Show simple item record

dc.contributor.authorTam, K
dc.contributor.authorHopcraft, Rory
dc.contributor.authorMoara-Nkwe, K
dc.contributor.authorMisas, JP
dc.contributor.authorAndrews, W
dc.contributor.authorHarish, AV
dc.contributor.authorGiménez, P
dc.contributor.authorCrichton, T
dc.contributor.authorJones, Kevin
dc.date.accessioned2022-01-17T13:55:48Z
dc.date.available2022-01-17T13:55:48Z
dc.date.issued2021-12-06
dc.identifier.issn2160-0473
dc.identifier.issn2160-0481
dc.identifier.urihttp://hdl.handle.net/10026.1/18567
dc.description.abstract

As the maritime sector embraces more technology to increase efficiency, lower carbon emissions, and adapt to meet modern challenges, cyber and cyberphysical safety become a more significant issue. However, unfortunately, much of past research view cyber-security issues in transportation as primarily information technology problems. This paper designs and uses a case study to illustrate how cyber-security and physical safety should be viewed together, cyber and physical (i.e. cyber-physical), when considering ship-to-ship and ship-to-shore interactions. While there is some scenario designing, this case study is built with real port data and ship systems to demonstrate a real-world cyber-attack on a ship. It shows plausible physical effects that affect the safety of those involved. This case study is also made realistic with a novel hybrid cyber range and hardware testbed environment, designed to examine the different effects a ship-based cyber-attack could potentially have on a port. This informs several solutions, technical and social, that could enhance cyberphysical safety in marine transportation.

dc.format.extent1-27
dc.language.isoen
dc.publisherScientific Research Publishing
dc.subject7 Affordable and Clean Energy
dc.titleCase Study of a Cyber-Physical Attack Affecting Port and Ship Operational Safety
dc.typejournal-article
plymouth.issue01
plymouth.volume12
plymouth.publication-statusPublished
plymouth.journalJournal of Transportation Technologies
dc.identifier.doi10.4236/jtts.2022.121001
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
dcterms.dateAccepted2021-12-03
dc.rights.embargodate2022-1-18
dc.identifier.eissn2160-0481
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.4236/jtts.2022.121001
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.licenseref.startdate2021-12-06
rioxxterms.typeJournal Article/Review


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV