Cybersecurity Challenges in the Maritime Sector
Abstract
:1. Introduction
2. Background on Ship Automation Systems
3. Cyberattacks on the Ship Automation Systems
3.1. Automatic Identification System
3.2. Global Position System
3.3. Global Navigation Satellite System
3.4. Electronic Chart Display Information System
3.5. Very Small Aperture Terminal
3.6. Radio Detection and Ranging
3.7. Video Surveillance Systems
3.8. Industrial Control Systems
3.9. IT Network Systems
4. Cyberattack Cases from the Maritime Transport Sector
5. Security and Safety Countermeasures
6. Conclusions
Author Contributions
Funding
Conflicts of Interest
Abbreviations
AI | Artificial Intelligence |
AIS | Automatic Identification System |
CE | Certificate Authority |
ECDIS | Electronic Chart Display and Information System |
GMDS | Global Maritime Distress System |
GPS | Global Positioning System |
IBS | Integrated Bridge System |
ICS | Industrial Control System |
ICT | Information and Communications Technology |
IMO | International Maritime Organization |
IT | Information Technology |
NNSS | Global Navigation Satellite System |
NMA | Navigation Message Authentication |
OT | Operational Technology |
PKI | Public Key Infrastructure |
Radar | Radio Detection and Ranging |
VSAT | Very Small Aperture Terminal |
VSS | Video Surveillance System |
References
- DiRenzo, J.; Goward, D.A.; Roberts, F.S. The little-known challenge of maritime cybersecurity. In Proceedings of the 2015 6th International Conference on Information, Intelligence, Systems and Applications (IISA), Corfu, Greece, 6–8 July 2015; pp. 1–5. [Google Scholar]
- Jensen, L. Challenges in maritime cyber-resilience. Technol. Innov. Manag. Rev. 2015, 5, 35. [Google Scholar] [CrossRef]
- Alcaide, J.I.; Llave, R.G. Critical infrastructures cybersecurity and the maritime sector. Transp. Res. Procedia 2020, 45, 547–554. [Google Scholar] [CrossRef]
- Fell, J. Mayflower tribute set to sail unmanned [automated marine transport]. Eng. Technol. 2015, 10, 42–44. [Google Scholar] [CrossRef]
- Foundation, N. Demonstration Test of World’s First Unmanned Operation of Small Tourism Boat Successfully Completed at Sarushima, Yokosuka. Available online: https://www.nippon-foundation.or.jp/en/news/articles/2022/20220111-67000.html (accessed on 14 January 2022).
- Gu, Y.; Goez, J.C.; Guajardo, M.; Wallace, S.W. Autonomous vessels: State of the art and potential opportunities in logistics. Int. Trans. Oper. Res. 2021, 28, 1706–1739. [Google Scholar] [CrossRef] [Green Version]
- Gu, Y.; Wallace, S.W. Operational benefits of autonomous vessels in logistics—A case of autonomous water-taxis in Bergen. Transp. Res. Part E Logist. Transp. Rev. 2021, 154, 102456. [Google Scholar] [CrossRef]
- Werle, D.; Boudreau, P.R.; Brooks, M.R.; Butler, M.J.; Charles, A.; Coffen-Smout, S.; Griffiths, D.; McAllister, I.; McConnell, M.L.; Porter, I.; et al. The Future of Ocean Governance and Capacity Development. In The Future of Ocean Governance and Capacity Development; Brill Nijhoff: Leiden, The Netherlands, 2019; pp. 1–4. [Google Scholar]
- Kavallieratos, G.; Katsikas, S.; Gkioulos, V. Cyberattacks against the autonomous ship. In Computer Security; Springer: Berlin/Heidelberg, Germany, 2018; pp. 20–36. [Google Scholar]
- Tam, K.; Jones, K. Cyber-risk assessment for autonomous ships. In Proceedings of the 2018 International Conference on Cybersecurity and Protection of Digital Services (Cybersecurity), Scotland, UK, 11–12 June 2018; pp. 1–8. [Google Scholar]
- Balduzzi, M.; Pasta, A.; Wilhoit, K. A security evaluation of AIS automated identification system. In Proceedings of the 30th Annual Computer Security Applications Conference, New Orleans, LA, USA, 8–12 December 2014; pp. 436–445. [Google Scholar]
- LR. Cyber Enabled Systems. Available online: https://unece.org/fileadmin/DAM/trans/doc/2018/sc3wp3/07._LR.pdf (accessed on 31 January 2022).
- CruisMapper. Cruise Ship Safety. Available online: https://www.cruisemapper.com/wiki/751-cruise-ship-safety (accessed on 3 February 2022).
- Yastrebova, A.; Höyhtyä, M.; Boumard, S.; Ometov, A. Comparative study on GNSS positioning systems for autonomous vessels in the arctic region. In Proceedings of the WiP Proceedings of the International Conference on Localization and GNSS (ICL-GNSS 2020), Tampere, Finland, 1–3 June 2020. [Google Scholar]
- Kessler, G.C.; Craiger, J.P.; Haass, J.C. A taxonomy framework for maritime cybersecurity: A demonstration using the automatic identification system. Int. J. Mar. Navig. Saf. Sea Transp. 2018, 12, 429. [Google Scholar] [CrossRef] [Green Version]
- Bhutani, A.; Göttel, B.; Van, N.T.P.; Mukhopadhyay, S.; Demir, V. Advances in Radar Technology; Scientific Research Publishing: Wuhan, China, 2021; p. 245. [Google Scholar]
- Kuzmichev, A.P.; Smirnov, V.G.; Zakhvatkina, N.Y.; Bychkova, I.A. Use of Satellite Communication Systems for Collecting and Transmitting Data on the State of the Arctic Sea Ice Cover. In Proceedings of the 2021 IEEE International Geoscience and Remote Sensing Symposium IGARSS, Brussels, Belgium, 11–16 July 2021; pp. 5732–5734. [Google Scholar]
- FORSCOUT. Securing Ship Automation & Control Systems. Available online: https://www.forescout.com/resources/securing-ship-automation-control-systems/ (accessed on 31 January 2022).
- Stouffer, K.; Falco, J.; Scarfone, K. Guide to industrial control systems (ICS) security. NIST Spec. Publ. 2011, 800, 16. [Google Scholar]
- Ilcev, M. New Aspects for Modernization Global Maritime Distress and Safety System (GMDSS). Int. J. Mar. Navig. Saf. Sea Transp. 2020, 14, 519–530. [Google Scholar] [CrossRef]
- Sáiz, V.M.M.; López, A.P. Future trends in electric propulsion systems for commercial vessels. J. Marit. Res. 2007, 4, 81–100. [Google Scholar]
- Scherer, T.; Cohen, J. The evolution of machinery control systems support at the naval ship systems engineering station. Nav. Eng. J. 2011, 123, 85–109. [Google Scholar] [CrossRef]
- Kazak, N.; Frolova, S. Ship Automation and Control Systems. In Proceedings of the IX All-Russian Science-Practical Conference of Students, Postgraduates and Young Scientists, Kerch, Crimea, 6 May 2020; p. 46. [Google Scholar]
- Ben Farah, M.A.; Ukwandu, E.; Hindy, H.; Brosset, D.; Bures, M.; Andonovic, I.; Bellekens, X. Cybersecurity in the maritime industry: A systematic survey of recent advances and future trends. Information 2022, 13, 22. [Google Scholar] [CrossRef]
- Menhat, M.N.; Zaideen, I.M.M.; Yusuf, Y.; Salleh, N.H.M.; Zamri, M.A.; Jeevan, J. The impact of Covid-19 pandemic: A review on maritime sectors in Malaysia. Ocean. Coast. Manag. 2021, 209, 105638. [Google Scholar] [CrossRef] [PubMed]
- Chang, C.; Wenming, S.; Wei, Z.; Changki, P.; Kontovas, C. Evaluating cybersecurity risks in the maritime industry: A literature review. In Proceedings of the International Association of Maritime Universities (IAMU) Conference, Tokyo, Japan, 30 October–1 November 2019. [Google Scholar]
- Larsen, M.H.; Lund, M.S. A Maritime Perspective on Cyber Risk Perception: A Systematic Literature Review. IEEE Access 2021, 9, 144895–144905. [Google Scholar] [CrossRef]
- Marine Traffic. Available online: https://www.marinetraffic.com/en/ais/home/centerx:-12.0/centery:25.0/zoom:4 (accessed on 14 January 2022).
- Androjna, A.; Brcko, T.; Pavic, I.; Greidanus, H. Assessing cyber challenges of maritime navigation. J. Mar. Sci. Eng. 2020, 8, 776. [Google Scholar] [CrossRef]
- Lisa, V. $80 Million Yacht Hijacked by Students Spoofing GPS Signals. 31 July, Naked Security (Sophos). Available online: https://nakedsecurity.sophos.com/2013/07/31/80-million-yachthijacked-by-students-spoofing-gps-signals (accessed on 31 January 2022).
- GPS World. State Department Issues Notice on North Korean Jamming. 2016. Available online: http://gpsworld.com/state-department-issues-notice-on-north-korean-jamming (accessed on 31 January 2022).
- John, R. GPS fLaw Could Let Terrorists Hijack Ships, Planes. Fox News Tech. Available online: http://www.foxnews.com/tech/2013/07/26/exclusive-gps-flaw-could-let-terroristshijack-ships-planes.html (accessed on 31 January 2022).
- Meland, P.; Bernsmed, K.; Wille, E.; Rødseth, Ø.; Nesheim, D. A retrospective analysis of maritime cybersecurity incidents. Int. J. Mar. Navig. Saf. Sea Transp. 2021, 15, 4. [Google Scholar] [CrossRef]
- Analytica, O. Global maritime security risks rise with GNSS use. In Emerald Expert Briefings; Oxford Analytica: Oxford, UK, 2019; Volume 1. [Google Scholar]
- Coffed, J. The Threat of GPS Jamming: The Risk to an Information Utility; Report of EXELIS: Herndon, VA, USA, 2014; pp. 6–10. [Google Scholar]
- Schmidt, D.; Radke, K.; Camtepe, S.; Foo, E.; Ren, M. A survey and analysis of the GNSS spoofing threat and countermeasures. ACM Comput. Surv. 2016, 48, 1–31. [Google Scholar] [CrossRef]
- Svilicic, B.; Brčić, D.; Žuškin, S.; Kalebić, D. Raising awareness on cybersecurity of ECDIS. Int. J. Mar. Navig. Saf. Sea Transp. 2019, 13, 231–236. [Google Scholar]
- Svilicic, B.; Kamahara, J.; Celic, J.; Bolmsten, J. Assessing ship cyber risks: A framework and case study of ECDIS security. WMU J. Marit. Aff. 2019, 18, 509–520. [Google Scholar] [CrossRef]
- Kavallieratos, G.; Diamantopoulou, V.; Katsikas, S.K. Shipping 4.0: Security requirements for the cyber-enabled ship. IEEE Trans. Ind. Inform. 2020, 16, 6617–6625. [Google Scholar] [CrossRef]
- Dyryavyy, Y. Preparing for Cyber Battleships—Electronic Chart Display and Information System Security; NCC Group: Manchester, UK, 2014. [Google Scholar]
- Wu, Z.; Pan, Q.; Yue, M.; Ma, S. An Approach of Security Protection for VSAT Network. In Proceedings of the 2018 17th IEEE International Conference On Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018; pp. 1511–1516. [Google Scholar]
- Santamarta, R. Maritime Security: Hacking into a Voyage Data Recorder (VDR). 2015. Available online: https://ioactive.com/maritime-security-hacking-into-a-voyage-data-recorder-vdr/ (accessed on 10 January 2022).
- Pavur, J.; Moser, D.; Strohmeier, M.; Lenders, V.; Martinovic, I. A tale of sea and sky on the security of maritime VSAT communications. In Proceedings of the 2020 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 18–21 May 2020; Available online: https://ieeexplore.ieee.org/abstract/document/9152624?casa_token=WNlJxkEBkiMAAAAA:M7VuGUYSWSjse0C9DUqJuH9gjFl9lWUO9MvFuZoCpEwuAX3BmKg57M9w2ZSfDfKM_sTvYrwwgQ6P (accessed on 10 January 2021).
- Tam, K.; Jones, K. MaCRA: A model-based framework for maritime cyber-risk assessment. WMU J. Marit. Aff. 2019, 18, 129–163. [Google Scholar] [CrossRef]
- Heffner, C. Exploiting Surveillance Cameras Like a Hollywood Hacker. Available online: https://privacy-pc.com/articles/exploiting-network-surveillance-cameras-like-a-hollywood-hacker.html (accessed on 10 January 2021).
- Bugeja, J.; Jönsson, D.; Jacobsson, A. An investigation of vulnerabilities in smart connected cameras. In Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Athens, Greece, 19–23 March 2018; pp. 537–542. [Google Scholar]
- Shoultz, D. Securely Connected Vessels: Vessel Communications and Maritime Cybersecurity. Technical Report. 2017. Available online: https://www.maritimeprofessional.com/blogs/post/securely-connected-vessels-vessel-communicationsand-maritime-15176 (accessed on 9 July 2021).
- Healey, J. Beyond Data Breaches: Global Interconnections of Cyber Risk; Atlantic Council: Washington, DC, USA, 2014. [Google Scholar]
- Caprolu, M.; Di Pietro, R.; Raponi, S.; Sciancalepore, S.; Tedeschi, P. Vessels cybersecurity: Issues, challenges, and the road ahead. IEEE Commun. Mag. 2020, 58, 90–96. [Google Scholar] [CrossRef]
- Al-Mhiqani, M.N.; Ahmad, R.; Yassin, W.; Hassan, A.; Abidin, Z.Z.; Ali, N.S.; Abdulkareem, K.H. Cyber-security incidents: A review cases in cyber-physical systems. Int. J. Adv. Comput. Sci. Appl. 2018, 1, 499–508. [Google Scholar]
- Forscout. Spoofing in the Black Sea: What Really Happened? Available online: https://www.gpsworld.com/spoofing-in-the-black-sea-what-really-happened/ (accessed on 31 January 2022).
- Borger, J. Pentagon Orders Temporary Halt to US Navy Operations after Second Collision. Available online: https://www.theguardian.com/us-news/2017/aug/21/us-destroyer-uss-john-s-mccain-damaged-after-collision-with-oil-tanker (accessed on 31 January 2022).
- Cohen, Z. US Navy Ship Collides with South Korean Fishing Boat. Available online: https://edition.cnn.com/2017/05/09/politics/fishing-vessel-hits-us-navy-ship-south-korea/index.html (accessed on 31 January 2022).
- Roberts, F.S.; Egan, D.; Nelson, C.; Whytlaw, R. Combined cyber and physical attacks on the maritime transportation system. NMIOTC Marit. Interdiction Oper. J. 2019, 18, 22. [Google Scholar]
- Oruc, A.; MIMarEST, M.S.M. Claims of State-Sponsored Cyberattack in the Maritime Industry. In Proceedings of the 15th International Naval Engineering Conference & Exhibition, Delft, The Netherlands, 6–8 October 2020. [Google Scholar]
- Winder, D. U.S. Coast Guard Issues Alert after Ship Heading into Port of New York Hit by Cyberattack. Available online: https://www.forbes.com/sites/daveywinder/2019/07/09/u-s-coast-guard-issues-alert-after-ship-heading-into-port-of-new-york-hit-by-cyberattack/?sh=61b920e741aa (accessed on 31 January 2022).
- Cooper, H. Chinese Hackers Steal Unclassified Data from Navy Contractor. 2018. Available online: https://www.nytimes.com/2018/06/08/us/politics/china-hack-navy-contractor-.html (accessed on 31 January 2022).
- Maritime-Executive. Cyberattack Hits Multiple Greek Shipping Firms. Available online: https://www.maritime-executive.com/article/cyberattack-hits-multiple-greek-shipping-firms (accessed on 3 February 2022).
- Bebbington, T. Cyberattack or Coincidence? Available online: https://www.seatrade-maritime.com/opinions-analysis/cyberattack-or-coincidence (accessed on 3 February 2022).
- The Guidelines on Cybersecurity Onboard Ships. Available online: https://safety4sea.com/wp-content/uploads/2018/12/BIMCO-Guidelines-on-cyber-security-onboard-ships-2018_12.pdf (accessed on 3 February 2022).
- Nicaise, V. Cybermarétique: A Short History of Cyberattacks against Ports. Available online: https://www.stormshield.com/news/cybermaretique-a-short-history-of-cyberattacks-against-ports/ (accessed on 3 February 2022).
- Team, E. Maersk Line: Surviving from a Cyber Attack. Available online: https://safety4sea.com/cm-maersk-line-surviving-from-a-cyberattack/ (accessed on 3 February 2022).
- Rosehana Amin, R.D.; Jones, D. Part 1: A Very Modern Form of Piracy: Cybercrime against the Shipping Industry—Rapidly Developing Risks. Available online: https://www.clydeco.com/en/insights/2021/03/a-very-modern-form-of-piracy-cybercrime-against-th (accessed on 3 February 2022).
- Elliott, L. Port of Houston Target of Suspected Nation-State Hack. Available online: https://www.nbcnews.com/tech/security/port-houston-target-suspected-nation-state-hack-rcna2249 (accessed on 3 February 2022).
- Silverajan, B.; Ocak, M.; Nagel, B. Cybersecurity attacks and defences for unmanned smart ships. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 30 July–3 August 2018; pp. 15–20. [Google Scholar]
- Bothur, D.; Zheng, G.; Valli, C. A critical analysis of security vulnerabilities and countermeasures in a smart ship system. In Proceedings of the 15th Australian Information Security Management Conference, Perth, Australia, 5–6 December 2017. [Google Scholar]
- Zhou, X.; Liu, Z.; Wu, Z.; Wang, F. Quantitative processing of situation awareness for autonomous ships navigation. Int. J. Mar. Navig. Saf. Sea Transp. 2019, 13, 25–31. [Google Scholar] [CrossRef] [Green Version]
- Reddy, G.N.; Reddy, G. A study of cybersecurity challenges and its emerging trends on latest technologies. arXiv 2014, arXiv:1402.1842. [Google Scholar]
- Petković, M.; Vujović, I. Blockchain security of autonomous maritime transport. J. Appl. Eng. Sci. 2019, 17, 333–337. [Google Scholar] [CrossRef]
- Bechtsis, D.; Tsolakis, N.; Bizakis, A.; Vlachos, D. A blockchain framework for containerized food supply chains. In Computer Aided Chemical Engineering; Elsevier: Amsterdam, The Netherlands, 2019; Volume 46, pp. 1369–1374. [Google Scholar]
- Ahmad, R.W.; Hasan, H.; Jayaraman, R.; Salah, K.; Omar, M. Blockchain applications and architectures for port operations and logistics management. Res. Transp. Bus. Manag. 2021, 41, 100620. [Google Scholar] [CrossRef]
- Wullems, C.; Pozzobon, O.; Kubik, K. Signal authentication and integrity schemes for next generation global navigation satellite systems. Eur. J. Navig. 2005, 3, 4. [Google Scholar]
- Caparra, G.; Sturaro, S.; Laurenti, N.; Wullems, C.; Ioannides, R.T. A novel navigation message authentication scheme for GNSS open service. In Proceedings of the 29th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS+ 2016), Portland, OR, USA, 12–16 September 2016; pp. 2938–2947. [Google Scholar]
- Brčić, D.; Kos, S.; Žuškin, S. Navigation with ECDIS: Choosing the proper secondary positioning source. Int. J. Mar. Navig. Saf. Sea Transp. 2015, 9, 317–329. [Google Scholar]
- Bour, G.; Bernsmed, K.; Borgaonkar, R.; Meland, P.H. On the certificate revocation problem in the maritime sector. In Proceedings of the Nordic Conference on Secure IT Systems, Aalborg, Denmark, 29–30 November 2020; Springer: Berlin/Heidelberg, Germany, 2020; pp. 142–157. [Google Scholar]
- Rødseth, Ø.J.; Frøystad, C.; Meland, P.H.; Bernsmed, K.; Nesheim, D.A. The need for a public key infrastructure for automated and autonomous ships. In Proceedings of the IOP Conference Series: Materials Science and Engineering, Ulaanbaatar, Mongolia, 10–13 September 2020; Volume 929, p. 012017. [Google Scholar]
- Seo, S.H.; Lee, B.H.; Im, S.H.; Jee, G.I.; Kim, K.S. Efficient spoofing identification using baseline vector information of multiple receivers. GPS Solut. 2018, 22, 1–14. [Google Scholar] [CrossRef]
- Mraković, I.; Vojinović, R. Maritime cybersecurity analysis—How to reduce threats? Trans. Marit. Sci. 2019, 8, 132–139. [Google Scholar] [CrossRef] [Green Version]
- Tam, K.; Jones, K.D. Maritime cybersecurity policy: The scope and impact of evolving technology on international shipping. J. Cyber Policy 2018, 3, 147–164. [Google Scholar] [CrossRef]
- Jones, K.D.; Tam, K.; Papadaki, M. Threats and Impacts in Maritime Cybersecurity. Master’s Thesis, University of Plymouth, Plymouth, UK, 2016. [Google Scholar]
Systems | USE |
---|---|
Automatic Identification System (AIS) | - Vessel traffic monitoring and assistance |
- Avoid a collision | |
- Notify ports and maritime authorities of the ship’s location | |
- Calculate the distance between the ship and the other ships | |
- Ensure sea safety by monitoring traffic | |
- Accident investigation and search and rescue operations | |
Electronic Chart Display Information System (ECDIS) | - Collect and combine data from electronic navigation sensors |
- Shows the position of the ship in real time | |
GPS and GNSS | - Displays the position of the ship |
- Displays the speed | |
- Displays the route and time | |
Radar | - Provides information about the ship’s surroundings |
- Detection of the position and speed of objects | |
Global Maritime Distress System (GMDSS) | - Broadcast the distress messages related to safety issues |
- Sending and receiving critical safety alerts | |
Global Industrial Control Systems (ICSs) | - Assist in reducing human errors |
- Increase resource productivity | |
- Extend the life of the equipment | |
- Control and monitor parameters on board a ship | |
Very Small Aperture Terminal (VSAT) | - Uses a satellite network to send and receive data |
- Offer a variety of communication and security services | |
Propulsion and machinery management and power control systems | - Monitor and regulate onboard machinery |
- Monitor and regulate propulsion | |
- Monitor and regulate steering | |
Video Surveillance System | - Monitor transport operations in large storage areas |
- Monitor transport operations in large vessels | |
IT Network Systems | - Used for internal/external processes to send, receive, and store data |
- Used for crew welfare | |
- Used for crew personal devices (BYOD) |
Systems | Vulnerabilities | Consequences |
---|---|---|
Automatic Identification System (AIS) | - Signal interference | - Ship hijacking |
- False information sharing | - Destruction of data | |
- Malware | - Theft of valuable data | |
- Spoofing | ||
- No encryption | ||
- Signal jamming | ||
Electronic Chart Display Information System (ECDIS) | - Obsolete OSs | - Loss of communication with the NS |
- Insecure update mediums | - Hijacking of a ship | |
- Sensitive data theft | ||
- Compromising computers and OSs | ||
GNSS and GPS | - Jamming attacks | - Ship hijacking |
- Weak signal strength | - Problems with the NS | |
- Interference | - GPS signal false information | |
- Spoofing attacks | - Disrupt vessel operation | |
- DoS/DDoS attacks | - Delays in services | |
- Packet modification | ||
Radar | - Jamming attacks | - Loss of communication with the NS |
- Spoofing attacks | - Loss of lives and cargo | |
- DoS/DDoS attacks | - Delays in cargo management | |
Global Maritime Distress System (GMDSS) | - Malware | - Wrong position of the ship |
- Spoofing attacks | - Further attacks on ECDIS | |
- DoS/DDoS attacks | ||
Industrial Control Systems (ICSs) | - Inadequate ACM | - Ship hijacking |
- No support for integrity check | - Unavailability of the ICS | |
- Information exposure | - Data leakage | |
- Poor patch management | - Physical damage to facilities | |
- Hardware failures | - Interference with safety systems | |
- Improper security configuration | - Unplanned shutdowns | |
- Lack of network segmentation | - Damage to equipment | |
- Weak password policies | ||
- Lack of firewalls | ||
- Lack of encryption | ||
- Weak remote access policies | ||
- Weak USB policy | ||
- Lack of training for SOS | ||
Propulsion and machinery management and power control systems | - Malware attack | - Ship hijacking |
- DoS/DDoS attacks | - Diversion of the ship | |
- Smuggling | - PS could be interrupted | |
- Stealing | - Ship damage | |
- Manipulation attacks | - Financial damage | |
- Disclosure of sensitive data | ||
Very Small Aperture Terminal (VSAT) | - Fake signals | - Theft of sensitive data |
- Malware attack | - Upload of malware | |
- Stealing | - Change of GPS coordinates | |
IT network systems | - Poor access control | - Upload malware |
- DoS/DDoS attacks | - Unauthorised physical access | |
- Weak password policies | - Unauthorised logical access | |
- Malware attacks | - Loss of confidential documents | |
- Poor patch management | - Financial damage | |
- Improper security configuration | - Theft of sensitive data | |
- Poor security documentation | - Reputation damage | |
- Lack of network segmentation | ||
- Lack of firewalls | ||
- Lack of encryption | ||
- Weak remote access policies | ||
- Weak USB policy | ||
- Lack of training for SOS |
Year | Incident | Consequences |
---|---|---|
2016 | GPS jamming attack in South Korea [54] | 280 vessels were affected |
2017 | Cyberattack against the navigation system [54] | Hijack of the vessel for 10 h |
2017 | Cyberattack against the navigation system [53] | U.S. Navy ship collided with a boat |
2018 | GPS spoofing attack against ships in the Black Sea [51] | Deviation of 20 ships to an airport |
2018 | Remotely compromising onboard computers [57] | Stealing sensitive data |
2018 | GPS spoofing attack [33] | Manipulation of the ship position |
2018 | NotPetya malware attack [62] | Affected shipping infrastructures |
2018 | ECDIS was infected by a virus [60] | Delay in the ship sailing |
2019 | Malware attack targeted a U.S. vessel [56] | Critical credential mining |
2020 | Ransomware Hermes 2.1. attack on 2 ships [33] | Infection of the whole network |
2020 | Ransomware attack “Mespinoza/Pysa” [33,61] | Maritime infrastructures infected |
2021 | Ransomware attack on shipping companies [58] | All their files were encrypted |
2022 | Installation of malicious code [57] | Gain access to the port network |
Systems | Mitigation Actions |
---|---|
Automatic Identification System (AIS) | - All AIS information should be verified |
- Encryption of the VHF signals | |
- Integrity of broadcast information should be monitored to ensure that position and identity are correct. | |
- Equipment that broadcasts AIS signals should be secured, and unauthorised access should not be possible | |
- Local navigation warnings should be considered if false AIS signals are being broadcast | |
Electronic Chart Display Information System (ECDIS) | - ECDIS developers should look to adopt security development lifecycles |
- Regular documentation, monitoring, and patching of the ECDIS framework | |
- ECDIS chart update should be monitored and registered, especially manual updates via CD or USB disc | |
- All upgrade files should be scanned with antivirus software | |
- The internal network to which ECDIS is linked should be examined to see whether the ECDIS system can be fully isolated or firewalled | |
- Only approved staff should have physical access to ECDIS and its underlying components | |
GNSS and GPS | - Device identification and authentication |
- Cryptographic protection | |
- Protection of information at rest | |
Radar | - Device identification and authentication |
- Cryptographic protection | |
- Information system backup | |
Global Maritime Distress System (GMDSS) | - Cryptographic protection. |
- Device identification and authentication | |
- Protection of information at rest | |
- Physical access control | |
- Contingency plan | |
Industrial Control Systems (ICSs) | - Use cryptography or other protected methods to shield passwords from unauthorised interception |
- To keep control systems safe, implement configuration management and patch management controls | |
- As far as possible, communications between security zones should be guarded | |
- Ensure that all Internet-connected ICS devices are protected and that passwords are updated regularly | |
- ICS network administrators should use network segmentation and firewall rules that block access to file-sharing ports | |
- Protect password files adequately by making hashed passwords more difficult to obtain | |
- System administrators should enforce strong passwords | |
- Use concrete remote access policy | |
- Audit remote access and related changes | |
- Block unnecessary USB ports | |
- Ensure cybersecurity awareness training has been conducted for all users | |
Propulsion and machinery management and power control systems | - Information system backup |
- Denial of service protection | |
- Monitoring physical access | |
Very Small Aperture Terminal (VSAT) | - Encrypted communication systems should be considered |
- The service provider’s cyber defence mechanisms should be carefully considered, but they should not be relied on solely to protect every shipboard device and data | |
- Authentication and access control management should be strictly complied with | |
- Protection of information at rest | |
IT network systems | - Information system backup |
- Authentication and access control | |
- Segmentation of crew vs. business functions | |
- Ensure threat protection mechanisms | |
- Promote configuration/patch/update management system | |
- Ensure BYOD policy is in place | |
- Ensure cybersecurity awareness training has been conducted for all users | |
Human factor | - Promote a cybersecurity culture within the organisation |
- Create relationships with the members of the operation chain | |
- Ensure cyber awareness training has been conducted | |
- Evaluate training effectiveness with cybersecurity drills | |
- Promote cyber hygiene within the operation parties |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Akpan, F.; Bendiab, G.; Shiaeles, S.; Karamperidis, S.; Michaloliakos, M. Cybersecurity Challenges in the Maritime Sector. Network 2022, 2, 123-138. https://doi.org/10.3390/network2010009
Akpan F, Bendiab G, Shiaeles S, Karamperidis S, Michaloliakos M. Cybersecurity Challenges in the Maritime Sector. Network. 2022; 2(1):123-138. https://doi.org/10.3390/network2010009
Chicago/Turabian StyleAkpan, Frank, Gueltoum Bendiab, Stavros Shiaeles, Stavros Karamperidis, and Michalis Michaloliakos. 2022. "Cybersecurity Challenges in the Maritime Sector" Network 2, no. 1: 123-138. https://doi.org/10.3390/network2010009
APA StyleAkpan, F., Bendiab, G., Shiaeles, S., Karamperidis, S., & Michaloliakos, M. (2022). Cybersecurity Challenges in the Maritime Sector. Network, 2(1), 123-138. https://doi.org/10.3390/network2010009