Procedure and method of physical protection vulnerability assessment using simulation

Year
2019
Author(s)
Yeonwook Kang - Korea Institute of Nuclear Nonproliferation and Control (KINAC)
Inseon Back - Korea Institute of Nuclear Nonproliferation and Control (KINAC)
Abstract
Physical protection vulnerability assessment (VA) is an essential way to evaluate the entire physical protection system of a facility as a performance basis. In general, VA can be assessed by expert meeting, table top exercise, force on force exercise and simulation. In this paper, we propose the procedure and method for VA using simulation (VAS). VAS can be divided into a modeling and a simulation. Modeling can be divided into visual modeling such as terrain, road, protection equipment, and data modeling such as vehicle speed on the terrain, roughness of the road, delay time of the fence, detection rate of sensor. Visual modeling is generally used as a measure of how similar an actual facility is to modeling. Visual modeling becomes the basis of data modeling in the future, it should not be simplified by arbitrary judgment of the modeling person. Data modeling can be more complicated than visual modeling. Protection equipment can be divided into delay and detection. However, in data modeling, the value of the delay or detection value of a specific device is not absolute, but it can be regarded as a problem of a correlation that changes depending on who the targets is and how the target penetrates through method. When the modeling of the two aspects is completed, a verification process of the modeling is required. When a simulation is finished, it is difficult for the user to know the intended result or user mistake. Therefore, it is very important to construct a complete model with defect-free through various verification techniques. The first step in the simulation is to establish the key assets and protection objectives. It is also necessary to define the threats to the facility. Threats can be divided into intruder composition, possessed weapons, numbers, groups, strategies, and vehicle. It is possible to assess the precise vulnerability of the facility when the intrusion was carried out in the most effective way to the facility. In this paper, we describe the procedures and methods of practical VAS based on the experiences of modeling and simulation of nuclear power plants and nuclear fuel cycle facility.