Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3055259.3055261acmconferencesArticle/Chapter ViewAbstractPublication PagessccConference Proceedingsconference-collections
research-article

A Privacy-Preserving and Vessel Authentication Scheme Using Automatic Identification System

Published: 02 April 2017 Publication History

Abstract

Automatic Identification System (AIS) has been widely used in smart vessel transportation aiding collision avoidance, search, rescue and traffic monitoring nowadays. AIS transceiver adopts a unique Maritime Mobile Service Identity (MMSI) to identify a vessel uniquely. However, this identity is now simple to be forged and tampered. Besides, AIS transceiver broadcasts voyage information automatically and continuously, which makes it possible to be tracked when communicating with the sea-side infrastructures or other vessels. Thus, it poses a serious threat to vessel trajectory privacy. To tackle this problem, we first propose a Digital Certificate based Identity Authentication Scheme (IAS) to ensure the authenticity of the AIS data source. Secondly, we further propose a Mix-zone and Blind-signature based Trajectory Privacy Protection Scheme (TPPS) to guarantee that the vessel identity and trajectory information will not be leaked without losing AIS basic function. Finally we analyse the security of our scheme. The experimental results show that our scheme has the same magnitude order of time-consuming compared with the ordinary AIS data pack and unpack protocol.

References

[1]
O. Abul, F. Bonchi, and M. Nanni. Never walk alone: Uncertainty for anonymity in moving objects databases. In IEEE International Conference on Data Engineering, pages 376--385, 2008.
[2]
E. Alincourt, C. Ray, P. M. Ricordel, D. Dare-Emzivat, and A. Boudraa. Methodology for ais signature identification through magnitude and temporal characterization. In Oceans, pages 1--6, 2016.
[3]
C. Ambjorn. Seatrack web forecasts and backtracking of oil spills - an efficient tool to find illegal spills using ais. In US/EU-Baltic International Symposium, 2008 IEEE/OES, pages 1--9, 2008.
[4]
M. Balduzzi, A. Pasta, and K. Wilhoit. A security evaluation of ais automated identification system. In The Computer Security Applications Conference, pages 436--445, 2014.
[5]
A. R. Beresford and F. Stajano. Location privacy in pervasive computing. Pervasive Computing IEEE, 2(1):46--55, 2003.
[6]
L. Buttylcn, T. Holczer, and I. Vajda. On the effectiveness of changing pseudonyms to provide location privacy in vanets. In Security and Privacy in Ad-Hoc and Sensor Networks, European Workshop, Esas 2007, Cambridge, Uk, July 2-3, 2007, Proceedings.
[7]
B. R. Calder and K. Schwehr. Traffic analysis for the calibration of risk assessment methods. Pediatric Nephrology, 24(8):1453--1464, 2009.
[8]
W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, 22(6):644--654, 1976.
[9]
J. Domingo-Ferrer and R. Trujillo-Rasua. Microaggregation- and permutation-based anonymization of movement data. Information Sciences, 208(21):55--80, 2012.
[10]
T. Eriksen, G. Høye, B. Narheim, and B. J. Meland. Maritime traffic monitoring using a space-based ais receiver. Acta Astronautica, 58(10):537--549, 2006.
[11]
L. Fenghua, Y. Lihua, W. Wei, Z. Linjie, and S. Zhenguo. Research status and development trends of security assurance for space-ground integration information network. Journal on Communications, 37(11):156--168, 2016.
[12]
J. Freudiger, M. Raya, M. Flelegyhlczi, P. Papadimitratos, and J. P. Hubaux. Mix-zones for location privacy in vehicular networks. In WiN-ITS 07, 2007.
[13]
Z. Gan and M. Song. Analyzing the problems in the implementation of mmsi. China Maritime Safety, 2009.
[14]
S. Gao, J. Ma, C. Sun, and X. Li. Balancing trajectory privacy and data utility using a personalized anonymization model. Journal of Network & Computer Applications, 38(1):125--134, 2014.
[15]
F. Giannotti, M. Nanni, F. Pinelli, and D. Pedreschi. Trajectory pattern mining. In ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 330--339, 2007.
[16]
A. Haratimokhtari, A. Wall, and P. B. J. Wang. Automatic identification system (ais): Data reliability and human error implications. Journal of Navigation, 60(3):373--389, 2007.
[17]
Z. Huo, Y. Huang, and X. Meng. History trajectory privacy-preserving through graph partition. In International Workshop on Mobile Location-Based Service, pages 71--78, 2011.
[18]
J. W. G. Iii and K. F. E. Ip. Protocols for Issuing public-key certificates over the Internet. Springer Berlin Heidelberg, 1997.
[19]
J. G. Lee, J. Han, X. Li, and H. Gonzalez. Traclass: trajectory classification using hierarchical region-based and trajectory-based clustering.
[20]
L. I. Li-Na. Determination of the factors about safe distance of approach and etc on the research of ship automatic avoidance collision. Journal of Dalian Maritime University, 28(3):23--26, 2002.
[21]
L. I. Li-Na, S. H. Yang, B. G. Cao, and L. I. Zi-Fu. A summary of studies on the automation of ship collision avoidance intelligence. Journal of Jimei University, 2006.
[22]
M. E. Nergiz, M. Atzori, and Y. Saygin. Towards trajectory anonymization: a generalization-based approach. In Sigspatial ACM Gis 2008 International Workshop on Security and Privacy in Gis and Lbs, Springl 2008, November 4, 2008, Irvine, California, Usa, Proceedings, pages 52--61, 2008.
[23]
P. Samarati. Protecting respondents' identities in microdata release. IEEE Transactions on Knowledge & Data Engineering, 13(6):1010--1027, 2001.
[24]
P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. 1998.
[25]
K. D. Schwehr and P. A. Mcgillivary. Marine ship automatic identification system (ais) for enhanced coastal security capabilities: An oil spill tracking application. In Oceans, pages 1--9, 2007.
[26]
H. Shin, J. Vaidya, V. Atluri, and S. Choi. Ensuring privacy and security for lbs through trajectory partitioning. In Eleventh International Conference on Mobile Data Management, pages 224--226, 2010.
[27]
L. SWEENEY. k-anonymity: A model for protecting privacy. IEEE Security & Privacy Magazine, 10(5):1--14, 2012.

Cited By

View all
  • (2024)Big Data-Enabled Authentication Framework for Offshore Maritime Communication Using DronesIEEE Transactions on Vehicular Technology10.1109/TVT.2024.336794573:7(10196-10210)Online publication date: Jul-2024
  • (2024)Secure Location-based Authenticated Key Establishment Scheme for Maritime CommunicationICC 2024 - IEEE International Conference on Communications10.1109/ICC51166.2024.10622528(1927-1932)Online publication date: 9-Jun-2024
  • (2023)5G networks and IoT for traffic managementAdvanced Topics in Optoelectronics, Microelectronics, and Nanotechnologies XI10.1117/12.2643255(74)Online publication date: 2-Mar-2023
  • Show More Cited By

Index Terms

  1. A Privacy-Preserving and Vessel Authentication Scheme Using Automatic Identification System

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SCC '17: Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing
    April 2017
    100 pages
    ISBN:9781450349703
    DOI:10.1145/3055259
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 April 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. AIS
    2. authentication
    3. privacy-preserving

    Qualifiers

    • Research-article

    Funding Sources

    • China National Key Research and Development Program

    Conference

    ASIA CCS '17
    Sponsor:

    Acceptance Rates

    SCC '17 Paper Acceptance Rate 11 of 27 submissions, 41%;
    Overall Acceptance Rate 64 of 159 submissions, 40%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)21
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 23 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Big Data-Enabled Authentication Framework for Offshore Maritime Communication Using DronesIEEE Transactions on Vehicular Technology10.1109/TVT.2024.336794573:7(10196-10210)Online publication date: Jul-2024
    • (2024)Secure Location-based Authenticated Key Establishment Scheme for Maritime CommunicationICC 2024 - IEEE International Conference on Communications10.1109/ICC51166.2024.10622528(1927-1932)Online publication date: 9-Jun-2024
    • (2023)5G networks and IoT for traffic managementAdvanced Topics in Optoelectronics, Microelectronics, and Nanotechnologies XI10.1117/12.2643255(74)Online publication date: 2-Mar-2023
    • (2022)Auth-AIS: Secure, Flexible, and Backward-Compatible Authentication of Vessels AIS BroadcastsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.306942819:4(2709-2726)Online publication date: 1-Jul-2022
    • (2022)Cybersecurity Attacks on Software Logic and Error Handling Within AIS Implementations: A Systematic Testing of ResilienceIEEE Access10.1109/ACCESS.2022.315894310(29493-29505)Online publication date: 2022
    • (2021)AIS Meets IoT: A Network Security Mechanism of Sustainable Marine Resource Based on Edge ComputingSustainability10.3390/su1306304813:6(3048)Online publication date: 10-Mar-2021
    • (2019)Security and Privacy Issues in Internet of ThingsBlockchain Technology in Internet of Things10.1007/978-3-030-21766-2_3(29-40)Online publication date: 27-Jul-2019

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media