1. Introduction
Nuclear security involves the prevention and detection of and response to theft, sabotage, unauthorized access, illegal transfer and other malicious acts involving nuclear materials, other radioactive substances and their associated facilities [
1]. According to the International Atomic Energy Agency (IAEA) Incident and Trafficking Database (ITDB), there have been 2477 confirmed incidents, 424 counts of unauthorized possession, 664 counts of theft or loss, 1337 other unauthorized activities or event, as well as the unauthorized disposal, shipment, or discovery of uncontrolled radioactive sources [
2]. In particular, great attention has been paid to insider threats in nuclear facilities. As insiders have access to and authority in the facility, they have more opportunities to choose vulnerable targets and more time for malicious behavior than outsiders do [
3]. Most of the known incidents of nuclear material theft and sabotage at nuclear facilities were carried out by insiders or at least with the help of insiders. Bunn and Sagan (2014) claimed that insider threats should be the most serious challenges that nuclear security systems face [
4].
The well-known cases of insider incidents were the theft of highly enriched uranium (HEU) in Russia (1992) and sabotage on the Doel 4 nuclear power plant (NPP) in Belgium (2014). Unlike the other incidents in the 20th century, the sabotage of the Doel 4 NPP occurred despite having strict security and safeguard systems. Someone deliberately opened the emergency drain valve and drained 65,000 L of oil underground that brought the shutdown of the turbine for approximately five months, and this incident consequently resulted in severe economic damage. The sabotage was supposedly carried out by insiders who have not yet been identified [
5].
Many recent studies have tried to systematically define insider threats at nuclear facilities, thereby suggesting ways to prevent nuclear security incidents perpetrated by insiders. Studies have focused on the systematic evaluation of physical protection systems considering the characteristics of insiders [
6,
7], building a security culture among members [
8,
9], or by developing case studies or scenario analyses of insider threat incidents [
5,
10,
11]. Efforts have contributed to improving the security system of NPPs to be more resistant to various insider threat situations. However, these methods and regulations aim at limiting the insider’s attempts rather than preventing the threat. The prevention of an insider threat requires the detection of an insider. Such detection should include measuring and assessing potential insiders’ motivations.
In cybersecurity, effort has been made to identify and mitigate insider threats [
12]. The attempts of insider threat detection have focused on investigating behavior anomalies. Hunker and Probst (2011) tried to detect insider threats in cybersecurity by monitoring insiders’ behaviors when using network and organization resources [
13]. In NPPs, workers are periodically monitored through surveillance and interviewed by their coworkers and supervisors about their abnormal behavior. The workers should pass a psychological screening and drug and alcohol test to assess their fitness-for-duty. Their past records are also reviewed during a background check. Thus, the trustworthiness assessment process in NPPs is the key part of the effort to screen individuals’ potential threatening acts before and during employment.
On the other hand, the current trustworthiness assessment process needs to be improved, especially because the assessments are subjective, potentially biased, and infrequently administered [
14,
15]. Secondary investigation with insiders’ private information is not a robust approach to detect malintent for access [
16]. Often, the assessments failed to catch indicators of potential insider problems [
4]. To measure the motivations of potential insiders more reliably, the insights from previous studies should be carefully applied to the field of insider threat at NPPs.
In this regard, this study aims to examine subjects’ malicious intentions based on electroencephalography (EEG) data. We hypothesized that an EEG-based trustworthiness system, combined with self-reports, could provide objective and empirical evidence about one’s cognitive responses to committing harmful behavior. Additionally, we also examined the application of machine-learning-based algorithms to accurately distinguish the malicious intentions of subjects. To support the development of methodology to detect an insider, experimental scenarios were designed with the consideration of an NPP-related insider. Detection of an insider threat was made in comparison with detecting everyday conflict. Potential implementation issues of the proposed approach and an algorithm-driven analysis of the brain activity data of insiders were also examined considering worker practices in NPPs.
3. Objectives and Task Design
The objective of this study was to detect insider threats based on identifying the malicious intention of a person using subjects’ brain responses in the context of nuclear facility operations. We hypothesized that brain waves show different patterns depending on the subject’s intention. The difference could be utilized to examine whether a person will become a potential insider threat.
To measure the differences in brain responses with respect to having different intentions, the subjects were assumed to be in a particular situation related to being an insider. According to planned behavior theory and the theory of reasoned action, a positive assessment of the proposed behavior increases the likelihood of taking an action [
36,
37]. Additionally, the clearer the intention is, the more likely the person is to take an action. Building on these findings, we provided the subjects with text paragraphs shown on a 24-inch monitor describing insider threat situations. Then, the subjects were asked whether they would agree or disagree with what was demanded in the situation. An affirmative answer, in the given situations, represents the intention to become an insider threat. As the subjects were aware of the fact that their affirmative answers do not result in committing an actual crime, they were encouraged to be candid in selecting their answers. Depending upon the type of answers chosen, the corresponding EEG signals of the subjects were observed and analyzed to identify the patterns between the intention and the responses of the signals. Accordingly, the first hypothesis formulated in this research is as follows.
Hypothesis 1. EEG signals are distinguishable depending upon whether a subject has or does not have an intention to become an insider threat.
Suh and Yim (2018) demonstrated that a decrease in the alpha wave accompanied by an increase in the beta wave of a subject is an indication of an insider threat [
15]. This result implied that a subject felt less relaxed or more alert while he or she was contemplating becoming an insider threat. However, it has not yet been identified whether such observations can be associated with the effect of everyday conflict, as facing insider threat situations is expected to increase the level of stress. It will also be of interest to examine whether the biosignals can be used to distinguish the stresses related to becoming an insider threat from the stresses of everyday conflict. Accordingly, the second hypothesis examined is as follows.
Hypothesis 2. EEG signals are distinguishable between a subject responding to insider threat situations and experiencing everyday conflict situations.
To examine Hypothesis 1, ten different insider threat scenarios were developed. Each scenario was based on a real case referring to specific security-related incidents in NPPs. Real case incidents were used to raise the level of psychological involvement of the subjects with insider situations in an NPP during the experiments. Additionally, different levels or categories of insider threats, proposed by the IAEA (2008), were combined in the scenarios to cover diverse aspects of insider threats while minimizing redundancy.
As summarized in
Table 1, ten different mixed insider scenarios were used in the study depending on the type of threat (theft or sabotage), insider action (active (violent or nonviolent) or passive), opportunity (plant operator, maintenance crew, janitorial staff, security guard, or spent fuel truck driver), and motivation (monetary gain, disgruntlement, ideology, or to bend the rules).
The types of each insider-related category (threat, action, opportunity, motivation) were randomly matched while keeping each scenario unique. In addition, technical terms related to the NPP were intentionally excluded considering that the subjects may not be familiar with NPP-specific terms. For instance, scenario #9, profiled as “sabotage – active (nonviolent) – security guard – money”, is composed as follows:
“You are working as a security officer at a nuclear power plant in South Africa. Your role is to take care of the security of the power plant. You have worked as a nonregular worker for about a year and a half and then retired. Since then, you worked as an activist for anti-nuclear groups.
However, to earn money, you have been recently hired again as a security guard for a nuclear power plant. Additionally, you visit your girlfriend in Zimbabwe every month. One day, your girlfriend introduces to you terrorist group members in Zimbabwe. They propose a grand action against the nuclear power plant you work for. They ask you to install a timed bomb in the reactor and control room to destroy the power plant while minimizing human casualties. After installing the bomb, you can escape. You are a security guard, and you are not subjected to a body search. There is enough time to run away after setting up the bomb.
They offered you 5 billion won for successfully carrying out the mission. If you are arrested, you must spend five years in jail.”
The subjects read each scenario for 30 s. Then, a question was asked: “Would you like to perform the proposed action?” the subjects replied “yes” or “no” by pressing one of two keyboards within 5 s. The data from the first 30 s period were taken for the EEG analysis to examine the intention before each subject reached their decision. The EEG signals from the 5 s decision period were not used because the signals may contain artifacts related to motor imagery for the keyboard input.
To test Hypothesis 2, another ten scenarios mimicking everyday conflict situations were developed. These scenarios were from the Korean version of the daily stress inventory (K-DSI), which describes everyday conflict situations [
38]. Among the everyday conflict situations listed, those with relevance to NPP workers were selected. The scenarios included work stress, stress from work-related relationships, stress from family problems, stress from health issues, and stress from financial concerns.
Both insider threat scenarios and everyday conflict scenarios comprised three parts, i.e., introduction, main contents, and compensation for success with warning. The scenarios consisted of 82.15 (SD = 12.21) Korean words on average, and the subjects were equally exposed to each scenario for 30 s. EEG signals were recorded while the subjects were reading the scenarios.
4. Methods
4.1. Subjects
Twenty-five healthy young adults (19 men and 6 women; mean ± SD age of 25.70 ± 3.45 years) participated in the experiment. All the subjects were university students with engineering backgrounds and were voluntarily recruited. None of them had a history of psychiatric/neurological disorders or alcohol/drug dependence. The subjects were instructed to maintain a regular sleep–wake schedule with more than 6 h of sleep and not to drink caffeine or alcohol for at least 8 h prior to the experiment.
When the subjects arrived at the laboratory, they were given explanations about the experimental procedures according to the guidelines. The experiment was approved by the ethics board of Korea Advanced Institute of Science and Technology (KAIST) Institutional Review Board.
4.2. Experimental Protocol
The experiment room was kept dark and silent to support the subject’s concentration and to minimize the background light and sound noise. The stimuli were presented using Neurobehavioral Systems Presentation software on a 24-inch liquid crystal display monitor. The subjects were seated 50 cm away from the monitor and were instructed to wear a cap with the electrodes for EEG measurement. Additionally, the experimenter asked each subject to avoid blinking, if possible, when reading the scenarios. In addition, the experimenter explained that their answers were going to be validated through a special polygraph test. Regardless of their answers, all the subjects were given payment of the same amount at the end of the experiment. The subjects were exposed to all 20 scenarios in random order, including ten insider threat scenarios and ten everyday conflict scenarios.
4.3. EEG Recording and Preprocessing
Each subject’s EEG signals were recorded using a Neuron-spectrum 4/P (Neurosoft Ltd., Russia). Each subject was fitted with an Ag/AgCl electrode cap arranged with an extended international 10–20 system. The EEG data were recorded from 21 channels (O1, O2, Oz, P3, P4, Pz, C3, C4, Cz, T3, T4, T5, T6, F3, F4, F7, F8, Fz, FP1, FP2, and FPz) at a sampling rate of 500 Hz (see
Figure 1). Reference electrodes were located at both the earlobes and ground (between Fz and FPz). During the experiment, the electrode impedances of all the channels were kept below 5 kΩ. To calibrate the signals, the EEG signals were measured for 2 min with the eyes closed and 2 min with the eyes open.
To remove artifacts in the collected data, data preprocessing was performed based on Makoto’s preprocessing pipeline using EEGLAB [
39]. The data were downsampled to 250 Hz, and the frequency below 1 Hz was filtered by using a high-pass filter. Then, the line noise was removed by the CleanLine plugin [
40]. Bad channels were rejected using the Clean Rawdata plugin, and continuous data were corrected using artifact subspace reconstruction (ASR). All the removed channels were interpolated, and the data were re-referenced to the average potential of the 21 channels. The adaptive mixture independent component analysis (AMICA) program and postAmicaUtility toolbox were used for independent component analysis (ICA) [
41]. The artifacts from moving the body, rolling eyeballs, and blinking were excluded from the analysis based on the visual inspections of each component.
The preprocessed data were divided into 2 s epochs, with a 1 s moving average for each question. Epochs smaller than 1 s were removed from further analysis to avoid duplication of the data. Each question contained up to 29 epochs, which yielded a total of 14,128 2 s epochs per channel for later analysis.
To support machine-learning-based algorithm development, a set of features that describe the EEG responses of the subjects were selected and used. We tried to explore the best use of the available EEG features in various domains. They can be categorized into four different types: time domain features, frequency domain features, time–frequency domain features, and nonlinear dynamic system features [
42]. The details of these features are presented in
Table 2. The features were calculated for each channel. All the features were normalized to a zero mean and unit variance across the subjects and trials.
Nine kinds of features were extracted from the time domain. Mean is the arithmetic mean of the time series. Peak-to-peak value is the difference between the maximum value and the minimum value of the time series. Skewness is an estimated value of the asymmetry of the time series. Kurtosis is an estimated value of the tailedness of the time series. Three Hjorth parameters that reflect characteristics of activity, mobility, and complexity were also extracted based on previous work [
43,
44].
Time–frequency domain features were calculated based on discrete wavelet transform (DWT) decomposition. DWT decomposition includes successive high- and low-pass filtering of a time series with a downsampling rate of 2. It is a suitable tool for analyzing nonstationary signals such as EEG signals because the wavelet transform has the advantages of time–frequency localization, multirate filtering, and scale-space analysis [
45]. In this study, approximation coefficients (Ai) and detailed coefficients (Di) were applied using the Daubechies 4 wavelet [
46]. Six coefficients were used as subbands for calculating features: D1 (62.5–125 Hz), D2 (31.2–62.4 Hz), D3 (15.6–31.2 Hz), D4 (8.8–15.6 Hz), D5 (4.4–8.8 Hz), and A5 (1–4.4 Hz). Moreover, four kinds of features were extracted for each subband. Relative energy is the wavelet energy (squared sum of the coefficients) over the total energy. Shannon entropy is the entropy in the wavelet domain, which indicates signal variations at each frequency scale. Maximum energy is the maximum value among the squared values of the coefficients. Variance is the variance in the squared sum of the coefficients.
Frequency domain features were calculated using a discrete Fourier transform (DFT). The DFT algorithm transforms the spatial domain of the analog EEG wave to the time domain, yielding spectral displays, making it easier to view the average frequency curve of the EEG record. The transformed data were categorized into seven frequency bands: delta (1–4 Hz), theta (4–8 Hz), alpha (8–13 Hz), beta (13–25 Hz), high beta (25–30 Hz), gamma (30–40 Hz), and high gamma (40–50 Hz). In addition, four kinds of features were extracted for each frequency band. Absolute power is the sum of the squared values. Relative power is the absolute power of each frequency band divided by the sum of the absolute power over all the frequency bands. Maximum power is the maximum power value. Peak frequency is the frequency that has the maximum power value.
Four features of the nonlinear dynamical system were extracted. Nonlinear dynamics and chaos theory have been applied in neurophysiology to analyze EEG signals. Nonlinear approaches have been used to discover findings that cannot be identified by conventional linear approaches [
47]. Mathematical algorithms such as the approximate entropy and sample entropy were created to measure the repeatability or predictability within a time series. The correlation dimension determines the number of dimensions (independent variables) that can describe the dynamics of the system and reflects the complexity of the process and the distribution of system states in the phase space [
44].
Consequently, when a subject was reading one scenario presented on the monitor, 65 features were quantified from each of the 21 channels.
5. Results
Among the 500 questions presented to the 25 participants, 10 questions were excluded from further analysis because the response times exceeded the limit. Therefore, 490 questions were used for further analysis. Among these questions, the answer “yes” was 246. In detail, 96 answers from the insider threat scenarios and 150 answers from the everyday conflict scenarios were “yes”. The lower number of “yes” answers for the insider threat scenarios may be due to the criminal nature of the activities involved.
Table 3 summarizes the frequencies of answers from the experiment.
The collected data became the basis for the development of the EEG feature-based subject-wise classification model. To validate and test the accuracy of the classification model, we used a 1-out-of-n question cross-validation strategy. We avoided dividing the epochs for the same question into training and testing data to prevent overfitting. From the use of the 10 insider threat-related questions, the epochs from nine questions were used as the training data, and the epochs from one question were used as the testing data for the purpose of predicting answers for the insider threat scenarios. In addition, among all 20 questions, 19 questions were used as the training data, and one question was used as the testing data to classify whether the subject read the insider threat scenario or the everyday conflict scenario. The validation step was repeated until all questions were used once, as the testing data.
We used the recursive feature elimination technique to extract the most informative EEG features from the available candidate features. Variable Selection Using Random Forests (varSelRF) and the Boruta algorithms were used with their default parameters [
48]. These algorithms were applied to the training data set only and the classification was limited to automatically selected features. The varSelRF algorithm uses both backwards variable elimination and highly correlated variable selection. The Boruta algorithm is a wrapper built around the random forest classification algorithm and tries to capture important features in the dataset with respect to an outcome variable. Classification was performed using various supervised machine learning algorithms to compare the effectiveness of the algorithms for distinguishing malicious intentions. For this purpose, kNN, SVM with radial kernel, NB and multilayer perceptron (MLP) algorithms were selected [
49]. The parameters of the classification algorithms were tuned with the training data for each subject and for each validation step.
The classification accuracy was calculated based on whether the model correctly predicted an answer for the subject. Thus, multiple epochs in a single question should be merged into a single value because the data have a maximum of 29 epochs per question. We assumed that the predicted value of the question was “yes” if the number of epochs classified as “yes” was greater than that of “no” in a single question. Based on this assumption, we calculated the average classification accuracy for each of the feature selection and classification algorithms.
To test Hypothesis 1, we classified the answers from the insider threat scenario data and calculated the average classification accuracy.
Figure 2 shows receiver operating characteristic (ROC) for malicious intention detection. The ROC curves present classification accuracies of 65.8–71.7%.
Table 4 summarizes the average classification accuracy for malicious intention detection from the feature selection and classification algorithms. The top ten important features were hjorth_mobility, hjorth_activity, sample entropy, hjorth_complexity, max (D2 wavelet), approximate entropy, permutation entropy, max (high beta), relative power of beta, and the median (see
Table 2). The combination of the NB and Boruta algorithms outperformed the other classifiers with over 78% average classification accuracy, while the others achieved an accuracy of 71–74%. Two automatic feature selection algorithms showed similar overall performance, although the performance varied depending on the classifier. This result indicates that when there are baseline data for any of the nine trials, the implicit intention for a new trial can be distinguished at approximately 75% accuracy.
This work is similar to that of Dong et al. (2016) in predicting agreeing/disagreeing intentions of the subjects for a given scenario without repeatedly presenting the same scenario [
50]. However, compared to the questions used in their study, more complex decision-making processes were involved in answering the questions in our study. We assumed that different kinds of complex decision-making processes could be distinguished by the classification algorithms using EEG signals. This method also requires the classification accuracy to be higher than that achieved in the previous study.
The average classification accuracy of 73–77% achieved in this study shows that the classifiers could distinguish the presence of malicious intent while considering the insider threat situation involved. In other words, the EEG signals showed different characteristics depending upon whether the subjects decided to act on the insider threat scenarios or not. Therefore, null Hypothesis 1 is rejected.
To test Hypothesis 2, we classified the types of situations and calculated the average classification accuracy.
Figure 3 shows ROC for scenario-type detection. The ROC curves present classification accuracies of 79.4–86.0%.
Table 5 summarizes the average classification accuracy for scenario-type detection from our feature selection and classification algorithms. The top ten important features were hjorth_activity, hjorth_mobility, sample entropy, approximate entropy, hjorth_complexity, permutation entropy, max (D3 wavelet), and absolute power of high gamma, alpha, and high beta (see
Table 2). The SVM algorithm with a radial kernel and the MLP algorithm outperformed the other classifiers with an approximately 93% average classification accuracy. The varSelRF and Boruta algorithms achieved similar performances.
This classification of different types of scenarios is similar to what Hashem et al. (2017) did because they distinguished the types of scenario that the subjects faced [
51]. They tried to classify different kinds of tasks, while we tried to classify two kinds of scenarios with similar structures and lengths. Additionally, the amount of data and validation strategy were different. The previous study used 10 min of data per task and separated the first 7 min of the experiment into training data and the next 3 min into testing data. In this study, we used 30 s data and separated the questions as the training and testing data. Thus, we assume that the algorithms distinguish the different kinds of complex cognitive processes with EEG signals if the classification accuracy is higher than 89–91% from the study of Hashem et al. (2017).
We achieved a classification average accuracy of 90–93%, which shows that the classifiers distinguish the type of scenarios while reading the proposed insider threat and everyday conflict situations. In other words, the EEG signals responding to insider threat situations are distinctive when compared to everyday conflict situations. Therefore, null Hypothesis 2 is rejected.
We selected several subsets of channels and calculated the average classification accuracy to test the possibility of NPP application. In particular, Brodmann area 10 or the frontopolar prefrontal cortex is known to be involved in human executive function. These areas are known to be related to decision-making, empathic judgment, and self-descriptive trait judgment [
52]. In a previous fMRI study involving a similar task, the superior frontal gyrus and anterior cingulate cortex were the most activated regions [
50]. When considering workers’ safety, for helmets integrated with EEG electrodes, the number of attachments should be minimized while maintaining the classification accuracy as much as possible. For this purpose, we propose that the frontal lobe is the proper location for electrode attachment. We performed additional computations using the FP1, FPz, and FP2 channels corresponding to Brodmann area 10 (superior frontal cortex) and the F3, Fz, and F4 channels corresponding to the middle frontal gyrus [
53]. The results are shown in
Table 6.
With only three channels of data, a classification accuracy of 66–72% was achieved for malicious intention detection. In the detection of malicious intention, channels corresponding to the middle frontal gyrus achieved an approximately 1% higher accuracy compared to the channels corresponding to Brodmann area 10. This accuracy is approximately 5% lower than the accuracy using all 21 channels. When classifying the type of scenarios using three channels, an accuracy of 76–79% was achieved. This accuracy is approximately 13% lower than the results from the 21-channel data. Dong and Lee (2012) found that frontal lobes precede the conscious decision for how to answer. These findings help researchers to predict how people are going to answer in a real decision-making situation [
54]. Similar to their findings, our results showed that the frontal lobes can be used to detect malicious intentions with relatively little reduction in accuracy.
6. Discussion
The main goal of this study was to determine whether information from EEG signals enables the detection of malicious intention, which helps to mitigate insider threats at NPPs. As we developed a subject-wise model, the model of individual EEG signals predicts the outcome of a single-trial. Therefore, the model will update its estimation when a new trial occurs. It is possible to distinguish the subject’s implicit intention by approximately 30 s through 9 or 19 scenario-based situations. A higher accuracy is expected in practice because the amount of baseline data will be larger than that from the laboratory environment. EEG signals can be obtained during various tasks throughout the day. In practice, the proposed model can provide an early warning before the insider puts an idea or plan into action. In addition, it distinguishes the two types of situations (insider threats and everyday conflict), implying that false alarms can be controlled. Some workers may continue to signal signs of everyday conflict or irritation or behave suspiciously. In this study, we tried to provide objective evidence that EEG signal-based classification contributes to the prevention of workers’ malicious intention in advance. However, we address the limitations and challenges of the study as follows.
6.1. Task Design
The number and length of the scenarios were limited due to concern about the concentration of the participants. In addition, similar scenarios were presented repeatedly to maintain immersion and to avoid confusion. In a real facility, the baseline signal can be measured during day-to-day work and can then be compared to the signal while performing a particular task. Especially if a real helmet is manufactured using dry electrodes, the role-playing limitation of the insider threat scenario can be overcome in a real situation. Therefore, it is possible to overcome the limitation of sentence reading and create an environment more similar to that in the real world. In this case, augmented reality or virtual reality technologies can be used to interact with others in a virtual environment. In addition, robustness to countermeasures has not been verified. In this study, applying lie detectors helped subjects have very little motivation to lie.
6.2. Feature Engineering and Modeling
To detect implicit intention for insider threats with the highest possible accuracy using EEG signals, it is necessary to use all the available features. However, this method may result in overfitting due to a large number of features. In fact, we followed an automatic feature selection process and strictly differentiated the training and testing sets. Instead, the classifiers used in this study reported relatively similar classification accuracies. This finding provides evidence to overcome the overfitting problem. In future work, the model could be further optimized using different epoch lengths and additional features.
6.3. Application to Nuclear Facilities and Implications for Nuclear Security Culture
The ideal way to use biosignals to identify whether a person is involved in an insider threat is to catch an insider’s malicious intention and trigger an alarm before an action is taken. However, biosignal studies to date cannot provide a means to predict who will actually commit a crime. If the crime has already been committed to some extent, there is a possibility of measuring the difference in psychological and cognitive responses.
In case studies of insider threats, people around the insider had observed the indicators of malicious intentions or suspicious behavior without showing any proper responses. Generally, insider threats are secretly planned over long periods of time, from months to years. Therefore, even if it is difficult to identify an insider’s criminal intentions without any error, the methodology proposed in this study can be used as a supplementary tool to assess the trustworthiness of workers and to identify potential insider threats. It could help develop criteria for excluding the potential insider threat temporally from the workplace, which would enable the efficient use of limited security resources and contribute to reducing insider threat motivations.
Furthermore, previous studies suggested the use of EEG electrodes attached to the inside of the helmet when harvesting brain responses [
55]. This type of mobile application could accrue several benefits, such as real-time fitness-for-duty checks for workers. Studies indicating such applications include those for worker fatigue detection [
44], accident and alcohol detection for fitness-for-duty checks [
56], and smart avionics studies to reduce human error of pilots [
57]. As wearing a helmet in NPP sites is mandatory, EEG electrodes can be integrated into the safety helmet. The collected EEG data from the safety helmet can be processed and analyzed to monitor malintent and eventually to improve human performance. The results indicate the possibility of implementing a safety helmet idea in actual NPP sites. As proposed above, malicious intention was mainly dependent on the frontal lobe, the region where electrodes can be easily attached to the safety helmet. A higher classification accuracy is expected, as far as an advanced helmet design supports the necessary sensor attachment. For future work, it is necessary to test diverse subsets of features and various parts of the brain to optimize the suggested helmet design.
A preparation period is required to commit theft in or sabotage a nuclear facility. Thus, the biosignal does not need to be analyzed in real-time to detect an insider threat. EEG data could be measured while working and stored and analyzed after work. Routine inspections can be carried out on those authorized to enter a particular area. Individual baseline EEG data could be continuously collected. The model could be used as an alarm in a specific place with personal data anonymized and without indicating any specific person.
Due to the variable nature of EEG signals, false-positive signals may occur in the application of the proposed approach. Therefore, careful examination of the positive results from the classification model is necessary. While a person may develop a malicious intent under certain circumstances, that person does not necessarily become an insider threat. While the proposed approach may be used to identify a potential insider threat, more importantly, the approach can be used to strengthen the security system of a facility or to support the development of nuclear security culture. The model proposed in this study can be used as a means to weaken insider motivation while strengthening trust and reinforcing security culture among employees.
There may be moral or legal questions about the collection and evaluation of EEG data on an individual basis. The monitoring approach yields inevitable conflicts between the security interests of the organization and the privacy interests of individuals [
14]. National laws may restrict identity verification and trustworthiness assessments in a state [
3]. Even after the collection of biosignals is legally allowed, there may be an issue that all workers are suspected to be potential insiders. This assumption could irritate workers and have a negative effect on the security culture. Nonetheless, there have been studies using biosignals for fitness-for-duty assessments and human error prevention [
58]. If the purpose of collecting biosignals apparently helps workers work more safely and efficiently, various approaches to trustworthiness assessment will be positively considered.