Assessing Cyber Challenges of Maritime Navigation
Abstract
:1. Introduction
2. Methodology
- (1)
- Planning the review: The planning phase focused on defining a review question to guide the search: “What are the effects of cyberattacks and cybersecurity in the maritime domain?”
- (2)
- Conducting a review: In the search phase, the relevant research databases, the keywords to be used during these searches, and the proper timeframe for the resulting documents to be included were identified. Data for the study were available in the databases such as Scopus, Web of Science, Google Scholar, and open sources. The search keywords were determined from a knowledge domain analysis around the concept of “maritime cyber”. The two main knowledge domains to be scanned were identified as “maritime cyber” and “cybersecurity”. After the broad initial literature search, explicit inclusion and exclusion criteria—i.e., refined selection (e.g., document type, themes, research area) to identify relevant documents for this analysis—were applied. The documents were analyzed and synthesized according to contexts, methodological approaches, and outcomes. Our final list consisted of 171 documents (76 articles, 52 peer-reviewed journal papers, and 43 reports by specialized agencies) that covered the area of “maritime cyber”, ranging from 2016 to 2020. While the results of this article are novel, a few earlier studies on this topic were also taken into account as references.
- (3)
- Reporting and dissemination: In the next section, we report on our findings from the literature review.
3. Findings
3.1. Regulatory Framework—Global
3.2. Regulatory Framework and Policy Priorities—EU
3.3. Cyber Trends and Challenges
3.3.1. Types of Cyberattack
- Extortion/ransomware for allowing the vessel/port to restore operations;
- Digital piracy by shutting down the vessel/port;
- Espionage for gaining sensitive information that can be used by the competition;
- Defamation/litigation by causing ISPS Code noncompliance/delaying the vessel/causing disruption;
- Subversion of the supply chain;
- Terrorism;
- (H)Activism for conveying a message.
3.3.2. Ships Suffer Cyberattack
- Lack of timely response to technical vulnerabilities: A technology gap is identified between the IT and on ships and land-based systems. Land-based systems are usually better updated than the equivalent ship-based systems [97], which are, therefore, more susceptible to cyberattacks.
- No process in place for upgrades: There is a risk if the upgrading process of OT equipment does not match the standards associated with IT technologies.
- Securing critical systems: The potential consequences of a targeted attack to databases and registers based on older technology are lack of data integrity, loss of reputation, and a potential financial loss.
3.3.3. Offices Onshore
3.3.4. Ports, Terminals, and Supply Chains
3.3.5. Jamming and Spoofing
3.3.6. Autonomous Ship
3.3.7. Cyber and Social Media
3.3.8. Hybrid Threats
3.3.9. Environmental Pollution
4. Discussion
- Is it not a bit unusual that a superpower state does not have its alternative navigation system for their own defense forces in order not to rely on the signal sources of their rivals?
- Would it not be wise to develop and put into practice GPS-enabled smartwatches for mariners in case their GPS signal onboard becomes unavailable?
- Is there any viable non-GNSS alternative or backup system for vulnerable GPS navigation?
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
List of Acronyms
AtoN | Aids to Navigation |
AIS | Automatic Identification System |
BeiDou | China’s BeiDou Navigation Satellite System |
CERT-EU | Computer Emergency Response Team |
cPPP | contractual Public-Private Partnership |
CSIRT | Computer Security Incident Response Teams |
ECDIS | Electronic Chart Display and Information System |
EC3 | European Cyber Crime Centre at Europol |
eLORAN | Enhanced LOng-RAnge Navigation |
EMODnet | European Marine Observation and Data Network |
EMSA | European Maritime Safety Agency |
ENISA | European Union Agency for Cybersecurity |
ECSO | European Cyber Security Organisation |
Galileo | European Union’s GNSS |
GLONASS | Russia’s Global Navigation Satellite System |
GNC | Guidance, Navigation and Control |
GNSS | Global Navigation Satellite System |
GPS, GPS/NAVSTAR | Global Positioning System (USA’s GNSS) |
Hybrid CoE | European Centre of Excellence for Countering Hybrid Threats |
IEC | International Electrotechnical Commission |
IMO | International Maritime Organization |
INS | Integrated Navigational System |
IoT | Internet of Things |
ISAC | Information Sharing and Analysis Centres |
ISAO | Information Sharing and Analysis Organizations |
ISM Code | International Safety Management Code |
IT | Information Technology |
ITU | International Telecommunication Union |
LORAN | LOng-RAnge Navigation |
MSC | Maritime Safety Committee |
MTS | Maritime Transportation System |
NavIC | India’s Navigation Indian Constellation |
OT | Operational Technology |
PC | Personal Computer |
PNT | Positioning, Navigation and Timing |
QZSS | Japan’s Quazi-Zenith Satellite System |
SCADA | Supervisory Control And Data Acquisition |
SEG | SafeSeaNet Ecosystem Graphical Interface |
SMS | Safety Management System |
SOLAS | Safety Of Life At Sea |
SSN Ecosystem GUI | The SafeSeaNet Ecosystem Graphical User Interface (GUI) |
STS | Ship to Shore |
TDM | Traffic Density Mapping |
TEU | Twenty-foot equivalent unit |
VDR | Voyage Data Recorder |
VIP | Very Important Persons |
References
- World Economic Forum. Wild Wide Web—Consequences of Digital Fragmentation. The Global Risks Report 2020, 15th Ed. ed. January 2020. Available online: https://www.weforum.org/reports/the-global-risks-report-2020 (accessed on 20 June 2020).
- Maritime Cyber-Attacks Increase by 900% in Three Years. Available online: https://www.marineinsight.com/shipping-news/maritime-cyber-attacks-increase-by-900-in-three-years/# (accessed on 20 July 2020).
- Middleton, A. Hide and Seek: Managing Automatic Identification System Vulnerabilities: Proceedings of the Marine Safety and Security Council, Coast Guard. J. Saf. Secur. Sea 2014, 71, 48–50. [Google Scholar]
- Chybowski, L.; Gawdzinska, K.; Laskowski, R. Assessing the Unreliability of Systems during the Early Operation Period of a Ship—A Case Study. J. Mar. Sci. Eng. 2019, 7, 213. [Google Scholar] [CrossRef] [Green Version]
- Dobryakova, L.A.; Lemieszewski, L.S.; Ochin, E.F. GNSS spoofing detection using static or rotating single-antenna of a static or moving victim. IEEE Access 2018, 6, 79074–79081. [Google Scholar] [CrossRef]
- Hareide, O.S.; Jøsok, Ø.; Lund, M.S.; Ostnes, R.; Helkala, K. Enhancing Navigator Competence by Demonstrating Maritime Cyber Security. J. Navig. 2018, 71, 1025–1039. [Google Scholar] [CrossRef]
- Kaleem Awan, M.S.; Al Ghamdi, M.A. Understanding the Vulnerabilities in Digital Components of an Integrated Bridge System (IBS). J. Mar. Sci. Eng. 2019, 7, 350. [Google Scholar] [CrossRef] [Green Version]
- Lee, E.; Mokashi, A.J.; Moon, S.Y.; Kim, G. The Maturity of Automatic Identification Systems (AIS) and Its Implications for Innovation. J. Mar. Sci. Eng. 2019, 7, 287. [Google Scholar] [CrossRef] [Green Version]
- Polatidis, N.; Pavlidis, M.; Mouratidis, H. Cyber-attack path discovery in a dynamic supply chain maritime risk management system. Comput. Stand. Interfaces 2018, 56, 74–82. [Google Scholar] [CrossRef] [Green Version]
- Kalogeraki, E.; Apostolou, D.; Polemi, N.; Papastergiou, S. Knowledge management methodology for identifying threats in maritime/ logistics supply chains. Knowl. Manag. Res. Pract. 2018, 16, 508–524. [Google Scholar] [CrossRef] [Green Version]
- Kessler, G.C.; Craiger, J.P.; Haass, J.C. A Taxonomy Framework for Maritime Cybersecurity: A Demonstration Using the Automatic Identification System. Trans. Nav. Int. J. Mar. Navig. Safety Sea Trans. 2018, 12, 429–437. [Google Scholar] [CrossRef] [Green Version]
- Lee, Y.C.; Park, S.K.; Lee, W.K.; Kang, J. Improving cybersecurity awareness in maritime transport: A way forward. J. Korean Soc. Mar. Eng. 2017, 41, 738–745. [Google Scholar]
- Lewis, S.; Maynard, L.; Chow, C.E.; Akos, D. Secure GPS Data for Critical Infrastructure and Key Resources: Cross-Layered Integrity Processing and Alerting Service. Navig. J. Inst. Navig. 2018, 65, 389–403. [Google Scholar] [CrossRef]
- Shapiro, L.R.; Maras, M.-H.; Velotti, L.; Pickman, S.; Wei, H.-L.; Till, R. Trojan horse risks in the maritime transportation systems sector. J. Trans. Secur. 2018, 8, 1–19. [Google Scholar] [CrossRef]
- Svilicic, B.; Brčić, D.; Žuškin, S.; Kalebić, D. Raising Awareness on Cyber Security of ECDIS. TransNav Int. J. Mar. Navig. Saf. Sea Trans. 2019, 13, 231–236. [Google Scholar] [CrossRef] [Green Version]
- Svilicic, B.; Kamahara, J.; Celic, J.; Bolmsten, J. Assessing Ship Cyber Risks: A Framework and Case Study of ECDIS Security. WMU J. Mar. Aff. 2019, 18, 509–520. [Google Scholar] [CrossRef]
- Svilicic, B.; Kamahara, J.; Rooks, M.; Yano, Y. Maritime Cyber Risk Management: An Experimental Ship Assessment. J. Navig. 2019, 72, 1108–1120. [Google Scholar] [CrossRef]
- Svilicic, B.; Rudan, I.; Frančić, V.; Mohović, Đ. Towards a Cyber Secure Shipboard Radar. J. Navig. 2019, 73. [Google Scholar] [CrossRef]
- Tam, K.; Jones, K. MaCRA: A model-based framework for maritime cyber-risk assessment. WMU J. Mar. Aff. 2019, 18, 129–163. [Google Scholar] [CrossRef]
- Tsimplis, M.; Papadas, S. Information Technology in Navigation: Problems in Legal Implementation and Liability. J. Navig. 2019, 72, 833–849. [Google Scholar] [CrossRef] [Green Version]
- Zăgan, R.; Raicu, G.; Pazara, R.H.; Enache, S. Realities in Maritime Domain Regarding Cyber Security Concept. Adv. Eng. Forum 2018, 27, 221–228. [Google Scholar] [CrossRef]
- Assessing the Cyber Risks of Maritime Navigation. Available online: https://www.kennedyslaw.com/media/3288/kennedys_assessingthecyberrisksofmaritimenavigation.pdf (accessed on 20 May 2020).
- Lessons Learned from Maritime License to Operate at Risk? Available online: https://www.kongsberg.com/digital/resources/stories/2019/10/maritime-license-to-operate-at-risk/ (accessed on 4 July 2020).
- ISO. Information Technology—Security Techniques—Guidelines for Cybersecurity. ISO/IEC 27032:2012, 07/2012. Available online: https://www.iso.org/obp/ui/#iso:std:iso-iec:27032:ed-1:v1:en (accessed on 24 August 2020).
- International Telecommunication Union. Overview cybersecurity. In ITU-T X.1205 Recommendation; International Telecommunication Union: Geneva, Switzerland, 2008; p. 2. [Google Scholar]
- European Commission. Cybersecur. Eur. Digit. Single Mark. 2017, 2, 13. [CrossRef]
- Maritime-License-to-Operate-at-Risk-KPMG-and-KONGSBERG.Pdf. Available online: https://assets.kpmg/content/dam/kpmg/no/pdf/2019/09/Maritime-license-to-operate-at-risk-KPMG-and-KONGSBERG.pdf (accessed on 2 August 2020).
- Jensen, L. Challenges in Maritime Cyber-Resilience. Technol. Innov. Manag. Rev. 2015, 5, 35–39. [Google Scholar] [CrossRef]
- Code of Practice - Cyber Security for Ships. Available online: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/642598/cyber-security-code-of-practice-for-ships.pdf (accessed on 22 June 2020).
- Babineau, G.; Jones, R.; Horowitz, B. A System-Aware Cyber Security Method for Shipboard Control Systems with a Method Described to Evaluate Cyber Security Solutions. In Proceedings of the 2012 IEEE Conference on Technologies for Homeland Security (HST), Waltham, MA, USA, 13–15 November 2012; pp. 99–104. [Google Scholar] [CrossRef]
- Masala, C.; Tsetsos, K.A. Cyber risks and threats: Demanding challenge for the maritime industry. In Look Out 2016 Maritime Domain Cyber: Risks, Threats & Future Perspectives; Lampe & Schwartze KG: Bremen, Germany, 2015; pp. 11–26. [Google Scholar]
- Glomsvoll, O.; Bonenberg, L. GNSS Jamming Resilience for Close to Shore Navigation in the Northern Sea. J. Navig. 2017, 70, 33–48. [Google Scholar] [CrossRef] [Green Version]
- Direnzo, J.; Goward, D.A.; Roberts, F.S. The Little-Known Challenge of Maritime Cyber Security. In Proceedings of the 2015 6th International Conference on Information, Intelligence, Systems and Applications (IISA), Corfu, Greece, 6–8 July 2015; pp. 1–5. [Google Scholar] [CrossRef]
- Ziebold, R.; Romanovas, M.; Gewies, S. Experimental Evaluation of the Impact of Jamming on Maritime Navigation. In Proceedings of the 29th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS+ 2016), Portland, OR, USA, 12–16 September 2016; pp. 3461–3480. [Google Scholar] [CrossRef]
- Thombre, S.; Bhuiyan, M.Z.H.; Eliardsson, P.; Gabrielsson, B.; Pattinson, M.; Dumville, M.; Fryganiotis, D.; Hill, S.; Manikundalam, V.; Pölöskey, M.; et al. GNSS threat monitoring and reporting: Past, present, and a proposed future. J. Navig. 2018, 71, 513–529. [Google Scholar] [CrossRef] [Green Version]
- Elsobeiey, M.E. Accuracy Assessment of Satellite-Based Correction Service and Virtual GNSS Reference Station for Hydrographic Surveying. J. Mar. Sci. Eng. 2020, 8, 542. [Google Scholar] [CrossRef]
- Perkovic, M.; Gucma, M.; Luin, B.; Gucma, L.; Brcko, T. Accommodating larger container vessels using an integrated laser system for approach and berthing. Microprocess. Microsyst. 2017, 52, 106–116. [Google Scholar] [CrossRef]
- Perkovič, M.; Gucma, L.; Bilewski, M.; Muczynski, B.; Dimc, F.; Luin, B.; Vidmar, P.; Lorenčič, V.; Batista, M. Laser-Based Aid Systems for Berthing and Docking. J. Mar. Sci. Eng. 2020, 8, 346. [Google Scholar] [CrossRef]
- Gucma, L.; Bak, A.; Jankowski, S.; Zalewski, P.; Perkovic, M. Laser docking system integrated with Pilot Navigation Support System, a background to high precision, fast and reliable vessel docking. In Proceedings of the 17th Saint Petersburg International Conference on Integrated Navigation Systems, St. Petersburg, Russia, 31 May–2 June 2010. [Google Scholar]
- Mileski, J.; Clott, C.; Galvao, C.B. Cyberattacks on Ships: A Wicked Problem Approach. Marit. Bus. Rev. 2018, 3, 414–430. [Google Scholar] [CrossRef] [Green Version]
- Tranfield, D.; Denyer, D.; Smart, P. Towards a Methodology for Developing Evidence-Informed Management Knowledge by Means of Systematic Review* Introduction: The Need for an Evidence-Informed Approach. Br. J. Manag. 2003, 14, 207–222. [Google Scholar] [CrossRef]
- Grant, M.J.; Booth, A. A Typology of Reviews: An Analysis of 14 Review Types and Associated Methodologies. Health Inf. Libr. J. 2009, 26, 91–108. [Google Scholar] [CrossRef]
- Milner, K.A. Systematic Reviews. Oncol. Nurs. Forum 2015, 42, 89–93. [Google Scholar] [CrossRef]
- Perkovič, M. AIS Spoofing Near Elba Island Analysis and Research Data; University of Ljubljana, Faculty of Maritime Studies and Transport: Ljubljana, Slovenia, 2020. [Google Scholar]
- Bansal, M.; Kaur, J.; Kaur, A.; Raina, C.K. Cyber Security: Impact and Preventions. IJSRCSEIT 2017, 2, 1096–1100. [Google Scholar]
- The Risk of Cyber-Attack to the Maritime Sector. Glob. Mar. Pract. Available online: https://www.marsh.com/uk/insights/research/the-risk-of-cyber-attack-to-the-maritime-sector.html (accessed on 26 June 2020).
- IMO Resolution MSC.428 (98). 2017. Available online: http://www.imo.org/en/OurWork/Security/Guide_to_Maritime_Security/Documents/Resolution%20MSC.428(98).pdf (accessed on 20 May 2020).
- ISM. International Safety Management Code; IMO Publishing: London, UK, 2018. [Google Scholar]
- Guidelines on Cyber Risk Management. Maritime Safety Committee: 2017, MSC-FAL (1/Circ.3). pp. 1–6. Available online: http://www.imo.org/en/OurWork/Security/Guide_to_Maritime_Security/Documents/MSC-FAL.1-Circ.3%20-%20Guidelines%20On%20Maritime%20Cyber%20Risk%20Management%20(Secretariat).pdf (accessed on 16 July 2020).
- The Guidelines of Cyber Security Onboard Ships (2018). Available online: https://www.bimco.org/about-us-and-our-members/publications/the-guidelines-on-cyber-security-onboard-ships (accessed on 15 May 2020).
- International Electrotechnical Commission. Maritime Navigation and Radiocommunication Equipment and Systems-Cybersecurity-General Requirements, Methods of Testing and Required Test. Results; IEC 63154 ED1; IEC: Geneva, Switzerland, 2019. [Google Scholar]
- European Commission; High Representative. Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace. JOIN(2013) 1 final, Brussels. 7 February 2013. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex:52013JC0001 (accessed on 15 July 2020).
- Directive 2013/40/EU of the European Parliament and of the Council of 12 August 2013 on Attacks Against Information Systems and Replacing Council Framework Decision 2005/222/JHA. Available online: https://eur-lex.europa.eu/legl-content/EN/ALL/?uri=CELEX:32013L0040 (accessed on 15 July 2020).
- Directive 2016/1148 of the European Parliament and of the Council of 6 July 2016 Concerning Measures for a High Common Level of Security of Network and Information Systems Across the Union (NIS Directive). Available online: https://eur-lex.europa.eu/eli/dir/2016/1148/oj (accessed on 15 July 2020).
- European Commission. Communication Making the Most of NIS—towards the Effective Implementation of Directive (EU) 2016/1148 Concerning Measures for a High Common Level of Security of Network and Information Systems across the Union. COM(2017) 476 final/2, Brussels. 4 October 2017. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=COM:2017:476:FIN (accessed on 15 July 2020).
- European Commission. Strengthening Europe’s Cyber Resilience System and Fostering a Competitive and Innovative Cybersecurity Industry. COM(2016) 410 final, Brussels. 5 July 2016. Available online: https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=COM:2016:0410:FIN (accessed on 15 July 2020).
- ENISA. Information Sharing and Analysis Centres (ISACs)—Cooperative Models. Available online: https://doi.org/10.2824/549292 (accessed on 17 July 2020).
- What is an ISAC or ISAO? How These Cyber Threat Information Sharing Organizations Improve Security. Available online: https://www.csoonline.com/article/3406505/what-is-an-isac-or-isao-how-these-cyber-threat-information-sharing-organizations-improve-security.html (accessed on 8 September 2020).
- Hasratyan, N.; Olesen, N. Transportation Sector Report—Cyber Security for Road, Rail, Air, and Sea. European Cyber Security Organisation. Available online: https://www.ecs-org.eu/documents/publications/5e78cb9869953.pdf (accessed on 17 July 2020).
- European Commission; High Representative. Joint Communication on Resilience, Deterrence and Defence: Building strong cybersecurity for the EU. JOIN(2017) 450 final, Brussels. 13 September 2017. Available online: https://eur-lex.europa.eu/legal-content/en/TXT/?uri=CELEX:52017JC0450 (accessed on 17 July 2020).
- Regulation (EU) 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on Information and Communications Technology Cybersecurity Certification and Repealing Regulation (EU) No 526/2013 (Cybersecurity Act). Available online: https://eur-lex.europa.eu/eli/reg/2019/881/oj (accessed on 17 July 2020).
- Council of the EU. European Union Maritime Security Strategy. 11205/14, Brussels. 24 June 2014. Available online: http://register.consilium.europa.eu/doc/srv?l=EN&f=ST%2011205%202014%20INIT (accessed on 17 July 2020).
- Council of the EU. European Union Maritime Security Strategy Action Plan. 17002/14, Brussels. 16 December 2014. Available online: https://ec.europa.eu/maritimeaffairs/sites/maritimeaffairs/files/docs/body/20141216-action-plan_en.pdf (accessed on 17 July 2020).
- Council of the EU. Revised European Union Maritime Security Strategy (EUMSS) Action Plan. Annex to 10494/18, Brussels. 26 June 2018. Available online: https://data.consilium.europa.eu/doc/document/ST-10494-2018-INIT/en/pdf (accessed on 17 July 2020).
- European Commission; High Representative. On the implementation of the EU Maritime Security Strategy Action Plan. Joint Staff Working Document SWD(2016)217 Final. Available online: https://ec.europa.eu/maritimeaffairs/sites/maritimeaffairs/files/docs/body/swd-2016-217_en.pdf (accessed on 17 July 2020).
- European Commission; High Representative. Second report on the implementation of the EU Maritime Security Strategy Action Plan. Joint Staff Working Document SWD(2017)238 Final. Available online: https://ec.europa.eu/maritimeaffairs/sites/maritimeaffairs/files/swd-2017-238_en.pdf (accessed on 17 July 2020).
- European Commission; High Representative. Report on the implementation of the revised EU maritime security strategy action plan. In Joint Staff Working Document; European Commission: Brusselsl, Belgium, 2020; in draft. [Google Scholar]
- European Union Agency for Cybersecurity. Port Cybersecurity—Good Practices for Cybersecurity in the Maritime Sector; ENISA: Athens, Greece, 2019. [Google Scholar] [CrossRef]
- Cimpean, D.; Meire, J.; Bouckaert, V.; Stijn, V.C.; Pelle, A.; Hellebooge, L. Analysis of Cyber Security Aspects in the Maritime Sector; ENISA: Athens, Greece, 2011. [Google Scholar]
- European Commission. Communication on the EU Security Union Strategy. COM(2020) 605 Final. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:52020DC0605 (accessed on 17 July 2020).
- Council of the EU. Shaping Europe’s Digital Future—Council Conclusions. 8711/20, Brussels. 9 June 2020. Available online: https://data.consilium.europa.eu/doc/document/ST-8711-2020-INIT/en/pdf (accessed on 18 July 2020).
- European Commission. Secure 5G Deployment in the EU—Implementing the EU Toolbox. COM(2020) 50 Final. Available online: https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=COM:2020:0050:FIN (accessed on 18 July 2020).
- Cyber and Information Security Strategy for the Maritime Sector 2019–2022. Available online: https://www.dma.dk/Documents/Publikationer/Cyber%20and%20Information%20Security%20Strategy%20for%20the%20Maritime%20Sector.pdf (accessed on 27 July 2020).
- Modernized Maritime Industry Transports Cyber threats to Sea. Available online: https://www.csoonline.com/article/3410236/modernized-maritime-industry-transports-cyberthreats-to-sea.html (accessed on 27 July 2020).
- Jones, K.; Tam, K.; Papadaki, M. Threats and Impacts in Maritime Cyber Security. Eng. Technol. Ref. 2016, 1. [Google Scholar] [CrossRef]
- Caponi, S.; Belmont, K. Maritime Cybersecurity: A Growing Threat Goes Unanswered. Intellect. Prop. Technol. Law J. 2015, 27, 16. [Google Scholar]
- Lagouvardou, S. Maritime Cyber Security: Concepts, Problems and Models. Master’ Thesis, Technical University of Denmark, Copenhagen, Denmark, 2018. Available online: https://pdfs.semanticscholar.org/3158/103669fe46911b52e55dc7afe82237994036.pdf (accessed on 3 August 2020).
- Safety at Sea and BIMCO cybersecurity white paper—IHS Markit 2020 Cyber Security Survey. Available online: https://ihsmarkit.com/info/0819/cyber-security-survey.html?utm_medium=website&utmsource=sas-news-article-1&utm_campaign=cyber-security-whitepaper (accessed on 20 May 2020).
- Maritime Meets Cyber Security. Available online: https://www.maritime-executive.com/blog/maritime-meets-cyber-security (accessed on 3 August 2020).
- Why Are U-2 Jet Pilots Wearing Garmin Satellite Navigation Smartwatches? Available online: https://arstechnica.com/gadgets/2020/03/why-are-u-2-jet-pilots-wearing-garmin-satellite-navigation-smartwatches/ (accessed on 30 April 2020).
- SASC Wants Alternative GPS by 2023. Available online: https://breakingdefense.com/2020/06/sasc-wants-alternative-gps-by-2023/ (accessed on 29 July 2020).
- Silgado, D.M. Cyber-Attacks: A Digital Threat Reality Affecting the Maritime Industry. World Marit. Univ. Diss. 2018, 9–26. [Google Scholar]
- Bartlett, S.; Offermans, G.; Shue, C. Enhanced Loran. A Wide-Area Multi-Application PNT Resiliency Solution. GPS World 2015, 26, 58–64. [Google Scholar]
- Johnson, G.; Swaszek, P.; Hartnett, R.; Shalaev, R.; Wiggins, M. An Evaluation of eLoran as a Backup to GPS. In Proceedings of the 2007 IEEE Conference on Technologies for Homeland Security, Woburn, MA, USA, 16–17 May 2007; pp. 95–100. [Google Scholar] [CrossRef]
- E-Loran: The PNT Technology Which Is More Accurate and Less Vulnerable—Sea News Global Maritime News. Available online: https://seanews.co.uk/features/e-loran-the-pnt-technology-which-is-more-accurate-and-less-vulnerable/ (accessed on 2 August 2020).
- Kala, N.; Balakrishnan, M. Cyber Preparedness in Maritime Industry. Int. J. Sci. Technol. Adv. 2019, 5, 19–28. [Google Scholar]
- New GPS’ circle Spoofing’ Moves Ship Locations Thousands of Miles—GPS World/SkyTruth/RNTF. Available online: https://www.gpsworld.com/new-gps-circle-spoofing-moves-ship-locations-thousands-of-miles/ (accessed on 3 August 2020).
- Drougkas, A.; Sarri, A.; Kyranoudi, P.; Zisi, A. European Union Agency for Cybersecurity. Port. Cybersecur. Good Pract. Cybersecur. Marit. Sect. 2019, 12–46. [Google Scholar]
- EMSA. AIS spoofing incident. In Proceedings of the 6th HLSG for Governance of the Digital Maritime System and Services, Brussels, Belgium, 20 January 2020; Available online: https://ec.europa.eu/transparency/regexpert/index.cfm?do=groupDetail.groupMeeting&meetingId=18913 (accessed on 14 May 2020).
- Now Operational, BeiDou Could Conceal Cybersecurity Threat—Inside GNSS. Available online: https://insidegnss.com/now-operational-beidou-could-conceal-cybersecurity-threat/ (accessed on 3 August 2020).
- Wilson, J. China’s Alternative to GPS and Its Implications for the United States; U.S. China Economic and Security Review Commission: Washington, DC, USA, 2017.
- Ship Automation/Control System—KONGSBERG. Available online: http://www.shippipedia.com/ship-automation-control-system/ (accessed on 4 August 2020).
- IHS-BIMCO-Survey-Findings—Story in Numbers. Available online: https://cybersail.org/wp-content/uploads/2017/02/IHS-BIMCO-Survey-Findings.pdf (accessed on 4 August 2020).
- The importance of Cyber Security Risk Management in Shipping. Available online: https://www.shippingandfreightresource.com/cyber-security-risk-management-in-shipping/# (accessed on 4 July 2020).
- The Future of Maritime Cybersecurity. Available online: https://www.maritimecyberadvisors.com/l/the-future-of-maritime-cybersecurity2/ (accessed on 3 July 2020).
- Detect and Address Cyber Risk in the Maritime Industry. Available online: https://home.kpmg/no/nb/home/campaigns/2019/10/detect-and-address-cyber-risks-in-the-maritime-industry.html (accessed on 10 November 2019).
- Trimble, D.; Monken, J.; Sand, A. A Framework for Cybersecurity Assessments of Critical Port Infrastructure. In Proceedings of the 2017 International Conference on Cyber Conflict (CyCon US), Washington, DC, USA, 7–8 November 2017; pp. 1–7. [Google Scholar]
- Svilicic, B.; Rudan, I.; Jugovi, A. A Study on Cyber Security Threats in a Shipboard Integrated Navigational System. J. Mar. Sci. Eng. 2019, 7, 364. [Google Scholar] [CrossRef] [Green Version]
- Preparing for Cyber Battleships–Electronic Chart Display and Information System Security. Available online: https://www.nccgroup.com/uk/our-research/preparing-for-cyber-battleships-electronic-chart-display-and-information-system-security/ (accessed on 27 May 2020).
- The Story You Aren’t Being Told About Iran Capturing Two American Vessels. Available online: https://www.mintpressnews.com/the-story-you-arent-being-told-about-iran-capturing-two-american-vessels/212937/ (accessed on 21 May 2020).
- Hackers Took ‘Full Control’ of a Container Ship’s Navigation Systems for 10 Hours. Available online: https://rntfnd.org/2017/11/25/hackers-took-full-control-of-container-ships-navigation-systems-for-10-hours-ihs-fairplay/ (accessed on 21 January 2020).
- Shipping Must Confront Onboard Systems’ Cyber Vulnerabilities. Available online: https://safetyatsea.net/news/2017/shipping-must-confront-onboard-systems-cyber-vulnerabilities/ (accessed on 21 January 2020).
- Key Takeaways from 3 Recent Cyber Attacks in Shipping. Available online: https://www.dualog.com/blog/key-takeaways-from-3-recent-cyber-attacks-in-shipping (accessed on 24 July 2020).
- Carnival Hit by Cyber Attack: Hackers Steal Personal Information of Cruise Giant’s Passengers and Staff. Available online: https://www.thisismoney.co.uk/money/markets/article-8640269/Carnival-hit-ransomware-attack-Hackers-steal-passenger-information.html (accessed on 17 August 2020).
- Filitz, J. Maritime port systems cyber security vulnerability. NMIO Tech. Bull. 2019, 13, 22–27. [Google Scholar]
- Kramek, J. The critical infrastructure gap: US port facilities and cyber vulnerabilities. In Federal Executive Fellows Policy Papers 16; Brookings: Washington, DC, USA, 2013; pp. 414–430. [Google Scholar] [CrossRef] [Green Version]
- Newberry, M.E. Maritime Critical Infrastructure Cyber Risk: Threats, Vulnerabilities, and Consequences. Proceedings of the Marine Safety and Security Council, Coast. Guard. J. Saf. Secur. Sea 2014, 71, 42–45. [Google Scholar]
- Gunther, C. Design of maritime cybersecurity systems. In Look Out 2016 Maritime Domain Cyber: Risks, Threats & Future Perspectives; Lampe & Schwartze KG: Bremen, Germany, 2015; pp. 27–46. [Google Scholar]
- Above Us Only Stars—Exposing GPS Spoofing in Russia and Syria. Available online: https://www.c4reports.org/aboveusonlystars (accessed on 27 July 2020).
- Jie, H.; Presti, L.; Motella, B.; Pini, M. GNSS Spoofing Detection: Theoretical Analysis and Performance of the Ratio Test Metric in Open Sky. ICT Express 2016, 2, 37–40. [Google Scholar] [CrossRef] [Green Version]
- Seized UK Tanker Likely ‘Spoofed’ by Iran. Available online: https://lloydslist.maritimeintelligence.informa.com/LL1128820/Seized-UK-tanker-likely-spoofed-by-Iran (accessed on 20 July 2019).
- Traffic Density Mapping Service—Methodology. EMS—Ref. Ares (2019)4005069—24/06/2019. Available online: http://www.emsa.europa.eu/related-projects/tdms.html (accessed on 26 June 2020).
- Autonomous Shipping Concepts. Available online: https://www.norclub.no/blog/autonomous-shipping-concepts/ (accessed on 7 January 2020).
- Cyber risk and Cybersecurity Countermeasures Supplement. P & I Loss Prevention Bulletin-Vol.48_Full.Pdf. Available online: https://www.piclub.or.jp/wp-content/uploads/2020/05/Loss-Prevention-Bulletin-Vol.48_Full.pdf (accessed on 24 July 2020).
- Cyber Awareness. Available online: https://www.american-club.com/files/cyber_awareness_comic.pdf (accessed on 4 July 2020).
- Giannopoulos, G.; Smith, H.; Theocharidou, M. The Landscape of Hybrid Threats—A conceptual Model; Joint Research Centre, Centre of Excellence for Countering Hybrid Threats: Helsinki, Finland, 2020. [Google Scholar]
- Savolainen, J. Hybrid Threats and Vulnerabilities of Modern Critical Infrastructure—Weapons of Mass Disturbance (WMDi)? Hybrid CoE Working Paper 4. Available online: https://www.hybridcoe.fi/publications/hybrid-threats-and-vulnerabilities-of-modern-critical-infrastructure-weapons-of-mass-disturbance-wmdi/ (accessed on 10 August 2020).
- Kremidas-Courtney, C. Countering Hybrid Threats in the Maritime Environment. Center for International Maritime Security. Available online: http://cimsec.org/countering-hybrid-threats-in-the-maritime-environment/36553 (accessed on 12 June 2020).
- European Commission; High Representative. Increasing resilience and bolstering capabilities to address hybrid threats. JOIN(2018) 16 Final. Available online: https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=JOIN:2018:16:FIN (accessed on 15 June 2020).
- Regulation (EU) 2019/452 of the European Parliament and of the Council of 19 March 2019 Establishing a Framework for the Screening of Foreign Direct Investments Into the Union. Available online: https://eur-lex.europa.eu/eli/reg/2019/452/oj (accessed on 15 June 2020).
- Joint Declaration by the President of the European Council, the President of the European Commission, and the Secretary General of the North Atlantic Treaty Organization. Warsaw. 8 July 2016. Available online: https://www.consilium.europa.eu/en/press/press-releases/2016/07/08/eu-nato-joint-declaration/ (accessed on 2 August 2020).
- EU; NATO. Common Set of Proposals for the Implementation of the Joint Declaration by the President of the European Council, the President of the European Commission and the Secretary General of the North Atlantic Treaty Organization. Available online: https://data.consilium.europa.eu/doc/document/ST-15283-2016-INIT/en/pdf (accessed on 2 August 2020).
- EU; NATO. Common Set of New Proposals on the Implementation of the Joint Declaration signed by the President of the European Council, the President of the European Commission and the Secretary General of the North Atlantic Treaty Organization. Available online: https://www.consilium.europa.eu/media/31947/st14802en17.pdf (accessed on 2 August 2020).
- What is Hybrid CoE? The European Centre of Excellence for Countering Hybrid Threats. Available online: https://www.hybridcoe.fi/what-is-hybridcoe/ (accessed on 9 September 2020).
- Hybrid Threats Against Harbours: Workshop at EDA. Available online: https://www.eda.europa.eu/info-hub/press-centre/latest-news/2018/05/30/hybrid-threats-against-harbours-workshop-at-eda (accessed on 9 September 2020).
- Lohelia, T.; Schatz, V. Handbook On Maritime Hybrid Threats—10 Scenarios and Legal Scans. Hybrid CoE Working Paper. Available online: https://www.hybridcoe.fi/publications/handbook-on-maritime-hybrid-threats-10-scenarios-and-legal-scans/ (accessed on 9 September 2020).
- European Commission; High Representative. On the Implementation of the Joint Framework on Countering Hybrid Threats—A European Union Response. JOIN(2017) 30 Final. Available online: https://eur-lex.europa.eu/legal-content/en/ALL/?uri=CELEX:52017JC0030 (accessed on 9 September 2020).
- European Commission; High Representative. Joint Framework on Countering Hybrid Threats—A European Union Response. JOIN(2016) 18 Final. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:52016JC0018 (accessed on 9 September 2020).
- Braw, E. From Schools to Total Defence Exercises: Best Practices in Greyzone Deterrence. Available online: https://rusi.org/sites/default/files/20191115_newsbrief_vol39_no10_braw_web.pdf (accessed on 6 September 2020).
- Council of the EU. Complementary Efforts to Enhance Resilience and Counter Hybrid Threats. Council Conclusions, 14972/19. Available online: https://data.consilium.europa.eu/doc/document/ST-14972-2019-INIT/en/pdf (accessed on 4 August 2020).
- Radgowski, J.; Tiongson, K. Cyberspace—The Imminent Operational Domain. Proceedings of the Marine Safety and Security Council. Coast. Guard J. Saf. Secur. Sea 2014, 71, 18–22. [Google Scholar]
- Jaskolka, J.; Villasenor, J. Securing cyber-dependent maritime systems and operations. NMIO Tech. Bull. 2017, 12, 4–6. [Google Scholar]
- Fitton, O.; Prince, D.; Germond, B.; Lacy, M. The Future of Maritime Cyber Security; Lancaster University: Lancashire, UK, 2015. [Google Scholar]
- Secretary of the Navy: Cybersecurity Readiness Review. Available online: https://www.navy.mil/strategic/CyberSecurityReview.pdf (accessed on 27 July 2020).
- Tam, K.; Jones, K. Factors Affecting Cyber Risk in Maritime. In 2019 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA). IEEE 2019, 3, 1–8. [Google Scholar]
- Navy Culture Must Be Adapted to Fit the Information Age. Available online: http://cimsec.org/navy-culture-must-be-adapted-to-fit-the-information-age/40594 (accessed on 27 July 2020).
- Naval Dome—Maritime Cyber Defense Solution. Available online: https://navaldome.com/aapa-video-2020-07.html (accessed on 24 July 2020).
- GSA Celebrates 1 Billion Galileo Smartphone Users. Available online: https://www.gsa.europa.eu/newsroom/news/gsa-celebrates-1-billion-galileo-smartphone-users (accessed on 8 September 2020).
- PRS. Available online: https://www.gsa.europa.eu/security/prs (accessed on 8 September 2020).
- How do We Ensure GNSS Security Against Spoofing? Available online: https://www.gpsworld.com/how-do-we-ensure-gnss-security-against-spoofing (accessed on 8 September 2020).
- Van Cappelle, L.E.; Chen, L.; Negenborn, R.R. Survey on Short-Term Technology Developments and Readiness Levels for Autonomous Shipping. In Computational Logistics; Cerulli, R., Raiconi, A., Voß, S., Eds.; Springer: Berlin/Heidelberg, Germany, 2018. [Google Scholar]
- Spange, J. Autonomous Docking for Marine Vessels Using a Lidar and Proximity Sensors. Ph.D. Thesis, Norwegian University of Science and Technology, Trondheim, Norway, 2016. [Google Scholar]
- How Vulnerable is, G.P.S.? Available online: https://www.newyorker.com/tech/annals-of-technology/how-vulnerable-is-gps (accessed on 6 August 2020).
- Maritime Cyberattacks Up by 400 Percent. Available online: https://maritime-executive.com/article/report-maritime-cyberattacks-up-by-400-percent (accessed on 20 September 2020).
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Androjna, A.; Brcko, T.; Pavic, I.; Greidanus, H. Assessing Cyber Challenges of Maritime Navigation. J. Mar. Sci. Eng. 2020, 8, 776. https://doi.org/10.3390/jmse8100776
Androjna A, Brcko T, Pavic I, Greidanus H. Assessing Cyber Challenges of Maritime Navigation. Journal of Marine Science and Engineering. 2020; 8(10):776. https://doi.org/10.3390/jmse8100776
Chicago/Turabian StyleAndrojna, Andrej, Tanja Brcko, Ivica Pavic, and Harm Greidanus. 2020. "Assessing Cyber Challenges of Maritime Navigation" Journal of Marine Science and Engineering 8, no. 10: 776. https://doi.org/10.3390/jmse8100776
APA StyleAndrojna, A., Brcko, T., Pavic, I., & Greidanus, H. (2020). Assessing Cyber Challenges of Maritime Navigation. Journal of Marine Science and Engineering, 8(10), 776. https://doi.org/10.3390/jmse8100776