Ferrão et al., 2025 - Google Patents
Automatic Identification System: Security challenges, mitigation strategies and future trendsFerrão et al., 2025
View PDF- Document ID
- 8453188643559444336
- Author
- Ferrão I
- Espes D
- Publication year
- Publication venue
- 2025 International Conference on Emerging Technologies and Computing (IC_ETC)
External Links
Snippet
This article critically reviews the vulnerabilities and security challenges of the Automatic Identification System (AIS) and discusses mitigation strategies and future trends to increase its resilience. Based on a systematic review of the literature, the main weaknesses of AIS …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S13/00—Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
- G01S13/74—Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems
- G01S13/76—Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems wherein pulse-type signals are transmitted
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ashraf et al. | A survey on cyber security threats in IoT-enabled maritime industry | |
| Kessler et al. | A taxonomy framework for maritime cybersecurity: A demonstration using the automatic identification system | |
| US9183711B2 (en) | Anti-piracy system for the maritime navigation in critical areas, and device for data extraction from on board sensors | |
| Strohmeier et al. | On the security of the automatic dependent surveillance-broadcast protocol | |
| Mednikarov et al. | Analysis of cybersecurity issues in the maritime industry | |
| Ray et al. | DeAIS project: Detection of AIS spoofing and resulting risks | |
| Kontopoulos et al. | Countering real-time stream poisoning: An architecture for detecting vessel spoofing in streams of AIS data | |
| Strohmeier et al. | Security of ADS− B: State of the Art and Beyond | |
| Algarni et al. | An edge computing-based preventive framework with machine learning-integration for anomaly detection and risk management in maritime wireless communications | |
| Strohmeier et al. | Crowdsourcing security for wireless air traffic communications | |
| Levy et al. | A survey of security challenges in automatic identification system (AIS) protocol | |
| Yue et al. | Gan-lstm-based ads-b attack detection in the context of air traffic control | |
| Coleman et al. | Behavioral model anomaly detection in automatic identification systems (ais) | |
| Li et al. | Maritime cybersecurity: A comprehensive review | |
| Jakovlev et al. | Analysis of the possibility to detect fake vessels in the Automatic Identification System | |
| Khan et al. | A survey on security of automatic dependent surveillance-broadcast (ADS-B) protocol: Challenges, potential solutions and future directions | |
| Kessler et al. | Ais spoofing: A tutorial for researchers | |
| Yu et al. | Electronic Warfare Cyberattacks, Countermeasures and Modern Defensive Strategies of UAV Avionics: A Survey | |
| Ahmed et al. | A survey on security and privacy of automatic dependent surveillance-broadcast (ads-b) protocol: Challenges, potential solutions and future directions | |
| Hemminghaus et al. | Sigmar: Ensuring integrity and authenticity of maritime systems using digital signatures | |
| Ferrão et al. | Automatic Identification System: Security challenges, mitigation strategies and future trends | |
| Polikarovskykh et al. | Measures to Counter Cyber Attacks on Maritime Transportation | |
| Neumann | Cybersecurity in maritime industry | |
| Klör et al. | Dude, Where’s That Ship? Stealthy Radio Attacks Against AIS Broadcasts | |
| Louwen | Radio Frequency Fingerprinting for Aircraft Identification |