[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Security Enhancement of User Authentication Scheme Using IVEF in Vessel Traffic Service System

  • Conference paper
  • First Online:
Computer Science and its Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 203))

Abstract

Vessel Traffic System (VTS) is an important marine traffic monitoring system which is designed to improve the safety and efficiency of navigation and the protection of the marine environment. And the demand of Inter-VTS networking has been increased for realization of e-Navigation as shore side collaboration for maritime safety. And IVEF (Inter-VTS Data Exchange Format) for Inter-VTS network has become a hot research topic of VTS system. Currently, the IVEF developed by the International Association of Lighthouse Authorities (IALA) does not include any highly trusted certification technology for the connectors. However, the vessel traffic information requires high security since it is highly protected by the countries. Therefore, this study suggests the certification system to increase the security of the VTS systems using the main certification server and IVEF.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 143.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 179.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
GBP 179.99
Price includes VAT (United Kingdom)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Arifin B., Ross E., Brodsky Y.: Data security in a ship detection and Identification system. IEEE RAST2011, pp. 634–636 (2011)

    Google Scholar 

  2. IVEF Recommendation V-145 on the Inter-VTS Exchange Format (IVEF) Service (2011)

    Google Scholar 

  3. Open IVEF, http://www.openivef.org

  4. Carter, B., Green, S., Leeman, R., Chaulk, N.: SmartBay: better information—better decisions. IEEE Oceans 2008, 1–7 (2008)

    Google Scholar 

  5. Frejlichowski D., Lisaj A.: Analysis of lossless radar images compression for navigation in marine traffic and remote transmission. IEEE Radar Conference, pp. 1–4 (2008)

    Google Scholar 

  6. Garnier B., Andritsos F.: A port waterside security systemic analysis. IEEE WSS Conference 2010, pp. 1–6 (2010)

    Google Scholar 

  7. Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI mobile platform with secure service for mobile RFID network environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)

    Google Scholar 

  8. Park, N.: Security scheme for managing a large quantity of individual information in RFID environment. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds.) ICICA 2010. CCIS, vol. 106, pp. 72–79. Springer, Heidelberg (2010)

    Google Scholar 

  9. Park, N.: Secure UHF/HF dual-band RFID: strategic framework approaches and application solutions. In: ICCCI 2011. LNCS, Springer, Heidelberg (2011)

    Google Scholar 

  10. Park, N.: Implementation of terminal middleware platform for mobile RFID computing. Int. J. Ad Hoc Ubiquitous Comput. 8(4), 205–219 (2011)

    Article  Google Scholar 

  11. Park, N., Kim, Y.: Harmful adult multimedia contents filtering method in mobile RFID service environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010. LNCS(LNAI), vol. 6422, pp. 193–202. Springer, Heidelberg (2010)

    Google Scholar 

  12. Park, N., Song, Y.: AONT encryption based application data management in mobile RFID environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010. LNCS(LNAI), vol. 6422, pp. 142–152. Springer, Heidelberg (2010)

    Google Scholar 

  13. Park, N.: Customized healthcare infrastructure using privacy weight level based on smart device. In: Communications in Computer and Information Science, vol. 206, pp. 467–474. Springer (2011)

    Google Scholar 

  14. Park, N.: Secure data access control scheme using type-based re-encryption in cloud environment. In: Studies in Computational Intelligence, vol. 381, pp. 319–327. Springer (2011)

    Google Scholar 

  15. Park, N., Song, Y.: Secure RFID application data management using all-or-nothing transform encryption. In: Pandurangan, G., Anil Kumar, V.S., Ming, G., Liu, Y., Li, Y. (eds.) WASA 2010. LNCS, vol. 6221, pp. 245–252. Springer, Heidelberg (2010)

    Google Scholar 

  16. Park, N.: The implementation of open embedded S/W platform for secure mobile RFID reader. J. Korea Inf. Commun. Soc. 35(5), 785–793 (2010)

    Google Scholar 

  17. Park, N., Song, Y., Won, D., Kim, H.: Multilateral approaches to the mobile RFID security problem using web service. In: Zhang, Y., Yu, G., Bertino, E., Xu, G. (eds.) APWeb 2008. LNCS, vol. 4976, pp. 331–341. Springer, Heidelberg (2008)

    Google Scholar 

  18. Park, N., Kim, H., Kim, S., Won, D.: Open location-based service using secure middleware infrastructure in web services. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 1146–1155. Springer, Heidelberg (2005)

    Google Scholar 

  19. Park, N., Kim, S., Won, D.: Privacy preserving enhanced service mechanism in mobile RFID network. In: ASC, Advances in Soft Computing, vol. 43, pp. 151–156. Springer, Heidelberg (2007)

    Google Scholar 

  20. Park, N., Kim, S., Won, D., Kim, H.: Security analysis and implementation leveraging globally networked mobile RFIDs. In: PWC 2006. LNCS, vol. 4217, pp. 494–505. Springer, Heidelberg (2006)

    Google Scholar 

  21. Kim, Y.: Harmful-word dictionary DB based text classification for improving performances of precesion and recall. Sungkyunkwan University, Ph.D. Thesis (2009)

    Google Scholar 

  22. Kim, Y, Park, N., Hong, D.: Enterprise data loss prevention system having a function of coping with civil suits. In: Studies in Computational Intelligence, vol. 365, pp. 201–208. Springer (2011)

    Google Scholar 

  23. Kim, Y., Park, N., Won, D.: Privacy-enhanced adult certification method for multimedia contents on mobile RFID environments. In: Proceedings of IEEE International Symposium on Consumer Electronics, pp. 1–4. IEEE, Los Alamitos (2007)

    Google Scholar 

  24. Kim, Y., Park, N., Hong, D., Won, D.: Adult certification system on mobile RFID service environments. J. Korea Contents Assoc. 9(1), 131–138 (2009)

    Article  Google Scholar 

Download references

Acknowledgments

This research was supported by the KCC(Korea Communications Commission), Korea, under the R&D program supervised by the KCA(Korea Communications Agency) (KCA-2012-12-912-06-003). The corresponding author is Dongho Won (dhwon@security.re.kr).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dongho Won .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Park, N., Cho, S., Kim, BD., Lee, B., Won, D. (2012). Security Enhancement of User Authentication Scheme Using IVEF in Vessel Traffic Service System. In: Yeo, SS., Pan, Y., Lee, Y., Chang, H. (eds) Computer Science and its Applications. Lecture Notes in Electrical Engineering, vol 203. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5699-1_71

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-5699-1_71

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-5698-4

  • Online ISBN: 978-94-007-5699-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics