2020
DOI: 10.1109/mcom.001.1900632
|View full text |Cite
|
Sign up to set email alerts
|

Vessels Cybersecurity: Issues, Challenges, and the Road Ahead

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
30
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 62 publications
(30 citation statements)
references
References 10 publications
0
30
0
Order By: Relevance
“…Our review of the protocol further identified that NMEA 2000 is vulnerable to spoofing attacks [31], where the Parameter Group Number (PGN) used to identify the sending node is copied and used by a malicious device. This imposes an added problem because in NMEA 2000, the PGN is also used to indicate the priority of the message.…”
Section: Spoofingmentioning
confidence: 99%
“…Our review of the protocol further identified that NMEA 2000 is vulnerable to spoofing attacks [31], where the Parameter Group Number (PGN) used to identify the sending node is copied and used by a malicious device. This imposes an added problem because in NMEA 2000, the PGN is also used to indicate the priority of the message.…”
Section: Spoofingmentioning
confidence: 99%
“…The AIS transceivers consist of a VHF transmitter, two VHF Time Division Multiple Access (TDMA) receivers, a VHF Digital Selective Calling (DSC) receiver, a positioning module (GNSS) and other sensors connected via standard marine electronic communication links (Caprolu et al, 2020). From a technical point of view, the AIS transmits and receives standardised messages on two dedicated VHF channels 87B and 88B (AIS 1 and AIS 2) using the self-organised TDMA protocol (SOTDMA), where the unit of time (one minute) is divided into time slots of equal length of 26.7 ms, allowing a nominal AIS capability of 2,250 messages per minute and per one dedicated AIS channel (IALA, 2016).…”
Section: Vulnerabilities Of Aismentioning
confidence: 99%
“…Vulnerabilities of AIS arise primarily from its technical performance as AIS is an open broadcasting system with no security features. The data sent by the transponders are not encrypted and do not have authentication, integrity checking, and confidentiality features (Goudossis & Katsikas, 2018;Caprolu et al, 2020). Therefore, there are risks for malicious transmissions and data manipulations (IALA, 2016).…”
Section: Strengths Weaknessesmentioning
confidence: 99%
“…For instance, Inmarsat [23] is a provider of SATCOM services that adopt GEO satellites to provide telephone and data services to users worldwide. Companies like SpaceX [24] and Iridium [25], [26] are planning to launch in orbit thousands of LEO satellites to provide low latency, broadband internet systems, voice, and data services anywhere on Earth.…”
Section: A Satellite Constellationsmentioning
confidence: 99%