Shipping 4.0: Security Requirements for the Cyber-Enabled Ship

被引:37
作者
Kavallieratos, Georgios [1 ]
Diamantopoulou, Vasiliki [2 ]
Katsikas, Sokratis K. [1 ,3 ]
机构
[1] Norwegian Univ Sci & Technol, Dept Informat Secur & Commun Technol, N-2815 Gjovik, Norway
[2] Univ Aegean, Sch Engn, Dept Informat & Commun Syst Engn, Samos 83200, Greece
[3] Open Univ Cyprus, Fac Pure & Appl Sci, CY-2220 Nicosia, Cyprus
关键词
Marine vehicles; Ecosystems; Computer security; Industries; Artificial intelligence; Informatics; Autonomous ships security; cyber-physical systems; cyber-security; security requirements engineering;
D O I
10.1109/TII.2020.2976840
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The cyber-enabled ship (C-ES) is either an autonomous or a remotely controlled vessel which relies on interconnected cyber physical-systems for its operations. Such systems are not well protected against cyberattacks. Considering the criticality of the functions that such systems provide, it is important to address their security challenges, thereby ensuring the ship's safe voyage. In this article, we leverage the maritime architectural framework reference architecture to analyze and describe the environment of the C-ES. We then apply the Secure Tropos methodology to systematically elicit the security requirements of the three most vulnerable cyber-physical systems (CPSs) onboard a C-ES, namely the automatic identification system (AIS), the electronic chart display information system, and the global maritime distress and safety system. The outcome is a set of cyber-security requirements for the C-ES ecosystem in general and these systems in particular.
引用
收藏
页码:6617 / 6625
页数:9
相关论文
共 32 条
[1]  
Ali S, 2018, STUD COMPUT INTELL, V768, P161, DOI 10.1007/978-3-319-75880-0_8
[2]  
[Anonymous], COMPUT SECUR HDB
[3]  
[Anonymous], 2013, P 2013 MTS IEEE OCEA
[4]  
[Anonymous], 2013, ISO/IEC 27001:2013 [Information technology - Security techniques - Information security management systems - Requirements]
[5]  
[Anonymous], 2013, ISO/IEC 27002:2013 Information technologySecurity techniquesCode of practice for information security controls
[6]  
Bureau Veritas, 2017, TECH REP
[7]  
CEN-CENELEC-ETSI Smart Grid Coordination Group, 2012, TECH REP, P107
[8]  
CROSS JF, 2017, J OCEAN TECHNOL, V12, P23
[9]   Applying the physics of notation to the evaluation of a security and privacy requirements engineering methodology [J].
Diamantopoulou, Vasiliki ;
Mouratidis, Haralambos .
INFORMATION AND COMPUTER SECURITY, 2018, 26 (04) :382-400
[10]  
DNVGL, 2018, TECH REP