IDEAS home Printed from https://ideas.repec.org/a/spr/jtrsec/v13y2020i3d10.1007_s12198-020-00222-2.html
   My bibliography  Save this article

Paperless ship navigation: cyber security weaknesses

Author

Listed:
  • Boris Svilicic

    (University of Rijeka)

  • Miho Kristić

    (University of Dubrovnik)

  • Srđan Žuškin

    (University of Rijeka)

  • David Brčić

    (University of Rijeka)

Abstract

Maritime transportation is backbone of globalized trade and the manufacturing supply chain as nowadays more than four fifths of world merchandise trade by volume is carried by ships. Safe navigation of ships of today depends heavily on cyber-physical systems, of which the central is the Electronic Chart Display and Information System (ECDIS). The paperless ship navigation is allowed when the type approved ECDIS with official electronic navigation charts acts as an independent backup for the primary system. In this paper, we present an analysis of cyber security weaknesses of the paperless ship navigation that relies on two internetworked ECDIS workstations in the backup arrangement. The method of analysis is based on cyber security testing of the ECDIS workstations with an industry vulnerability scanner tool. The detected vulnerabilities are analysed in the context of ECDIS backup arrangement and safeguards implemented on board the paperless ship. The obtained results suggest that the critical cyber threat vectors result from uncontrolled internetworking of unmaintained ECDIS workstations with identical hardware and software configurations.

Suggested Citation

  • Boris Svilicic & Miho Kristić & Srđan Žuškin & David Brčić, 2020. "Paperless ship navigation: cyber security weaknesses," Journal of Transportation Security, Springer, vol. 13(3), pages 203-214, December.
  • Handle: RePEc:spr:jtrsec:v:13:y:2020:i:3:d:10.1007_s12198-020-00222-2
    DOI: 10.1007/s12198-020-00222-2
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s12198-020-00222-2
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s12198-020-00222-2?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Lauren R. Shapiro & Marie-Helen Maras & Lucia Velotti & Susan Pickman & Hung-Lung Wei & Robert Till, 2018. "Trojan horse risks in the maritime transportation systems sector," Journal of Transportation Security, Springer, vol. 11(3), pages 65-83, December.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Cheung, Kam-Fung & Bell, Michael G.H. & Bhattacharjya, Jyotirmoyee, 2021. "Cybersecurity in logistics and supply chain management: An overview and future research directions," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 146(C).
    2. Bolbot, Victor & Kulkarni, Ketki & Brunou, Päivi & Banda, Osiris Valdez & Musharraf, Mashrura, 2022. "Developments and research directions in maritime cybersecurity: A systematic literature review and bibliometric analysis," International Journal of Critical Infrastructure Protection, Elsevier, vol. 39(C).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Bolbot, Victor & Kulkarni, Ketki & Brunou, Päivi & Banda, Osiris Valdez & Musharraf, Mashrura, 2022. "Developments and research directions in maritime cybersecurity: A systematic literature review and bibliometric analysis," International Journal of Critical Infrastructure Protection, Elsevier, vol. 39(C).

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:jtrsec:v:13:y:2020:i:3:d:10.1007_s12198-020-00222-2. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.