Access the full text.
Sign up today, get DeepDyve free for 14 days.
G. Pallotta, M. Vespe, K. Bryan (2013)
Vessel Pattern Knowledge Discovery from AIS Data: A Framework for Anomaly Detection and Route PredictionEntropy, 15
establishing a Community vessel traffic monitoring and information system and repealing Council Directive 93/75/EE
F. Xiao, H. Ligteringen, C. Gulijk, B. Ale (2015)
Comparison study on AIS data of ship traffic behaviorOcean Engineering, 95
(2013)
Captain raises AIS privacy concerns,
D. Boneh, Ben Lynn, H. Shacham (2001)
Short Signatures from the Weil PairingJournal of Cryptology, 17
Fabio Mazzarella, Virginia Arguedas, M. Vespe (2015)
Knowledge-based vessel position prediction using historical AIS data2015 Sensor Data Fusion: Trends, Solutions, Applications (SDF)
D. Chaum (1985)
Security without identification: transaction systems to make big brother obsoleteCommun. ACM, 28
M. Vespe, M. Gibin, A. Alessandrini, F. Natale, Fabio Mazzarella, G. Osio (2016)
Mapping EU fishing activities using ship tracking dataJournal of Maps, 12
F. Natale, M. Gibin, A. Alessandrini, M. Vespe, A. Paulrud (2015)
Mapping Fishing Effort through AIS DataPLoS ONE, 10
J. Baek, Eman Hableel, Young-Ji Byon, D. Wong, Kitae Jang, H. Yeo (2017)
How to Protect ADS-B: Confidentiality Framework and Efficient Realization Based on Staged Identity-Based EncryptionIEEE Transactions on Intelligent Transportation Systems, 18
Weibin Zhang, F. Goerlandt, P. Kujala, Yinhai Wang (2016)
An Advanced Method For Detecting Possible Near Miss Ship Collisions From AIS DataOcean Engineering, 124
M. Fabio, Alessandrini Alfredo, Van Herman, A. Marlene, Argentieri Pietro, N. Domenico, Ziemba Wojciech (2013)
Data Fusion for Wide-Area Maritime Surveillance
Muhammad Bohio, A. Miri (2004)
Efficient identity-based security schemes for ad hoc network routing protocolsAd Hoc Networks, 2
N. Merchant, M. Witt, P. Blondel, B. Godley, George Smith (2012)
Assessing sound exposure from shipping in coastal waters using a single hydrophone and Automatic Identification System (AIS) data.Marine pollution bulletin, 64 7
Jinhai Chen, Feng Lu, Guojun Peng (2015)
A quantitative approach for delineating principal fairways of ship passages through a straitOcean Engineering, 103
Z. Ou, Jianjun Zhu (2008)
AIS Database Powered by GIS Technology for Maritime Safety and SecurityJournal of Navigation, 61
Networked secure W-AIS transponder for operational security
Panbo: the marine electronics hub
Z Ou, J Zhu (2008)
“AIS database powered by GIS technology for maritime safety”J Navig, 61
B. Ristic, B. Scala, M. Morelande, N. Gordon (2008)
Statistical analysis of motion patterns in AIS Data: Anomaly detection and motion prediction2008 11th International Conference on Information Fusion
(2009)
Directive 2009/17/EC of the European Parliament and of the Council of 23 April 2009 amending Directive 2002/59/EC establishing a Community vessel traffic monitoring and information system
Rikard Laxhammar, G. Falkman, E. Sviestins (2009)
Anomaly detection in sea traffic - A comparison of the Gaussian Mixture Model and the Kernel Density Estimator2009 12th International Conference on Information Fusion
A. Shamir (1984)
Identity-Based Cryptosystems and Signature Schemes
(2017)
AIS Issues
Marco Balduzzi, Kyle Wilhoit, A. Pasta (2014)
A Security Evaluation of AIS
X. Qu, Q. Meng, L. Suyi (2011)
Ship collision risk assessment for the Singapore Strait.Accident; analysis and prevention, 43 6
Hua-Yi Lin, Yueh-Min Huang, Tzone-I Wang (2005)
Resilient Cluster-Organizing Key Management and Secure Routing Protocol for Mobile Ad Hoc NetworksIEICE Trans. Commun., 88-B
(2015)
IMO revised guidelines for the onboard operational use of shipborne automatic identification systems (AIS), International Maritime Organization 33
(2012)
Automatic identification system stated requirements for naval transponder security assurance
G. Calandriello, Panos Papadimitratos, J. Hubaux, A. Lioy (2007)
Efficient and robust pseudonymous authentication in VANET
A. Palmer (2014)
The New Pirates: Modern Global Piracy from Somalia to the South China Sea
D. Handayani, W. Sediono, Asadullah Shah (2013)
Anomaly Detection in Vessel Tracking Using Support Vector Machines (SVMs)2013 International Conference on Advanced Computer Science Applications and Technologies
J. Dorp, Jason Merrick (2011)
On a risk management analysis of oil spill risk using maritime transportation system simulationAnnals of Operations Research, 187
M. Gerlach, F. Güttler (2007)
Privacy in VANETs using Changing Pseudonyms - Ideal and Real2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring
(2016)
International Association of Marine Aids to Navigation and Lighthouse Authorities (IALA)
J. Jalkanen, L. Johansson, J. Kukkonen (2013)
A Comprehensive Inventory of the Ship Traffic Exhaust Emissions in the Baltic Sea from 2006 to 2009Ambio, 43
Martin Strohmeier, Vincent Lenders, I. Martinovic (2013)
On the Security of the Automatic Dependent Surveillance-Broadcast ProtocolIEEE Communications Surveys & Tutorials, 17
Anjia Yang, Xiao Tan, J. Baek, D. Wong (2017)
A New ADS-B Authentication Framework Based on Efficient Hierarchical Identity-Based Signature with Batch VerificationIEEE Transactions on Services Computing, 10
Yun Zhou, Yuguang Fang, Yanchao Zhang (2008)
Securing wireless sensor networks: a surveyIEEE Communications Surveys & Tutorials, 10
Vessel Requirements for Notices of Arrival and Departure, and Automatic Identification System
(2013)
IEEE (2016) 1609.2-2016-IEEE standard for wireless access in vehicular environments-security services for applications and management messages
F. Goerlandt, Habtamnesh Goite, O. Banda, A. Höglund, P. Ahonen-Rainio, M. Lensu (2017)
An analysis of wintertime navigational accidents in the Northern Baltic SeaSafety Science, 92
Seung-hee Oh, Dae-Hee Seo, Byung-gil Lee (2015)
S3 (Secure Ship-to-Ship) Information Sharing Scheme using Ship Authentication in the e-NavigationInternational journal of security and its applications, 9
John Hall, Jordan Lee, Joseph Benin, Christopher Armstrong, H. Owen (2015)
IEEE 1609 Influenced Automatic Identification System (AIS)2015 IEEE 81st Vehicular Technology Conference (VTC Spring)
(2013)
VeSPA” 2nd ACM workshop on hot topics of wireless networks security and privacy—HotWiSec’13
Yang Xiao, Hui Chen, Shuhui Yang, Yi-Bing Lin, Ding-Zhu Du (2009)
Wireless Network SecurityEURASIP Journal on Wireless Communications and Networking, 2009
Yuguang Fang, Xiao-yan Zhu, Yanchao Zhang (2007)
Securing resource-constrained wireless ad hoc networks2007 IEEE Sarnoff Symposium
G. Pallotta, Steven Horn, P. Braca, K. Bryan (2014)
Context-enhanced vessel prediction based on Ornstein-Uhlenbeck processes using historical AIS traffic patterns: Real-world experimental results17th International Conference on Information Fusion (FUSION)
Xiaodong Lin, Rongxing Lu, Chenxi Zhang, Haojin Zhu, Pin-han Ho, Xuemin Shen (2008)
Security in vehicular ad hoc networksIEEE Communications Magazine, 46
D. He, Neeraj Kumar, Kim-Kwang Choo, Wei Wu (2017)
Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast SystemIEEE Transactions on Information Forensics and Security, 12
R. Shelmerdine (2015)
Teasing out the detail: How our understanding of marine AIS data can better inform industries, developments, and planningMarine Policy, 54
Fabio Mazzarella, M. Vespe, D. Damalas, G. Osio (2014)
Discovering vessel activities at sea using AIS data: Mapping of fishing footprints17th International Conference on Information Fusion (FUSION)
Shushan Zhao, A. Aggarwal, R. Frost, Xiaole Bai (2012)
A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc NetworksIEEE Communications Surveys & Tutorials, 14
(2018)
Understanding the Maritime Transport Ecosystem,
M. McIntyre, Lynne Genik, P. Mason, Tim Hammond (2007)
Towards an Understanding of Security, Privacy and Safety in Maritime Self-Reporting Systems
The Automatic Identification System (AIS) is the emerging system for automatic traffic control and collision avoidance services in the maritime transportation sector. It is one of the cornerstone systems for improved marine domain awareness and is embedded in e-navigation, e-bridging, and autonomous ships proposals. However, AIS has some security vulnerabilities that can be exploited to invade privacy of passengers, to launch intentional collision attacks by pirates and terrorists, etc. In this work, we explore how Identity-Based Public Cryptography and Symmetric Cryptography may enhance the security properties of the AIS.
Journal of Marine Science and Technology – Springer Journals
Published: May 30, 2018
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.