Conference PaperPDF Available

Abstract and Figures

Crossroads of international issues, maritime domain is facing growing human activities (fishing, transportation, boating…) involving a large spectrum of ships from small sailing boats to super tankers. This increase of maritime mobilities has favored the appearance and generalization of position report systems for keeping track of ships movements. Amongst these systems, cooperative position reports using devices such as the Automatic Identification System (AIS) have been widely deployed and used. Recent works have shown that falsification of AIS messages is possible, and therefore could mask or favor illegal actions, lead to disturbance of monitoring systems and new maritime risks. This paper presents these new threats and risks and introduces a novel methodological approach for modelling, analyzing and detecting such maritime events. Keywords—Automatic Identification System (AIS), maritime risks, data mining I. INTRODUCTION The maritime environment has a huge impact on the world economy and our everyday lives. Beyond being a space where numerous marine species live, the sea is also a place where human activities (sailing, cruising, fishing, goods transportation...) evolve and increase drastically [2]. This ever increasing traffic leads to navigation difficulties and risks in coastal and crowded areas where numerous ships exhibit different movement objectives which can be conflicting (e.g. sailing vs. fishing). The disasters and damages caused in the event of sea collisions can pose serious threats to the environment and human lives. The sea surveillance has therefore become a major concern. Many government authorities have set up strategies to prevent these sea tragedies but also to protect the principle of free movement, control of people's rights and territorial integrity. These last objectives imply a need to " provide an answer " to illegal immigration, drug smuggling, and terrorism.
Content may be subject to copyright.
DeAIS project: Detection of AIS Spoofing and Resulting
Risks
Cyril Ray, Cl´ement Iphar, Aldo Napoli, Romain Gallen, Alain Bouju
To cite this version:
Cyril Ray, Cl´ement Iphar, Aldo Napoli, Romain Gallen, Alain Bouju. DeAIS project: Detection
of AIS Spoofing and Resulting Risks. MTS/IEEE OCEANS’15, May 2015, Gˆenes, Italy. 2015.
<hal-01166151>
HAL Id: hal-01166151
https://hal-mines-paristech.archives-ouvertes.fr/hal-01166151
Submitted on 22 Jun 2015
HAL is a multi-disciplinary open access
archive for the deposit and dissemination of sci-
entific research documents, whether they are pub-
lished or not. The documents may come from
teaching and research institutions in France or
abroad, or from public or private research centers.
L’archive ouverte pluridisciplinaire HAL, est
destin´ee au epˆot et `a la diffusion de documents
scientifiques de niveau recherche, publi´es ou non,
´emanant des ´etablissements d’enseignement et de
recherche fran¸cais ou ´etrangers, des laboratoires
publics ou priv´es.
DeAIS project: Detection of AIS Spoofing and
Resulting Risks
Cyril RAY
Naval Academy Research Institute (IRENav)
Brest, France
cyril.ray@ecole-navale.fr
Romain GALLEN
CEREMA
France
romain.gallen@developpement-durable.gouv.fr
Clément IPHAR, Aldo NAPOLI
MINES ParisTech, CRC
Sophia Antipolis, France
{clement.iphar, aldo.napoli}@mines-paristech.fr
Alain BOUJU
L3i-La Rochelle University
Brest, France
alain.bouju@univ-lr.fr
Abstract — Crossroads of international issues, maritime
domain is facing growing human activities (fishing,
transportation, boating…) involving a large spectrum of ships
from small sailing boats to super tankers. This increase of
maritime mobilities has favored the appearance and
generalization of position report systems for keeping track of
ships movements. Amongst these systems, cooperative position
reports using devices such as the Automatic Identification System
(AIS) have been widely deployed and used. Recent works have
shown that falsification of AIS messages is possible, and therefore
could mask or favor illegal actions, lead to disturbance of
monitoring systems and new maritime risks. This paper presents
these new threats and risks and introduces a novel
methodological approach for modelling, analyzing and detecting
such maritime events.
Keywords—Automatic Identification System (AIS), maritime
risks, data mining
I. INTRODUCTION
The maritime environment has a huge impact on the world
economy and our everyday lives. Beyond being a space where
numerous marine species live, the sea is also a place where
human activities (sailing, cruising, fishing, goods
transportation...) evolve and increase drastically [2]. This ever
increasing traffic leads to navigation difficulties and risks in
coastal and crowded areas where numerous ships exhibit
different movement objectives which can be conflicting (e.g.
sailing vs. fishing). The disasters and damages caused in the
event of sea collisions can pose serious threats to the
environment and human lives. The sea surveillance has
therefore become a major concern. Many government
authorities have set up strategies to prevent these sea tragedies
but also to protect the principle of free movement, control of
people's rights and territorial integrity. These last objectives
imply a need to “provide an answer” to illegal immigration,
drug smuggling, and terrorism.
From this dynamic emerges the will to develop sea
surveillance systems including ways to improve maritime
security and identify illegal or suspicious ships behaviors. The
consideration of this control issue by the International
Maritime Organization (IMO) has partly evolved in the last
decade from education and navigational rules (e.g.
International Regulations for Preventing Collisions at Sea:
COLREGS) to technical answers for traffic monitoring. The
IMO has thereby defined the e-navigation concept, based on
the harmonization of marine navigation systems with the
collection, integration, exchange, presentation and analysis of
maritime information onboard and ashore by electronic means
[3].
The understanding of a maritime situation and/or vessels
intentions comes through an analysis of ships localizations.
Such an analysis can rely on short and/or long-term data
records. Short-term is related to the identification of
instantaneous comportment (for example an intrusion in a
restricted area) and long-term is related to the analysis of
trajectories with the identification of specific behaviors (for
example having forbidden or dangerous manoeuvres).
Nowadays, ships are fitted out with almost real-time position
report systems whose objective is to identify and locate
vessels at distance (Automatic Identification System (AIS) for
example). The AIS completes the radar pictures in order to
provide a declarative and a real-time situation to ships. It
provides data to land services such as harbour authorities and
Vessel Traffic Services (VTS) in charge of traffic surveillance
but they also feed on-line providers (e.g. Marine Traffic) with
high frequency position reports. Combined with radar
surveillance and others, real-time localization of ships in
coastal area (around 40 miles) is effective though given the
wider range of AIS (as compared with radar), the maritime
situation beyond radar range solely depends on AIS messages
received. Also, there exist some recent VTS centers that
depend totally on AIS technology when they are not equipped
with radar.
This research belongs to a French National Research
Agency (ANR) project which started in November 2014. The
following presents new threats and risks raised by falsification
and hacking of the AIS and introduces our methodological
approach for modelling, analyzing and detecting these new
maritime risks. Section II describes possible failures of the
AIS at the physical, communication, logical levels and
proposes a classification of related risks and threats raised by
attacks. Section III sketches risk modeling principles and
introduces real-time message-based data mining methodology
proposed to identify abnormal messages and navigational
behaviors. Section IV gives some conclusions and current
perspectives.
II. R
ISKS AND THREATS
There are several definitions of risk, which usually give a
dual meaning to this concept. The risk includes both the
potential losses (vulnerability) and the probability of a
hazardous event [18].
In order to improve the management of these risks at sea,
the maritime surveillance system must reach an improved
analysis of the behaviors of ships, along with an integrated
surveillance system. Much research is still ongoing in the field
of Maritime Domain Awareness (MDA), which is defined as
the constant perception of maritime environmental elements
with respect to time and space, the comprehension of their
meaning and the projection of their status after some variable
has changed [19]. Thus new axes for reflection should be
addressed, in order to improve the process of risk detection.
The International Maritime Organization has defined the
MDA as the understanding of all information and activities
associated with the marine environment, which may have an
impact on security, safety, economy or environment [9].
However, the spoofing of the AIS system (onboard or not)
leads to new risks at sea. Those risks are about the vessel
itself, the surrounding vessels, the environment, offshore and
coastal infrastructures, organizations and finally societies.
This underlines the urgent need for the development of large-
scale monitoring systems managing the problem beyond MDA
principles through the understanding of maritime situation but
also through the understanding of technical means providing
this maritime situation.
A. Vulnerabilities of the AIS system at sea, at
radiocommunication level and ashore
1) A lack of control of AIS installations
The installation of AIS transponders on ships, their initial
configuration and the permanent information (such as MMSI,
name, length, position on the ship, etc.) embedded in the
transponders are made by certified installers in order to
provide a standardized exploitation such as described by IMO
(IMO Res.917(22) and IMO Res.956(23, 2004)).
Nonetheless, the data send by transponders, onboard ships
or ashore, are not subject to any kind of control. The IMO
recalls users and installers that it is their responsibility to make
sure that data sent are exact and conform to existing standards,
but a shutdown, a bad or a lack of declaration regarding the
current status of the ship (specifically voyage related data), a
wrong installation (position, power, connection to sensors) or
a wrong configuration of the transponder (frequency, type of
messages sent) may have an impact on the mutual detection of
ships resulting in absence of detection or low detection rate,
bad handling of the risk of collision, false alarms and also
have an impact on the detection of abnormal behaviour by
maritime surveillance systems.
2) Vulnerabilities of embedded AIS transponders
It is clearly stated in IMO Res. 917(22) that only static
information was supposed to be saved in the transponder when
it is installed and connected onboard. Nonetheless, it is still
possible to modify them afterwards through simple means and
these pieces of information might be made irrelevant if not
correctly updated when some changes in the life of the vessel
occur (change of name, change of position of the transponder).
Other data such as voyage related or dynamic information
are not controlled by any means though it is strongly
recommended that users should check their correctness and
check the right configuration and installation of the
transponder on a regular basis. It is a common case that ships
travelling from one departure point to another have voyage
related information that is not updated.
Regarding the use of AIS onboard ships, IMO warns the
users and recalls that AIS is a complementary resource of
localization of neighbouring ships after the primary resource
which is the radar. Nonetheless, given that the radar range is
often shorter than AIS range and that the radar is far more
sensitive to environmental perturbations (atmospheric
conditions, sea state, size and distance from other ships), the
AIS is often the only way to identify and localize ships or
AtoNs in the far. A ship may currently modify its trajectory
(heading, speed, rate of turn) based on AIS data that cannot be
confirmed by other sources of information.
3) Vulnerabilities of earthland systems
Numerous services ashore are based on the permanent
provision of AIS data received by shore stations. These
services may be navigation assistance systems, maritime
assistance systems or traffic organization systems that are
provided by coastal states or private bodies such as harbours
(including traffic surveillance, provision of AtoN and
maritime safety information, provision of differential
positioning information). Other services such as fleet tracking,
logistics also rely on AIS data in order to work properly.
Neither control nor mandatory regulations are imposed on
the installers of such shore systems (AIS base stations,
receivers, AtoN transponders). The responsibility of the
correct installation, connection and configuration of these
devices rely solely on the technical units in charge of these
operations. There is nowadays no means provided under
recommendation of the IMO or of the international
organizations in charge of the standardization that enables a
posteriori checking of the good operational and technical
behaviour of these AIS services.
It is therefore possible to envision that AtoN information
provided by AIS means or other information provided by the
network of base stations may be erroneous (false positioning
of AtoNs, changes in the nominal emission rate of AIS
messages, erroneous differential positioning information).
4) Vulnerabilities at radiocommunication level
The AIS technology is based on VHF frequency used also
in current VHF voice communications. Though the channels
used for AIS are not a standard accessible communication
channel for VHF voice devices onboard and onshore, shore
and embedded VHF radios can have access to the same
channels (but their configuration specifically regarding the
numbering of the maritime radio channels differ due to the
bandwidth of the different channels and their capacity to hold
full duplex, half duplex or single channel communications).
The use of radios allowing to have access to the AIS channels
through manual tuning may cause radio interferences on these
frequencies. Such an emitter tuned on AIS frequencies may
impair the capacity of neighbouring receivers to receive
distant AIS messages and it may also impair the capacity of a
close transmitter of broadcasting its messages by masking it to
all distant receivers.
A similar problem could also occur on-board or in coastal
radio stations because of the proximity of numerous
radiocommunication devices dedicated to AIS, VHF voice
communications or VHF digital communications such as
Digital Selective Call (DSC). Though not tuned on AIS
frequencies, the closeness and difference in power of adjacent
VHF devices may cause interferences and mask received
messages as well as broadcasted messages from the AIS
transponder or base station. This interchannel interference
could either totally block emitted or received messages or it
may be a less sensitive but still active phenomenon by limiting
the range of received or emitted messages.
Other means to attack the AIS system in itself consist in
targeting the channels used to exchange messages. If this is
not done by radio interference, this can be done by
overloading these channels with meaningless messages. This
could cause all ships to drastically lower the range of received
messages (a technical security measure automatically
implemented on AIS transponders). This may also have side
consequences and block the access to AIS slots for all AIS
devices working in CSTDMA mode (carrier sense time
division multiple access is a mode only used by class B ships
and AtoNs that will cause them to emit in a given slot of time
provided no one is already emitting at the same time).
Wrong messages or radio interferences are also susceptible
to block the good sending and reception of valid AIS
messages. More efficient ways do exist that can be put into
action at radiocommunication level in order to disturb AIS
communications.
The easiest way to input wrong information in ships and
shore systems is to simply emit an AIS message that conforms
to all standards and formats but that contains erroneous
information (wrong identification, positioning, dynamic and
voyage related information, wrong assignments, etc.). The
consequences and the main attacks are described in detail
below in part B. These attacks are probably among the riskiest
ones since they are easy to do, difficult to detect and may be
focused on maximum and direct nuisance to the safety and
security of targeted ships or to all ships in a given region.
B. Potential threats to security and safety of navigation
Beyond irregular behaviors at sea, malfeasance
mechanisms and bad navigation practices have inevitably
emerged recently to circumvent, alter or exploit such
surveillance systems in the interests of offenders.
By exploiting the vulnerabilities presented earlier, some of
which are easier to put in place than others for an identical
threat, an attacker may generate numerous issues. The threats
may either affect individual ships or put multiple ships
simultaneously in hazardous situations. These actions could
impact the ships themselves, the people onboard and the cargo
by lessening their security level or by exposing them to
immediate dangers. Some threats could have an incidence on
the surveillance capacity of VTS centres and harbours, but they
could also affect the assignment, positioning and use of
maritime or terrestrial search and rescue resources or the use of
other resources dedicated to the security of the territory, the
customs or to military operations.
Not only the consequences of the implementation of such
threats might strike the primary stakeholders targeted but the
consequences, thus the risks, could be far much worse and
affect much wider fields such as the environment at large scale,
whole regions and their people, the global trading and
economy.
Fig 1. Threats and risks at different levels
Recent experiments have demonstrated some of the
vulnerabilities of the AIS [1]. In this work, Balduzzi et al.
propose an overview of AIS threats and classify them as
software and radio attacks. He identifies: ship spoofing, AtoN
spoofing, collision spoofing, AIS-SART spoofing, weather
forecasting, AIS hijacking and availability disruption threats.
Actually the attacks and malfeasance should be considered as
possible at each step of the system (Figure 1).
For instance, it is easy to spoof a ship identity by issuing
the IMO or MMSI (Maritime Mobile Service Identity) number
from another ship. Some fishing boats are practicing this
offense in order to fish illegally for example by pretending to
be a yacht. It is difficult to detect their illegal fishing at
distance. Some captains also switch off their AIS to disappear
from monitoring centres screens and electronic chart display
and information systems (ECDIS) of neighbouring ships.
These acts are committed consciously by people on board
(Fig. 1, location 2).
Furthermore, ships can be hijacked without the knowledge
of their crew or surveillance centres by injecting false
differential GPS information. It is possible to affect on-board
GPS position in order to divert it from its original way (Fig. 1,
location 1). In that case, the captain thinks he follows a wrong
cape and manoeuvres the vessel in order to bring it back to the
right cape. But the captain actually diverts his own vessel
unbeknownst to him. What would be, in that case, the faced
risks? The vessel can be guided towards a dangerous
navigation area, such as a reef zone. The vessel could then run
aground. If we imagine the case of a super tanker, its
grounding would be followed by an oil slick, and a disaster for
the environment. The vessel could be guided towards an area
of dense traffic, such as a TSS, increasing the risk of boarding
with another vessel. A cape towards an area where containers
are drifting (e.g. in February 2013, a storm caused the loss of
500 containers in the North Sea) would make a collision with
a container and damages to the vessel unavoidable.
AIS devices and navigational aids (AtoN) can also be
reconfigured at distance (Fig. 1, location 4). The generation of
virtual (and false) AtoN or the hacking of their remote
maintenance parameters can have dramatic consequences on
navigation. One can imagine risks raised for instance by the
extinction of a lighthouse at distance during the night.
Other experiments have also demonstrated that it is also
possible to generate false alerts at sea, forcing organizations in
charge of maritime rescue such as MRCCs to take charge of
these alerts and to bring help to the virtual vessel from which
the false distress signal comes from (Fig. 2, location 3). This
rallying of means uselessly endangers rescuing crews and the
mobilized resources cannot be used for a real accident.
Fig 2. Five false positions (red arrows) in Brest bay injected in MarineTraffic.
At the beginning AIS was mainly used through VHF in order
to provide a local situation to ships at sea. With the wide
diffusion of AIS technology to all classes of vessels and the
ability to access to the Internet in the vicinity of the coast, more
and more people, at sea or ashore, use an Internet online AIS
provider such as Marine Traffic (marinetraffic.com), AIS Hub
(aishub.net), Vessel Finder (vesselfinder.com). These providers
could be sensible to many Internet threats like denial-of-service
(DoS), virus attack or SQL Injection (Fig. 1, location 5). As
these providers (even state ones) are mostly broadcasting
positioning information without an accurate analysis of
received messages they might broadcast false position reports
(Fig. 1, location 3) to their end-users as illustrated by Figure 2.
As a summary, the AIS's system, its implementation and the
protocol specification as well as the whole chain of data
transmission can be affected by many threats, offering multiple
attack possibilities. We propose to use long term analysis of
messages and ships’ trajectories with the identification of
specific behaviors in order to identify abnormalities in AIS
messages.
III.
METHODOLOGY AND ARTCHITECTURE
This section introduces the proposed methodological
approach for modelling, analyzing and detecting maritime
threats possibly caused by the AIS.
A. Modelling risks
In order to recognize and detect the risks it is necessary to
first model risk scenario. Knowledge on risks is dragged from
interviews of maritime domain experts and reviews of the
literature.
Risks will be modeled with ontologies. An ontology can be
defined as being “a formal and explicit specification of a
shared conceptualization.”
[5, 17]. This definition highlights
four particularly important notions in the ontology area:
Formal: means that the conceptualization and the
representation of the domain must be standardized and
used by a computer hardware;
Description: specifies that both concepts and constraints
used are defined in a declarative way ;
Conceptualization: underlines the fact that an ontology is
only an abstraction of the real world and that the terms
used and the relationships between them shall be
described without ambiguity ;
Community: implies that ontologies promote a consensual
knowledge for a community of agents.
In order to understand the behavior of a vessel and to
check that information it delivers is reliable, its sole location is
not sufficient. Indeed, this behavior can be analyzed through a
great amount of pieces of information (meteorological
conditions, surrounding vessels, etc….) which must be taken
into account. It is here that lies the concept of semantic
behavior. At each location is attached a number of pieces of
information that are judged relevant enough, and which will
then be used during the risky behavior detection process. The
creation of a semantic representation of trajectories, and
consequently a representation of behaviors, requires the
enhancement of the locations of vessels by several contextual
pieces of information [6]. In order to do that, three main
ontologies were created, basing on the model previously
developed by Yan [7, 8]:
A trajectory ontology including various spatiotemporal
concepts, necessary for a geometric definition of
trajectories.
A geographic ontology including the concepts specific to
territory description (roads, harbors, bays, etc….).
A domain ontology which is, as its name stands for,
relative to the studied domain.
Our analysis of risks will be based on a four-step method,
shared by several possible risks [4]:
1
st
step: technical and functional analysis of the system.
Its goal is to understand the studied system through its
components and the search of the understanding of its
purposes. It is a model of the studied system ;
2
nd
step: the qualitative analysis. Beyond the simple
identification of threats (search and identification of threat
sources), its purpose is the study of threats processes, i.e.
the research of feared events or of breakdowns, as well as
the reasons for the threat sources to trigger themselves
and the potential consequences of feared events ;
3
rd
step: the quantitative analysis. It enables us to
measure, to weight, in terms of occurrence probability
and seriousness of consequences, the feared events or the
system breakdowns previously analyzed. The eventual
purpose of this step is the organization into a hierarchy of
feared events or of system breakdowns ;
4
th
step: the synthesis. It enables the highlighting of
breakdowns and their combination use. The objective is to
ascertain the most critical components and thus to
propose the technical improvements likely to master
them.
B. Towards real-time detection
Monitoring of coastal maritime areas for various purposes
like safety and security, traffic management or protection of
strategic areas, has been largely based on the identification of
positions and trajectories and abnormal behavior detection
[10]. This kind of detection is based on (1) the long-term and
large-scale integration of positions from maritime traffic
continuously and, (2) spatio-temporal analysis able to
determine and classify a given maritime situation. This analysis
requires the identification and classification of navigational
behaviors, techniques of falsification of position reporting
systems and knowledge extraction methods to detect abnormal
maritime situations.
This detection can rely on a rule-based engine approach
allowing to formalise rules and to ensure the link between the
conceptual specification of a situation and its implementation
[6, 12, 13]. Several studies addressed spatial ontologies to
describe maritime traffic and identify dangerous and/or
suspicious behaviors [14, 6]. Related to these behaviors,
researchers have proposed solutions for anomaly detection
from supervised approaches. They used sets of recorded
trajectories and situations to define a panel of typical
abnormal behaviors from statistical analysis [10, 15, 16].
Nevertheless, situation awareness in these works is mainly
concerned with navigation mobilities. An information system
designed for detection of AIS spoofing should provide a wider
spectrum of analysis. The proposed approach relies on a
simple postulate: an attack or a falsification of the AIS has
consequences on received messages.
An AIS device can broadcast up to 27 different messages in
a range of approximately 35 nautical miles. Data exchanged
include in particular static information (vessel name,
dimensions, etc.) and dynamic information (heading, speed,
GPS position, etc.). Positioning information is transmitted at
high frequency (2-12 seconds for a moving ship, 3 min for an
anchored vessel). The system transmits on less regular basis
meta-information related to the ship (international identifier,
name, size) and its route (destination, date and time of arrival).
Additionally the system broadcasts some control messages
(e.g. management of channels and transceiver modes by a base
station is done by a message 22) and aids to navigation
messages.
In order to detect when an AIS device is falsified or is
undergoing an attack through a message-based analysis, real-
time AIS information should be analysed online and compared
to historical, expected or predicted information [11]. This
approach entails a challenging combination of the cartographic
and risk context, position reports from ships and behavioral
analysis and context-based analysis of AIS messages. The
processing architecture currently designed relies on a hybrid
spatio-temporal database system combining online and offline
processing (on-going work). Messages are processed on the
fly, specific message patterns or spatio-temporal behaviors are
mined according to the maritime context. At the same time,
messages are stored in the historical database where data are
aggregated and summarized in order to feed on-line processing
and analysis with a historical maritime context.
IV. C
ONCLUSION
This paper introduces issues emerging from falsification of
AIS messages. Risks and threats have been exposed and a
methodological approach for modelling, analyzing and
detecting these new maritime risks is presented. The objective
of this research is to detect when a ship’s AIS system or a
maritime surveillance system is undergoing an attack through
real-time message-based analysis and data mining.
A
CKNOWLEDGMENTS
Research presented in this paper is supported by The
French National Research Agency (ANR) under reference
ANR14CE280028. The project is also labelled by French
clusters Pôle Mer Bretagne Atlantique and Pôle Mer
Méditerranée and co-funded by DGA.
R
EFERENCES
[1] M. Balduzzi, A. Pasta, K. Wilhoit, "A Security Evaluation of AIS,
Automated Identification System", The 30th Annual Computer Security
Applications Conference, ACSAC 2014, New Orleans, Louisiana, USA,
December 8-12, 2014
[2] UNCTAB.: Review of maritime transport.Report, United Nations
Conference on Trade and Development (UNCTAD),
UNCTAD/RMT/2011,UN publication, 2011
[3] IMO.: Strategy for the development and implementation of e-navigation.
In: Report of the maritime safety committee on its eighty-fifth session,
annexe 20. International maritime organisation documentation, 2008
[4] Dassens, Launay. Etude systémique de l’analyse de risques
présentation d’une approche globale, Techniques de l’ingénieur, 2008
[5] Studer, Benjamins, Fensel. Knowledge engineering: Principles and
methods. Data & Knowledge Engineering, Vol 25, pp. 161-197, 1998
[6] A. Vandecasteele, A. Napoli. Using Spatial Ontologies for Detecting
Abnormal Maritime Behaviour. In Proc Of OCEANS 2012, 2012
[7] Z. Yan. Towards Semantic Trajectory Data Analysis: A Conceptual and
Computational Approach, in PhD Workshop, VLDB, Lyon, France, p. 3,
2009
[8] Z. Yan. Semantic Trajectories: Computing and Understanding Mobility
Data, Doctoral thesis, 2011
[9] IMO. Amendments to the International Aeronautical and Maritime
Search and Resacue (IAMSAR) Manual, 2013
[10] T. Devogele, L. Etienne, C. Ray, Mobility Data: Modelling,
Management, and Understanding, Part 3, Chapter 11 : Maritime
monitoring, pages 224-243, Chiara Renso, Stefano Spaccapietra,
Esteban Zimanyi (eds), Cambridge University Press, 2013
[11] L. Salmon, C. Ray, C. Claramunt, Une approche holistique combinant
flux temps-réel et données archivées pour la gestion et le traitement
d’objets mobiles, 30ième Journées Bases de Données Avancées (BDA
2014), 2 pages, 2014
[12] B. Idiri, A. Napoli. The automatic identification system of maritime
accident risk using rule-based reasoning. In Proc.of the 7th International
Conference on System Of Systems Engineering - IEEE SOSE, pp. 125-
130, 2012
[13] M. Morel, S. Claisse. Integrated System for Interoperable sensors &
Information sources for Common abnormal vessel behaviour detection
& Collaborative identification of threat (I2C). In Proc. of the Ocean and
Coastal Observation: sensors and observing systems, numerical models
and information systems, Brest, France, 2010
[14] J. Roy. Anomaly detection in the maritime domain. In: Theodore T.
Saito, T.T., Craig, S.H., Daniel, L. (eds.) SPIE 6945, Optics and
Photonics in Global Homeland Security IV, 69450W, Conference Vo.
6945, 2008
[15] C. Brax. Anomaly detection in the surveillance domain. Doctoral thesis,
Örebro University, School of Science and Technology, 2011
[16] M. Riveiro, G. Falkman, T. Ziemke. Improving, maritime anomaly
detection and situation awareness through interactive visualization. In:
11th International Conference on information Fusion, pp. 1-8, IEEE
Press, New York, 2008
[17] A. Vandecasteele, A. Napoli. An Enhanced Spatial Reasoning Ontology
for Maritime Anomaly Detection. 7th International Conference on
System Of Systems Engineering – IEEE SOSE, pp. 247-252, Genoa,
Italy, 2012
[18] B. Dufour, R. Pouillot. Approche qualitative du risque. Épidémiologie et
Santé Animale, 41: 3543, 2002
[19] M. Glandrup, Improving Situation Awareness in the Maritime Domain,
in Situation Awareness with Systems of Systems, P. van de Laar, J.
Tretmans, and M. Borth (Eds), Springer, 2013

Supplementary resource (1)

... The GP anomaly detection method focuses on identifying suspicious vessel behaviors rather than securing the communication channel or data itself. Similarly, the work in [132] also focuses on identifying potential anomalies by processing incoming AIS data. Balduzzi et al. [85] recommended applying anomaly detection techniques to the AIS data to identify suspicious activities, such as unexpected changes in a vessel's route, which could indicate spoofing or hijacking attempts. ...
... The system must accommodate a wide range of machinetype communication devices, from low-cost units with limited functionality to high-end devices offering advanced features [155]. Low-cost devices such as sensors and buoys often operate under power and energy constraints, posing challenges Detection model [131] Experimental ✓ Detection technique [132] Theoretical ✓ ? PKI using X.609 [85] Theoretical ✓ ? ...
Preprint
Full-text available
The maritime industry stands at a critical juncture, where the imperative for technological advancement intersects with the pressing need for robust cybersecurity measures. Maritime cybersecurity refers to the protection of computer systems and digital assests within the maritime industry, as well as the broader network of interconnected components that make up the maritime ecosystem. In this survey, we aim to identify the significant domains of maritime cybersecurity and measure their effectiveness. We have provided an in-depth analysis of threats in key maritime systems, including AIS, GNSS, ECDIS, VDR, RADAR, VSAT, and GMDSS, while exploring real-world cyber incidents that have impacted the sector. A multi-dimensional taxonomy of maritime cyber attacks is presented, offering insights into threat actors, motivations, and impacts. We have also evaluated various security solutions, from integrated solutions to component specific solutions. Finally, we have shared open challenges and future solutions. In the supplementary section, we have presented definitions and vulnerabilities of vessel components that have discussed in this survey. By addressing all these critical issues with key interconnected aspects, this review aims to foster a more resilient maritime ecosystem.
... Such detection processes should be applicable in real time or near-real time, using relevant mechanisms. In addition, the statistical or behavioral analysis of the maritime data (sensors with gray color in Figure 8) can be useful for the longterm and large-scale integration of data, permitting the spatiotemporal analysis to determine and classify a maritime anomaly including cyberthreats [259,260]. For example, possible use cases for each system/sensor include the following: ...
Article
Full-text available
Cybersecurity is becoming an increasingly important aspect in ensuring maritime data protection and operational continuity. Ships, ports, surveillance and navigation systems, industrial technology, cargo, and logistics systems all contribute to a complex maritime environment with a significant cyberattack surface. To that aim, a wide range of cyberattacks in the maritime domain are possible, with the potential to infect vulnerable information and communication systems, compromising safety and security. The use of navigation and surveillance systems, which are considered as part of the maritime OT sensors, can improve maritime cyber situational awareness. This survey critically investigates whether the fusion of OT data, which are used to provide maritime situational awareness, may also improve the ability to detect cyberincidents in real time or near-real time. It includes a thorough analysis of the relevant literature, emphasizing RF but also other sensors, and data fusion approaches that can help improve maritime cybersecurity.
... Given the broadcast nature of the radio spectrum, spoofing is particularly effective, making verification of the source of the message more challenging. Spoofing attacks have been proved to be effective against several wireless technologies, e.g., LTE [8], 6LoWPAN [11], AIS [18], and GPS [26]. In fact, many satellite systems emit wireless signals that are neither encrypted nor authenticated, thus easily becoming a privileged target for spoofing attacks: an adversary (the spoofer) can generate fake signals, e.g., by resorting to a Software Defined Radio (SDR) and publicly available software [12? ]. ...
Conference Paper
Full-text available
Detecting spoofing attacks on a satellite infrastructure is a challenging task, due to the wide coverage, the low received power from the satellite beams and finally the opportunistic nature of radio broadcasting. Although message authentication can be implemented at several communication layers, only a few solutions have been provided at the physical layer-this one exposing features that are invaluable for authentication purposes. Currently available solutions provide physical-layer authentication of the transmitter by combining deep learning and physical-layer features, thus requiring a long and computationally-intensive training process for any new transmitter joining the network. In this work, we propose SatPrint, a solution capable of detecting satellite spoofing attacks by fingerprinting the noise fading process associated with the satellite communication channel. Indeed, the fading of a satellite link is different from the one of a terrestrial link-used very often to launch spoofing attacks-thus allowing one to discriminate between the two. SatPrint does not require retraining when new transducers join the network, and does not rely on hardware impairments of both the transmitter and the receiver. SatPrint has been tested with real satellite and spoofed terrestrial radio measurements, under several different scenario configurations. We prove that SatPrint can effectively discriminate between a satellite transmitter and a fake terrestrial one, with an accuracy greater than 0.99 for all the considered configurations.
... Since AIS is a collaborative maritime reporting system, a vessel's crew might alter the GPS position of the vessel when transmitting the AIS messages. The phenomenon is called spoofing and has been the subject of several studies over the years [24,55,69,70]. • Interpolation error: when the AIS messages that we have around the acquisition time of an image transmitted by a vessel are not enough, and the vessel has changed its navigational status in the meantime (e.g., a vessel suddenly stops or it accelerates and changes heading), the estimated position of the vessel in the interpolation step might differ considerably from the actual position of the vessel. ...
Article
Full-text available
Density maps support a bird’s eye view of vessel traffic, through providing an overview of vessel behavior, either at a regional or global scale in a given timeframe. However, any inaccuracies in the underlying data, due to sensor noise or other factors, evidently lead to erroneous interpretations and misleading visualizations. In this work, we propose a novel algorithmic framework for generating highly accurate density maps of shipping activities, from incomplete data collected by the Automatic Identification System (AIS). The complete framework involves a number of computational steps for (1) cleaning and filtering AIS data, (2) improving the quality of the input dataset (through trajectory reconstruction and satellite image analysis) and (3) computing and visualizing the subsequent vessel traffic as density maps. The framework describes an end-to-end implementation pipeline for a real world system, capable of addressing several of the underlying issues of AIS datasets. Real-world data are used to demonstrate the effectiveness of our framework. These experiments show that our trajectory reconstruction method results in significant improvements up to 15% and 26% for temporal gaps of 3–6 and 6–24 h, respectively, in comparison to the baseline methodology. Additionally, a use case in European waters highlights our capability of detecting “dark vessels”, i.e., vessel positions not present in the AIS data.
... However, there are certain limitations and challenges associated with using historical AIS messages due to the quality of data [5]. It is well known that AIS data have quality issues in the form of insufficient or missing AIS messages in some areas [6], coverage gaps due to manipulation of the AIS transmitter [7] by vessels, bad weather conditions [8], messages being spoofed [9], and data incompatibility issues due to various storage and processing systems [10]. The challenge of making navigation decisions using data consisting of sparse AIS messages can become more pertinent when the sailing area is surrounded by islands or offshore wind/oil platforms, or when the depth of the water is insufficient for a given vessel type. ...
Article
Full-text available
The availability of automatic identification system (AIS) data for tracking vessels has paved the way for improvements in maritime safety and efficiency. However, one of the main challenges in using AIS data is often the low quality of the data. Practically, AIS-based trajectory data of vessels are available at irregular time intervals; consequently, large temporal gaps often exist in the historical AIS data. Meanwhile, certain tasks such as waypoint detection using historical data, which involves finding locations along the trajectory where the vessel changes its course (and possibly speed, acceleration, etc.), require AIS messages with a high temporal resolution. High-resolution AIS data are especially required for waypoint detection in critical areas where vessels maneuver carefully because of, e.g., narrow pathways or the presence of islands. One possible solution to address the problem of insufficient AIS data in vessel trajectories is interpolation. In this paper, we address the problem of detecting waypoints in a single representative trajectory with insufficient data using various interpolation-based methods. To this end, a two-step approach is proposed, in which the trajectories are first interpolated, and then the waypoint detection method is applied to the merged trajectory containing both interpolated and observed AIS messages. The numerical results demonstrate the effectiveness of exploiting various interpolation methods for waypoint detection. Moreover, the results of the numerical experiments show that the proposed methodology is effective for waypoint detection in envisaged settings with insufficient data, and outperforms the competing algorithm.
... • Erroneous AIS messages that can modify the transmitted data of the ship [6], [7]. • AIS Falsification [8] and Cyberattacks on AIS [6], caused by disruption of Global Positioning System (GPS) signals, jamming of wireless communications and manipulation of AIS transmission. ...
Chapter
Ransomware is considered among the top threats that organizations have to face, and one that is not expected to go away anytime soon. Cyber criminals have turned ransomware into a profitable business by targeting environments in which they can maximize the attack’s impact and their profits. The Maritime domain is a lucrative environment as it supports many aspects of the supply chain, making it a high priority target for cyber criminals. Recent ransomware incidents in the Maritime domain have demonstrated the necessity to increase the cyber risk awareness and readiness levels, to effectively address this threat. To defend and minimize the risk to get infected and/or recover if impacted by a ransomware, the required cybersecurity capacity needs to be developed. This can be achieved by educating and training all Maritime stakeholders, according to their role and responsibilities, across a strategic, operational, and/or tactical level. The challenge is to determine the capabilities that the Maritime stakeholders need to develop across the different levels, so they can exercise sound judgement and procedures when faced with a ransomware incident. This work presents an innovative training curriculum that was developed to build cybersecurity capacity in the Maritime domain and defend against ransomware attacks. A highlight of the proposed curriculum is that it specifies structured walkthrough practice to promote active learning and make education memorable and actionable. The proposed curriculum targets to provide design directions to the cybersecurity community to develop new training curricula to address future ransomware attacks.
Article
The automatic identification system (AIS) can improve situational awareness at sea, but its protocol is simple and does not guarantee message integrity, authentication, and proper use. For example, the lack of safety measures creates problems when AIS messages are used for tracking a target or predicting a target trajectory. We present a methodology for the validation of AIS messages, a prerequisite for their safe use in maritime situational awareness applications. The validation method relies on target trackers that fuse AIS data and exteroceptive sensor data, and it detects errors in position, speed and course, and rate of turn. We use radar data to exemplify exteroceptive sensor data. With the use of simulated data, we show that the proposed methods effectively detect errors in the position and velocity data received through AIS messages and are also able to detect errors in turn-rate data. The effectiveness of the methods is demonstrated on a real-world dataset with injected false AIS data.
Conference Paper
Full-text available
Current maritime traffic monitoring systems are not sufficiently adapted to the identification of maritime accident risk. It is very difficult for operators responsible for monitoring traffic to identify which vessels are at risk among all the shipping traffic displayed on their screen. They are overwhelmed by huge amount of kinematic ship data to be decoded. To improve this situation, this paper proposes a system for the automatic identification of maritime accident risk. The system consists of two modules. The first automates expert knowledge acquisition through the computerized exploration of historical maritime data, and the second provides a rule-based reasoning mechanism.
Conference Paper
Full-text available
Although originally conceived as a conceptual object for modelling knowledge, current ontologies do not make it possible to manipulate spatial knowledge. However, spatial knowledge is an essential component of any modelling specification. This problem provided the motivation for the creation of an expert system driven by an ontology. The system enables experts in the maritime domain to characterise abnormal ship behaviour based on formal semantic properties. Users are able to specify and execute spatial rules that are directly integrated into the ontology and a map interface linked to the ontology displays the results of the inferences obtained.
Conference Paper
AIS, Automatic Identification System, is an application of cyber-physical systems (CPS) to smart transportation at sea. Being primarily used for collision avoidance and traffic monitoring by ship captains and maritime authorities, AIS is a mandatory installation for over 300,000 vessels worldwide since 2002. Other promoted benefits are accident investigation, aids to navigation and search and rescue (SAR) operations. In this paper, we present a unique security evaluation of AIS, by introducing threats affecting both the implementation in online providers and the protocol specification. Using a novel software-based AIS transmitter that we designed, we show that our findings affect all transponders deployed globally on vessels and other maritime stations like lighthouses, buoys, AIS gateways, vessel traffic services and aircraft involved in SAR operations. Our concerns have been acknowledged by online providers and international standards organizations, and we are currently and actively working together to improve the overall security.
Chapter
Maritime safety and security organizations are continuously searching for new means to improve their awareness on activities and movement of vessels in the area they are monitoring. Over the years, building awareness on an area, or on a situation has become labor intensive because of the growth in available information. This is due to the increased number of vessel movements in an area, and the growing amount of information that is available on vessels beside position data. Consequently, the complexity of decisions about what actions are needed to cope with an incident increases. Another issue is that governments put more pressure on maritime security and safety organizations to protect the economic interests of the country. The government expects maritime safety and security organizations to ensure a smooth operation at sea, and be able to handle incidents at sea adequately while the budget stays the same. Monitoring operations at sea is difficult without the help of systems that provide support in building situation awareness. Such maritime safety and security systems must give alerts when incidents happen, provide a historic overview on vessel movement, provide interaction to replay a situation, and give support in up-keeping the quality of data when a sensor or other system part fails.
Article
Thanks to the rapid development of mobile sensing technologies (like GPS, GSM, RFID, accelerometer, gyroscope, sound and other sensors in smartphones), the large-scale capture of evolving positioning data (called mobility data or trajectories) generated by moving objects with embedded sensors has become easily feasible, both technically and economically. We have already entered a world full of trajectories. The state-of-the-art on trajectory, either from the moving object database area or in the statistical analysis viewpoint, has built a bunch of sophisticated techniques for trajectory data ad-hoc storage, indexing, querying and mining etc. However, most of these existing methods mainly focus on a spatio-temporal viewpoint of mobility data, which means they analyze only the geometric movement of trajectories (e.g., the raw ‹x, y, t› sequential data) without enough consideration on the high-level semantics that can better understand the underlying meaningful movement behaviors. Addressing this challenging issue for better understanding movement behaviors from the raw mobility data, this doctoral work aims at providing a high-level modeling and computing methodology for semantically abstracting the rapidly increasing mobility data. Therefore, we bring top-down semantic modeling and bottom-up data computing together and establish a new concept called "semantic trajectories" for mobility data representation and understanding. As the main novelty contribution, this thesis provides a rich, holistic, heterogeneous and application-independent methodology for computing semantic trajectories to better understand mobility data at different levels. In details, this methodology is composed of five main parts with dedicated contributions. Semantic Trajectory Modeling. By investigating trajectory modeling requirements to better understand mobility data, this thesis first designs a hybrid spatio-semantic trajectory model that represents mobility with rich data abstraction at different levels, i.e., from the low-level spatio-temporal trajectory to the intermediate-level structured trajectory, and finally to the high-level semantic trajectory. In addition, a semantic based ontological framework has also been designed and applied for querying and reasoning on trajectories. Offline Trajectory Computing. To utilize the hybrid model, the thesis complementarily designs a holistic trajectory computing platform with dedicated algorithms for reconstructing trajectories at different levels. The platform can preprocess collected mobility data (i.e., raw movement tracks like GPS feeds) in terms of data cleaning/compression etc., identify individual trajectories, and segment them into structurally meaningful trajectory episodes. Therefore, this trajectory computing platform can construct spatio-temporal trajectories and structured trajectories from the raw mobility data. Such computing platform is initially designed as an offline solution which is supposed to analyze past trajectories via a batch procedure. Trajectory Semantic Annotation. To achieve the final semantic level for better understanding mobility data, this thesis additionally designs a semantic annotation platform that can enrich trajectories with third party sources that are composed of geographic background information and application domain knowledge, to further infer more meaningful semantic trajectories. Such annotation platform is application-independent that can annotate various trajectories (e.g., mobility data of people, vehicle and animals) with heterogeneous data sources of semantic knowledge (e.g., third party sources in any kind of geometric shapes like point, line and region) that can help trajectory enrichment. Online Trajectory Computing. In addition to the offline trajectory computing for analyzing past trajectories, this thesis also contributes to dealing with ongoing trajectories in terms of real-time trajectory computing from movement data streams. The online trajectory computing platform is capable of providing real-life trajectory data cleaning, compression, and segmentation over streaming movement data. In addition, the online platform explores the functionality of online tagging to achieve fully semantic-aware trajectories and further evaluate trajectory computing in a real-time setting. Mining Trajectories from Multi-Sensors. Previously, the focus is on computing semantic trajectories using single-sensory data (i.e., GPS feeds), where most datasets are from moving objects with wearable GPS-embedded sensors (e.g., mobility data of animal, vehicle and people tracking). In addition, we explore the problem of mining people trajectories using multi-sensory feeds from smartphones (GPS, gyroscope, accelerometer etc). The research results reveal that the combination of two sensors (GPS+accelerometer) can significantly infer a complete life-cycle semantic trajectories of people's daily behaviors, both outdoor movement via GPS and indoor activities via accelerometer.
Article
As we face varied threats of terrorism and other lucrative criminal activities, in 2015, innovative solution shall be set up to permanently track and monitor all type of ship traffics, in vulnerable trading lanes and zones in order to detect abnormal or illicit vessel behaviour to understand and to early identify threatening situations. This future generation of maritime surveillance system must allow: • Permanent and all weather coverage of border maritime areas. • Continuous collection and fusion of heterogeneous data provided by various types of sensors deployed on coast and on mobile platforms and other information from external sources. • Supervised automatic detection of abnormal vessel behaviours (in track and performed activity) and generate justified alarms. • Understanding of suspicious events and early identification of threats from series of detected spatiotemporal abnormal vessel behaviours (alarms). • Generate electronic and formatted interpretation reports on the suspicious event to keep periodically informed decisional authorities. No equipment and information system 1 deployed are currently able to answer all these requirements. However, in the horizon of 2015 significant technical progresses have been made in wide maritime area coverage by different sets of sensors, heterogeneous data processing and fusion, and detection of abnormal behaviours methodology that could be usefully integrated together to built up an new generation of sea border surveillance integrated system for efficient security applications in high density traffics. 1 Most advanced sea surveillance operational systems in Europe are Spationav (France), S.I.V.E (Spain) and MEVAT (Finland). All these maritime surveillance systems are limited to perform traffic picture from conventional coastal radars and collected AIS data (version 2 in implementation) over only territory waters (up to 20 nautical miles from the shore). The objectives of the proposed I2C integration project are: • To build up a complete test system (end to end information acquisition and processing system). • To test the system in a ways of integration of data from network of existing and new maritime surveillance sensors and other available intelligent information sources in order to obtain optimal maritime security awareness. Integrating existing and advanced capacities demonstrate, in the horizon of 2015 that actual sea surveillance system can be significantly completed and upgraded with innovative technologies to build up operational solution to fulfil the main sea border surveillance requirement which is to early identify threats in order to timely react.
Conference Paper
The upsurge in piracy and the impact of recent environmental disasters have highlighted the need to improve maritime surveillance. Governmental and private initiatives have developed monitoring systems with improved acquisition and analysis capabilities. These systems rely on one major component, namely the detection of abnormal ship behaviour. This implies a detailed formalisation of expert knowledge. However, the quantity of data, the complexity of situations, the failure to take into account their spatial characteristics and the potential for the same scenario to be interpreted in different ways have proved to be significant problems. We therefore propose a new prototype for the analysis of abnormal ship behaviour. The system is based on a spatial ontology associated with a geographical inference engine. It automatically identifies suspicious vessels and associates them with probable behaviours defined by operational staff.