In the wake of the Fukushima NPP accident, research on the safety evaluation of spent fuel storage facilities for natural disasters such as earthquakes and tsunamis has been continuously conducted, but research on the protection integrity of spent fuel storage facilities is insufficient in terms of physical protection. In this study, accident scenarios that may occur structurally and thermally for spent fuel storage facilities were investigated and safety assessment cases for such scenarios were analyzed. Major domestic and international institutions and research institutes such as IAEA, NEA, and NRC provide 13 accident scenario types for Spent Fuel Pool, including loss-of-coolant accidents, aircraft collisions, fires, earthquakes. And 10 accident scenario types for Dry Storage Cask System, including transportation cask drop accidents, aircraft collisions, earthquakes. In the case of Spent Fuel Pool, the impact of the cooling function loss accident scenario was mainly evaluated through empirical experiments, and simulations were performed on the dropping of spent nuclear fuel assembly using simulation codes such as ABAQUS. For Dry Storage Cask System, accident scenarios involving structural behavior, such as degradation and fracture, and experimental and structural accident analyses were performed for storage cask drop and aircraft collision accidents. To evaluate the safety of storage container drop accidents, an empirical test on the container was conducted and the simulation was conducted using the limited element analysis software. Among the accident scenarios for spent fuel storage facilities, aircraft and missile collisions, fires, and explosions are representative accidents that can be caused by malicious external threats. In terms of physical protection, it is necessary to analyze various accident scenarios that may occur due to malicious external threats. Additionally, through the analysis of design basis threats and the protection level of nuclear facilities, it is necessary to derive the probability of aircraft and missile collision and the threat success probability of fire and explosion, and to perform protection integrity evaluation studies, such as for the walls and structures, for spent fuel storage facilities considering safety evaluation methods when a terrorist attack occurs with the derived probability.
In Korea, additional regulatory requirements are increasing due to the full-scale decommissioning of nuclear power plants following the permanent shutdown of Kori Unit 1 and Wolseong Unit 1. Accordingly, it is necessary to preemptively expand the scope of physical protection regulations from design, construction, and operation stage to back-end nuclear fuel cycle such as cessation of operation and decommissioning. According to Article 2, Paragraph 24 of the Nuclear Safety Act, the decommissioning of nuclear facilities is defined as all activities to exclude them from the application of the Nuclear Safety Act by permanently suspending the operation of nuclear facilities, demolishing the facilities and sites, or removing radioactive contamination. In other words, it refers to a series of technologies or activities to safely and efficiently dismantle nuclear power plant and remove radioactive contamination and restore them to their original state after permanently shut down of nuclear power plant. Security changes during decommissioning and decontamination since removing fuel from the reactor alters the plant’s safety status, some of the systems or components considered as vital equipment during plant operation will no longer be needed. The vital areas may be reduced as fewer buildings, equipment and systems need to be protected, which means access controls, surveillance and so on can be reduced. And also, decommissioning will probably require more workers than operation would, although this might not be the case at all times. From a security point of view, this might require more personnel or additional access points. Changing operating require changed security measures, to ensure that the required security level will be maintained while at the same time work proceeds efficiently. Once all of the fuel is removed from the plant, radiological release risk is much lower. The lower risk requires a lower level of security measures. Even during the removal of nuclear material and contaminated equipment from nuclear facilities, lower level of security measures should meet regulatory requirements based on a graded approach. Therefore, this study intends to examine the responsibilities and obligations of regulatory authorities, regulator, and nuclear operators in terms of protection after permanent shutdown and decommissioning.
Domestic nuclear power plants have developed radiological emergency plans based on the USNRC’s NUREG-0654/FEMA-REP-Rev.1 report and the Korea Institute of Nuclear Safety’s (KINS) research report on radiation emergency criteria for power reactors (KINS/RR-12). NUREG-0654 is a US emergency planning guide for nuclear power plants and provides detailed technical requirements for the content of radiological emergency plans. The document classifies radiological emergencies into three levels: Alert, Site Area Emergency, and General Emergency, which correspond to the white, blue, and red emergency levels used in domestic nuclear power plants. KINS/RR-12 is a technical guidance document published by the Korea Institute of Nuclear Safety in 2012, which divides radiological emergency criteria into criteria for pressurized water reactors (PWRs) and criteria for boiling water reactors (BWRs), and describes in detail the regulatory position and implementation of radiological emergency criteria for domestic PWRs and BWRs. The physical protection-related radiation emergency criteria included in the radiological emergency plan are specified in the radiological emergency criteria guidelines. There are two items each related to white and blue emergencies and one item related to red emergencies. Standard order of emergency plan lists the physical protection-related radiological emergency criteria for domestic PWRs and BWRs, which are identical according to the radiological emergency criteria guidelines. To enhance the physical protection regulation, the legal and regulatory basis for target set identification and vital area identification need to be established by considering radiological and physical protection emergency plan.
In order to enter a nuclear power plant, access approval is required in advance, and biometric information such as fingerprints of visitors must be registered when issuing a key card, and only those certified through biometric equipment can enter the nuclear facilities (Protected area II). Fingerprint recognizers and facial recognizers are installed and operated in domestic nuclear facilities for access control. Domestic nuclear facilities establish and implement a protection system in accordance with physical protection requirements under the “Act on Physical Protection and Radiological Emergency” and “Physical Protection Regulations” of each nuclear facility. Detailed implementation standards are specified in Regulation Standard (RS) documents established and distributed by KINAC. Biometrics are mentioned in a KINAC RS-104 (Access Control) document. In this study, it was analyzed what points should be considered in order to prepare for performance tests and establish plans for biometric devices. In order for the results of performance evaluation of biometric devices to obtain high reliability and to be applied to nuclear facilities in the future, standardized performance evaluation targets, procedures, standards, and environments must be created. In order to collect samples such as fingerprints for performance evaluation, the size roll of the sample shall be determined, and the appropriateness of the sample size shall be evaluated in consideration of reliability and error range. In addition, the analysis results for the characteristics (gender, age, etc.) of the sample should be presented. When collecting samples, conflicts with other laws such as personal information protection should be considered, and the reliability of the performance test result data should be analyzed and presented. Quality evaluation should also be performed on forged biometric information data such as silicon fingerprints. In addition, when establishing a performance evaluation plan, a systematic evaluation procedure should be established by referring to domestic and foreign certification and evaluation systems such as the Korea Internet & security Agency (KISA). In order to improve the completeness of the access control system using the biometrics of nuclear facilities, it is necessary to test the performance of biometric devices and to install and operate only devices that have the ability to defend against counterfeit technology. In this study, it was analyzed what points should be considered in order to prepare for performance tests and establish plans for biometric devices.
As drone technology and industry develop around the world, the use of drones are increasing in number and expanding to different fields. On the other hand, illegal flight and terrorist incidents using drones are also increasing day by day. In Korea, it is reflected in the “Design Basis Threat (DBT)”, which is the standard for designing and evaluating the physical protection system of nuclear power plants in accordance with the “Act on Physical Protection and Radiological Emergency”, that nuclear power plants continue to establish physical protection against drone threats. A total of 141 drone attacks or incidents have occurred around the world since 2015. Cases related to the Russian-Ukraine war, in which so many cases occurred, were excluded. There were 112 cases (79%) of terrorism or suspected terrorism using a single drone. There were 4 cases of terrorism using more than 5 drones, and a total of 20 drones were used to attack an oil facility in Yemen (2019). By region, a total of 111 incidents occurred in Middle East & North Africa. By country, there were 49 cases in Iraq, 35 cases in Saudi Arabia, and 8 cases in Syria. Among major countries, three cases occured in Korea, five in the United States, two in England, Canada, and Italy, and one in Japan and France. Since 2021, there have been 15 drone attacks. Multiple drones were used in attacks targeting military or large-scale Important National Facilities such as the Saudi oil refinery, Indian Kashmir air base, and reconnaissance of Iranian Natanz nuclear and surrounding military facilities. Also in 89% of the cases, the drones were loaded with explosives in order to cause large-scale damage. Accordingly, nuclear power plants, which are important national facilities, need to establish a system that can detect and respond to multiple drones. Furthermore, additional protective measures are needed for areas that are expected to be severely damaged which can be established by evaluating the impact of explosives on major points in the plant. In additionthere is a high possibility of terrorism by organizations aiming for national turmoil rather than individual terrorists. So it is important to identify signs of terrorism in advance and prepare through cooperation with related agencies.
For national security, approximately 500 facilities have been designated as national security facilities. It is divided into grades A, B, and C depending on the fields such as electrics, energy and public service. In 2016, KINAC developed and suggested the installation standards and evaluation indicators for security equipment for national security facilities and they have been utilized to evaluate and manage the facilities. In order to update them by reflecting the recent security trend of the facilities and new technology, KINAC have investigated and updated the installation standards and evaluation indicators for security equipment. As a part of developing installation standards and evaluation indicators for national security facilities project, we conducted survey to identify the status and capabilities of facilities: how the security system is well designed, which type of security equipment is utilized. According to the results, the passive infrared (PIR) sensor is commonly used for interior intrusion detection (not included in 2016 project). Therefore, we investigated the passive infrared sensor and provided its installation standards and evaluation indicators. PIR sensor detects the energy generated by the objects which is different as their temperatures. PIR sensors do not emit any energy like active infrared sensor, and do not measure the energy. Rather, PIRs measure variation in thermal radiation. PIR sensor detects thermal energy by sensing the change between a heat source and the background temperature. In this paper, the characteristics and features of PIR sensor were discussed. Considering them, the standards and indicators to install/evaluated the PIR sensors were also proposed. The results would support national security facility to design and evaluate their security system.
Nuclear power plants, like other national critical infrastructures, could be under the threat of terrorism or other malicious action. Thus, a nuclear power plant has a robust security system that includes security guards, sensors, barriers, access control systems, lights, and alarm stations with security procedures. However, an effective security system is hard to design because a chain is only as strong as its weakest link, and there could be a vulnerable hole even in the robust security system. Thus, an effective security system requires the evaluation of all possible scenarios. Evaluation software for security system effectiveness assists in systematically assessing all the possible attack scenarios. Many countries developed security effectiveness evaluation software. The first software was developed by the U.S. Sandia National Laboratories in the 1980s. Now there are several commercially available software packages with a function to simulate limited-scope combat between security guards and attacking enemies. However, academic communication is comparatively weak because it may contain sensitive information on the vulnerability of nuclear power plants. We developed original software called Tools for Evaluating Security Systems (TESS) to identify the most vulnerable path to the designated target and model the security systems of all South Korean nuclear power plants. We also used commercial security effectiveness evaluation software, AVERT, to model the same nuclear power plants. TESS was developed to verify the results of commercial security effectiveness evaluation software for the purpose of regulatory use. For the feasibility test, we compared the results of two software with those of force-on-force (FoF) exercises in nuclear power plants. According to the relevant Act, every nuclear power plant site should perform the FoF exercises every year. KINAC was in charge of evaluating the FoF exercise and used several of its results for the study. In the results, even in some differences in detail, the two software and FoF exercises showed qualitative similarity. Conclusively, evaluation software is a useful tool to design and/or assess the security systems of nuclear power plants. We modeled the security systems of all South Korean nuclear power plants, and compared the developed software, a commercial software and FoF exercises. The results showed qualitative similarity. We provided the results of evaluation to nuclear operators for the better security of nuclear power plants.
UAVs (Unmanned Aerial Vehicle) are a rising threat to national facilities due to their cheap price and accessibility. Incidents such as the terrorism attack in Saudi Arabia’s oil facilities and the paralysis of the airport system in England’s Gatwick airport shows the need for integrating CUAS (Counter- Unmanned Aerial Systems) in important national facilities. Recently efforts have been made to evaluate the technical performance of the CUAS. Especially SNL (Sandia National Laboratory) modified the methodology used for PPS (Physical Protection Systems) to develop a performance metrics for CUAS. The performance metrics can be used to effectively analyze the facilities capability of countering drone attacks in a probabilistic way. In this study, we managed to derive the safety boundary of a reference nuclear power plant model based on its current CUAS and protection capabilities with a simplified methodology. Based on the outermost boundary of the model, the time table of the UAS consist of 4 variables which are the assessment time, transmission time, neutralization time and the maximum vehicle velocity. Dividing the maximum velocity to the net time derived, we estimated the minimum sensing point of the CUAS which is the minimum safety boundary of the facility to safely manage the UAV attack. Two practice cases were evaluated with the methodology which is based on the UAV groups classified by the United States DOD (Department Of Defense) that matches the classification of the UAV in Korea. Each variable was assumed to fit the process of a realistic nuclear power plant. Using the variables, we calculated the minimum safety boundary of the facility. With the methodology introduced in this study, regulators and stakeholders can easily evaluate the capability of the facilities CUAS for a design basis UAV attack. Also it can be used as a simple tool to analyze the facilities vulnerability for specific UAV specifications and a guideline to check the protective procedures of the facility.
Nuclear power plants, which are important national facilities, require special attention against the threat of terrorism using various methods. Among the terrorist threats, as structural damage and human casualties due to explosions continue to occur, interest in the blast load is increasing. However, domestic nuclear power plants do not have sufficient design requirements for protection against the threat of explosives. To prepare for the threat of terrorism using explosives, it is necessary to evaluate the physical protection performance of nuclear power plants against blast load, and to use this to improve protection performance and establish regulatory standards. Most of the explosion-proof designs used abroad use the empirical chart presented by UFC 3-340- 02 (DoD 2008), which does not take into account the effect of near-field explosions. When explosions occur inside nuclear power plants, near-field explosions occur in most cases. In this study, it was assumed that explosives were installed in the corridor inside nuclear power plants. A spherical TNT was placed in the middle of the corridor floor to simulate near-field explosions, and the structure response according to the weight of the TNT was evaluated. The corridor was modeled with a reinforced concrete material and the LS-DYNA program was used for analysis. For the explosion model, the Arbitrary-Lagrangian-Eulerian (ALE) analysis technique applying the advantages of the Lagrangian and Eulerian methods were used. By analyzing the pressure history and the degree of deformation of the structure according to the explosion, the degree of threat caused by the explosion was analyzed. Based on the analysis of this study, physical barriers performance database (DB) using Modeling & Simulation (M&S) will be constructed by performing sensitive analysis such as representative structure shape setting, boundary conditions, material of structures, etc. The constructed DB is expected to be used to establish regulatory standards for the physical barriers of nuclear power plants related to explosives.
The IAEA states that in the event of sabotage, nuclear material and equipment in quantities that can cause high radiological consequences (HRC), as well as the minimum systems and devices necessary to prevent HRC, must be located within one or more vital areas. Accordingly, in Article 2 of the ACT ON PHYSICAL PROTECTION AND RADIOLOGICAL EMERGENCY, the definition of the vital area is specified, and a nuclear facility operator submits a draft to the Nuclear Safety and Security Commission to establish vital areas and must obtain approval from Nuclear Safety and Security Commission. Since the spent fuel pool and new fuel storage area are areas where nuclear material is used and stored, they can be candidates for vital areas as direct targets of sabotage. The spent fuel pool is a wet spent fuel storage facility currently operated by most power plants in Korea to cool and store spent nuclear fuel. Considering the HRC against sabotage, it is necessary to review whether sepnt fuel pool needs to establish a vital area. In addition, depending on the status of plant operation during the spent fuel management cycle, the operation status of safety systems to mitigate accidents and power system change, so vital areas in fuel handling building (including spent fuel pool) also need to be adjusted flexibly. This study compares the results of the review on whether the essential consideration factors are reflected in the identification of essential safety systems and devices to minimize HRC caused by sabotage in the spent fuel storage system with the procedure for identifying the vital area in nuclear power plants. It was reviewed from the following viewpoints: Necessity to identify necessary devices to minimize the radiation effects against sabotage on the spent fuel pool, Review of necessary elements when identifying vital areas to minimize the radiation effects of spent fuel pool against sabotage, Necessity to adjust vital areas according to the spent fuel management cycle. The main assumptions used in the analysis of the vital area of the power plant need to be equally reflected when identifying vital areas in spent fuel pool. And, the results of this study are for the purpose of minimizing the radiological consequences against sabotage on the spent fuel storage system including the spent fuel pool and used to establish regulatory standards in the spent fuel storage stage.