Cyber Security in the Maritime Industry: A Systematic Survey of Recent Advances and Future Trends
Abstract
:1. Introduction
2. Methodology
2.1. Papers Selection
- Review: The principal question underpinning the literature review was “what is the impact of cyber-crimes on maritime infrastructures”;
- Search: The search is based on journal papers, conference papers, official websites and published reports (Figure 1a). Table 1 shows a summary of significant recent survey papers on the maritime industry.Documents were selected depending on the number of citations and/or relevance, and the sources are the following scientific databases: Science Direct, Springer and IEEE. The keywords used in the search were as follows:
- “Maritime”;
- “Cyber-attack” + “Maritime”;
- “Cyber-attack” + “Port."
Figure 2 illustrates the growth in the number of published papers whilst Figure 1b shows that the bulk of the papers that met the selection criteria were published between 2015 and 2020. A classification of cyber-attacks reported on maritime infrastructures is presented in the next section to ease the evaluation of their impact(s). - The report on key findings is segmented as follows:
- Classification of on-vessel core equipment/systems;
- In-port architectures and services;
- Classification of cyber attacks;
- The impact of new technologies.
2.2. Cyber-Attacks within the Maritime Industry
2.3. Aim and Objectives
- Mapping of on-vessel core equipment/systems and in-port services;
- Evaluation of cyber attacks;
- Definition of solutions that mitigate the impact of cyber attacks;
- Future cyber-security trends.
3. Literature Review
4. The Maritime Infrastructure
4.1. On-Vessel Architectures and Services
4.1.1. Electro-Mechanical and Electronic Systems
- Power Management System (PMS): The primary function of the PMS is to automatically control the diesel generator ensuring optimal performance and power consumption ([80,81]). The stability of on-vessel generators is implemented by using optimal equal load divisions based on real-time information from monitoring and analysis of the load, choosing the optimal operational settings under particular conditions [75].
- Engine: The selection of the most appropriate engine depends on the size and the type of vessel. Diesel turbines are the most popular, transforming thermal into mechanical power [82], and other usages include wind, nuclear and solar energy [83] depending on the weather condition and the duration of available sunshine. Hybrid diesel/electric engines are used on some vessels, mostly adapted to large ships, providing high power and constant torque at the expense of complex and expensive installation. A recent trend, in an effort to ensure more security and safety, has been on remote engine control (autonomous vessels).
- Main Switchboard: The main switchboard maintains the total control of a vessel’s functions, providing real-time data on the status of engines, key sensors and presents alarms. It is fundamental that the on-ship electrical systems, including the main switchboard, is earthed.
- Programmable Logic Controllers (PLCs): Generally, PLCs are used to automate a process and on-vessel PLCs are combined with the power management system, alarms and engines ([84,85]). PLCs are integral to the control of the navigation system and to prevent defaults delivering high operational efficiency with low maintenance cost. Moreover, PLCs provide critical data such as temperature, engine status, pressures and electrical defaults, as well as information to execute the overall management of the vessel.
- Water Ingress Detection System (WIDS): Each vessel must be equipped with a WIDSBased, a regulated requirement under SOLAS Chapter XII Reg.12. If a specific level of water is detected, an audible and visual alarm must be issued. WIDS systems must be powered by two different systems and an alarm is raised if the primary source fails.
- Bow thrusters: The bow thrusters are used at low speed for efficient maneuvering. Large vessels are equipped with tunnel thrusters driven by electric motors, regulating the ship’s resistance through the water, which is critical to successful docking.
- Emergency Shut Down (ESD): The ESD is activated in an emergency such as fire detection and overfilling of tanks by executing a sequential shutdown of on-vessel pumps and valves to ensure safety and reduce damages. A rapid ESD response time is mandatory.
- Marine Heavy Fuel Oil (HFO) Treatment System: The HFO produces power from the energy extracted from the burning process and is used by most commercial ships [86]. The HFO is treated before use in the following stages: Firstly, HFO is heated to 50–60 °C and then connected to an inlet pump. The solution is subsequently heated to 80 °C and treated with a centrifugal purifier. The fuel is ready to be used after being processed with a centrifugal clarifier.
- Fuel Oil System (FOS): The FOS is a system that provides the fuel to the injection system and secondly an injection mechanism for receiving, storing and distributing to the tank. The FOS is composed of several essential parts: piping, stocking, distribution and the treatment of fuel oil.
- Lubricating Oil System (LOS): LOS is a fundamental internal subsystem of the engine, ensuring the efficiency and a long operational lifetime of the machine. A number of lubrication oil systems were used, the most popular being Hydrodynamic Lubrication (HL). HL produces a layer of oil between the moving parts, e.g., a layer of oil is covered by the main bearing, ensuring the motion of the crankshaft’ journal.
- Starting Air System (SAS): The SAS is composed of two air compressors and two reservoirs to generate the minimum 28 bars for the engine to start. For safety, valves are installed in the reservoirs to discharge the air in over-pressure cases.
- Gyro compass: The gyroscope is an essential tool used for navigation, providing an indication of the true north with deviations as a function of the direction and the speed of the vessel ([87,88]). The most important feature of this component is the total ineffectiveness of external magnetic fields.
- Echo-sounder: The echo-sounder measures the depth of the sea. A sonar signal is transmitted and the ’echo’ received, with the time between the two operations determining the depth. The information given by the sensor is used for a number of purposes.
- Electrical Crane Equipment: On-vessel cranes load or discharge goods and equipment. Therefore, their regular maintenance is mandatory as downtime can compromise ship operations. Visual inspection of the cranes for damage is carried out by the chief engineer and reported immediately for scheduling repairs([89,90]). General maintenance is required to ensure uninterrupted operation with a particular focus on the protection of electrical systems against water ingress.
- Navigation Lights: Light signals are used to communicate dangerous actions, e.g., navigation lights in vessels play an essential role in preventing collisions as a visual signal has been proven to illicit rapid reactions, which is core to the prevention of critical events.
- Loading and Stability Computer: The on-board loading computer provides standard functions and stability scenarios as, under specific circumstances, the captain needs to know the status of several components in order to inform the optimum plan of intervention to resolve an operational challenge.
- Fresh Water Generator (FWG): FWG produces freshwater from seawater, primarily for drinking but also for use by several other on-vessel components. The FWG consists of a condenser and evaporator, as the process is based on evaporating seawater using a heat source and decreasing atmospheric pressure by creating a vacuum in the evaporating compartment, and the decrease in temperature allows the transformation of vapour to cool water.
- Central Cooling Water System: A range of on-vessel equipment requires cooling to maintain their efficiency and reduce the loss of heat energy. Generally, two kinds of cooling systems are used on ships: a seawater cooling system, and the other using freshwater—the central cooling system—to control the temperature of the engine room. The central cooling system comprises three circuits: a seawater circuit in which the seawater cools freshwater; a low-temperature circuit used in low-temperature components of the machine; and a high-temperature circuit.
- Waste Incinerator Plant: According to regulation 16 of MARPOL Annex VI [91], ships must install an incinerator to transform waste into flue gas and heat by burning. It must, however, be noted that the process outputs hazardous smoke that both pollutes the environment and causes several diseases such as cancer.
- Sewage Treatment Plant: The treatment of sewage before discharging into the sea is mandated by regulations. A biological method based on anaerobic bacteria, in which the sewage is decomposed and generates H2S and methane gases, is the most popular technique. The alternative method, Sewage Treatment Plant (STP), relies on a screen filter to remove all solids, a biofilter decomposing organic substances by the aerobic micro-organisms and a pump.
- Air Condition Plant: The refrigeration or air-condition plant maintains a stable temperature of living quarters and the quality and protection of transported goods. Therefore, the refrigeration system must be regularly charged with refrigerant gas.
- Stabilisers: Roll stabilization systems, classified as passive and active, are used to maintain the stability and reward motion caused by the sea. Bilge Keels are the most used passive systems, and their motion opposes rolling. Anti-Rolling Tanks are active systems based on tanks at the sides of the ship.
- Anchor and Mooring Winch Control System: Anchor and mooring systems operate automatically to control anchors and moorings by using actuators to keep a steady tension. The winch is equipped with a frequency converter and PLC controller to monitor the motor and to guarantee an ideal pulling speed.
4.1.2. Communications Systems
- Internal communication: VHF communications plays an important role in the safety of the ship, for example, in requesting assistance and/or transmitting a distress message. Furthermore, hand-held VHF is also used for applications such as localization by authorities. The Global Maritime Distress and Safety System (GMDSS) uses satellite and terrestrial communication to connect with authorities ([92,93]) throughout international voyages, which is a mandatory requirement. Digital Selective Calling (DSC) is another means of transmitting distress message transmission and the current position of the ship.
- Network: Networked systems within the maritime industry are designed with high levels of reliability due to business critical data generated by a suite of sensors and the necessity to manage communications. The networked information systems gather and process data from sensors and execute on the exchanges the information between equipment. Table 4 summarises that several types of network technologies used for information transport, for example, the U.S. Navy uses a fiber-optic infrastructure (SAFENET) [94].
- Navigation: The GNSS is recognised as the most vulnerable infrastructure within the maritime industry with respect to potential cyber breaches [95]. The network of satellites provide, in real time, the location and speed of ships and, in turn, the time remaining to destination. The Global Positioning System (GPS), GALILEO, and GLONASS provide flexibility and easy public access ([96,97,98,99]), and they are rich attack surfaces for a hacker to inject fake information or degrade the fidelity of the signal.
- RADAR: RADAR is a core tool in collision-free navigation and in the control of ever increasing levels of maritime traffic. All vessels must be equipped with the capability as mandated by Regulation 19 presented by SOLAS Chapter 5 ([100,101]). Marine radars utilise two frequencies bands, 10 GHz and 3 GHz, most readily yielding accurate distances between the ship and other detected objects.
- Passenger-facing networks include the following:
- Passenger segregated WiFi or Local Area Network (LAN) Internet access: The provision of high quality on-ship Internet access for both passengers and crews is non-negotiable. The on-sea options are limited and the service is only reliably delivered through satellite connections. Specific on-vessel hardware is required and the cost of the service is often prohibitive. VoIP services are not possible as satellite connections are subject to significant latency.
- TV-Entertainment system: Similarly, the provision of TV entertainment is a necessity. Satellite-delivered TV is the only option, and examples include SAILOR or Sea Tel systems.
- ECDIS: The Electronic Chart Systems (ECS) ECDIS system is a mandatory real-time navigation tool providing essential on-ship information. Regulated by the International Maritime Organization (IMO) as a replacement for the more traditional approach using paper-based nautical charts, the system eases the planing of journeys considerably by reducing effort and in the optimisation of speed. The ECDIS is a real-time system that provides the location of the ship as it is connected to both the RADAR and AIS system.The ECDIS generates several chart, such as Electronic Navigational Charts (ENC) and Admiralty Raster Chart Service (ARCS) provided by hydro-graphic offices; updates of the ECDIS are vital using the Internet or e-mail ([102,103]). The update is loaded into the planning station most readily by using a USB or e-mail, followed by the export of data and refresh of ECDIS status.
- Cargo Management: The cargo management system in commercial vessels optimises efficiency in the management of goods. The application uses a dynamic database in which details of the progress of the cargo are updated, where it has been stored and tracked from the port to final destination ([104,105,106]). The system also provides information on stock status and informs plans to prevent losses.
- Automatic Identification System (AIS): The AIS provides static, dynamic and voyage-related data according to the Safety Of Life At Sea (SOLAS) convention, refs. ([107,108,109]). AIS data are detailed in Figure 5; thus, the mappings of the architecture of the vessel and the transmitted signals are both essential to the identification of its vulnerabilities. A successful strategy to exploit vulnerabilities within AIS and to define attacks that an impact the vessel is based on the following:
- Identify vulnerabilities;
- Gather information about the infrastructure;
- Map the architecture of the information system.
The AIS architecture (Figure 6) is essentially composed of the following:- Time-division Multiple Access (TDMA): Communication between vessels shares the same frequency, and the transmitted frame is divided into time slots, each one containing data such as location and the identity of the vessel. As presented in Figure 6, the duration of the frame is 60 s, and it is divided into 2250 time slots.
- Digital Selective Call (DSC): The International Telecommunications Union (ITU) recommends the necessity of the DSC, as it is responsible for issuing alerts to a rescue authority anywhere in the world. It also allows vessels to receive distress calls from others. A fault in the DSC could have serious consequences.
- Gaussian Minimum Shift Keying (GMSK): The GMSK modulation is characterized by high spectral efficiency and low inter-channel interference.
- Global Navigation Satellite System (GNSS): A GNSS provides the location of a vessel using networked satellites and is operated by the AIS.
- The Ship Information System (SIS): The development of electronic devices and the advances in communication technologies in military vessels have been central to high performance Ship Information Systems (SIS) that have improved services on and enhanced the safety of ships. As shown in Figure 7, SIS consists of the following:
- Sensors;
- Network architecture;
- Information processing;
- Information transmission.
4.2. The Port Infrastructure
4.2.1. In-Port Safety
- Cargo X-ray Scanner: In port, the optimisation of the time to execute key tasks is essential. X-ray reduces the inspection time of containers and plays a fundamental role in the safety of the port by detecting suspicious goods.
- Control of ports by electronic camera (CCTV): The port is a critical space that requires the real-time control of dynamic human and vehicle activity. IP-HD camera-equipped CCTVs monitor the environment in real time, and the quality of the images enables monitoring the port with high precision, increasing security and minimising human intervention.
- Metal detectors: The International Ship and Port Facility Security Code (ISPS) proposed by the IMO under the SOLAS Convention, Chapter XI-2, mandates the use of metal detectors to protect port operations, ensures the safety of the workers and counters terrorism [120].
4.2.2. In-Port Operational Equipment
- Cranes: The recent trend in the utilisation of new technologies in the quest to improve service delivery has also targeted next generation cranes. The use of micro-computer and wireless connectivity communication has implemented their remote control but this evolution has also created new vulnerabilities for hackers to assume control with malicious intent to create significant damage.
- Tugboats: Tugboats are essential for maneuvering large-size vessels in port by towing large vessels through narrow water channels. Generally, a tugboat is equipped with diesel engines and firefighting equipment.
- Dredging vessels: Dredging maintains the required in-port water depth by removing disposals such as sand and sediments. Dredge vessels can be mechanical or hydraulic.
4.2.3. The Port Community System (PCS)
- Core module: contains general services information such as the name and IMO number of each vessel. The interface presents user profiles, allowing changes of passwords and databases searches. For security, access to the system is allowed only to authorized users as, for example, confidential information such as the number of crew members and passengers details are at risk.
- Cargo module: contains information related to cargo such as the type and quantity of goods, the date/time of arrival/departure and editing services. The user is allowed to verify certificates related to the cargo.
- Tracking and tracing module: These modules source information from the AIS system. The user is able to visualize the real-time trace of the vessel and can view the CCTV video stream. Interrogation on the departure and arrival of the vessel is also available.
- Berth management module: organizes the berthing of a vessel by providing real-time information related to the operation. The user is able to generate the berthing plan automatically and accesses information such as loading/unloading times by using the interface. The user can also extract a graphical representation of the berth to guide the execution of a successful berthing by port workers.
- Storage allocation module: provides a graphical representation of the warehouse to optimise the collection of particular goods.
- Interface to other transport modes: provides services related to the link between the storage area and the next transportation mode. The interface facilitates the governance of goods and provides real-time statuses of shipments.
- Billing module: creates and manages all invoices. The interface provides berthing data and collects all information related to energy and water consumption.
- Statistics module: provides periodic updates and creates statistical reports concerning previous operations and generates alerts on specific anomalies related to port services.
4.2.4. Single Window (SW) Environment
4.2.5. The Maritime Transport Life Cycle
- Ship-to-shore: carried out by quay cranes (QR) to load or discharge the ship, conducted with references to a specific plan executed by the operator.
- Transfer: transferring the container from the QR to the storage area using crewed or automated vehicles.
- Storage: serves as a buffer, necessary to optimize the waiting time, due to the lack of synchronization between loading and unloading phases.
- Delivery and receipt: The container is transferred by means of a port’s internal vehicle to the trains or barges for onward delivery to the final destination. The time taken to execute this final port phase depends on the location of the container.
5. Cyber-Attacks in the Maritime Industry
5.1. On-Ship Cyber-Attacks
- AIS attack: The flowchart presented in Figure 9 maps the signal processing steps for Automated Indicator Sharing (AIS), providing the framework to examine vulnerabilities and to capture the behaviour of the hacker. The identification of the data is carried out by calculating the Frame Check Sequence (FCS); the 6-bit ITU-T Cyclic Redundancy Check (CRC) polynomial equation is also presented in the flowchart. The transmission of a message by the hacker in the appropriate radio channel of the AIS receiver utilising a FCS similar to the calculated FCS of the target AIS decoder executes a successful spoofing attack, potentially resulting in a collision between ships. The hacker could perform the following ([128,129,130]):
- Change the localisation: latitude, longitude and altitude;
- Inject a false message.
- Global Navigation Satellite Systems (GNSS): GPS (US), GLONASS (Russia), Galileo (EU) and BeiDou (China) all fall under the Global Navigation Satellite Systems (GNSS) umbrella. Cyber attacks on GNSS have been—facilitated by the lack of authentication and encryption—rendering the system vulnerable to breaches [134,135]. Fake position information significantly increases the probability of collisions, and the most striking exemplars occur in the Black Sea. Equation (7) and Figure 10 presents the GPS method to determine position. A GNSS spoofing attack is carried out in two steps: synchronization with the satellite’s signal followed by increases in the power of the transmitted signal.As shown in Figure 10, the position (x,y,z) of GPS receiver is the intersection of , , and with the following:The local time is given by the following:
5.2. In-Port Cyber-Attacks
- Spear-phishing: Spear-phishing, created by e-mails containing suspicious links to obtain unauthorized access, is one of the most common attacks ([140,141,142]). After accessing the information system, the hacker installs key-loggers to capture logins/passwords and determines the identity of the individual workers, building a precise mapping of the status of the port. Although a substantial number of spear-phishing attacks occur, due to the sensitivity of the maritime sector, port managers prefer to keep reporting to a minimum as breaches affect not only confidentiality of individual but also economic relationships between nations.
- Distributed Denial of Service (DDoS): Distributed Denial of Service (DDoS) attacks are criminal acts. The port information system is compromised by flooding the network with excessive traffic levels and denying access to its sites ([143,144]). As a result, maritime services and the ability to track goods are compromised. The impact of DDoS attacks on cyber-physical maritime systems is evaluated in [145] by using simulation. The model comprises a vessel, controller and a gate with the simulated attack targeting communication between these different elements, and performing this exceeds the time safety limit.
- Port Scanning: Attackers verify the most vulnerable network ports by using the classic technique of scanning. The goal is to discover the status of services, define the optimum strategy to access databases and identify which users monitor services. At the highest level, the attacker uses IP fragmentation to confuse the firewall, and, as a result, the packet filters are bypassed. Another technique is based on interrogating an open User Data-gram Protocol port—the fourth layer of OSI model layer (Transport Layer)—to scan IP addresses by testing several protocols and other ports. The test-models used by a hacker are randomly generated [146]. TCP-wrappers are preferred in order to mitigate such attacks, empowering the network manager to allow or block server access depending on the IP address.
- Supply chain: Supply chain attacks center on creating damage through the most vulnerable part of the end-to-end network ([64,147]). International shipping from origin to final destination relies on key processes and stakeholders for container tracking, assurance and international authorizations.The most easily understandable example of a damaging outcome of an attack is changing the destination of a container, which requires knowledge of the supply chain and the vulnerabilities therein, to modify critical information.
- Social Engineering: Generally, social engineering attacks depend on the exploitation of human curiosity or compunction to execute a malicious act ([148,149]). The study of human behaviour is core to a successful attack, and in this respect, social media or instant messaging usage patterns are a means for hackers to gather information on in-port network activity. As an example, the hacker can obtain critical information by creating a false identity through Facebook/Instagram. Other classes of social engineering attacks are Baiting and Quid Pro Quo. Software updates by security managers through a USB is often the means to install malware, a file used by the hacker to obtain access to the system. Protection based on strictly applied security policies is the only method to mitigate such attacks.
- Malware/Ransomware/Trojans: Generally, the aim of these classes of attacks is to damage the information system or server by targeting the networked computers ([150,151,152,153,154]). On the 8 July 2019, an attack targeted a US vessel causing critical credential mining. The Coast Guard and the FBI reported that the lack of security strategies on the vessel was the main reason for enabling such an attack; all of the crew on the vessel shared the same login and password of the vessel’s computer. Furthermore, the use of external devices and the absence of antivirus software protection facilitated the task of the hacker. The second example is the attack of the 27 June 2017, named Petya, that affected computer servers in both Europe and India. The encrypted malware targeted all services of the Maersk shipping company, affecting 17 terminals and inflicting damages in excess of USD 200 million. The attack destroyed the computer operating system by infecting its master boot record (MBR).
6. Internet of Things in Maritime Industry
6.1. The Role and Impact of IoT On-Vessel and In-Port
6.2. Data and IoT
6.3. Attack Surfaces in IoT Devices in Ships and Ports
7. Future of Maritime
7.1. Autonomous Vessels
7.2. Remotely Operated Vessels
7.3. Autonomously Operated Vessel
7.4. Digitalisation
8. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
AIS | Automatic Identification System |
S.I | Security Impact |
R | Radar |
C | Confidentiality |
RC | Radio-communication |
I | Integrity |
PM | Propulsion Management |
PCS | Power Control Systems |
AS | Access to the system |
Al.S | Alarm System |
CMS | Cargo Management Systems |
B.S | Bridge Systems |
PCMS | Passenger Servicing and Management Systems |
PPN | Passenger facing public networks |
ACWS | Administrative and crew welfare systems |
DoS | Denial-of-service attack |
GPS | Global Positioning System |
A | Availability |
References
- Koukaki, T.; Tei, A. Innovation and maritime transport: A systematic review. Case Stud. Transp. Policy 2020, 8, 700–710. [Google Scholar] [CrossRef]
- Davri, E.C.; Darra, E.; Monogioudis, I.; Grigoriadis, A.; Iliou, C.; Mengidis, N.; Tsikrika, T.; Vrochidis, S.; Peratikou, A.; Gibson, H.; et al. Cyber Security Certification Programmes. In Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece, 26–28 July 2021; pp. 428–435. [Google Scholar]
- Bures, M.; Ahmed, B.S.; Rechtberger, V.; Klima, M.; Trnka, M.; Jaros, M.; Bellekens, X.; Almog, D.; Herout, P. PatrIoT: IoT Automated Interoperability and Integration Testing Framework. In Proceedings of the 2021 14th IEEE Conference on Software Testing, Verification and Validation (ICST), Porto de Galinhas, Brazil, 12–16 April 2021; pp. 454–459. [Google Scholar]
- Mednikarov, B.; Tsonev, Y.; Lazarov, A. Analysis of Cybersecurity Issues in the Maritime Industry. Inf. Secur. 2020, 47, 27–43. [Google Scholar] [CrossRef]
- Kapalidis, P. Cybersecurity at Sea. In Global Challenges in Maritime Security; Springer: Berlin/Heidelberg, Germany, 2020; pp. 127–143. [Google Scholar]
- de la Peña Zarzuelo, I. Cybersecurity in ports and maritime industry: Reasons for raising awareness on this issue. Transp. Policy 2021, 100, 1–4. [Google Scholar] [CrossRef]
- Ivošević, S.Š. Envisioning Marketing in a Digital Technology-Driven Maritime Business. Mednar. Inov. Posl. J. Innov. Bus. Manag. 2021, 13, 22–28. [Google Scholar]
- Androjna, A.; Brcko, T.; Pavic, I.; Greidanus, H. Assessing Cyber Challenges of Maritime Navigation. J. Mar. Sci. Eng. 2020, 8, 776. [Google Scholar] [CrossRef]
- Goudosis, A.; Katsikas, S. Secure AIS with Identity-Based Authentication and Encryption. TransNav Int. J. Mar. Navig. Saf. Sea Transp. 2020, 14, 287–298. [Google Scholar] [CrossRef]
- Mraković, I.; Vojinović, R. Evaluation of Montenegrin Seafarer’s Awareness of Cyber Security. Trans. Marit. Sci. 2020, 9, 206–216. [Google Scholar] [CrossRef]
- Tam, K.; Moara-Nkwe, K.; Jones, K. The Use of Cyber Ranges in the Maritime Context. 2020. Available online: https://pearl.plymouth.ac.uk/handle/10026.1/16067 (accessed on 11 November 2021).
- Papastergiou, S.; Kalogeraki, E.M.; Polemi, N.; Douligeris, C. Challenges and Issues in Risk Assessment in Modern Maritime Systems. In Advances in Core Computer Science-Based Technologies; Springer: Berlin/Heidelberg, Germany, 2020; pp. 129–156. [Google Scholar]
- Tranfield, D.; Denyer, D.; Smart, P. Towards a methodology for developing evidence-informed management knowledge by means of systematic review. Br. J. Manag. 2003, 14, 207–222. [Google Scholar] [CrossRef]
- Grant, M.J.; Booth, A. A typology of reviews: An analysis of 14 review types and associated methodologies. Health Inf. Libr. J. 2009, 26, 91–108. [Google Scholar] [CrossRef]
- Bilotta, G.S.; Milner, A.M.; Boyd, I. On the use of systematic reviews to inform environmental policies. Environ. Sci. Policy 2014, 42, 67–77. [Google Scholar] [CrossRef] [Green Version]
- Zhang, X.; Wang, C.; Jiang, L.; An, L.; Yang, R. Collision-avoidance navigation systems for Maritime Autonomous Surface Ships: A state of the art survey. Ocean Eng. 2021, 235, 109380. [Google Scholar] [CrossRef]
- Menhat, M.N.; Zaideen, I.M.M.; Yusuf, Y.; Salleh, N.H.M.; Zamri, M.A.; Jeevan, J. The impact of COVID-19 pandemic: A review on maritime sectors in Malaysia. Ocean Coast. Manag. 2021, 209, 105638. [Google Scholar] [CrossRef]
- Pagano, P.; Antonelli, S.; Tardo, A. C-Ports: A proposal for a comprehensive standardization and implementation plan of digital services offered by the “Port of the Future”. Comput. Ind. 2022, 134, 103556. [Google Scholar] [CrossRef]
- Alamoush, A.S.; Ballini, F.; Ölçer, A.I. Ports’ technical and operational measures to reduce greenhouse gas emission and improve energy efficiency: A review. Mar. Pollut. Bull. 2020, 160, 111508. [Google Scholar] [CrossRef]
- Alzahrani, A.; Petri, I.; Rezgui, Y.; Ghoroghi, A. Decarbonisation of seaports: A review and directions for future research. Energy Strategy Rev. 2021, 38, 100727. [Google Scholar] [CrossRef]
- Chang, C.; Wenming, S.; Wei, Z.; Changki, P.; Kontovas, C. Evaluating cybersecurity risks in the maritime industry: A literature review. In Proceedings of the International Association of Maritime Universities (IAMU) Conference, Tokyo, Japan, 30 October–1 November 2019. [Google Scholar]
- Ahokas, J.; Kiiski, T.; Malmsten, J.; Ojala, L.M. Cybersecurity in ports: A conceptual approach. In Digitalization in Supply Chain Management and Logistics: Smart and Digital Solutions for an Industry 4.0 Environment, Proceedings of the Hamburg International Conference of Logistics (HICL); epubli GmbH: Berlin, Germany, 2017; Volume 23, pp. 343–359. Available online: https://www.econstor.eu/handle/10419/209316 (accessed on 11 November 2021).
- de la Peña Zarzuelo, I.; Soeane, M.J.F.; Bermúdez, B.L. Industry 4.0 in the port and maritime industry: A literature review. J. Ind. Inf. Integr. 2020, 20, 100173. [Google Scholar] [CrossRef]
- Cheung, K.F.; Bell, M.G.; Bhattacharjya, J. Cybersecurity in logistics and supply chain management: An overview and future research directions. Transp. Res. Part E Logist. Transp. Rev. 2021, 146, 102217. [Google Scholar] [CrossRef]
- Larsen, M.H.; Lund, M.S. A Maritime Perspective on Cyber Risk Perception: A Systematic Literature Review. IEEE Access 2021. [Google Scholar] [CrossRef]
- Kessler, G.C. The CAN Bus in the Maritime Environment–Technical Overview and Cybersecurity Vulnerabilities. Transnav Int. J. Mar. Navig. Saf. Sea Transp. 2021, 15, 531–540. [Google Scholar] [CrossRef]
- Kuhn, K.; Bicakci, S.; Shaikh, S.A. COVID-19 digitization in maritime: Understanding cyber risks. WMU J. Marit. Aff. 2021, 20, 193–214. [Google Scholar] [CrossRef]
- Munim, Z.H.; Dushenko, M.; Jimenez, V.J.; Shakil, M.H.; Imset, M. Big data and artificial intelligence in the maritime industry: A bibliometric review and future research directions. Marit. Policy Manag. 2020, 47, 577–597. [Google Scholar] [CrossRef]
- Ghaderi, H. Autonomous technologies in short sea shipping: Trends, feasibility and implications. Transp. Rev. 2019, 39, 152–173. [Google Scholar] [CrossRef]
- Argles, C. A conceptual review of cyber-operations for the royal navy. Cyber Def. Rev. 2018, 3, 43–56. [Google Scholar]
- Aslam, S.; Michaelides, M.P.; Herodotou, H. Internet of ships: A survey on architectures, emerging applications, and challenges. IEEE Internet Things J. 2020, 7, 9714–9727. [Google Scholar] [CrossRef]
- Qiao, D.; Liu, G.; Lv, T.; Li, W.; Zhang, J. Marine Vision-Based Situational Awareness Using Discriminative Deep Learning: A Survey. J. Mar. Sci. Eng. 2021, 9, 397. [Google Scholar] [CrossRef]
- Sullivan, B.P.; Desai, S.; Sole, J.; Rossi, M.; Ramundo, L.; Terzi, S. Maritime 4.0—Opportunities in digitalization and advanced manufacturing for vessel development. Procedia Manuf. 2020, 42, 246–253. [Google Scholar] [CrossRef]
- Kavallieratos, G.; Katsikas, S.; Gkioulos, V. Cybersecurity and safety co-engineering of cyberphysical systems—A comprehensive survey. Future Internet 2020, 12, 65. [Google Scholar] [CrossRef] [Green Version]
- Kapalidis, C. Cyber Security Challenges for the Maritime Industry. 2019. Available online: https://safety4sea.com/cm-cyber-security-challenges-for-the-maritime-industry/ (accessed on 11 November 2021).
- HMM Hit by Cyber Attack. Available online: https://www.offshore-energy.biz/hmm-hit-by-cyber-attack/ (accessed on 11 November 2021).
- Cyber Attack Targets Iranian Port near Strait of Hormuz. Available online: https://www.jpost.com/breaking-news/cyber-attack-targets-iranian-port-near-strait-of-hormuz-627616 (accessed on 13 September 2021).
- MSC Confirms Malware Attack Caused Website Outage. Available online: https://www.seatrade-maritime.com/containers/msc-confirms-malware-attack-caused-website-outage (accessed on 13 September 2021).
- U.S. Coast Guard Issues Alert after Ship Heading into Port of New York Hit by Cyberattack. Available online: https://www.forbes.com/sites/daveywinder/2019/07/09/u-s-coast-guard-issues-alert-after-ship-heading-into-port-of-new-york-hit-by-cyberattack/?sh=6597dc5c41aa (accessed on 13 September 2021).
- Marine Firm James Fisher Reports Cyber Breach. Available online: https://www.reuters.com/article/us-james-fisher-cybercrime-idUSKBN1XF1SQ (accessed on 13 September 2021).
- China Hackers Steal Data from US Navy Contractor—Reports. Available online: https://www.bbc.co.uk/news/world-us-canada-44421785 (accessed on 13 September 2021).
- The Untold Story of NotPetya, the Most Devastating Cyberattack in History. Available online: https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ (accessed on 13 September 2021).
- Ships Fooled in GPS Spoofing Attack Suggest Russian Cyberweapon. Available online: https://www.newscientist.com/article/2143499-ships-fooled-in-gps-spoofing-attack-suggest-russian-cyberweapon/ (accessed on 13 September 2021).
- 7 Sailors Missing, CO Injured after Destroyer USS Fitzgerald Collided with Philippine Merchant Ship. Available online: https://news.usni.org/2017/06/16/destroyer-uss-fitzgerald-collides-japanese-merchant-ship (accessed on 13 September 2021).
- Pentagon Orders Temporary Halt to US Navy Operations after Second Collision. Available online: https://www.theguardian.com/us-news/2017/aug/21/us-destroyer-uss-john-s-mccain-damaged-after-collision-with-oil-tanker (accessed on 13 September 2021).
- US Navy Ship Collides with South Korean Fishing Boat. Available online: https://edition.cnn.com/2017/05/09/politics/fishing-vessel-hits-us-navy-ship-south-korea/index.html (accessed on 13 September 2021).
- University of Texas Team Takes Control of a Yacht by Spoofing Its GPS. Available online: https://newatlas.com/gps-spoofing-yacht-control/28644/ (accessed on 13 September 2021).
- Virus Origin in Gulf Computer Attacks in Question. Available online: https://phys.org/news/2012-09-virus-gulf.html (accessed on 13 September 2021).
- The ‘Icefog’ APT: A Tale of Cloak and Three Daggers. Available online: https://media.kaspersky.com/en/icefog-apt-threat.pdf (accessed on 11 November 2021).
- Iran’s Top Cargo Shipping Line Says Sanctions Damage Mounting. Available online: https://www.reuters.com/article/us-iran-sanctions-shipping-idUSBRE89L10X20121022 (accessed on 11 November 2021).
- Police Warning after Drug Traffickers’ Cyber-Attack. Available online: https://www.bbc.co.uk/news/world-europe-24539417 (accessed on 11 November 2021).
- Wang, C.; Kim, Y.S.; Kim, C.Y. Causality between logistics infrastructure and economic development in China. Transp. Policy 2021, 100, 49–58. [Google Scholar] [CrossRef]
- Muñoz-Villamizar, A.; Velázquez-Martínez, J.C.; Haro, P.; Ferrer, A.; Mariño, R. The environmental impact of fast shipping ecommerce in inbound logistics operations: A case study in Mexico. J. Clean. Prod. 2021, 283, 125400. [Google Scholar] [CrossRef]
- Bocayuva, M. Cybersecurity in the European Union port sector in light of the digital transformation and the COVID-19 pandemic. WMU J. Marit. Aff. 2021, 20, 173–192. [Google Scholar] [CrossRef]
- Senarak, C. Port cybersecurity and threat: A structural model for prevention and policy development. Asian J. Shipp. Logist. 2021, 37, 20–36. [Google Scholar] [CrossRef]
- Tam, K.; Jones, K. MaCRA: A model-based framework for maritime cyber-risk assessment. WMU J. Marit. Aff. 2019, 18, 129–163. [Google Scholar] [CrossRef]
- Pitropakis, N.; Logothetis, M.; Andrienko, G.; Stefanatos, J.; Karapistoli, E.; Lambrinoudakis, C. Towards the Creation of a Threat Intelligence Framework for Maritime Infrastructures. In Computer Security; Springer: Cham, Switzerland, 2019; pp. 53–68. [Google Scholar]
- Gamboa, Y.B.G.; Ramírez-Cabrales, F.; Jiménez, J.A.M. Cyber Security Vulnerabilities in Colombia’s Maritime Critical Infrastructure (MCI). Dev. Adv. Def. Secur. 2020, 3, 3–15. [Google Scholar]
- Karamperidis, S.; Kapalidis, C.; Watson, T. Maritime Cyber Security: A Global Challenge Tackled through Distinct Regional Approaches. J. Mar. Sci. Eng. 2021, 9, 1323. [Google Scholar] [CrossRef]
- Hindy, H.; Tachtatzis, C.; Atkinson, R.; Brosset, D.; Bures, M.; Andonovic, I.; Michie, C.; Bellekens, X. Leveraging Siamese Networks for One-Shot Intrusion Detection Model. arXiv 2020, arXiv:2006.15343. [Google Scholar]
- Office of Chief of Naval Operations Security Regulations Manual. Available online: https://www.secnav.navy.mil/doni/SECNAV%20Manuals1/5510.1%20(OPNAV).PDF (accessed on 4 June 2021).
- Svilicic, B.; Kamahara, J.; Celic, J.; Bolmsten, J. Assessing ship cyber risks: A framework and case study of ECDIS security. WMU J. Marit. Aff. 2019, 18, 509–520. [Google Scholar] [CrossRef]
- SP 800-30 Rev 1; Guide for Conducting Risk Assessments; National Institute of Standards & Technology: Gaithersburg, MD, USA, 2012.
- Polatidis, N.; Pavlidis, M.; Mouratidis, H. Cyber-attack path discovery in a dynamic supply chain maritime risk management system. Comput. Stand. Interfaces 2018, 56, 74–82. [Google Scholar] [CrossRef] [Green Version]
- Seebruck, R. A typology of hackers: Classifying cyber malfeasance using a weighted arc circumplex model. Digit. Investig. 2015, 14, 36–45. [Google Scholar] [CrossRef] [Green Version]
- Rogers, M.K. A two-dimensional circumplex approach to the development of a hacker taxonomy. Digit. Investig. 2006, 3, 97–102. [Google Scholar] [CrossRef]
- Snyder, P.; Vault, A. Playing hackers at their own game. Netw. Secur. 2016, 2016, 14–16. [Google Scholar] [CrossRef]
- Peng, R.; Xiao, H.; Guo, J.; Lin, C. Optimal defense of a distributed data storage system against hackers’ attacks. Reliab. Eng. Syst. Saf. 2020, 197, 106790. [Google Scholar] [CrossRef]
- Trump, D. National Cyber Strategy of the United States of America; The White House: Washington, DC, USA, 2018. [Google Scholar]
- Im, N.K.; Nguyen, V.S. Artificial neural network controller for automatic ship berthing using head-up coordinate system. Int. J. Nav. Archit. Ocean Eng. 2018, 10, 235–249. [Google Scholar] [CrossRef]
- Palma, D. Enabling the maritime Internet of Things: CoAP and 6LoWPAN performance over VHF links. IEEE Internet Things J. 2018, 5, 5205–5212. [Google Scholar] [CrossRef] [Green Version]
- Ozturk, U.; Birbil, S.I.; Cicek, K. Evaluating navigational risk of port approach manoeuvrings with expert assessments and machine learning. Ocean Eng. 2019, 192, 106558. [Google Scholar] [CrossRef]
- Vicen-Bueno, R.; Carrasco-Álvarez, R.; Rosa-Zurera, M.; Nieto-Borge, J.C.; Jarabo-Amores, M.P. Artificial neural network-based clutter reduction systems for ship size estimation in maritime radars. EURASIP J. Adv. Signal Process. 2010, 2010, 380473. [Google Scholar] [CrossRef] [Green Version]
- Khellal, A.; Ma, H.; Fei, Q. Convolutional neural network based on extreme learning machine for maritime ships recognition in infrared images. Sensors 2018, 18, 1490. [Google Scholar] [CrossRef] [Green Version]
- Vozikis, D.; Darra, E.; Kuusk, T.; Kavallieros, D.; Reintam, A.; Bellekens, X. On the Importance of Cyber-Security Training for Multi-Vector Energy Distribution System Operators. In Proceedings of the 15th International Conference on Availability, Reliability and Security, Virtual, 25–28 August 2020; Association for Computing Machinery: New York, NY, USA, 2020. [Google Scholar] [CrossRef]
- Lallie, H.S.; Shepherd, L.A.; Nurse, J.R.; Erola, A.; Epiphaniou, G.; Maple, C.; Bellekens, X. Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput. Secur. 2021, 105, 102248. [Google Scholar] [CrossRef]
- Report: Maritime Cyberattacks Up by 400 Percent. Available online: https://maritime-executive.com/article/report-maritime-cyberattacks-up-by-400-percent (accessed on 12 December 2020).
- John, A.; Nwaoha, T. Safety critical maritime infrastructure systems resilience: A critical review. Int. J. Marit. Eng. 2016, 158, 209–218. [Google Scholar] [CrossRef]
- Olba, X.B.; Daamen, W.; Vellinga, T.; Hoogendoorn, S.P. State-of-the-art of port simulation models for risk and capacity assessment based on the vessel navigational behaviour through the nautical infrastructure. J. Traffic Transp. Eng. 2018, 5, 335–347. [Google Scholar]
- Yang, R.; Jiang, L. Technology Research and Experimental Simulation of Energy Management System for Diesel Electric Hybrid Ship. In Proceedings of the 2020 IEEE 5th Information Technology and Mechatronics Engineering Conference (ITOEC), Chongqing, China, 12–14 June 2020; pp. 671–675. [Google Scholar]
- Perabo, F.; Zadeh, M.K. Modelling of a Shipboard Electric Power System for Hardware-in-the-Loop Testing. In Proceedings of the 2020 IEEE Transportation Electrification Conference & Expo (ITEC), Chicago, IL, USA, 23–26 June 2020; pp. 69–74. [Google Scholar]
- Markopoulos, E.; Luimula, M.; Porramo, P.; Pisirici, T.; Kirjonen, A. Virtual Reality (VR) safety education for ship engine training on maintenance and safety (ShipSEVR). In Proceedings of the International Conference on Applied Human Factors and Ergonomics, San Diego, CA, USA, 16 July 2020; pp. 60–72. [Google Scholar]
- Alanen, J.; Isotalo, M.; Kuittinen, N.; Simonen, P.; Martikainen, S.; Kuuluvainen, H.; Honkanen, M.; Lehtoranta, K.; Nyyssönen, S.; Vesala, H.; et al. Physical Characteristics of Particle Emissions from a Medium Speed Ship Engine Fueled with Natural Gas and Low-Sulfur Liquid Fuels. Environ. Sci. Technol. 2020, 54, 5376–5384. [Google Scholar] [CrossRef]
- Billard, D. Investigation of an alleged PLC hacking on sea vessels. J. Phys. Conf. Ser. 2019, 1297, 012035. [Google Scholar] [CrossRef]
- Sawada, R.; Hirata, K.; Kitagawa, Y.; Saito, E.; Ueno, M.; Tanizawa, K.; Fukuto, J. Path following algorithm application to automatic berthing control. J. Mar. Sci. Technol. 2021, 26, 541–554. [Google Scholar] [CrossRef]
- Zhao, J.; Zhang, Y.; Yang, Z.; Liu, Y.; Peng, S.; Hong, N.; Hu, J.; Wang, T.; Mao, H. A comprehensive study of particulate and gaseous emissions characterization from an ocean-going cargo vessel under different operating conditions. Atmos. Environ. 2020, 223, 117286. [Google Scholar] [CrossRef]
- Felski, A.; Jaskólski, K.; Zwolak, K.; Piskur, P. Analysis of Satellite Compass Error’s Spectrum. Sensors 2020, 20, 4067. [Google Scholar] [CrossRef] [PubMed]
- Niklaus, M.; Zhan, K.; Wagner, J.F. Gyrolog–Creating a 3-Dimensional Digital Collection of Classical Gyro Instruments. In Proceedings of the 2019 DGON Inertial Sensors and Systems (ISS), Braunschweig, Germany, 10–11 September 2019; pp. 1–23. [Google Scholar]
- Zheng, Y.; Zhao, F.; Wang, Z. Fault diagnosis system of bridge crane equipment based on fault tree and Bayesian network. Int. J. Adv. Manuf. Technol. 2019, 105, 3605–3618. [Google Scholar] [CrossRef]
- Jo, J.H.; Kim, S. Key Performance Indicator Development for Ship-to-Shore Crane Performance Assessment in Container Terminal Operations. J. Mar. Sci. Eng. 2020, 8, 6. [Google Scholar] [CrossRef] [Green Version]
- Čampara, L.; Hasanspahić, N.; Vujičić, S. Overview of MARPOL ANNEX VI regulations for prevention of air pollution from marine diesel engines. SHS Web Conf. 2018, 58, 01004. [Google Scholar] [CrossRef]
- Bogens, K. GMDSS modernisation and e-navigation: Spectrum needs. In Proceedings of the ETSI Workshop Future Evaluation of Marine Communication, Sophia Antipolis, France, 7–8 November 2017; pp. 1–23. [Google Scholar]
- Kopacz, Z.; Morgas, W.; Urbanski, J. The maritime safety system, its main components and elements. J. Navig. 2001, 54, 199. [Google Scholar] [CrossRef]
- Kochanski, R.J.; Paige, J.L. Safenet: The standard and its application. IEEE LCS 1991, 2, 46–51. [Google Scholar] [CrossRef]
- Grant, A.; Williams, P.; Shaw, G.; De Voy, M.; Ward, N. Understanding GNSS availability and how it impacts maritime safety. In Proceedings of the Institute of Navigation International Technical Meeting, San Diego, CA, USA, 24–26 January 2011; pp. 687–695. [Google Scholar]
- Zhang, C.; Guo, C.; Zhang, D. Ship navigation via GPS/IMU/LOG integration using adaptive fission particle filter. Ocean Eng. 2018, 156, 435–445. [Google Scholar] [CrossRef]
- DeSanto, J.B.; Chadwell, C.D.; Sandwell, D.T. Kinematic post-processing of ship navigation data using precise point positioning. J. Navig. 2019, 72, 795–804. [Google Scholar] [CrossRef]
- Suárez-Alemán, A. Short sea shipping in today’s Europe: A critical review of maritime transport policy. Marit. Econ. Logist. 2016, 18, 331–351. [Google Scholar] [CrossRef]
- Yu, L.; Xing, Z. A GPS/GLONASS/INS data fusion algorithm. Sci. Surv. Mapp. 2017, 5. Available online: https://en.cnki.com.cn/Article_en/CJFDTotal-CHKD201709005.htm (accessed on 11 November 2021).
- Schuster, M.; Blaich, M.; Reuter, J. Collision avoidance for vessels using a low-cost radar sensor. IFAC Proc. Vol. 2014, 47, 9673–9678. [Google Scholar] [CrossRef] [Green Version]
- Wilthil, E.F.; Flåten, A.L.; Brekke, E.F.; Breivik, M.; Breivik, M. Radar-based maritime collision avoidance using dynamic window. In Proceedings of the 2018 IEEE Aerospace Conference, Big Sky, MT, USA, 3–10 March 2018; pp. 1–9. [Google Scholar]
- Updating Your ECDIS Using Email. 2017. Available online: https://www.youtube.com/watch?v=Tam_lu-ySTA (accessed on 11 November 2021).
- How to: Update Your ECDIS and Planning Station Permits and Data in ‘Working Folio’ via an Automatic AVCS/ARCS Weekly Update Email. 2017. Available online: https://www.admiralty.co.uk/AdmiraltyDownloadMedia/eNav%20Docs/20150205_WorkingFolio_V01.pdf (accessed on 11 November 2021).
- Talley, W.K.; Ng, M. Note: Determinants of cargo port, hinterland cargo transport and port hinterland cargo transport service chain choices by service providers. Transp. Res. Part E Logist. Transp. Rev. 2020, 137, 101921. [Google Scholar] [CrossRef]
- Johnson, D. System and Method for Tracking Ships and Ship Cargo. U.S. Patent US20100121770A1, 13 May 2010. [Google Scholar]
- Yang, H. General Technology of Cargo Ship. In Manned Spacecraft Technologies; Springer: Berlin/Heidelberg, Germany, 2021; pp. 57–98. [Google Scholar]
- Perez, H.M.; Chang, R.; Billings, R.; Kosub, T.L. Automatic identification systems (AIS) data use in marine vessel emission estimation. In Proceedings of the 18th Annual International Emission Inventory Conference, Baltimore, MD, USA, 14–17 April 2009; Volume 14, p. e17. [Google Scholar]
- Lee, E.; Mokashi, A.J.; Moon, S.Y.; Kim, G. The maturity of Automatic Identification Systems (AIS) and its implications for innovation. J. Mar. Sci. Eng. 2019, 7, 287. [Google Scholar] [CrossRef] [Green Version]
- Carson-Jackson, J. Satellite AIS—Developing technology or existing capability? J. Navig. 2012, 65, 303–321. [Google Scholar] [CrossRef] [Green Version]
- Simoncic, R.; Weaver, A.C.; Cain, B.G.; Colvin, M.A. Shipnet: A real-time local area network for ships. In Proceedings of the 13th Conference on Local Computer Networks, Minneapolis, MN, USA, 10–12 October 1988; pp. 424–432. [Google Scholar]
- Sun, S.; Lu, Z.; Liu, W.; Hu, W.; Li, R. Shipnet for semantic segmentation on vhr maritime imagery. In Proceedings of the IGARSS 2018 IEEE International Geoscience and Remote Sensing Symposium, Valencia, Spain, 22–27 July 2018; pp. 6911–6914. [Google Scholar]
- Green, D.T.; Marlow, D.T. SAFENET—A LAN for Navy mission critical systems. In Proceedings of the 14th Conference on Local Computer Networks, Mineapolis, MN, USA, 10–12 October 1989; pp. 340–346. [Google Scholar]
- Paige, J.L. SAFENET—A navy approach to computer networking. In Proceedings of the 15th Conference on Local Computer Networks, Minneapolis, MN, USA, 30 September–3 October 1990; pp. 268–273. [Google Scholar]
- Thomsett, D. The evolution of successful C3I systems. J. Nav. Eng. 1993, 34, 299–307. [Google Scholar]
- Carley, K.M.; Ren, Y.; Krackhardt, D. Measuring and modeling change in C3I architecture. In Proceedings of the 2000 Command and Control Research and Technology Symposium, Monterey, CA, USA, 26–28 June 2000; pp. 26–28. [Google Scholar]
- Lister, J.; Rosie, J. A digital maritime integrated internal communication system. J. Nav. Eng. 1995, 35, 504–519. [Google Scholar]
- Källberg, B.; Stråhle, R. Ship system 2000, a stable architecture under continuous evolution. In Proceedings of the International Conference on Reliable Software Technologies, Leuven, Belgium, 14–18 May 2001; pp. 371–379. [Google Scholar]
- Young, S.; Gubbins, V. Smart ship and reduced manning in the United States Navy. J. Nav. Eng. 1997, 37, 226–239. [Google Scholar]
- Zhu, W.; Fan, Y.; Ban, S. Designing Security Architecture of Total Ship Computing Environment Based on Mimic Defense. J. Digit. Technol. Appl. 2018. Available online: https://en.cnki.com.cn/Article_en/CJFDTotal-SZJT201801111.htm (accessed on 11 November 2021).
- Ukwandu, E.; Farah, M.A.B.; Hindy, H.; Bures, M.; Atkinson, R.; Tachtatzis, C.; Bellekens, X. Cyber-Security Challenges in Aviation Industry: A Review of Current and Future Trends. arXiv 2021, arXiv:2107.04910. [Google Scholar]
- Carlan, V.; Sys, C.; Vanelslander, T. How port community systems can contribute to port competitiveness: Developing a cost–benefit framework. Res. Transp. Bus. Manag. 2016, 19, 51–64. [Google Scholar] [CrossRef]
- Long, A. Port community systems. World Cust. J. 2009, 3, 63–67. [Google Scholar]
- Aydogdu, Y.V.; Aksoy, S. A study on quantitative benefits of port community systems. Marit. Policy Manag. 2015, 42, 1–10. [Google Scholar] [CrossRef]
- Tijan, E.; Agatić, A.; Jović, M.; Aksentijević, S. Maritime National Single Window—A Prerequisite for Sustainable Seaport Business. Sustainability 2019, 11, 4570. [Google Scholar] [CrossRef] [Green Version]
- Simão, J.C.D.; da Anunciação, P.F. Port Single Window and Logistics Single Window: Two Competitiveness Proposals in the Port Value Chain. In Handbook of Research on Information Management for Effective Logistics and Supply Chains; IGI Global: Hershey, PA, USA, 2017; pp. 316–333. [Google Scholar]
- Henesey, L.; Wernstedt, F.; Davidsson, P. Market-driven control in container terminal management. In Proceedings of the 2nd International Conference on Computer Applications and Information Technology in the Maritime Industries, Hamburg, Germany, 14–17 May 2003; pp. 377–386. Available online: https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.15.2593&rep=rep1&type=pdf (accessed on 11 November 2021).
- Dragović, B.; Tzannatos, E.; Park, N.K. Simulation modelling in ports and container terminals: Literature overview and analysis by research field, application area and tool. Flex. Serv. Manuf. J. 2017, 29, 4–34. [Google Scholar] [CrossRef]
- Balduzzi, M.; Pasta, A.; Wilhoit, K. A security evaluation of AIS automated identification system. In Proceedings of the 30th Annual Computer Security Applications Conference, New Orleans, LA, USA, 8–12 December 2014; pp. 436–445. [Google Scholar]
- Iphar, C.; Napoli, A.; Ray, C. Detection of false AIS messages for the improvement of maritime situational awareness. In Proceedings of the Oceans 2015-MTS/IEEE Washington, Washington, DC, USA, 19–22 October 2015; pp. 1–7. [Google Scholar]
- Coleman, J.; Kandah, F.; Huber, B. Behavioral Model Anomaly Detection in Automatic Identification Systems (AIS). In Proceedings of the 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 6–8 January 2020; pp. 481–487. [Google Scholar]
- Dembovskis, A. AIS Message Extraction from Overlapped AIS Signals for SAT-AIS Applications. Ph.D. Thesis, Universität Bremen, Bremen, Germany, 2015. [Google Scholar]
- Hu, Q.; Jiang, Y.; Zhang, J.; Sun, X.; Zhang, S. Development of an automatic identification system autonomous positioning system. Sensors 2015, 15, 28574–28591. [Google Scholar] [CrossRef] [Green Version]
- Prévost, R.; Coulon, M.; Bonacci, D.; LeMaitre, J.; Millerioux, J.P.; Tourneret, J.Y. Cyclic redundancy check-based detection algorithms for automatic identification system signals received by satellite. Int. J. Satell. Commun. Netw. 2013, 31, 157–176. [Google Scholar] [CrossRef] [Green Version]
- Oligeri, G.; Sciancalepore, S.; Di Pietro, R. GNSS Spoofing Detection via Opportunistic IRIDIUM Signals. arXiv 2020, arXiv:2006.10284. [Google Scholar]
- Qiao, Y.; Zhang, Y.; Du, X. A vision-based GPS-spoofing detection method for small UAVs. In Proceedings of the 2017 13th International Conference on Computational Intelligence and Security (CIS), Hong Kong, China, 15–18 December 2017; pp. 312–316. [Google Scholar]
- Dobryakova, L.A.; Lemieszewski, Ł.S.; Ochin, E.F. GNSS spoofing detection using static or rotating single-antenna of a static or moving victim. IEEE Access 2018, 6, 79074–79081. [Google Scholar] [CrossRef]
- Bhatti, J.; Humphreys, T.E. Hostile control of ships via false GPS signals: Demonstration and detection. NAVIGATION J. Inst. Navig. 2017, 64, 51–66. [Google Scholar] [CrossRef]
- Abramowski, T.; Bilewski, M.; Dobryakova, L.; Ochin, E.; Uriasz, J.; Zalewski, P. Detection of Spoofing Used against the GNSS-Like Underwater Navigation Systems. Preprints 2020. [Google Scholar] [CrossRef] [Green Version]
- Magiera, J.; Katulski, R. Detection and mitigation of GPS spoofing based on antenna array processing. J. Appl. Res. Technol. 2015, 13, 45–57. [Google Scholar] [CrossRef] [Green Version]
- Clark, J. Cybercrime in the Shipping Industry. A Present. Hill Dickinson LLP. 2018. Available online: Https://globalmaritimehub.Com/wp-Content/uploads/attach_908.Pdf (accessed on 11 November 2021).
- Mraković, I.; Vojinović, R. Maritime Cyber Security Analysis—How to Reduce Threats? Trans. Marit. Sci. 2019, 8, 132–139. [Google Scholar] [CrossRef] [Green Version]
- Vishwanath, A. Spear phishing: The tip of the spear used by cyber terrorists. In Combating Violent Extremism and Radicalization in the Digital Era; IGI Global: Hershey, PA, USA, 2016; pp. 469–484. [Google Scholar]
- Kolev, K.; Dimitrov, N. Cyber threats in maritime industry-situational awareness and educational aspect. In Proceedings of the Global Perspectives in MET: Towards Sustainable, Green and Integrated Maritime Transport, Varna, Bulgaria, 11–13 October 2017; pp. 352–360. Available online: https://www.semanticscholar.org/paper/CYBeR-tHReAt-In-MARItIMe-InDUStRY-%E2%80%93-SItUAtIonAL-AnD-Kolev-Dimitrov/6e92639d617f3aa54fdcdc260b2ac521ef9076c9 (accessed on 11 November 2021).
- Kessler, G.C. Cybersecurity in the Maritime Domain. USCG Proc. Mar. Saf. Secur. Counc. 2019, 76, 34. [Google Scholar]
- Bou-Harb, E.; Kaisar, E.I.; Austin, M. On the impact of empirical attack models targeting marine transportation. In Proceedings of the 2017 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS), Naples, Italy, 26–28 June 2017; pp. 200–205. [Google Scholar]
- Hindy, H.; Tachtatzis, C.; Atkinson, R.; Bayne, E.; Bellekens, X. Developing a Siamese network for intrusion detection systems. In Proceedings of the 1st Workshop on Machine Learning and Systems, Online, 26 April 2021; pp. 120–126. [Google Scholar]
- Lam, J.S.L.; Bai, X. A quality function deployment approach to improve maritime supply chain resilience. Transp. Res. Part E Logist. Transp. Rev. 2016, 92, 16–27. [Google Scholar] [CrossRef]
- Perez, G.F. Cyber Situational Awareness and Cyber Curiosity Taxonomy for Understanding Susceptibility of Social Engineering Attacks in the Maritime Industry. Ph.D. Thesis, Nova Southeastern University, Fort Lauderdale, FL, USA, 2019. [Google Scholar]
- Jensen, L. Challenges in maritime cyber-resilience. Technol. Innov. Manag. Rev. 2015, 5, 35. [Google Scholar] [CrossRef]
- Meyer-Larsen, N.; Müller, R. Enhancing the Cybersecurity of Port Community Systems. In Proceedings of the International Conference on Dynamics in Logistics, Bremen, Germany, 20–22 February 2018; pp. 318–323. [Google Scholar]
- Tam, K.; Jones, K.D. Maritime cybersecurity policy: The scope and impact of evolving technology on international shipping. J. Cyber Policy 2018, 3, 147–164. [Google Scholar] [CrossRef]
- König, S.; Rass, S.; Schauer, S. Cyber-attack impact estimation for a port. Digital Transformation in Maritime and City Logistics: Smart Solutions for Logistics. In Proceedings of the Hamburg International Conference of Logistics (HICL), Hamburg, Germany, 25–27 September 2019; Volume 28, pp. 164–183. [Google Scholar]
- Schauer, S.; Kalogeraki, E.M.; Papastergiou, S.; Douligeris, C. Detecting Sophisticated Attacks in Maritime Environments using Hybrid Situational Awareness. In Proceedings of the 2019 International Conference on Information and Communication Technologies for Disaster Management (ICT-DM), Paris, France, 18–20 December 2019; pp. 1–7. [Google Scholar]
- Guesmi, R.; Farah, M.B. A new efficient medical image cipher based on hybrid chaotic map and DNA code. Multimed. Tools Appl. 2021, 80, 1925–1944. [Google Scholar] [CrossRef]
- Lagouvardou, S. Maritime Cyber Security: Concepts, Problems and Models; Kongens Lyngby: Copenhagen, Denmark, 2018. [Google Scholar]
- Liu, G.; Sistemas, S.I.; Sistemas, S.I.; Sistemas, S.I. Internet of ships: The future ahead. World J. Eng. Technol. 2016, 4, 220. [Google Scholar] [CrossRef] [Green Version]
- Kedari, S.; Vuppalapati, J.S.; Ilapakurti, A.; Vuppalapati, C.; Kedari, S.; Vuppalapati, R. Precision Dairy Edge, Albeit Analytics Driven: A Framework to Incorporate Prognostics and Auto Correction Capabilities for Dairy IoT Sensors. In Proceedings of the Future of Information and Communication Conference, Singapore, 5–6 April 2018; pp. 506–521. [Google Scholar]
- Kamolov, A.; Park, S. An IoT-Based Ship Berthing Method Using a Set of Ultrasonic Sensors. Sensors 2019, 19, 5181. [Google Scholar] [CrossRef] [Green Version]
- Sahay, R.; Meng, W.; Estay, D.S.; Jensen, C.D.; Barfod, M.B. CyberShip-IoT: A dynamic and adaptive SDN-based security policy enforcement framework for ships. Future Gener. Comput. Syst. 2019, 100, 736–750. [Google Scholar] [CrossRef]
- Mileski, J.; Clott, C.; Galvao, C.B. Cyberattacks on ships: A wicked problem approach. Marit. Bus. Rev. 2018, 3, 414–430. [Google Scholar] [CrossRef] [Green Version]
- Wang, H.; Osen, O.L.; Li, G.; Li, W.; Dai, H.N.; Zeng, W. Big data and industrial internet of things for the maritime industry in northwestern norway. In Proceedings of the TENCON 2015—2015 IEEE Region 10 Conference, Macao, China, 1–4 November 2015; pp. 1–5. [Google Scholar]
- Al-Gumaei, K.; Schuba, K.; Friesen, A.; Heymann, S.; Pieper, C.; Pethig, F.; Schriegel, S. A survey of internet of things and big data integrated solutions for industrie 4.0. In Proceedings of the 2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA), Turin, Italy, 4–7 September 2018; Volume 1, pp. 1417–1424. [Google Scholar]
- Kim, K.I.; Jeong, J.S.; Park, G.K. Assessment of external force acting on ship using big data in maritime traffic. J. Korean Inst. Intell. Syst. 2013, 23, 379–384. [Google Scholar]
- Aydin, N.; Choi, Y.; Lekhavat, S.; Irani, Z.; Lee, H. A decision support system for vessel speed decision in maritimes logistics using weather archive big data. Comput. Oper. Res. 2018, 98, 330–342. [Google Scholar]
- Brouer, B.D.; Karsten, C.V.; Pisinger, D. Big data optimization in maritime logistics. In Big data Optimization: Recent Developments and Challenges; Springer: Berlin/Heidelberg, Germany, 2016; pp. 319–344. [Google Scholar]
- Nita, S.; Mihailescu, M. Importance of Big Data in Maritime Transport. Sci. Bull. Mircea Cel Batran Nav. Acad. 2017, 20, 556. [Google Scholar]
- Mirović, M.; Miličević, M.; Obradović, I. Big data in the maritime industry. NAŠE MORE Znan. Časopis Za More I Pomor. 2018, 65, 56–62. [Google Scholar]
- Dineva, K.; Atanasova, T. Security in IoT Systems. In Proceedings of the 19th International Multidisciplinary Scientific GeoConference SGEM 2019, Albena, Bulgaria, 28 June–7 July 2019; Volume 19, pp. 576–577. [Google Scholar]
- Stellios, I.; Kotzanikolaou, P.; Psarakis, M.; Alcaraz, C.; Lopez, J. A survey of iot-enabled cyberattacks: Assessing attack paths to critical infrastructures and services. IEEE Commun. Surv. Tutor. 2018, 20, 3453–3495. [Google Scholar] [CrossRef]
- Jović, M.; Tijan, E.; Aksentijević, S.; Čišić, D. An Overview of Security Challenges Of Seaport IoT Systems. In Proceedings of the 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 20–24 May 2019; pp. 1349–1354. [Google Scholar]
- Formby, D.; Durbha, S.; Beyah, R. Out of control: Ransomware for industrial control systems. In Proceedings of the RSA Conference, San Francisco, CA, USA, 14–17 February 2017. [Google Scholar]
- Liu, D. Autonomous Vessel Technology, Safety, and Ocean Impacts. In The Future of Ocean Governance and Capacity Development; Brill Nijhoff: Leiden, The Netherlands, 2019; pp. 490–494. [Google Scholar]
- Gu, Y.; Goez, J.C.; Guajardo, M.; Wallace, S.W. Autonomous vessels: State of the art and potential opportunities in logistics. Int. Trans. Oper. Res. 2021, 28, 1706–1739. [Google Scholar] [CrossRef] [Green Version]
- Babica, V.; Sceulovs, D.; Rustenova, E. Digitalization in Maritime Industry: Prospects and Pitfalls. In Workshop on ICTE in Transportation and Logistics; Springer: Berlin/Heidelberg, Germany, 2019; pp. 20–27. [Google Scholar]
- Fernández Otero, R.M.; Bayliss-Brown, G.; Papathanassiou, M. Ocean literacy and knowledge transfer synergies in support of a sustainable Blue Economy. Front. Mar. Sci. 2019, 6, 646. [Google Scholar] [CrossRef]
- Hoffmann, J.; Sirimanne, S. Review of Maritime Transport; United Nations Conference on Trade and Development: Geneva, Switzerland, 2017; Available online: https://unctad.org/system/files/official-document/rmt2017_en.pdf (accessed on 11 November 2021).
- Lind-Olsen, M. 4 Digital Trends In The Maritime Industry; Dualog: Tromso, Norway, 2019. [Google Scholar]
Index | Title | Year | Comments | Ref. |
---|---|---|---|---|
1. | Collision-avoidance navigation systems for Maritime Autonomous Surface Ships: A state-of-the-art survey | 2021 | Overview of existing and future collision-avoidance navigation technologies. | [16] |
2. | The impact of COVID-19 pandemic: A review on maritime sectors in Malaysia | 2021 | This paper reviews the impact of COVID-19 pandemic on maritime sectors, specifically shipping, fisheries, maritime tourism and oil and gas sector. | [17] |
3. | C-Ports: A proposal for a comprehensive standardization and implementation plan of digital services offered by the “Port of the Future” | 2022 | A classification of C-Port services is proposed in the domains of vessel navigation, e-freight, mobility and sustainable growth strategies. | [18] |
4. | Ports’ technical and operational measures to reduce greenhouse gas emission and improve energy efficiency: A review | 2020 | Review of port technical and operational measures to reduce GHG emissions. | [19] |
5. | Decarbonisation of seaports: A review and directions for future research | 2021 | The paper provides a critical review of existing technologies and concepts that promote and contribute to the decarbonisation of seaports, including Smart Grids and Virtual Power Plants. | [20] |
6. | Evaluating cybersecurity risks in the maritime industry: a literature review | 2019 | This research paper identifies three maritime cyber threats, including the lack of training and experts, the use of outdated system and the risk of being hacker’s target. | [21] |
7. | Cybersecurity in ports: A conceptual approach | 2017 | The study is a conceptual analysis built upon a comprehensive literature review. The results show that regardless of the growing awareness of the issue, much work needs to be performed in order to mitigate cyberthreats in ports. | [22] |
8. | Industry 4.0 in the port and maritime industry: A literature review | 2020 | The article reviews the state of the art on new emerging technologies, summarizing how ports and terminals are deploying specific projects in the new era of smart ports and Ports 4.0. | [23] |
9. | Cybersecurity in logistics and supply chain management: An overview and future research directions | 2021 | This paper reviews studies on measures that enhance cybersecurity in logistics and supply chain management. | [24] |
10. | Cyber Risk Perception in the Maritime Domain: A Systematic Literature Review | 2021 | This paper aims to present an approach to investigate cyber risk perception with use of recognized psychological models and to provide an overview of state-of-the-art research within the field of cyber risk perception in general and in the context of the maritime domain. | [25] |
11. | The CAN Bus in the Maritime Environment—Technical Overview and Cybersecurity Vulnerabilities | 2021 | This paper is a technical overview describing CAN bus standards and operations, with particular attention to its use with the NMEA 2000 maritime communications standard. | [26] |
12. | COVID-19 digitization in maritime: understanding cyber risks | 2021 | This paper reviews current events and introduces an exercise where participants at a NATO Centre of Excellency were shown scenarios involving maritime cyber incidents and evaluated cyber risk perception. | [27] |
13. | Big data and artificial intelligence in the maritime industry: a bibliometric review and future research directions | 2020 | This study provides a bibliometric review of 279 studies on the applications of Big data and artificial intelligence (AI) in the maritime industry. | [28] |
14. | Autonomous technologies in short sea shipping: trends, feasibility and implications | 2019 | This paper is a comprehensive literature review on the issues faced by the short sea shipping (SSS) industry. A model is developed to explore potential savings of removing crew and use of autonomous technologies. | [29] |
15. | Innovation and maritime transport: A systematic review | 2020 | This paper performs a systematic review aiming to understand recent innovation studies in the maritime sector. | [29] |
16. | A Conceptual Review of Cyber-Operations for the Royal Navy | 2018 | This paper discusses the nature of the threats faced by national-security institutions and the doctrinal factors that policy makers must consider. | [30] |
17. | Internet of Ships: A Survey on Architectures, Emerging Applications, and Challenges | 2020 | A comprehensive survey of the IoS paradigm, its architecture, its key elements and its main characteristics. Furthermore, a review of the state of the art for its emerging applications is presented. | [31] |
18. | Marine Vision-Based Situational Awareness Using Discriminative Deep Learning: A Survey | 2021 | The paper summarizes the progress made in four aspects of current research: full scene parsing of an image, target vessel re-identification, target vessel tracking and multimodal data fusion with data from visual sensors. | [32] |
19. | Maritime 4.0-Opportunities in Digitalization and Advanced Manufacturing for Vessel Development | 2020 | The paper introduces a descriptive approach for understanding Maritime 4.0. | [33] |
20. | Cybersecurity and Safety Co-Engineering of Cyberphysical Systems-A Comprehensive Survey | 2020 | The paper provides a comprehensive survey of safety and cyber security co-engineering methods. | [34] |
Index | Type of Cyber-Attack | Year | Location and Description | Ref. |
---|---|---|---|---|
1. | Ransomware attack/fishing attack | 12 June 2021 | South Korea’s national flagship carrier HMM: Cyber attack resulting in limited access to the email outlook system. | [36] |
2. | Ransomware attack | May 2020 | Hormuz Port: The attempted cyber attack damaged some operating systems at the ports. | [37] |
3. | Malware attack | 10 April 2020 | Mediterranean Shipping Company (MSC): For security issues servers of MSC were closed down to protect the data of the company, and, as a result, the website of the company was taken down. The attack disturbed only internal data processes. | [38] |
4. | Malware attack | 8 July 2019 | The attack targeted a U.S. vessel, causing critical credential mining. The Coast Guard and the FBI reported that the lack of security strategies on the vessel was the main reason for such an attack. It has been noticed that all crew on the vessel shared the same login and password of the vessel’s computer. Moreover, the use of external devices facilitated the task of the hacker. Another critical mistake is the lack of antivirus. | [39] |
5. | Phishing attack | 2019 | Hackers obtained unauthorized access to the computer systems of James Fisher and Sons Pls (UK). | [40] |
6. | Ransomware attack | 2018 | Chinese hackers had attacked US Navy contractors. | [41] |
7. | Petya Ransomware | 27 June 2017 | The attack named Petya affected computer servers in Europe and India. The encrypted malware has been targeted at all services of the Maersk shipping company. As a result, 17 shipping container terminals had been affected and more than USD 200 million was lost. The attack severely destroyed the operating system of the computers by infecting its master boot record (MBR). | [42] |
8. | GPS spoofing attack | 25 August 2017 | The attack is reported by U.S. maritime administration. The GPS of a ship in the Russian port of Novorossiysk indicated a wrong localization. The attack is probably a test of a new GPS spoofing system. | [43] |
9. | Navigation Systems attack | June 2017 | A collision between the USS Fitzgerald and a container ship, causing the death of 7 sailors. (the coast of Japan) | [44] |
10. | Navigation Systems attack | June 2017 | A collision between an oil tanker and the USS John S. McCain near the Malaysian coast: the death of 10 sailors. | [45] |
11. | Navigation Systems attack | May 2017 | A collision between USS Lake Champlain and South Korean fishing ship. | [46] |
12. | GPS spoofing | 2013 | Experience realized by a research team at the University of Texas to spoof a Yacht. | [47] |
13. | A computer virus inside the control systems | October 2012 | Communication networks installed on the offshore oil and gas platform in the Persian Gulf | [48] |
14. | Phishing attacks | 2010–2013 | The cyber criminals developed a backdoor entry which was called Fucobha: the Icefog (Japanese and South Korean) | [49] |
15. | Ransomware attack | August 2011 | The shipping lines IRISL (Islamic Republic of Iran Shipping lines) | [50] |
16. | Phishing attack | June 2011–2013 | Port of Antwerp in Belgium: An organised crime group used hackers based in Belgium to control the computer networks of companies operating in the port of Antwerp. | [51] |
Power and Electronic Components | Communication Components | Services and Management |
---|---|---|
PLCs | ECDIS | Cargo Management |
SCADA | GPS | Nautical Decision Support |
Power Management | VHF antenna | Bon Voyage System (BVS) |
Engine | IDS | Voyage Data Recorder (VDR/S-DR) |
Water Ingress Detection System | The Ship Information System (SIS) | Fleet Management System (FMS) |
Bow thrusters | Navigation Equipment | Passenger/Visitor Services and M.S |
Propulsion, machinery, and power control systems | Passenger-facing networks | |
Engine Control Room Console | Internal Communication | |
Engine Governor System | ||
Access Control Systems
| Core Infrastructure
| |
Emergency Response System | Integrated Bridge systems | |
Air Condition Plant | RADAR | |
Sewage Treatment Plant | Echosounder | |
Anchor and Mooring Winch Control System |
Network | Specification | Ref. |
---|---|---|
SHIPNET | A real-time messaging system/IEEE 802.2 LLC and 802.5 standard | [110,111] |
SAFENET | Survivable Adaptable Fiber optic Embedded NETwork/US Navy’s combat ships | [94,112,113] |
C3I system | Command, Control, Communication and Intelligence/Supervisor controller systems | [114,115] |
RICE 10 | Digital internal communications system | [116] |
SHIP system 2000 | Using nodes for routing | [117] |
Smart Ship | linking the different systems by the the ship area networks | [118] |
TSCE | Total Ship Computing Environment | [119] |
Index | Localization | Attacks | Vulnerabilities | S.I | ||
---|---|---|---|---|---|---|
C | I | A | ||||
1. | AIS | Liste 1:
| Liste 1:
| • | ∘ | • |
2. | R and RC | Liste 1:
| Liste 1:
| • | • | • |
3. | PM/PCS | Liste 1:
| Liste 1:
| ∘ | ∘ | • |
4. | AS | Liste 1:
| Liste 1:
| • | ∘ | ∘ |
5. | Al.S | Liste 1:
| Liste 1:
| • | ∘ | • |
6. | CMS | Liste 1:
| Liste 1:
| • | • | ∘ |
7. | B.S | Liste 1:
| Liste 1:
| ∘ | ∘ | • |
8. | PCMS | Liste 1:
| Liste 1:
| • | • | • |
9. | PPN | Liste 1:
| Liste 1:
| • | • | • |
10. | ACWS | Liste 1:
| Liste 1:
| • | • | • |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ben Farah, M.A.; Ukwandu, E.; Hindy, H.; Brosset, D.; Bures, M.; Andonovic, I.; Bellekens, X. Cyber Security in the Maritime Industry: A Systematic Survey of Recent Advances and Future Trends. Information 2022, 13, 22. https://doi.org/10.3390/info13010022
Ben Farah MA, Ukwandu E, Hindy H, Brosset D, Bures M, Andonovic I, Bellekens X. Cyber Security in the Maritime Industry: A Systematic Survey of Recent Advances and Future Trends. Information. 2022; 13(1):22. https://doi.org/10.3390/info13010022
Chicago/Turabian StyleBen Farah, Mohamed Amine, Elochukwu Ukwandu, Hanan Hindy, David Brosset, Miroslav Bures, Ivan Andonovic, and Xavier Bellekens. 2022. "Cyber Security in the Maritime Industry: A Systematic Survey of Recent Advances and Future Trends" Information 13, no. 1: 22. https://doi.org/10.3390/info13010022
APA StyleBen Farah, M. A., Ukwandu, E., Hindy, H., Brosset, D., Bures, M., Andonovic, I., & Bellekens, X. (2022). Cyber Security in the Maritime Industry: A Systematic Survey of Recent Advances and Future Trends. Information, 13(1), 22. https://doi.org/10.3390/info13010022