Abstract
Vessel Traffic System (VTS) is an important marine traffic monitoring system which is designed to improve the safety and efficiency of navigation and the protection of the marine environment. And the demand of Inter-VTS networking has been increased for realization of e-Navigation as shore side collaboration for maritime safety. And IVEF (Inter-VTS Data Exchange Format) for Inter-VTS network has become a hot research topic of VTS system. Currently, the IVEF developed by the International Association of Lighthouse Authorities (IALA) does not include any highly trusted certification technology for the connectors. However, the vessel traffic information requires high security since it is highly protected by the countries. Therefore, this study suggests the certification system to increase the security of the VTS systems using the main certification server and IVEF.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Arifin B., Ross E., Brodsky Y.: Data security in a ship detection and Identification system. IEEE RAST2011, pp. 634–636 (2011)
IVEF Recommendation V-145 on the Inter-VTS Exchange Format (IVEF) Service (2011)
Open IVEF, http://www.openivef.org
Carter, B., Green, S., Leeman, R., Chaulk, N.: SmartBay: better information—better decisions. IEEE Oceans 2008, 1–7 (2008)
Frejlichowski D., Lisaj A.: Analysis of lossless radar images compression for navigation in marine traffic and remote transmission. IEEE Radar Conference, pp. 1–4 (2008)
Garnier B., Andritsos F.: A port waterside security systemic analysis. IEEE WSS Conference 2010, pp. 1–6 (2010)
Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI mobile platform with secure service for mobile RFID network environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)
Park, N.: Security scheme for managing a large quantity of individual information in RFID environment. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds.) ICICA 2010. CCIS, vol. 106, pp. 72–79. Springer, Heidelberg (2010)
Park, N.: Secure UHF/HF dual-band RFID: strategic framework approaches and application solutions. In: ICCCI 2011. LNCS, Springer, Heidelberg (2011)
Park, N.: Implementation of terminal middleware platform for mobile RFID computing. Int. J. Ad Hoc Ubiquitous Comput. 8(4), 205–219 (2011)
Park, N., Kim, Y.: Harmful adult multimedia contents filtering method in mobile RFID service environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010. LNCS(LNAI), vol. 6422, pp. 193–202. Springer, Heidelberg (2010)
Park, N., Song, Y.: AONT encryption based application data management in mobile RFID environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010. LNCS(LNAI), vol. 6422, pp. 142–152. Springer, Heidelberg (2010)
Park, N.: Customized healthcare infrastructure using privacy weight level based on smart device. In: Communications in Computer and Information Science, vol. 206, pp. 467–474. Springer (2011)
Park, N.: Secure data access control scheme using type-based re-encryption in cloud environment. In: Studies in Computational Intelligence, vol. 381, pp. 319–327. Springer (2011)
Park, N., Song, Y.: Secure RFID application data management using all-or-nothing transform encryption. In: Pandurangan, G., Anil Kumar, V.S., Ming, G., Liu, Y., Li, Y. (eds.) WASA 2010. LNCS, vol. 6221, pp. 245–252. Springer, Heidelberg (2010)
Park, N.: The implementation of open embedded S/W platform for secure mobile RFID reader. J. Korea Inf. Commun. Soc. 35(5), 785–793 (2010)
Park, N., Song, Y., Won, D., Kim, H.: Multilateral approaches to the mobile RFID security problem using web service. In: Zhang, Y., Yu, G., Bertino, E., Xu, G. (eds.) APWeb 2008. LNCS, vol. 4976, pp. 331–341. Springer, Heidelberg (2008)
Park, N., Kim, H., Kim, S., Won, D.: Open location-based service using secure middleware infrastructure in web services. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 1146–1155. Springer, Heidelberg (2005)
Park, N., Kim, S., Won, D.: Privacy preserving enhanced service mechanism in mobile RFID network. In: ASC, Advances in Soft Computing, vol. 43, pp. 151–156. Springer, Heidelberg (2007)
Park, N., Kim, S., Won, D., Kim, H.: Security analysis and implementation leveraging globally networked mobile RFIDs. In: PWC 2006. LNCS, vol. 4217, pp. 494–505. Springer, Heidelberg (2006)
Kim, Y.: Harmful-word dictionary DB based text classification for improving performances of precesion and recall. Sungkyunkwan University, Ph.D. Thesis (2009)
Kim, Y, Park, N., Hong, D.: Enterprise data loss prevention system having a function of coping with civil suits. In: Studies in Computational Intelligence, vol. 365, pp. 201–208. Springer (2011)
Kim, Y., Park, N., Won, D.: Privacy-enhanced adult certification method for multimedia contents on mobile RFID environments. In: Proceedings of IEEE International Symposium on Consumer Electronics, pp. 1–4. IEEE, Los Alamitos (2007)
Kim, Y., Park, N., Hong, D., Won, D.: Adult certification system on mobile RFID service environments. J. Korea Contents Assoc. 9(1), 131–138 (2009)
Acknowledgments
This research was supported by the KCC(Korea Communications Commission), Korea, under the R&D program supervised by the KCA(Korea Communications Agency) (KCA-2012-12-912-06-003). The corresponding author is Dongho Won (dhwon@security.re.kr).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Park, N., Cho, S., Kim, BD., Lee, B., Won, D. (2012). Security Enhancement of User Authentication Scheme Using IVEF in Vessel Traffic Service System. In: Yeo, SS., Pan, Y., Lee, Y., Chang, H. (eds) Computer Science and its Applications. Lecture Notes in Electrical Engineering, vol 203. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5699-1_71
Download citation
DOI: https://doi.org/10.1007/978-94-007-5699-1_71
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-5698-4
Online ISBN: 978-94-007-5699-1
eBook Packages: Computer ScienceComputer Science (R0)