hrcak mascot   Srce   HID

Stručni rad
https://doi.org/10.21278/brod68106

ANALYSIS OF SOFTWARE THREATS TO THE AUTOMATIC IDENTIFICATION SYSTEM

Ive Botunac   ORCID icon orcid.org/0000-0003-3561-7089 ; University of Zadar, Maritime Department, Mihovila Pavlinovića bb, 23000, Zadar
Marijan Gržan   ORCID icon orcid.org/0000-0003-0599-5089 ; University of Zadar, Maritime Department, Mihovila Pavlinovića bb, 23000, Zadar

Puni tekst: engleski, pdf (500 KB) str. 97-105 preuzimanja: 618* citiraj
APA 6th Edition
Botunac, I. i Gržan, M. (2017). ANALYSIS OF SOFTWARE THREATS TO THE AUTOMATIC IDENTIFICATION SYSTEM. Brodogradnja, 68 (1), 97-105. https://doi.org/10.21278/brod68106
MLA 8th Edition
Botunac, Ive i Marijan Gržan. "ANALYSIS OF SOFTWARE THREATS TO THE AUTOMATIC IDENTIFICATION SYSTEM." Brodogradnja, vol. 68, br. 1, 2017, str. 97-105. https://doi.org/10.21278/brod68106. Citirano 16.10.2021.
Chicago 17th Edition
Botunac, Ive i Marijan Gržan. "ANALYSIS OF SOFTWARE THREATS TO THE AUTOMATIC IDENTIFICATION SYSTEM." Brodogradnja 68, br. 1 (2017): 97-105. https://doi.org/10.21278/brod68106
Harvard
Botunac, I., i Gržan, M. (2017). 'ANALYSIS OF SOFTWARE THREATS TO THE AUTOMATIC IDENTIFICATION SYSTEM', Brodogradnja, 68(1), str. 97-105. https://doi.org/10.21278/brod68106
Vancouver
Botunac I, Gržan M. ANALYSIS OF SOFTWARE THREATS TO THE AUTOMATIC IDENTIFICATION SYSTEM. Brodogradnja [Internet]. 2017 [pristupljeno 16.10.2021.];68(1):97-105. https://doi.org/10.21278/brod68106
IEEE
I. Botunac i M. Gržan, "ANALYSIS OF SOFTWARE THREATS TO THE AUTOMATIC IDENTIFICATION SYSTEM", Brodogradnja, vol.68, br. 1, str. 97-105, 2017. [Online]. https://doi.org/10.21278/brod68106

Sažetak
Automatic Identification System (AIS) represents an important improvement in the fields of maritime security and vessel tracking. It is used by the signatory countries to the SOLAS Convention and by private and public providers. Its main advantage is that it can be used as an additional navigation aids, especially in avoiding collision at sea and in search and rescue operations. The present work analyses the functioning of the AIS System and the ways of exchanging data among the users. We also study one of the vulnerabilities of the System that can be abused by malicious users. The threat itself is analysed in detail in order to provide insight into the very process from the creation of a program to its implementation.

Ključne riječi
AIS; automatic identification system; cyber threat; vulnerability

Hrčak ID: 169956

URI
https://hrcak.srce.hr/169956

Posjeta: 1.117 *