智能船舶信息化与自动化的快速提升,降低了航运公司的运营成本,提升了智能船舶系统的运行效率,但也引入了新的网络安全风险,使智能船舶更容易受到各种网络攻击。为此,对现代智能船舶的网络结构和特点进行详细描述,论述智能船舶存在的网络安全漏洞;此外,对近年来智能船舶遭受的各种网络攻击情况进行调查,并重点介绍有效防御船舶网络攻击的应对方法;最后,对智能船舶网络安全技术研究进行总结并对未来的研究工作进行展望。这项研究能为智能船舶的网络安全规划和建设提供支持和参考。
With the rapid improvement of information and automation of intelligent ships, the operating cost of shipping companies has been decreased, and the operating efficiency of intelligent ship systems has been enhanced. Nevertheless, new network security risks have also been added, making intelligent ships more susceptible to various network attacks. Consequently, this paper first describes the network structure and characteristics of modern intelligent ships in detail, and discusses the network security vulnerabilities of intelligent ships. Then all kinds of network attacks suffered by intelligent ships in recent years are introduced, as well as the countermeasures that can successfully defend against these network attacks. Lastly, the research on the network security technology of intelligent ships is summarized and the future research work is prospected. The research content of this paper can provide support and reference for network security planning and the construction of intelligent ships.
2024,46(10): 1-8 收稿日期:2023-06-15
DOI:10.3404/j.issn.1672-7649.2024.10.001
分类号:TN92
基金项目:国家重点研发计划项目(2021YFC2801000);国家自然科学基金资助项目 (61873160, 61672338);上海市自然科学基金项目 (21ZR1426500);上海海事大学研究生拔尖创新人才培养项目(2022YBR004)
作者简介:吴中岱(1976-),男,博士,高级工程师,研究方向为认知无线电、异构无线网络传输技术等
参考文献:
[1] CAPROLU M, DI Pietro R, RAPONI S, et al. Vessels cybersecurity: Issues, challenges, and the road ahead[J]. IEEE Communications Magazine, 2020, 58(6): 90-96.
[2] TAM K, JONES K. MaCRA: a model-based framework for maritime cyber-risk assessment[J]. WMU Journal of Maritime Affairs, 2019, 18(1): 129-163.
[3] HÖYHTYÄ M, HUUSKO J, KIVIRANTA M, et al. Connectivity for autonomous ships: Architecture, use cases, and research challenges[C]//2017 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2017.
[4] BARABANOV A, MARKOV A, TSIRLOV V. On systematics of the information security of software supply chains[C]//Proceedings of the Computational Methods in Systems and Software. Springer, 2020.
[5] LETAIEF K B, CHEN W, SHI Y, et al. The roadmap to 6G: AI empowered wireless networks[J]. IEEE Communications Magazine, 2019, 57(8): 84-90.
[6] SEXTON C, KAMINSKI N J, MARQUEZ-BARja J M, et al. 5G: Adaptable networks enabled by versatile radio access technologies[J]. IEEE Communications Surveys & Tutorials, 2017, 19(2): 688-720.
[7] HASSAN N, YAU K-L A, WU C. Edge computing in 5G: A review[J]. IEEE Access, 2019 (7): 127276-127289.
[8] ZENG K C, SHU Y, LIU S, et al. A practical GPS location spoofing attack in road navigation scenario[C]//Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications, 2017.
[9] TSOU M-C. Multi-target collision avoidance route planning under an ECDIS framework[J]. Ocean Engineering, 2016, 45(4): 268-278.
[10] MAO S, TU E, ZHANG G, et al. An automatic identification system (AIS) database for maritime trajectory prediction and data mining [C]// Proceedings of ELM-2016, Springer. 2018: 45(4): 268–278.
[11] ÇETIN O, SOGUT M Z. A new strategic approach of energy management onboard ships supported by exergy and economic criteria: A case study of a cargo ship[J]. Ocean Engineering, 219(1): 108137.1-108137.10.
[12] KORCZ K. Some aspects of the modernization plan for the GMDSS [J]. TransNav: International Journal on Marine Navigation and Safety of Sea Transportation, 2017, 11(1): 167-174.
[13] YAN C, XU W, LIU J. Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle[J]. DEF CON, 2016, 24(8): 109-136.
[14] JIANG S. On securing underwater acoustic networks: A survey[J]. IEEE Communications Surveys & Tutorials, 2018, 21(1): 729-752.
[15] JHANJHI N, BROHI S N, MALIK N A. Proposing a rank and wormhole attack detection framework using machine learning[C]//2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS). IEEE, 2019.
[16] KALIYAR P, JABALLAH W B, CONTI M, et al. LiDL: localization with early detection of sybil and wormhole attacks in IoT networks[J]. Computers & Security, 2020, 94: 101849.
[17] ALIADY W A, AL-AHMADI S A. Energy preserving secure measure against wormhole attack in wireless sensor networks[J]. IEEE Access, 2019, 7: 32-41.
[18] VASUDEVA A, SOOD M. Survey on sybil attack defense mechanisms in wireless ad hoc networks[J]. Journal of Network and Computer Applications, 2018, 120: 78-118.
[19] BHOLA J, SONI S, CHEEMA G K. Recent trends for security applications in wireless sensor networks–a technical review[C]//2019 6th international conference on computing for sustainable global development (INDIACom). IEEE, 2019: 707-719.
[20] SINCHE S, RAPOSO D, ARMANDO N, et al. A survey of IoT management protocols and frameworks[J]. IEEE Communications Surveys & Tutorials, 2019, 22(2): 1168-1258.
[21] ARDIANTI A, MUTSUDA H, KAWAWAKI K, et al. Fluid structure interactions between floating debris and tsunami shelter with elastic mooring caused by run-up tsunami[J]. Coastal Engineering, 2018, 137: 120-152.
[22] TANVEER M, ABBAS G, ABBAS Z H. LAS-6LE: A lightweight authentication scheme for 6LoWPAN environments[C]//2020 14th International Conference on Open Source Systems and Technologies (ICOSST). IEEE, 2020.
[23] VERMA A, RANGA V. Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review[J]. IEEE Sensors Journal, 2020, 20(11): 5666-5756.
[24] NOH G, PARK H, ROH H, et al. Secure and lightweight subflow establishment of multipath-TCP[J]. Ieee Access, 2019, 7: 177438-177486.
[25] LUND M S, GULLAND J E, HAREIDE O S, et al. Integrity of integrated navigation systems[C]//2018 IEEE Conference on Communications and Network Security (CNS). IEEE, 2018.
[26] HAYES C R. Maritime cybersecurity: the future of national security [D]. Monterey, California: Naval Postgraduate School, 2016.
[27] WHITCOMB C A, WHITE C, KHAN R, et al. The US department of defense systems engineering competency model[C]//INCOSE International Symposium. Wiley Online Library, 2017, 27: 214-242.
[28] XU J, SUN F, CHEN Q. Introduction to the smart court system-of-systems engineering project of China[M]. Network security, 2022.
[29] ADHIE R P, HUTAMA Y, AHMAR A S, et al. Implementation cryptography data encryption standard (DES) and triple data encryption standard (3DES) method in communication system based near field communication (NFC)[C]//Journal of Physics: Conference Series. IOP Publishing, 2018.
[30] TSAI K L, LEU F Y, YOU I, et al. Low-power AES data encryption architecture for a LoRaWAN[J]. Ieee Access, 2019, 7: 146348-146405.
[31] YASSEIN M B, ALJAWARNEH S, QAWASMEH E, et al. Comprehensive study of symmetric key and asymmetric key encryption algorithms[C]//2017 International Conference on Engineering and Technology (ICET). IEEE, 2017.
[32] MENESES F, FUERTES W, SANCHO J, et al. RSA encryption algorithm optimization to improve performance and security level of network messages[J]. IJCSNS, 2016, 16(8): 4292737.
[33] 徐明李, 刘朝斌, 马尧. 基于双重代理密钥的船舶自组网门限签名方案[J]. 通信学报, 2018, 39(7): 166-175.
XU M L, LIU Z B, MA Y. A threshold signature scheme for shipborne self-organizing network based on double proxy keys[J]. Journal of Communications, 2018, 39(7): 166-175.
[34] HAO X, REN W, XIONG R, et al. Asymmetric cryptographic functions based on generative adversarial neural networks for Internet of Things[J]. Future Generation Computer Systems, 2021, 124: 243-53.
[35] JEON S, KWAK J, CHOI J P. Cross-Layer encryption of CFB-AES-TURBO for advanced satellite data transmission security[J]. IEEE Transactions on Aerospace and Electronic Systems, 2021, 58(3): 2192-2205.