STUDIES AND RESEARCH REGARDING VULNERABILITIES OF MARINE AUTONOMOUS SURFACE SYSTEMS (MASS) AND REMOTELY OPERATED VESSELS (ROVS) FROM POINT OF VIEW OF CYBERSECURITY

R. Zăgan, G. Raicu, A. Sabau
{"title":"STUDIES AND RESEARCH REGARDING VULNERABILITIES OF MARINE AUTONOMOUS SURFACE SYSTEMS (MASS) AND REMOTELY OPERATED VESSELS (ROVS) FROM POINT OF VIEW OF CYBERSECURITY","authors":"R. Zăgan, G. Raicu, A. Sabau","doi":"10.54684/ijmmt.2022.14.3.310","DOIUrl":null,"url":null,"abstract":"In a 2020 survey of marine professionals, 77% of respondents view cyber-attacks as a high or medium risk to their organizations, yet only 64% said their organization has a business continuity plan in place to follow in the event of a cyber-incident. The study of equipment that manages autonomous ships and in general all equipment that is remotely controlled from the point of view of cyber security, is a necessity nowadays. The autonomous systems represented by remotely operated vessels (ROVs), marine autonomous surface systems (MASS) etc, have as first requirement the safety to be satisfied in their operation. These autonomous systems are composed of connected OT and IT networks, and their endowment with sensors and various cyber physical devices allow real-time data processing to consistently respond to real-world threats. In order to secure the cyber security of autonomous systems, we must consider all the elements that are vulnerable to cyber-attacks, such as the part of the hardware and the operating system used, the configuration of the OT interconnection network, the firmware protection used, all these elements considered across their entire lifecycle. Security in MASS, or USVs and ROVs is nothing new but the consequences of insecurity are critical. Flaws (including security ones) in such systems lead to safety hazards, and can kill. The present article introduces the main vulnerabilities of such remotely operated system and we try to find solution for navigate the ins and outs of cyber security on board remote operated ships, address cybersecurity challenges and compliance considerations, and get you geared up to establish your cyber security action plan. This aspect is important to consider from the design stage when referring to the maritime transport systems that host MASS, USVs and ROVs and its remote control center, e.g., the shore control center.","PeriodicalId":38009,"journal":{"name":"International Journal of Modern Manufacturing Technologies","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Modern Manufacturing Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.54684/ijmmt.2022.14.3.310","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 0

Abstract

In a 2020 survey of marine professionals, 77% of respondents view cyber-attacks as a high or medium risk to their organizations, yet only 64% said their organization has a business continuity plan in place to follow in the event of a cyber-incident. The study of equipment that manages autonomous ships and in general all equipment that is remotely controlled from the point of view of cyber security, is a necessity nowadays. The autonomous systems represented by remotely operated vessels (ROVs), marine autonomous surface systems (MASS) etc, have as first requirement the safety to be satisfied in their operation. These autonomous systems are composed of connected OT and IT networks, and their endowment with sensors and various cyber physical devices allow real-time data processing to consistently respond to real-world threats. In order to secure the cyber security of autonomous systems, we must consider all the elements that are vulnerable to cyber-attacks, such as the part of the hardware and the operating system used, the configuration of the OT interconnection network, the firmware protection used, all these elements considered across their entire lifecycle. Security in MASS, or USVs and ROVs is nothing new but the consequences of insecurity are critical. Flaws (including security ones) in such systems lead to safety hazards, and can kill. The present article introduces the main vulnerabilities of such remotely operated system and we try to find solution for navigate the ins and outs of cyber security on board remote operated ships, address cybersecurity challenges and compliance considerations, and get you geared up to establish your cyber security action plan. This aspect is important to consider from the design stage when referring to the maritime transport systems that host MASS, USVs and ROVs and its remote control center, e.g., the shore control center.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
从网络安全的角度对海上自主水面系统(mass)和远程操作船舶(rov)的脆弱性进行研究
在2020年对海洋专业人员的一项调查中,77%的受访者认为网络攻击对他们的组织来说是高风险或中等风险,但只有64%的人表示,他们的组织在发生网络事件时有业务连续性计划。从网络安全的角度研究管理自主船舶的设备,以及通常所有远程控制的设备,是当今的必要条件。以遥控船(ROV)、海洋自主水面系统(MASS)等为代表的自主系统,其运行的首要要求是满足安全性。这些自主系统由连接的OT和IT网络组成,它们配备了传感器和各种网络物理设备,使实时数据处理能够始终如一地应对现实世界的威胁。为了确保自主系统的网络安全,我们必须考虑所有易受网络攻击的元素,例如所使用的硬件和操作系统的部分、OT互连网络的配置、所使用的固件保护,以及在其整个生命周期中考虑的所有这些元素。MASS或USV和ROV的安全性并不是什么新鲜事,但不安全的后果是至关重要的。此类系统中的缺陷(包括安全缺陷)会导致安全隐患,并可能导致死亡。本文介绍了这种远程操作系统的主要漏洞,我们试图找到解决方案,在远程操作的船舶上了解网络安全的来龙去脉,解决网络安全挑战和合规问题,并为制定网络安全行动计划做好准备。当涉及承载MASS、USV和ROV的海上运输系统及其远程控制中心(例如海岸控制中心)时,从设计阶段就必须考虑这一方面。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
International Journal of Modern Manufacturing Technologies
International Journal of Modern Manufacturing Technologies Engineering-Industrial and Manufacturing Engineering
CiteScore
0.70
自引率
0.00%
发文量
15
期刊介绍: The main topics of the journal are: Micro & Nano Technologies; Rapid Prototyping Technologies; High Speed Manufacturing Processes; Ecological Technologies in Machine Manufacturing; Manufacturing and Automation; Flexible Manufacturing; New Manufacturing Processes; Design, Control and Exploitation; Assembly and Disassembly; Cold Forming Technologies; Optimization of Experimental Research and Manufacturing Processes; Maintenance, Reliability, Life Cycle Time and Cost; CAD/CAM/CAE/CAX Integrated Systems; Composite Materials Technologies; Non-conventional Technologies; Concurrent Engineering; Virtual Manufacturing; Innovation, Creativity and Industrial Development.
期刊最新文献
MICROSTRUCTURE AND PROPERTIES OF LASER-WELDED BUTT JOINTS OF X2CRTINB18 STEEL INVESTIGATION USING FINITE ELEMENT ANALYSIS OF EFFECT TO EARRING OF ANISOTROPY PARAMETERS IN DEEP DRAWING PROCESS RESIN FLOW ANALYSIS DURING FABRICATION OF COCONUT MESOCARP FIBER-REINFORCED COMPOSITES USING VARTM PROCESS NUMERICAL SIMULATION OF A GEAR CORROSION RESISTANCE OF A GOLD-TITANIUM ALLOY TI6AL4V WELD PRODUCED IN A DENTAL LASER WELDING MACHINE
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1