Next Article in Journal
Marine Rare Earth Elements: Distribution Patterns, Enrichment Mechanisms and Microbial Interactions
Previous Article in Journal
Bathymetric Profile and Sediment Composition of a Dynamic Subtidal Bedform Habitat for Pacific Sand Lance
Previous Article in Special Issue
Passivity-Based Sliding Mode Control for the Robust Trajectory Tracking of Unmanned Surface Vessels Under External Disturbances and Model Uncertainty
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Exploring Simulation Methods to Counter Cyber-Attacks on the Steering Systems of the Maritime Autonomous Surface Ship (MASS)

1
Department of Software Science, Tallinn University of Technology, Ehitajate tee 5, 19086 Tallinn, Estonia
2
Estonian Maritime Academy, Tallinn University of Technology, Kopli tn 101, 11712 Tallinn, Estonia
*
Author to whom correspondence should be addressed.
J. Mar. Sci. Eng. 2025, 13(8), 1470; https://doi.org/10.3390/jmse13081470
Submission received: 8 July 2025 / Revised: 28 July 2025 / Accepted: 29 July 2025 / Published: 31 July 2025
(This article belongs to the Special Issue Advanced Control Strategies for Autonomous Maritime Systems)

Abstract

This paper presents a simulation-based investigation into control strategies for mitigating the consequences of cyber-assault on the steering systems of the Maritime Autonomous Surface Ships (MASS). The study focuses on two simulation experiments conducted within the Simulink/MATLAB environment, utilizing the catamaran “Nymo” MASS mathematical model to represent vessel dynamics. Cyber-attacks are modeled as external disturbances affecting the rudder control signal, emulating realistic interference scenarios. To assess control resilience, two configurations are compared during a representative turning maneuver to a specified heading: (1) a Proportional–Integral–Derivative (PID) regulator augmented with a Least Mean Squares (LMS) adaptive filter, and (2) a Nonlinear Autoregressive Moving Average with Exogenous Input (NARMA-L2) neural network regulator. The PID and LMS configurations aim to enhance the disturbance rejection capabilities of the classical controller through adaptive filtering, while the NARMA-L2 approach represents a data-driven, nonlinear control alternative. Simulation results indicate that although the PID and LMS setups demonstrate improved performance over standalone PID in the presence of cyber-induced disturbances, the NARMA-L2 controller exhibits superior adaptability, accuracy, and robustness under adversarial conditions. These findings suggest that neural network-based control offers a promising pathway for developing cyber-resilient steering systems in autonomous maritime vessels.

1. Introduction

The marine industry is going through a substantial shift, owing to the widespread adoption of smart shipping technologies that combine connectivity, robotics, large-scale data analytics, and computational intelligence [1]. These innovations aim to enhance competitiveness, operational safety, and environmental sustainability. Modern ships are increasingly equipped with a variety of sensors, onboard data processors, and data-driven decision-making systems based on deep learning algorithms. Thanks to high-bandwidth connectivity, vessels can now be remotely monitored and operated, laying the groundwork for greater autonomy at sea. However, further technical breakthroughs have made it possible for ships to function independently. A vessel can maneuver autonomously or request human intervention depending on a real-time interpretation of sensor data [2].
The emergence of MASSs represents a pivotal shift in maritime operations. MASSs are digital–physical structures enabled by the convergence of novel real-time Information and Operational Technologies (IT/OT).
The OT encompasses a broad range of programmable controllers and embedded systems that manage physical processes on board, while the IT handles data management and administrative functions. Both domains are critical to MASS operation, and both are increasingly susceptible to cyber-attacks [3].
MASSs have several advantages: they may be constructed to be cleaner on fuel, less heavy, more affordable to operate, wind-resistant, and aerodynamically efficient. Nevertheless, the path to widespread MASS adoption does not lack impediments. Legal and regulatory frameworks pose significant limitations. For example, the Convention on the International Regulations for Preventing Collisions at Sea (COLREG) primarily governs crewed vessels, making rules such as “proper look-out” (Rule 5) and “good seamanship” (Rule 8) difficult to interpret or apply in the context of unmanned systems. Furthermore, the International Ship and Port Facility Security (ISPS) code requires the inclusion of designated security personnel on the vessel (A/2.1.6), thereby banning the deployment of entirely crewless ships [4].
In addition to regulatory issues, MASSs face a range of practical and technical concerns. Human factors such as programming and coding errors or incorrect responses to rare or unforeseen scenarios can limit the reliability of autonomous systems. Interactions between manned and unmanned vessels on busy waterways pose operational dangers, as does a failure to identify smaller or low-visibility vessels. Environmental variables that involve storms, high waves, high levels of tides, and dense glaciers all pose challenges to autonomous navigation systems. Hardware failures, including propulsion, rudder, or sensor malfunctions, as well as software or communication breakdowns, can significantly compromise the vessel’s safety and autonomy [5,6,7].
Cybersecurity is perhaps one of the most critical and complex issues facing MASS development. Cyber problems, either intentional (integrity breaches) or unintentional (operational failures), endanger human lives, marine infrastructure, and the environment. Common cyber threats include attacks on onboard IT and OT systems, spoofing or jamming of Global Navigation Satellite System (GNSS) signals, manipulation of (Satellite-) Automatic Identification System ((S-)AIS) data, and the disruption of connectivity with shore-based operation centers [8]. Alarmingly, most marine insurance policies do not currently cover the consequences of such cyber incidents [9].
Given the increasing frequency and sophistication of cyber-attacks, it is essential to implement layered and proactive cybersecurity strategies. These include regular system audits, use of firewalls and anti-virus software, encryption of sensitive communications, maintaining up-to-date software versions, and developing dynamic protection mechanisms that can evolve alongside new threat vectors. More importantly, ensuring the cyber-resilience of MASSs will require a combination of technical innovation, regulatory adaptation, and operational vigilance [10].
This study investigates how cyber-attacks can compromise the steering control systems of Maritime Autonomous Surface Ships (MASSs) and evaluates the effectiveness of different control strategies in mitigating these threats. More precisely, the following research questions are addressed:
(1)
How do cyber-attacks, modeled as signal disturbances, affect the trajectory and stability of steering systems in the MASS?
(2)
To what extent can classical control methods (e.g., PID with LMS filtering) mitigate such cyber threats in simulated environments?
(3)
How effective is a machine-learning-based NARMA-L2 controller in maintaining navigation stability under adversarial cyber conditions compared to classical methods?
To address this research issue, the paper begins with an overview of the topic, followed by a literature review, mathematical modeling of the Nymo MASS, and simulation experiments designed to neutralize cyber-attacks on its steering control system. The remaining part of the paper contains a comparison of a classical PID controller, a PID controller enhanced with LMS adaptive filters, and a NARMA-L2 neural network controller, demonstrating that the NARMA-L2 approach delivers superior performance under cyber-threat conditions. The article concludes with key findings and outlines directions for further research in enhancing the cyber-resilience and control capabilities of autonomous maritime systems.

2. Literature Review

The development of unmanned and autonomous naval vehicles marks an important change in marine transportation, research, and defense. The development of Autonomous Underwater Vehicles (AUVs) began in the 1950s, evolving from heavy and inefficient early prototypes to sophisticated platforms capable of navigating depths up to 6000 m with advanced obstacle detection and mapping capabilities [11]. Similarly, MASSs have progressed from experimental vessels to commercially operational platforms, including cargo ships, research vessels, and military craft [12]. However, despite these advancements, fully autonomous underwater and surface vessels capable of deep and hazardous missions remain a work in progress, with numerous technical, legal, and organizational challenges still to be resolved [13].
International regulatory authorities, like the International Maritime Organization (IMO), are actively working on the legal and safety frameworks necessary for the safe integration of MASSs into existing marine traffic. The IMO anticipates finalizing non-mandatory MASS regulations before 2025, which will lay preparatory measures for a comprehensive mandatory regulatory framework expected to be implemented post-2030 [14]. Classification societies like Loyd’s Register have established autonomy levels ranging from manual operations (AL0) to fully autonomous vessels without human intervention (AL6), providing a standardized taxonomy for assessing unmanned marine systems [15]. Current examples of operational MASS include the Yara Birkeland autonomous cargo vessel, SEA-KIT’s USV Maxlimer, the US Navy’s Large Unmanned Surface Vehicles (LUSVs) and Extra Large Unmanned Undersea Vehicles (XLUUVs), the Chinese autonomous mother ship Zhu Hai Yun, the Mayflower autonomous research vessel, and ongoing projects such as South Korea’s KASS and Rolls-Royce’s AAWA, aiming for full autonomy by 2035 [16].
While autonomous vessels offer significant operational advantages, their reliance on digital navigation and control systems makes them vulnerable to cyber-attacks, which pose critical safety and operational risks. The most frequent targets in maritime navigation systems are the Global Positioning System (GPS) and (S)-AIS, both susceptible to spoofing, jamming, and data manipulation attacks [17]. Spoofing attacks can create false location information, misleading vessel navigation systems, and potentially cause collisions or grounding. Jamming disrupts signal reception, rendering GPS receivers inoperative unless countermeasures are employed, such as filtering using computational intelligence [18].
Aiming to enhance resilience, hybrid GNSS receivers combining multiple satellite constellations (GPS, GLONASS, BeiDou, Galileo) and augmentation systems such as the European Geostationary Navigation Overlay System (EGNOS) are employed, alongside inertial navigation systems and onboard mathematical models of vessel dynamics and environmental influences [19]. These alternative approaches provide redundancy, allowing autonomous vessels to maintain navigation capabilities despite compromised satellite data. However, these solutions can be costly and complex, particularly for commercial operations.
Beyond navigation systems, other maritime cyber vulnerabilities exist in Supervisory Control and Data Acquisition (SCADA) systems, communication protocols, and monitoring architectures. The (S-)AIS, used for ship identification and collision avoidance, is prone to spoofing and fraudulent message injection, which can lead to erroneous routing or misrepresentation of vessel types and locations [20,21]. To counteract these threats, layered defenses incorporating radar, advanced camera systems, and verification through updated electronic charts are necessary.
Cyber-resilience, defined as the ability of a system to maintain critical functions despite cyber-attacks, is becoming an essential characteristic for MASSs operating within the highly interconnected and safety-critical maritime ecosystem [22]. Notwithstanding, the shipping industry’s traditional nature and hesitancy towards rapid adoption of new technologies complicate the timely implementation of robust cybersecurity measures. Research on maritime cybersecurity has expanded significantly since 2011, focusing on risk assessment, safety engineering, and systemic approaches such as System Theoretic Process Analysis (STPA), which enables holistic evaluation of MASS risks [23,24]. Probabilistic modeling techniques, including Bayesian networks, have been applied to analyze vulnerabilities and guide mitigation strategies [25]. The Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, Elevation of privilege (STRIDE) threat model is widely utilized to classify cyber threats specifically impacting autonomous ship systems and communication networks [26]. These models identify denial of service and spoofing as important hazards to navigation, identification, and control operations. Within this framework, we must include the Zero Trust Architecture paradigm alongside the MITRE ATT&CK scheme, for which the following applies: “don’t trust, constantly check” [27,28]. This is an essential part of a contemporary security plan that helps various sectors to actively evaluate the evolving landscape of cyberthreats and guarantee a more secure and resilient digital future. Furthermore, ref. [29] provides a thorough examination of cyber resources, hazards, risk evaluation, and mitigation strategies for autonomous vessels. This article refers to the most recent cyber-security standards published by the IMO and the Baltic and International Maritime Council (BIMCO), which served as the foundation for this investigation. It also comprises a cyber-risk assessment based on Hazard Identification (HAZID) that was carried out in accordance with smart ships.
Advances in cybersecurity research emphasize the integration of Machine Learning (ML) and Artificial Intelligence (AI) for early breach identification, anomaly recognition, and adaptive defense in maritime autonomous systems [30]. For example, frameworks employing deep autoencoders and clustering algorithms are developed to discover cyber irregularity in message streams [31]. Furthermore, study [32] introduces event-triggered mechanisms and robust control strategies to ensure synchronization despite cyber threats on communication channels in master–slave neural networks. Similarly, paper [33] discusses how cyber attackers can exploit open communication networks to disrupt networked control systems by intentionally blocking data packets, causing malicious packet dropouts. Despite these developments, there is a recognized shortage of maritime-specific datasets and realistic simulation environments necessary to train and validate such ML/AI-based systems effectively [34,35].
Complementary to technical defenses, broader supply chain security considerations highlight the prevalence of Distributed Denial of Service (DDoS) attacks and malware targeting maritime infrastructure, urging the implementation of Industry 4.0 assets to enhance cyber defenses [36]. Ports, shipping companies, and maritime supply chains have become frequent targets of ransomware and data exfiltration attacks, underscoring the importance of comprehensive cybersecurity strategies extending beyond individual vessels [37,38]. Special attention has also been directed towards the vulnerabilities of SCADA systems, which are integral to maritime operations. Their real-time requirements and critical role in operational safety demand tailored cybersecurity solutions, including anomaly detection and rapid response capabilities [39,40].
Simulation studies on autonomous vessel controllers have demonstrated that cyber intrusions targeting rudder and thruster control systems can cause severe disruptions in vessel maneuverability and safety. Kalman filters combined with PID controllers have been proposed and validated through Simulink/MATLAB experiments and real-vessel case studies as effective mitigation techniques to maintain control under cyber-attack conditions [41,42,43]. These approaches highlight the necessity of embedding cybersecurity resilience directly into control system architectures. The growing body of research into MASS cybersecurity reveals a multifaceted landscape, combining regulatory efforts, technical innovation, and systemic risk assessment methodologies. The integration of ML/AI, comprehensive threat modeling, and simulation-based testing forms the foundation for advancing autonomous maritime operations’ safety and reliability. Continuous collaboration among scholars, the business world, and government entities will be required to develop codified frameworks, datasets, and defense mechanisms to address the changing cyber threat environment confronting autonomous maritime systems.
While prior research has explored maritime cybersecurity broadly, including GNSS spoofing, AIS manipulation, and SCADA vulnerabilities, limited attention has been given to the control-level impacts of cyber intrusions specifically targeting the steering systems of MASS. Existing studies tend to focus on general network or navigation vulnerabilities rather than control surface manipulation. Furthermore, although machine learning and adaptive filtering have been proposed in industrial CPS applications, their role in maritime steering resilience remains underexplored. This study narrows this gap by applying simulation-based attacks directly to the rudder control signal and benchmarking classical PID and LMS filtering techniques against a neural-based NARMA-L2 controller in a dynamic marine setting.

3. Methodology

The simulation experiment in this study involves a single MASS, specifically, the “Nymo” catamaran (Figure 1), modeled using nonlinear dynamics and differential thrust mechanics. The study investigates the cyber-resilience of the vessel’s steering control system through a structured methodology encompassing mathematical modeling, realistic cyber-attack emulation, and comparative controller performance analysis. The developed model accurately reflects the ship’s maneuvering behavior and serves as a foundation for simulating navigation under both nominal and adversarial conditions.
A dedicated simulation environment was constructed in Simulink/MATLAB to replicate cyber-attack scenarios targeting the rudder control system. These attacks are modeled as Gaussian white noise disturbances superimposed on control inputs, simulating unauthorized interference that may disrupt maneuverability and heading control.
Three control strategies were tested under identical conditions:
  • A classical PID controller (serving as the baseline);
  • A PID controller augmented with LMS adaptive filters, which improves adaptability and disturbance rejection;
  • A NARMA-L2 neural network controller, offering advanced adaptive capabilities.
The experimental scenario involves a turning maneuver to a fixed heading angle (e.g., 45° North–East–Down (NED)), where each control strategy is evaluated based on its ability to maintain trajectory accuracy and system stability in the presence of simulated cyber threats. Performance is assessed using metrics such as heading error, response smoothness, and deviation from the intended course. The results demonstrate that while the PID-based controllers show degraded performance under attack, especially without LMS filtering, the NARMA-L2 controller maintains a smooth and accurate course, exhibiting strong resilience. This confirms its suitability for enhancing the cyber-robustness of autonomous steering systems.
The experiment is a single-vessel, scenario-specific simulation designed to realistically test control system behavior under cyber-assault, contributing to a practical framework for evaluating and improving the security of autonomous maritime navigation.

3.1. Model of a Catamaran MAS

Now, allow us to explore the replica of the catamaran “Nymo” MASS (Figure 2). This catamaran watercraft has two distinct hulls with separate propellers, where Fl and Fr are the port side (left) and starboard side (right) powers, which are produced by differential thrusts, and d is the lateral hull separation (from hull centerline to MASS centerline). Figure 2 depicts the structure of the variable definitions, with the heading angle ψ denoting the orientation of the craft’s construction-fixed structure reference to the NED quadrant. For convenience, the current vessel’s heading angle φ is taken in a counterclockwise manner from the horizontal plane, i.e., φ = π/2 − ψ. Figure 2 shows that the catamaran’s maneuvering is dependent on differential thrust. If Fl equals Fr, the vessel will travel in a straight direction. If Fl and Fr are different, the variation in thrust between the two stern engines creates a turning point, causing the catamaran to change its course.
The goal is to record the vessel’s dynamics and retain the ability to manage its path, ensuring that the catamaran goes to the intended target as quickly and safely as feasible. The kinematics of the model can be described as [44]
x ˙ y ˙ φ ˙ = cos φ sin φ 0 sin φ cos φ 0 0 0 1 u v r ,
The coordinates of the catamaran’s center of mass in the earth-fixed system are (x,y), φ is the vessel’s heading angle, and u, v, r are the surge, sway, and yaw speeds, correspondingly. In the current study, we assume that harming environmental influences such as wind, currents, and waves can be omitted. The system dynamics of the considered simplified mechanical model of the catamaran can be described using the formulas that follow [45]
m u ˙ + m 11 u ˙ m ν r = F x m ν ˙ + m 22 ν ˙ + m u r = F y I z z r ˙ + m 66 r ˙ = N
where m is the mass of the catamaran; m11, m22, m66 are the hull-added masses; Izz is the moment of inertia of the catamaran about the Z axis; Fx, Fy, N are the extrinsic power in X direction, extrinsic power in Y direction, and extrinsic moment, respectively. Note that surge, sway, and yaw speeds and accelerations describe a vessel’s motion along three axes: surge (forward/backward), sway (side-to-side), and yaw (rotation around the vertical axis). These motions are characterized by both their speed (how fast they are changing position or orientation) and acceleration (how quickly the speed is changing). Therefore, the dots above the variables in (2) denote their derivatives. The extrinsic powers and moment in (2) produced by the propellers can be determined as follows [46]
F x = 1 t P F r + F l F y = 0 N = 1 + d N P F r F l d
where tP is the thrust deduction factor generated by the propeller in the X direction, dNP is the propeller influence factor in the Y and N directions. Let us observe that in (2), no propeller powers are produced in the Y direction. The propeller’s thrusts in (3) are determined as [47]
F l = k t l J p l ρ n l 2 d p l 4 F r = k t r J p r ρ n r 2 d p r 4
where Jpl and Jpr are the propeller advance speed parameters of the left and right propellers; ρ is the density of the seawater; nl and nr are the numbers of revolutions of the left and right propellers; dpl and dpr are the diameters of the left and right propellers; and ktl and ktr are the propeller thrust coefficient functions of the left and right propellers, respectively. The integration then yields the heading angle and center of mass coordinates
x τ = 0 τ x ˙ t d t , y τ = 0 τ y ˙ t d t , φ ( τ ) = 0 τ φ ˙ ( t ) d t ,
where x(0) = 0, y(0) = 0, and φ(0) = 0 are the beginning states. The Equations (1)–(5) demonstrate that the heading angle and location coordinates of the MASS (x, y, φ)T can be determined with the specified set of formulas, the intended destination angle, and initial conditions.

3.2. Parameters of the Catamaran MAS

This section assesses the catamaran parameters for MASS “Nymo”. Direct measurements can be used to determine this vehicle’s subsequent parameters [48].
m = 225 k g , d = 0.405   m , d p = 0.18   m , l x = 2.56   m , l y = 1.08   m , l d = 0.36   m
where catamaran length, width, and draft are denoted by the letters lx, ly, and ld, respectively. It is possible to calculate the magnitudes of tP and dNP from (3) [46]
t P = 0.25 , d N P = 0.25
The following formula is used to obtain the parallelepiped’s moment of inertia Izz relative to the Z axis [49]
I z z = m 12 l x 2 + l y 2
Hence, from (6) and (7), we find
I z z = 144.7500   k g m 2
The parameters of (6) and (8) are linked to the hull-added masses from (2), so [45]
m 11 = l d m 2 l x , m 22 = 2 l d m l y 1 l y 2 l x m 66 = 2 l d I z z l y 1 1.6 l y l x
Thus, the following values are assigned to the parameters in (9)
m 11 = 15.8203   k g , m 22 = 118.3594   k g , m 66 = 31.3625   k g m 2
It is well known that parameter ρ in (4) has the following value:
ρ = 1000   k g m 3
Now, let us assess one of the propellers’ F values using Equation (4). For the chosen propeller, the advanced speed coefficient Jp from (4) can be written as [50]
J p = u n d p
here, u is the surge speed, n is the propeller’s number of revolutions, and dp is the propeller’s diameter. A quadratic polynomial of Jp will be used to approximate the propeller thrust coefficient function kt for simulation purposes,
k t = a 1 J p 2 + a 2
where the constant polynomial coefficients are denoted by a1 and a2. The following system of linear equations provides the polynomial coefficients in (11).
a 1 J p 1 2 + a 2 = k t 1 a 1 J p 2 2 + a 2 = k t 2
A quadratic polynomial can be used to approximate the propeller thrust coefficient function (kt) based on the advance ratio (Jp). This approach allows for a simplified representation of the propeller’s thrust characteristics, which is particularly useful in simulations and calculations where complex models are not required [51]. Further, it is possible to express this set of Formulas (12) in matrix form so
W A t = K t
where
W = J p 1 2 1 J p 2 2 1 , A t = a 1 a 2 , K t = k t 1 k t 2
The mathematical formula for the vector of polynomial coefficients from (13) is as follows
A t = W 1 K t
Using the next experimental data [49]
u 1 = 0.4450   m s , u 2 = 0.8000   m s , n 1 = 400   r p m , n 2 = 800   r p m , k t 1 = 0.4104 , k t 2 = 0.3954
we found that
A t = 0.5699 0.3321 .
Combining (4), (10), and (11), we obtain that the value of propeller thrust can be estimated so that
F = ρ d p 2 a 1 u 2 + a 2 d p 2 n 2 .
The number of revolutions can then be computed based on (14), thus
n = F a 1 ρ d p 2 u 2 a 2 ρ d p 4 .

3.3. PID Control of Course of the MASS

A model of a catamaran is a nonlinear model, and it is challenging to design a simple regulator that, in every situation, adheres to the outlined boundaries. It is possible to consider the thrust of the left propeller, Fl, as a fixed constant. Allowing Fl and Fr to vary would make the system a multiple-input, multiple-output system. This would render the application of PID and NARMA-L2 control strategies inappropriate. Hence, we have
F l = c o n s t .
With a choice of (15), the right propeller Fr’s thrust is used as a control input to regulate the heading angle φ, transforming the complex control problem into a control problem. The following structure (see Figure 3) is the result of designing the control system setup to utilize a PID controller to regulate the input variable Fr. PID controllers come in a variety of formats; one potential compensator formula implementation is shown as
PID s = P b r y + I 1 s r y + D N 1 + N 1 s c r y
where P, I, D, N, b, and c are the parameters of the proportional, integral, derivative, filter coefficient, proportional setpoint weight, and derivative setpoint weight components of the PID controller, respectively; r is the targeted reference; and y is the measured output.
Increasing the proportional gain (P) has the effect of proportionally increasing the control signal for the same level of error. The fact that the controller will “push” harder for a given level of error tends to cause the closed-loop system to react more quickly, but also to overshoot more. Another effect of increasing P is that it tends to reduce, but not eliminate, the steady-state error.
The integral term to the controller (I) tends to help reduce steady-state error. If there is a persistent, steady error, the integrator builds and builds, thereby increasing the control signal and driving the error down. A drawback of the integral term, however, is that it can make the system more sluggish (and oscillatory) since, when the error signal changes sign, it may take a while for the integrator to “unwind.”
The derivative element to the controller (D) adds the ability of the controller to “anticipate” error. With simple proportional control, if D is fixed, the only way that the control will increase is if the error increases. With derivative control, the control signal can become large if the error begins sloping upward, even while the magnitude of the error is still relatively small. This anticipation tends to add damping to the system, thereby decreasing overshoot. The addition of a derivative term, however, has no effect on the steady-state error.
The general effects of each controller parameter (P,I,D) on a closed-loop system are summarized in Table 1.
Using Simulink/Matlab software (ver. R2024b), the fixed P, I, D, N, b, and c parameters from (16), which are utilized to adjust the controller to a desired behavior, are derived as
P = 5.8134 , I = 0.2722 , D = 30.4924 , N = 5.4540 , b = 0.9213 , c = 0.7141 .
The path is regulated by the planned control system as it approaches motion with a constant intended heading angle for a constant number of left propeller rotations (nl = 200 rpm). Figure 4 and Figure 5 display the computer modeling results for the suggested block structure (see Figure 3) for the desired heading angle φd = 45 deg. Figure 4 explains the simulation task input signals as the number of right propeller nr revolutions. Figure 5 displays the resulting path of the specified MASS. In this case, the trend line with the determination coefficient R2 = 1 is the best approximation of the trajectory by a line with points ideally lying on a straight line.

3.4. Simulation of Cyberattack Using PID Controller

Cyber–physical systems (CPSs) are digital and mechanical devices that use sensors and actuators to detect and change their state, respectively. The CPSs rely on the accuracy and precision of sensors and actuators to reach a desired state. All parts of CPSs are prone to malfunctions or errors. Also, CPSs are vulnerable to deliberate attacks on both their cyber and physical components. The errors due to malfunctions or deliverable attacks on CPSs can cause the system to undergo an undesired or possibly dangerous response. The adversary can attack the system at any one of the components of the control system. This attack is propagated through the control system and modifies the value of the control signal in some random manner. This malevolent effect can be modeled as overwriting the original control signal with some random value [52,53]. For instance, the desired rudder command can be overwritten with Gaussian white noise to model the effects of attack on any control system component. The assault spreads across the control system and randomly alters the control signal’s value. One way to model the impact of a cyberattack is to inject Gaussian white noise into any part of the control system. The intended output and the actual measurement, φa, are connected. Figure 6 shows that φd with v is an imposed noise.
φ a = φ d τ + ν τ .
Now, examine a system where an interference takes place at the system’s input side, as shown in Figure 6.
F r a τ = F r d τ + w τ
It is challenging to construct a straightforward controller that adheres to a reference in all circumstances since the MASS model is noisy. As previously discussed, the control system configuration uses a PID controller (Figure 6). The white noise powers, PW = 1 × 10−7 from (18) and PV = 5 × 10−5 from (17), for the system were intruded into the maneuver. The control signal shadowed by noise, along with the trajectory, is presented in Figure 7 and Figure 8. In this case, the trend line with the determination coefficient R2 = 0.9 is the approximation of the trajectory by a best-fit line which has an angle of 24 deg. Higher rpms (revolutions per minute) (Figure 7) do not necessarily damage the MASS, but consistently running at a high rpm can cause the engine to wear over time. Short bursts of high rpm are generally safe and can even help clean out carbon deposits, but prolonged exposure to high rpms can increase heat and strain engine components. The MASS under such conditions performs chaotic sideways movement off its course near the trend line, which differs significantly from the desired one, and becomes unpredictable and dangerous for other vessels.

3.5. Simulation of Cyberattack Preventing by Using PID Controller and LMS Filters

In this setting, the LMS filters are added to the system’s input and output, maintaining the PID control system configuration previously discussed (Figure 9). A relatively simple LMS filter in conjunction with a PID controller is used to counter cyber-attacks, which improves the performance of the PID controller under cyber-attacks. The LMS algorithm is a widely used adaptive algorithm, particularly in adaptive filtering and neural networks. It is a stochastic gradient descent method that iteratively adjusts filter coefficients to minimize the mean squared error between a desired signal and the output of the filter. This process effectively trains the filter to better match the desired signal characteristics. In Figure 9, the LMS filter block uses the LMS adaptive algorithm. The filter weights or coefficients are required to reduce the error, ε, among the output and the wanted signals. The output signal is the filtered input one, i.e., the approximation of the wanted signal. The error output port gives the outcome of subtracting the output signal from the aimed one. Filtered errors for input and output LMS filters are presented in Figure 10 and Figure 11, accordingly. The input control signal is shown in Figure 12. The trajectory with LMS filtering is shown in Figure 13. In this case, the trend line with the determination coefficient R2 = 0.95 is the approximation of the trajectory by a best-fit line which has an angle of 40 deg. This trend line is closer to the desired course of MASS, and the chaotic leeway off its course is less significant than with only the PID controller. But even in this case, the MASS continues to remain unpredictable and dangerous for other ships.

3.6. Simulation of Cyberattack Preventing by Using NARMA-L2 Controller

The NARMA-L2 controller is used in the same control system architecture as previously described (see Figure 14). The NARMA-L1 and NARMA-L2 are two approximations to the NARMA model proposed in [54]. Practically speaking, it is discovered that the NARMA-L2 model is easier to set than the NARMA-L1. Here, we grounded our study only on the approximate NARMA-L2 model. For the PID and NARMA controllers under consideration, the logic of detecting a cyber-attack signal is not required. The PID controller has no restrictions on the input and output signals during operation. NARMA has restrictions corresponding to a given input signal, but the output signal is not limited. After tuning, these controllers operate in automatic mode. The internal window, with the associated parameters (Figure 15), can be used to tune the NARMA-L2 regulator. Figure 16 depicts the internal organization of the NARMA-L2 regulator’s block, which is depicted in Figure 14. Figure 17 shows the neural network structure from Figure 16.
An input control signal is given in Figure 18. The path of the MASS is presented in Figure 19. In this case, the trend line with the determination coefficient R2 = 1 is the approximation of the trajectory by a best-fit line which has an angle of 40 deg. This trend line is closer to the desired course of the MASS, and the MASS makes a smooth and slight leeway off its course. In this case, the MASS remains controllable when exposed to a cyber-attack and is not dangerous to other ships.

4. Discussion

The present study explored the performance differences between conventional PID and NARMA-L2 controllers in the context of cyber-attacks on MASS, specifically applied to the catamaran-type vessel “Nymo”. The results demonstrated a marked contrast between the two control strategies under adversarial conditions, offering valuable insights into both theoretical and applied aspects of autonomous maritime navigation.
From the simulations, it was evident that the traditional PID controller, while effective under nominal conditions, failed to maintain stability and course accuracy under the influence of cyber-attacks simulated as Gaussian white noise disturbances. This aligns with prior findings in control systems literature, where PID controllers are recognized for their limitations in nonlinear or high-disturbance environments. Even with the introduction of LMS filtering to suppress the noise, the PID-controlled MASS still exhibited unpredictability and significant deviation from its desired trajectory, posing potential hazards to surrounding maritime traffic.
In contrast, the NARMA-L2 controller demonstrated robust performance, retaining smooth trajectory control and only minor leeway even under simulated cyber threats. The model’s innate capacity to learn and adjust to nonlinear system dynamics and disturbance patterns is responsible for this better performance, which supports earlier studies on brain adaptive control in dynamic contexts.
These findings highlight the critical importance of employing adaptive, learning-based control architectures in the advancement of resilient autonomous waterborne systems. The NARMA-L2 controller’s resilience suggests that future implementations of MASS should consider integrating ML/AI methodologies not only for navigation but also for real-time threat mitigation and fault tolerance.
Moreover, the research confirms the practicality of using simulation environments such as Simulink/MATLAB for high-fidelity modeling and control testing of autonomous vessels. This supports earlier work by the authors and others on using model-based approaches to reduce real-world testing costs and risks.
Looking ahead, future research can go in several promising directions:
  • Expanding the control strategy to multi-vessel coordination under adversarial conditions.
  • Integrating conditions at sea, such as wind, waves, and currents, into the model for more comprehensive realism.
  • Applying online learning techniques to NARMA-L2 or alternative artificial neural network architectures to enable real-time adaptation to evolving threats.
  • Investigating hybrid control architectures combining neural networks with robust or sliding-mode controllers for improved safety guarantees.
By addressing these directions, researchers can further bridge the gap between theoretical robustness and real-world applicability, ultimately advancing the safe and reliable deployment of autonomous vessels in complex maritime environments.

5. Conclusions

In this paper, a mathematical model for the catamaran “Nymo” maneuvering is presented, and PID and NARMA-L2 controllers for desired heading control are applied, with the objective of maintaining the automatic course of a catamaran under the influence of cyber-attacks.
Simulation results in Simulink are presented. When the obtained results are examined, it is observed that control using conventional controllers, such as PID, shows underperformance when subject to cyber-attacks. In contrast, the NARMA-L2 controller, an artificial neural network-based solution, demonstrates strong resilience and high performance under adversarial conditions.
The resulting simulation model of the “Nymo” catamaran makes it possible to avoid difficult-to-implement experiments in rough sea conditions, offering a safe and cost-effective virtual environment for testing advanced control strategies.
By explicitly modeling the attack vector at the control input level and comparing adaptive versus neural strategies, this study contributes a detailed and practical evaluation of steering-specific cyber resilience, an area not sufficiently addressed in current MASS literature.
However, while the proposed approach shows promise in a simulated setting, there is limited discussion on the real-world feasibility of implementing such neural control systems in operational MASS. The practical challenges of hardware integration, computational overhead, and robustness in diverse environmental and traffic conditions remain open. Additionally, scalability for larger, more complex vessels with different propulsion systems and mission profiles is yet to be evaluated.
Forthcoming research might lead in the following key directions:
  • Real-world validation and deployment of the NARMA-L2 control scheme on physical platforms, assessing performance in the presence of real sensor noise, latency, and actuator constraints.
  • Scalability studies to examine how the proposed control framework performs with larger vessels or under more complex maneuvering tasks, such as collision avoidance and dynamic route re-planning.
  • Integration of ML/AI-based attack detection and mitigation systems (e.g., anomaly detection using unsupervised learning, reinforcement learning-based adaptation) to complement control-layer robustness with situational awareness and proactive defense.
  • Hybrid control architectures that combine neural networks with classical or robust control elements to ensure interpretability, safety, and compliance with maritime regulations.
  • Modular simulation environments that allow for plug-and-play experimentation with various attack models, control algorithms, and vessel types, thereby promoting repeatable and extensible research.
Pursuing these directions will significantly enhance the real-world applicability and scientific impact of autonomous maritime systems in the face of growing cybersecurity threats.

Author Contributions

Conceptualization, S.B. and I.A.; methodology, S.B.; software, I.A.; validation, I.A., S.B. and P.K.; formal analysis, I.A.; investigation, I.A. and S.B.; resources, I.A. and S.B.; data curation, I.A. and S.B.; writing—original draft preparation, I.A. and S.B.; writing—review and editing, I.A. and S.B.; visualization, I.A.; supervision, P.K.; project administration, S.B.; funding acquisition, S.B. and P.K. All authors have read and agreed to the published version of the manuscript.

Funding

I. Astrov, S. Bauk, and P. Kujala acknowledge funding from the EU Horizon2020 project 952360-MariCybERA.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data is contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
AIArtificial Intelligence
(S-)AIS(Satellite-)Automatic Identification System
AUVAutonomous Underwater Vehicle
BIMCOBaltic and International Maritime Council
COLREGConvention on the International Regulations for Preventing Collisions at Sea
CPSCyber Physical System
DDoSDistributed Denial of Service
EGNOSEuropean Geostationary Navigation Overlay System
GNSSGlobal Navigation Satellite System
GPSGlobal Positioning System
HAZIDHazard Identification
IMOInternational Maritime Organization
ISPSInternational Ship and Port Facility Security code
ITInformation Technology
LMSLeast Mean Squares
LUSVLarge Unmanned Surface Vehicle
MASSMaritime Autonomous Surface Ship
MLMachine Learning
NARMA-L1Nonlinear Autoregressive Moving Average with Exogenous Input-L1 neural network controller
NARMA-L2Nonlinear Autoregressive Moving Average with Exogenous Input-L2 neural network controller
NEDNorth–East–Down
OTOperation Technology
PIDProportional–Integral–Derivative
SCADASupervisory Control and Data Acquisition
STPASystem Theoretic Process Analysis
STRIDESpoofing, Tampering, Repudiation, Information disclosure, Denial of service, Elevation of privilege
XLUUVExtra Large Unmanned Undersea Vehicle

References

  1. Bauk, S. (Ed.) Maritime Cybersecurity; Springer Nature: New York, NY, USA, 2025; pp. 5–6. [Google Scholar] [CrossRef]
  2. James, F.A.; Ioannis, C. Ships without crews: IMO and UK responses to cybersecurity, technology, law and regulation of maritime autonomous surface ships (MASS). Front. Comput. Sci. 2023, 5, 1151188. [Google Scholar] [CrossRef]
  3. Dupont, B.; Shearing, C.; Bernier, M.; Leukfeldt, R. The tensions of cyber-resilience: From sensemaking to practice. Comput. Secur. 2023, 132, 103372. [Google Scholar] [CrossRef]
  4. Schinas, O.; Metzger, D. Cyber-seaworthiness: A critical review of the literature. Mar. Policy 2023, 151, 105592. [Google Scholar] [CrossRef]
  5. Bauk, S.; Kapidani, N.; Lukšic, Ž.; Rodrigues, F.; Sousa, L. Autonomous marine vehicles in sea surveillance as one of the COMPASS2020 project concerns. J. Phys. Conf. Ser. 2019, 1357, 012045. [Google Scholar] [CrossRef]
  6. Astrov, I.; Smirnov, A.; Kruglov, V.; Mohamed, S.A.; Hassan, M. Simulink/MATLAB based comparison of neural and basic tracking control for an autonomous surface vessel for situation awareness applications. In Proceedings of the IEEE Joint 19th International Symposium on Computational Intelligence and Informatics and 7th IEEE International Conference on Recent Achievements in Mechatronics, Automation, Computer Sciences and Robotics, Szeged, Hungary, 14–16 November 2019. [Google Scholar]
  7. Astrov, I.; Udal, A.; Roasto, I.; Molder, H. Target tracking by neural predictive control of the autonomous surface vessel for environment monitoring and cargo transportation applications. In Proceedings of the 17th Biennial Baltic Electronics Conference 2020, Tallinn, Estonia, 6–8 October 2020. [Google Scholar]
  8. Oruc, A.; Kavallieratos, G.; Gkioulos, V.; Katsikas, S. Perspectives on the Cybersecurity of the Integrated Navigation System. J. Mar. Sci. Eng. 2025, 13, 1087. [Google Scholar] [CrossRef]
  9. Pietrzykowski, Z.; Hajduk, J. Operations of Maritime Surface Ships. TransNav Int. J. Mar. Navig. Saf. Sea Transp. 2019, 13, 725–733. [Google Scholar] [CrossRef]
  10. Chang, C.-H.; Kontovas, C.; Yu, Q.; Yang, Z. Risk assessment of the operations of maritime autonomous surface ships. Reliab. Eng. Syst. Saf. 2021, 207, 107324. [Google Scholar] [CrossRef]
  11. Van Brummelen, J.; O’bRien, M.; Gruyer, D.; Najjaran, H. Autonomous vehicle perception: The technology of today and tomorrow. Transp. Res. Part C 2018, 89, 384–406. [Google Scholar] [CrossRef]
  12. Bauk, S. Performances of some autonomous assets in maritime missions. TransNav Int. J. Mar. Navig. Saf. Sea Transp. 2020, 14, 875–881. [Google Scholar] [CrossRef]
  13. Wrobel, K.; Krata, P.; Montewka, J. Preliminary results of a system-theoretic assessment of Maritime Autonomous Surface Ships’ safety. TransNav Int. J. Mar. Navig. Saf. Sea Transp. 2019, 13, 717–723. [Google Scholar] [CrossRef]
  14. Wingrove, M. One Year to Go for IMO Non-Mandatory MASS Code. Available online: https://www.rivieramm.com/news-content-hub/news-content-hub/one-year-to-go-for-imo-non-mandatory-mass-code-81022#:~:text=IMO%20is%20writing%20a%20legislative,on%20the%20progress%20to%20date (accessed on 30 June 2025).
  15. Lloyd’s Register. ShipRight Design and Construction. Additional Design Procedures. LR Code for Unmanned Marine Systems; Lloyd’s Register: London, UK, 2017. [Google Scholar]
  16. Astrov, I.; Bauk, S. Simulating a cyber-attack on the mass thruster controllers at low-speed motion. Promet Traffic Transp. 2024, 36, 1006–1021. [Google Scholar] [CrossRef]
  17. Kessler, G.C.; Shepard, S.D. Maritime Cybersecurity—A Guide for Leaders and Managers; Amazon Digital Services LLC-KDP Print US: Seattle, WA, USA, 2022. [Google Scholar]
  18. Cozzens, T. ADVA Tackles GNSS Jamming and Spoofing with AI Solutions. Available online: https://www.gpsworld.com/adva-tackles-gnss-jamming-and-spoofing-with-ai-solution (accessed on 30 June 2025).
  19. ASGARD: The Ultimate Response to Maritime Spoofing Attacks. Available online: https://www.euspa.europa.eu/newsroom-events/news/asgard-ultimate-response-maritime-spoofing-attacks (accessed on 30 June 2025).
  20. Tsiopoulos, L.; Vaarandi, R. A Scope Review of Secure Broadcasting Protocols for the Automatic Identification System. In Maritime Cybersecurity; Bauk, S., Ed.; Signals and Communication Technology; Springer: Cham, Switzerland, 2025. [Google Scholar] [CrossRef]
  21. Visky, G.; Khisteva, D.; Maennel, O. Technical Considerations for Open-Source Intrusion Detection System Integration in Marine Vehicles. In Maritime Cybersecurity; Bauk, S., Ed.; Signals and Communication Technology; Springer: Cham, Switzerland, 2025. [Google Scholar] [CrossRef]
  22. Chaal, M.; Ren, X.; BahooToroody, A.; Basnet, S.; Bolbot, V.; Banda, O.A.V.; Van Gelder, P. Research on risk, safety, and reliability of autonomous ships: A bibliometric review. Saf. Sci. 2023, 167, 106256. [Google Scholar] [CrossRef]
  23. Wróbel, K.; Montewka, J.; Kujala, P. System-theoretic approach to safety of remotely-controlled merchant vessel. Ocean Eng. 2018, 152, 334–345. [Google Scholar] [CrossRef]
  24. Wróbel, K.; Montewka, J.; Kujala, P. Towards the development of a system-theoretic model for safety assessment of autonomous merchant vessels. Reliab. Eng. Syst. Saf. 2018, 178, 209–224. [Google Scholar] [CrossRef]
  25. Jones, B.; Jenkinson, I.; Yang, Z.; Wang, J. The use of Bayesian network modelling for maintenance planning in a manufacturing industry. Reliab. Eng. Syst. Saf. 2010, 95, 267–277. [Google Scholar] [CrossRef]
  26. Kavallieratos, G.; Cuppens, F.; Cuppens, N.; Lambrinoudakis, C.; Antón, A.; Gritzalis, S.; Mylopoulos, J.; Kalloniatis, C. Cyber-Attacks Against the Autonomous Ship. In Computer Security, Proceedings of the SECPRE CyberICPS 2018, Corfu, Greece, 27–28 September 2018; Katsikas, S., Cuppens, N., Cuppens, F., Gritzalis, S., Kalloniatis, C., Eds.; Springer: Cham, Switzerland, 2018; Volume 11387. [Google Scholar] [CrossRef]
  27. Ahn, G.; Jang, J.; Choi, S.; Shin, D. Research on Improving Cyber Resilience by Integrating the Zero Trust Security Model With the MITRE ATT&CK Matrix. IEEE Access 2024, 12, 89291–89309. [Google Scholar] [CrossRef]
  28. Kujo, J. Implementing Zero Trust Architecture for Identities and Endpoints with Microsoft Tools. Master’s Thesis, JAMK University of Applied Sciences, Jyväskylä, Finland, 2023. [Google Scholar]
  29. Lim, J.; Yoo, Y. Cyber Threat and Vulnerability Analysis-based Risk Assessment for Smart Ship. J. Korean Soc. Mar. Environ. Saf. 2024, 30, 263–274. [Google Scholar] [CrossRef]
  30. Haruna, M.; Gebremeskel, K.G.; Troscia, M.; Tardo, A.; Pagano, P. Mechanisms for securing autonomous shipping services and machine learning algorithms for misbehaviour detection. Telecom 2024, 5, 1031–1050. [Google Scholar] [CrossRef]
  31. Yousaf, A.; Amro, A.; Kwa, P.T.H.; Li, M.; Zhou, J. Cyber risk assessment of cyber-enabled autonomous cargo vessel. Int. J. Crit. Infrastruct. Prot. 2024, 46, 100695. [Google Scholar] [CrossRef]
  32. Kazemy, A.; Lam, J.; Zhang, X.-M. Event-Triggered Output Feedback Synchronization of Master–Slave Neural Networks Under Deception Attacks. IEEE Trans. Neural Netw. Learn. Syst. 2022, 33, 952–961. [Google Scholar] [CrossRef]
  33. Zhang, X.; Han, Q.; Ge, X. A novel approach to H∞ performance analysis of discrete-time networked systems subject to network-induced delays and malicious packet dropouts. Automatica 2021, 136, 110010. [Google Scholar] [CrossRef]
  34. Vaarandi, R.; Tsiopoulos, L.; Visky, G.; Rehman, M.U.; Bahşi, H. A Systematic Literature review of Cyber security monitoring in Maritime. IEEE Access 2025, 13, 85307–85329. [Google Scholar] [CrossRef]
  35. Erbas, M.; Khalil, S.M.; Tsiopoulos, L. Systematic literature review of threat modeling and risk assessment in ship cybersecurity. Ocean Eng. 2024, 306, 118059. [Google Scholar] [CrossRef]
  36. Clavijo Mesa, M.V.; Patino-Rodriguez, C.E.; Guevara Carazas, F.J. Cybersecurity at Sea: A Literature Review of Cyber-Attack Impacts and Defenses in Maritime Supply Chains. Information 2024, 15, 710. [Google Scholar] [CrossRef]
  37. Rohan, R. Identifying commonalities of cyberattacks against the maritime transportation system. Int. Conf. Cyber Warf. Secur. 2023, 18, 497–503. [Google Scholar] [CrossRef]
  38. Pawelski, J. Cyber threats for present and future commercial shipping. TransNav Int. J. Mar. Navig. Saf. Sea Transp. 2023, 17, 261–267. [Google Scholar] [CrossRef]
  39. Zhu, B.; Joseph, A.; Sastry, S. A Taxonomy of Cyber Attacks on SCADA Systems. In Proceedings of the 2011 International Conference on Internet of Things and Cyber, Physical and Social Computing, Dalian, China, 19–22 October 2011; pp. 380–388. [Google Scholar] [CrossRef]
  40. Irmak, E.; Erkek, I. An overview of cyber-attack vectors on SCADA systems. In Proceedings of the 2018 International Symposium on Digital Forensics and Security, Antalya, Turkey, 22–25 March 2018; pp. 1–5. [Google Scholar] [CrossRef]
  41. Astrov, I. A model-based PID control of turning maneuver for catamaran autonomous surface vessel. In Proceedings of the 9th International Conference on Engineering and Emerging Technologies, Istanbul, Turkey, 27–28 October 2023. [Google Scholar]
  42. Astrov, I.; Bauk, S. On cyber vulnerability of MASS: A simulation experiment to counter a rudder controller attack. In Proceedings of the 2024 International Conference on Applied Mathematics & Computer Science, Venice, Italy, 28–30 October 2024. [Google Scholar]
  43. Astrov, I.; Bauk, S. Simulating a cyber-attack on an autonomous sea surface vessel’s rudder controller. In Proceedings of the 13th Mediterranean Conference on Embedded Computing, Budva, Montenegro, 11–14 June 2024. [Google Scholar]
  44. Hong, M.J.; Arshad, M.R. Modeling and motion control of a riverine autonomous surface vehicle (ASV) with differential thrust. J. Teknol. 2015, 74, 137–143. [Google Scholar] [CrossRef]
  45. Ferrari, V.; Sutulo, S.; Soares, C.G. Preliminary investigation on automatic berthing of waterjet catamaran. In Maritime Engineering and Technology; Soares, C.G., Santos, T.A., Eds.; Taylor & Francis Group: London, UK, 2015; pp. 1105–1111. [Google Scholar] [CrossRef]
  46. Pandey, J.; Hasegawa, K. Path following of underactuated catamaran surface vessel (WAM-V) using fuzzy waypoint guidance algorithm. In Proceedings of the SAI Intelligent Systems Conference, London, UK, 21–22 September 2016; pp. 995–1000. [Google Scholar] [CrossRef]
  47. Propeller Thrust. Available online: https://www.sciencedirect.com/topics/engineering/propeller-thrust (accessed on 15 November 2024).
  48. NYMO Technical Parameters. Available online: https://mindchip.ee/nymo/ (accessed on 30 June 2025).
  49. Parallelepiped Rotating Around Its Central Axis. Available online: http://www.claredot.net/en/sec-MomMasInertia/Mom_11.php (accessed on 30 June 2025).
  50. Advance Coefficient. Available online: https://www.sciencedirect.com/topics/engineering/advance-coefficient (accessed on 30 June 2025).
  51. Reed, C.M. Design and Implementation of an Autonomous Surface Vessel. Available online: https://apps.dtic.mil/sti/tr/pdf/ADA452982.pdf (accessed on 30 June 2025).
  52. Sunarsih, S.; Priyanto, A.; Zamani, M.; Izzudin, N. A Chebyshev polynomial on torque and thrust coefficients of mathematical propeller properties for a LNG manoeuvring simulation. J. Ocean. Mech. Aerosp. Sci. Eng. 2014, 11, 11–20. [Google Scholar] [CrossRef]
  53. Severson, T.A.; Croteau, B.; Rodríguez-Seda, E.J.; Kiriakidis, K.; Robucci, R.; Patel, C. A resilient framework for sensor-based attacks on cyber–physical systems using trust-based consensus and self-triggered control. Control Eng. Pract. 2020, 101, 104509. [Google Scholar] [CrossRef]
  54. Narendra, K.S.; Mukhopadhyay, S. Adaptive control using neural networks and approximate models. IEEE Trans. Neural Netw. 1997, 8, 475–485. [Google Scholar] [CrossRef]
Figure 1. Catamaran-based “Nymo” MASS (Photo by: Tallinn University of Technology).
Figure 1. Catamaran-based “Nymo” MASS (Photo by: Tallinn University of Technology).
Jmse 13 01470 g001
Figure 2. Planar model of catamaran MASS.
Figure 2. Planar model of catamaran MASS.
Jmse 13 01470 g002
Figure 3. MASS block diagram with PID regulator without irregularities.
Figure 3. MASS block diagram with PID regulator without irregularities.
Jmse 13 01470 g003
Figure 4. MASS input control signal without irregularities.
Figure 4. MASS input control signal without irregularities.
Jmse 13 01470 g004
Figure 5. MASS path without irregularities.
Figure 5. MASS path without irregularities.
Jmse 13 01470 g005
Figure 6. MASS block diagram with PID regulator with irregularities.
Figure 6. MASS block diagram with PID regulator with irregularities.
Jmse 13 01470 g006
Figure 7. MASS input control signal with irregularities.
Figure 7. MASS input control signal with irregularities.
Jmse 13 01470 g007
Figure 8. MASS path with irregularities.
Figure 8. MASS path with irregularities.
Jmse 13 01470 g008
Figure 9. MASS block diagram with PID regulator and LMS filters.
Figure 9. MASS block diagram with PID regulator and LMS filters.
Jmse 13 01470 g009
Figure 10. Error for input LMS filter 1.
Figure 10. Error for input LMS filter 1.
Jmse 13 01470 g010
Figure 11. Error for output LMS filter 2.
Figure 11. Error for output LMS filter 2.
Jmse 13 01470 g011
Figure 12. MASS input control signal with LMS filtering.
Figure 12. MASS input control signal with LMS filtering.
Jmse 13 01470 g012
Figure 13. MASS path after using LMS filtering.
Figure 13. MASS path after using LMS filtering.
Jmse 13 01470 g013
Figure 14. MASS block diagram with NARMA-L2 controller.
Figure 14. MASS block diagram with NARMA-L2 controller.
Jmse 13 01470 g014
Figure 15. Plant identification—NARMA-L2 window.
Figure 15. Plant identification—NARMA-L2 window.
Jmse 13 01470 g015
Figure 16. Block diagram of NARMA-L2 controller.
Figure 16. Block diagram of NARMA-L2 controller.
Jmse 13 01470 g016
Figure 17. Multilayer neural network.
Figure 17. Multilayer neural network.
Jmse 13 01470 g017
Figure 18. MASS input control signal using NARMA-L2 controller.
Figure 18. MASS input control signal using NARMA-L2 controller.
Jmse 13 01470 g018
Figure 19. MASS path using NARMA-L2 controller.
Figure 19. MASS path using NARMA-L2 controller.
Jmse 13 01470 g019
Table 1. The general influences of the P, I, and D parameters on a closed-loop system.
Table 1. The general influences of the P, I, and D parameters on a closed-loop system.
TypeRise TimeOvershootSettling TimeSum of Squares Error
PDecreaseIncreaseSmall ChangeDecrease
IDecreaseIncreaseIncreaseDecrease
DSmall ChangeDecreaseDecreaseNo Change
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Astrov, I.; Bauk, S.; Kujala, P. Exploring Simulation Methods to Counter Cyber-Attacks on the Steering Systems of the Maritime Autonomous Surface Ship (MASS). J. Mar. Sci. Eng. 2025, 13, 1470. https://doi.org/10.3390/jmse13081470

AMA Style

Astrov I, Bauk S, Kujala P. Exploring Simulation Methods to Counter Cyber-Attacks on the Steering Systems of the Maritime Autonomous Surface Ship (MASS). Journal of Marine Science and Engineering. 2025; 13(8):1470. https://doi.org/10.3390/jmse13081470

Chicago/Turabian Style

Astrov, Igor, Sanja Bauk, and Pentti Kujala. 2025. "Exploring Simulation Methods to Counter Cyber-Attacks on the Steering Systems of the Maritime Autonomous Surface Ship (MASS)" Journal of Marine Science and Engineering 13, no. 8: 1470. https://doi.org/10.3390/jmse13081470

APA Style

Astrov, I., Bauk, S., & Kujala, P. (2025). Exploring Simulation Methods to Counter Cyber-Attacks on the Steering Systems of the Maritime Autonomous Surface Ship (MASS). Journal of Marine Science and Engineering, 13(8), 1470. https://doi.org/10.3390/jmse13081470

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop