
|
作者
Wadoud, A. A. [1 ]
Galahom, A. Abdelghafar [2 ]
Abdel-Rahman, Mohamed A. E. [3 ,4 ]
机构
[1] Egyptian Atom Energy Author, Res Reactors Dept, Inshas, Egypt
[2] Higher Technol Inst, 10th Of Ramadan City, Egypt
[3] Mil Tech Coll, Nucl Engn Dept, Cairo, Egypt
[4] Arab Acad Sci Technol & Maritime Transport, Coll Engn & Technol, Giza, Egypt
关键词
Physical protection evaluation; Terrorist attacks; Protection of nuclear waste warehouses; Intrusion detection; Deterrence system; EASI program;
D O I
10.1016/j.nucengdes.2024.113437
中图分类号
TL [原子能技术]; O571 [原子核物理学];
学科分类号
0827 ; 082701 ;
摘要
A physical protection system (PPS) is one of the principal systems used in nuclear facilities for protection against terrorist attacks and the possibility of bombing, sabotage, and theft. This paper introduces the design of an advanced security system for nuclear waste warehouses against stealth terrorist attacks. This research paper takes a more original approach in addressing how a nuclear facility can detect and respond to a security incident. It does so through an interconnected security system that simultaneously practical and distinctive way. This PPS design allows the security system to achieve its main goals of detection and delay functions during any incident. Additionally, it places the intruder under attack from a successive defensive system which grants the response forces additional time to arrive and neutralize the threat completely. The proposed design of the security system will include dual-side infrared rays, high-intensive sound barriers, an intensive flashlight barrier, an electric chock system, and a smart camera surveillance system. Three consecutive processes, detection, deterrence, and defense will be operated around the waste storage building. This idea can be implemented by establishing an early detection system to detect any intrusion by terrorist attackers through a protected area surrounding the storage facility. The next step is deterring the attackers from completing their mission by placing an advanced deterrence system and putting delay elements along the path of their attack on the waste storage to complicate the mission. Then the defense system is operating to prevent terrorist progress. Finally, an evaluation process of the overall security system which has been designed by using EASI program is performed to verify the accepted level of physical protection, keep the security system component valid and updated, and follow procedures, rules and requirements of the nuclear regulatory authority at the national level and meet IAEA concept and recommendations at the international level.
引用
收藏
页数:9
相关论文
共 39 条
  • [1] A detection and defense security system design for nuclear waste storage against stealth terrorists attack
    Wadoud, Amir A.
    Alhawsawi, Abdulsalam M.
    Ghandourah, Emad
    Abdel-Rahman, Mohamed A. E.
    KERNTECHNIK, 2024, 89 (04) : 426 - 437
  • [2] Security Analysis of DoS Attack against the LTE-A System
    Cao, Wei
    Ma, Nan
    Zhang, Ping
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 1287 - 1292
  • [3] Design of Monitor and Protect Circuits against FIB Attack on Chip Security
    Ling, Mengmeng
    Wu, Liji
    Li, Xiangyu
    Zhang, Xiangmin
    Hou, Jinsong
    Wang, Yong
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 530 - 533
  • [4] Design and Verification of Nuclear Waste Handling System
    Urade, Shashank
    Nath, Amar
    Niyogi, Rajdeep
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 424 - 430
  • [5] The Proposed Design of the Monitoring System for Security Breaches of Buildings Based on Behavioral Tracking
    Rahma, Abdul Monem S.
    Jamil, Abeer Salim
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (07): : 37 - 40
  • [6] Design of Web Security Penetration Test System Based on Attack and Defense Game
    Song, Bing
    Sun, Li
    Qin, Zhihong
    SCIENTIFIC PROGRAMMING, 2022, 2022
  • [7] AssociPass: A User Authentication System with Word-Pairs for Security against Guess Attack
    Yamagishi, Rei
    Takada, Tetsuji
    CHI 2018: EXTENDED ABSTRACTS OF THE 2018 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2018,
  • [8] Security in Cyber-Physical Systems: Controller Design Against Known-Plaintext Attack
    Yuan, Ye
    Mo, Yilin
    2015 54TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2015, : 5814 - 5819
  • [9] Effectiveness evaluation of a nuclear facility security system under a cyber-physical attack scenario
    Tavares, Renato L. A.
    Albuquerque, Robson de O.
    Giozza, William F.
    2022 17TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2022,
  • [10] DESIGN CONSIDERATIONS AND FEATURES FOR A NUCLEAR-POWER PLANT SECURITY SYSTEM
    MAO, JTK
    SALVI, A
    IEEE TRANSACTIONS ON POWER APPARATUS AND SYSTEMS, 1981, 100 (11): : 4493 - 4501