[go: up one dir, main page]

Ferrão et al., 2025 - Google Patents

Automatic Identification System: Security challenges, mitigation strategies and future trends

Ferrão et al., 2025

View PDF
Document ID
8453188643559444336
Author
Ferrão I
Espes D
Publication year
Publication venue
2025 International Conference on Emerging Technologies and Computing (IC_ETC)

External Links

Snippet

This article critically reviews the vulnerabilities and security challenges of the Automatic Identification System (AIS) and discusses mitigation strategies and future trends to increase its resilience. Based on a systematic review of the literature, the main weaknesses of AIS …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/74Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems
    • G01S13/76Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems wherein pulse-type signals are transmitted

Similar Documents

Publication Publication Date Title
Ashraf et al. A survey on cyber security threats in IoT-enabled maritime industry
Kessler et al. A taxonomy framework for maritime cybersecurity: A demonstration using the automatic identification system
US9183711B2 (en) Anti-piracy system for the maritime navigation in critical areas, and device for data extraction from on board sensors
Strohmeier et al. On the security of the automatic dependent surveillance-broadcast protocol
Mednikarov et al. Analysis of cybersecurity issues in the maritime industry
Ray et al. DeAIS project: Detection of AIS spoofing and resulting risks
Kontopoulos et al. Countering real-time stream poisoning: An architecture for detecting vessel spoofing in streams of AIS data
Strohmeier et al. Security of ADS− B: State of the Art and Beyond
Algarni et al. An edge computing-based preventive framework with machine learning-integration for anomaly detection and risk management in maritime wireless communications
Strohmeier et al. Crowdsourcing security for wireless air traffic communications
Levy et al. A survey of security challenges in automatic identification system (AIS) protocol
Yue et al. Gan-lstm-based ads-b attack detection in the context of air traffic control
Coleman et al. Behavioral model anomaly detection in automatic identification systems (ais)
Li et al. Maritime cybersecurity: A comprehensive review
Jakovlev et al. Analysis of the possibility to detect fake vessels in the Automatic Identification System
Khan et al. A survey on security of automatic dependent surveillance-broadcast (ADS-B) protocol: Challenges, potential solutions and future directions
Kessler et al. Ais spoofing: A tutorial for researchers
Yu et al. Electronic Warfare Cyberattacks, Countermeasures and Modern Defensive Strategies of UAV Avionics: A Survey
Ahmed et al. A survey on security and privacy of automatic dependent surveillance-broadcast (ads-b) protocol: Challenges, potential solutions and future directions
Hemminghaus et al. Sigmar: Ensuring integrity and authenticity of maritime systems using digital signatures
Ferrão et al. Automatic Identification System: Security challenges, mitigation strategies and future trends
Polikarovskykh et al. Measures to Counter Cyber Attacks on Maritime Transportation
Neumann Cybersecurity in maritime industry
Klör et al. Dude, Where’s That Ship? Stealthy Radio Attacks Against AIS Broadcasts
Louwen Radio Frequency Fingerprinting for Aircraft Identification