267
alleviate problems with communication on short
distances,when is themost needed, IALA proposed
introduction of VHF Data Exchange System (VDES)
[5]. Using radio frequency channels within maritime
VHFbandvesselislinkedwithterrestrialorsatellite
communication network providing alternative to
maritime satellite communication. System is not
intended to
work on high seas but within range of
VHF transmission it can be invaluable providing
resilientmeansofcommunication.
6 CONCLUSIONS
Number cyber‐attacks against shipping industry is
risingrapidly withinlastfew yearsthreateningboth
shipping lines and individual vessels. Attacks
directed against biggest shipping companies
succeeded and incurred
large financial loses. It
happened despite professionally managed IT
networks in large companies. Attacks aimed against
ships targeted both IT and OT technologies.
Compromisedcommunicationmayseriouslyhamper
ship’s operations and provides gateway to OT
equipment.Ongoingconvergencevessel’sITandOT
technologies makes maritime transport more
vulnerable. Some research penet ration
test exposed
susceptibility of technologies currently in use to
simple methods of attack. Numerous vulnerabilities
were found in both in software managing ship’s
systems and in unprotected hardware. Technologies
used today onboard are not sufficiently resilient
against cyber‐attacks. It may lead to delay of
introduction of autonomous vessels until
revealed
vulnerabilitiesareproperlyaddressed.
REFERENCES:
[1]AGCS. Safety and Shipping Review 2022.p.9. Munich
2022
[2]BalduzziM.,PastaA.,WilhoitK.,ASecurityEvaluation
of AIS Automated Identification System,
https://www.madlab.it/papers/ais_acsac14.pdf
[3]]DirenzoIIIJ.,DrumhillerN.K.,RobertsF.S.,Issuesin
Maritime Cyber Security, p.20,23. Westphalia Press,
WashingtonD.C.2017
[4]Finnish National Emergency Supply
Organization, The
Maritime Transport Pool, Maritime Cybersecurity‐Best
PracticesforVessels,p.5,Helsinki2021
[5]IALA Guideline G1117 VHF Data Exchange System
(VDES) Overview Edition 3.0, electronic edition, Saint
GermainenLaye,2022.
[6]IMO, International Convention of Safety of Life at Sea
(1974),ElectronicEdition2020,London
[7]IMO,
Resolution MSC.252(83) Adoption of the Revised
Performance Standards for Integrated Navigation
Systems(INS),London,2007
[8]INTERTANKO, Jamming and spoofing of Global
NavigationalSatelliteSystem(GPS),p.5,14,London2019
[9]Lind M., Michaelides M., Ward R., Watson R. T.,
MaritimeInformatics,p.43,Springer,Cham2021
[10 National Institute of Standards and
Technology, US
Department of Commerce, Guide to Industrial Control
Systems(ICS)Security,p.2‐16,2‐17,Gaithersburg,2015
[11]Pawelski J., (2022) Barriers impending introduction of
autonomousvessels.ScientificJournalsoftheMaritime
University of Szczecin, Zeszyty Naukowe Akademii
MorskiejwSzczecinie72(144),p.39,Szczecin2022
[12]https://blog.geogarage.com/2017/12/nightmare‐
scenario‐
ship‐critical.html,accessed10.02.2023
[13]https://rntfnd.org/2017/11/25/hackers‐took‐full‐control‐
of‐container‐ships‐navigation‐systems‐for‐10‐hours‐ihs‐
fairplay/,accessed02.02.2023
[14]https://vesselautomation.com/maritime‐cyber‐
attacks/,accessed10.02.2023
[15]https://www.bimco.org/contracts‐and‐clauses/bimco‐
clauses/current/cyber‐security‐clause‐2019,accessed
20.01.2023
[16]https://www.blackhat.com/docs/asia‐
14/materials/Balduzzi/Asia‐14‐Balduzzi‐AIS‐Exposed‐
Understanding‐Vulnerabilities‐And‐
Attacks.pdf,accessed21.01.2023
[17]https://www.csoonline.com/article/3218104/stuxnet‐
explained‐the‐first‐known
‐cyberweapon.html,accessed
02.02.2023
[18]https://www.cybersecurity‐review.com/news‐july‐
2020/maritime‐cyber‐attacks‐increase‐by‐900‐in‐three‐
years/,accessed04.02.2023
[19]https://www.darkreading.com/attacks‐breaches/plcs‐
possessed‐researchers‐create‐undetectable‐
rootkit,accessed17.02.2023
[20]https://www.darkreading.com/threat‐
intelligence/stealthy‐new‐plc‐hack‐jumps‐the‐air‐
gap,accessed11.02.2023
[21]https://www.darkreading.com/vulnerabilities‐
threats/hijacking‐a‐plc‐using‐its‐own‐network‐
features,accessed09.02.2023
[22]https://www.defenseone.com/technology/2015/08/hacke
r‐
cracks‐satellite‐communications‐
network/118915/,accessed17.02.2023
[23]https://gcaptain.com/inmarsat‐shipboard‐
communication‐platform‐found‐vulnerable‐to‐
hacking/,accessed08.02.2023
[24]https://gcaptain.com/international‐maritime‐
organization‐hit‐by‐cyber‐attack/,accessed17.02.2023
[25]https://www.gpsworld.com/spoofing‐in‐the‐black‐sea‐
what‐really‐happened/,accessed12.02.2023
[26]https://www.iala‐aism.org/e‐bulletin/enhanced‐radar‐
positioning‐system/,accessed15.02.2023
[27]https://www.ibm.com/blogs/internet‐of‐things/what‐is‐
the‐iot/,accessed15.02.2023
[28]
https://www.inmarsat.com/en/news/latest‐
news/maritime/2022/fleet‐secure‐cybercrime‐unified‐
threat‐management.html,accessed14.02.2023
[29]https://www.iua.co.uk/IUA_Member/Clauses/eLibrary/
Clauses_Search.aspx?CAT=PAC,accessed08.02.2023
[30]https://www.madlab.it/papers/ais_acsac14.pdf,accessed
10.02.2023
[31]https://www.missionsecure.com/resources/comprehensi
ve‐guide‐to‐maritime‐security‐ebook,accessed15.022023
[32]https://www.otorio.com/blog/maritime‐port‐cyber‐
security‐the‐achilles‐heel‐of‐the‐global‐
economy/,accessed17.02.2023
[33]https://www.pentestpartners.com/security‐
blog/hacking‐tracking‐stealing‐and‐sinking‐
ships/,accessed14.02.2023
[34]https://www.techopedia.com/iiot‐vs‐iot
‐the‐bigger‐
risks‐of‐the‐industrial‐internet‐of‐
things/2/34394#:~:text=The%20defining%20difference%2
0between%20Internet%20of%20Things%20%28IoT%29,a
s%20manufacturing%2C%20supply%20chain%20monito
ring%20and%20management%20systems., accessed
07.02.2023