dc.contributor.author | Kavallieratos, Georgios | |
dc.contributor.author | Katsikas, Sokratis | |
dc.contributor.author | Gkioulos, Vasileios | |
dc.date.accessioned | 2019-10-28T13:35:32Z | |
dc.date.available | 2019-10-28T13:35:32Z | |
dc.date.created | 2019-08-24T10:23:08Z | |
dc.date.issued | 2019 | |
dc.identifier.isbn | 978-3-030-12786-2 | |
dc.identifier.uri | http://hdl.handle.net/11250/2624943 | |
dc.description.abstract | Autonomous ships transferring valuable cargoes and humans in a more efficient and cost effective manner will soon be state of the art technology. Yet, their ICT system architecture and operations have not been defined in full detail. Moreover, multiple cyber security issues remain open and should be addressed. No study to date has analyzed fully the architecture of the autonomous ship, even less so have potential cyber threats and cyber attacks been identified. In this paper we identify and categorize systems that make up an autonomous ship, we propose a generic system architecture, and we analyze the cyber security of the ship by leveraging the STRIDE threat modeling methodology to identify potential cyber attacks, and to analyze the accordant risk. The results will support ship designers and industry towards improving the autonomous ship system architecture and making ship operations more secure. | nb_NO |
dc.language.iso | eng | nb_NO |
dc.publisher | Springer Verlag | nb_NO |
dc.relation.ispartof | Computer Security ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers | |
dc.title | Cyber-Attacks Against the Autonomous Ship | nb_NO |
dc.type | Chapter | nb_NO |
dc.description.version | acceptedVersion | nb_NO |
dc.source.pagenumber | 20-36 | nb_NO |
dc.identifier.doi | 10.1007/978-3-030-12786-2_2 | |
dc.identifier.cristin | 1718424 | |
dc.description.localcode | This is a post-peer-review, pre-copyedit version of an article published in [International Workshop on Security and Privacy Requirements Engineering] Locked until 31.1.2020 due to copyright restrictions. The final authenticated version is available online at: https://doi.org/10.1007/978-3-030-12786-2_2 | nb_NO |
cristin.unitcode | 194,63,30,0 | |
cristin.unitname | Institutt for informasjonssikkerhet og kommunikasjonsteknologi | |
cristin.ispublished | true | |
cristin.fulltext | postprint | |
cristin.qualitycode | 1 | |