skip to main content
10.1145/2664243.2664257acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

A security evaluation of AIS automated identification system

Published:08 December 2014Publication History

ABSTRACT

AIS, Automatic Identification System, is an application of cyber-physical systems (CPS) to smart transportation at sea. Being primarily used for collision avoidance and traffic monitoring by ship captains and maritime authorities, AIS is a mandatory installation for over 300,000 vessels worldwide since 2002. Other promoted benefits are accident investigation, aids to navigation and search and rescue (SAR) operations. In this paper, we present a unique security evaluation of AIS, by introducing threats affecting both the implementation in online providers and the protocol specification. Using a novel software-based AIS transmitter that we designed, we show that our findings affect all transponders deployed globally on vessels and other maritime stations like lighthouses, buoys, AIS gateways, vessel traffic services and aircraft involved in SAR operations. Our concerns have been acknowledged by online providers and international standards organizations, and we are currently and actively working together to improve the overall security.

References

  1. C. Ambjorn. Seatrack web forecasts and backtracking of oil spills. efficient tool to find illegal spills using ais.Google ScholarGoogle Scholar
  2. M. Balduzzi. Personal Page. http://iseclab.org/people/embyte/.Google ScholarGoogle Scholar
  3. Bloomberg. Iran Oil Tankers Said by Zanzibar to Signal Wrong Flag. http://www.bloomberg.com/news/2012-10-19/iranian-oil-tankers-said-by-zanzibar-to-be-signaling-wrong-flag.html.Google ScholarGoogle Scholar
  4. C. Carthel, S. Coraluppi, and P. Grignan. Multisensor tracking and fusion for maritime surveillance.Google ScholarGoogle Scholar
  5. C.-C. Chen, I.-T. Chen, C.-M. Cheng, M.-Y. Chih, and J.-R. Shih. A practical experience with rfid security.Google ScholarGoogle Scholar
  6. Claudio, Guarnieri. Spying on the Seven Seas with AIS.Google ScholarGoogle Scholar
  7. A. Costin and A. Francillon. Ghost in the Air(Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices. In BLACKHAT 2012.Google ScholarGoogle Scholar
  8. N. Foster. GnuRadio AIS Receiver. https://www.cgran.org/wiki/AIS.Google ScholarGoogle Scholar
  9. R. Housley, W. Ford, W. Polk, and D. Solo. Rfc 5280: Internet X. 509 Public Key Infrastructure Certificate and CRL profile, 2008.Google ScholarGoogle Scholar
  10. R. S. I.-R. International Telecommunication Union. AIS AIVDM Message Types. http://www.navcen.uscg.gov/?pageName=AISMessages.Google ScholarGoogle Scholar
  11. ITU-R. Technical characteristics for an automatic identification system using time-division multiple access in the VHF maritime mobile band. http://www.itu.int/dms pubrec/itu-r/rec/m/R-RECM.1371-4-201004-I!!PDF-E.pdf.Google ScholarGoogle Scholar
  12. M. Jakobsson, P. Finn, and N. Johnson. Why and how to perform fraud experiments. Security Privacy, IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Jakobsson and J. Ratkiewicz. Designing ethical phishing experiments: a study of (rot13) ronl query features. In Proceedings of WWW 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. X. Ji, Z. Shao, J. Pan, and C. Tang. A New AIS-Based Way to Conduct OLAP of Maritime Traffic Flow.Google ScholarGoogle Scholar
  15. L.-n. LI, S.-h. YANG, B.-g. CAO, and Z.-f. LI. A summary of studies on the automation of ship collision avoidance intelligence. Journal of Jimei University.Google ScholarGoogle Scholar
  16. L. Li-na. Determination of the factors about safe distance of approach and etc on the research of ship automatic avoidance collision.Google ScholarGoogle Scholar
  17. B. L. P. Bloomberg Commodities. http://www.bloomberg.com/professional/markets/commodities/.Google ScholarGoogle Scholar
  18. K. F. Mathapo. A software-defined radio implementation of maritime AIS. https://scholar.sun.ac.za/handle/10019.1/2215.Google ScholarGoogle Scholar
  19. Z. Shao, C. Tang, J. Pan, and X. Ji. The application of database techniques in the integrated vessel information service system.Google ScholarGoogle Scholar
  20. D. P. Shepard, T. E. Humphreys, and A. A. Fansler. Evaluation of the vulnerability of phasor measurement units to gps spoofing attacks.Google ScholarGoogle Scholar
  21. O.-S. Software. Gnu AIS. http://gnuais.sourceforge.net/.Google ScholarGoogle Scholar
  22. H. Teso. Aircraft Hacking - Practical Aero Series.Google ScholarGoogle Scholar
  23. B. Tetreault. Use of the automatic identification system (ais) for maritime domain awareness.Google ScholarGoogle Scholar
  24. TrendMicro. Security Intelligence Blog. http://blog.trendmicro.com/trendlabs-security-intelligence/category/internet-of-everything/.Google ScholarGoogle Scholar
  25. R. Undheim. Ais-Tools. http://www.funwithelectronics.com/?id=9.Google ScholarGoogle Scholar
  26. F. van den Broek. Eavesdropping on gsm:state-of-affairs. 2011.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ACSAC '14: Proceedings of the 30th Annual Computer Security Applications Conference
    December 2014
    492 pages
    ISBN:9781450330053
    DOI:10.1145/2664243

    Copyright © 2014 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 8 December 2014

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    Overall Acceptance Rate104of497submissions,21%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader