{"id":"https://openalex.org/W4225858218","doi":"https://doi.org/10.1109/access.2022.3158943","title":"Cybersecurity Attacks on Software Logic and Error Handling Within AIS Implementations: A Systematic Testing of Resilience","display_name":"Cybersecurity Attacks on Software Logic and Error Handling Within AIS Implementations: A Systematic Testing of Resilience","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4225858218","doi":"https://doi.org/10.1109/access.2022.3158943"},"language":"en","primary_location":{"id":"doi:10.1109/access.2022.3158943","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3158943","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9668973/09733358.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/9668973/09733358.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045716964","display_name":"Syed Khandker","orcid":"https://orcid.org/0000-0001-7899-7339"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Syed Khandker","raw_affiliation_strings":["Faculty of Information Technology, University of Jyv&#x00E4;skyl&#x00E4;, Jyv&#x00E4;skyl&#x00E4;, Finland","skyl&#x00E4",", Jyv&#x00E4",", Finland"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, University of Jyv&#x00E4;skyl&#x00E4;, Jyv&#x00E4;skyl&#x00E4;, Finland","institution_ids":[]},{"raw_affiliation_string":"skyl&#x00E4","institution_ids":[]},{"raw_affiliation_string":", Jyv&#x00E4","institution_ids":[]},{"raw_affiliation_string":", Finland","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036288913","display_name":"Hannu Turtiainen","orcid":"https://orcid.org/0000-0002-7631-620X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hannu Turtiainen","raw_affiliation_strings":["Faculty of Information Technology, University of Jyv&#x00E4;skyl&#x00E4;, Jyv&#x00E4;skyl&#x00E4;, Finland","skyl&#x00E4",", Jyv&#x00E4",", Finland"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, University of Jyv&#x00E4;skyl&#x00E4;, Jyv&#x00E4;skyl&#x00E4;, Finland","institution_ids":[]},{"raw_affiliation_string":"skyl&#x00E4","institution_ids":[]},{"raw_affiliation_string":", Jyv&#x00E4","institution_ids":[]},{"raw_affiliation_string":", Finland","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060661495","display_name":"Andrei Costin","orcid":"https://orcid.org/0000-0002-2704-9715"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Andrei Costin","raw_affiliation_strings":["Faculty of Information Technology, University of Jyv&#x00E4;skyl&#x00E4;, Jyv&#x00E4;skyl&#x00E4;, Finland",", Finland",", Jyv&#x00E4","skyl&#x00E4"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, University of Jyv&#x00E4;skyl&#x00E4;, Jyv&#x00E4;skyl&#x00E4;, Finland","institution_ids":[]},{"raw_affiliation_string":", Finland","institution_ids":[]},{"raw_affiliation_string":", Jyv&#x00E4","institution_ids":[]},{"raw_affiliation_string":"skyl&#x00E4","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036786418","display_name":"Timo H\u00e4m\u00e4l\u00e4inen","orcid":"https://orcid.org/0000-0002-4168-9102"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Timo Hamalainen","raw_affiliation_strings":["Faculty of Information Technology, University of Jyv&#x00E4;skyl&#x00E4;, Jyv&#x00E4;skyl&#x00E4;, Finland","skyl&#x00E4",", Finland",", Jyv&#x00E4"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, University of Jyv&#x00E4;skyl&#x00E4;, Jyv&#x00E4;skyl&#x00E4;, Finland","institution_ids":[]},{"raw_affiliation_string":"skyl&#x00E4","institution_ids":[]},{"raw_affiliation_string":", Finland","institution_ids":[]},{"raw_affiliation_string":", Jyv&#x00E4","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5045716964"],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":8.5863,"has_fulltext":true,"cited_by_count":29,"citation_normalized_percentile":{"value":0.97691207,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"10","issue":null,"first_page":"29493","last_page":"29505"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7823172807693481},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.6969776153564453},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.6473180651664734},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5548424124717712},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4905399680137634},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.45783117413520813},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.4299975037574768},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.41885361075401306}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7823172807693481},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.6969776153564453},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.6473180651664734},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5548424124717712},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4905399680137634},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.45783117413520813},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.4299975037574768},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.41885361075401306},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/access.2022.3158943","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3158943","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9668973/09733358.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:jyx.jyu.fi:123456789/80382","is_oa":true,"landing_page_url":"http://urn.fi/URN:NBN:fi:jyu-202203282067","pdf_url":null,"source":{"id":"https://openalex.org/S4306400563","display_name":"Jyv\u00e4skyl\u00e4 University Digital Archive (University of Jyv\u00e4skyl\u00e4)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I94722563","host_organization_name":"University of Jyv\u00e4skyl\u00e4","host_organization_lineage":["https://openalex.org/I94722563"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"A1"},{"id":"pmh:oai:doaj.org/article:12b073098ccc475eb5403ecd8c9fba42","is_oa":true,"landing_page_url":"https://doaj.org/article/12b073098ccc475eb5403ecd8c9fba42","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 10, Pp 29493-29505 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2022.3158943","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3158943","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9668973/09733358.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/14","display_name":"Life below water","score":0.6700000166893005}],"awards":[{"id":"https://openalex.org/G4431648444","display_name":null,"funder_award_id":"00211119","funder_id":"https://openalex.org/F4320321726","funder_display_name":"Suomen Kulttuurirahasto"},{"id":"https://openalex.org/G5102943363","display_name":null,"funder_award_id":"Decision 00211119","funder_id":"https://openalex.org/F4320321726","funder_display_name":"Suomen Kulttuurirahasto"}],"funders":[{"id":"https://openalex.org/F4320321726","display_name":"Suomen Kulttuurirahasto","ror":"https://ror.org/027xav248"},{"id":"https://openalex.org/F4320323168","display_name":"Jyv\u00e4skyl\u00e4n Yliopisto","ror":"https://ror.org/05n3dz165"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4225858218.pdf","grobid_xml":"https://content.openalex.org/works/W4225858218.grobid-xml"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W826043684","https://openalex.org/W1515073590","https://openalex.org/W2128683226","https://openalex.org/W2159057156","https://openalex.org/W2229563427","https://openalex.org/W2256472973","https://openalex.org/W2498770676","https://openalex.org/W2598150883","https://openalex.org/W2805937767","https://openalex.org/W2920922319","https://openalex.org/W2947745012","https://openalex.org/W3000014529","https://openalex.org/W3001763045","https://openalex.org/W3142347132","https://openalex.org/W3159858237","https://openalex.org/W3170579996","https://openalex.org/W4206565539","https://openalex.org/W4245001444","https://openalex.org/W6623205520","https://openalex.org/W6630729764","https://openalex.org/W6689269832","https://openalex.org/W6743851170","https://openalex.org/W6748064740"],"related_works":["https://openalex.org/W2120447654","https://openalex.org/W2977179488","https://openalex.org/W2144453115","https://openalex.org/W2744553356","https://openalex.org/W2128223750","https://openalex.org/W4238532390","https://openalex.org/W2188872161","https://openalex.org/W2961779879","https://openalex.org/W797688974","https://openalex.org/W2621101275"],"abstract_inverted_index":{"To":[0],"increase":[1],"situational":[2],"awareness":[3],"of":[4,15,25,59,105,128,165,185,231,263,305,311,318,324],"maritime":[5,284],"vessels":[6],"and":[7,10,101,124,154,208,227,301,329],"other":[8],"entities":[9],"to":[11,52,160,170,236,249,298],"enable":[12],"their":[13,79],"exchange":[14],"various":[16],"information,":[17],"the":[18,23,26,41,60,66,73,103,162,176,186,195,217,234,241,250,256,261,276,283,306,322],"International":[19],"Maritime":[20],"Organization":[21],"mandated":[22],"use":[24,304],"Automatic":[27,279],"Identification":[28],"System":[29],"(AIS)":[30],"in":[31,55,72,78,168,175,216,240,270],"2004.":[32],"The":[33,140,179,267,309],"AIS":[34,69,109,134,169,173,196,218,251,265,271,286],"is":[35,50,62,159],"a":[36,126,137,222,315],"self-reporting":[37,48],"system":[38,49,269],"that":[39,182],"uses":[40],"VHF":[42],"radio":[43,112,119],"link.":[44],"However,":[45],"any":[46,291],"radio-based":[47],"prone":[51],"forgery,":[53],"especially":[54],"situations":[56],"where":[57],"authentication":[58,85],"message":[61],"not":[63,83,288],"designed":[64,71],"into":[65],"architecture.":[67],"As":[68],"was":[70,253,272],"1990s":[74],"when":[75],"cyberattacks":[76,107],"were":[77,143,188],"infancy,":[80],"it":[81,89],"does":[82,287],"implement":[84],"or":[86],"encryption;":[87],"thus,":[88],"can":[90],"be":[91],"seen":[92],"as":[93,149,221],"fundamentally":[94],"vulnerable":[95],"against":[96],"cyberattacks.":[97],"This":[98],"paper":[99],"demonstrates":[100],"evaluates":[102],"impact":[104],"multiple":[106],"on":[108,132],"via":[110],"remote":[111],"frequency":[113],"(RF)":[114],"links":[115],"using":[116,136],"transmission-enabled":[117],"software-defined":[118],"(SDR).":[120],"Overall,":[121],"we":[122,210],"implemented":[123],"tested":[125,141],"total":[127],"11":[129],"different":[130,264],"tests/attacks":[131],"19":[133],"setups,":[135],"controlled":[138],"environment.":[139],"configurations":[142,320],"derived":[144],"from":[145],"heterogeneous":[146],"platforms":[147],"such":[148,220],"Windows,":[150],"Android,":[151],"generic":[152],"receivers,":[153],"commercial":[155],"transponders.":[156],"Our":[157],"aim":[158],"enhance":[161],"early":[163],"discovery":[164],"new":[166],"vulnerabilities":[167],"effectively":[171,289],"address":[172],"attacks":[174,193],"nearest":[177],"future.":[178],"results":[180,313],"showed":[181,211],"approximately":[183],"89&#x0025;":[184],"setups":[187],"affected":[189],"by":[190],"Denial-of-Service":[191],"(DoS)":[192],"at":[194],"protocol":[197],"level.":[198],"Besides":[199],"implementing":[200],"some":[201,212],"existing":[202],"attack":[203,214],"ideas":[204],"(e.g.,":[205],"spoofing,":[206],"DoS,":[207],"flooding),":[209],"novel":[213],"concepts":[215],"context":[219],"coordinated":[223],"attack,":[224],"overwhelming":[225],"alerts,":[226],"logical":[228],"vulnerabilities,":[229],"all":[230],"which":[232,258,295],"have":[233],"potential":[235],"cause":[237],"software/system":[238],"crashes":[239],"worst-case":[242],"scenarios.":[243],"Moreover,":[244],"an":[245],"implementation/specification":[246],"flaw":[247],"related":[248],"preamble":[252],"identified":[254],"during":[255],"experiments,":[257],"may":[259,296],"affect":[260],"interoperability":[262],"devices.":[266],"error-handling":[268],"also":[273],"investigated.":[274],"Unlike":[275],"aviation":[277],"sector&#x2019;s":[278,285],"Dependent":[280],"Surveillance-Broadcast":[281],"(ADS-B),":[282],"support":[290],"error":[292],"correction":[293],"method,":[294],"contribute":[297],"RF":[299],"pollution":[300],"less":[302],"effective":[303],"overall":[307],"system.":[308],"consistency":[310],"our":[312,325],"for":[314],"comprehensive":[316],"range":[317],"hardware-software":[319],"indicated":[321],"reliability":[323],"approach,":[326],"test":[327],"system,":[328],"evaluation":[330],"results.":[331]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":12},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
