2023
DOI: 10.1109/tifs.2023.3282132
|View full text |Cite
|
Sign up to set email alerts
|

Attacking (and Defending) the Maritime Radar System

Abstract: The operation of radar equipment is one of the key facilities navigators use to gather situational awareness about their surroundings. With an ever-increasing need for alwaysrunning logistics and tighter shipping schedules, operators rely more on computerized instruments and their indications. As a result, modern ships have become complex cyber-physical systems in which sensors and computers constantly communicate and coordinate. In this work, we discuss novel threats related to the radar system, one of a ship… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 23 publications
0
11
0
Order By: Relevance
“…They also describe the category of sophisticated contextaware radar manipulation attacks. Longo et al [4] implement these attacks, which again aligns with the G-1 goal. Notably, their technique enables precise injections into the PPI we use to implement our attacks.…”
Section: Related Workmentioning
confidence: 91%
See 2 more Smart Citations
“…They also describe the category of sophisticated contextaware radar manipulation attacks. Longo et al [4] implement these attacks, which again aligns with the G-1 goal. Notably, their technique enables precise injections into the PPI we use to implement our attacks.…”
Section: Related Workmentioning
confidence: 91%
“…Attacks exploit the radar hijacking techniques described in [4]. Briefly, radar hijacking involves injecting fake AS-TERIX packets to modify echoes immediately after the PPI receives legitimate values from the antenna.…”
Section: Attack Descriptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Further supporting the role of risk management in the maritime field, another study introduced a threat probability assessment tool [35]. A different perspective on managing risks to radar systems on ships in light of emerging threats was provided by Longo et al [36]. Their study presented a detection system that provides a proactive approach to identifying anomalies in radar video feeds to form a risk management strategy.…”
Section: Cybersecurity Supply Chain Risk Managementmentioning
confidence: 99%
“…There has been research that has demonstrated how vulnerabilities inherent in the networking infrastructure can be exploited. Research conducted by [ 19 ] took advantage of the inbuilt weaknesses in the ASTERIX protocol used for radar data transmission to show how malware can be propagated in the INS. Ref.…”
Section: Introductionmentioning
confidence: 99%