297
128-bit security: Z
p=256 bits, G1=512 bits, G2=3072 bits,
G
T=3072 bits. Also [32] defines an “indicative” time-
unit as the time needed for point multiplication on a
random 171-bit elliptic curve for a random 160-bit
exponent. Under the above settings, the following
indicative results for SK-IBE are derived: For Super-
Singular (SS) elliptic curve at 80-bit security: Secret
(Private) key extraction costs 2-time units, encryption
costs 6-time units and decryption costs 104-time units.
For MNT elliptic curve at 128-bit security: Secret
(Private) key extraction costs 100-time units,
encryption costs 36-time units and decryption costs
1506 time units. Finally, the BLMQ Signcryption
scheme that has similar characteristics needs 2.65
milliseconds to Sign and Encrypt for one group
exponentiation and two scalar point multiplications
[31]. The processing time for Decryption and
Verification is 6.09 milliseconds for one group
exponentiation and two pairing evaluations.
7 CONCLUSION
In our previous work [1] we introduced the concept of
a secure AIS founded on Identity Based
Cryptography. In this work, we focused on proving
the feasibility of our idea by describing a working
model based on specific AIS attributes and specific
Identity Based Cryptographic schemes. We have
proposed a Maritime Identity Based Cryptographic
infrastructure (mIBC) under the IMO. We described
five usage modes for the proposed secure mIBC-AIS.
The mIBC-Typical-AIS (mode 1) works like the typical
AIS; it is the default mIBC-AIS usage mode. The
mIBC- Authenticated-AIS (mode 2) enhances AIS
transmissions with source authentication capabilities;
its implementation is based on the BLMQ identity-
based signatures operations formalized in the IEEE
1363.3-2013 standard. The mIBC-Anonymous-AIS
(mode 3) uses Pseudo-MMSIs to provide AIS with
anonymity, as described in detail in [1]. When in
mIBC-SK-IBE-AIS (mode 4) usage mode, the mIBC-
AIS can send arbitrary encrypted data to any entity
under mIBC without any previous contact or pre-
configuration with the receiver entity. For the
implementation of the mIBC-SK-IBE-AIS (mode 4),
we used the security proof of Sakai-Kasahara’s
Identity-Based Encryption scheme in [19]. The last
usage mode is the mIBC-AES-AIS (mode 5), which
provides for Encrypted AIS secure (group)-
communication with symmetric cryptography (e.g.,
AES). Today, encrypted AIS with symmetric ciphers
(e.g., AES) is offered by various vendors of
commercial AIS devices but always for pre-defined
“blue-forces” that they use pre-installed symmetric
AES keys. In contrast, we use the mIBC-SK-IBE-AIS
(mode 4) to disseminate the symmetric AES keys of
the mIBC-AES-AIS (mode 5), to any trustworthy
entity, ad-hoc, without any pre-communication or
symmetric-key pre-installation. Responsible for the
proposed mIBC-AIS functionality is the mIBC-AIS-
App intermediate application, that lies between the
typical AIS devise and its AIS antenna. The mIBC-
AIS-App is responsible for intercepting the original
AIS data, to perform the cryptographic operations
and to encapsulate/decapsulate the mIBC-AIS data
into standard AIS Messages ID6/8 as arbitrary data
payloads. In this way, the implementation of the
mIBC-AIS uses the currently available AIS
infrastructure but does not directly interact with it.
This enables the mIBC-AIS to be a transparent add-on
to the currently available AIS infrastructure. We
conclude that a practical implementation of our
approach is feasible. We intend to proceed with a
prototype implementation of the proposed scheme,
including the mIBC-App, and to experiment with it in
order to assess its performance.
REFERENCES
[1] A. Goudossis and S. Katsikas, "Towards a secure
automatic identification system (AIS)," Journal of Marine
Science and Technology, vol. 24, no. 2, pp. 410-423, 2019.
[2] U. C. G. N. Center, "HOW AIS WORKS," U.S. Coast
Guard Navigation Center , 09 08 2016. [Online].
Available:
https://www.navcen.uscg.gov/?pageName=AISworks.
[Accessed 02 08 2019].
[3] U. C. G. N. Center, "AIS CLASS A SHIP STATIC AND
VOYAGE RELATED DATA (MESSAGE 5)," U.S. Coast
Guard Navigation Center, 16 11 2017. [Online].
Available:
https://www.navcen.uscg.gov/?pageName=AISMessage
sAStatic. [Accessed 02 08 2019].
[4] B. Ellison, "Mandated AIS, an aid to pirates?," Panbo,
2019. [Online]. Available:
https://www.panbo.com/mandated-ais-an-aid-to-
pirates/. [Accessed 02 08 2019].
[5] C. Guarnieri, "Should ship data be open to the public?,"
Verdict Media Limited, 25 06 2013. [Online]. Available:
https://www.ship-technology.com/features/featureship-
data-be-open-public-security/. [Accessed 02 08 2019].
[6] M. Balduzzi, K. Wilhoit and A. Pasta, "A Security
Evaluation of AIS," Trend Micro.
[7] I. M. O. (IMO), "Maritime Security and Piracy,"
International Maritime Organization (IMO), [Online].
Available:
http://www.imo.org/en/OurWork/Security/Pages/Mariti
meSecurity.aspx. [Accessed 02 08 2019].
[8] G. Kessler, Craiger, J.P. and J. Haass, "A Taxonomy
Framework for Maritime Cybersecurity: A
Demonstration Using the Automatic Identification
System," TransNav, the International Journal on Marine
Navigation and Safety of Sea Transportation, vol. 12, no. 3,
pp. 429-437, 2018.
[9] F. Lazaro, R. Raulefs, W. Wang, F. Clazzer and S. Plass,
"VHF Data Exchange System (VDES): an enabling
technology for maritime communications," CEAS Space
Journal, vol. 11, no. 1, pp. 55-63, 2019.
[10] J. Hall, J. Lee, J. Benin, C. Armstrong and H. Owen,
"IEEE 1609 influenced automatic identification system
(AIS)," in IEEE Vehicular Technology Conference, Glasgow,
UK, 2015.
[11] I. M. Organization, Resolution A.1106(29), IMO
REVISED GUIDELINES FOR THE ONBOARD
OPERATIONAL USE OF SHIPBORNE AUTOMATIC
IDENTIFICATION SYSTEMS (AIS), International
Maritime Organization, 2015.
[12] A. Goudosis, T. Kostis and N. Nikitakos, "Automatic
Identification System Stated Requirements for Naval
Transponder Security Assurance," in N. Goudosis, A ;
Kostis, T ; Nikitakos, “Automatic Identification System Stated
Requirements for Naval Transponder 2nd International
Conference on Applications of Mathematics & Informatics In
Military Sciences (AMIMS), Vari, Greece, 2012.
[13] D. He, N. Kumar, K.-K. R. Choo and W. Wu, "Efficient
Hierarchical Identity-Based Signature with Batch
Verification for Automatic Dependent Surveillance-