Design and Implementation of IVEF Protocol Using Wireless Communication on Android Mobile Platform

  • Kyunghwan Kim
  • Byung-Doo Kim
  • Byunggil Lee
  • Namje Park
Part of the Communications in Computer and Information Science book series (CCIS, volume 339)


As electronic technology has been developing, a number of ship- and shore-based electronic devices has been used for vessels such as Automatic Identification System(AIS), Electronic Chart Display and Information System(ECDIS), Long Range Identification and Tracking(LRIT) systems. In addition, internet technology is being adopted for safe, economic and efficient movement of vessels and maritime disasters. Therefore electronic gadgets on a vessel and protocols between vessel traffic systems need to be standardized. e-Navigation is a concept developed under the auspices of the UN’s International Maritime Organization (IMO) to bring about increased safety and security in commercial shipping through better organization of data on ships and on shore, and better data exchange and communication between the two. In this paper, we propose the design based on IVEF that has been developing as the protocol for e-Navigation’s data communication. And we show the implementation. We used the smart-phone adopted Android platform for the emulation of a voyaging ship and the desktop computer for the emulation of a VTS.


Android platform e-Navigation IVEF VTS 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    IALA Recommendation V-145 on the Inter-VTS Exchange Format (IVEF) Service (2011)Google Scholar
  2. 2.
  3. 3.
  4. 4.
    International Association of Lighthouses and Aids-to-Navigation Authorities (IALA). Interface Control Document for IVEF, release 0.1.7Google Scholar
  5. 5.
    A Security Architecture of the inter-VTS System for shore side collaboration of e-Navigation (2012) Google Scholar
  6. 6.
    Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  7. 7.
    Park, N.: Security Scheme for Managing a Large Quantity of Individual Information in RFID Environment. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds.) ICICA 2010. CCIS, vol. 106, pp. 72–79. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  8. 8.
    Park, N.: Secure UHF/HF Dual-Band RFID: Strategic Framework Approaches and Application Solutions. In: Jędrzejowicz, P., Nguyen, N.T., Hoang, K. (eds.) ICCCI 2011, Part I. LNCS, vol. 6922, pp. 488–496. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  9. 9.
    Park, N.: Implementation of Terminal Middleware Platform for Mobile RFID computing. International Journal of Ad Hoc and Ubiquitous Computing 8(4), 205–219 (2011)CrossRefGoogle Scholar
  10. 10.
    Park, N., Kim, Y.: Harmful Adult Multimedia Contents Filtering Method in Mobile RFID Service Environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part II. LNCS (LNAI), vol. 6422, pp. 193–202. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  11. 11.
    Park, N., Song, Y.: AONT Encryption Based Application Data Management in Mobile RFID Environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part II. LNCS (LNAI), vol. 6422, pp. 142–152. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  12. 12.
    Park, N.: Customized Healthcare Infrastructure Using Privacy Weight Level Based on Smart Device. In: Lee, G., Howard, D., Ślęzak, D. (eds.) ICHIT 2011. CCIS, vol. 206, pp. 467–474. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  13. 13.
    Park, N.: Secure Data Access Control Scheme Using Type-Based Re-encryption in Cloud Environment. In: Katarzyniak, R., Chiu, T.-F., Hong, C.-F., Nguyen, N.T. (eds.) Semantic Methods. SCI, vol. 381, pp. 319–327. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  14. 14.
    Park, N., Song, Y.: Secure RFID Application Data Management Using All-Or-Nothing Transform Encryption. In: Pandurangan, G., Anil Kumar, V.S., Ming, G., Liu, Y., Li, Y. (eds.) WASA 2010. LNCS, vol. 6221, pp. 245–252. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  15. 15.
    Park, N.: The Implementation of Open Embedded S/W Platform for Secure Mobile RFID Reader. The Journal of Korea Information and Communications Society 35(5), 785–793 (2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Kyunghwan Kim
    • 1
  • Byung-Doo Kim
    • 2
  • Byunggil Lee
    • 2
  • Namje Park
    • 1
    • 3
  1. 1.Science Technology in Society Research Center (STSRC)Jeju National UniversityJeju-siKorea
  2. 2.Electronics and Telecommunications Research Institute (ETRI)DaejeonKorea
  3. 3.Department of Computer Education, Teachers CollegeJeju National UniversityJejuKorea

Personalised recommendations