Affiliation:
1. Russian University of Transport (MIIT)
Abstract
Aim. Autonomous and remote-controlled surface sea vessel (ASSV) and unmanned inland water vessels (UIWV) are entering the waterways. The infrastructure of waterways is becoming intelligent. The intellectual level of sea and river ports, port terminals, and harbours is improving. Large-scale deployment of information technologies, automated control, automatic control, and artificial intelligence has significantly expanded the landscape of transportation security threats to water intelligent transportation systems (ITS) and now includes non-physical threats. The evolving threat landscape requires timely response in order to avoid gaps between the current state of intellectual technology application and the set of measures to ensure the transportation security of water ITS. Problems. Spoofing or modifying sensors readings in ASSV (UIWV) or signals received by their executive units can cause vessels to lose direction and collide with each other or with infrastructure facilities, run aground, or even being hijacked along with the passengers, cargo, and attendants. Unauthorized access to information in automated control systems of port terminals can be used to maliciously encrypt information. That may block cargo handling operations in a port, disrupt ship traffic schedules and logistics operations up to the national level. National-level consequences can be classified as a disruption of the national information infrastructure security associated with the transportation insecurity in ITS. The various existing ITS have the common problem associated with the digital inequality of the automated systems employed by industrial enterprises and corporate governance in terms of the security of the above technologies. Methods. Ensuring the transportation security of water ITS requires the application of all available methods, means, and measures of protection. The legal framework of transportation security is to take into account the full range of relevant methods of illegal interference into the operation of water ITS and require planning and implementing a corresponding set of protective measures. The article uses methods of systems analysis and comprehensive security of complex systems. Results. The author analysed the new types of threats to the transportation security of water transportation systems and the corresponding regulatory framework. It was identified that the latter do not take into account the new types of threats to the transportation security of water transportation systems. Consequently, those are not covered by the transportation security planning. The paper examines the architecture of water ITS in the form of an integrated automated system of corporate and process management, whose application aims to dynamically coordinate water ITS models with those of current information-related threats to the transportation security. Conclusion. Ensuring the transportation security of water ITS requires taking into account the new types of threats associated with undocumented capabilities and vulnerabilities of information technologies, automated control, automatic control, and artificial intelligence technologies. The examined problems are of a systemic nature, since illegal interference in the operation of water ITS can negatively affect other systems of critical information infrastructure. That should be taken into account when developing regulations related to ensuring the transportation security of water and other modes of transportation.
Reference26 articles.
1. Threat Landscape of Transport Sector. ENISA; 2023. (accessed 15.09.2023). Available at: https://www.enisa.europa.eu/publications/enisa-transport-threat-landscape.
2. [Threat landscape for industrial automation systems. First half of 2023]. (accessed 15.09.2023). Available at: https://ics-cert.kaspersky.ru/publications/reports/2023/09/13/ threat-landscape-for-industrial-automation-systems-statistics-for-h1-2023. (in Russ.).
3. Mikhalevich I.F. [Digital transformation of control systems in the context of the COVID-19 pandemic]. REDS: Telecommunication devices and systems 2021;11(4):25-31. (in Russ).
4. Mikhalevich I.F. [Digital hygiene of the information society: the impact of the COVID-19 pandemic]. REDS: Telecommunication devices and systems 2022;3:10-17. (in Russ).
5. University of Texas team takes control of a yacht by spoofing its GPS. (accessed 15.09.2023). Available at: https://newatlas.com/gps-spoofing-yacht-control/28644.