Redirigiendo al acceso original de articulo en 21 segundos...
ARTÍCULO
TITULO

Assessing Cyber Challenges of Maritime Navigation

Andrej Androjna    
Tanja Brcko    
Ivica Pavic and Harm Greidanus    

Resumen

This paper provides a close investigation into the landscape of both cyber threats and actual incidents in the maritime sector, identifying the cyber trends and challenges as they relate to safe navigation and marine shipping. As an important subset of cyber threats that impact many maritime systems, the vulnerabilities of satellite navigation systems, in particular the Global Positioning System (GPS), receive special attention. For this article, a systematic literature review was conducted, complemented by the research and analysis of a specific spoofing event. Analyzing available resources, we might summarize that a shift in mind-set is essential to direct more attention and resources toward cybersecurity as well as the necessity for manufacturers to improve the cybersecurity of their products, as shipping systems currently remain vulnerable to cybercriminals. There is a need for multiple positioning, navigation, and timing (PNT) systems onboard maritime vessels to complement GPS-only navigation. The use of multiple satellite navigation constellations, public as well as private, in combination with the terrestrial components of an enhanced LOng-RAnge Navigation (eLoran) system and ports? laser-based aid system for berthing and docking should provide the shipping industry with the direly needed increased protection from cyber-attackers for the foreseeable future.

 Artículos similares

       
 
Vladimir Bogatyrev and Aleksey Derkach    
The Markov model of reliability of a failover cluster performing calculations in a cyber-physical system is considered. The continuity of the cluster computing process in the event of a failure of the physical resources of the servers is provided on the ... ver más
Revista: Computers

 
Olusola Akinrolabu, Steve New and Andrew Martin    
Security and privacy concerns represent a significant hindrance to the widespread adoption of cloud computing services. While cloud adoption mitigates some of the existing information technology (IT) risks, research shows that it introduces a new set of ... ver más
Revista: Computers

 
Oleksandr Milov,Serhii Yevseiev,Volodymyr Aleksiyev,Polina Berdnik,Oleksandr Voitko,Valentyn Dyptan,Yevheniia Ivanchenko,Maxim Pavlenko,Anatolii Salii,Serhiy Yarovyy     Pág. 46 - 57
The results of modeling and analysis of scenarios of the behavior of interacting agents in conditions of cyber conflict are presented. General approaches to the development of a scenario of the behavior of antagonistic agents are presented. The definitio... ver más

 
Mikhail Buinevich and Andrei Vladyko    
During the last decade there has been an essential development of wireless communication technologies for intelligent transportation system (ITS) applications for motor transport; these advanced infocommunication technologies are called vehicular ad hoc ... ver más
Revista: Information

 
?????? ?????????? ?????, ????? ????????????? ????????, ????? ??????     Pág. 122 - 130
The subject matter of the article is an assessment of the threats of the marketing environment in the condition of a client-oriented approach to the management of enterprises in the construction industry implementation. The goal is to substantiate the sc... ver más