ArticlePDF Available

Maritime information sharing environment deployment using the advanced multilayered Data Lake capabilities: EFFECTOR project case study

Authors:

Abstract and Figures

Establishing an efficient information-sharing network among national agencies in the maritime domain is of essential importance in enhancing operational performance, increasing situational awareness, and enabling interoperability among all involved maritime surveillance assets. Based on various data-driven technologies and sources, the EU initiative of Common Information Sharing Environment (CISE), enables the networked participants to timely exchange information concerning vessel traffic, joint SAR & operational missions, emergency situations, and other events at sea. In order to host and process vast amounts of vessels and related maritime data consumed from heterogeneous sources (e.g. SAT-AIS, UAV, radar, METOC), the deployment of big data repositories in the form of Data Lakes is of great added value. The different layers in the Data Lakes with capabilities for aggregating, fusing, routing, and harmonizing data are assisted by decision support tools with combined reasoning modules with semantics aiming at providing a more accurate Common Operational Picture (COP) among maritime agencies. Based on these technologies, the aim of this paper is to present an end-to-end interoperability framework for maritime situational awareness in strategic and tactical operations at sea, developed in EFFECTOR EU-funded project, focusing on the multilayered Data Lake capabilities. Specifically, a case study presents the important sources and processing blocks, such as the SAT-AIS, CMEMS, and UAV components, enabling maritime information exchange in CISE format and communication patterns. Finally, the technical solution is validated in the project's recently implemented maritime operational trials and the respective results are documented.
Content may be subject to copyright.
291











112
5
1

2


5






Key words:
CISE





 
           
          
      






           
      
          

           
     
            

1 Introduction

      
       



       
    
      
    
        


  
       
 
        
    
292
Z. Paladin et al. 
      
      
  

   
     
       


      
      

          

        

 

 

 

        

         


        

  
        

  
      


        
     
    
      

        

  

  
       
  


      

2 Methodology


       
       




  


  
   
    

Figure 1
Source: 
2.1 The CISE Network and Maritime Surveillance
systems
        
     


         
     

     
  
   
  
        



Z. Paladin et al. 
        
      
     






    
       

   
         
       

 
 
 
 

       

Figure 2

       
         
   

  
     
 
   
 
         
      
     
     
        
      
  

     
       
      

      
     


       
    

  
  
     



 

        
       
        

         
    


        




  
         

        
 

  
       

     


      

        
       
    
     

Z. Paladin et al. 


      

        
 




      
     
       
      

        
      
       
     
     
        



      
       
       
   


2.2 Data Lake Architecture


    



       
      
      


          

    
       
   

        
  

      
      


     
    



  

         


      
 

     


       
   
 
         

        
         

         
    

 
        

         
         

      








    

         





  
 


       
295
Z. Paladin et al. 
        


    



       



       









 

       
  
       
Figure 3
Source:
Figure 4
Source:

Z. Paladin et al. 
    
   


  
        


      

3 Case Study: EFFECTOR Project
3.1 Project EFFECTOR overview and Multilayered
Data Lake Introduction

        

 

        

     
       

        
  
       

 
        
        

      

      

         


         
     
        
      
     

      
 
        
       

        


      
     
       

         

       

       

3.2 Semantic Layers of Data Lake and Recognized
Maritime Picture
       

      

       

  


        
       
 

         

        


   
 
    


       
       

       

   





a
priori

 
ad-hoc

   

 
         


Z. Paladin et al. 
        




      



  

       

        
       

      




       




Figure 7
Source: 
Figure 8
Source: 
Figure 5
Source: 
Figure 6
Source: 

Z. Paladin et al. 
3.3 SAT-AIS, CMEMS and other relevant Satellite data
for Data Lake


        

 

 



    


      



       



        

        
       



3.4 UAV data provision to Data Lakes
3.4.1 The UAV system developed
   

      
   

        

        
        

         


    
        


      
 
      
        

       
     
 
    
 
 



  
       
  
 
          
  
 
         




      
       
Table 1
 
 

 
 
 
 
 

Size 
 
Figure 9
299
Z. Paladin et al. 



         
   

3.4.2 Data Lakes and e-CISE compatibility

         
    

         
   


     
   



    




       







       
      












Figure 10
Figure 11
Source: 
Figure 12
Source: 
Figure 13
Source: 

Z. Paladin et al. 
         


4 Trials implementation, evaluation and projects
results
     

       

        
      
 
       
       
         

  

     
         
      

  
      


 
 
 

 
 
 
 

       
   
      
     
       
      
   

   
      
     

       
         

      
      


       
       


Figure 14
Source: 

Z. Paladin et al. 
   

       

    
      
        

 


General requirements,

       

   
Figure 15
Source: 
Figure 16


Source: 
Figure 17
Source: 

Z. Paladin et al. 
        







Decision Support




  
       


        




Data Lake and Semantics  
       

  
   

         
       
        


         


    
       

 
        
    


       
         
        

   
       

  

        


 
        
       

Figure 18

Source: 
Figure 19

Source: 
Figure 20

Source: 

Z. Paladin et al. 
Figure 21
Source: 

 

        
      
 

         

        


        
        

 

        
        
         

5 Conclusion





    
  
        

 

       
      




         

    

Funding and Acknowledgement: 
       
      




Author Contributions:   
       

References
        
        


      
MIPRO

  

        

  


Z. Paladin et al. 
      Practical Guide
for joining the CISE network
      CISE Technical
Documentation
 The Entity Service
Model for CISE -Service Model Specifications, Technical
Report


 
 
      
    
  Scientific Journal of Maritime
Research35(2)
   
       
      
   
NMIOTC Journal, 
         

MIPRO 
     
    MIPRO 

   
        
   
     , 
, 
 

         

      

 
 
 
 
        
     

          
   
       
     

  

 


 󰨠

 

 
 
   


  


 

        



        
      
      
Sensors
        
   
       
      
Computation
 
        
      
     Computation 

   
        
  
 
     
 
... CISE: The CISE project, spearheaded by the European Maritime Security Agency (EMSA), aims to develop an architecture that connects existing legacy systems from various maritime surveillance entities [42] This architecture is based on so-called adaptors to link nodes established at both national and European levels, ensuring compatibility among diverse legacy systems. The subsequent EFFECTOR project extends CISE's capabilities by establishing a data lake-like structure to facilitate big data operations on collected raw data from these legacy systems [43]. ...
... among diverse legacy systems. The subsequent EFFECTOR project extends CISE's capabilities by establishing a data lake-like structure to facilitate big data operations on collected raw data from these legacy systems [43]. ...
Article
Full-text available
Digitalization is transforming the maritime sector, and the amount and variety of data generated is increasing rapidly. Effective data utilization is crucial for data-driven services such as for highly automated maritime systems and efficient traffic coordination. However, these applications depend on heterogeneous, distributed data sources managed by different actors, making secure and sovereign information sharing difficult. This paper investigates how maritime data can be exchanged reliably and securely without jeopardizing data sovereignty. Based on the existing literature, we identify the main challenges and current research gap in sharing maritime information, emphasizing the importance of data availability. From this, we derive requirements for a secure and sovereign infrastructure for data exchange. To address these challenges, we propose a fully decentralized architecture for the maritime sector based on the concept of a data space. Our approach integrates protocols to improve data availability while minimizing data volume, considering maritime constraints such as volatile connectivity, low bandwidth and existing standards. We evaluate our architecture through a maritime traffic management case study and demonstrate its ability to enable secure and sovereign exchange of heterogeneous data. The results confirm that our solution reliably supports distributed data collection and enables data-driven, value-added services, which in turn will improve the safety and efficiency of the maritime domain in the near future.
... Numerous devices and systems in the maritime sector generate a large quantity of unstructured data that reflect the state of all operations done by maritime stakeholders, concerning ship management, cargo flows, optimal routes, weather specifics, sensors onboard for ship operation, safety, and security information together with numerous parameters related to port and hinterland operations. This everincreasing amount of data is known as Big Data and it is characterized by 5V -Volume, Value, Veracity, Velocity, and above all Variety ([1]- [3]). One of the modern, recently developed technologies concerning data science and Z.P., N.K., Ž.L., are with the Administration for Maritime Safety and Port Management of Montenegro (name.surname@pomorstvo.me). ...
... Various existing sensors, such as AIS (Automatic Identification System), radar, LRIT (Long Range Identification and Tracking), and satellite imagery, collect data on vessels' positions, speeds, routes, and other relevant information [4]. This data can be used to improve maritime safety and security, route planning, fuel consumption efficiency and ensure vessels are on schedule ( [2], [3], [5]). ...
Conference Paper
Full-text available
This paper reviews the most important cases of using Blockchain to support Big Data in maritime transport and supply chains and to make them secure and integrated. Contemporary global markets and trade produce a vast amount of Big Data that is collected from various sources and processed, structured, and categorized in order to provide important information to various users in the maritime sector. Also, Blockchain as a new disruptive technology could provide important benefits for handling, securing, and efficient management of Big Data within the maritime transportation supply chain. The paper presents some of the key platforms of Blockchain for maritime and logistics purposes, including smart contracts and other use cases.
... The significant operational feature is the possibility to approach the areas of high risk for humans, while one of the threats is the collapsing of the UAVs due to severe weather conditions/harsh environments [4]. Another important aspect of UAV development is its improvement in terms of integration with embedded AI modules for detecting, recognizing, and tracing the objects at sea with the ability to instantly transmit the information to ground stations and related data lakes for further processing [5]. ...
Conference Paper
Full-text available
This paper analyzes the general UAV development and its advancement with the Fifth-generation technology standard for broadband cellular networks (5G network), as well as real-time video streaming and other tools deployed for UAV use cases in the context of EU project RESPOND-A. Practically, the paper provides the case study with simulated risk realization events in which were used UAVs supported by 5G network modems, communication terminals, and 4K 360º video cameras with social viewing tools. Especially for advancing operational and surveillance capacities for SAR missions and environment protection, UAV assets are supported by the recent introduction of the 5G network, which enables a continual flow of information between them and shore-based rescue coordination centers. Such a manner would comprehend the integrated UAV data collecting capabilities, their transmission via the next generation of wireless communications, and seamless video and audio data provision, aiming to raise the level of situational awareness.
... Vessel Traffic Monitoring and Information System -VTMIS), data sensors and sources, C2 applications, Decision support tools (DST) with Artificial intelligence (AI)supported modules and Data Lakes for maritime surveillance, SAR, and environmental protection are integrally used, reaching the high level of interoperability between involved sectors. Such information sharing process among networking of regional maritime agencies is of essential importance for the full operationalization of EU initiative Common Information Sharing Environment (CISE) ( [5], [6], [7], [8]). ...
Conference Paper
Full-text available
Successful maritime search and rescue (SAR) missions and real-time information exchange among first responder organizations (FRs) and command/coordination centers, fully rely on straightforward information flow and accurate communication channels, supported by novel data sharing technologies, advanced network connections, and interoperable platforms. Therefore, SAR actions at sea, as an integral part of the national maritime safety system, are supported with mission-critical communication (MCC) networks and devices. The paper presents the analysis of SAR operational and communication specifics, use cases, and technical efficiency increase in the maritime safety framework, with a focus on specific operational capabilities of MCC, connection networks, devices, and procedures for maritime distress communication. Further to MCC, the paper provides insight into the 5G network applied in maritime SAR and communications. The case study consists of an elaboration of the Mission Critical Communication platform components and X/BELLO tool, a secure 5G application that allows real-time information exchange, deployed under the RESPOND-A project approach. These systems represent the technical part of the SAR pilot of the EU RESPOND-A project showcasing the opportunities to strengthen the operational framework of maritime FRs and improve their joint mission performance.
Conference Paper
Full-text available
The complexity of maritime traffic operations indicates an unprecedented necessity for joint introduction and exploitation of artificial intelligence (AI) technologies, that take advantage of the vast amount of vessels' data, offered by disparate surveillance systems to face challenges at sea. This paper reviews the recent Big Data and AI technology implementations for enhancing the maritime safety level in the common information sharing environment (CISE) of the maritime agencies, including vessel behavior and anomaly monitoring, and ship collision risk assessment. Specifically, the trajectory fusion implemented with InSyTo module for soft information fusion and management toolbox, and the Early Notification module for Vessel Collision are presented within EFFECTOR Project. The focus is to elaborate technical architecture features of these modules and combined AI capabilities for achieving the desired interoperability and complementarity between maritime systems, aiming to provide better decision support and proper information to be distributed among CISE maritime safety stakeholders.
Conference Paper
Full-text available
Ensuring a high level of vessel traffic surveillance and maritime safety is determined by exploiting innovative ICT technologies and international cooperation among maritime authorities. Therefore, initiatives for maritime surveillance, global and regional integrations are realised through a collaborative, cost-effective and interoperable Common Information Sharing Environment (CISE). Consisting of the institutional network of maritime authorities that cooperate on various domains like safety, border control, environmental and rescue missions at sea, CISE enables the efficient transfer and economic exchange of maritime data and information via different interoperable systems using modern digital technologies. The ever-increasing amount of data received from heterogeneous data sources requires specific processing through the adoption of a Big Data framework which hosts, manages and distributes data to maritime users, contributing with great overall benefits to the CISE network core functionality. Specifically, this paper analyses the advantages of the Data Lake infrastructure, including its processes, techniques, tools and applications used to enhance maritime surveillance and safety across the CISE network. This part contains the deployment and interoperability achieved through the components of the participating command and control (C2) systems. Last, as a case study, an overview of the EU project EFFECTOR is provided which aims to demonstrate an end-to-end interoperability framework of data-driven solutions for maritime situational awareness at strategic and tactical operations.
Conference Paper
Full-text available
This paper outlines an example method and trial scenario phases for extending the existing tools for maritime surveillance across the maritime regions of Europe. There are continuous dedicated efforts throughout European collaborations for advancing the features of Common Information Sharing Environment (CISE), which is a European Union (EU) initiative for ubiquitous information sharing across the maritime and land borders, as well as between the national sectors. The EFFECTOR EU project introduces a novel concept in the information exchange: the data lake, intended for providing a common smart data repository for diverse and comprehensive data analysis and storage that emanates from diverse sources within the local, regional, national, and international scope. Setting up of the data lake facilities and broadened information exchange is established and validated through early trials planned to be conducted in the project. Administration for Maritime Safety and Port Management (AMSPM) is integrating maritime surveillance data from Montenegro in the EU information exchanges and vice versa. The EFFECTOR project’s French maritime trial offers an implementation of the broadened scope of uses of advanced data exchanges, analysis storage, and retrieval. A case of retroactive data analysis and deductions is to be demonstrated through collaboration of AMSPM in the French maritime trial with other project partners. The trial scenario planning includes two vessels coming into the French waters near Marseille from distant ports, one via a stop-over in Montenegro and the other from Portugal.
Article
Full-text available
Maritime operations rely heavily on surveillance and require reliable and timely data that can inform decisions and planning. Critical information in such cases includes the exact location of objects in the water, such as vessels, persons, and others. Due to the unique characteristics of the maritime environment, the location of even inert objects changes through time, depending on the weather conditions, water currents, etc. Unmanned aerial vehicles (UAVs) can be used to support maritime operations by providing live video streams and images from the area of operations. Machine learning algorithms can be developed, trained, and used to automatically detect and track objects of specific types and characteristics. EFFECTOR is an EU-funded project, developing an Interoperability Framework for maritime surveillance. Within the project, we developed an embedded system that employs machine learning algorithms, allowing a UAV to autonomously detect objects in the water and keep track of their changing position through time. Using the on-board computation unit of the UAV, we ran and present the results of a series of comparative tests among possible architecture sizes and training datasets for the detection and tracking of objects in the maritime environment. We tested architectures based on their efficiency, accuracy, and speed. A combined solution for training the datasets is suggested, providing optimal efficiency and accuracy.
Article
Full-text available
Visual sensing of the environment is crucial for flying an unmanned aerial vehicle (UAV) and is a centerpiece of many related applications. The ability to run computer vision and machine learning algorithms onboard an unmanned aerial system (UAS) is becoming more of a necessity in an effort to alleviate the communication burden of high-resolution video streaming, to provide flying aids, such as obstacle avoidance and automated landing, and to create autonomous machines. Thus, there is a growing interest on the part of many researchers in developing and validating solutions that are suitable for deployment on a UAV system by following the general trend of edge processing and airborne computing, which transforms UAVs from moving sensors into intelligent nodes that are capable of local processing. In this paper, we present, in a rigorous way, the design and implementation of a 12.85 kg UAV system equipped with the necessary computational power and sensors to serve as a testbed for image processing and machine learning applications, explain the rationale behind our decisions, highlight selected implementation details, and showcase the usefulness of our system by providing an example of how a sample computer vision application can be deployed on our platform.
Article
Full-text available
This paper outlines an extensive analysis of the case of Montenegro’s maritime surveillance system becoming integrated within the European Common Information Sharing Environment (CISE). Threats to secure maritime borders across Europe are ever-present and regularly demand coordinated efforts between the member states to tackle and prevent them, e.g. illegal immigration across the Mediterranean. Administration for Maritime Safety and Port Management (AMSPM) in Montenegro is a member of the ANDROMEDA EU project that seeks to facilitate deployments and demonstrations of CISE trials across the European regions, towards their endorsement readiness. AMSPM is now at the forefront of assessing and deploying the CISE components in Montenegro. It thus appropriately evaluates the operational aspects, observes the CISE implementations in some European states, formulates the impact for other national stakeholders, as well as the very prospect of the resulting augmented maritime surveillance in the country. This substantiates the content of this paper as the feasibility of the CISE deployment in Montenegro, supported by a snapshot of the cost-benefit analysis. We aspire to offer novel perspectives and insights that could be a universally useful experience to different CISE implementation initiatives, especially for countries or regions of similar smaller sizes and coastal area.
Article
Full-text available
Situational awareness is a critical aspect of the decision-making process in emergency response and civil protection and requires the availability of up-to-date information on the current situation. In this context, the related research should not only encompass developing innovative single solutions for (real-time) data collection, but also on the aspect of transforming data into information so that the latter can be considered as a basis for action and decision making. Unmanned systems (UxV) as data acquisition platforms and autonomous or semi-autonomous measurement instruments have become attractive for many applications in emergency operations. This paper proposes a multipurpose situational awareness platform by exploiting advanced on-board processing capabilities and efficient computer vision, image processing, and machine learning techniques. The main pillars of the proposed platform are: (1) a modular architecture that exploits unmanned aerial vehicle (UAV) and terrestrial assets; (2) deployment of on-board data capturing and processing; (3) provision of geolocalized object detection and tracking events; and (4) a user-friendly operational interface for standalone deployment and seamless integration with external systems. Experimental results are provided using RGB and thermal video datasets and applying novel object detection and tracking algorithms. The results show the utility and the potential of the proposed platform, and future directions for extension and optimization are presented.
Conference Paper
As the Data Lakes have gained a significant presence in the data world in the previous decade, several main approaches to building Data Lake architectures have been proposed. From the initial architecture towards the novel ones, omnipresent layers have been established, while at the same time new architecture layers are evolving. The evolution of the Data Lake is mirrored in the architectures, giving each layer a distinctive role in data processing and consumption. Moreover, evolving architectures tend to incorporate established approaches, such as Data Vaults, into their layers for more refined usages. In this article, several well-known architecture models will be presented and compared with the goal of identifying their advantages. Next to the architecture models, the topic of Data Governance in the terms of the Data Lake will be covered in order to expound its impact on the Data Lake modeling.