{"id":"https://openalex.org/W4291802714","doi":"https://doi.org/10.1109/isncc55209.2022.9851819","title":"Keeping the Baddies Out and the Bridge Calm: Embedded Authentication for Maritime Networks","display_name":"Keeping the Baddies Out and the Bridge Calm: Embedded Authentication for Maritime Networks","publication_year":2022,"publication_date":"2022-07-19","ids":{"openalex":"https://openalex.org/W4291802714","doi":"https://doi.org/10.1109/isncc55209.2022.9851819"},"language":"en","primary_location":{"id":"doi:10.1109/isncc55209.2022.9851819","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isncc55209.2022.9851819","pdf_url":null,"source":{"id":"https://openalex.org/S4363606822","display_name":"2022 International Symposium on Networks, Computers and Communications (ISNCC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Symposium on Networks, Computers and Communications (ISNCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030246614","display_name":"Lucca Ruhland","orcid":null},"institutions":[{"id":"https://openalex.org/I4210166245","display_name":"Fraunhofer Institute for Communication, Information Processing and Ergonomics","ror":"https://ror.org/05nn0gw40","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210166245","https://openalex.org/I4923324"]},{"id":"https://openalex.org/I135140700","display_name":"University of Bonn","ror":"https://ror.org/041nas322","country_code":"DE","type":"education","lineage":["https://openalex.org/I135140700"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Lucca Ruhland","raw_affiliation_strings":["Fraunhofer FKIE, Cyber Analysis &#x0026; Defense,Wachtberg,Germany","University of Bonn, Bonn, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer FKIE, Cyber Analysis &#x0026; Defense,Wachtberg,Germany","institution_ids":["https://openalex.org/I4210166245"]},{"raw_affiliation_string":"University of Bonn, Bonn, Germany","institution_ids":["https://openalex.org/I135140700"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087522079","display_name":"Mari Schmidt","orcid":null},"institutions":[{"id":"https://openalex.org/I4210166245","display_name":"Fraunhofer Institute for Communication, Information Processing and Ergonomics","ror":"https://ror.org/05nn0gw40","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210166245","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Mari Schmidt","raw_affiliation_strings":["Fraunhofer FKIE, Cyber Analysis &#x0026; Defense,Wachtberg,Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer FKIE, Cyber Analysis &#x0026; Defense,Wachtberg,Germany","institution_ids":["https://openalex.org/I4210166245"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067641190","display_name":"Jan Bauer","orcid":"https://orcid.org/0000-0001-7631-6456"},"institutions":[{"id":"https://openalex.org/I4210166245","display_name":"Fraunhofer Institute for Communication, Information Processing and Ergonomics","ror":"https://ror.org/05nn0gw40","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210166245","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Jan Bauer","raw_affiliation_strings":["Fraunhofer FKIE, Cyber Analysis &#x0026; Defense,Wachtberg,Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer FKIE, Cyber Analysis &#x0026; Defense,Wachtberg,Germany","institution_ids":["https://openalex.org/I4210166245"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048203227","display_name":"Elmar Padilla","orcid":null},"institutions":[{"id":"https://openalex.org/I4210166245","display_name":"Fraunhofer Institute for Communication, Information Processing and Ergonomics","ror":"https://ror.org/05nn0gw40","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210166245","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Elmar Padilla","raw_affiliation_strings":["Fraunhofer FKIE, Cyber Analysis &#x0026; Defense,Wachtberg,Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer FKIE, Cyber Analysis &#x0026; Defense,Wachtberg,Germany","institution_ids":["https://openalex.org/I4210166245"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5030246614"],"corresponding_institution_ids":["https://openalex.org/I135140700","https://openalex.org/I4210166245"],"apc_list":null,"apc_paid":null,"fwci":0.5203,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.6291009,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9850000143051147,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6816239356994629},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.6805882453918457},{"id":"https://openalex.org/keywords/bridge","display_name":"Bridge (graph theory)","score":0.6799134016036987},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6283430457115173},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5823887586593628},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5794080495834351},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.558185875415802},{"id":"https://openalex.org/keywords/situation-awareness","display_name":"Situation awareness","score":0.5360916256904602},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.5059475302696228},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.46365153789520264},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3997633457183838},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3272530436515808},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.287840336561203}],"concepts":[{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6816239356994629},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.6805882453918457},{"id":"https://openalex.org/C100776233","wikidata":"https://www.wikidata.org/wiki/Q2532492","display_name":"Bridge (graph theory)","level":2,"score":0.6799134016036987},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6283430457115173},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5823887586593628},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5794080495834351},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.558185875415802},{"id":"https://openalex.org/C145804949","wikidata":"https://www.wikidata.org/wiki/Q478123","display_name":"Situation awareness","level":2,"score":0.5360916256904602},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.5059475302696228},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.46365153789520264},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3997633457183838},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3272530436515808},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.287840336561203},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C126322002","wikidata":"https://www.wikidata.org/wiki/Q11180","display_name":"Internal medicine","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/isncc55209.2022.9851819","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isncc55209.2022.9851819","pdf_url":null,"source":{"id":"https://openalex.org/S4363606822","display_name":"2022 International Symposium on Networks, Computers and Communications (ISNCC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Symposium on Networks, Computers and Communications (ISNCC)","raw_type":"proceedings-article"},{"id":"pmh:oai:publica.fraunhofer.de:publica/445265","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/445265","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"conference paper"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Life below water","id":"https://metadata.un.org/sdg/14","score":0.5299999713897705}],"awards":[],"funders":[{"id":"https://openalex.org/F4320316108","display_name":"NAV","ror":"https://ror.org/00qghd717"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1496476314","https://openalex.org/W1762017652","https://openalex.org/W2087044821","https://openalex.org/W2087760019","https://openalex.org/W2103239853","https://openalex.org/W2128683226","https://openalex.org/W2493642530","https://openalex.org/W2610334615","https://openalex.org/W2965163124","https://openalex.org/W3010409379","https://openalex.org/W3013499512","https://openalex.org/W3087859943","https://openalex.org/W3182135462","https://openalex.org/W3199997066","https://openalex.org/W3217447486","https://openalex.org/W4213436603","https://openalex.org/W4229076054","https://openalex.org/W6798130362"],"related_works":["https://openalex.org/W2034419863","https://openalex.org/W2296396257","https://openalex.org/W3007106793","https://openalex.org/W2166668397","https://openalex.org/W2132505069","https://openalex.org/W1965515427","https://openalex.org/W2054202867","https://openalex.org/W2547137208","https://openalex.org/W2116285675","https://openalex.org/W2061637199"],"abstract_inverted_index":{"Integrated":[0],"bridges":[1],"of":[2,40,56],"today\u2019s":[3],"vessels":[4,18],"are":[5,27],"complex":[6],"and":[7,26,38,65,121],"distributed":[8],"maritime":[9,126],"systems":[10,25],"that":[11,92],"interconnect":[12],"versatile":[13],"electronic":[14],"equipment.":[15],"However,":[16],"digitized":[17],"have":[19],"long":[20],"ceased":[21],"to":[22,31,53,123],"be":[23],"isolated":[24],"thus":[28],"increasingly":[29],"vulnerable":[30],"cyber":[32],"attacks.":[33,78],"In":[34],"this":[35],"context,":[36],"integrity":[37],"authentication":[39,55],"the":[41,67,96,101],"communication":[42],"onboard":[43],"is":[44,60,105],"crucial.":[45],"Therefore,":[46],"we":[47],"introduce":[48],"MARMAC,":[49],"a":[50,72,80,112],"low-cost":[51,116],"solution":[52,74],"retrofit":[54],"nautical":[57,97],"communication.":[58],"MARMAC":[59,84],"based":[61],"on":[62,100],"symmetric":[63],"cryptography":[64],"extends":[66],"prevalent":[68],"IEC61162-450":[69],"protocol":[70],"enabling":[71],"backward-compatible":[73],"which":[75],"mitigates":[76],"common":[77],"Using":[79],"specific":[81],"gatekeeper":[82],"approach,":[83],"can":[85],"prevent":[86],"unauthenticated":[87],"messages":[88],"from":[89],"being":[90],"processed":[91],"could":[93],"otherwise":[94],"affect":[95],"situational":[98],"awareness":[99],"bridge.":[102],"Our":[103],"approach":[104],"evaluated":[106],"using":[107],"real":[108],"network":[109],"traffic":[110],"in":[111],"laboratory":[113],"testbed":[114],"with":[115],"hardware,":[117],"highlighting":[118],"its":[119],"feasibility":[120],"potential":[122],"secure":[124],"existing":[125],"systems.":[127]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
