Show simple item record

dc.contributor.authorKavallieratos, Georgios
dc.contributor.authorKatsikas, Sokratis
dc.contributor.authorGkioulos, Vasileios
dc.date.accessioned2019-10-28T13:35:32Z
dc.date.available2019-10-28T13:35:32Z
dc.date.created2019-08-24T10:23:08Z
dc.date.issued2019
dc.identifier.isbn978-3-030-12786-2
dc.identifier.urihttp://hdl.handle.net/11250/2624943
dc.description.abstractAutonomous ships transferring valuable cargoes and humans in a more efficient and cost effective manner will soon be state of the art technology. Yet, their ICT system architecture and operations have not been defined in full detail. Moreover, multiple cyber security issues remain open and should be addressed. No study to date has analyzed fully the architecture of the autonomous ship, even less so have potential cyber threats and cyber attacks been identified. In this paper we identify and categorize systems that make up an autonomous ship, we propose a generic system architecture, and we analyze the cyber security of the ship by leveraging the STRIDE threat modeling methodology to identify potential cyber attacks, and to analyze the accordant risk. The results will support ship designers and industry towards improving the autonomous ship system architecture and making ship operations more secure.nb_NO
dc.language.isoengnb_NO
dc.publisherSpringer Verlagnb_NO
dc.relation.ispartofComputer Security ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers
dc.titleCyber-Attacks Against the Autonomous Shipnb_NO
dc.typeChapternb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.pagenumber20-36nb_NO
dc.identifier.doi10.1007/978-3-030-12786-2_2
dc.identifier.cristin1718424
dc.description.localcodeThis is a post-peer-review, pre-copyedit version of an article published in [International Workshop on Security and Privacy Requirements Engineering] Locked until 31.1.2020 due to copyright restrictions. The final authenticated version is available online at: https://doi.org/10.1007/978-3-030-12786-2_2nb_NO
cristin.unitcode194,63,30,0
cristin.unitnameInstitutt for informasjonssikkerhet og kommunikasjonsteknologi
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record