CFP last date
20 January 2025
Reseach Article

Securing Data Transmission for Radiation Monitoring System in Nuclear Installation

by Nanang Triagung Edi H., Edi Winarko, Ahmad Ashari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 179 - Number 22
Year of Publication: 2018
Authors: Nanang Triagung Edi H., Edi Winarko, Ahmad Ashari
10.5120/ijca2018916420

Nanang Triagung Edi H., Edi Winarko, Ahmad Ashari . Securing Data Transmission for Radiation Monitoring System in Nuclear Installation. International Journal of Computer Applications. 179, 22 ( Feb 2018), 32-40. DOI=10.5120/ijca2018916420

@article{ 10.5120/ijca2018916420,
author = { Nanang Triagung Edi H., Edi Winarko, Ahmad Ashari },
title = { Securing Data Transmission for Radiation Monitoring System in Nuclear Installation },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2018 },
volume = { 179 },
number = { 22 },
month = { Feb },
year = { 2018 },
issn = { 0975-8887 },
pages = { 32-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume179/number22/29002-2018916420/ },
doi = { 10.5120/ijca2018916420 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:56:10.027448+05:30
%A Nanang Triagung Edi H.
%A Edi Winarko
%A Ahmad Ashari
%T Securing Data Transmission for Radiation Monitoring System in Nuclear Installation
%J International Journal of Computer Applications
%@ 0975-8887
%V 179
%N 22
%P 32-40
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Radiation exposure or radioactive release from nuclear installation should be monitored for ensuring safety and security to the worker, member of the public, and the environment. Radiological Data Monitoring System (RDMS) is one of the systems for conducting radiation monitoring. Transfer data process from local RDMS to central server generates some cyber vulnerabilities, including data confidentiality, integrity, and availability. A literature study to propose secure data transmission for supporting radiation monitoring system in nuclear installation has been conducted. For ensuring secure data transmission, some data security mechanism should be implemented, such as authentication process for each new RDMS, encryption of data uplink and downlink. Both symmetric and asymmetric cryptography algorithm can be implemented. Combination of algorithm cryptography, such as Advanced Encryption Standard (AES) and Elliptical Curve Cryptography (ECC), or Asymmetric key based Cryptographic Algorithm using Four Prime numbers (ACAFP) and ECC will be powerful for increasing the data security level in the data transmission process. In the development of security protocol algorithm, it should be considered the system configuration, capability of the local microprocessor, and power supply capacity in RDMS.

References
  1. Alabaichi, A., & Ibrahem, A. (2015). Enhance Security of Advanced Encryption Standard Algorithm Based on Key-dependent S-, 44–53.
  2. Chaudhury, P., Roy, M., Deb, S., & Roy, S. (2017). ACAFP : Asymmetric Key based Cryptographic Algorithm using Four Prime Numbers to Secure Message Communication. A Review of RSA Algorithm, 332–337.
  3. Envinet. (2017). Environmental Radiation Detection.
  4. Fan, S., Ye, F., Guo, J., Liang, Y., Xu, G., Zhang, X., … Engineering, E. (2014). A Security Protocol for Wireless Sensor Networks Designed for Monitoring Smart Grid Transmission Lines.
  5. Ganesh, A. R., P, N. M., Pl, S. S., Sundararajan, R., & Pargunarajan, K. (2011). An Improved AES-ECC Hybrid Encryption Scheme for Secure Communication in Cooperative Diversity based Wireless Sensor networks (pp. 1209–1214).
  6. Guo, Z., Ye, F., Guo, J., Liang, Y., Xu, G., Zhang, X., … Etwork, S. E. N. (2014). A Wireless Sensor Network for Monitoring Smart Grid Transmission Lines, 0–5.
  7. IAEA. Environmental and Source Monitoring for Purposes of Radiation Protection (2005).
  8. IAEA, I. A. E. A. (2011). IAEA Nuclear Security Series No. 17 Computer Security at Nuclear Facilities. IAEA Nuclear Security Series, (17).
  9. Kaul, V., Nemade, B., Bharadi, V., & Narayan, S. K. (2016). Next Generation Encryption using Security Enhancement Algorithms for End to End Data Transmission in 3G / 4G Networks. Procedia - Procedia Computer Science, 79, 1051–1059. https://doi.org/10.1016/j.procs.2016.03.133
  10. NISA, U. (2017). Technical Introduction to Cyber Security at Nuclear and Radiological Facilities. Idaho: US NISA.
  11. Pund, S. (2015). Secured Data Communication System Using RSA with Mersenne Primes and Steganography, (2), 1306–1310.
  12. Sahmoud et al - 2013 - Enhancement the Security of AES Against Modern Attacks by Using Variable Key Block Cipher.pdf. (2013). International Arab Journal of E-Technology, 3(January 2013), 17–26.
  13. Stallings, W. (2006). Cryptography and Network Security (4th Edition). (M. J. Horton, Ed.) (4th ed.). Singapore: Pearson Prentice Hall.
  14. Yan, Y., Hu, R. Q., Das, S. K., Sharif, H., & Qian, Y. (2013). An Efficient Security Protocol for Advanced Metering Infrastructure in Smart Grid, (August), 64–71.
  15. Zhang, X., Ye, F., Fan, S., Guo, J., Xu, G., & Qian, Y. (2016). An adaptive security protocol for a wireless sensor-based monitoring network in smart grid transmission lines, (October 2015), 60–71. https://doi.org/10.1002/sec
Index Terms

Computer Science
Information Sciences

Keywords

secure data transmission radiation monitoring nuclear installation cryptography.