Advertisement

Cyber-Attacks Against the Autonomous Ship

  • Georgios KavallieratosEmail author
  • Sokratis Katsikas
  • Vasileios Gkioulos
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11387)

Abstract

Autonomous ships transferring valuable cargoes and humans in a more efficient and cost effective manner will soon be state of the art technology. Yet, their ICT system architecture and operations have not been defined in full detail. Moreover, multiple cyber security issues remain open and should be addressed. No study to date has analyzed fully the architecture of the autonomous ship, even less so have potential cyber threats and cyber attacks been identified. In this paper we identify and categorize systems that make up an autonomous ship, we propose a generic system architecture, and we analyze the cyber security of the ship by leveraging the STRIDE threat modeling methodology to identify potential cyber attacks, and to analyze the accordant risk. The results will support ship designers and industry towards improving the autonomous ship system architecture and making ship operations more secure.

Keywords

Autonomous ship Cyber-security Cyber-physical systems Risk analysis STRIDE Threats 

References

  1. 1.
    Lloyd’s Register. Cyber-enabled ships, p. 20 (2016)Google Scholar
  2. 2.
    Rolls-Royce. Remote and autonomous ship-the next steps, p. 88 (2016)Google Scholar
  3. 3.
    Microsoft. The stride threat model (2009)Google Scholar
  4. 4.
    MUNIN. Maritime unmanned navigation through intelligence in networks (2016)Google Scholar
  5. 5.
    Rødseth, Ø.J., Tjora, A.: A system architecture for an unmanned ship, May 2014Google Scholar
  6. 6.
    Rødseth, Ø.J., Kvamstad, B., Porathe, T., Burmeister, H.C.. Communication architecture for an unmanned merchant ship. In 2013 MTS/IEEE OCEANS - Bergen, pp. 1–9, June 2013Google Scholar
  7. 7.
    Burmeister, H.C., Bruhn, W., Walther, L., Moræus, J.A., Sage-Fuller, B.: Munin d8.6: final report: autonomous bridge. Technical report (2015)Google Scholar
  8. 8.
    MacKinnon, S.N., Man, Y., Baldauf, M.: Munin d8.8 final report shore control centre. Technical report (2015)Google Scholar
  9. 9.
    Schmidt, M., Fentzahn, E., Atlason, G.F., Rødseth, H.: Munin 8.7 final report autonomous engine room. Technical report (2015)Google Scholar
  10. 10.
    Rødseth, Ø.J., Burmeister, H.-C.: Risk assessment for an unmanned merchant ship. TransNav 9(3), 357–364 (2015)CrossRefGoogle Scholar
  11. 11.
    Tam, K., Jones, K.: Cyber-risk assessment for autonomous ships, p. 9 (2018)Google Scholar
  12. 12.
    Katsikas, S.K.: Cyber security of the autonomous ship. In Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, CPSS 2017, pp. 55–56. ACM, New York (2017 )Google Scholar
  13. 13.
    Hussain, S., Kamal, A., Ahmad, S., Rasool, G., Iqbal, S.: Threat modelling methodologies: a survey. Sci. Int. (Lahore) 26(4), 1607–1609 (2014)Google Scholar
  14. 14.
    Sidi, F., et al.: A comparative analysis study on information security threat models: a propose for threat factor profiling. J. Eng. Appl. Sci. 12, 548–554 (2017)Google Scholar
  15. 15.
    Cheung, C.Y.: Threat modeling techniques (2016)Google Scholar
  16. 16.
    Havinga, H., Sessink, O.: Risk Reduction Overview Manual, version 1.0 edition (2014)CrossRefGoogle Scholar
  17. 17.
    Krishnan, S.: A hybrid approach to threat modelling, p. 24 (2017)Google Scholar
  18. 18.
    ICS INTERCARGO INTERTANKO OCIMF BIMCO, CLIA and IUMI. The guidelines on cyber security onboard ships, p. 51 (2017)Google Scholar
  19. 19.
    Bruhn, W., et al.: Munin D5.2: process map for autonomous navigation. Technical report (2013)Google Scholar
  20. 20.
    Kokotos, D., Linardatos, D., Nikitakos, N.B., Tzannatos, E.S.: Information and communication technologies in shipping industry (In Greek). Stamoulis (2011)Google Scholar
  21. 21.
    Nordahl, H., Rødseth, Ø.J.: NFAS-definitions for autonomous merchant ships, p. 10 (2017)Google Scholar
  22. 22.
    Shostack, A.: Threat Modeling: Designing for Security, 1st edn. Wiley, Hoboken (2014)Google Scholar
  23. 23.
    Jelacic, B., Rosic, D., Lendak, I., Stanojevic, M., Stoja, S.: STRIDE to a secure smart grid in a hybrid cloud. In: Katsikas, S.K., et al. (eds.) CyberICPS/SECPRE -2017. LNCS, vol. 10683, pp. 77–90. Springer, Cham (2018).  https://doi.org/10.1007/978-3-319-72817-9_6CrossRefGoogle Scholar
  24. 24.
    Kavallieratos, G.: Cyber-attacks against the cyber-enabled ship. M.Sc. thesis. University of Piraeus, Greece (2018)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Georgios Kavallieratos
    • 1
    Email author
  • Sokratis Katsikas
    • 1
    • 2
  • Vasileios Gkioulos
    • 1
  1. 1.Department of Information Security and Communications TechnologyNorwegian University of Science and TechnologyGjøvikNorway
  2. 2.School of Pure and Applied SciencesOpen University of CyprusNicosiaCyprus

Personalised recommendations