{"title":"一种靠泊船舶最优航行安全方案","authors":"Kailash Jamuda, Radhika Lama, Sandip Karmakar","doi":"10.1109/ICECET55527.2022.9872741","DOIUrl":null,"url":null,"abstract":"The immense growth of the marine industry has led to increased maritime commerce in recent years. This has resulted in a rise in maritime activities and challenges in the security of communication between entities involved in a ship’s port navigation. In response to the challenges, the suggested security strategy in this work can provide vital security features such as authentication between communicating entities and important security services while consuming fewer resources. This technique also calculates the ideal distance between the berthing ship and the available parking site using their geographic coordinates to provide optimal navigation for a berthing ship. An external entity known as the trusted third party is in charge of calculating the optimum path, which works as a middleman in the communication process. The suggested technique is resistant to a variety of security attacks, these are Man-in-the-Middle attack, Replay attack, information leakage, and impersonation attack. This scheme also assures unlinkability and anonymity. The Automated Validation of Internet Security Protocols and Applications (AVISPA) software is utilized to formally verify the proposed scheme’s safety.","PeriodicalId":249012,"journal":{"name":"2022 International Conference on Electrical, Computer and Energy Technologies (ICECET)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Secured Scheme for Optimal Navigation of a Berthing Ship\",\"authors\":\"Kailash Jamuda, Radhika Lama, Sandip Karmakar\",\"doi\":\"10.1109/ICECET55527.2022.9872741\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The immense growth of the marine industry has led to increased maritime commerce in recent years. This has resulted in a rise in maritime activities and challenges in the security of communication between entities involved in a ship’s port navigation. In response to the challenges, the suggested security strategy in this work can provide vital security features such as authentication between communicating entities and important security services while consuming fewer resources. This technique also calculates the ideal distance between the berthing ship and the available parking site using their geographic coordinates to provide optimal navigation for a berthing ship. An external entity known as the trusted third party is in charge of calculating the optimum path, which works as a middleman in the communication process. The suggested technique is resistant to a variety of security attacks, these are Man-in-the-Middle attack, Replay attack, information leakage, and impersonation attack. This scheme also assures unlinkability and anonymity. The Automated Validation of Internet Security Protocols and Applications (AVISPA) software is utilized to formally verify the proposed scheme’s safety.\",\"PeriodicalId\":249012,\"journal\":{\"name\":\"2022 International Conference on Electrical, Computer and Energy Technologies (ICECET)\",\"volume\":\"78 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-07-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Electrical, Computer and Energy Technologies (ICECET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECET55527.2022.9872741\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Electrical, Computer and Energy Technologies (ICECET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECET55527.2022.9872741","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Secured Scheme for Optimal Navigation of a Berthing Ship
The immense growth of the marine industry has led to increased maritime commerce in recent years. This has resulted in a rise in maritime activities and challenges in the security of communication between entities involved in a ship’s port navigation. In response to the challenges, the suggested security strategy in this work can provide vital security features such as authentication between communicating entities and important security services while consuming fewer resources. This technique also calculates the ideal distance between the berthing ship and the available parking site using their geographic coordinates to provide optimal navigation for a berthing ship. An external entity known as the trusted third party is in charge of calculating the optimum path, which works as a middleman in the communication process. The suggested technique is resistant to a variety of security attacks, these are Man-in-the-Middle attack, Replay attack, information leakage, and impersonation attack. This scheme also assures unlinkability and anonymity. The Automated Validation of Internet Security Protocols and Applications (AVISPA) software is utilized to formally verify the proposed scheme’s safety.