Security Architecture of Inter VTS Exchange Format Protocol for Secure u-Navigation

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 181)

Abstract

VTS is an important marine traffic monitoring system which is designed to improve the safety and efficiency of navigation and the protection of the marine environment. And the demand of Inter-VTS networking has been increased for realization of e-Navigation as shore side collaboration for maritime safety. And IVEF for Inter-VTS network has become a hot research topic of VTS system. There has been lots of security requirements of IVEF and Inter-VTS network to prevent hacking of sensitive maritime surveillance information caused accident such as vessel, human life and environment. This paper aims to design of a secure inter-VTS network security structure and security protocol based on sharing of sensitive maritime data. The proposed architecture provides secure mechanism and also provides secure information sharing for aids to navigation.

Keywords

VTS Inter-VTS IVEF Navigation security 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Arifin, B., Ross, E., Brodsky, Y.: Data security in a ship detection and Identification system. In: IEEE RAST 2011, pp. 634–636 (2011)Google Scholar
  2. 2.
    Carter, B., Green, S., Leeman, R., Chaulk, N.: SmartBay:Better Information - Better Decisions. In: IEEE OCEANS 2008, pp. 1–7 (2008)Google Scholar
  3. 3.
    Frejlichowski, D., Lisaj, A.: Analysis of lossless radar images compression for navigation in marine traffic and remote transmission. In: IEEE Radar Conference, pp. 1–4 (2008)Google Scholar
  4. 4.
    Garnier, B., Andritsos, F.: A Port Waterside Security Systemic Analysis. In: IEEE WSS Conference 2010, pp. 1–6 (2010)Google Scholar
  5. 5.
    Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  6. 6.
    Park, N.: Security Scheme for Managing a Large Quantity of Individual Information in RFID Environment. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds.) ICICA 2010. CCIS, vol. 106, pp. 72–79. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  7. 7.
    Park, N.: Secure UHF/HF Dual-Band RFID: Strategic Framework Approaches and Application Solutions. In: Jędrzejowicz, P., Nguyen, N.T., Hoang, K. (eds.) ICCCI 2011, Part I. LNCS, vol. 6922, pp. 488–496. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  8. 8.
    Park, N.: Implementation of Terminal Middleware Platform for Mobile RFID computing. International Journal of Ad Hoc and Ubiquitous Computing 8(4), 205–219 (2011)CrossRefGoogle Scholar
  9. 9.
    Park, N., Kim, Y.: Harmful Adult Multimedia Contents Filtering Method in Mobile RFID Service Environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part II. LNCS (LNAI), vol. 6422, pp. 193–202. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  10. 10.
    Park, N., Song, Y.: AONT Encryption Based Application Data Management in Mobile RFID Environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part II. LNCS (LNAI), vol. 6422, pp. 142–152. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  11. 11.
    Park, N.: Customized Healthcare Infrastructure Using Privacy Weight Level Based on Smart Device. In: Lee, G., Howard, D., Ślęzak, D. (eds.) ICHIT 2011. CCIS, vol. 206, pp. 467–474. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  12. 12.
    Park, N.: Secure Data Access Control Scheme Using Type-Based Re-encryption in Cloud Environment. In: Katarzyniak, R., Chiu, T.-F., Hong, C.-F., Nguyen, N.T. (eds.) Semantic Methods for Knowledge Management and Communication. SCI, vol. 381, pp. 319–327. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  13. 13.
    Park, N., Song, Y.: Secure RFID Application Data Management Using All-Or-Nothing Transform Encryption. In: Pandurangan, G., Anil Kumar, V.S., Ming, G., Liu, Y., Li, Y. (eds.) WASA 2010. LNCS, vol. 6221, pp. 245–252. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  14. 14.
    Park, N.: The Implementation of Open Embedded S/W Platform for Secure Mobile RFID Reader. The Journal of Korea Information and Communications Society 35(5), 785–793 (2010)Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2012

Authors and Affiliations

  1. 1.Electronics and Telecommunications Research Institute (ETRI)DaejeonKorea
  2. 2.Department of Computer Education, Teachers CollegeJeju National UniversityJejuKorea

Personalised recommendations