Towards an Understanding of Security, Privacy and Safety in Maritime Self-Reporting Systems

  • Mark McIntyre
  • Lynne Genik
  • Peter Mason
  • Tim Hammond
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 238)


Global satellite navigation systems such as GPS enable precise tracking of vessels worldwide and pervasive global networks such as the Internet allow sharing of this information almost instantaneously between locations anywhere on Earth. This ability to monitor vessels globally is a topic of current debate among those concerned with national security, those who are mainly interested in safety at sea and those who advocate for privacy rights at the personal, commercial and national level. In this paper we discuss two maritime self-reporting systems, namely the Automatic Identification System and Long Range Identification and Tracking, which have given rise to this debate. The benefits and drawbacks of each are discussed with safety, security and privacy in mind. Also, some connections are drawn between these systems and Mobile Ad Hoc Networks and Radio Frequency Identification where security and privacy are also of current interest.


Global Position System Global Satellite Navigation System International Maritime Organization Automatic Identification System Differential Global Position System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. [1]
    K.R. Foster and J. Jaeger, RFID Inside: The Murky Ethics of Implanted Chips, IEEE Spectrum, March 2007, pp. 41–48Google Scholar
  2. [2]
    Fisheries and Oceans Canada, Vessel Monitoring System (VMS), (2005), retrieved June 2006 from
  3. [3]
    W.R. Cairns, AIS and Long Range Identification and Tracking, The Journal of Navigation (2005), 58, pp. 181–189.CrossRefGoogle Scholar
  4. [4]
    Adoption of Amendments to the International Convention for the Safety of Life at Sea, 1974, as Amended, Annex 2 Resolution MSC.202(81), adopted May 19, 2006, retrieved April 2007 from 2%2881%29.pdf
  5. [5]
    Development of the Draft SOLAS Amendments on Long Range Identification and Tracking, Submitted by the Russian Federation, IMO Intersessional MSC Working Group on Long Range Identification and Tracking, MSC/ISWG/LRIT 1/3/4, September 20, 2005, retrieved April 2007 from
  6. [6]
    Draft Report of the Maritime Safety Committee on its Eighty-Second Session (continued), IMO MSC 82/Wp.8/Add.1, December 8, 2006Google Scholar
  7. [7]
    K. Abercrombie, N. Trainor and J. Huggett, Enhancing Navigation Safety and Protection of the Marine Environment of the Great Barrier Reef and Torres Strait Region, Australian Maritime Safety Authority, retrieved April 2007 from A_speeches/Austmarine_East_conf.pdf
  8. [8]
    W.R. Cairns, On Watch: Vessel Tracking Technologies for Maritime Security, US Coast Guard Proceedings, Spring 2006, pp 32–35.Google Scholar
  9. [9]
    T. Hammond, R. Kessel, The Implications of the Universal Shipborne Automatic Identification System (AIS) for Maritime Intelligence, Surveillance, and Reconnaissance, Defence R&D Canada — Atlantic Technical Memorandum, DRDC Atlantic TM 2003-143, August 2003.Google Scholar
  10. [10]
    Macaluso, Capt J.J., “Maritime Domain Awareness Data Sharing Community of Interest: A new partnership explores net-centricity”, The Coast Guard Journal of Safety & Security at Sea Proceedings of the Maritime Safety & Security Council, Vol. 63, Number 3, Fall 2006, pp 62–64.Google Scholar
  11. [11]
    AIS Frequently Asked Questions, US Coast Guard Navigation Center, available April 2007 from
  12. [12]
  13. [13]
    Performance Standards and Functional Requirements for the Long Range Identification and Tracking of Ships, Annex 13 Resolution MSC.210(81), adopted May 19, 2006, retrieved April 2007 from
  14. [14]
    Interim LRIT Technical Specifications and Other Matters, IMO Ref. T2-OSS/1.4, MSC.1/Circ.1219, December 15, 2006, retrieved April 2007 from 19.pdf
  15. [15]
    Informal Record of Discussions, LRIT Ad Hoc Engineering Group, June 2006, available April 2007 from df
  16. [16]
    H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, Security in mobile ad hoc networks: challenges and solutions, IEEE Wireless Communications, Vol 11, Issue 1, Feb 2004, pp 38–47.CrossRefGoogle Scholar
  17. [17]
    J. Cichon, M. Klonowski, and M. Kutylowski. Privacy Protection in Dynamic Systems Based on RFID Tags, PerSec 07, March 2007.Google Scholar
  18. [18]
    S.A. Weis, S.E, Sarma, R.L. Rivest, D.W. Engels, Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems, Security in Pervasive Computing (SPC) 2003, LNCS 2802, 201–212.Google Scholar
  19. [19]
    A. Juels, RFID security and privacy: a research survey, IEEE Journal on Selected Areas in Communications, Vol. 24, Issue 2, Feb 2006, pp 381–294.CrossRefMathSciNetGoogle Scholar
  20. [20]
    N. Aboudagga, M. T. Refaei, M. Eltoweissy, L. A. DaSilva, J-J. Quisquater, Authentication protocols for ad hoc networks: Taxonomy and research issues, Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, October 2005.Google Scholar

Copyright information

© International Federation for Information Processing 2007

Authors and Affiliations

  • Mark McIntyre
    • 1
  • Lynne Genik
    • 1
  • Peter Mason
    • 1
  • Tim Hammond
    • 1
  1. 1.Defence R&DCanada

Personalised recommendations