Review on Semantic Modeling and Simulation of Cybersecurity and Interoperability on the Internet of Underwater Things

被引:7
作者
Kotis, Konstantinos [1 ]
Stavrinos, Stavros [1 ]
Kalloniatis, Christos [1 ]
机构
[1] Univ Aegean, Dept Cultural Technol & Commun, Univ Hill, Mitilini 81100, Greece
关键词
IoUT; UUVs; swarm; interoperability; semantics; cybersecurity; simulation; INFORMATION; ONTOLOGY;
D O I
10.3390/fi15010011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As maritime and military missions become more and more complex and multifactorial over the years, there has been a high interest in the research and development of (autonomous) unmanned underwater vehicles (UUVs). Latest efforts concern the modeling and simulation of UUVs' collaboration in swarm formations, towards obtaining deeper insights related to the critical issues of cybersecurity and interoperability. The research topics, which are constantly emerging in this domain, are closely related to the communication, interoperability, and secure operation of UUVs, as well as to the volume, velocity, variety, and veracity of data transmitted in low bit-rate due to the medium, i.e., the water. This paper reports on specific research topics in the domain of UUVs, emphasizing interoperability and cybersecurity in swarms of UUVs in a military/search-and-rescue setting. The goal of this work is two-fold: a) to review existing methods and tools of semantic modeling and simulation for cybersecurity and interoperability on the Internet of Underwater Things (IoUT), b) to highlight open issues and challenges, towards developing a novel simulation approach to effectively support critical and life-saving decision-making of commanders of military and search-and-rescue operations.
引用
收藏
页数:35
相关论文
共 125 条
[1]  
Aggarwal P., 2019, HDB COMPUTER NETWORK, P949
[2]   HackIT: A Human-in-the-Loop Simulation Tool for Realistic Cyber Deception Experiments [J].
Aggarwal, Palvi ;
Gautam, Aksh ;
Agarwal, Vaibhav ;
Gonzalez, Cleotilde ;
Dutt, Varun .
ADVANCES IN HUMAN FACTORS IN CYBERSECURITY, 2020, 960 :109-121
[3]   Analysis of Security Attacks and Taxonomy in Underwater Wireless Sensor Networks [J].
Ahmad, Irfan ;
Rahman, Taj ;
Zeb, Asim ;
Khan, Inayat ;
Ullah, Inam ;
Hamam, Habib ;
Cheikhrouhou, Omar .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
[4]  
AIDA Project, US
[5]  
Alharbi A., 2020, DBSR DEPTH BASED SEC, V11
[6]  
Allen R.E., 2019, ARXIV
[7]  
Alves J., 2017, MOVING JANUS FORWARD
[8]  
[Anonymous], 2006, P 1 ACM INT WORKSH U, DOI DOI 10.1145/1161039.1161047
[9]  
[Anonymous], 1990, 610121990R2002 IEEE, P1
[10]  
[Anonymous], COST DAT BRE 2022