Skip to main content
Top

2012 | OriginalPaper | Chapter

Security Enhancement of User Authentication Scheme Using IVEF in Vessel Traffic Service System

Authors : Namje Park, Seunghyun Cho, Byung-Doo Kim, Byunggil Lee, Dongho Won

Published in: Computer Science and its Applications

Publisher: Springer Netherlands

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Vessel Traffic System (VTS) is an important marine traffic monitoring system which is designed to improve the safety and efficiency of navigation and the protection of the marine environment. And the demand of Inter-VTS networking has been increased for realization of e-Navigation as shore side collaboration for maritime safety. And IVEF (Inter-VTS Data Exchange Format) for Inter-VTS network has become a hot research topic of VTS system. Currently, the IVEF developed by the International Association of Lighthouse Authorities (IALA) does not include any highly trusted certification technology for the connectors. However, the vessel traffic information requires high security since it is highly protected by the countries. Therefore, this study suggests the certification system to increase the security of the VTS systems using the main certification server and IVEF.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Arifin B., Ross E., Brodsky Y.: Data security in a ship detection and Identification system. IEEE RAST2011, pp. 634–636 (2011) Arifin B., Ross E., Brodsky Y.: Data security in a ship detection and Identification system. IEEE RAST2011, pp. 634–636 (2011)
2.
go back to reference IVEF Recommendation V-145 on the Inter-VTS Exchange Format (IVEF) Service (2011) IVEF Recommendation V-145 on the Inter-VTS Exchange Format (IVEF) Service (2011)
4.
go back to reference Carter, B., Green, S., Leeman, R., Chaulk, N.: SmartBay: better information—better decisions. IEEE Oceans 2008, 1–7 (2008) Carter, B., Green, S., Leeman, R., Chaulk, N.: SmartBay: better information—better decisions. IEEE Oceans 2008, 1–7 (2008)
5.
go back to reference Frejlichowski D., Lisaj A.: Analysis of lossless radar images compression for navigation in marine traffic and remote transmission. IEEE Radar Conference, pp. 1–4 (2008) Frejlichowski D., Lisaj A.: Analysis of lossless radar images compression for navigation in marine traffic and remote transmission. IEEE Radar Conference, pp. 1–4 (2008)
6.
go back to reference Garnier B., Andritsos F.: A port waterside security systemic analysis. IEEE WSS Conference 2010, pp. 1–6 (2010) Garnier B., Andritsos F.: A port waterside security systemic analysis. IEEE WSS Conference 2010, pp. 1–6 (2010)
7.
go back to reference Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI mobile platform with secure service for mobile RFID network environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006) Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI mobile platform with secure service for mobile RFID network environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)
8.
go back to reference Park, N.: Security scheme for managing a large quantity of individual information in RFID environment. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds.) ICICA 2010. CCIS, vol. 106, pp. 72–79. Springer, Heidelberg (2010) Park, N.: Security scheme for managing a large quantity of individual information in RFID environment. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds.) ICICA 2010. CCIS, vol. 106, pp. 72–79. Springer, Heidelberg (2010)
9.
go back to reference Park, N.: Secure UHF/HF dual-band RFID: strategic framework approaches and application solutions. In: ICCCI 2011. LNCS, Springer, Heidelberg (2011) Park, N.: Secure UHF/HF dual-band RFID: strategic framework approaches and application solutions. In: ICCCI 2011. LNCS, Springer, Heidelberg (2011)
10.
go back to reference Park, N.: Implementation of terminal middleware platform for mobile RFID computing. Int. J. Ad Hoc Ubiquitous Comput. 8(4), 205–219 (2011)CrossRef Park, N.: Implementation of terminal middleware platform for mobile RFID computing. Int. J. Ad Hoc Ubiquitous Comput. 8(4), 205–219 (2011)CrossRef
11.
go back to reference Park, N., Kim, Y.: Harmful adult multimedia contents filtering method in mobile RFID service environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010. LNCS(LNAI), vol. 6422, pp. 193–202. Springer, Heidelberg (2010) Park, N., Kim, Y.: Harmful adult multimedia contents filtering method in mobile RFID service environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010. LNCS(LNAI), vol. 6422, pp. 193–202. Springer, Heidelberg (2010)
12.
go back to reference Park, N., Song, Y.: AONT encryption based application data management in mobile RFID environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010. LNCS(LNAI), vol. 6422, pp. 142–152. Springer, Heidelberg (2010) Park, N., Song, Y.: AONT encryption based application data management in mobile RFID environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010. LNCS(LNAI), vol. 6422, pp. 142–152. Springer, Heidelberg (2010)
13.
go back to reference Park, N.: Customized healthcare infrastructure using privacy weight level based on smart device. In: Communications in Computer and Information Science, vol. 206, pp. 467–474. Springer (2011) Park, N.: Customized healthcare infrastructure using privacy weight level based on smart device. In: Communications in Computer and Information Science, vol. 206, pp. 467–474. Springer (2011)
14.
go back to reference Park, N.: Secure data access control scheme using type-based re-encryption in cloud environment. In: Studies in Computational Intelligence, vol. 381, pp. 319–327. Springer (2011) Park, N.: Secure data access control scheme using type-based re-encryption in cloud environment. In: Studies in Computational Intelligence, vol. 381, pp. 319–327. Springer (2011)
15.
go back to reference Park, N., Song, Y.: Secure RFID application data management using all-or-nothing transform encryption. In: Pandurangan, G., Anil Kumar, V.S., Ming, G., Liu, Y., Li, Y. (eds.) WASA 2010. LNCS, vol. 6221, pp. 245–252. Springer, Heidelberg (2010) Park, N., Song, Y.: Secure RFID application data management using all-or-nothing transform encryption. In: Pandurangan, G., Anil Kumar, V.S., Ming, G., Liu, Y., Li, Y. (eds.) WASA 2010. LNCS, vol. 6221, pp. 245–252. Springer, Heidelberg (2010)
16.
go back to reference Park, N.: The implementation of open embedded S/W platform for secure mobile RFID reader. J. Korea Inf. Commun. Soc. 35(5), 785–793 (2010) Park, N.: The implementation of open embedded S/W platform for secure mobile RFID reader. J. Korea Inf. Commun. Soc. 35(5), 785–793 (2010)
17.
go back to reference Park, N., Song, Y., Won, D., Kim, H.: Multilateral approaches to the mobile RFID security problem using web service. In: Zhang, Y., Yu, G., Bertino, E., Xu, G. (eds.) APWeb 2008. LNCS, vol. 4976, pp. 331–341. Springer, Heidelberg (2008) Park, N., Song, Y., Won, D., Kim, H.: Multilateral approaches to the mobile RFID security problem using web service. In: Zhang, Y., Yu, G., Bertino, E., Xu, G. (eds.) APWeb 2008. LNCS, vol. 4976, pp. 331–341. Springer, Heidelberg (2008)
18.
go back to reference Park, N., Kim, H., Kim, S., Won, D.: Open location-based service using secure middleware infrastructure in web services. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 1146–1155. Springer, Heidelberg (2005) Park, N., Kim, H., Kim, S., Won, D.: Open location-based service using secure middleware infrastructure in web services. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 1146–1155. Springer, Heidelberg (2005)
19.
go back to reference Park, N., Kim, S., Won, D.: Privacy preserving enhanced service mechanism in mobile RFID network. In: ASC, Advances in Soft Computing, vol. 43, pp. 151–156. Springer, Heidelberg (2007) Park, N., Kim, S., Won, D.: Privacy preserving enhanced service mechanism in mobile RFID network. In: ASC, Advances in Soft Computing, vol. 43, pp. 151–156. Springer, Heidelberg (2007)
20.
go back to reference Park, N., Kim, S., Won, D., Kim, H.: Security analysis and implementation leveraging globally networked mobile RFIDs. In: PWC 2006. LNCS, vol. 4217, pp. 494–505. Springer, Heidelberg (2006) Park, N., Kim, S., Won, D., Kim, H.: Security analysis and implementation leveraging globally networked mobile RFIDs. In: PWC 2006. LNCS, vol. 4217, pp. 494–505. Springer, Heidelberg (2006)
21.
go back to reference Kim, Y.: Harmful-word dictionary DB based text classification for improving performances of precesion and recall. Sungkyunkwan University, Ph.D. Thesis (2009) Kim, Y.: Harmful-word dictionary DB based text classification for improving performances of precesion and recall. Sungkyunkwan University, Ph.D. Thesis (2009)
22.
go back to reference Kim, Y, Park, N., Hong, D.: Enterprise data loss prevention system having a function of coping with civil suits. In: Studies in Computational Intelligence, vol. 365, pp. 201–208. Springer (2011) Kim, Y, Park, N., Hong, D.: Enterprise data loss prevention system having a function of coping with civil suits. In: Studies in Computational Intelligence, vol. 365, pp. 201–208. Springer (2011)
23.
go back to reference Kim, Y., Park, N., Won, D.: Privacy-enhanced adult certification method for multimedia contents on mobile RFID environments. In: Proceedings of IEEE International Symposium on Consumer Electronics, pp. 1–4. IEEE, Los Alamitos (2007) Kim, Y., Park, N., Won, D.: Privacy-enhanced adult certification method for multimedia contents on mobile RFID environments. In: Proceedings of IEEE International Symposium on Consumer Electronics, pp. 1–4. IEEE, Los Alamitos (2007)
24.
go back to reference Kim, Y., Park, N., Hong, D., Won, D.: Adult certification system on mobile RFID service environments. J. Korea Contents Assoc. 9(1), 131–138 (2009)CrossRef Kim, Y., Park, N., Hong, D., Won, D.: Adult certification system on mobile RFID service environments. J. Korea Contents Assoc. 9(1), 131–138 (2009)CrossRef
Metadata
Title
Security Enhancement of User Authentication Scheme Using IVEF in Vessel Traffic Service System
Authors
Namje Park
Seunghyun Cho
Byung-Doo Kim
Byunggil Lee
Dongho Won
Copyright Year
2012
Publisher
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-007-5699-1_71

Premium Partner