{"title":"捉迷藏","authors":"W. D. Riley","doi":"10.2307/j.ctt6wrb0f.73","DOIUrl":null,"url":null,"abstract":"Ships use the Automatic Identification System (AIS) to identify and track other ships to avoid collisions and aid vessel traffic services. The system has vulnerabilities that could be exploited, which would have a negative impact on maritime safety. The best way to mitigate AIS vulnerabilities is to use more than one system to identify vessels. Using two systems makes anomalies more apparent that could indicate compromised systems. Secondary systems to use in conjunction with AIS include long-range identification and tracking and the authoritative vessel identification service.","PeriodicalId":221455,"journal":{"name":"Datamation archive","volume":"93 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Hide and seek\",\"authors\":\"W. D. Riley\",\"doi\":\"10.2307/j.ctt6wrb0f.73\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Ships use the Automatic Identification System (AIS) to identify and track other ships to avoid collisions and aid vessel traffic services. The system has vulnerabilities that could be exploited, which would have a negative impact on maritime safety. The best way to mitigate AIS vulnerabilities is to use more than one system to identify vessels. Using two systems makes anomalies more apparent that could indicate compromised systems. Secondary systems to use in conjunction with AIS include long-range identification and tracking and the authoritative vessel identification service.\",\"PeriodicalId\":221455,\"journal\":{\"name\":\"Datamation archive\",\"volume\":\"93 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Datamation archive\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2307/j.ctt6wrb0f.73\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Datamation archive","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2307/j.ctt6wrb0f.73","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Ships use the Automatic Identification System (AIS) to identify and track other ships to avoid collisions and aid vessel traffic services. The system has vulnerabilities that could be exploited, which would have a negative impact on maritime safety. The best way to mitigate AIS vulnerabilities is to use more than one system to identify vessels. Using two systems makes anomalies more apparent that could indicate compromised systems. Secondary systems to use in conjunction with AIS include long-range identification and tracking and the authoritative vessel identification service.