An Automatic-Identification-System-Based Vessel Security System

被引:7
作者
Chen, Mu-Yen [1 ]
Wu, Hsin-Te [2 ]
机构
[1] Natl Cheng Kung Univ, Dept Engn Sci, Tainan 70101, Taiwan
[2] Natl Ilan Univ, Dept Comp Sci & Informat Engn, Yilan 260, Taiwan
关键词
Artificial intelligence; Marine vehicles; 5G mobile communication; Safety; Transportation; Cryptography; Network security; 5G network; artificial intelligence of things; automatic-identification-system (AIS); intelligent transportation system (ITS); network security; TRUST MANAGEMENT; SCHEME; YOLO; AUTHENTICATION; ENCRYPTION; MECHANISM; INTERNET;
D O I
10.1109/TII.2021.3139348
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As today's transportation systems have gradually developed into intelligent transportation systems, the fundamental elements of the system consist of vessels, harbors, and ship-shore information-communication technology applications. Safety is the priority for intelligent transportation, securing the transportation environment for vessels. Because there are more dangerous situations when sailing in the sea, our research deploys artificial intelligence of thing with the 5G network to ensure ship safety. To achieve the goal of intelligent ships for vessels to share information between groups; moreover, the geofencing technology can protect vessels from sailing into risky zones. The security mechanism of our system can detect malicious attacks from Dynamic Domain Name System and radio jamming attacks. Additionally, the network security mechanism proposed in this article can safeguard data reliability and safety, enabling vessels to detect collisions in the front and improve safety through the 5G network and the sensor. The performance analysis has proven that the network security approach of this article surpasses other studies; regarding the geofencing part, this article has also conducted a practical experiment to introduce it into the automatic-identification-system (AIS) and 5G system. The experimental results prove that the suggested approach can ensure the AIS network security in vessels; moreover, the system can precisely judge whether there are obstacles in front of the ship, making sure the vessel safety.
引用
收藏
页码:870 / 879
页数:10
相关论文
共 36 条
[21]   Pairing-Free Certificate-Based Searchable Encryption Supporting Privacy-Preserving Keyword Search Function for IIoTs [J].
Lu, Yang ;
Li, Jiguo ;
Wang, Fen .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (04) :2696-2706
[22]   YOLO-Based Deep Learning Framework for Olive Fruit Fly Detection and Counting [J].
Mamdouh, Nariman ;
Khattab, Ahmed .
IEEE ACCESS, 2021, 9 :84252-84262
[23]   Trust Computation in Online Social Networks Using Co-Citation and Transpose Trust Propagation [J].
Nasir, Safi Ullah ;
Kim, Tae-Hyung .
IEEE ACCESS, 2020, 8 :41362-41371
[24]   LEVER: Secure Deduplicated Cloud Storage With Encrypted Two-Party Interactions in Cyber--Physical Systems [J].
Pooranian, Zahra ;
Shojafar, Mohammad ;
Garg, Sahil ;
Taheri, Rahim ;
Tafazolli, Rahim .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (08) :5759-5768
[25]  
Scott Mike., 2007, Efficient implementation of cryptographic pairings
[26]   Progressive Image Restoration Based on CP-ABE With Constant-Size Ciphertext and Constant Bilinear Calculation [J].
Sun, Huaibo ;
Luo, Hong ;
Sun, Yan .
IEEE ACCESS, 2019, 7 :167032-167054
[27]   Enabling Roaming Across Heterogeneous IoT Wireless Networks: LoRaWAN MEETS 5G [J].
Torroglosa-Garcia, Elena M. ;
Alcaraz Calero, Jose M. ;
Bernal Bernabe, Jorge ;
Skarmeta, Antonio .
IEEE ACCESS, 2020, 8 :103164-103180
[28]   Lightweight Certificate-Based Public/Private Auditing Scheme Based on Bilinear Pairing for Cloud Storage [J].
Wang, Feng ;
Xu, Li ;
Choo, Kim-Kwang Raymond ;
Zhang, Yuexin ;
Wang, Huaqun ;
Li, Jiguo .
IEEE ACCESS, 2020, 8 :2258-2271
[29]   HDMA: Hybrid D2D Message Authentication Scheme for 5G-Enabled VANETs [J].
Wang, Peng ;
Chen, Chien-Ming ;
Kumari, Saru ;
Shojafar, Mohammad ;
Tafazolli, Rahim ;
Liu, Yi-Ning .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 22 (08) :5071-5080
[30]   Anonymity for Bitcoin From Secure Escrow Address [J].
Wang, Qi ;
Li, Xiangxue ;
Yu, Yu .
IEEE ACCESS, 2018, 6 :12336-12341