Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2024 May 27;24(11):3458.
doi: 10.3390/s24113458.

Enhancing Maritime Cybersecurity through Operational Technology Sensor Data Fusion: A Comprehensive Survey and Analysis

Affiliations

Enhancing Maritime Cybersecurity through Operational Technology Sensor Data Fusion: A Comprehensive Survey and Analysis

Georgios Potamos et al. Sensors (Basel). .

Abstract

Cybersecurity is becoming an increasingly important aspect in ensuring maritime data protection and operational continuity. Ships, ports, surveillance and navigation systems, industrial technology, cargo, and logistics systems all contribute to a complex maritime environment with a significant cyberattack surface. To that aim, a wide range of cyberattacks in the maritime domain are possible, with the potential to infect vulnerable information and communication systems, compromising safety and security. The use of navigation and surveillance systems, which are considered as part of the maritime OT sensors, can improve maritime cyber situational awareness. This survey critically investigates whether the fusion of OT data, which are used to provide maritime situational awareness, may also improve the ability to detect cyberincidents in real time or near-real time. It includes a thorough analysis of the relevant literature, emphasizing RF but also other sensors, and data fusion approaches that can help improve maritime cybersecurity.

Keywords: maritime OT data fusion; maritime cybersecurity; maritime cyberthreat detection.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest.

Figures

Figure 1
Figure 1
Three-step methodological approach.
Figure 2
Figure 2
Maritime data fusion across the NIST CFW.
Figure 3
Figure 3
Maritime components in cyberspace.
Figure 4
Figure 4
Vulnerable systems in the maritime domain.
Figure 5
Figure 5
Mapping of radar/AIS data fusion purposes.
Figure 6
Figure 6
Sensors used for radar/AIS data fusion.
Figure 7
Figure 7
Mapping radar/AIS data fusion operations.
Figure 8
Figure 8
Elements of the Maritime Cyber Situational Awareness.

References

    1. MSC-FAL.1-Circ.3—Guidelines on Maritime Cyber Risk Management (Secretariat).pdf. [(accessed on 23 October 2021)]. Available online: https://wwwcdn.imo.org/localresources/en/OurWork/Security/Documents/MSC-....
    1. The Guidelines on Cyber Security Onboard Ships. [(accessed on 23 October 2021)]. Available online: https://www.bimco.org/about-us-and-our-members/publications/the-guidelin....
    1. Höyhtyä M., Huusko J., Kiviranta M., Solberg K., Rokka J. Connectivity for autonomous ships: Architecture, use cases, and research challenges; Proceedings of the 2017 International Conference on Information and Communication Technology Convergence (ICTC); Jeju Island, Republic of Korea. 18–20 October 2017; pp. 345–350. - DOI
    1. Silverajan B., Ocak M., Nagel B. Cybersecurity Attacks and Defences for Unmanned Smart Ships; Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData); Halifax, NS, Canada. 30 July–3 August 2018; pp. 15–20. - DOI
    1. Caprolu M., Pietro R.D., Raponi S., Sciancalepore S., Tedeschi P. Vessels Cybersecurity: Issues, Challenges, and the Road Ahead. IEEE Commun. Mag. 2020;58:90–96. doi: 10.1109/MCOM.001.1900632. - DOI

LinkOut - more resources