DOI QR코드

DOI QR Code

Cybersecurity Development Status and AI-Based Ship Network Security Device Configuration for MASS

  • Yunja Yoo (Division of Navigation Convergence Studies, Korea Maritime and Ocean University) ;
  • Kyoung-Kuk Yoon (Division of Maritime AI & Cyber Security, Korea Maritime and Ocean University) ;
  • David Kwak (5G Business Division, Penta Security Systems Inc.) ;
  • Jong-Woo Ahn (Cyber Certification Team, Korean Register) ;
  • Sangwon Park (Logistics and Maritime Industry Research Department, Korea Maritime Institute)
  • 투고 : 2023.03.09
  • 심사 : 2023.04.19
  • 발행 : 2023.04.30

초록

In 2017, the International Maritime Organization (IMO) adopted MSC.428 (98), which recommends establishing a cyber-risk management system in Ship Safety Management Systems (SMSs) from January 2021. The 27th International Association of Marine Aids to Navigation and Lighthouse Authorities (IALA) also discussed prioritizing cyber-security (cyber-risk management) in developing systems to support Maritime Autonomous Surface Ship (MASS) operations (IALA guideline on developments in maritime autonomous surface ships). In response to these international discussions, Korea initiated the Korea Autonomous Surface Ship technology development project (KASS project) in 2020. Korea has been carrying out detailed tasks for cybersecurity technology development since 2021. This paper outlines the basic concept of ship network security equipment for supporting MASS ship operation in detailed task of cybersecurity technology development and defines ship network security equipment interface for MASS ship applications.

키워드

과제정보

This study was supported by the 'Development of Autonomous Ship Technology(20200615)' funded by the Ministry of Oceans and Fisheries(MOF, Korea).

참고문헌

  1. BIMCO, CLIA, ICS, INTERCARGO, INTERMANAGER, INTERTANKO, IUMI, OCIMF and WSC(2018), The guidelines on cyber security onboard ships, Version 3.
  2. IALA(2021a), Report of the 27th session of the IALA e-navigation information services and communication, International Association of Marine Aids to Navigation and Lighthouse Authorities.
  3. IALA(2021b), IALA guideline on developments in maritime autonomous surface ships, ENAV27 working paper, International Association of Marine Aids to Navigation and Lighthouse Authorities.
  4. IMO(2017a), Guidelines on maritime cyber risk management, MSC-FAL.1(Circ.3), Annex, International Maritime Organization.
  5. IMO(2017b), Maritime cyber risk management in safety management systems, Resolution MSC.428 (98), Annex 10, International Maritime Organization.
  6. IMO(2021), Report of the maritime safety committee on its 104th session, MSC 104/24, International Maritime Organization.
  7. ISO/IEC(1994), Information technology - Open Systems Interconnection - Basic Reference Model: The Basic Model, ISO/IEC 7498-1, International Organization for Standardization/ International Electrotechnical Commission.
  8. Jo, Y. H. and Cha, Y. K.(2019), "A study on cyber security requirements of ship using threat modeling", Journal of The Korea Institute of Information Security & Cryptology, Vol. 29, No. 3, pp. 657-673.
  9. Jung, H. R., Chang, H. J. and Song, Y. E.(2019), "Trend of autonomous navigation technology for unmanned ship", Journal of Institute Control, Robotics and Systems, Vol. 25, No. 1, pp. 76-87. https://doi.org/10.5302/J.ICROS.2019.18.0133
  10. Kang, N. S.(2018), "Analysis of onboard ship cybersecurity", Journal of Korean Society of Marine Engineering, Vol. 42, No. 6, pp. 463-471. https://doi.org/10.5916/jkosme.2018.42.6.463
  11. KASS(2022), Introduction of KASS(Korea Autonomous Surface Ship) project, https:// kassproject.org/en/main.php, accessed in 30th Aug. 2022.
  12. Microsoft(2022), Windows Network Architecture and the OSI Model, https://docs.microsoft.com /enUS/windows-hardware/drivers/network/windowsnetwork-architecture-and-the-osi-model, accessed in 30th Aug. 2022.
  13. Yoo, J. W., Jo, Y. H. and Cha, Y. K.(2022), "Artificial intelligence for autonomous ship: Potential cyber treats and security", Journal of The Korea Institute of Information Security & Cryptology, Vol. 32, No. 2, pp. 447-463.