Abstract
Autonomous ships transferring valuable cargoes and humans in a more efficient and cost effective manner will soon be state of the art technology. Yet, their ICT system architecture and operations have not been defined in full detail. Moreover, multiple cyber security issues remain open and should be addressed. No study to date has analyzed fully the architecture of the autonomous ship, even less so have potential cyber threats and cyber attacks been identified. In this paper we identify and categorize systems that make up an autonomous ship, we propose a generic system architecture, and we analyze the cyber security of the ship by leveraging the STRIDE threat modeling methodology to identify potential cyber attacks, and to analyze the accordant risk. The results will support ship designers and industry towards improving the autonomous ship system architecture and making ship operations more secure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Lloyd’s Register. Cyber-enabled ships, p. 20 (2016)
Rolls-Royce. Remote and autonomous ship-the next steps, p. 88 (2016)
Microsoft. The stride threat model (2009)
MUNIN. Maritime unmanned navigation through intelligence in networks (2016)
Rødseth, Ø.J., Tjora, A.: A system architecture for an unmanned ship, May 2014
Rødseth, Ø.J., Kvamstad, B., Porathe, T., Burmeister, H.C.. Communication architecture for an unmanned merchant ship. In 2013 MTS/IEEE OCEANS - Bergen, pp. 1–9, June 2013
Burmeister, H.C., Bruhn, W., Walther, L., Moræus, J.A., Sage-Fuller, B.: Munin d8.6: final report: autonomous bridge. Technical report (2015)
MacKinnon, S.N., Man, Y., Baldauf, M.: Munin d8.8 final report shore control centre. Technical report (2015)
Schmidt, M., Fentzahn, E., Atlason, G.F., Rødseth, H.: Munin 8.7 final report autonomous engine room. Technical report (2015)
Rødseth, Ø.J., Burmeister, H.-C.: Risk assessment for an unmanned merchant ship. TransNav 9(3), 357–364 (2015)
Tam, K., Jones, K.: Cyber-risk assessment for autonomous ships, p. 9 (2018)
Katsikas, S.K.: Cyber security of the autonomous ship. In Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, CPSS 2017, pp. 55–56. ACM, New York (2017 )
Hussain, S., Kamal, A., Ahmad, S., Rasool, G., Iqbal, S.: Threat modelling methodologies: a survey. Sci. Int. (Lahore) 26(4), 1607–1609 (2014)
Sidi, F., et al.: A comparative analysis study on information security threat models: a propose for threat factor profiling. J. Eng. Appl. Sci. 12, 548–554 (2017)
Cheung, C.Y.: Threat modeling techniques (2016)
Havinga, H., Sessink, O.: Risk Reduction Overview Manual, version 1.0 edition (2014)
Krishnan, S.: A hybrid approach to threat modelling, p. 24 (2017)
ICS INTERCARGO INTERTANKO OCIMF BIMCO, CLIA and IUMI. The guidelines on cyber security onboard ships, p. 51 (2017)
Bruhn, W., et al.: Munin D5.2: process map for autonomous navigation. Technical report (2013)
Kokotos, D., Linardatos, D., Nikitakos, N.B., Tzannatos, E.S.: Information and communication technologies in shipping industry (In Greek). Stamoulis (2011)
Nordahl, H., Rødseth, Ø.J.: NFAS-definitions for autonomous merchant ships, p. 10 (2017)
Shostack, A.: Threat Modeling: Designing for Security, 1st edn. Wiley, Hoboken (2014)
Jelacic, B., Rosic, D., Lendak, I., Stanojevic, M., Stoja, S.: STRIDE to a secure smart grid in a hybrid cloud. In: Katsikas, S.K., et al. (eds.) CyberICPS/SECPRE -2017. LNCS, vol. 10683, pp. 77–90. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-72817-9_6
Kavallieratos, G.: Cyber-attacks against the cyber-enabled ship. M.Sc. thesis. University of Piraeus, Greece (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Kavallieratos, G., Katsikas, S., Gkioulos, V. (2019). Cyber-Attacks Against the Autonomous Ship. In: Katsikas, S., et al. Computer Security. SECPRE CyberICPS 2018 2018. Lecture Notes in Computer Science(), vol 11387. Springer, Cham. https://doi.org/10.1007/978-3-030-12786-2_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-12786-2_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-12785-5
Online ISBN: 978-3-030-12786-2
eBook Packages: Computer ScienceComputer Science (R0)