{"title":"Hide and seek","authors":"W. D. Riley","doi":"10.2307/j.ctt6wrb0f.73","DOIUrl":null,"url":null,"abstract":"Ships use the Automatic Identification System (AIS) to identify and track other ships to avoid collisions and aid vessel traffic services. The system has vulnerabilities that could be exploited, which would have a negative impact on maritime safety. The best way to mitigate AIS vulnerabilities is to use more than one system to identify vessels. Using two systems makes anomalies more apparent that could indicate compromised systems. Secondary systems to use in conjunction with AIS include long-range identification and tracking and the authoritative vessel identification service.","PeriodicalId":221455,"journal":{"name":"Datamation archive","volume":"93 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Datamation archive","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2307/j.ctt6wrb0f.73","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Ships use the Automatic Identification System (AIS) to identify and track other ships to avoid collisions and aid vessel traffic services. The system has vulnerabilities that could be exploited, which would have a negative impact on maritime safety. The best way to mitigate AIS vulnerabilities is to use more than one system to identify vessels. Using two systems makes anomalies more apparent that could indicate compromised systems. Secondary systems to use in conjunction with AIS include long-range identification and tracking and the authoritative vessel identification service.