TY - GEN
T1 - A Survey of Security Challenges in Automatic Identification System (AIS) Protocol
AU - Levy, Silvie
AU - Gudes, Ehud
AU - Hendler, Danny
N1 - Publisher Copyright:
© 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.
PY - 2023/1/1
Y1 - 2023/1/1
N2 - The world of maritime transport is a significant part of the global economy. Traffic control relies, among other means, on the Automatic Identification System (AIS) device, which reports dynamic and fixed data. Vessels use advanced cyber capabilities to falsify data that the AIS transmits and impersonate an innocent ship while carrying out illegal activity, especially the vessel’s location data, without control. A significant part of the work done to find false AIS reports looks for location reports. Each AIS device uses a transceiver based on SOTDMA (Self-Organized TDMA) and determines its transmission schedule (slot) based on data link traffic history and an awareness of other stations’ possible actions. The SOTDMA protocol was developed in the late 1990s and does not have built-in security features, which leaves communication networks vulnerable to cyber threats such as eavesdropping, tampering with data, unauthorized access, and cyber-attacks. This Protocol is widely used in wireless communication systems where no central authority manages the communication between nodes, dynamically adjusts to changes in network topology, and nodes can come and go at any time. This article reviews the cybersecurity challenges in the AIS protocol used in vessels. Most of those challenges imply a variety of areas using SOTDMA protocols like Wireless Sensors (WSNs), Mobile (MANETs), Military, Disaster Relief Networks, Healthcare Monitoring Systems, Industrial Automation Systems, Vehicle-to-Vehicle (V2V) Communication Networks, Wireless Metropolitan Area Networks (WMANs), Internet of Things (IoT) Networks, and Machine-to-Machine (M2M) Communication Networks.
AB - The world of maritime transport is a significant part of the global economy. Traffic control relies, among other means, on the Automatic Identification System (AIS) device, which reports dynamic and fixed data. Vessels use advanced cyber capabilities to falsify data that the AIS transmits and impersonate an innocent ship while carrying out illegal activity, especially the vessel’s location data, without control. A significant part of the work done to find false AIS reports looks for location reports. Each AIS device uses a transceiver based on SOTDMA (Self-Organized TDMA) and determines its transmission schedule (slot) based on data link traffic history and an awareness of other stations’ possible actions. The SOTDMA protocol was developed in the late 1990s and does not have built-in security features, which leaves communication networks vulnerable to cyber threats such as eavesdropping, tampering with data, unauthorized access, and cyber-attacks. This Protocol is widely used in wireless communication systems where no central authority manages the communication between nodes, dynamically adjusts to changes in network topology, and nodes can come and go at any time. This article reviews the cybersecurity challenges in the AIS protocol used in vessels. Most of those challenges imply a variety of areas using SOTDMA protocols like Wireless Sensors (WSNs), Mobile (MANETs), Military, Disaster Relief Networks, Healthcare Monitoring Systems, Industrial Automation Systems, Vehicle-to-Vehicle (V2V) Communication Networks, Wireless Metropolitan Area Networks (WMANs), Internet of Things (IoT) Networks, and Machine-to-Machine (M2M) Communication Networks.
UR - http://www.scopus.com/inward/record.url?scp=85164915847&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-34671-2_29
DO - 10.1007/978-3-031-34671-2_29
M3 - Conference contribution
AN - SCOPUS:85164915847
SN - 9783031346705
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 411
EP - 423
BT - Cyber Security, Cryptology, and Machine Learning - 7th International Symposium, CSCML 2023, Proceedings
A2 - Dolev, Shlomi
A2 - Gudes, Ehud
A2 - Paillier, Pascal
PB - Springer Science and Business Media Deutschland GmbH
T2 - 7th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2023
Y2 - 29 June 2023 through 30 June 2023
ER -