A Security Evaluation of AIS

The information provided herein is for general information and educational purposes only. It is not intended and should not be construed to constitute legal advice. The information contained herein may not be applicable to all situations and may not reflect the most current situation. Nothing contained herein should be relied on or acted upon without the benefit of legal advice based on the particular facts and circumstances presented and nothing herein should be construed otherwise. Trend Micro reserves the right to modify the contents of this document at any time without prior notice. Translations of any material into other languages are intended solely as a convenience. Translation accuracy is not guaranteed nor implied. If any questions arise related to the accuracy of a translation, please refer to the original language official version of the document. Any discrepancies or differences created in the translation are not binding and have no legal effect for compliance or enforcement purposes. Although Trend Micro uses reasonable efforts to include accurate and up-to-date information herein, Trend Micro makes no warranties or representations of any kind as to its accuracy, currency, or completeness. You agree that access to and use of and reliance on this document and the content thereof is at your own risk. Trend Micro disclaims all warranties of any kind, express or implied. Neither Trend Micro nor any party involved in creating, producing, or delivering this document shall be liable for any consequence, loss, or damage, including direct, indirect, special, consequential, loss of business profits, or special damages, whatsoever arising out of access to, use of, or inability to use, or in connection with the use of this document, or any errors or omissions in the content thereof. Use of this information constitutes acceptance for use in an " as is " condition.

[1]  Fabian van den Broek Eavesdropping on GSM: state-of-affairs , 2011, ArXiv.

[2]  David Cooper,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.

[3]  Markus Jakobsson,et al.  Designing ethical phishing experiments: a study of (ROT13) rOnl query features , 2006, WWW '06.

[4]  Todd E. Humphreys,et al.  Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks , 2012, Int. J. Crit. Infrastructure Prot..

[5]  C. Ambjorn Seatrack Web, the HELCOM tool for oil spill prediction and identification of illegal polluters , 2010 .

[6]  Li Li-na Determination of the factors about safe distance of approach and etc on the research of ship automatic avoidance collision , 2002 .

[7]  Chen-Mou Cheng,et al.  A Practical Experience with RFID Security , 2009, 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware.

[8]  Robert Beckman,et al.  Piracy and Armed Robbery Against Ships , 2014 .

[9]  Andrei Costin,et al.  Ghost in the Air(Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices , 2012 .

[10]  Stefano Coraluppi,et al.  Multisensor tracking and fusion for maritime surveillance , 2007, 2007 10th International Conference on Information Fusion.

[11]  Zheping Shao,et al.  A New AIS-Based Way to Conduct OLAP of Maritime Traffic Flow , 2009 .

[12]  Kgabo Frans Mathapo A Software-Defined Radio Implementation of Maritime AIS , 2007 .

[13]  Markus Jakobsson,et al.  Why and How to Perform Fraud Experiments , 2008, IEEE Security & Privacy.

[14]  Li Zi-fu A Summary of Studies on the Automation of Ship Collision Avoidance Intelligence , 2006 .

[15]  B.J. Tetreault,et al.  Use of the Automatic Identification System (AIS) for maritime domain awareness (MDA) , 2005, Proceedings of OCEANS 2005 MTS/IEEE.

[16]  C. Ambjorn Seatrack Web forecasts and backtracking of oil spills - an efficient tool to find illegal spills using AIS , 2008, 2008 IEEE/OES US/EU-Baltic International Symposium.