Skip to main content
Log in

Towards a secure automatic identification system (AIS)

  • Original article
  • Published:
Journal of Marine Science and Technology Aims and scope Submit manuscript

Abstract

The Automatic Identification System (AIS) is the emerging system for automatic traffic control and collision avoidance services in the maritime transportation sector. It is one of the cornerstone systems for improved marine domain awareness and is embedded in e-navigation, e-bridging, and autonomous ships proposals. However, AIS has some security vulnerabilities that can be exploited to invade privacy of passengers, to launch intentional collision attacks by pirates and terrorists, etc. In this work, we explore how Identity-Based Public Cryptography and Symmetric Cryptography may enhance the security properties of the AIS.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Notes

  1. e.g. http://www.marinetraffic.com.

  2. The MMSI (9-digits) is a number that, distinctively, identifies a vessel. The MMSI is assigned to all the radio communications of that vessel. The International Maritime Organization number (IMO-number) is, also, a distinctive identifier for the vessels and has the prefix “IMO” followed by 7-digits. The main difference is that the IMO-number is the only persistent identifier for a vessel, from the start of its life to the end of it. On the contrary, MMSI change when a vessel changes flag and registration authority.

  3. http://www.iala-aism.org/products-projects/e-navigation/.

References

  1. International Association of Marine Aids to Navigation and Lighthouse Authorities (IALA) (2016) “An overview of AIS,” International Association of Marine Aids to Navigation and Lighthouse Authorities (IALA), Saint Germain en Laye

  2. International Maritime Organization, “AIS transponders,” International Maritime Organization (2017) [Online]. Available: http://www.imo.org/en/OurWork/safety/navigation/pages/ais.aspx. Accessed 5 Nov 2017

  3. Guard USC, “Vessel Requirements for Notices of Arrival and Departure, and Automatic Identification System” Federal register, 30 January 2015

  4. European Union (2002) “Directive 2002/59/EC of the European Parliament and of the Council of 27 June 2002 establishing a Community vessel traffic monitoring and information system and repealing Council Directive 93/75/EE” Official Journal of the European Union, pp. L208/10-L208/27

  5. Union E (2009) “Directive 2009/17/EC of the European Parliament and of the Council of 23 April 2009 amending Directive 2002/59/EC establishing a Community vessel traffic monitoring and information system”. Off J Eur Union :L131/101–L131/113

  6. European Union (2011) “Commission Directive 2011/15/EU of 23 February 2011 amending Directive 2002/59/EC of the European Parliament and of the Council establishing a Community vessel traffic monitoring and information system”. Off J Eur Union:L49/33–L49/36

  7. Mazzarella F, Alessandrini A, Greidanus H, Alvarez M, Argentieri P, Nappo D, Ziemba L (2013) “Data fusion for wide-area maritime surveillance”. In: Workshop on moving objects at sea, Brest, France

  8. Mazzarella F, Arguedas VF, Vespe M (2015) “Knowledge-based vessel position prediction using historical AIS data” Sensor data fusion: trends, solutions, applications (sdf), Bonn, Germany

  9. Pallotta G, Horn S, Braca P, Bryan K (2014) “Context-enhanced vessel prediction based on ornstein-uhlenbeck processes using historical AIS traffic patterns: Real-world experimental results”. In: 17th international conference on information fusion (FUSION), 2014, Salamanca, Spain

  10. Pallotta G, Vespe M, Bryan K (2015) “Vessel pattern knowledge discovery from AIS data: a framework for anomaly detection and route prediction”. Entropy 15(6):2218–2245

    MATH  Google Scholar 

  11. Mazzarella F, Vespe M, Damalas D, Osio G (2014 ) “Discovering vessel activities at sea using AIS data: Mapping of fishing footprints”. In: 17th international conference on information fusion (FUSION), Salamanca, Spain

  12. Natale F, Gibin M, Alessandrini A, Vespe M, Paulrud A (2015) “Mapping fishing effort through AIS data”. PLoS One 10(6):1–16

    Article  Google Scholar 

  13. Vespe M, Gibin M, Alessandrini A, Natale F, Mazzarella F, Osio GC (2016) “Mapping EU fishing activities using ship tracking data”. J Maps 12(sup1):520–525

    Article  Google Scholar 

  14. Handayani DOD, Sediono W, Shah A (2013) “Anomaly detection in vessel tracking using support vector machines (SVMs)”. In: 2013 International conference on advanced computer science applications and technologies (ACSAT’13), Washington DC, USA

  15. Laxhammar R, F. G. and Sviestins E (2009) “Anomaly detection in sea traffic - a comparison of the gaussian mixture model and the kernel density estimator”. In: 12th international conference on information fusion (FUSION’09), Seattle, Washington, USA

  16. Ristic BLSB., Morelande M, Gordon N (2008) “Statistical analysis of motion patterns in AIS data: anomaly detection and motion prediction”. In: 11th international conference on information fusion (FUSION ‘08), Cologne, Germany

  17. Ou Z, Zhu J (2008) “AIS database powered by GIS technology for maritime safety”. J Navig 61:655–665

    Article  Google Scholar 

  18. Xiao F, Ligteringen H, van Gulijk C, Ale B (2015) “Comparison study on AIS data of ship traffic behavior. Ocean Eng 95:84–93

    Article  Google Scholar 

  19. Van Dorp R, Merrick J (2011) “On a risk management analysis of oil spill risk using maritime transportation system simulation”. Ann Oper Res 187:249–277

    Article  Google Scholar 

  20. Goerlandt F, Goite H, Valdez Banda O, Höglund A, Ahonen-Rainio P, Lensu M (2017) “An analysis of wintertime navigational accidents in the Northern Baltic sea”. Saf Sci 92:66–84

    Article  Google Scholar 

  21. Chen J, Lu F, Peng G (2015) “A quantitative approach for delineating principal fairways of ship passages through a strait. Ocean Eng 103:188–197

    Article  Google Scholar 

  22. Zhang W, Goerlandt F, Kujala P, Wang Y (2016) “An advanced method for detecting possible near miss ship collisions from AIS data”. Ocean Eng 124:141–156

    Article  Google Scholar 

  23. Qu X, Meng Q, Suyi L (2011) “Ship collision risk assessment for the Singapore strait”. Accid Anal Prev 43:2030–2036

    Article  Google Scholar 

  24. Jalkanen J-P, Johansson L, Kukkonen J (2014) “A comprehensive inventory of the ship traffic exhaust emissions in the Baltic Sea from 2006 to 2009”. Ambio 43:311–324

    Article  Google Scholar 

  25. Merchant N, Witt M, Blondel P, Godley B, Smith G (2012) “Assessing sound exposure from shipping in coastal waters using a single hydrophone and Automatic Identification System (AIS) data”. Mar Pollut Bull 64:1320–1329

    Article  Google Scholar 

  26. Shelmerdine R (2015) “Teasing out the detail: how our understanding of marine AIS data can better inform industries, developments, and planning. Marine Policy 54:17–25

    Article  Google Scholar 

  27. Elliso B (2009) “Panbo: the marine electronics hub,” 17 April 2009. [Online]. Available: https://www.panbo.com/archives/2009/04/mandated_ais_an_aid_to_pirates.html. Accessed 5 Nov 2017

  28. Palmer A (2014) The new pirates: modern global piracy from Somalia to the South China Sea. I.B.Tauris

  29. Trask L, (2013) “Captain raises AIS privacy concerns,” 25 September 2013 [Online]. Available: http://www.superyachtnews.com/business/captain_raises_ais_privacy_concerns. Accessed 5 Nov 2017

  30. Balduzzi M, Wilhoit K, Pasta A (2018) “A security evaluation of AIS,” Trend Micro

  31. Hall J, Lee J, Benin J, Armstrong C, Owen H (2015) “IEEE 1609 influenced automatic identification system (AIS)”. In: IEEE Vehicular Technology Conference, Glasgow, UK

  32. Organization IM (2015) Resolution A.1106(29), IMO revised guidelines for the onboard operational use of shipborne automatic identification systems (AIS), International Maritime Organization

  33. Oh SH, Seo D, Lee B (2015) “S3 (secure ship-to-ship) information sharing scheme using ship authentication in the e-navigation”. Int J Secur Appl 9(2):97–110

    Google Scholar 

  34. Goudosis A, Kostis T, Nikitakos N (2012) “Automatic identification system stated requirements for naval transponder security assurance”. In: Goudosis N, Kostis A, Nikitakos T (eds) “automatic identification system stated requirements for naval transponder 2nd international conference on applications of mathematics and informatics in military sciences (AMIMS), Vari, Greece

  35. He D, Kumar N, Choo K-KR, Wu W (2017) “Efficient hierarchical identity-based signature with batch verification for automatic dependent surveillance-broadcast system. IEEE Trans Inf Forensics Secur 12(2):454–464

    Article  Google Scholar 

  36. Baek J, Hableel E, Byon Y-J, Wong D, Jang K, Yeo H (2017) “How to protect ADS-B: confidentiality framework and efficient realization based on staged identity-based encryption”. IEEE Trans Intell Transp Syst 18(3):690–700

    Article  Google Scholar 

  37. SAAB (2017) “Networked secure W-AIS transponder for operational security” [Online]. Available: http://saab.com/security/maritime-traffic-management/traffic-management/R5-Supreme-W-AIS. Accessed 5 Nov 2017

  38. Strohmeier M, Lenders V, Martinovic I (2015) “On the security of the automatic dependent surveillance-broadcast protocol”. IEEE Commun Surv Tutor 17(2):1066–1087

    Article  Google Scholar 

  39. Zhao S, Aggarwal A, Frost R, Bai X (2012) “A survey of applications of identity-based cryptography in mobile ad-hoc networks”. IEEE Commun Surv Tutor 14(2):380–399

    Article  Google Scholar 

  40. Alexiou N, Laganà M, Gisdakis S, Khodaei M, Papadimitratos P (2013) “VeSPA” 2nd ACM workshop on hot topics of wireless networks security and privacy—HotWiSec’13, Budapest

  41. IEEE (2016) 1609.2–2016—IEEE standard for wireless access in vehicular environments–security services for applications and management messages, IEEE

  42. Yang A, Tan X, Baek J, Wong D (2017) “A new ADS-B authentication framework based on efficient hierarchical identity-based signature with batch verification”. IEEE Trans Serv Comput 10(2):165–175

    Article  Google Scholar 

  43. Yadav V, Misra S, Afaque M (2010) “Security in Vehicular ad hoc networks” security of self-organizing networks: MANET, WSN, WMN, VANET, Auerbach Publications, pp 227–250

  44. Gerlach M, Guttler F (2007) “Privacy in VANETs using changing pseudonyms—ideal and real”. In: IEEE 65th Vehicular Technology Conference, 2007, Dublin, Ireland

  45. Calandriello G, Papadimitratos P, Hubaux J-P, Lioy A (2007) “Efficient and robust pseudonymous authentication in VANET”. In: 4th ACM international workshop on Vehicular ad hoc networks (VANET’07), Montréal, Québec, Canada

  46. Xiao Y, Shen X, Du DZ (2007) Wireless network security. Springer Berlin

  47. Lin H-Y, Huang Y-M, Wang T-I (2005) “Resilient cluster-organizing key management and secure routing protocol for mobile ad hoc networks” IEICE Trans Commun E88–B(9):3598–3613

    Article  Google Scholar 

  48. The Nautical Institute (2018)“AIS Issues” [Online]. Available: http://www.nautinst.org/en/forums/ais/ais-issues.cfm. Accessed 5 Nov 2017

  49. Smith H (2018) “Understanding the Maritime Transport Ecosystem,” MONA LISA 2.0, Kingston, Ontario, Canada

  50. McIntyre M, Genik L, Mason P, Hammond T (2007) “Towards an understanding of security, privacy and safety in maritime self-reporting systems”. In: IFIP International Conference on Trust Management, Gothenburg, Sweden

  51. Shamir A (1984) “Identity-based cryptosystems and signature schemes” CRYPT0 ‘84

  52. Boneh D, Lynn B, Shacham H (2001) “Short signatures from the weil pairing”. In: 7th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2001), Gold Coast, Australia

  53. Fang Y, Zhu X, Zhang Y (2009) “Securing resource-constrained wireless ad hoc networks” IEEE Wirel Commun:24–30

  54. Zhou Y, Fang Y, Zhang Y (2008) “Securing wireless sensor networks: a survey”. IEEE Commun Surv Tutor 10(3):6–28

    Article  Google Scholar 

  55. Bohio M, Miri A (2004) “Efficient identity-based security schemes for ad hoc network routing protocols”. Ad Hoc Netw 2(3):309–317

    Article  Google Scholar 

  56. Chaum D (1985) “Security without identification: transaction systems to make big brother obsolete”. Commun ACM 28(10):1030–1044

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sokratis K. Katsikas.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Goudossis, A., Katsikas, S.K. Towards a secure automatic identification system (AIS). J Mar Sci Technol 24, 410–423 (2019). https://doi.org/10.1007/s00773-018-0561-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00773-018-0561-3

Keywords

Navigation