{"title":"Information security in the LRIT system","authors":"R. Niski, Marcin Waraksa, J. Zurek","doi":"10.1109/INFTECH.2008.4621700","DOIUrl":null,"url":null,"abstract":"LRIT (long range identification and tracking of ships) system is close to its implementation and the LRIT information (identification and position of the vessels) is very sensitive. In this paper the structure of system data bases and communication links in the LRIT system are presented. In this context, a security of the LRIT information will be analyzed, moreover cryptographic mechanisms in the LRIT links on-land will be described. Network security issues and mechanisms ldquoas isrdquo will not be described here - they are widely described in available literature. As for now there is no any recommendation in the LRIT standard documentation concerning information protection in the LRIT radio links. In the paper a proposal of cryptographic system for the LRIT radio links will be presented.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 1st International Conference on Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFTECH.2008.4621700","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
LRIT (long range identification and tracking of ships) system is close to its implementation and the LRIT information (identification and position of the vessels) is very sensitive. In this paper the structure of system data bases and communication links in the LRIT system are presented. In this context, a security of the LRIT information will be analyzed, moreover cryptographic mechanisms in the LRIT links on-land will be described. Network security issues and mechanisms ldquoas isrdquo will not be described here - they are widely described in available literature. As for now there is no any recommendation in the LRIT standard documentation concerning information protection in the LRIT radio links. In the paper a proposal of cryptographic system for the LRIT radio links will be presented.