Information security in the LRIT system

被引:0
|
作者
Niski, R. [1 ]
Waraksa, M. [2 ]
Zurek, J. [3 ]
机构
[1] Inst Natl Telecommun, Gdansk, Poland
[2] Gdynia Maritime Univ, Gdynia, Poland
[3] Gdynia Maritime Univ, Inst Natl Telecommun, Gdansk, Poland
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
LRIT (Long Range Identification and Tracking of ships) system is close to it's implementation and the LRIT information (identification and position of the vessels) is very sensitive. In this paper the structure of system data bases and communication links in the LRIT system will be presented In this context, a security of the LRIT information will be analyzed, moreover cryptographic mechanisms in the LRIT links on-land will be described Network security issues and mechanisms "as is" will not be described here - they are widely described in available literature. As for now there is no any recommendation in the LRIT standard documentation concerning information protection in the LRIT radio links. In the paper a proposal of cryptographic system for the LRIT radio links will be presented.
引用
收藏
页码:531 / +
页数:2
相关论文
共 50 条
  • [31] Research on information system security models
    Li, Shou-Peng
    Sun, Hong-Bo
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2003, 31 (10): : 1491 - 1495
  • [32] System Dynamics as a Tool for Information Security
    Qian, Ying
    Fang, Yulin
    Gonzalez, Jose J.
    PROCEEDINGS OF 2009 CONFERENCE ON SYSTEMS SCIENCE, MANAGEMENT SCIENCE & SYSTEM DYNAMICS, VOL 5, 2009, : 147 - 155
  • [33] Challenges in power system information security
    Dán, György
    Sandberg, Henrik
    Ekstedt, Mathias
    Björkman, Gunnar
    IEEE Security and Privacy, 2012, 10 (04): : 62 - 70
  • [34] Assessment of the Effectiveness of an Information Security System
    Zegzhda, D. P.
    Saurenko, T. N.
    Anisimov, V. G.
    Anisimov, E. G.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2023, 57 (08) : 855 - 861
  • [35] A proposed preventive information security system
    Anwar, M. M.
    Zafar, M. F.
    Ahmed, Z.
    2007 INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, 2007, : 40 - 45
  • [36] Assessment of the Effectiveness of an Information Security System
    D. P. Zegzhda
    T. N. Saurenko
    V. G. Anisimov
    E. G. Anisimov
    Automatic Control and Computer Sciences, 2023, 57 : 855 - 861
  • [37] System Identification under Information Security
    Xu, Changbao
    Zhao, Yanlong
    Zhang, Ji-Feng
    Qi, Hongsheng
    IFAC PAPERSONLINE, 2017, 50 (01): : 3756 - 3761
  • [38] System Integration and Security of Information Systems
    Boiko, Andrii
    Shendryk, Vira
    ICTE 2016, 2017, 104 : 35 - 42
  • [39] INFORMATION SYSTEM SECURITY THREATS CLASSIFICATIONS
    Genic, Sandro
    Hutinski, Zeljko
    JOURNAL OF INFORMATION AND ORGANIZATIONAL SCIENCES, 2007, 31 (01) : 51 - 61
  • [40] IMPLEMENTATION OF INFORMATION SECURITY MANAGEMENT SYSTEM
    Drastich, Martin
    PROCEEDINGS OF THE 10TH INTERNATIONAL SCIENTIFIC CONFERENCE: ECONOMIC POLICY IN THE EUROPEAN UNION MEMBER COUNTRIES: SELECTED PAPERS, 2013, : 49 - 55