Conceptual problems of transportation security of intelligent water transportation systems

Author:

Mikhalevich I. F.1

Affiliation:

1. Russian University of Transport (MIIT)

Abstract

Aim. Autonomous and remote-controlled surface sea vessel (ASSV) and unmanned inland water vessels (UIWV) are entering the waterways. The infrastructure of waterways is becoming intelligent. The intellectual level of sea and river ports, port terminals, and harbours is improving. Large-scale deployment of information technologies, automated control, automatic control, and artificial intelligence has significantly expanded the landscape of transportation security threats to water intelligent transportation systems (ITS) and now includes non-physical threats. The evolving threat landscape requires timely response in order to avoid gaps between the current state of intellectual technology application and the set of measures to ensure the transportation security of water ITS. Problems. Spoofing or modifying sensors readings in ASSV (UIWV) or signals received by their executive units can cause vessels to lose direction and collide with each other or with infrastructure facilities, run aground, or even being hijacked along with the passengers, cargo, and attendants. Unauthorized access to information in automated control systems of port terminals can be used to maliciously encrypt information. That may block cargo handling operations in a port, disrupt ship traffic schedules and logistics operations up to the national level. National-level consequences can be classified as a disruption of the national information infrastructure security associated with the transportation insecurity in ITS. The various existing ITS have the common problem associated with the digital inequality of the automated systems employed by industrial enterprises and corporate governance in terms of the security of the above technologies. Methods. Ensuring the transportation security of water ITS requires the application of all available methods, means, and measures of protection. The legal framework of transportation security is to take into account the full range of relevant methods of illegal interference into the operation of water ITS and require planning and implementing a corresponding set of protective measures. The article uses methods of systems analysis and comprehensive security of complex systems. Results. The author analysed the new types of threats to the transportation security of water transportation systems and the corresponding regulatory framework. It was identified that the latter do not take into account the new types of threats to the transportation security of water transportation systems. Consequently, those are not covered by the transportation security planning. The paper examines the architecture of water ITS in the form of an integrated automated system of corporate and process management, whose application aims to dynamically coordinate water ITS models with those of current information-related threats to the transportation security. Conclusion. Ensuring the transportation security of water ITS requires taking into account the new types of threats associated with undocumented capabilities and vulnerabilities of information technologies, automated control, automatic control, and artificial intelligence technologies. The examined problems are of a systemic nature, since illegal interference in the operation of water ITS can negatively affect other systems of critical information infrastructure. That should be taken into account when developing regulations related to ensuring the transportation security of water and other modes of transportation.

Publisher

Journal Dependability

Reference26 articles.

1. Threat Landscape of Transport Sector. ENISA; 2023. (accessed 15.09.2023). Available at: https://www.enisa.europa.eu/publications/enisa-transport-threat-landscape.

2. [Threat landscape for industrial automation systems. First half of 2023]. (accessed 15.09.2023). Available at: https://ics-cert.kaspersky.ru/publications/reports/2023/09/13/ threat-landscape-for-industrial-automation-systems-statistics-for-h1-2023. (in Russ.).

3. Mikhalevich I.F. [Digital transformation of control systems in the context of the COVID-19 pandemic]. REDS: Telecommunication devices and systems 2021;11(4):25-31. (in Russ).

4. Mikhalevich I.F. [Digital hygiene of the information society: the impact of the COVID-19 pandemic]. REDS: Telecommunication devices and systems 2022;3:10-17. (in Russ).

5. University of Texas team takes control of a yacht by spoofing its GPS. (accessed 15.09.2023). Available at: https://newatlas.com/gps-spoofing-yacht-control/28644.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3