Towards a secure automatic identification system (AIS)

The Automatic Identification System (AIS) is the emerging system for automatic traffic control and collision avoidance services in the maritime transportation sector. It is one of the cornerstone systems for improved marine domain awareness and is embedded in e-navigation, e-bridging, and autonomous ships proposals. However, AIS has some security vulnerabilities that can be exploited to invade privacy of passengers, to launch intentional collision attacks by pirates and terrorists, etc. In this work, we explore how Identity-Based Public Cryptography and Symmetric Cryptography may enhance the security properties of the AIS.

[1]  Fabio Mazzarella,et al.  Knowledge-based vessel position prediction using historical AIS data , 2015, 2015 Sensor Data Fusion: Trends, Solutions, Applications (SDF).

[2]  Henry L. Owen,et al.  IEEE 1609 Influenced Automatic Identification System (AIS) , 2015, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).

[3]  Fabrizio Natale,et al.  Mapping EU fishing activities using ship tracking data , 2016, ArXiv.

[4]  Michael Jürgen Werner IX. Directive 2002/59/EC establishing a Community vessel traffic monitoring and information system and repealing Council Directive 93/75/EEC , 2016 .

[5]  Marco Balduzzi,et al.  A Security Evaluation of AIS , 2014 .

[6]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.

[7]  Matthias Gerlach,et al.  Privacy in VANETs using Changing Pseudonyms - Ideal and Real , 2007, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring.

[8]  Hwasoo Yeo,et al.  How to Protect ADS-B: Confidentiality Framework and Efficient Realization Based on Staged Identity-Based Encryption , 2017, IEEE Transactions on Intelligent Transportation Systems.

[9]  Ding-Zhu Du,et al.  Wireless Network Security , 2009, EURASIP J. Wirel. Commun. Netw..

[10]  Floris Goerlandt,et al.  An Advanced Method For Detecting Possible Near Miss Ship Collisions From AIS Data , 2016 .

[11]  Michele Vespe,et al.  Vessel Pattern Knowledge Discovery from AIS Data: A Framework for Anomaly Detection and Route Prediction , 2013, Entropy.

[12]  Asadullah Shah,et al.  Anomaly Detection in Vessel Tracking Using Support Vector Machines (SVMs) , 2013, 2013 International Conference on Advanced Computer Science Applications and Technologies.

[13]  Fabio Mazzarella,et al.  Discovering vessel activities at sea using AIS data: Mapping of fishing footprints , 2014, 17th International Conference on Information Fusion (FUSION).

[14]  Yuguang Fang,et al.  Securing resource-constrained wireless ad hoc networks , 2007, 2007 IEEE Sarnoff Symposium.

[15]  Nathan D. Merchant,et al.  Assessing sound exposure from shipping in coastal waters using a single hydrophone and Automatic Identification System (AIS) data. , 2012, Marine Pollution Bulletin.

[16]  David Chaum,et al.  Security without identification: transaction systems to make big brother obsolete , 1985, CACM.

[17]  Rajinder Singh Wireless Network Security , 2012 .

[18]  Feng Lu,et al.  A quantitative approach for delineating principal fairways of ship passages through a strait , 2015 .

[19]  Sudip Misra,et al.  Security in Vehicular Ad Hoc Networks , 2016 .

[20]  Andrew Palmer,et al.  The New Pirates: Modern Global Piracy from Somalia to the South China Sea , 2014 .

[21]  Kim-Kwang Raymond Choo,et al.  Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System , 2017, IEEE Transactions on Information Forensics and Security.

[22]  Ivan Martinovic,et al.  On the Security of the Automatic Dependent Surveillance-Broadcast Protocol , 2013, IEEE Communications Surveys & Tutorials.

[23]  Mark R. Morelande,et al.  Statistical analysis of motion patterns in AIS Data: Anomaly detection and motion prediction , 2008, 2008 11th International Conference on Information Fusion.

[24]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[25]  Panagiotis Papadimitratos,et al.  Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.

[26]  Richard A. Frost,et al.  A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks , 2012, IEEE Communications Surveys & Tutorials.

[27]  Dae-Hee Seo,et al.  S3 (Secure Ship-to-Ship) Information Sharing Scheme using Ship Authentication in the e-Navigation , 2015 .

[28]  Göran Falkman,et al.  Anomaly detection in sea traffic - A comparison of the Gaussian Mixture Model and the Kernel Density Estimator , 2009, 2009 12th International Conference on Information Fusion.

[29]  Paolo Braca,et al.  Context-enhanced vessel prediction based on Ornstein-Uhlenbeck processes using historical AIS traffic patterns: Real-world experimental results , 2014, 17th International Conference on Information Fusion (FUSION).

[30]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[31]  Van Wimersma Greidanus Herman,et al.  Data Fusion for Wide-Area Maritime Surveillance , 2013 .

[32]  Yuguang Fang,et al.  Securing wireless sensor networks: a survey , 2008, IEEE Communications Surveys & Tutorials.

[33]  Floris Goerlandt,et al.  An analysis of wintertime navigational accidents in the Northern Baltic Sea , 2017 .

[34]  Joonsang Baek,et al.  A New ADS-B Authentication Framework Based on Efficient Hierarchical Identity-Based Signature with Batch Verification , 2017, IEEE Transactions on Services Computing.

[35]  H. Ligteringen,et al.  Comparison study on AIS data of ship traffic behavior , 2015 .

[36]  J. Kukkonen,et al.  A Comprehensive Inventory of the Ship Traffic Exhaust Emissions in the Baltic Sea from 2006 to 2009 , 2013, AMBIO.

[37]  Jason R. W. Merrick,et al.  On a risk management analysis of oil spill risk using maritime transportation system simulation , 2011, Ann. Oper. Res..

[38]  Richard L. Shelmerdine,et al.  Teasing out the detail: How our understanding of marine AIS data can better inform industries, developments, and planning , 2015 .

[39]  Ali Miri,et al.  Efficient identity-based security schemes for ad hoc network routing protocols , 2004, Ad Hoc Networks.

[40]  Hua-Yi Lin,et al.  Resilient Cluster-Organizing Key Management and Secure Routing Protocol for Mobile Ad Hoc Networks , 2005, IEICE Trans. Commun..

[41]  Johannes Spaethe,et al.  Functional Significance of Labellum Pattern Variation in a Sexually Deceptive Orchid (Ophrys heldreichii): Evidence of Individual Signature Learning Effects , 2015, PloS one.

[42]  Mark McIntyre,et al.  Towards an Understanding of Security, Privacy and Safety in Maritime Self-Reporting Systems , 2007, IFIPTM.

[43]  Fabrizio Natale,et al.  Mapping Fishing Effort through AIS Data , 2015, PloS one.

[44]  Li Suyi,et al.  Ship collision risk assessment for the Singapore Strait. , 2011, Accident; analysis and prevention.

[45]  Jianjun Zhu,et al.  AIS Database Powered by GIS Technology for Maritime Safety and Security , 2008, Journal of Navigation.

[46]  Panagiotis Papadimitratos,et al.  VeSPA: vehicular security and privacy-preserving architecture , 2013, HotWiSec '13.