Skip to main content

2012 | OriginalPaper | Buchkapitel

Security Enhancement of User Authentication Scheme Using IVEF in Vessel Traffic Service System

verfasst von : Namje Park, Seunghyun Cho, Byung-Doo Kim, Byunggil Lee, Dongho Won

Erschienen in: Computer Science and its Applications

Verlag: Springer Netherlands

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Vessel Traffic System (VTS) is an important marine traffic monitoring system which is designed to improve the safety and efficiency of navigation and the protection of the marine environment. And the demand of Inter-VTS networking has been increased for realization of e-Navigation as shore side collaboration for maritime safety. And IVEF (Inter-VTS Data Exchange Format) for Inter-VTS network has become a hot research topic of VTS system. Currently, the IVEF developed by the International Association of Lighthouse Authorities (IALA) does not include any highly trusted certification technology for the connectors. However, the vessel traffic information requires high security since it is highly protected by the countries. Therefore, this study suggests the certification system to increase the security of the VTS systems using the main certification server and IVEF.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Arifin B., Ross E., Brodsky Y.: Data security in a ship detection and Identification system. IEEE RAST2011, pp. 634–636 (2011) Arifin B., Ross E., Brodsky Y.: Data security in a ship detection and Identification system. IEEE RAST2011, pp. 634–636 (2011)
2.
Zurück zum Zitat IVEF Recommendation V-145 on the Inter-VTS Exchange Format (IVEF) Service (2011) IVEF Recommendation V-145 on the Inter-VTS Exchange Format (IVEF) Service (2011)
4.
Zurück zum Zitat Carter, B., Green, S., Leeman, R., Chaulk, N.: SmartBay: better information—better decisions. IEEE Oceans 2008, 1–7 (2008) Carter, B., Green, S., Leeman, R., Chaulk, N.: SmartBay: better information—better decisions. IEEE Oceans 2008, 1–7 (2008)
5.
Zurück zum Zitat Frejlichowski D., Lisaj A.: Analysis of lossless radar images compression for navigation in marine traffic and remote transmission. IEEE Radar Conference, pp. 1–4 (2008) Frejlichowski D., Lisaj A.: Analysis of lossless radar images compression for navigation in marine traffic and remote transmission. IEEE Radar Conference, pp. 1–4 (2008)
6.
Zurück zum Zitat Garnier B., Andritsos F.: A port waterside security systemic analysis. IEEE WSS Conference 2010, pp. 1–6 (2010) Garnier B., Andritsos F.: A port waterside security systemic analysis. IEEE WSS Conference 2010, pp. 1–6 (2010)
7.
Zurück zum Zitat Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI mobile platform with secure service for mobile RFID network environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006) Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI mobile platform with secure service for mobile RFID network environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)
8.
Zurück zum Zitat Park, N.: Security scheme for managing a large quantity of individual information in RFID environment. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds.) ICICA 2010. CCIS, vol. 106, pp. 72–79. Springer, Heidelberg (2010) Park, N.: Security scheme for managing a large quantity of individual information in RFID environment. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds.) ICICA 2010. CCIS, vol. 106, pp. 72–79. Springer, Heidelberg (2010)
9.
Zurück zum Zitat Park, N.: Secure UHF/HF dual-band RFID: strategic framework approaches and application solutions. In: ICCCI 2011. LNCS, Springer, Heidelberg (2011) Park, N.: Secure UHF/HF dual-band RFID: strategic framework approaches and application solutions. In: ICCCI 2011. LNCS, Springer, Heidelberg (2011)
10.
Zurück zum Zitat Park, N.: Implementation of terminal middleware platform for mobile RFID computing. Int. J. Ad Hoc Ubiquitous Comput. 8(4), 205–219 (2011)CrossRef Park, N.: Implementation of terminal middleware platform for mobile RFID computing. Int. J. Ad Hoc Ubiquitous Comput. 8(4), 205–219 (2011)CrossRef
11.
Zurück zum Zitat Park, N., Kim, Y.: Harmful adult multimedia contents filtering method in mobile RFID service environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010. LNCS(LNAI), vol. 6422, pp. 193–202. Springer, Heidelberg (2010) Park, N., Kim, Y.: Harmful adult multimedia contents filtering method in mobile RFID service environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010. LNCS(LNAI), vol. 6422, pp. 193–202. Springer, Heidelberg (2010)
12.
Zurück zum Zitat Park, N., Song, Y.: AONT encryption based application data management in mobile RFID environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010. LNCS(LNAI), vol. 6422, pp. 142–152. Springer, Heidelberg (2010) Park, N., Song, Y.: AONT encryption based application data management in mobile RFID environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010. LNCS(LNAI), vol. 6422, pp. 142–152. Springer, Heidelberg (2010)
13.
Zurück zum Zitat Park, N.: Customized healthcare infrastructure using privacy weight level based on smart device. In: Communications in Computer and Information Science, vol. 206, pp. 467–474. Springer (2011) Park, N.: Customized healthcare infrastructure using privacy weight level based on smart device. In: Communications in Computer and Information Science, vol. 206, pp. 467–474. Springer (2011)
14.
Zurück zum Zitat Park, N.: Secure data access control scheme using type-based re-encryption in cloud environment. In: Studies in Computational Intelligence, vol. 381, pp. 319–327. Springer (2011) Park, N.: Secure data access control scheme using type-based re-encryption in cloud environment. In: Studies in Computational Intelligence, vol. 381, pp. 319–327. Springer (2011)
15.
Zurück zum Zitat Park, N., Song, Y.: Secure RFID application data management using all-or-nothing transform encryption. In: Pandurangan, G., Anil Kumar, V.S., Ming, G., Liu, Y., Li, Y. (eds.) WASA 2010. LNCS, vol. 6221, pp. 245–252. Springer, Heidelberg (2010) Park, N., Song, Y.: Secure RFID application data management using all-or-nothing transform encryption. In: Pandurangan, G., Anil Kumar, V.S., Ming, G., Liu, Y., Li, Y. (eds.) WASA 2010. LNCS, vol. 6221, pp. 245–252. Springer, Heidelberg (2010)
16.
Zurück zum Zitat Park, N.: The implementation of open embedded S/W platform for secure mobile RFID reader. J. Korea Inf. Commun. Soc. 35(5), 785–793 (2010) Park, N.: The implementation of open embedded S/W platform for secure mobile RFID reader. J. Korea Inf. Commun. Soc. 35(5), 785–793 (2010)
17.
Zurück zum Zitat Park, N., Song, Y., Won, D., Kim, H.: Multilateral approaches to the mobile RFID security problem using web service. In: Zhang, Y., Yu, G., Bertino, E., Xu, G. (eds.) APWeb 2008. LNCS, vol. 4976, pp. 331–341. Springer, Heidelberg (2008) Park, N., Song, Y., Won, D., Kim, H.: Multilateral approaches to the mobile RFID security problem using web service. In: Zhang, Y., Yu, G., Bertino, E., Xu, G. (eds.) APWeb 2008. LNCS, vol. 4976, pp. 331–341. Springer, Heidelberg (2008)
18.
Zurück zum Zitat Park, N., Kim, H., Kim, S., Won, D.: Open location-based service using secure middleware infrastructure in web services. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 1146–1155. Springer, Heidelberg (2005) Park, N., Kim, H., Kim, S., Won, D.: Open location-based service using secure middleware infrastructure in web services. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 1146–1155. Springer, Heidelberg (2005)
19.
Zurück zum Zitat Park, N., Kim, S., Won, D.: Privacy preserving enhanced service mechanism in mobile RFID network. In: ASC, Advances in Soft Computing, vol. 43, pp. 151–156. Springer, Heidelberg (2007) Park, N., Kim, S., Won, D.: Privacy preserving enhanced service mechanism in mobile RFID network. In: ASC, Advances in Soft Computing, vol. 43, pp. 151–156. Springer, Heidelberg (2007)
20.
Zurück zum Zitat Park, N., Kim, S., Won, D., Kim, H.: Security analysis and implementation leveraging globally networked mobile RFIDs. In: PWC 2006. LNCS, vol. 4217, pp. 494–505. Springer, Heidelberg (2006) Park, N., Kim, S., Won, D., Kim, H.: Security analysis and implementation leveraging globally networked mobile RFIDs. In: PWC 2006. LNCS, vol. 4217, pp. 494–505. Springer, Heidelberg (2006)
21.
Zurück zum Zitat Kim, Y.: Harmful-word dictionary DB based text classification for improving performances of precesion and recall. Sungkyunkwan University, Ph.D. Thesis (2009) Kim, Y.: Harmful-word dictionary DB based text classification for improving performances of precesion and recall. Sungkyunkwan University, Ph.D. Thesis (2009)
22.
Zurück zum Zitat Kim, Y, Park, N., Hong, D.: Enterprise data loss prevention system having a function of coping with civil suits. In: Studies in Computational Intelligence, vol. 365, pp. 201–208. Springer (2011) Kim, Y, Park, N., Hong, D.: Enterprise data loss prevention system having a function of coping with civil suits. In: Studies in Computational Intelligence, vol. 365, pp. 201–208. Springer (2011)
23.
Zurück zum Zitat Kim, Y., Park, N., Won, D.: Privacy-enhanced adult certification method for multimedia contents on mobile RFID environments. In: Proceedings of IEEE International Symposium on Consumer Electronics, pp. 1–4. IEEE, Los Alamitos (2007) Kim, Y., Park, N., Won, D.: Privacy-enhanced adult certification method for multimedia contents on mobile RFID environments. In: Proceedings of IEEE International Symposium on Consumer Electronics, pp. 1–4. IEEE, Los Alamitos (2007)
24.
Zurück zum Zitat Kim, Y., Park, N., Hong, D., Won, D.: Adult certification system on mobile RFID service environments. J. Korea Contents Assoc. 9(1), 131–138 (2009)CrossRef Kim, Y., Park, N., Hong, D., Won, D.: Adult certification system on mobile RFID service environments. J. Korea Contents Assoc. 9(1), 131–138 (2009)CrossRef
Metadaten
Titel
Security Enhancement of User Authentication Scheme Using IVEF in Vessel Traffic Service System
verfasst von
Namje Park
Seunghyun Cho
Byung-Doo Kim
Byunggil Lee
Dongho Won
Copyright-Jahr
2012
Verlag
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-007-5699-1_71