The adoption of the global positioning system (GPS) within the marine industry has revolutionized the marine operations by condensing the navigation of a vessel into an integrated bridge system (IBS). An IBS acts as the main command and control of a vessel as it interconnects various digital devices used for navigation in open seas and is also connected to other on-board systems of a vessel e.g., navigation and control, propulsion and machinery management system, cargo management system and safety management system, core infra structure systems, administrative and crew welfare systems, etc. Additionally, it also provides a gateway to the Internet, thus, leaving not only an IBS vulnerable but also all the on-board systems vulnerable to cyber-attacks. We, in this study, have collected historical evidences about various vulnerable digital components in an IBS to better understand the security and privacy challenges associated with the vulnerable IBS components. Our study is the first of its kind that involves collection and review of 59 historical accidents reported in literature and has highlighted various vulnerability patterns, their causes and consequences, with geographical as well as temporal relationships for different vulnerable IBS components. The vulnerabilities of IBS components were reportedly exploited using various cyber-attack techniques e.g., jamming, spoofing, hijacking, etc. This review paper also forms a baseline for future work on vulnerabilities of IBS and maritime cyber security.
[1]
Anthony F. Molland,et al.
The effect of ship shape and anemometer location on wind speed measurements obtained from ships
,
2005
.
[2]
Haralambos Mouratidis,et al.
A Novel Risk Assessment Methodology for SCADA Maritime Logistics Environments
,
2018,
Applied Sciences.
[3]
David Brčić,et al.
Navigation with ECDIS: Choosing the Proper Secondary Positioning Source
,
2015
.
[4]
Nineta Polemi,et al.
Knowledge management methodology for identifying threats in maritime/logistics supply chains
,
2018,
Knowledge Management Research & Practice.
[5]
Elizabeth C. Kent,et al.
The Accuracy of Wind Observations from Ships
,
1999
.
[6]
Haralambos Mouratidis,et al.
Cyber-attack path discovery in a dynamic supply chain maritime risk management system
,
2018,
Comput. Stand. Interfaces.
[7]
Gianluca Stringhini,et al.
Targeted Attacks against Industrial Control Systems: Is the Power Industry Prepared?
,
2014,
SEGS@CCS.
[8]
Remus Zăgan,et al.
Realities in Maritime Domain Regarding Cyber Security Concept
,
2018
.
[9]
Marco Balduzzi,et al.
A security evaluation of AIS automated identification system
,
2014,
ACSAC.
[10]
Asaf Degani.
The Grounding of the Royal Majesty
,
2003
.