{"id":"https://openalex.org/W3047976537","doi":"https://doi.org/10.1109/cns48642.2020.9162320","title":"SecureAIS - Securing Pairwise Vessels Communications","display_name":"SecureAIS - Securing Pairwise Vessels Communications","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3047976537","doi":"https://doi.org/10.1109/cns48642.2020.9162320","mag":"3047976537"},"language":"en","primary_location":{"id":"doi:10.1109/cns48642.2020.9162320","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns48642.2020.9162320","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110703347","display_name":"Ahmed Aziz","orcid":null},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":true,"raw_author_name":"Ahmed Aziz","raw_affiliation_strings":["Division of Information and Computing Technology (ICT), College of Science and Engineering (CSE), Hamad Bin Khalifa University (HBKU), Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Division of Information and Computing Technology (ICT), College of Science and Engineering (CSE), Hamad Bin Khalifa University (HBKU), Doha, Qatar","institution_ids":["https://openalex.org/I4210144839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084927711","display_name":"Pietro Tedeschi","orcid":"https://orcid.org/0000-0003-3324-3706"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Pietro Tedeschi","raw_affiliation_strings":["Division of Information and Computing Technology (ICT), College of Science and Engineering (CSE), Hamad Bin Khalifa University (HBKU), Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Division of Information and Computing Technology (ICT), College of Science and Engineering (CSE), Hamad Bin Khalifa University (HBKU), Doha, Qatar","institution_ids":["https://openalex.org/I4210144839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088679207","display_name":"Savio Sciancalepore","orcid":"https://orcid.org/0000-0003-0974-3639"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Savio Sciancalepore","raw_affiliation_strings":["Division of Information and Computing Technology (ICT), College of Science and Engineering (CSE), Hamad Bin Khalifa University (HBKU), Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Division of Information and Computing Technology (ICT), College of Science and Engineering (CSE), Hamad Bin Khalifa University (HBKU), Doha, Qatar","institution_ids":["https://openalex.org/I4210144839"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065932621","display_name":"Roberto Di Pietro","orcid":"https://orcid.org/0000-0003-1909-0336"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Roberto Di Pietro","raw_affiliation_strings":["Division of Information and Computing Technology (ICT), College of Science and Engineering (CSE), Hamad Bin Khalifa University (HBKU), Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Division of Information and Computing Technology (ICT), College of Science and Engineering (CSE), Hamad Bin Khalifa University (HBKU), Doha, Qatar","institution_ids":["https://openalex.org/I4210144839"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5110703347"],"corresponding_institution_ids":["https://openalex.org/I4210144839"],"apc_list":null,"apc_paid":null,"fwci":2.621,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.90407533,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9783999919891357,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7856017351150513},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6290843486785889},{"id":"https://openalex.org/keywords/session-key","display_name":"Session key","score":0.598125159740448},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5627704858779907},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.5447753667831421},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.49709776043891907},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.4898323714733124},{"id":"https://openalex.org/keywords/transport-layer-security","display_name":"Transport Layer Security","score":0.48142144083976746},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4663274586200714},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4533133804798126},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.4422887861728668},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39241892099380493},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.30339932441711426},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.28996747732162476},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.17530730366706848},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.1401463747024536},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11883631348609924}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7856017351150513},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6290843486785889},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.598125159740448},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5627704858779907},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.5447753667831421},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.49709776043891907},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.4898323714733124},{"id":"https://openalex.org/C148176105","wikidata":"https://www.wikidata.org/wiki/Q206494","display_name":"Transport Layer Security","level":3,"score":0.48142144083976746},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4663274586200714},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4533133804798126},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.4422887861728668},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39241892099380493},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.30339932441711426},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.28996747732162476},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.17530730366706848},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.1401463747024536},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11883631348609924},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cns48642.2020.9162320","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns48642.2020.9162320","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1560782426","https://openalex.org/W1564181359","https://openalex.org/W1755042603","https://openalex.org/W2054194572","https://openalex.org/W2128683226","https://openalex.org/W2161706819","https://openalex.org/W2396918724","https://openalex.org/W2484443848","https://openalex.org/W2555323242","https://openalex.org/W2795155796","https://openalex.org/W2805937767","https://openalex.org/W2944261991","https://openalex.org/W2945504560","https://openalex.org/W2967896400","https://openalex.org/W2985126008","https://openalex.org/W3010409379","https://openalex.org/W6633831447","https://openalex.org/W6712651228"],"related_works":["https://openalex.org/W179933844","https://openalex.org/W2109846861","https://openalex.org/W1966238003","https://openalex.org/W141692544","https://openalex.org/W2162181331","https://openalex.org/W4286304049","https://openalex.org/W2897993493","https://openalex.org/W3171177138","https://openalex.org/W3140034708","https://openalex.org/W2978912884"],"abstract_inverted_index":{"Modern":[0],"vessels":[1,21,140],"increasingly":[2],"rely":[3],"on":[4,149,239,257],"the":[5,72,76,83,94,97,118,155,164,171,184,191,200,219,225,248,253,281,285,305],"Automatic":[6],"Identification":[7],"System":[8],"(AIS)":[9],"digital":[10],"technology":[11],"to":[12,19,35,39,64,81,147,183,237,303,307],"wirelessly":[13],"broadcast":[14],"identification":[15],"and":[16,22,38,57,69,177,199,267,293,313],"position":[17],"information":[18],"neighboring":[20],"ports.":[23],"AIS":[24,44,145,165,235],"is":[25,173],"a":[26,110,131,150,161,240,270],"time-slotted":[27],"protocol":[28],"that":[29,135],"also":[30,299],"provides":[31],"unicast":[32],"messages-usually":[33],"employed":[34],"manage":[36],"self-separation":[37],"exchange":[40],"safety":[41],"information.":[42],"However,":[43],"does":[45,178],"not":[46,60,91,179],"provide":[47],"any":[48,137,181],"security":[49,227,275],"feature.":[50],"The":[51,187,261],"messages":[52],"are":[53,59,87],"exchanged":[54],"in":[55,75,141,244,269,315],"clear-text,":[56],"they":[58,107],"authenticated,":[61],"being":[62],"vulnerable":[63],"several":[65],"attacks,":[66],"including":[67],"forging":[68],"replay.":[70],"Despite":[71],"existing":[73],"contributions":[74],"literature":[77],"propose":[78,129],"some":[79,86],"strategies":[80],"overcome":[82],"exposed":[84],"weaknesses,":[85],"insecure,":[88],"others":[89],"do":[90],"comply":[92],"with":[93,224],"standard,":[95],"while":[96,213,273],"remaining":[98],"few":[99],"ones":[100],"would":[101,108],"introduce":[102],"an":[103,144,215],"unacceptable":[104],"overhead-that":[105],"is,":[106],"require":[109,180],"relevant":[111],"number":[112],"of":[113,117,139,143,154,163,167,218,229,288],"AIS-time":[114],"slots,":[115],"because":[116],"limited":[119],"payload":[120],"available":[121,185,220],"for":[122],"each":[123],"time-slot.":[124],"In":[125],"this":[126],"paper,":[127],"we":[128],"SecureAIS,":[130],"key":[132,153,206,243],"agreement":[133,207],"scheme":[134,172,189,198],"allows":[136,233],"pair":[138],"reach":[142],"radio":[146],"agree":[148,238],"shared":[151,241],"session":[152,242],"desired":[156],"length,":[157],"by":[158,252,310],"requiring":[159,209],"just":[160],"fraction":[162],"time-slots":[166,250],"competing":[168,254],"solutions.":[169],"Further,":[170],"fully":[174],"standard":[175],"compliant":[176],"modification":[182],"hardware.":[186],"proposed":[188,262],"integrates":[190],"Elliptic":[192,201],"Curve":[193,202],"Qu-Vanstone":[194],"(ECQV)":[195],"implicit":[196],"certification":[197],"Diffie":[203],"Hellman":[204],"(ECDH)":[205],"technique,":[208],"moderate":[210],"computational":[211],"overhead":[212],"enjoying":[214],"optimal":[216],"usage":[217],"bandwidth.":[221],"When":[222],"configured":[223],"highest":[226],"level":[228],"256":[230],"bits,":[231],"SecureAIS":[232],"two":[234],"transceivers":[236],"20":[245],"time-slots,":[246],"against":[247],"96":[249],"required":[251],"solution":[255,263],"based":[256],"traditional":[258],"X.509":[259],"certificates.":[260],"has":[264,276,297],"been":[265,277,298],"implemented":[266],"tested":[268],"real":[271],"scenario,":[272],"its":[274],"formally":[278],"evaluated":[279],"through":[280],"ProVerif":[282],"tool.":[283],"Finally,":[284],"source":[286],"code":[287],"our":[289],"Proof-of-concept":[290],"using":[291],"GNURadio":[292],"Ettus":[294],"Research":[295],"X310":[296],"released":[300],"as":[301],"open-source":[302],"pave":[304],"way":[306],"further":[308],"research":[309],"both":[311],"Industry":[312],"Academia":[314],"maritime":[316],"communication":[317],"security.":[318]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":1}],"updated_date":"2026-02-25T23:00:34.991745","created_date":"2025-10-10T00:00:00"}
