• Title/Summary/Keyword: Security Navigation

Search Result 373, Processing Time 0.033 seconds

A Security Architecture of the inter-VTS System for shore side collaboration of e-Navigation (안전한 e-Navigation을 위한 해상교통관제 시스템의 정보교환 보안구조 설계)

  • Lee, Byung-Gil;Han, Jong-Wook;Cho, Hyun-Suk;Park, Nam-Je
    • Journal of Navigation and Port Research
    • /
    • v.36 no.1
    • /
    • pp.1-7
    • /
    • 2012
  • A concept of the "e-Navigation" was introduced in 2005 and implementation strategies are under way by IMO/IALA in the maritime safety area. Specially VTS is an important maritime traffic monitoring and aids to navigation system which is aims to improve safety, navigation efficiency and protect the marine environment. The demand of the inter-VTS networking has been increased and standardization is underway for realization of shore side collaboration for maritime safety in IALA. But there may be security problems in the inter-VTS networks if they have not proper security mechanism. The hacking of realtime ship position and sensitive maritime surveillance information caused a critical accident of vessel, human life and environment by terrorist. This paper aims to design of a secure inter-VTS network structure and related security protocol for secure sharing of sensitive maritime data.

Virtual Network Embedding through Security Risk Awareness and Optimization

  • Gong, Shuiqing;Chen, Jing;Huang, Conghui;Zhu, Qingchao;Zhao, Siyi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.2892-2913
    • /
    • 2016
  • Network virtualization promises to play a dominant role in shaping the future Internet by overcoming the Internet ossification problem. However, due to the injecting of additional virtualization layers into the network architecture, several new security risks are introduced by the network virtualization. Although traditional protection mechanisms can help in virtualized environment, they are not guaranteed to be successful and may incur high security overheads. By performing the virtual network (VN) embedding in a security-aware way, the risks exposed to both the virtual and substrate networks can be minimized, and the additional techniques adopted to enhance the security of the networks can be reduced. Unfortunately, existing embedding algorithms largely ignore the widespread security risks, making their applicability in a realistic environment rather doubtful. In this paper, we attempt to address the security risks by integrating the security factors into the VN embedding. We first abstract the security requirements and the protection mechanisms as numerical concept of security demands and security levels, and the corresponding security constraints are introduced into the VN embedding. Based on the abstraction, we develop three security-risky modes to model various levels of risky conditions in the virtualized environment, aiming at enabling a more flexible VN embedding. Then, we present a mixed integer linear programming formulation for the VN embedding problem in different security-risky modes. Moreover, we design three heuristic embedding algorithms to solve this problem, which are all based on the same proposed node-ranking approach to quantify the embedding potential of each substrate node and adopt the k-shortest path algorithm to map virtual links. Simulation results demonstrate the effectiveness and efficiency of our algorithms.

Cybersecurity Development Status and AI-Based Ship Network Security Device Configuration for MASS

  • Yunja Yoo;Kyoung-Kuk Yoon;David Kwak;Jong-Woo Ahn;Sangwon Park
    • Journal of Navigation and Port Research
    • /
    • v.47 no.2
    • /
    • pp.57-65
    • /
    • 2023
  • In 2017, the International Maritime Organization (IMO) adopted MSC.428 (98), which recommends establishing a cyber-risk management system in Ship Safety Management Systems (SMSs) from January 2021. The 27th International Association of Marine Aids to Navigation and Lighthouse Authorities (IALA) also discussed prioritizing cyber-security (cyber-risk management) in developing systems to support Maritime Autonomous Surface Ship (MASS) operations (IALA guideline on developments in maritime autonomous surface ships). In response to these international discussions, Korea initiated the Korea Autonomous Surface Ship technology development project (KASS project) in 2020. Korea has been carrying out detailed tasks for cybersecurity technology development since 2021. This paper outlines the basic concept of ship network security equipment for supporting MASS ship operation in detailed task of cybersecurity technology development and defines ship network security equipment interface for MASS ship applications.

Satellite Navigation Systems, As The Development Of Digitalization Of The Marine Corridor

  • Vorokhobin, Igor;Burmaka, Igor;Ivanov, Oleksandr;Perepechayev, Sergiy;Naboka, Ivan;Kulakov, Maksym
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.241-247
    • /
    • 2021
  • In the article, an analysis of the factors was carried out, which injected into the efficiency of the function of navigation systems in the minds of unimportance. Carrying out analyzes allowing for the visibility of relevant direct adjustments to the effectiveness of the function Inertial navigation systems in the minds of non-value. The designation of the navigation system was assigned to a complex of navigation systems on ships processing of the vector of navigation parameters, so that they can be victorious in the control systems of the ship's collapse, and the safety of floating is safe.

A Study on Geodata Trace of Navigation Application in Smart Devices (스마트 기기에 설치된 내비게이션 어플리케이션의 위치 정보 흔적 연구)

  • Yeon, KyuChul;Kim, Moon-Ho;Kim, Dohyun;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.109-115
    • /
    • 2016
  • Nowadays, smart devices are the target of the digital forensic investigation. Among various smart devices, we can obtain much information from smart phone which is provided with continuous power and used for data communication. This paper deals with the traces to be left in Android smart phones after using the navigation applications with the GPS function. We selected navigation applications(domestic and overseas) which have a high number of download times, anaylzed them and discussed the meaning of the analysis result in digital forensic investigation.

A Study on the Inertial Navigation System Technology (관성항법장치 기술에 관한 연구)

  • Lee, Young-Uk
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.87-94
    • /
    • 2008
  • In this paper, a study on the inertial navigation system technology in guided weapon system development. Navigation devices are being used more commonly in places. Inertial navigation devices attached to them are used as weapons systems have a lot of interest in the development of devices for research and development accelerated. Therefore, this paper will encourage the development of weapon systems Inertial navigation device trends, features and configuration, type, techniques for research work.

  • PDF

Maritime Navigation System: Technological Solutions to Ensure The Safety Of Maritime Navigation

  • Burmaka, Igor;Vorokhobin, Igor;Chimshir, Valentin;Burmaka, Oleksiy;Smyrnova, Iryna;Danylenko, Oleksandr
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.141-150
    • /
    • 2021
  • The article assesses the level of navigation safety, in theoretical terms, defines the complexity of managing navigational risks in practice. The issues of assessing the navigational safety have been studied due to the importance and relevance of the issue in question, however, due to the great complexity of the problem under consideration, the article considers and indicates the directions for the development of the solution of the given direction, where, first of all, it became necessary to analyze the issue of assessing the levels of navigation risks when navigating vessels of various types in difficult navigation conditions.

A Study on the Enhancement of Maritime Security in Korea Maritime Jurisdiction

  • Lee Eun-Bang;Yun Jong-Hwui
    • Journal of Navigation and Port Research
    • /
    • v.29 no.7
    • /
    • pp.619-625
    • /
    • 2005
  • The security vulnerabilities in Korea maritime domain were mentioned and analysed with the static data of crimes relating to maritime security. The counterterrorism and initiatives to reduce the security risk and to minimize the damage are introduced and evaluated. The maritime security strategy and the near term initiatives to enhance the non-military security at Korean sea and ports are proposed in order to response maritime security threats economically, efficiently and safely.

Design and Implementation of PDA-based Image Surveillance System for Harbor Security using IP Camera

  • Shim, Joon-Hwan
    • Journal of Navigation and Port Research
    • /
    • v.31 no.9
    • /
    • pp.779-784
    • /
    • 2007
  • This paper describes a new progressive embedded Internet Protocol(IP) camera available for real-time image transmission. It was applied for ship safety and security on seashore area. The functions of developed embedded system was more effective and excellent than conventional systems. Nowadays, each nation has established harbor security systems to jump up their ports to international port. Recently Incheon port has tried to change man security into center security system used by image security system. The security system of Incheon port has some advantages like effectivity of security system and reduction of manpower and cost, installed by image security system with CCTV cameras at the entrance gate and around the fence. Thus in this paper, we have designed and implemented a Personal Digital Assistants(PDA) based Image Surveillance System for Harbor Security using IP Camera under ubiquitous environment. This system has big advantages which are more effective in an emergency and low cost and small manpower than conventional systems.

A Study on Comparative Analysis of Maritime Security Programs - Focussed on TWIC

  • Yoon, Dae-Gwun
    • Journal of Navigation and Port Research
    • /
    • v.33 no.4
    • /
    • pp.283-288
    • /
    • 2009
  • To improve maritime security and enhance international shipping commerce within US ports in addition to ISPS (International Ship and Port Facility Security Code), the TWIC (Transportation Worker Identification Credential) program is working on the maritime field from the October 15, 2008 in the United States. In this paper, the program is reviewed and investigated in terms of goal, benefit, solution, and related legislation so forth In addition, other maritime security programs including MMD (Merchant Mariner Document), FAST (Free and Secure Trade), SIDA (Security Identification Display Areas). and Air Cargo security program was analyzed and compared in order to obtain relationship and difference with the program in terms of enrollment frequency, list and method of security check, and profile of each program As a result of this paper, the program is mostly to improve maritime security, protect individual privacy, and enhance commerce rather than other programs.