A Systematic Literature Review on AI-Based Cybersecurity in Nuclear Power Plants
Abstract
1. Introduction
- RQ1: What are the critical assets to be preserved from cyber-attacks in the context of NPPs through the support of AI?
- RQ2: What are the security vulnerabilities and cyber threats in NPPs that can be managed through AI technology?
- RQ3: What are the cyber risks and business impacts of cyber-attacks on NPPs assessable through AI?
- RQ4: What are the AI-based security countermeasures to mitigate cyber risks in the context of NPPs?
2. Research Method
2.1. Review Planning
2.2. Search Execution and Document Selection
3. Document Analysis and Results Reporting
3.1. Critical Assets to Be Preserved Against Cyber-Attacks in the NPPs
3.2. Security Vulnerabilities and Cyber Threats in the NPPs
3.3. Cyber Risks and Business Impacts for the NPPs
3.4. AI-Based Security Countermeasures in the NPPs
4. Discussion
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A
Appendix B
ID | Reference | Document Type | Author’s Institution | Country | Year |
1 | [43] | Article |
|
| 2025 |
2 | [40] | Article |
|
| 2024 |
3 | [48] | Conference paper |
|
| 2024 |
4 | [41] | Article |
|
| 2024 |
5 | [39] | Article |
|
| 2024 |
6 | [38] | Article |
|
| 2024 |
7 | [16] | Article |
|
| 2024 |
8 | [36] | Article |
|
| 2024 |
9 | [44] | Article |
|
| 2023 |
10 | [49] | Article |
|
| 2022 |
11 | [35] | Article |
|
| 2022 |
12 | [55] | Article |
|
| 2021 |
13 | [37] | Conference paper |
|
| 2021 |
14 | [42] | Article |
|
| 2020 |
15 | [50] | Article |
|
| 2020 |
16 | [33] | Conference paper |
|
| 2020 |
17 | [30] | Conference paper |
|
| 2019 |
18 | [31] | Article |
|
| 2019 |
19 | [46] | Conference paper |
|
| 2019 |
20 | [34] | Conference paper |
|
| 2019 |
21 | [32] | Article |
|
| 2019 |
22 | [12] | Conference paper |
|
| 2018 |
23 | [47] | Conference paper |
|
| 2018 |
References
- Busquim e Silva, R.B.; Piqueira, J.R.C.; Cruz, J.J.; Marques, R.P. Cybersecurity Assessment Framework for Digital Interface Between Safety and Security at Nuclear Power Plants. Int. J. Crit. Infrastruct. Prot. 2021, 34, 100453. [Google Scholar] [CrossRef]
- Zhang, F.; Kelly, K. Overview and Recommendations for Cyber Risk Assessment in Nuclear Power Plants. Nucl. Technol. 2023, 209, 488–502. [Google Scholar] [CrossRef]
- Ayodeji, A.; Mohamed, M.; Li, L.; Di Buono, A.; Pierce, I.; Ahmed, H. Cyber security in the nuclear industry: A closer look at digital control systems, networks and human factors. Prog. Nucl. Energy 2023, 161, 104738. [Google Scholar] [CrossRef]
- Institute for Security and Safety. Cyber Security at Nuclear Facilities: National Approaches. 2015. Available online: https://www.nti.org/wp-content/uploads/2015/06/Cyber_Security_in_Nuclear_FINAL_UZNMggd.pdf (accessed on 15 May 2025).
- Klevtsov, O.; Symonov, A.; Trubchaninov, S. Cyber Security Assessment of NPP I&C Systems. In Advances in Information Security, Privacy, and Ethics; Yastrebenetsky, M.A., Kharchenko, V.S., Eds.; IGI Global: Hershey, PA, USA, 2020; pp. 221–238. [Google Scholar] [CrossRef]
- Kure, H.; Islam, S. Cyber Threat Intelligence for Improving Cybersecurity and Risk Management in Critical Infrastructure. J. Univ. Comput. Sci. 2019, 25, 1478–1502. [Google Scholar] [CrossRef]
- International Atomic Energy Agency. Computer Security for Nuclear Security. 2021. Available online: https://www.iaea.org/publications/13629/computer-security-for-nuclear-security (accessed on 13 May 2025).
- Kollias, S.; Yu, M.; Wingate, J.; Durrant, A.; Leontidis, G.; Alexandridis, G.; Stafylopatis, A.; Mylonakis, A.; Vinai, P.; Demaziere, C. Machine learning for analysis of real nuclear plant data in the frequency domain. Ann. Nucl. Energy 2022, 177, 109293. [Google Scholar] [CrossRef]
- Han, S.M.; Lee, C.; Seong, P.H. Estimating the frequency of cyber threats to nuclear power plants based on operating experience analysis. Int. J. Crit. Infrastruct. Prot. 2022, 37, 100523. [Google Scholar] [CrossRef]
- Son, K.-S.; Song, J.-G.; Lee, J.-W. Development of the framework for quantitative cyber risk assessment in nuclear facilities. Nucl. Eng. Technol. 2023, 55, 2034–2046. [Google Scholar] [CrossRef]
- U.S. Nuclear Regulatory Commission. Cybersecurity Programs for Nuclear Power Reactors.; 2010. Available online: https://www.nrc.gov/docs/ML2225/ML22258A204.pdf (accessed on 13 May 2025).
- Kim, J.-H.; Choi, Y.-S.; Na, J.-C. Cybersecurity Vulnerability Scanner for Digital Nuclear Power Plant Instrumentation and Control Systems. In Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, Shenzhen China, 8–10 December 2018; ACM: New York, NY, USA, 2018; pp. 463–467. [Google Scholar] [CrossRef]
- Kure, H.I.; Islam, S.; Mouratidis, H. An integrated cyber security risk management framework and risk predication for the critical infrastructure protection. Neural Comput. Appl. 2022, 34, 15241–15271. [Google Scholar] [CrossRef]
- Kaur, R.; Gabrijelčič, D.; Klobučar, T. Artificial intelligence for cybersecurity: Literature review and future research directions. Inf. Fusion 2023, 97, 101804. [Google Scholar] [CrossRef]
- Sajedul, T.; Syed, A.; Kumar, B.P. Developing an AI-Powered Zero-Trust Cybersecurity Framework for Malware Prevention in Nuclear Power Plants. 2023. Available online: https://www.osti.gov/biblio/2367312 (accessed on 30 June 2025).
- Almoqbil, A.H.N. Anomaly detection for early ransomware and spyware warning in nuclear power plant systems based on FusionGuard. Int. J. Inf. Secur. 2024, 23, 2377–2394. [Google Scholar] [CrossRef]
- Rustam, F.; Ranaweera, P.; Jurcut, A.D. AI on the Defensive and Offensive: Securing Multi-Environment Networks from AI Agents. In Proceedings of the ICC 2024—IEEE International Conference on Communications, Denver, CO, USA, 9–13 June 2024; pp. 4287–4292. [Google Scholar] [CrossRef]
- Petinrin, O.O.; Saeed, F.; Li, X.; Ghabban, F.; Wong, K.-C. Malicious Traffic Detection in IoT and Local Networks Using Stacked Ensemble Classifier. Comput. Mater. Contin. 2022, 71, 489–515. [Google Scholar] [CrossRef]
- Chowdhury, N. CS Measures for Nuclear Power Plant Protection: A Systematic Literature Review. Signals 2021, 2, 803–819. [Google Scholar] [CrossRef]
- Jung, D.; Shin, J.; Lee, C.; Kwon, K.; Seo, J.T. Cyber Security Controls in Nuclear Power Plant by Technical Assessment Methodology. IEEE Access 2023, 11, 15229–15241. [Google Scholar] [CrossRef]
- Alanen, J.; Linnosmaa, J.; Malm, T.; Papakonstantinou, N.; Ahonen, T.; Heikkilä, E.; Tiusanen, R. Hybrid ontology for safety, security, and dependability risk assessments and Security Threat Analysis (STA) method for industrial control systems. Reliab. Eng. Syst. Saf. 2022, 220, 108270. [Google Scholar] [CrossRef]
- Bryman, A.; Bell, E. Business Research Methods, 3rd ed.; Oxford University Press: Cambridge, UK; New York, NY, USA, 2011. [Google Scholar]
- Corallo, A.; Lazoi, M.; Lezzi, M.; Luperto, A. Cybersecurity awareness in the context of the Industrial Internet of Things: A systematic literature review. Comput. Ind. 2022, 137, 103614. [Google Scholar] [CrossRef]
- Page, M.J.; McKenzie, J.E.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Mulrow, C.D.; Shamseer, L.; Tetzlaff, J.M.; Akl, E.A.; Brennan, S.E.; et al. The PRISMA 2020 statement: An updated guideline for reporting systematic reviews. BMJ 2021, 372, n71. [Google Scholar] [CrossRef] [PubMed]
- Pranckutė, R. Web of Science (WoS) and Scopus: The Titans of Bibliographic Information in Today’s Academic World. Publications 2021, 9, 12. [Google Scholar] [CrossRef]
- Lezzi, M.; Lazoi, M.; Corallo, A. Cybersecurity for Industry 4.0 in the current literature: A reference framework. Comput. Ind. 2018, 103, 97–110. [Google Scholar] [CrossRef]
- IBM. AI Versus Machine Learning Versus Deep Learning Versus Neural Networks: What’s the Difference? 2023. Available online: https://www.ibm.com/think/topics/ai-vs-machine-learning-vs-deep-learning-vs-neural-networks (accessed on 3 June 2025).
- Pfleeger, C.P.; Pfleeger, S.L.; Margulies, J. Security in Computing, 5th ed.; Prentice Hall: Upper Saddle River, NJ, USA; Munich, Germany, 2015. [Google Scholar]
- NIST. Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations. 2022. Available online: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-161r1.pdf (accessed on 20 June 2025).
- Jharko, E.; Promyslov, V.; Iskhakov, A. Extending Functionality of Early Fault Diagnostic System for Online Security Assessment of Nuclear Power Plant. In Proceedings of the 2019 International Russian Automation Conference (RusAutoCon), Sochi, Russia, 8–14 September 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Lee, S.; Huh, J.-H. An effective security measures for nuclear power plant using big data analysis approach. J. Supercomput. 2019, 75, 4267–4294. [Google Scholar] [CrossRef]
- Park, J.W.; Lee, S.J. Probabilistic safety assessment-based importance analysis of cyber-attacks on nuclear power plants. Nucl. Eng. Technol. 2019, 51, 138–145. [Google Scholar] [CrossRef]
- Si, W.; Li, J.; Qu, R.; Huang, X. Anomaly Detection for Network Traffic of I&C Systems Based on Neural Network. In Volume 3: Student Paper Competition; Thermal-Hydraulics; Verification and Validation; American Society of Mechanical Engineers: New York, NY, USA, 2020. [Google Scholar] [CrossRef]
- Si, W.; Li, J.; Huang, X. One-class Anomaly Detection for Instrumentation and Control Systems based on Replicator Neural Networks. In Proceedings of the 11th Nuclear Plant Instrumentation, Control, and Human-Machine Interface Technologies, Orlando, FL, USA, 9–14 February 2019; pp. 1361–1369. [Google Scholar]
- Chae, Y.H.; Lee, C.; Choi, M.K.; Seong, P.H. Evaluating attractiveness of cyberattack path using resistance concept and page-rank algorithm. Ann. Nucl. Energy 2022, 166, 108748. [Google Scholar] [CrossRef]
- Ayodeji, A.; Di Buono, A.; Pierce, I.; Ahmed, H. Wavy-attention network for real-time cyber-attack detection in a small modular pressurized water reactor digital control system. Nucl. Eng. Des. 2024, 424, 113277. [Google Scholar] [CrossRef]
- Jharko, E.; Meshcheryakov, R.; Promyslov, V. Aspects of Nuclear Power Plant Digital Decommissioning. In Proceedings of the 2021 International Siberian Conference on Control and Communications (SIBCON), Kazan, Russia, 13–15 May 2021; pp. 1–6. [Google Scholar] [CrossRef]
- Yoo, S.; Mohler, G.; Zhang, F. Self-Healing Control of Nuclear Power Plants Under False Data Injection Attacks. Nucl. Sci. Eng. 2024, 199, 162–175. [Google Scholar] [CrossRef]
- Chaudhary, A.; Han, J.; Kim, S.; Kim, A.; Choi, S. Anomaly Detection and Analysis in Nuclear Power Plants. Electronics 2024, 13, 4428. [Google Scholar] [CrossRef]
- Jendoubi, C.; Asad, A. A Survey of Artificial Intelligence Applications in Nuclear Power Plants. IoT 2024, 5, 666–691. [Google Scholar] [CrossRef]
- Salehpour, A.; Al-Anbagi, I. Digital Substations: Cyberattack detection system for small modular reactor-based power plants. IEEE Electrific. Mag. 2024, 12, 57–67. [Google Scholar] [CrossRef]
- Ayodeji, A.; Liu, Y.; Chao, N.; Yang, L. A new perspective towards the development of robust data-driven intrusion detection for industrial control systems. Nucl. Eng. Technol. 2020, 52, 2687–2698. [Google Scholar] [CrossRef]
- Hsieh, H.-Y.; Tsvetkov, P. Advancements and challenges of machine learning and deep learning in autonomous control of nuclear reactors. Ann. Nucl. Energy 2025, 223, 111643. [Google Scholar] [CrossRef]
- Yockey, P.; Erickson, A.; Spirito, C. Cyber threat assessment of machine learning driven autonomous control systems of nuclear power plants. Prog. Nucl. Energy 2023, 166, 104960. [Google Scholar] [CrossRef]
- Lou, X.; Guo, Y.; Gao, Y.; Waedt, K.; Parekh, M. An idea of using Digital Twin to perform the functional safety and cybersecurity analysis. In Proceedings of the Standardization of Industry 4.0 Automation and Control Systems, Kassel, Germany, 23–26 September 2019. [Google Scholar] [CrossRef]
- Lou, X.; Waedt, K.; Gao, Y.; Zid, I.B.; Watson, V. Combining Artificial Intelligence planning advantages to assist preliminary formal analysis on Industrial Control System cybersecurity vulnerabilities. In Proceedings of the 2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Iasi, Romania, 28–30 June 2018; pp. 1–8. [Google Scholar] [CrossRef]
- Thiyagarajan, K.; Hammad, I. Anomaly Detection in Air-Gapped Industrial Control Systems of Nuclear Power Plants. In Proceedings of the 2024 Cyber Awareness and Research Symposium (CARS), Grand Forks, ND, USA, 28–29 October 2024; pp. 1–6. [Google Scholar] [CrossRef]
- Maccarone, L.T.; Cole, D.G. Bayesian games for the cybersecurity of nuclear power plants. Int. J. Crit. Infrastruct. Prot. 2022, 37, 100493. [Google Scholar] [CrossRef]
- Lee, S.; Huh, J.-H.; Kim, Y. Python TensorFlow Big Data Analysis for the Security of Korean Nuclear Power Plants. Electronics 2020, 9, 1467. [Google Scholar] [CrossRef]
- International Atomic Energy Agency. Computer Security at Nuclear Facilities. 2011. Available online: https://www.iaea.org/publications/8691/computer-security-at-nuclear-facilities (accessed on 20 May 2025).
- Defense Science Board. Resilient Military Systems and the Advanced Cyber Threat. 2013. Available online: https://apps.dtic.mil/sti/pdfs/ADA569975.pdf (accessed on 25 May 2025).
- Intel Corporation. Threat Agent Library Helps Identify Information Security Risks. 2007. Available online: https://www.researchgate.net/profile/Timothy-Casey/publication/324091298_Threat_Agent_Library_Helps_Identify_Information_Security_Risks/links/5abd353445851584fa6fb597/Threat-Agent-Library-Helps-Identify-Information-Security-Risks.pdf (accessed on 22 May 2025).
- Corallo, A.; Lazoi, M.; Lezzi, M. Cybersecurity in the context of industry 4.0: A structured classification of critical assets and business impacts. Comput. Ind. 2020, 114, 103165. [Google Scholar] [CrossRef]
- Sundaram, A.; Abdel-Khalik, H. Validation of Covert Cognizance Active Defenses. Nucl. Sci. Eng. 2021, 195, 977–989. [Google Scholar] [CrossRef]
- Gupta, M.; Akiri, C.; Aryal, K.; Parker, E.; Praharaj, L. From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy. IEEE Access 2023, 11, 80218–80245. [Google Scholar] [CrossRef]
- Homaei, M.; Mogollón-Gutiérrez, Ó.; Sancho, J.C.; Ávila, M.; Caro, A. A review of digital twins and their application in cybersecurity based on artificial intelligence. Artif. Intell. Rev. 2024, 57, 201. [Google Scholar] [CrossRef]
- Thirupathi, L.; Akshaya, B.; Reddy, P.C.; Harsha, S.S.; Reddy, E.S. Integration of AI and Quantum Computing in Cyber Security. In Advances in Mechatronics and Mechanical Engineering; Mishra, B.K., Ed.; IGI Global: Hershey, PA, USA, 2024; pp. 29–56. [Google Scholar] [CrossRef]
- Ullah, Z.; Waheed, A.; Mohmand, M.I.; Basar, S.; Zareei, M.; Granda, F. AICyber-Chain: Combining AI and Blockchain for Improved Cybersecurity. IEEE Access 2024, 12, 142194–142214. [Google Scholar] [CrossRef]
- Corallo, A.; Lazoi, M.; Lezzi, M.; Pontrandolfo, P. Cybersecurity Challenges for Manufacturing Systems 4.0: Assessment of the Business Impact Level. IEEE Trans. Eng. Manag. 2022, 70, 3745–3765. [Google Scholar] [CrossRef]
- Joint Task Force Transformation Initiative. Guide for Conducting Risk Assessments; NIST SP 800-30r1; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2012. [Google Scholar] [CrossRef]
1. Review Planning |
|
| |
| |
| |
2. Search Execution and Document Selection |
|
3. Document Analysis and Results Reporting |
|
| |
| |
|
AoA | RQ | AoA Topic | AoA Focus |
---|---|---|---|
AoA1 | RQ1 | Critical assets | Critical assets to be preserved from cyber-attacks in the context of NPPs through AI support |
AoA2 | RQ2 | Security vulnerabilities and cyber threats | Security vulnerabilities and cyber threats NPPs that can be managed through AI technology |
AoA3 | RQ3 | Cyber risks and business impacts | Cyber risks and business impacts of cyber-attacks on NPPs that can be assessed through AI |
AoA4 | RQ4 | AI-based security countermeasures | AI-based security countermeasures to mitigate cyber risks in the context of NPPs |
Critical Assets | Role that Can be Compromised by Cyber-Attacks | References |
---|---|---|
Digital I&C systems |
| [12,30,31,32,33,34,35,36,37,38,39,40,41] |
ACS and other control devices such as PLCs |
| [42,43,44] |
Sensors and actuators |
| [42] |
Control consoles, workstations, servers, network equipment and human–machine interface systems |
| [42] |
Digital control systems of small modular reactors |
| [36,41] |
Communication networks and protocols |
| [16,31,40,42,45] |
Refueling machines |
| [45,46] |
NPP safety shutdown systems |
| [47] |
Key Points | References | |
---|---|---|
| [43] | |
| [40] | |
Security vulnerabilities |
| [48] |
| [30] | |
| [49] | |
| [36] | |
| [12] | |
Cyber threats |
| [48] |
| [16,31,36,38,40] | |
| [43] | |
| [32] | |
| [48] |
Cyber Risks | Related Business Impacts (Tangible: T/Intangible: I) | References |
---|---|---|
Sabotage of NNP operations or performance of their I&C systems |
| [12,32,34,35,36,38,39,41,44,48,49] |
Theft or uncontrolled release of nuclear materials |
| [32,36,44,48,49] |
Reactor meltdowns |
| [12,36,41,44,49] |
Compromise of human–machine interface systems |
| [32,36] |
Theft of sensitive data |
| [31,48] |
Name | Objectives | Main Features | References |
---|---|---|---|
EDSs |
|
| [30] |
FusionGuard |
|
| [16] |
Autoencoder |
|
| [33] |
Self-healing strategy |
|
| [38] |
WAN |
|
| [36] |
RNN |
|
| [34] |
Bi-LSTM model |
|
| [39] |
C2 |
|
| [54] |
Cyber threat assessment model using machine learning-based DT technologies |
|
| [44] |
NPP control network traffic analysis system |
|
| [49] |
Automated vulnerability scanner |
|
| [12] |
Formal functional specification with AI-based planning technique |
|
| [46] |
Bayesian game |
|
| [48] |
Hybrid deep learning approach |
|
| [47] |
Cyber-attack detection system |
|
| [41] |
Areas of Analysis | |||
---|---|---|---|
ID | Topic | Focus | Evidence from the Literature |
AoA1 | Critical assets | Critical assets to be preserved from cyber-attacks in the context of NPPs through AI support | List of critical assets:
|
AoA2 | Security vulnerabilities and cyber threats | Security vulnerabilities and cyber threats NPPs that can be managed through AI technology | Key points:
|
AoA3 | Cyber risks and business impacts | Cyber risks and business impacts of cyber-attacks on NPPs that can be assessed through AI | Cyber risks (CRs) and related business Impacts (BIs):
BI2: Damage to equipment BI3: Injury or death of personnel BI4: Damage to public opinion
BI2: Injury or death of personnel BI3: Damage to public opinion Damage to equipment
BI2: Environmental damage BI3: Damage to equipment BI4: Injury or death of personnel BI5: Damage to public opinion
BI2: Environmental damage BI3: Injury or death of personnel BI4: Damage to public opinion
BI2: Damage to public opinion |
AoA4 | AI-based security countermeasures | AI-based security countermeasures to mitigate cyber risks in the context of NPPs | List of AI-based countermeasures:
|
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lezzi, M.; Martino, L.; Damiani, E.; Yeun, C.Y. A Systematic Literature Review on AI-Based Cybersecurity in Nuclear Power Plants. J. Cybersecur. Priv. 2025, 5, 79. https://doi.org/10.3390/jcp5040079
Lezzi M, Martino L, Damiani E, Yeun CY. A Systematic Literature Review on AI-Based Cybersecurity in Nuclear Power Plants. Journal of Cybersecurity and Privacy. 2025; 5(4):79. https://doi.org/10.3390/jcp5040079
Chicago/Turabian StyleLezzi, Marianna, Luigi Martino, Ernesto Damiani, and Chan Yeob Yeun. 2025. "A Systematic Literature Review on AI-Based Cybersecurity in Nuclear Power Plants" Journal of Cybersecurity and Privacy 5, no. 4: 79. https://doi.org/10.3390/jcp5040079
APA StyleLezzi, M., Martino, L., Damiani, E., & Yeun, C. Y. (2025). A Systematic Literature Review on AI-Based Cybersecurity in Nuclear Power Plants. Journal of Cybersecurity and Privacy, 5(4), 79. https://doi.org/10.3390/jcp5040079