Next Article in Journal
On-Machine LTS Integration for Layer-Wise Surface Quality Characterization in MEX/P
Previous Article in Journal
Pixel-Level Recognition of Trace Mycotoxins in Red Ginseng Based on Hyperspectral Imaging Combined with 1DCNN-Residual-BiLSTM-Attention Model
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Communication

Enhancing Maritime Cybersecurity through Operational Technology Sensor Data Fusion: A Comprehensive Survey and Analysis

by
Georgios Potamos
*,
Eliana Stavrou
and
Stavros Stavrou
Faculty of Pure and Applied Sciences, Open University of Cyprus, Latsia, 2231 Nicosia, Cyprus
*
Author to whom correspondence should be addressed.
Sensors 2024, 24(11), 3458; https://doi.org/10.3390/s24113458
Submission received: 9 April 2024 / Revised: 22 May 2024 / Accepted: 24 May 2024 / Published: 27 May 2024
(This article belongs to the Section Communications)

Abstract

:
Cybersecurity is becoming an increasingly important aspect in ensuring maritime data protection and operational continuity. Ships, ports, surveillance and navigation systems, industrial technology, cargo, and logistics systems all contribute to a complex maritime environment with a significant cyberattack surface. To that aim, a wide range of cyberattacks in the maritime domain are possible, with the potential to infect vulnerable information and communication systems, compromising safety and security. The use of navigation and surveillance systems, which are considered as part of the maritime OT sensors, can improve maritime cyber situational awareness. This survey critically investigates whether the fusion of OT data, which are used to provide maritime situational awareness, may also improve the ability to detect cyberincidents in real time or near-real time. It includes a thorough analysis of the relevant literature, emphasizing RF but also other sensors, and data fusion approaches that can help improve maritime cybersecurity.

1. Introduction

Cybertechnologies have become key factors for the operational management of numerous systems, as well as the safety and security of critical sectors such as the maritime industry [1]. Information technology (IT) and operational technology (OT) systems, either maritime or industrial, are installed on board ships or in ashore maritime infrastructures or can be interlinked between ship and shore extending the internet or intranet links to the oceans [2]. Furthermore, the digitization era has resulted in the emergence of autonomous/unmanned ships, which has created new requirements for interoperability and secure connectivity [3,4].
The use of satellite links has significantly improved connectivity, allowing for efficient ship-to-shore data exchange. Satellite and radio data lines provide the necessary bandwidth to facilitate real-time data exchange through remote access [5]. This advancement is essential for efficient communication, navigation, and overall operational efficiency [6]. However, the increased connectivity and integration of sensors/actuators into command-and-control (C2) systems or human–machine interfaces (HMIs) also expand the potential cyberattack surface. The enlarged attack surface poses a threat as attackers may exploit vulnerabilities in the systems, leading to malicious acts. The risks associated with cyberthreats in the maritime industry include unauthorized access, data breaches, system manipulation, or even the compromise of autonomous systems.
According to [2], cyberattacks can be either targeted or untargeted, with potential targets encompassing both IT and OT systems. Specifically, in targeted OT systems, vulnerabilities may span a range of maritime-specific OT systems utilized for navigation, surveillance, information exchange, vessel management, cargo scheduling, crew and passenger management, entertainment, and safety [2,7,8]. Threats such as malware, denial of service (DoS) attacks, spoofing, supply chain attacks, and brute force attacks exploit these vulnerabilities, guided by threat models like MITRE ATT&CK [9] and Lockheed Martin [10]. Consequently, attack detection plays a pivotal role in cyber risk management, crucial for the effective mitigation of potential impacts.
Detecting cyberthreats or anomalies in the complex and technology-rich maritime environment presents a challenging task. When incidents affect navigational or surveillance systems, it is important to determine their causes, which could range from environmental factors and system malfunctions to maneuvers or kinematic operations. Therefore, command and control, or information and event management systems, must adeptly identify whether an incident stems from cyberexploitation of a vulnerable maritime asset/system or represents a non-cyber-related maritime anomaly. These systems enhance maritime situational awareness (MSA) by integrating and analyzing data from surveillance sensors and other sources, enabling the detection of maritime anomalies.
Current research on real-time detection of cyberattacks in the maritime sector is limited [11,12], with prior studies focusing mainly on leveraging sensors or similar technologies to identify threats aimed at information and communications technology (ICT) elements within operational technology (OT) systems, especially on board ships. This survey discusses detection methods for cyberattacks targeting maritime OT systems, utilizing data not just from IT equipment (such as logs, alerts, events, files, etc.) but also from navigational and surveillance systems that employ protocols for localization, target detection, and maneuvering, many of which are known to be vulnerable [2,13,14]. Understanding the maritime cyberthreat landscape, including the systems and protocols at risk, as well as detection technologies and methodologies, is essential for developing effective cyberdetection capabilities to safeguard against maritime cybersecurity incidents.
The development of mechanisms for cyberattack detection in the maritime domain necessitates a detailed analysis of maritime data, facilitated by continuous monitoring of navigational and surveillance sensors. Utilizing operational data from surveillance and navigational sensors to enhance cybersecurity in the maritime sector represents a promising research avenue. The scope of this paper is to identify the radio frequency (RF) sensors that can be utilized for the composition of the maritime situational awareness (MSA) and then investigate their potential for maritime cyber situational awareness (MCSA). The paper examines if data fusion of such sensors used for the MSA establishment can also assist the detection and response to cyberthreats within the maritime domain, thereby contributing to the overall security and resilience of maritime operations.
Section 2 presents the methodology followed in this paper, and Section 3 summarizes and presents the relevant maritime cyberthreat landscape. At this point, radar and AIS technologies are described, and they appear to be common elements that can be combined to form the maritime picture. Section 4 investigates whether data fusion may improve the detection of cyberthreats, to be potentially utilized for both maritime and cyber situational awareness. Section 5 discusses future directions, and Section 6 summarizes the findings.

2. Methodology

To support the cybersecurity objectives of this research in the maritime domain, a three-step methodological approach was employed, as illustrated in Figure 1. The initial step involved the identification of the maritime domain’s attack surface and its cyberthreat landscape, informed by the legislative framework, current regulations, guidelines, and relevant maritime cybersecurity literature. This encompassed sensors and systems, potential interconnections among them, protocols, and networks, collectively constituting the attack surface. Subsequently, an analysis and taxonomy of documented cyberincidents against navigational and surveillance networks and systems offered insights into vulnerabilities and the potential repercussions of their exploitation.
This analysis was expected to pinpoint cybervulnerabilities in surveillance and navigational systems such as the automatic identification system (AIS), radar, Global Navigation Satellite System (GNSS), and electronic chart display and information system (ECDIS) employed both on board ships and within ashore maritime infrastructures. The International Convention for the Safety of Life at Sea (SOLAS) sets essential safety standards for the construction, equipment, and operation of merchant ships, mandating the use of radar, GNSS, and AIS for larger vessels. Ref. [15] highlights the operational and technical features of surveillance sensors, the integration of radar and AIS data, and the architecture of an integrated bridge system (IBS).
The second phase of this work focused on identifying and cataloging studies related to the data fusion of radar and AIS, to investigate their potential to be used for detecting cyberthreats. The concept of AIS and radar data fusion was first introduced in 2008 [16], marking a significant development in maritime security technology. Ref. [17] discusses an attack on compromised electronic chart display and information systems (ECDIS), highlighting vulnerabilities in command-and-control systems that integrate data from radar and AIS. This paper is particularly interested in the application of data fusion for detecting cyberincidents alongside the formation of the Recognized Maritime Picture (RMP), emphasizing the dual capability of identifying maritime anomalies and cyberincidents through the integration of AIS and radar data. In the maritime context, “anomaly” encompasses any abnormal ship behavior due to environmental conditions, system malfunctions, or maneuver/kinematic operations, underscoring the broad scope of this investigation. Therefore, the key factors taken into consideration when examining AIS and radar data fusion are the following:
  • AIS and radar have different RF characteristics [15], and their combined operation and data fusion provide essential benefits for detecting cyberincidents, especially related to AIS vulnerabilities. Radar is used only for detection purposes, while AIS is commonly used for identification.
  • Bridge systems contain a variety of vulnerabilities that, if exploited, can impact the reliability/accuracy of the MSA, thus impacting both the safety and security of ships. Due to this, a focused literature survey was performed in the context of cybersecurity and anomaly detection to identify papers that identify anomalies related to the operation of the bridge systems. Most of these anomalies may not be referred to as cyberincidents but may be connected to cyber risks and as such have been considered in this study.
  • Existing investigations indicate that there are cases where AIS anomalies are caused by falsified transmitted messages/data. For this reason, it was necessary to use additional search keywords during the focused literature survey referring to the transmitted AIS signal and/or the “angle of arrival” to the receiver.
To identify the relevant research work, the following keywords were considered: (a) AIS and radar “data fusion”, which resulted in 1630 research manuscripts; (b) “data fusion” for maritime cybersecurity, which resulted in 133 manuscripts; and (c) AIS signal and “angle of arrival” (exact phrase anywhere in the article), which resulted in 363 manuscripts.
Overall, 2126 manuscripts matched the search criteria. Then, a set of selection criteria have been applied to pinpoint the manuscripts of interest, including the ones retrieved by several researchers in various systematic reviews [18,19]. A manuscript was selected if it was an article, it was published in an international peer-reviewed journal or conference, it was written in English, and it reported empirical data. Technical reports, book chapters, abstracts, and literature reviews considered not relevant were excluded. A manuscript was also excluded if data fusion was not performed by sensors on board a ship and/or in a maritime infrastructure. According to this process, 227 papers were selected for further process.
The manuscripts were reviewed in detail, looking for patterns of common interest to this work. The analysis was performed taking into consideration the most important elements of data fusion according to [20]: data sources, their operation based on the applied algorithm, and the purpose of the solution. The process was repeated for each topic separately, illustrating the connection/combination of the various tasks/areas.

3. Initial Phase—Cyberthreat Landscape in the Maritime Context

This section examines the cyberthreat landscape in the maritime environment, to provide the necessary insights about if maritime OT (surveillance and navigation) data fusion can be used for detecting cyberthreats.
To following paragraphs in this section are defined in accordance with the NIST CFW actions, which are related to the cyberthreat landscape. Figure 2 presents the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CFW) and the actions related to the development of cyberthreat detection capabilities. The identification includes the related legal and regulatory framework for maritime assets, mission objectives, and an assessment of operational criticality. To describe the maritime operations and mission objectives, we present the cyberincidents that involved navigational and surveillance systems, followed by a taxonomy of the infected systems and attack types.

3.1. Legal and Regulatory Framework

Understanding the relative guidelines and responsibilities is a critical step in defining the cyberthreat landscape in the maritime domain. The goal is to create a comprehensive regulatory and legislative framework that promotes cyber risk identification and management. BIMCO, in cooperation with many shipowners [2], published guidelines to manage risks on board ships, considering the NIST Cybersecurity Framework. The International Maritime Organization (IMO) adopted resolution MSC 428 (98), to address the cyber risks in existing management systems. Additionally, IMO recommended in a circular, MSC-FAL.1/Circ.3, high-level measures to safeguard ships from cyberthreats and vulnerabilities. ENISA published guidelines for cyber risk management for ports [21]. The Advance Bureau of Shipping published guidelines for the cyber resilience of ships (IACS UR E-26) and of onboard systems and equipment (IACS UR E-27). The Digital Container Shipping Association analyzed the maritime cyber risks, based on the NIST Framework. The International Association for Classification Societies has issued a “Recommendation on Cyber Resilience (No. 166)” [22]. The Maritime Bulk Liquids Transfer Cybersecurity Framework Profile assists in cybersecurity risk assessments for all involved entities [23]. All the above guidelines designate the relevant cybersecurity requirements.

3.2. Maritime Assets

The maritime sector is undergoing a profound transformation due to technological advancements, evolving into a realm characterized by digital connectivity, intelligence, and autonomy. Legacy systems and protocols have been integrated into the Internet Protocol (IP), unlocking numerous networking opportunities previously unattainable. However, this digital shift renders ships and critical maritime infrastructures—such as ports, energy transport systems, supply chain facilities, and operational centers belonging to either government or private entities—increasingly susceptible to cyberthreats. Consequently, the maritime industry is compelled to devise strategies and enhance its capabilities to safeguard maritime assets against cyberattacks. This involves protecting a diverse array of systems and sensors, each employing different technologies ranging from informational to navigational and surveillance functions.
As shown in Figure 3, the environment includes mobile platforms, such as ships and autonomous vessels, as well as coastal infrastructures. The majority of coastal facilities are classified as critical infrastructure, e.g., ports, energy storage facilities, water facilities, etc. Systems on board ships and vessels can operate independently or in conjunction with ashore command and control systems, exchanging data and information. All platforms are capable of internal and external digital communication via RF links or satellite communications (SATCOM). Cargo, tanker, passenger, fishing, and cruise ships; autonomous surface vessels (ASVs); and other automated vehicles, oil rigs, and other supporting vessels are examples of onboard means. Similarly, maritime infrastructures include governmental or private sector maritime operational centers, observation/surveillance posts, and critical infrastructures such as ports or energy transportation facilities. Ships and infrastructures have distinct communication and operational capabilities that must be identified in order to effectively develop cyber detection tools and mechanisms.
To develop cyberthreat detection capabilities effectively, it is essential to first gain a comprehensive understanding of the maritime domain, pinpointing all components requiring protection and identifying the cyberthreats that pose risks to maritime operations. Additionally, before exploring the technical details of detecting cyberattacks, it is crucial to analyze the maritime domain through the lenses of complexity and criticality.
The complexity of the maritime domain makes the successful detection of cyberthreats difficult because it necessitates a clear view of all relevant tasks that must be completed. Measures for detecting malicious activity include immediate sensing and alerting. In a previous work [24], relevant tasks for effective detection were identified and listed across the NIST Cybersecurity Framework. Given that these tasks are listed in different functional areas, it is frequently unclear which of these are strongly interconnected and can impact detection effectiveness.
The criticality of the maritime domain requires real-time or near-real-time capabilities to support the continuous determination of the situation, relative to the maritime domain’s mission. Given that IT/OT operations support maritime tasks, the cybersecurity domain is interlinked with the maritime domain and contributes to the MCSA. Cybersafety concerns the risks from the loss of availability, integrity of the safety critical data, and reliability of the OT systems [2]. Both the security and safety of this critical domain necessitate taking the necessary steps to reduce the cyber risk and the severity of the potential impact.

3.3. Maritime Operations and Mission Objectives

The exposure of the maritime domain to a range of cyberthreats forced the maritime industry to develop procedures and capabilities to protect its mission objectives [13], effectively maintaining preparedness, personnel and environmental safety, and operational security. This section contains an analysis of the cyberincidents against the maritime OT equipment and, for each incident, the type of attack.

3.3.1. Analysis of Cyberincidents That Involved Navigational and Surveillance Systems

Reported maritime incidents/events at sea caused severe disasters, damages, and human losses or affected important work [25]. These incidents were taxonomized and categorized in ref. [26], using several criteria such as the entry point and the infected system. In this paper, the work in ref. [13] is discussed to provide a clear overview of an attacker’s capabilities, concerning the vulnerabilities’ exploitation of the navigational and surveillance systems, that may change the security and safety situation in this complex environment [27]. Table 1 presents a list of recent cyberincidents in the maritime domain, identifying the attacks that were executed against specific sensors/systems, along with details regarding the infected systems and the type of attack. This analysis provides a first indication of the systems utilized in MSA that can constitute a cybertarget and identify the potential impact.

3.3.2. Infected Systems

As listed in Table 1, systems that can be affected by a cyberattack include navigational and surveillance systems, such as ECDIS and GNSS. Further investigations confirmed the systems under attack as depicted in Table 1 and provided more insights as to the vulnerable systems that exist on ships and onshore maritime infrastructures/centers [2,7,8,25,34,35,36]. As Figure 4 highlights, vulnerable systems include sensors, communication or management/control systems.

3.3.3. Types of Attacks

To further analyze the cyberthreat landscape, the authors used the MITRE ATT&CK framework [24], utilized to develop a blueprint for detecting cyberthreats. The purpose of the proposed blueprint was to provide insights into the behavior and techniques that hackers use to exploit the vulnerabilities of maritime OT, navigation and surveillance, sensors, and actuators. The cyberattack kill chain is expected to guide the security team to enhance systems’ detection capabilities. Especially for this category of sensors/actuators, attacks can be categorized as follows:
  • Malware is malicious software that is designed to access or damage a computer system without the knowledge of the owner. There are various types of malware including trojans, ransomware, spyware, viruses, and worms. Ransomware encrypts data on a system until a ransom has been paid. It can be used for denial-of-service purposes. Malware may also exploit known deficiencies and problems in outdated/unpatched software.
  • Brute force techniques try to guess the credentials of a network device through repeated attempts.
  • Denial of service (DoS) techniques prevent authorized users from accessing information, usually by flooding network devices (computers and servers) with data. DoS is also applicable to OT systems.
  • Man-in-the-middle attempts acting as a form of active eavesdropping attack, in which the attacker intercepts to read or modify data communications to masquerade as one or more of the ship’s entities involved.
  • Spoofing attacks where a false signal is broadcasted with the intent to mislead the victim receiver, such as AIS or a Global Positioning System.
  • Sophisticated attacks are conducted on the navigation network and surveillance systems since many of them are integrated into shoreside networks for updating and provision of services purposes.
  • Supply chain attacks.
  • The analysis of the existing cyberincidents clearly suggests the potential maritime systems that can be targeted. A maritime cybersituational awareness (MCSA) picture has to be established for effective cyberthreat detection against vulnerable navigational and surveillance systems. Subsequent sections will examine if data fusion from the relevant maritime sensors can enhance MCSA.

4. Findings of the Literature Review Related to the Maritime Data Fusion

The effective identification of the attack landscape in the maritime domain provides insights into potential cyberthreats. The knowledge gained can provide initial direction to cyberincidents, as well as drive threat detection and further analysis. Because the term “maritime data” can have a wide range of interpretations, it was necessary to define what these data entail. As such, the analysis of the threat landscape was used to clarify which systems/sensors are used for safe navigation and effective surveillance and to identify their vulnerabilities. Mandatory maritime sensors include radar and AIS, according to the SOLAS convention [37]. Therefore, to identify the relevant papers for maritime data fusion, the search criterion “radar and AIS fusion” was mainly utilized to discover the relations between radar and AIS in the context of data fusion.
The findings of this extensive literature review were used to investigate the application of data fusion and to identify the data that should be collected. These data could point the way toward establishing both a reliable MSA and an effective real-/near-real-time cyberincident detection mechanism. Therefore, as mentioned in the Section 2 above, the analysis was performed according to [20], considering the key elements of data fusion, including purposes, data sources, and operations.

4.1. Purpose

“Radar and AIS fusion” can improve situational awareness by minimizing errors introduced by specific sensor accuracy. Furthermore, data correlation provides additional intelligence capable of improving the security and safety of maritime means. The authors of this work discovered and mapped, in Table 2, ten categories related to the purpose of data fusion based on an examination of the collected material. Figure 5 shows an illustration of the map. These ten main categories were divided into three groups: target tracking, intelligence, and security and safety.
Focusing on security and safety, AIS/radar data fusion could ensure safety on board, safe navigation, and accurate positioning. Safe navigation and accurate positioning are some of the most essential factors for achieving secure behavior at sea. In the same manner, the localization accuracy [38] and collision avoidance are also examined, along with the tracking on the ECDIS view [39].
For the detection of AIS anomalies, real-/near-real-time and historical data are used. As for the real-/near real-time data process, AIS spoofing is classified as an incident that could be related to malicious cyberactivities. The detection of AIS spoofing is examined in [40,41,42]. Maritime mobile service identity (MMSI) spoofing is examined in [43]. Also, the transmission of erroneous AIS messages could be realized as in [44], and the AIS messages’ falsification can be detected as in refs. [45,46]. In addition to that, the detection of the intended AIS on/off switch is discussed in ref. [47].
The exploration of historical AIS data has been used mostly to improve the accuracy of vessel positioning information. This analysis can be also part of a malicious cyberdetection mechanism. As with the algorithmic process of historical AIS data, it is possible to perform self-reporting, vessel trajectory reconstruction [48], or learning [49] or to detect suspicious vessel activities [50]. Historical data could be also used to understand the behavior of the ship [51,52]. In addition to the non-real-time analysis, AIS data have been studied in the context of maritime image processing [53].
As already mentioned, the maritime domain contains anomalies, which are not AIS related. An approach presented in ref. [54] demonstrates how an implementation using the ELK stack (Elasticsearch, Logstash, Kibana) can be used for detecting maritime anomalies. The strange/suspicious kinematic behavior of a ship, the dangerous maneuvers, malfunctions of industrial (including marine engines) or electronic equipment, and security incidents are typical anomalies. According to the findings, data fusion has been utilized for security purposes, for both the detection and analysis of maritime anomalies including AIS.
From the cybersecurity perspective, the application of data fusion for the detection of maritime cyberincidents is partially examined. The ISOLA project enforces mechanisms to detect, among others, cyberincidents impacting the information technology on board passenger ships [55]. In addition to the existing literature, this paper describes an algorithm that uses maritime data fusion of navigational and surveillance sensors, contributing to the existing research background for the following purposes:
  • It specifies the sensors used (radar, AIS, and direction finding (DF)).
  • It is capable of cyberincidents’ real-time detection related to maritime OT systems.
  • It can be used on board and ashore.
Table 2. Purposes of AIS/radar data fusion.
Table 2. Purposes of AIS/radar data fusion.
A/APurpose of AIS/Radar Data FusionRepresentative Publications
1.Improve miss the target/false alarms/noisy observations[56,57,58,59,60,61,62,63,64,65]
2.Ensure safety/navigation/positioning[38,39,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88,89,90,91,92,93,94,95,96,97]
3.Solve track association problem[15,59,67,68,98,99,100,101,102,103,104,105,106,107]
4.Improve reliability and accuracy of tracking[59,69,80,103,108,109,110,111,112,113,114,115,116,117,118,119,120,121,122,123,124,125,126,127,128,129,130,131,132,133,134,135,136,137,138,139,140,141,142,143,144,145,146,147,148,149,150] (prevent the creation of duplicate tracks in OTH distances)
5.Process maritime image[53,57,151,152,153,154,155,156,157,158,159,160,161]
6.Predict vessel trajectory—behavior [162,163,164,165,166,167,168,169,170,171,172,173,174,175,176,177,178,179,180,181,182,183,184,185,186,187,188,189,190]
7.Exploit knowledge on historical vessel positioning information[49,50,51,72,98,101,120,169,171,191,192,193,194,195,196,197,198,199,200,201]
8.Detect AIS anomalies [40,41,42,43,45,46,47,48,165,167,202,203,204,205,206,207,208,209,210,211,212,213,214,215,216,217,218,219,220,221]
9.Detect maritime anomaly [44,47,52,54,121,164,165,199,205,211,222,223,224,225,226,227,228,229,230,231,232,233,234,235,236,237,238,239,240]
10.Detect cyberthreat [55,241,242,243]

4.2. Data Sources

In most cases, the AIS is considered the primary sensor for maritime surveillance. The reason is that the AIS is used for passive detection purposes and the identification of unknown tracks detected by radar. The usage of both radar and AIS information provides the composition of the maritime picture.
As depicted in Figure 6, the AIS is placed at the center of the map, connected with all the sensors found in the literature. The AIS is separated into two main types, land and satellite AIS. This distinction is essential due to the different possible connections with other sensors. The concurrent fusion of data from both AIS types (satellite and land) is also reported in ref. [100]. Furthermore, the carried-out analysis suggests the representative connections, illustrated in Figure 6. High-frequency surface wave radar (HFSWR) and synthetic aperture radars (SARs) are the most commonly used sensors, especially for over the horizon (OTH) operations. In recent years, lidar radars are also used on board USVs. As presented in Figure 6, data from most of the common radar types are fused with AIS sensors, land or satellite AIS. SAR can be used for maritime surveillance when carried by airborne and satellite means. Data fusion aims mostly to achieve the recognition of the maritime picture of an area of interest and provides the composition in a maritime center.
Moreover, in most merchant shipping applications, the data fusion on board a ship involves only X-band or S-band marine radars and AIS, integrated with the ECDIS (or a similar navigation plotter). In the literature, when referring to radar and AIS fusion on board a ship, like in [39], the type of radar used is not typically mentioned.
The analysis also indicates solutions using SIGINT equipment to analyze the AIS signal, such as direction finders (DF) for AIS/GNSS spoofing mitigation [244] and localization/positional purposes [245,246]. A key observation stemming from the dataset analysis is that multisensory data fusion is used for AIS anomaly detection to increase the reliability of the recognized maritime picture. In this case, the gap that has been identified is to use AIS, radar, and SIGINT data for the enhancement of maritime cybersecurity and the effective detection of cyberincidents.

4.3. Operation

This section provides insights into how data can be processed to perform specific operations. In other words, the operator defines the method that should be followed to implement the data fusion algorithm for the purposes mentioned in Section 4.1. To do this, one should examine the existing literature, focusing on the implemented algorithms. The focus of this study is the investigation if the algorithms can be used for security purposes, including the detection of cyberincidents. Consequently, authors have identified the application of algorithms and have categorized them into three main types: statistical methods, neural networks, and fuzzy logic, to create three main categories of operations, as follows:
Statistical Methods/Algorithms: Data fusion is implemented using statistical algorithms and/or methods that are used for tracking, kinematic analysis, and probability calculations. For tracking, generic algorithms provide statistical calculations, as mentioned in Table 3. Other algorithms are based on Bayesian fusion, Bernoulli filter, or the joint probabilistic division association (JPDA). An additional implementation uses risk as a threshold for the statistical process [195]. Special applications of Bayesian (BN) fusion have been identified as the dynamic BN [117] and the combination of BN with the sum-product algorithm [109]. Finally, some algorithms are relevant for prediction purposes [247].
For the kinematic analysis, most of the implementations are based on trajectory analysis, like trajectory clustering [171] or similarity [179]. Kalman filters, the Ornstein–Uhlenbeck target motion model, and the Gaussian mixture model are also used for kinematic behavior analysis. For probability calculation, the JPDA method and maximum likelihood [59] are also used.
Neural networks and models: Neural models are implemented for prediction purposes, decision making, and accurate calculations. In this context, belief propagation algorithms [38,56,67] and the Ornstein-Uhlenbeck target motion model [162,203] have been used for decision support operations and prediction purposes. Similarly, for prediction purposes, recurrent neural algorithms have also been utilized.
Fuzzy Logic: Fuzzy logic is also utilized in the context of maritime data fusion. Research works [99,116] implement fuzzy multi-factor logic for correlation purposes.
The combination of data and refinement of information aims to increase the likelihood of detecting a cyberattack against surveillance and navigation systems. Detecting a cyberincident will support decision-making related to response and recovery actions, increasing the possibility for operational continuity.
The mapping of the operations, as illustrated in Figure 7, provides a representative situation of the methods/algorithms used and the relative operations, concluding the following:
  • Most of the algorithms are based on statistical processing. In this category, multiple methods have been used, for tracking purposes, analysis of the kinematic behavior of ships, and probabilistic calculations.
  • For safety and security purposes, the kinematic behavior was analyzed using trajectory analysis among other well-known methods (e.g., Kalman filters, Ornstein-Uhlenbeck). Additionally, research works applied neural networks for the prediction of anomalies or security incidents.
  • Statistical methods, neural networks, and fuzzy logic have been used for the detection of maritime anomalies. It is considered that similar capabilities exist for the real-/near-real-time detection of cyberincidents.
  • To detect cyberincidents, statistical algorithms can be employed to identify anomalies in sensor status or data flow, such as through Bayesian fusion [55], or to recognize network attacks [243]. Additionally, these statistical methods can calculate threshold values or percentages to determine if anomalies are due to a cyberincident. In current applications, the AIS is the sensor typically involved [241]. Furthermore, neural networks are utilized to predict potential cyberthreats and to examine data integrity. If the detection algorithms are integrated into management systems such as the ECDIS, they can enhance the maritime situational awareness, thereby improving the MCSA [256].

4.4. Overall Analysis

Considering the analysis of the relevant manuscripts with the three key elements above (data sources, purpose, and operation), one can conclude the following:
  • Common elements used for MSA, such as radar, AIS [257], and SIGINT data, could be fused to enhance cyberthreat detection capabilities. Thus, sensors used for MSA can also be used for MCSA.
  • Depending on the maritime sensor used, the data expected by the system vary. Such data may include speed, location, course, and other parameters. Then, the correlation of the available maritime data can be used to investigate the vulnerability exploitation of any involved sensor. In situations where the target cannot be detected by radar, which is considered the primary/active sensor, the algorithms should be able to clarify if the target is identified by AIS. For this purpose, statistical calculations can verify the validity and reliability of the data and calculate the cyber risk. Bayesian fusion, Kalman filters, and Gaussian models are only part of the available solutions for such operations, as presented in Section 4.3. When the target cannot be detected by either radar or AIS, the use of direction finding (DF) is suggested to provide signal intelligence (SIGINT) data for further examination of the unknown’s track location. Consequently, the data fusion of radar, AIS, and DF is intended to provide better capabilities to identify/classify the navigational behavior [258].
  • The aim of the fusion algorithms is to detect cyberthreats targeting the main elements used for maritime surveillance and navigation systems, such as AIS, ECDIS, and Radar/ARPA. Such detection processes should be applicable in real time or near-real time, using relevant mechanisms. In addition, the statistical or behavioral analysis of the maritime data (sensors with gray color in Figure 8) can be useful for the long-term and large-scale integration of data, permitting the spatiotemporal analysis to determine and classify a maritime anomaly including cyberthreats [259,260]. For example, possible use cases for each system/sensor include the following:
    Detection of AIS spoofing, hijacking, data manipulation, and denial of service (DoS) [261]. Incidents include the sudden change of AIS parameters, AIS spoofing, and AIS transponder on/off as a prior action for a ship to engage in illegal activities, etc.
    Detection of malware attacks against ECDIS, causing the subversion of sensor data and misrepresentation and positioning spoofing [261].
    Detection of DoS and obfuscation attacks against radar or other electronic warfare attacks such as jamming [34].

5. Future Directions

The aim of this survey paper was to examine the existing combination of sensors/systems, including AIS and radar, operating on ships and onshore maritime centers that can be used for detecting cyberattacks. Furthermore, a data fusion approach was presented that can make use of the available maritime sensor information for the purpose of cyberthreat detection. The knowledge gained can drive the design of new threat detection endeavors, focusing on the timely detection of cyberthreats to enhance an organization’s resilience and responsiveness to restore the availability of affected operations and contribute to reliable decision-making [262]. Future investigations will include the detailed presentation of the implementation and evaluation of the algorithm in real/near-real time for the detection of cyberattacks in the integrated bridge systems (maritime OT). Investigations will be supported through a maritime cyber range, an environment that can provide a realistic simulation environment that can be further be utilized for training purposes. The need to enhance the knowledge and skills of IT/non-IT personnel and decision-makers on emerging maritime cyberthreats is crucial [263]. This can be achieved by designing cybersecurity curricula with engaging learning material and activities [264] that are developed over a maritime cyber range, effectively enhancing competencies related to threat detection and response [265].

6. Conclusions

Cyberattacks in the maritime domain may cause a serious impact on the security of a maritime asset but also may change the safety situation of the maritime asset, especially the ships. In the case of a successful cyberattack against a maritime system/asset, the incident may endanger human lives or impact the global supply chain and economy. This work investigated the fusion of radar, AIS, and SIGINT data and provided insights as to how these data could be transformed and utilized to effectively detect cyberincidents in real/near-real time and achieve not only MSA but also MCSA. Finally, the potential capabilities of data fusion algorithms are determined, for the purpose of detecting cyberincidents, against maritime surveillance and navigation systems.

Author Contributions

Conceptualization, G.P., E.S. and S.S.; methodology, G.P., E.S. and S.S.; investigation, G.P.; resources, G.P.; writing—original draft preparation, G.P.; writing—review and editing, E.S. and S.S.; visualization, G.P.; supervision, E.S. and S.S.; project administration, S.S.; funding acquisition, S.S. All authors have read and agreed to the published version of the manuscript.

Funding

Funded by the European Union (Grant Agreement Nr. 101128049, SecAwarenessTruss Project). Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union or the Health and Digital Executive Agency. Neither the European Union nor the granting authority can be held responsible for them.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

No new data were created.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. MSC-FAL.1-Circ.3—Guidelines on Maritime Cyber Risk Management (Secretariat).pdf. Available online: https://wwwcdn.imo.org/localresources/en/OurWork/Security/Documents/MSC-FAL.1-Circ.3-Rev.2%20-%20Guidelines%20On%20Maritime%20Cyber%20Risk%20Management%20(Secretariat).pdf (accessed on 23 October 2021).
  2. The Guidelines on Cyber Security Onboard Ships. Available online: https://www.bimco.org/about-us-and-our-members/publications/the-guidelines-on-cyber-security-onboard-ships (accessed on 23 October 2021).
  3. Höyhtyä, M.; Huusko, J.; Kiviranta, M.; Solberg, K.; Rokka, J. Connectivity for autonomous ships: Architecture, use cases, and research challenges. In Proceedings of the 2017 International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Republic of Korea, 18–20 October 2017; pp. 345–350. [Google Scholar] [CrossRef]
  4. Silverajan, B.; Ocak, M.; Nagel, B. Cybersecurity Attacks and Defences for Unmanned Smart Ships. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 30 July–3 August 2018; pp. 15–20. [Google Scholar] [CrossRef]
  5. Caprolu, M.; Pietro, R.D.; Raponi, S.; Sciancalepore, S.; Tedeschi, P. Vessels Cybersecurity: Issues, Challenges, and the Road Ahead. IEEE Commun. Mag. 2020, 58, 90–96. [Google Scholar] [CrossRef]
  6. Satellite Internet Market: Global Industry Analysis and Forecast 2021–2027: By Frequency Band, Bandwidth, Orbit, End User and Region. Maximize Market Research. Available online: https://www.maximizemarketresearch.com/market-report/satellite-internet-market/125907/ (accessed on 30 January 2022).
  7. Mednikarov, B.; Tsonev, Y.; Lazarov, A. Analysis of Cybersecurity Issues in the Maritime Industry. ISIJ 2020, 47, 27–43. [Google Scholar] [CrossRef]
  8. Kessler, G.C.; Craiger, J.P.; Haass, J.C. A Taxonomy Framework for Maritime Cybersecurity: A Demonstration Using the Automatic Identification System. Trans. Nav. 2018, 12, 429–437. [Google Scholar] [CrossRef]
  9. MITRE ATT&CK®. Available online: https://attack.mitre.org/ (accessed on 14 May 2023).
  10. Cyber Kill Chain®|Lockheed Martin. Available online: https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html (accessed on 14 May 2023).
  11. Jacq, O.; Boudvin, X.; Brosset, D.; Kermarrec, Y.; Simonin, J. Detecting and Hunting Cyberthreats in a Maritime Environment: Specification and Experimentation of a Maritime Cybersecurity Operations Centre. In Proceedings of the 2018 2nd Cyber Security in Networking Conference (CSNet), Paris, France, 24–26 October 2018; pp. 1–8. [Google Scholar] [CrossRef]
  12. Jacq, O.; Brosset, D.; Kermarrec, Y.; Simonin, J. Cyber attacks real time detection: Towards a Cyber Situational Awareness for naval systems. In Proceedings of the 2019 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA), Oxford, UK, 3–4 June 2019; pp. 1–2. [Google Scholar] [CrossRef]
  13. Balduzzi, M.; Pasta, A.; Wilhoit, K. A security evaluation of AIS automated identification system. In Proceedings of the 30th Annual Computer Security Applications Conference, New Orleans, LO, USA, 8–12 December 2014; pp. 436–445. [Google Scholar] [CrossRef]
  14. Kessler, G.C. Cybersecurity in the Maritime Domain; Embry-Riddle Aeronautical University: Daytona Beach, FL, USA, 2019; p. 10. [Google Scholar]
  15. Xu, Z.; Li, J.; Chen, Y. Survey of track association of radar and AIS. In Proceedings of the 2017 2nd International Conference on Image, Vision and Computing (ICIVC), Chengdu, China, 2–4 June 2017; pp. 960–964. [Google Scholar] [CrossRef]
  16. Lin, C.; Dong, F.; Hai, L.; Le, L.; Zhou, J.; Ou, Y. AIS Information Decoding and Fuzzy Fusion Processing with Marine Radar. In Proceedings of the 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, Dalian, China, 12–17 October 2008; pp. 1–5. [Google Scholar] [CrossRef]
  17. Svilicic, B.; Brcic, D.; Zuskin, S.; Kalebic, D. Raising awareness on cyber security of ECDIS. TransNav Int. J. Mar. Navig. Saf. Sea Transp. 2019, 13, 231–236. [Google Scholar] [CrossRef]
  18. Estay, D.A.S.; Sahay, R.; Barfod, M.B.; Jensen, C.D. A systematic review of cyber-resilience assessment frameworks. Comput. Secur. 2020, 97, 101996. [Google Scholar] [CrossRef]
  19. Pawlicka, A.; Pawlicki, M.; Kozik, R.; Choraś, R.S. A Systematic Review of Recommender Systems and Their Applications in Cybersecurity. Sensors 2021, 21, 5248. [Google Scholar] [CrossRef]
  20. Meng, T.; Jing, X.; Yan, Z.; Pedrycz, W. A survey on machine learning for data fusion. Inf. Fusion 2020, 57, 115–129. [Google Scholar] [CrossRef]
  21. European Union Agency for Cybersecurity. Cyber Risk Management for Ports: Guidelines for Cyber Security in the Maritime Sector; LU Publications Office: Krona, Sweden, 2020; Available online: https://data.europa.eu/doi/10.2824/671060 (accessed on 11 February 2022).
  22. Armando, A.; Henauer, M.; Rigoni, A. Next Generation CERTs; IOS Press: Amsterdam, The Netherlands, 2019. [Google Scholar]
  23. Maritime Bulk Liquids Transfer Cybersecurity Framework Profile. United States. Coast Guard. Available online: https://www.hsdl.org/?abstract&did=797741 (accessed on 12 February 2022).
  24. Potamos, G.; Theodoulou, S.; Stavrou, E.; Stavrou, S. Maritime Cyber Threats Detection Framework: Building Capabilities. In Information Security Education—Adapting to the Fourth Industrial Revolution; Drevin, L., Miloslavskaya, N., Leung, W.S., von Solms, S., Eds.; Springer International Publishing: Cham, Switzerland, 2022; pp. 107–129. [Google Scholar] [CrossRef]
  25. DiRenzo, J.; Goward, D.A.; Roberts, F.S. The little-known challenge of maritime cyber security. In Proceedings of the 2015 6th International Conference on Information, Intelligence, Systems and Applications (IISA), Corfu, Greece, 6–8 July 2015; pp. 1–5. [Google Scholar] [CrossRef]
  26. Meland, P.H.; Bernsmed, K.; Wille, E.; Rødseth, Ø.; Nesheim, D.A. A Retrospective Analysis of Maritime Cyber Security Incidents. TransNav Int. J. Mar. Navig. Saf. Od Sea Transp. 2021, 15, 519. [Google Scholar] [CrossRef]
  27. Potamos, G.; Peratikou, A.; Stavrou, S. Towards a Maritime Cyber Range training environment. In Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), Virtual, 26–28 July 2021; pp. 180–185. [Google Scholar] [CrossRef]
  28. Preparing for Cyber Battleships—Electronic Chart Display and Information System Security. Available online: https://research.nccgroup.com/wp-content/uploads/2020/07/2014-03-03_-_ncc_group_-_whitepaper_-_cyber_battle_ship_v1-0.pdf (accessed on 24 May 2023).
  29. Jones, K.D.; Tam, K.; Papadaki, M. Threats and Impacts in Maritime Cyber Security. Eng. Technol. Ref. 2012, 1, 1–11. [Google Scholar] [CrossRef]
  30. McAfee. Threat Report 2015-2Q.pdf; McAfee: San Jose, CA, USA, 2015. [Google Scholar]
  31. Hyra, B. Analyzing the Attack Surface of Ships; Technical University of Denmark: Kongens Lyngby, Denmark, 2019; p. 166. [Google Scholar]
  32. Global Shipping Feels Fallout from Maersk Cyber Attack. Reuters, 29 June 2017. Available online: https://www.reuters.com/article/us-cyber-attack-maersk-idUSKBN19K2LE (accessed on 28 October 2021).
  33. Maritime Cyber Attacks Increase by 900% In Three Years|Hellenic Shipping News Worldwide. Available online: https://www.hellenicshippingnews.com/maritime-cyber-attacks-increase-by-900-in-three-years/ (accessed on 28 October 2021).
  34. Tam, K.; Jones, K. MaCRA: A model-based framework for maritime cyber-risk assessment. WMU J. Marit. Aff. 2019, 18, 129–163. [Google Scholar] [CrossRef]
  35. Heckman, M.R.; McCready, J.; Mayhew, D.; Callahan, L. Chapter 32: Toward a Maritime Cyber Security Compliance Regime; University of San Diego: San Diego, CA, USA, 2022; p. 20. [Google Scholar]
  36. Zăgan, R.; Raicu, G.; Hanzu-Pazara, R.; Enache, S. Realities in Maritime Domain Regarding Cyber Security Concept. Adv. Eng. Forum 2018, 27, 221–228. [Google Scholar] [CrossRef]
  37. SOLAS Chapter V, Regulation 19. Available online: https://www.navcen.uscg.gov/sites/default/files/pdf/AIS/SOLAS.V.19.2.1-5.pdf (accessed on 28 October 2021).
  38. Meyer, F.; Braca, P.; Willett, P.; Hlawatsch, F. A Scalable Algorithm for Tracking an Unknown Number of Targets Using Multiple Sensors. IEEE Trans. Signal Process. 2017, 65, 3478–3493. [Google Scholar] [CrossRef]
  39. Kazimierski, W.; Stateczny, A. Radar and Automatic Identification System Track Fusion in an Electronic Chart Display and Information System. J. Navig. 2015, 68, 1141–1154. [Google Scholar] [CrossRef]
  40. d’Afflisio, E.; Braca, P.; Willett, P. Malicious AIS Spoofing and Abnormal Stealth Deviations: A Comprehensive Statistical Framework for Maritime Anomaly Detection. IEEE Trans. Aerosp. Electron. Syst. 2021, 57, 2093–2108. [Google Scholar] [CrossRef]
  41. Iphar, C.; Napoli, A.; Ray, C. A method for integrity assessment of information in a worldwide maritime localization system. In Proceedings of the 19th AGILE International Conference on Geographic Information Science (AGILE 2016), Helsinki, Finland, 14–17 June 2016; Available online: https://hal-mines-paristech.archives-ouvertes.fr/hal-01421920 (accessed on 24 May 2023).
  42. d’Afflisio, E.; Braca, P.; Chisci, L.; Battistelli, G.; Willett, P. Maritime Anomaly Detection of Malicious Data Spoofing and Stealth Deviations from Nominal Route Exploiting Heterogeneous Sources of Information. In Proceedings of the 2021 IEEE 24th International Conference on Information Fusion (FUSION), Sun City, South Africa, 1–4 November 2021; pp. 1–7. [Google Scholar] [CrossRef]
  43. Zhang, T.; Zhao, S.; Cheng, B.; Chen, J. Detection of AIS Closing Behavior and MMSI Spoofing Behavior of Ships Based on Spatiotemporal Data. Remote Sens. 2020, 12, 702. [Google Scholar] [CrossRef]
  44. Singh, A.K.; Aggarwal, V.; Tiwari, P. Coastal surveillance in multi sensor environment: A design approach. In Proceedings of the 2016 3rd International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, India, 3–5 March 2016; pp. 1–6. [Google Scholar] [CrossRef]
  45. Iphar, C.; Napoli, A.; Ray, C. Integrity Assessment of a Worldwide Maritime Tracking System for a Geospatial Analysis at Sea. In Proceedings of the 20th AGILE International Conference on Geographic Information Science (AGILE 2017), Wageningen, The Netherlands, 10–12 May 2017; pp. 1–4. Available online: https://hal-mines-paristech.archives-ouvertes.fr/hal-01534116 (accessed on 31 October 2021).
  46. Ray, C.; Iphar, C.; Napoli, A. Methodology for Real-Time Detection of AIS Falsification. In Proceedings of the Maritime Knowledge Discovery and Anomaly Detection Workshop, Ispra, Italy, 5–6 July 2016; p. 74. [Google Scholar]
  47. Kontopoulos, I.; Chatzikokolakis, K.; Zissis, D.; Tserpes, K.; Spiliopoulos, G. Real-time maritime anomaly detection: Detecting intentional AIS switch-off. Int. J. Big Data Intell. 2020, 7, 12. [Google Scholar] [CrossRef]
  48. Nguyen, D.; Vadaine, R.; Hajduch, G.; Garello, R.; Fablet, R. An AIS-based Deep Learning Model for Vessel Monitoring. In Proceedings of the NATO CRME Maritime Big Data Workshop, La Spezia, Italy, 9–10 May 2018; Available online: https://hal-imt-atlantique.archives-ouvertes.fr/hal-01863958 (accessed on 31 October 2021).
  49. Opitz, F.; Dastner, K.; Roseneckh-Kohler, B.v.H.z.; Schmid, E. Data Analytics and Machine Learning in Wide Area Surveillance Systems. In Proceedings of the 2019 20th International Radar Symposium (IRS), Ulm, Germany, 26–28 June 2019; pp. 1–10. [Google Scholar] [CrossRef]
  50. Mantecon, T.; Casals, D.; Navarro-Corcuera, J.J.; Del-Blanco, C.R.; Jaureguizar, F. Deep Learning to Enhance Maritime Situation Awareness. In Proceedings of the 2019 20th International Radar Symposium (IRS), Ulm, Germany, 26–28 June 2019; pp. 1–8. [Google Scholar] [CrossRef]
  51. Lamm, A.; Hahn, A. Detecting maneuvers in maritime observation data with CUSUM. In Proceedings of the 2017 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Bilbao, Spain, 18–20 December 2017; pp. 122–127. [Google Scholar] [CrossRef]
  52. Scrofani, J.W.; Tummala, M.; Miller, D.; Shifflett, D.; McEachen, J.C. Behavioral detection in the maritime domain. In Proceedings of the 2015 10th System of Systems Engineering Conference (SoSE), San Antonio, TX, USA, 17–20 May 2015; pp. 380–385. [Google Scholar] [CrossRef]
  53. Lebona, B.; Kleynhans, W.; Celik, T.; Mdakane, L. Ship detection using VIIRS sensor specific data. In Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium (IGARSS), Beijing, China, 10–15 July 2016; pp. 1245–1247. [Google Scholar] [CrossRef]
  54. Giatrakos, N.; Deligiannakis, A.; Bereta, K.; Vodas, M.; Zissis, D.; Alevizos, E.; Akasiadis, C.; Artikis, A. Processing Big Data in Motion: Core Components and System Architectures with Applications to the Maritime Domain. In Technologies and Applications for Big Data Value; Curry, E., Auer, S., Berre, A.J., Metzger, A., Perez, M.S., Zillner, S., Eds.; Springer International Publishing: Cham, Switzerland, 2022; pp. 497–518. [Google Scholar] [CrossRef]
  55. Laso, P.M.; Salmon, L.; Bozhilova, M.; Ivanov, I.; Stoianov, N.; Velev, G.; Claramunt, C.; Yanakiev, Y. ISOLA: An Innovative Approach to Cyber Threat Detection in Cruise Shipping. In Developments and Advances in Defense and Security; Rocha, Á., Fajardo-Toro, C.H., Rodríguez, J.M.R., Eds.; Springer: Singapore, 2022; Volume 255, pp. 71–81. [Google Scholar] [CrossRef]
  56. Gaglione, D.; Braca, P.; Soldi, G. Belief Propagation Based AIS/Radar Data Fusion for Multi-Target Tracking. In Proceedings of the 2018 21st International Conference on Information Fusion (FUSION), Cambridge, UK, 10–13 July 2018; pp. 2143–2150. [Google Scholar] [CrossRef]
  57. Achiri, L.; Guida, R.; Iervolino, P. SAR and AIS Fusion for Maritime Surveillance. In Proceedings of the 2018 IEEE 4th International Forum on Research and Technology for Society and Industry (RTSI), Palermo, Italy, 10–13 September 2018; pp. 1–4. [Google Scholar] [CrossRef]
  58. Liu, C.; Xu, T.; Yao, T.; Deng, Z.; Liu, J. Data Association of AIS and Radar Based on Multi-factor Fuzzy Judgment and Gray Correlation Grade. In Communications, Signal Processing, and Systems; Liang, Q., Mu, J., Jia, M., Wang, W., Feng, X., Zhang, B., Eds.; Lecture Notes in Electrical Engineering; Springer: Singapore, 2019; pp. 1315–1322. [Google Scholar] [CrossRef]
  59. Zhang, H.; Liu, Y.; Ji, Y.; Wang, L.; Zhang, J. Multi-Feature Maximum Likelihood Association with Space-borne SAR, HFSWR and AIS. J. Navig. 2016, 70, 359–378. [Google Scholar] [CrossRef]
  60. Xu, W.; Zhong, D.; Wu, S.; Ni, H. A track fusion method of a vessel. In Proceedings of the Sixth International Conference on Electronics and Information Engineering, Dalian, China, 28–30 December; Zhang, Q., Ed.; SPIE: Bellingham, WA, USA, 2015; p. 97941E. [Google Scholar] [CrossRef]
  61. Vieira, F.M.; Vincent, F.; Tourneret, J.Y.; Bonacci, D.; Spigai, M.; Ansart, M.; Richard, J. Improving synthetic aperture radar detection using the automatic identification system. In Proceedings of the 2017 18th International Radar Symposium (IRS), Prague, Czech Republic, 28–30 June 2017; pp. 1–9. [Google Scholar] [CrossRef]
  62. Jussila, J.; Lehtonen, T.; Laitinen, J.; Makkonen, M.; Frank, L. Visualising maritime vessel open data for better situational awareness in ice conditions. In Proceedings of the 22nd International Academic Mindtrek Conference, Mindtrek ’18, New York, NY, USA, 10–11 October 2018; Association for Computing Machinery: New York, NY, USA; pp. 92–99. [Google Scholar] [CrossRef]
  63. Habib, M.; Wanders, B.; Flokstra, J.; van Keulen, M. Incremental Data Uncertainty Handling Using Evidence Combination: A Case Study on Maritime Data Reasoning. In Proceedings of the 2015 26th International Workshop on Database and Expert Systems Applications (DEXA), Valencia, Spain, 1–4 September 2015; pp. 147–151. [Google Scholar] [CrossRef]
  64. Gaglione, D.; Braca, P.; Soldi, G.; Meyer, F.; Hlawatsch, F.; Win, M.Z. Fusion of Sensor Measurements and Target-Provided Information in Multitarget Tracking. IEEE Trans. Signal Process. 2022, 70, 322–336. [Google Scholar] [CrossRef]
  65. Yang, Z.; Zhou, H.; Tian, Y.; Huang, W.; Shen, W. Improving Ship Detection in Clutter-Edge and Multi-Target Scenarios for High-Frequency Radar. Remote Sens. 2021, 13, 4305. [Google Scholar] [CrossRef]
  66. Hyla, T.; Kazimierski, W.; Wawrzyniak, N. Analysis of radar integration possibilities in inland mobile navigation. In Proceedings of the 2015 16th International Radar Symposium (IRS), Dresden, Germany, 24–26 June 2015; pp. 864–869. [Google Scholar] [CrossRef]
  67. Cao, X.; Gao, S.; Jiang, Z.; Chen, L.; Wang, Y. Fusion of the Targets of AIS and Radar Based on a Stacked Auto-Encoder. Indian J. Mar. Sci. 2018, 47, 12. [Google Scholar]
  68. Kazimierski, W. Verification of neural approach to radar-AIS tracks association for maneuvering targets based on kinematic spatial information. In Proceedings of the 2017 18th International Radar Symposium (IRS), Prague, Czech Republic, 28–30 June 2017; pp. 1–10. [Google Scholar] [CrossRef]
  69. Luo, P.-J.; Lv, Z.-Y. The channel collision avoidance radar based on semi-circular passed array. In Mechanical Engineering and Control Systems; World Scientific: Singapore, 2016; pp. 185–194. [Google Scholar] [CrossRef]
  70. Sakkopoulos, E.; Viennas, E.; Ioannou, Z.M.; Gkantouna, V.; Sourla, E.; Paschou, M.; Tsakalidis, A.; Tzimas, G.; Sioutas, S. Mobile Data Fusion for Maritime Surveillance. In Surveillance in Action; Karampelas, P., Bourlai, T., Eds.; Advanced Sciences and Technologies for Security Applications; Springer International Publishing: Cham, Switzerland, 2018; pp. 217–240. [Google Scholar] [CrossRef]
  71. Eisler, C.; Dobias, P.; MacNeil, K. A Surveillance Application of Satellite AIS—Utilizing a Parametric Model for Probability of Detection. In Proceedings of the 6th International Conference on Operations Research and Enterprise Systems, Porto, Portugal, 23–25 February 2017; pp. 211–218. [Google Scholar] [CrossRef]
  72. Tu, E.; Zhang, G.; Rachmawati, L.; Rajabally, E.; Huang, G.-B. Exploiting AIS Data for Intelligent Maritime Navigation: A Comprehensive Survey From Data to Methodology. IEEE Trans. Intell. Transport. Syst. 2018, 19, 1559–1582. [Google Scholar] [CrossRef]
  73. Coscia, P.; Palmieri, F.A.N.; Braca, P.; Millefiori, L.M.; Willett, P. Unsupervised Maritime Traffic Graph Learning with Mean-Reverting Stochastic Processes. In Proceedings of the 2018 21st International Conference on Information Fusion (FUSION), Cambridge, UK, 10–13 July 2018; pp. 1822–1828. [Google Scholar] [CrossRef]
  74. Mining Maritime Traffic Conflict Trajectories from a Massive AIS Data. Available online: https://link.springer.com/article/10.1007/s10115-019-01355-0 (accessed on 24 May 2023).
  75. Trivailo, O.; Brusch, S. EMSec: Real time services for maritime safety and security. CEAS Space J. 2019, 11, 1. [Google Scholar] [CrossRef]
  76. Guo, M.; Guo, C.; Zhang, C.; Zhang, D.; Gao, Z. Fusion of Ship Perceptual Information for Electronic Navigational Chart and Radar Images based on Deep Learning. J. Navig. 2019, 73, 192–211. [Google Scholar] [CrossRef]
  77. Li, X.; Xiao, Y.; Su, F.; Wu, W.; Zhou, L. AIS and VBD Data Fusion for Marine Fishing Intensity Mapping and Analysis in the Northern Part of the South China Sea. ISPRS Int. J. Geo Inf. 2021, 10, 277. [Google Scholar] [CrossRef]
  78. Liu, R.W.; Guo, Y.; Nie, J.; Hu, Q.; Xiong, Z.; Yu, H.; Guizani, M. Intelligent Edge-Enabled Efficient Multi-Source Data Fusion for Autonomous Surface Vehicles in Maritime Internet of Things. IEEE Trans. Green Commun. Netw. 2022, 6, 1574–1587. [Google Scholar] [CrossRef]
  79. Lazarowska, A. Registration of Navigational Data. Safe Trajectory Planning for Maritime Surface Ships, Springer Series on Naval Architecture, Marine Engineering, Shipbuilding and Shipping, Springer International Publishing: Cham, Switzerland, 2022; 105–120. [Google Scholar] [CrossRef]
  80. Miao, T.; Amam, E.E.; Slaets, P.; Pissoort, D.; Leuven, K. Multi-Target Tracking and Detection, fusing RADAR and AIS Signals using Poisson Multi-Bernoulli Mixture Tracking, in support of Autonomous Sailing. In Proceedings of the International Naval Engineering Conference & Exhibition (INEC), Delft, The Netherlands, 6–8 October 2020; pp. 1–13. [Google Scholar]
  81. Zhang, L.; Zhao, Y.; Fan, Y. Situation display system of USV auxiliary navigation based on virtual and reality fusion. In Proceedings of the 2022 7th International Conference on Automation, Control and Robotics Engineering (CACRE), Virtual, 15–16 July 2022; pp. 245–253. [Google Scholar] [CrossRef]
  82. Paladin, Z.; Kapidani, N.; Luksic, Z.; Mihailovic, A.; Scrima, P.; Jacobe de Naurois, C.; Laudy, C.; Rizogiannis, C.; Astyakopoulos, A.; Blum, A. Combined AI Capabilities for Enhancing Maritime Safety in a Common Information Sharing Environment. In Proceedings of the 35th Bled eConference Digital Restructuring and Human (Re)action, Bled, Slovenia, 26–29 June 2022; University of Maribor Press: Maribor, Slovenia, 2022; pp. 145–160. [Google Scholar] [CrossRef]
  83. Song, X.; Wang, X.; Liu, W.; Ma, F.; Huang, Z.; Xu, X. Research and Practice of Key Technologies of Inland Intelligent Ships. In Proceedings of the 2021 6th International Conference on Transportation Information and Safety (ICTIS), Wuhan, China, 22–24 October 2021; pp. 1482–1489. [Google Scholar] [CrossRef]
  84. Aubry, A.; Braca, P.; d’Afflisio, E.; De Maio, A.; Millefiori, L.M.; Willett, P.K. Optimal Opponent Stealth Trajectory Planning Based on an Efficient Optimization Technique. IEEE Trans. Signal Process. 2021, 69, 270–283. [Google Scholar] [CrossRef]
  85. Huang, W.; Xu, H.; Feng, J.; Wang, L. Research on Redundant Design Technique for USV Autonomous Control System. J. Phys. Conf. Ser. 2021, 2029, 012039. [Google Scholar] [CrossRef]
  86. Forti, N.; d’Afflisio, E.; Braca, P.; Millefiori, L.M.; Willett, P.; Carniel, S. Maritime Anomaly Detection in a Real-World Scenario: Ever Given Grounding in the Suez Canal. IEEE Trans. Intell. Transp. Syst. 2022, 23, 13904–13910. [Google Scholar] [CrossRef]
  87. Mihailović, A.; Kapidani, N.; Luksic, Z.; Tournier, R.; Vella, G.; Moutzouris, M.; De Souza, B.; Blum, A.; Paladin, Z. Planning a Case for Shared Data Retrieval across the European Maritime Common Information Sharing Environment. In Proceedings of the 2022 26th International Conference on Information Technology (IT), Hanoi, Vietnam, 19–22 February 2022; pp. 1–6. [Google Scholar] [CrossRef]
  88. Lazarowska, A. Verification of a deterministic ship’s safe trajectory planning algorithm from different ships’ perspectives and with changing strategies of target ships. TransNav Int. J. Mar. Navig. Saf. Sea Transp. 2021, 15, 623. [Google Scholar] [CrossRef]
  89. Lin, J.; Diekmann, P.; Framing, C.-E.; Zweigel, R.; Abel, D. Maritime Environment Perception Based on Deep Learning. IEEE Trans. Intell. Transp. Syst. 2022, 23, 15487–15497. [Google Scholar] [CrossRef]
  90. Shan, X.; Shan, Q.; Man, R.; Zuo, Y. Recognitions of collision avoidance for unmanned surface vessels with visible light camera using broad learning system. In Proceedings of the 2022 5th International Conference on Signal Processing and Machine Learning, in SPML ’22, Dalian, China, 4–6 August 2022; pp. 146–151. [Google Scholar] [CrossRef]
  91. Yang, P.; Duan, D.; Chen, C.; Cheng, X.; Yang, L. Multi-Sensor Multi-Vehicle (MSMV) Localization and Mobility Tracking for Autonomous Driving. IEEE Trans. Veh. Technol. 2020, 69, 14355–14364. [Google Scholar] [CrossRef]
  92. Banaszek, A.; Lisaj, A. The Concept of Advanced Maritime Integrated Data Processing System with Use of Neural Network Methods. Procedia Comput. Sci. 2021, 192, 2450–2459. [Google Scholar] [CrossRef]
  93. Faggioni, N.; Leonardi, N.; Ponzini, F.; Sebastiani, L.; Martelli, M. Obstacle Detection in Real and Synthetic Harbour Scenarios. In Modelling and Simulation for Autonomous Systems; Mazal, J., Fagiolini, A., Vasik, P., Turi, M., Bruzzone, A., Pickl, S., Neumann, V., Stodola, P., Eds.; Lecture Notes in Computer Science; Springer International Publishing: Cham, Switzerland, 2022; pp. 26–38. [Google Scholar] [CrossRef]
  94. Miao, T.; El Amam, E.; Slaets, P.; Pissoort, D. An improved real-time collision-avoidance algorithm based on Hybrid A* in a multi-object-encountering scenario for autonomous surface vessels. Ocean Eng. 2022, 255, 111406. [Google Scholar] [CrossRef]
  95. Szlapczynski, R.; Szlapczynska, J. A ship domain-based model of collision risk for near-miss detection and Collision Alert Systems. Reliab. Eng. Syst. Saf. 2021, 214, 107766. [Google Scholar] [CrossRef]
  96. Liu, Z.; Li, Y.; Dong, S.; Zhang, Z. Spatial logical relationship analysis model of ship Encounter space. Ocean Eng. 2021, 239, 109912. [Google Scholar] [CrossRef]
  97. Koszelew, J.; Karbowska-Chilinska, J.; Ostrowski, K.; Kuczyński, P.; Kulbiej, E.; Wołejsza, P. Beam Search Algorithm for Anti-Collision Trajectory Planning for Many-to-Many Encounter Situations with Autonomous Surface Vehicles. Sensors 2020, 20, 4115. [Google Scholar] [CrossRef] [PubMed]
  98. Qin, X.; Yan, M.; Zhu, D. Research on information fusion structure of radar and AIS. In Proceedings of the 2018 Chinese Control And Decision Conference (CCDC), Shenyang, China, 9–11 June 2018; p. 7. [Google Scholar]
  99. Karlsen, B.L.; Nielsen, E.; Pedersen, M.T. Fusion of Radar and Secondary Sensor Data Using Kinematic Models of Multiple Simultaneous Targets. In Proceedings of the 2015 Sensor Signal Processing for Defence (SSPD), Edinburgh, UK, 9–10 September 2015; pp. 1–5. [Google Scholar] [CrossRef]
  100. Nikolic, D.; Stojkovic, N.; Lekic, N. Maritime over the Horizon Sensor Integration: High Frequency Surface-Wave-Radar and Automatic Identification System Data Integration Algorithm. Sensors 2018, 18, 1147. [Google Scholar] [CrossRef] [PubMed]
  101. Kanellopoulos, S.A.; Katsoulis, S.; Molos, D.; Lampropoulos, V.; Margonis, C.; Dimitros, K.; Thomopoulos, S.C.A. OCULUS Sea TM: Integrated maritime surveillance platform. In Proceedings of the SPIE Defense + Security, Baltimore, MD, USA, 20–24 April 2015; p. 94740N. [Google Scholar] [CrossRef]
  102. Karlsen, B.L.; Nielsen, E.; Pedersen, M.T. Quality-of-service metrics for evaluating sensor fusion systems without ground truth. In Proceedings of the 2016 19th International Conference on Information Fusion (FUSION), Heidelberg, Germany, 5–8 July 2016; pp. 2251–2258. [Google Scholar]
  103. Vivone, G.; Braca, P. Joint Probabilistic Data Association Tracker for Extended Target Tracking Applied to X-Band Marine Radar Data. IEEE J. Ocean. Eng. 2016, 41, 1007–1019. [Google Scholar] [CrossRef]
  104. Liu, W.; Liu, Y.; Gunawan, B.A.; Bucknall, R. Practical Moving Target Detection in Maritime Environments Using Fuzzy Multi-sensor Data Fusion. Int. J. Fuzzy Syst. 2021, 23, 1860–1878. [Google Scholar] [CrossRef]
  105. Yang, Y.; Yang, F.; Sun, L.; Xiang, T.; Lv, P. Multi-target association algorithm of AIS-radar tracks using graph matching-based deep neural network. Ocean Eng. 2022, 266, 112208. [Google Scholar] [CrossRef]
  106. A Novel Hybrid Algorithm of Sea Object Classification Based on Multi-Sensor and Multi-Level Track. Available online: https://link.springer.com/article/10.1007/s40815-022-01252-9 (accessed on 4 November 2022).
  107. Sagild, J.A.; Hem, A.G.; Brekke, E.F. Counting Technique versus Single-Time Test for Track-to-Track Association. In Proceedings of the 2021 IEEE 24th International Conference on Information Fusion (FUSION), Sun City, South Africa, 1–4 November 2021; pp. 1–7. [Google Scholar] [CrossRef]
  108. Proposal of Neural Approach to Maritime Radar and Automatic Identification System Tracks Association—Kazimierski—2017—IET Radar, Sonar & Navigation. Available online: https://ietresearch.onlinelibrary.wiley.com/doi/full/10.1049/iet-rsn.2016.0409 (accessed on 24 May 2023).
  109. Soldi, G.; Gagione, D.; Meyer, F.; Hlawatsch, F.; Braca, P.; Fatina, A.; Win, M.Z. Heterogeneous Information Fusion for Multitarget Tracking Using the Sum-product Algorithm. In Proceedings of the ICASSP 2019—IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, UK, 12–17 May 2019; pp. 5471–5475. [Google Scholar] [CrossRef]
  110. Bustamante, A.L.; López, J.M.M.; Herrero, J.G. Player: An open source tool to simulate complex maritime environments to evaluate data fusion performance. Simul. Model. Pr. Theory 2017, 76, 3–21. [Google Scholar] [CrossRef]
  111. Zhang, H.; Liu, Y.; Ji, Y.; Wang, L. Vessel fusion tracking with a dual-frequency high-frequency surface wave radar and calibrated by an automatic identification system. Acta Oceanol. Sin. 2018, 37, 131–140. [Google Scholar] [CrossRef]
  112. Lin, X.; Zhang, C.; Xie, M.; Chen, N. Research on Calculation Algorithms of Sea Target Velocity and Course for Sea Radar. MATEC Web Conf. 2018, 175, 03044. [Google Scholar] [CrossRef]
  113. Fan, Y.; Xu, X.; Wang, C. Research on Multi-Attribute Information Fusion for the Dynamic State of Inland River Vessels. In Proceedings of the 2016 International Forum on Mechanical, Control and Automation (IFMCA 2016), Shenzhen, China, 30–31 December 2016; Atlantis Press: Beijing, China, 2017. [Google Scholar] [CrossRef]
  114. Jiang, B.; Sun, L.; Zhou, W.; Guan, J.; He, Y. A multi-target joint estimation method for radar calibration based on real-time AIS data. In Proceedings of the 2016 CIE International Conference on Radar (RADAR), Guangzhou, China, 10–13 October 2016; pp. 1–5. [Google Scholar] [CrossRef]
  115. Zheng, J.-C.; Wang, Y.; Lin, C.-C.; Zhang, X.-L.; Liu, J.; Ji, L.-W. A fusion algorithm of target dynamic information for asynchronous multi-sensors. Microsyst. Technol. 2018, 24, 3995–4005. [Google Scholar] [CrossRef]
  116. AIS and Radar Data Correlation Based on Multi-Factor Fuzzy and Gray Correlation. Microcomput. Its Appl. 2015, 34, 75–77. Available online: https://en.cnki.com.cn/Article_en/CJFDTotal-WXJY201521025.htm (accessed on 30 October 2021).
  117. Vasnier, K.; Mouaddib, A.-I.; Gatepaille, S.; Brunessaux, S. Multi-Level Information Fusion Approach with Dynamic Bayesian Networks for an Active Perception of the environment. In Proceedings of the 2018 21st International Conference on Information Fusion (FUSION), Cambridge, UK, 10–13 July 2018; pp. 1844–1850. [Google Scholar] [CrossRef]
  118. Siegert, G.; Banys, P.; Heymann, F. Improving the Maritime Traffic Situation Assessment for a Single Target in a Multisensor Environment. In Proceedings of the Maritime Knowledge Discovery and Anomaly Detection Workshop, Ispra, Italy, 5–6 July 2016. [Google Scholar]
  119. Braca, P.; Maresca, S.; Grasso, R.; Bryan, K.; Horstmann, J. Maritime surveillance with multiple over-the-horizon HFSW radars: An overview of recent experimentation. IEEE Aerosp. Electron. Syst. Mag. 2015, 30, 4–18. [Google Scholar] [CrossRef]
  120. Jinadasa, M.; Nisiwasala, S.; Senthinathan, S.; Arunatileka, S.; Sandaruwan, D. Framework for detection of anomalies in mass moving objects by non-technical users utilizing contextual & spatio-temporal data. In Proceedings of the 2017 Seventeenth International Conference on Advances in ICT for Emerging Regions (ICTer), Colombo, Sri Lanka, 6–9 September 2017; pp. 1–8. [Google Scholar] [CrossRef]
  121. Millefiori, L.M.; Braca, P.; Bryan, K.; Willett, P. Long-term vessel kinematics prediction exploiting mean-reverting processes. In Proceedings of the 2016 19th International Conference on Information Fusion (FUSION), Heidelberg, Germany, 5–8 July 2016; pp. 232–239. [Google Scholar]
  122. Heymann, F.; Hoth, J.; Banys, P.; Siegert, G. Validation of Radar Image Tracking Algorithms with Simulated Data. TransNav Int. J. Mar. Navig. Saf. Sea Transp. 2017, 11, 511–518. [Google Scholar] [CrossRef]
  123. Patino, L.; Ferryman, J. Loitering Behaviour Detection of Boats at Sea. In Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Honolulu, HI, USA, 21–26 July 2017; pp. 2169–2175. [Google Scholar] [CrossRef]
  124. Ma, R.; Yin, Y.; Li, Z.; Chen, J.; Bao, K. Research on Active Intelligent Perception Technology of Vessel Situation Based on Multisensor Fusion. Math. Probl. Eng. 2020, 2020, e9146727. [Google Scholar] [CrossRef]
  125. Hadzagic, M.; Isabelle, M.; Kashyap, N. Hard and Soft Data Fusion for Maritime Traffic Monitoring Using the Integrated Ornstein-Uhlenbeck Process. In Proceedings of the 2020 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA), Victoria, BC, Canada, 4–7 August 2020; pp. 98–105. [Google Scholar] [CrossRef]
  126. Wu, Y.; Chu, X.; Deng, L.; Lei, J.; He, W.; Krolczyk, G.; Li, Z. A new multi-sensor fusion approach for integrated ship motion perception in inland waterways. Measurement 2022, 200, 111630. [Google Scholar] [CrossRef]
  127. Huang, Z.; Hu, Q.; Mei, Q.; Yang, C.; Wu, Z. Identity recognition on waterways: A novel ship information tracking method based on multimodal data. J. Navig. 2021, 74, 1336–1352. [Google Scholar] [CrossRef]
  128. Zhu, Y.; Shi, W.; Pandey, D.S.; Liu, Y.; Que, X.; Krutz, D.E.; Yu, Q. Uncertainty-Aware Multiple Instance Learning from Large-Scale Long Time Series Data. In Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), Orlando, FL, USA, 15–18 December 2021; pp. 1772–1778. [Google Scholar] [CrossRef]
  129. Lin, J.; Koch, L.; Kurowski, M.; Gehrt, J.-J.; Abel, D.; Zweigel, R. Environment Perception and Object Tracking for Autonomous Vehicles in a Harbor Scenario. In Proceedings of the 2020 IEEE 23rd International Conference on Intelligent Transportation Systems (ITSC), Rhodes, Greece, 20–23 September 2020; pp. 1–6. [Google Scholar] [CrossRef]
  130. Liu, X.; Li, Y.; Wu, Y.; Wang, Z.; He, W.; Li, Z. A Hybrid Method for Inland Ship Recognition Using Marine Radar and Closed-Circuit Television. J. Mar. Sci. Eng. 2021, 9, 1199. [Google Scholar] [CrossRef]
  131. Patino, L.; Cane, T.; Ferryman, J. A comprehensive maritime benchmark dataset for detection, tracking and threat recognition. In Proceedings of the 2021 17th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), Washington, DC, USA, 16–19 November 2021; pp. 1–8. [Google Scholar] [CrossRef]
  132. Felski, A.; Zwolak, K. The Ocean-Going Autonomous Ship—Challenges and Threats. J. Mar. Sci. Eng. 2020, 8, 41. [Google Scholar] [CrossRef]
  133. Dual-Channel LIDAR Searching, Positioning, Tracking and Landing System for Rotorcraft from Ships at Sea. Available online: https://www.cambridge.org/core/journals/journal-of-navigation/article/dualchannel-lidar-searching-positioning-tracking-and-landing-system-for-rotorcraft-from-ships-at-sea/26A454791FC48CD66C00A329BCB82F52 (accessed on 8 November 2022).
  134. Consistent Fusion Method with Uncertainty Elimination for Distributed Multi-Sensor Systems—ScienceDirect. Available online: https://www.sciencedirect.com/science/article/pii/S0020025522002109 (accessed on 8 November 2022).
  135. Fowdur, J.S.; Baum, M.; Heymann, F. An Elliptical Principal Axes-based Model for Extended Target Tracking with Marine Radar Data. In Proceedings of the 2021 IEEE 24th International Conference on Information Fusion (FUSION), Sun City, South Africa, 1–4 November 2021; pp. 1–8. [Google Scholar] [CrossRef]
  136. Brekke, E.F.; Hem, A.G.; Tokle, L.-C.N. Multitarget Tracking with Multiple Models and Visibility: Derivation and Verification on Maritime Radar Data. IEEE J. Ocean. Eng. 2021, 46, 1272–1287. [Google Scholar] [CrossRef]
  137. Lin, J.; Puthiyavinayagam, A.; Liu, S.; Kurowski, M.; Gehrt, J.-J.; Zweigel, R.; Abel, D. Real-time Multi-Object Tracking using Adaptive Filtering and Filter Banks for Maritime Applications. In Proceedings of the 2021 European Control Conference (ECC), Online, 29 June–2 July 2021; pp. 2239–2244. [Google Scholar] [CrossRef]
  138. Strauch, G.E.; Lin, J.J.; Tesic, J. Overhead Projection Approach For Multi-Camera Vessel Activity Recognition. In Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), Orlando, FL, USA, 15–18 December 2021; pp. 5626–5632. [Google Scholar] [CrossRef]
  139. Sun, W.; Ji, M.; Huang, W.; Ji, Y.; Dai, Y. Vessel Tracking Using Bistatic Compact HFSWR. Remote Sens. 2020, 12, 1266. [Google Scholar] [CrossRef]
  140. Li, H.; Liu, J.; Yang, Z.; Liu, R.W.; Wu, K.; Wan, Y. Adaptively constrained dynamic time warping for time series classification and clustering. Inf. Sci. 2020, 534, 97–116. [Google Scholar] [CrossRef]
  141. Lin, J.; Campa, G.; Framing, C.-E.; Gehrt, J.-J.; Zweigel, R.; Abel, D. Adaptive Shape Fitting for Lidar object Detection and Tracking in Maritime Applications. Int. J. TDI 2021, 5, 105–117. [Google Scholar] [CrossRef]
  142. Etienne, L.; Ray, C.; Camossi, E.; Iphar, C. Maritime Data Processing in Relational Databases. In Guide to Maritime Informatics; Artikis, A., Zissis, D., Eds.; Springer International Publishing: Cham, Switzerland, 2021; pp. 73–118. [Google Scholar] [CrossRef]
  143. Naus, K.; Wąż, M.; Szymak, P.; Gucma, L.; Gucma, M. Assessment of ship position estimation accuracy based on radar navigation mark echoes identified in an Electronic Navigational Chart. Measurement 2020, 169, 108630. [Google Scholar] [CrossRef]
  144. Yu, N.; Fan, X.; Deng, T.; Mao, G. Ship Detection in Inland Rivers Based on Multi-Head Self-Attention. In Proceedings of the 2022 7th International Conference on Signal and Image Processing (ICSIP), Suzhou, China, 20–22 July 2022; pp. 295–299. [Google Scholar] [CrossRef]
  145. Maresca, S.; Serafino, G.; Malacarne, A.; Scotti, F.; Amir, M.M.H.; Ghelfi, P.; Bogoni, A. Extended Target Tracking with a Photonics-Based Radar on a Packaged Silicon Chip. In Proceedings of the 2022 23rd International Radar Symposium (IRS), Gdansk, Poland, 12–14 September 2022; pp. 116–123. [Google Scholar] [CrossRef]
  146. Zhou, C.; Chen, J.; Huang, F.; Hu, Z.; Wang, X.; Zeng, Z. Ship Target Tracking Algorithm Based on Adaptive Improvement Unscented Particle Filter. In Proceedings of the 2021 IEEE International Conference on Unmanned Systems (ICUS), Beijing, China, 15–17 October 2021; pp. 366–370. [Google Scholar] [CrossRef]
  147. Nikolic, D.; Stojkovic, N.; Popovic, Z.; Tosic, N.; Lekic, N.; Stankovic, Z.; Doncov, N. Maritime Over the Horizon Sensor Integration: HFSWR Data Fusion Algorithm. Remote Sens. 2019, 11, 852. [Google Scholar] [CrossRef]
  148. Density Based Clustering Data Association Procedure for Real—Time HFSWRs Tracking at OTH Distances. Available online: https://ieeexplore.ieee.org/abstract/document/9016044 (accessed on 24 May 2023).
  149. Chuang, L.Z.-H.; Chen, Y.-R.; Chung, Y.-J. Applying an Adaptive Signal Identification Method to Improve Vessel Echo Detection and Tracking for SeaSonde HF Radar. Remote Sens. 2021, 13, 2453. [Google Scholar] [CrossRef]
  150. Stojkovic, N.; Nikolic, D.; Orlic, V.; Lekic, N. Implementation of the Monitoring System for HFSWR-Based Maritime Surveillance Networks. Available online: https://www.etran.rs/2020/ZBORNIK_RADOVA/Radovi_prikazani_na_konferenciji/030_AUI1.2.pdf (accessed on 24 May 2023).
  151. Heymann, F.; Banys, P.; Saez, C. Radar Image Processing and AIS Target Fusion. TransNav Int. J. Mar. Navig. Saf. Sea Transp. 2015, 9, 443–448. [Google Scholar] [CrossRef]
  152. Xiu, S.; Wen, Y.; Yuan, H.; Xiao, C.; Zhan, W.; Zou, X.; Zhou, C.; Shah, S.C. A Multi-Feature and Multi-Level Matching Algorithm Using Aerial Image and AIS for Vessel Identification. Sensors 2019, 19, 1317. [Google Scholar] [CrossRef] [PubMed]
  153. Siegert, G.; Hoth, J.; Banyś, P.; Heymann, F. Generic framework for vessel detection and tracking based on distributed marine radar image data. CEAS Space J. 2018, 11, 65–79. [Google Scholar] [CrossRef]
  154. Processing Framework to Support Maritime Surveillance Applications Based on Optical Remote Sensing Images. Available online: https://www.spiedigitallibrary.org/conference-proceedings-of-spie/10773/107730T/Processing-framework-to-support-maritime-surveillance-applications-based-on-optical/10.1117/12.2326058.short?SSO=1 (accessed on 24 May 2023).
  155. Fei, P.; Chu, X.; Geng, X.; Luo, J. A inland waterway monitoring virtual-GIS system based on multi heterogeneous navigation data fusion. In Proceedings of the 2021 3rd International Academic Exchange Conference on Science and Technology Innovation (IAECST), Guangzhou, China, 10–12 December 2021; pp. 618–621. [Google Scholar] [CrossRef]
  156. Serafino, G.; Maresca, S.; Di Mauro, L.; Tardo, A.; Cuillo, A.; Scotti, F.; Ghelfi, P.; Pagano, P.; Bogoni, A. A Photonics-Assisted Multi-Band MIMO Radar Network for the Port of the Future. IEEE J. Sel. Top. Quantum Electron. 2021, 27, 3092880. [Google Scholar] [CrossRef]
  157. Wołejsza, P.; Koszelew, J.; Matuk, K.; Świda, O. Verification of the image processing system in real conditions. J. Autom. Electron. Electr. Eng. 2021, 3, 33–37. [Google Scholar] [CrossRef]
  158. Dinesh Kumar, A.; Karthika, R.; Soman, K.P. Stereo Camera and LIDAR Sensor Fusion-Based Collision Warning System for Autonomous Vehicles. In Advances in Computational Intelligence Techniques; Jain, S., Sood, M., Paul, S., Eds.; Algorithms for Intelligent Systems; Springer: Singapore, 2020; pp. 239–252. [Google Scholar] [CrossRef]
  159. Yan, Z.; Song, X.; Yang, L.; Wang, Y. Ship Classification in Synthetic Aperture Radar Images Based on Multiple Classifiers Ensemble Learning and Automatic Identification System Data Transfer Learning. Remote Sens. 2022, 14, 5288. [Google Scholar] [CrossRef]
  160. Chen, X.; Liu, Y.; Achuthan, K. WODIS: Water Obstacle Detection Network Based on Image Segmentation for Autonomous Surface Vehicles in Maritime Environments. IEEE Trans. Instrum. Meas. 2021, 70, 1–13. [Google Scholar] [CrossRef]
  161. Shin, H.-C.; Lee, K.-I.; Lee, C.-E. Data Augmentation Method of Object Detection for Deep Learning in Maritime Image. In Proceedings of the 2020 IEEE International Conference on Big Data and Smart Computing (BigComp), Busan, Republic of Korea, 21–22 February 2020; pp. 463–466. [Google Scholar] [CrossRef]
  162. Vivone, G.; Millefiori, L.M.; Braca, P.; Willett, P. Model performance assessment for long-term vessel prediction using HFSW radar data. In Proceedings of the 2017 IEEE Radar Conference (RadarConf), Seattle, WA, USA, 8–12 May 2017; pp. 243–247. [Google Scholar] [CrossRef]
  163. Dastner, K.; Roseneckh-Kohler, B.V.H.Z.; Opitz, F.; Rottmaier, M.; Schmid, E. Machine Learning Techniques for Enhancing Maritime Surveillance Based on GMTI Radar and AIS. In Proceedings of the 2018 19th International Radar Symposium (IRS), Bonn, Germany, 20–22 June 2018; pp. 1–10. [Google Scholar] [CrossRef]
  164. Yan, R.; Wang, S. Study of Data-Driven Methods for Vessel Anomaly Detection Based on AIS Data. In Smart Transportation Systems 2019; Qu, X., Zhen, L., Howlett, R.J., Howlett, L.C., Eds.; Smart Innovation, Systems and Technologies; Springer: Singapore, 2019; Volume 149, pp. 29–37. [Google Scholar] [CrossRef]
  165. Iphar, C.; Jousselme, A.-L.; Ray, C. Data Degradation Variations for Maritime Situational Indicator Detection Assessment. p. 3. Available online: https://www.cmre.nato.int/maritime-big-data-workshop-home/maritime-big-data-workshop-presentations/1201-data-degradation-variations-for-maritime-situational-indicator-prediction-assessment/file (accessed on 28 October 2021).
  166. Dobrkovic, A.; Iacob, M.-E.; van Hillegersberg, J.; Mes, M.R.K.; Glandrup, M. Towards an Approach for Long Term AIS-Based Prediction of Vessel Arrival Times. In Logistics and Supply Chain Innovation: Bridging the Gap between Theory and Practice; Zijm, H., Klumpp, M., Clausen, U., ten Hompel, M., Eds.; Lecture Notes in Logistics; Springer International Publishing: Cham, Switzerland, 2016; pp. 281–294. [Google Scholar] [CrossRef]
  167. Alessandrini, A.; Alvarez, M.; Greidanus, H.; Gammieri, V.; Arguedas, V.F.; Mazzarella, F.; Santamaria, C.; Stasolla, M.; Tarchi, D.; Vespe, M. Mining Vessel Tracking Data for Maritime Domain Applications. In Proceedings of the 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW), Barcelona, Spain, 12–15 December 2016; pp. 361–367. [Google Scholar] [CrossRef]
  168. Millefiori, L.M.; Vivone, G.; Braca, P.; Cazzanti, L.; Bryan, K. Maritime Situational Awareness Use Cases Enabled by Space-Borne Sensors; CMRE Open Library: La Spezia, Italy, 2019. [Google Scholar]
  169. Mazzarella, F.; Arguedas, V.F.; Vespe, M. Knowledge-based vessel position prediction using historical AIS data. In Proceedings of the 2015 Sensor Data Fusion: Trends, Solutions, Applications (SDF), Bonn, Germany, 6–8 October 2015; pp. 1–6. [Google Scholar] [CrossRef]
  170. Arguedas, V.F.; Mazzarella, F.; Vespe, M. Spatio-temporal data mining for maritime situational awareness. In Proceedings of the OCEANS 2015, Genova, Italy, 18–21 May 2015; pp. 1–8. [Google Scholar] [CrossRef]
  171. Hexeberg, S.; Flaten, A.L.; Eriksen, B.-O.H.; Brekke, E.F. AIS-based vessel trajectory prediction. In Proceedings of the 2017 20th International Conference on Information Fusion (Fusion), Xi’an, China, 10–13 July 2017; pp. 1–8. [Google Scholar] [CrossRef]
  172. Rodger, M.; Guida, R. Classification-Aided SAR and AIS Data Fusion for Space-Based Maritime Surveillance. Remote Sens. 2020, 13, 104. [Google Scholar] [CrossRef]
  173. Vivone, G.; Millefiori, L.M.; Braca, P.; Willett, P. Performance Assessment of Vessel Dynamic Models for Long-Term Prediction Using Heterogeneous Data. IEEE Trans. Geosci. Remote Sens. 2017, 55, 6533–6546. [Google Scholar] [CrossRef]
  174. Dobrkovic, A.; Iacob, M.-E.; van Hillegersberg, J. Using machine learning for unsupervised maritime waypoint discovery from streaming AIS data. In Proceedings of the 15th International Conference on Knowledge Technologies and Data-Driven Business, in i-KNOW ’15, Graz, Austria, 21–23 October 2015; pp. 1–8. [Google Scholar] [CrossRef]
  175. Liraz, S.P. Ships’ Trajectories Prediction Using Recurrent Neural Networks Based on AIS Data; Naval Postgraduate School: Monterey, CA, USA, 2018; p. 97. [Google Scholar]
  176. Cao, J.; Liang, M.; Li, Y.; Chen, J.; Li, H.; Liu, R.W.; Liu, J. PCA-based hierarchical clustering of AIS trajectories with automatic extraction of clusters. In Proceedings of the 2018 IEEE 3rd International Conference on Big Data Analysis (ICBDA), Shanghai, China, 9–12 March 2018; pp. 448–452. [Google Scholar] [CrossRef]
  177. Liang, M.; Liu, R.W.; Li, Y.; Wu, J.; Liu, J. Data-Driven Statistical Analysis of Dynamic Vessel Trajectories in Wuhan Section of the Yangtze River. In Proceedings of the 1st International Conference on Big Data Research, in ICBDR ’17, Osaka, Japan, 22–24 October 2017; pp. 44–51. [Google Scholar] [CrossRef]
  178. Perera, K.C.L. Vessel Route Prediction from AIS Data. p. 62. Available online: http://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4231 (accessed on 24 May 2023).
  179. Sun, L.; Zhou, W.; Guan, J.; He, Y. Mining spatial—temporal motion pattern for vessel recognition. Int. J. Distrib. Sens. Netw. 2018, 14, 155014771877956. [Google Scholar] [CrossRef]
  180. Valsamis, A.; Tserpes, K.; Zissis, D.; Anagnostopoulos, D.; Varvarigou, T. Employing traditional machine learning algorithms for big data streams analysis: The case of object trajectory prediction. J. Syst. Softw. 2017, 127, 249–257. [Google Scholar] [CrossRef]
  181. Xiao, Z.; Zhang, L.; Fu, X.; Zhang, W.; Zhou, J.T.; Goh, R.S.M. Concurrent Processing Cluster Design to Empower Simultaneous Prediction for Hundreds of Vessels’ Trajectories in Near Real-Time. IEEE Trans. Syst. Man Cybern. Syst. 2021, 51, 1830–1843. [Google Scholar] [CrossRef]
  182. Online Event Recognition from Moving Vessel Trajectories. Available online: https://link.springer.com/article/10.1007/s10707-016-0266-x (accessed on 24 May 2023).
  183. Zissis, D.; Xidias, E.K.; Lekkas, D. Real-time vessel behavior prediction. Evol. Syst. 2016, 7, 29–40. [Google Scholar] [CrossRef]
  184. Zheng, C.; Peng, Q.; Xu, X. Heterogenous Multi-Source Fusion for Ship Trajectory Complement and Prediction with Sequence Modeling. In Proceedings of the 2020 IEEE Fifth International Conference on Data Science in Cyberspace (DSC), Hong Kong, China, 27–30 July 2020; pp. 15–21. [Google Scholar] [CrossRef]
  185. Liu, T.; Wang, S.; Lei, Z.; Zhang, J.; Zhang, X. Trajectory risk cognition of ship collision accident based on fusion of multi-model spatial data. J. Navig. 2022, 75, 299–318. [Google Scholar] [CrossRef]
  186. Pedroche, D.S.; Amigo, D.; García, J.; Molina, J.M. Architecture for Trajectory-Based Fishing Ship Classification with AIS Data. Sensors 2020, 20, 3782. [Google Scholar] [CrossRef]
  187. Yu, J.Y.; Sghaier, M.O.; Grabowiecka, Z. Deep learning approaches for AIS data association in the context of maritime domain awareness. In Proceedings of the 2020 IEEE 23rd International Conference on Information Fusion (FUSION), Rustenburg, South Africa, 6–9 July 2020; pp. 1–8. [Google Scholar] [CrossRef]
  188. Ferri, G.; Grasso, R.; Camossi, E.; Faggiani, A.; Bereta, K.; Vodas, M.; Kladis, D.; Zissis, D.; LePage, K.D. Developing a Robotic Hybrid Network for Coastal Surveillance: The INFORE Experience. In Proceedings of the OCEANS 2021: San Diego–Porto, San Diego, CA, USA, 20–23 September 2021; pp. 1–10. [Google Scholar] [CrossRef]
  189. Chen, Q.; Xiao, C.; Wen, Y.; Tao, M.; Zhan, W. Ship Intention Prediction at Intersections Based on Vision and Bayesian Framework. J. Mar. Sci. Eng. 2022, 10, 639. [Google Scholar] [CrossRef]
  190. Xiao, Z.; Fu, X.; Zhang, L.; Zhang, W.; Liu, R.W.; Liu, Z.; Goh, R.S.M. Big Data Driven Vessel Trajectory and Navigating State Prediction With Adaptive Learning, Motion Modeling and Particle Filtering Techniques. IEEE Trans. Intell. Transp. Syst. 2022, 23, 3696–3709. [Google Scholar] [CrossRef]
  191. Mazzarella, F.; Vespe, M.; Santamaria, C. SAR Ship Detection and Self-Reporting Data Fusion Based on Traffic Knowledge. IEEE Geosci. Remote Sens. Lett. 2015, 12, 1685–1689. [Google Scholar] [CrossRef]
  192. Ford, J.H.; Peel, D.; Kroodsma, D.; Hardesty, B.D.; Rosebrock, U.; Wilcox, C. Detecting suspicious activities at sea based on anomalies in Automatic Identification Systems transmissions. PLoS ONE 2018, 13, e0201640. [Google Scholar] [CrossRef] [PubMed]
  193. Fiorini, M.; Capata, A.; Bloisi, D.D. AIS Data Visualization for Maritime Spatial Planning (MSP). Int. J. e-Navigation Marit. Econ. 2016, 5, 45–60. [Google Scholar] [CrossRef]
  194. Stróżyna, M.; Małyszko, J.; Węcel, K.; Filipiak, D.; Abramowicz, W. Architecture of Maritime Awareness System Supplied with External Information. Annu. Navig. 2016, 23, 135–149. [Google Scholar] [CrossRef]
  195. Lamm, A.; Hahn, A. Towards Critical-Scenario Based Testing With Maritime Observation Data. In Proceedings of the 2018 OCEANS—MTS/IEEE Kobe Techno-Oceans (OTO), Kobe, Japan, 28–31 May 2018; pp. 1–10. [Google Scholar] [CrossRef]
  196. Hu, B.; Liu, R.W.; Wang, K.; Li, Y.; Liang, M.; Li, H.; Liu, J. Statistical Analysis of Massive AIS Trajectories Using Gaussian Mixture Models. In Proceedings of the 2017 2nd International Conference on Multimedia and Image Processing (ICMIP), Wuhan, China, 17–19 March 2017; pp. 113–117. [Google Scholar] [CrossRef]
  197. Wang, J.; Zhu, C.; Zhou, Y.; Zhang, W. Vessel Spatio-temporal Knowledge Discovery with AIS Trajectories Using Co-clustering. J. Navig. 2017, 70, 1383–1400. [Google Scholar] [CrossRef]
  198. Li, H.; Liu, J.; Wu, K.; Yang, Z.; Liu, R.W.; Xiong, N. Spatio-Temporal Vessel Trajectory Clustering Based on Data Mapping and Density. IEEE Access 2018, 6, 58939–58954. [Google Scholar] [CrossRef]
  199. Camossi, E.; Jousselme, A.-L. Proceedings of the Maritime Big Data Workshop; NATO Science and Technology Organization: Paris, France, 2019; p. 93. [Google Scholar]
  200. Tu, E.; Zhang, G.; Mao, S.; Rachmawati, L.; Huang, G.-B. Modeling Historical AIS Data For Vessel Path Prediction: A Comprehensive Treatment. arXiv 2022, arXiv:2001.01592. [Google Scholar] [CrossRef]
  201. Murray, B.; Perera, L.P. An AIS-based deep learning framework for regional ship behavior prediction. Reliab. Eng. Syst. Saf. 2021, 215, 107819. [Google Scholar] [CrossRef]
  202. Vieira, F.M.; Vincent, F.; Tourneret, J.-Y.; Bonacci, D.; Spigai, M.; Ansart, M.; Richard, J. Ship detection using SAR and AIS raw data for maritime surveillance. In Proceedings of the 2016 24th European Signal Processing Conference (EUSIPCO), Budapest, Hungary, 29 August–2 September 2016; pp. 2081–2085. [Google Scholar] [CrossRef]
  203. d’Afflisio, E.; Braca, P.; Millefiori, L.M.; Willett, P.K. Detecting Anomalous Deviations From Standard Maritime Routes Using the Ornstein–Uhlenbeck Process. IEEE Trans. Signal Process. 2018, 66, 6474–6487. [Google Scholar] [CrossRef]
  204. Mazzarella, F.; Vespe, M.; Tarchi, D.; Aulicino, G.; Vollero, A. AIS Reception Characterisation for AIS on/off Anomaly Detection. In Proceedings of the 19th International Conference on Information Fusion, Heidelberg, Germany, 5–8 July 2016; p. 8. [Google Scholar]
  205. Forti, N.; Millefiori, L.M.; Braca, P. Hybrid Bernoulli Filtering for Detection and Tracking of Anomalous Path Deviations. In Proceedings of the 2018 21st International Conference on Information Fusion (FUSION), Cambridge, UK, 10–13 July 2018; pp. 1178–1184. [Google Scholar] [CrossRef]
  206. Kontopoulos, I.; Spiliopoulos, G.; Zissis, D.; Chatzikokolakis, K.; Artikis, A. Countering Real-Time Stream Poisoning: An Architecture for Detecting Vessel Spoofing in Streams of AIS Data. In Proceedings of the 2018 IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, 16th International Conference on Pervasive Intelligence and Computing, 4th International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), Athens, Greece, 12–15 August 2018; pp. 981–986. [Google Scholar] [CrossRef]
  207. Radulescu, D.; St-Hilaire, M.-O.; Allard, Y.; Hammond, T.R. ODDA Technologies Inc. Sharing AIS Related Anomalies (SARA); OODA Technologies Inc.: Montreal, QC, Cananda, 2016; p. 143. [Google Scholar]
  208. Iphar, C.; Ray, C.; Napoli, A. Data integrity assessment for maritime anomaly detection. Expert Syst. Appl. 2020, 147, 113219. [Google Scholar] [CrossRef]
  209. Ray, C. Data Variety and Integrity Assessment for Maritime Anomaly Detection. In Proceedings of the International Conference on Big Data and Cyber-Security Intelligence, Hadath, Lebanon, 13–15 December 2018; Available online: https://www.semanticscholar.org/paper/Data-Variety-and-Integrity-Assessment-for-Maritime-Ray/e07c7ec4a08949e0a03b70ce8a7710ab1237a348 (accessed on 28 May 2023).
  210. Rigdon, D.A.; Tibbetts, T.A. Estimating Vessel Intent. US9779594B2, 3 October 2017. Available online: https://patents.google.com/patent/US9779594B2/en (accessed on 24 May 2023).
  211. Nguyen, D.; Vadaine, R.; Hajduch, G.; Garello, R.; Fablet, R. Multi-task Learning for Maritime Traffic Surveillance from AIS Data Streams. In Proceedings of the IEEE 5th International Conference on Data Science and Advanced Analytics (DSAA), Turin, Italy, 1–3 October 2018; pp. 1–3. [Google Scholar]
  212. Yang, D.; Wu, L.; Wang, S.; Jia, H.; Li, K.X. How big data enriches maritime research—A critical review of Automatic Identification System (AIS) data applications. Transp. Rev. 2019, 39, 755–773. [Google Scholar] [CrossRef]
  213. Iphar, C.; Napoli, A.; Ray, C.; Alincourt, E.; Brosset, D. Risk analysis of falsified automatic identification system for the improvement of maritime traffic safety. In Risk, Reliability and Safety: Innovating Theory and Practice; Walls, L., Revie, M., Bedford, T., Eds.; Taylor & Francis Group/CRC Press: Boca Raton, FL, USA, 2016; pp. 606–613. [Google Scholar] [CrossRef]
  214. Sang, L.-Z.; Wall, A.; Mao, Z.; Yan, X.-P.; Wang, J. A novel method for restoring the trajectory of the inland waterway ship by using AIS data. Ocean Eng. 2015, 110, 183–194. [Google Scholar] [CrossRef]
  215. Cazzanti, L.; Pallotta, G. Mining maritime vessel traffic: Promises, challenges, techniques. In Proceedings of the OCEANS 2015, Genova, Italy, 18–21 May 2015; pp. 1–6. [Google Scholar] [CrossRef]
  216. Lee, E.; Mokashi, A.J.; Moon, S.Y.; Kim, G. The Maturity of Automatic Identification Systems (AIS) and Its Implications for Innovation. JMSE 2019, 7, 287. [Google Scholar] [CrossRef]
  217. Goudossis, A.; Katsikas, S.K. Towards a secure automatic identification system (AIS). J. Mar. Sci. Technol. 2018, 24, 410–423. [Google Scholar] [CrossRef]
  218. Botunac, I.; Gržan, M. Analysis of software threats to the automatic identification system. Brodogr. Teor. I Praksa Brodogr. I Pomor. Teh. 2017, 68, 97–105. [Google Scholar] [CrossRef]
  219. Fu, X.; Xiao, Z.; Xu, H.; Jayaraman, V.; Othman, N.B.; Chua, C.P.; Lind, M. AIS Data Analytics for Intelligent Maritime Surveillance Systems. In Maritime Informatics; Lind, M., Michaelides, M., Ward, R., Watson, R.T., Eds.; Progress in IS; Springer International Publishing: Cham, Switzerland, 2021; pp. 393–411. [Google Scholar] [CrossRef]
  220. Salmon, L.; Laso, P.M.; Claramunt, C.; Follut, D.; Pelissero, N. Data fusion challenges for AIS anti-piracy measures. In OCEANS 2021: San Diego Porto; IEEE: Piscataway, NJ, USA, 2021; pp. 1–4. [Google Scholar] [CrossRef]
  221. Banys, P.; Heymann, F.; Gucma, M. Occurrence of Unknown Sensor Data within AIS Dynamic Messages. NAŠE MORE Znan. Časopis Za More I Pomor. 2020, 67, 126–137. [Google Scholar] [CrossRef]
  222. Vessel Tracking and Anomaly Detection Using Level 0/1 and High-Level Information Fusion Techniques. Available online: https://link.springer.com/chapter/10.1007/978-3-319-18416-6_60 (accessed on 24 May 2023).
  223. Siegert, G.; Banys, P.; Hoth, J.; Heymann, F. Counteracting the Effects of GNSS Jamming in a Maritime Multi-Target Scenario by Fusing AIS with Radar Data. In Proceedings of the 2017 International Technical Meeting of the Institute of Navigation, Monterey, CA, USA, 30 January–2 February 2017; pp. 922–932. [Google Scholar] [CrossRef]
  224. Jousselme, A.-L.; Pallotta, G. Dissecting uncertainty-based fusion techniques for maritime anomaly detection. In Proceedings of the 2015 18th International Conference on Information Fusion (Fusion), Washington, DC, USA, 6–9 July 2015; pp. 34–41. [Google Scholar]
  225. d’Afflisio, E.; Braca, P.; Millefiori, L.M.; Willett, P. Maritime Anomaly Detection Based on Mean-Reverting Stochastic Processes Applied to a Real-World Scenario. In Proceedings of the 2018 21st International Conference on Information Fusion (FUSION), Cambridge, UK, 10–13 July 2018; pp. 1171–1177. [Google Scholar] [CrossRef]
  226. Riveiro, M.; Pallotta, G.; Vespe, M. Maritime anomaly detection: A review. WIREs Data Min. Knowl. Discov. 2018, 8, e1266. [Google Scholar] [CrossRef]
  227. Forti, N.; Millefiori, L.M.; Braca, P.; Willett, P. Anomaly Detection and Tracking Based on Mean–Reverting Processes with Unknown Parameters. In Proceedings of the ICASSP 2019—2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, UK, 12–17 May 2019; pp. 8449–8453. [Google Scholar] [CrossRef]
  228. Huang, H.; Qiu, K.; Jeong, M.-H.; Jeon, S.B.; Lee, W.P. Detecting Anomalous Vessel Dynamics with Functional Data Analysis. J. Coast. Res. 2019, 91, 406–410. [Google Scholar] [CrossRef]
  229. Dai, Y.M.; Liu, K.S. TACSA: A web-service based system for coastal surveillance and situational awareness. In Proceedings of the 2015 International Carnahan Conference on Security Technology (ICCST), Taipei, Taiwan, 21–24 September 2015; pp. 409–413. [Google Scholar] [CrossRef]
  230. Jousselme, A.-L.; Bryan, K. Context for Maritime Situation Awareness. In Military Applications of Data Analytics, 1st ed.; Huggins, K., Ed.; Auerbach Publications: Boca Raton, FL, USA, 2018; pp. 47–62. [Google Scholar] [CrossRef]
  231. Lei, P.-R.; Tsai, T.-H.; Peng, W.-C. Discovering Maritime Traffic Route from AIS network. In Proceedings of the 2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS), Kanazawa, Japan, 5–7 October 2016; pp. 1–6. [Google Scholar] [CrossRef]
  232. Xiao, Z.; Fu, X.; Zhang, L.; Goh, R.S.M. Traffic Pattern Mining and Forecasting Technologies in Maritime Traffic Service Networks: A Comprehensive Survey. IEEE Trans. Intell. Transport. Syst. 2020, 21, 1796–1825. [Google Scholar] [CrossRef]
  233. Patmanidis, S.; Voulgaris, I.; Sarri, E.; Papavassilopoulos, G.; Papavasileiou, G. Maritime surveillance, vessel route estimation and alerts using AIS data. In Proceedings of the 2016 24th Mediterranean Conference on Control and Automation (MED), Athens, Greece, 21–24 June 2016; pp. 809–813. [Google Scholar] [CrossRef]
  234. Shahir, H.Y.; Glasser, U.; Shahir, A.Y.; Wehn, H. Maritime situation analysis framework: Vessel interaction classification and anomaly detection. In Proceedings of the 2015 IEEE International Conference on Big Data (Big Data), Santa Clara, CA, USA, 29 October–1 November 2015; pp. 1279–1289. [Google Scholar] [CrossRef]
  235. Waxman, A.; Hu, H.; Martin, D. Maritime group motion analysis: Representation, learning, recognition, and deviation detection. In Proceedings of the 2015 18th International Conference on Information Fusion (Fusion), Washington, DC, USA, 6–9 July 2015; pp. 1015–1021. [Google Scholar]
  236. Terroso-Saenz, F.; Valdes-Vela, M.; Skarmeta-Gomez, A.F. A complex event processing approach to detect abnormal behaviours in the marine environment. Inf. Syst. Front. 2016, 18, 765–780. [Google Scholar] [CrossRef]
  237. Brancalion, J.F.B.; Dias, S.S. An IoT Inspired Distributed Data Fusion Architecture for Coastal Surveillance Applications. In Proceedings of the 2020 IEEE 23rd International Conference on Information Fusion (FUSION), Rustenburg, South Africa, 6–9 July 2020; pp. 1–7. [Google Scholar] [CrossRef]
  238. Androulakis, N.P.V.; Koimtzoglou, A.; Michelis, A.; Rammos, A.; Kopsacheilis, I.; Androulakis, I. Utilising Bayesian networks for the crisis classification during piracy or armed robbery incidents on passenger ships. In Sustainable Development and Innovations in Marine Technologies; CRC Press: Boca Raton, FL, USA, 2022. [Google Scholar]
  239. Flenker, T.; Stoppe, J. MARLIN: An IoT Sensor Network for Improving Maritime Situational Awareness. In Proceedings of the MARESEC 2021, Bremerhaven, Germany, 6–7 June 2021; Available online: https://elib.dlr.de/144804/ (accessed on 8 November 2022).
  240. Forti, N.; Millefiori, L.M.; Braca, P.; Willett, P. Random Finite Set Tracking for Anomaly Detection in the Presence of Clutter. In Proceedings of the 2020 IEEE Radar Conference (RadarConf20), Florence, Italy, 21–25 September 2020; pp. 1–6. [Google Scholar] [CrossRef]
  241. Junior, W.C.L.; de Moraes, C.C.; de Albuquerque, C.E.P.; Machado, R.C.S.; de Sá, A.O. A Triggering Mechanism for Cyber-Attacks in Naval Sensors and Systems. Sensors 2021, 21, 3195. [Google Scholar] [CrossRef] [PubMed]
  242. Freire, W.P.; Melo, W.S.; Nascimento, V.D.D.; Nascimento, P.R.M.; de Sá, A.O. Towards a Secure and Scalable Maritime Monitoring System Using Blockchain and Low-Cost IoT Technology. Sensors 2022, 22, 4895. [Google Scholar] [CrossRef] [PubMed]
  243. Wolsing, K.; Saillard, A.; Bauer, J.; Wagner, E.; van Sloun, C.; Fink, I.B.; Schmidt, M.; Wehrle, K.; Henze, M. Network Attacks Against Marine Radar Systems: A Taxonomy, Simulation Environment, and Dataset. In Proceedings of the 2022 IEEE 47th Conference on Local Computer Networks (LCN), Virtual, 26–29 September 2022; pp. 114–122. [Google Scholar] [CrossRef]
  244. Faragher, R.; MacDoran, P.F.; Mathews, M.B. Spoofing Mitigation, Robust Collision Avoidance, and Opportunistic Receiver Localisation Using a New Signal Processing Scheme for ADS-B or AIS. In Proceedings of the 27th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS+ 2014), Tampa, FL, USA, 8–12 September 2014; pp. 858–868. [Google Scholar]
  245. Papi, F.; Tarchi, D.; Vespe, M.; Oliveri, F.; Borghese, F.; Aulicino, G.; Vollero, A. Radiolocation and tracking of automatic identification system signals for maritime situational awareness. IET Radar Sonar Navig. 2015, 9, 568–580. [Google Scholar] [CrossRef]
  246. Jiang, Y.; Hu, Q.; Yang, D.K. Hybrid TOA-TDOA Positioning Algorithm in AIS. Adv. Mater. Res. 2013, 655–657, 876–881. [Google Scholar] [CrossRef]
  247. Teixeira, A.P.; Soares, C.G. Risk of Maritime Traffic in Coastal Waters. In Proceedings of the ASME 2018 37th International Conference on Ocean, Offshore and Arctic Engineering, American Society of Mechanical Engineers Digital Collection, Madrid, Spain, 17–22 June 2018. [Google Scholar] [CrossRef]
  248. Gaglione, D.; Soldi, G.; Meyer, F.; Hlawatsch, F.; Braca, P.; Farina, A.; Win, M.Z. Bayesian information fusion and multitarget tracking for maritime situational awareness. IET Radar Sonar Navig. 2020, 14, 1845–1857. [Google Scholar] [CrossRef]
  249. Forti, N.; Millefiori, L.M.; Braca, P.; Willett, P. Bayesian Filtering for Dynamic Anomaly Detection and Tracking. IEEE Trans. Aerosp. Electron. Syst. 2021, 58, 1528–1544. [Google Scholar] [CrossRef]
  250. Zhang, Y.; Zhang, A.; Zhang, D.; Kang, Z.; Liang, Y. Design and Development of Maritime Data Security Management Platform. Appl. Sci. 2022, 12, 800. [Google Scholar] [CrossRef]
  251. Millefiori, L.M.; Braca, P.; Bryan, K.; Willett, P. Modeling vessel kinematics using a stochastic mean-reverting process for long-term prediction. IEEE Trans. Aerosp. Electron. Syst. 2016, 52, 2313–2330. [Google Scholar] [CrossRef]
  252. Freidrich, B. Toward Using High-Frequency Coastal Radars for Calibration of S-AIS Based Ocean Vessel Tracking Models. Master’s Thesis, Wilfrid Laurier University, Waterloo, ON, Canada, 2019. Available online: https://scholars.wlu.ca/etd/2129 (accessed on 7 May 2024).
  253. Nguyen, D.; Vadaine, R.; Hajduch, G.; Garello, R.; Fablet, R.A. Multi-Task Deep Learning Architecture for Maritime Surveillance Using AIS Data Streams. In Proceedings of the 2018 IEEE 5th International Conference on Data Science and Advanced Analytics (DSAA), Turin, Italy, 1–4 October 2018; pp. 331–340. [Google Scholar] [CrossRef]
  254. Ljunggren, H. Using Deep Learning for Classifying Ship Trajectories. In Proceedings of the 2018 21st International Conference on Information Fusion (FUSION), Cambridge, UK, 10–13 July 2018; pp. 2158–2164. [Google Scholar] [CrossRef]
  255. Chen, X.; Qi, L.; Yang, Y.; Luo, Q.; Postolache, O.; Tang, J.; Wu, H. Video-Based Detection Infrastructure Enhancement for Automated Ship Recognition and Behavior Analysis. J. Adv. Transp. 2020, 2020, e7194342. [Google Scholar] [CrossRef]
  256. Jacq, O. Détection, Analyse Contextuelle et Visualisation de Cyber-Attaques en Temps Réel: Elaboration de la Cyber Situational Awareness du Monde Maritime. Ph.D. Thesis, Ecole Nationale Supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, Nantes, France, 2021; p. 191. [Google Scholar]
  257. MarineTraffic: Global Ship Tracking Intelligence|AIS Marine Traffic. Available online: https://www.marinetraffic.com/en/ais/home/centerx:-27.2/centery:38.9/zoom:9 (accessed on 28 October 2021).
  258. Pallotta, G.; Vespe, M.; Bryan, K. Vessel Pattern Knowledge Discovery from AIS Data: A Framework for Anomaly Detection and Route Prediction. Entropy 2013, 15, 2218. [Google Scholar] [CrossRef]
  259. Ray, C.; Gallen, R.; Iphar, C.; Napoli, A.; Bouju, A. DeAIS project: Detection of AIS spoofing and resulting risks. In Proceedings of the OCEANS 2015, Genova, Italy, 18–21 May 2015; pp. 1–6. [Google Scholar] [CrossRef]
  260. Salmon, L.; Ray, C. Design principles of a stream-based framework for mobility analysis. Geoinformatica 2017, 21, 237–261. [Google Scholar] [CrossRef]
  261. Hareide, O.S.; Josok, O.; Lund, M.S.; Ostnes, R.; Helkala, K. Enhancing Navigator Competence by Demonstrating Maritime Cyber Security. J. Navig. 2018, 71, 1025–1039. [Google Scholar] [CrossRef]
  262. Stavrou, E.; Pitsillides, A. Security Evaluation Methodology for Intrusion Recovery Protocols in Wireless Sensor Networks. In Proceedings of the 15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Paphos, Cyprus, 21–25 October 2012. [Google Scholar] [CrossRef]
  263. Potamos, G.; Stavrou, E.; Stavrou, S.; Lopez, J.C.; Eyzaguirre, A.; Runyan-Beebe, C.A.; Macias, P. Increase maritime cyber situational awareness at a strategic level. In Proceedings of the 15th annual International Conference of Education, Research and Innovation, Seville, Spain, 7–9 November 2022; pp. 4836–4845. [Google Scholar] [CrossRef]
  264. Piki, A.; Stavrou, E.; Procopiou, A.; Demosthenous, A. Fostering Cybersecurity Awareness and Skills Development Through Digital Game-Based Learning. In Proceedings of the 2023 10th International Conference on Behavioural and Social Computing (BESC), Larnaca, Cyprus, 30 October–1 November 2023; pp. 1–9. [Google Scholar] [CrossRef]
  265. Potamos, G.; Theodoulou, S.; Stavrou, E.; Stavrou, S. Building Maritime Cybersecurity Capacity Against Ransomware Attacks. In Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media, Wales, UK, 20–21 June 2022; Onwubiko, C., Rosati, P., Rege, A., Erola, A., Bellekens, X., Hindy, H., Jaatun, M.G., Eds.; Springer Proceedings in Complexity. Springer Nature: Singapore, 2023; pp. 87–101. [Google Scholar] [CrossRef]
Figure 1. Three-step methodological approach.
Figure 1. Three-step methodological approach.
Sensors 24 03458 g001
Figure 2. Maritime data fusion across the NIST CFW.
Figure 2. Maritime data fusion across the NIST CFW.
Sensors 24 03458 g002
Figure 3. Maritime components in cyberspace.
Figure 3. Maritime components in cyberspace.
Sensors 24 03458 g003
Figure 4. Vulnerable systems in the maritime domain.
Figure 4. Vulnerable systems in the maritime domain.
Sensors 24 03458 g004
Figure 5. Mapping of radar/AIS data fusion purposes.
Figure 5. Mapping of radar/AIS data fusion purposes.
Sensors 24 03458 g005
Figure 6. Sensors used for radar/AIS data fusion.
Figure 6. Sensors used for radar/AIS data fusion.
Sensors 24 03458 g006
Figure 7. Mapping radar/AIS data fusion operations.
Figure 7. Mapping radar/AIS data fusion operations.
Sensors 24 03458 g007
Figure 8. Elements of the Maritime Cyber Situational Awareness.
Figure 8. Elements of the Maritime Cyber Situational Awareness.
Sensors 24 03458 g008
Table 1. Cyberincidents, which involve navigational and surveillance means.
Table 1. Cyberincidents, which involve navigational and surveillance means.
Reported Events/Incidents
A/AIncidentYearInfected SystemType of Attack
1.NCC group demonstrated ECDIS compromisation, with the use of a portable USB disk by a crew member or through exploitation of an unpatched vulnerability via the internet, after unauthorized access [28].2015ENC—ECDISMalware/virus
2.Compromised ECDIS of a warship, which oversaw displaying digital nautical charts. Incident (cyberattack altering nautical maps) reported by US Navy [28].2015ENC—ECDIS-
3.McAfee found a vulnerability that was exploited through ransomware. This vulnerability allowed us to take total control over propulsion systems and navigation. It was possible to infect the vessel through an unsecured network connection. The attacker was able to encrypt essential system components so no one could control the ship [29,30]. 2015IT/OT SystemsMalware/
ransomware
4.In this incident, the navigation system of a cargo ship was lost for hours. This incident prevented the captain from controlling the ship’s course between Cyprus and Djibouti [31]. 2017Navigation system-
5.A collision happened in Singapore between the US Navy destroyer USS McCain and the small merchant ship Alnic MC. The sources do not tell the whole story, since the US Army was involved. A probable scenario is that Alin MC was attacked by hackers, and then because of that, the collision happened. Ten sailors on board USS died, and five others were injured [31,32].2017IT/OT systems-
6. GPS spoofing was performed in the Black Sea. Many ships were affected; fortunately, none of the ships were damaged [31]. 2017GNSSSpoofing
7.A malware attack on ECDIS infected the Windows system, via a USB stick [31].2017ECDISMalware
8.Malware affected MSC, of which the latter incident shut down the ship owner’s Geneva HQ for five days [33]. 2020IT systemsMalware
Table 3. Operations for AIS/radar data fusion.
Table 3. Operations for AIS/radar data fusion.
A/AMain
Category
TopicAlgorithm UsedRepresentative Publications
1.Statistical methods/
algorithms
Multi-target trackingGeneric[15,59,65,70,100,112,114,163,205]
2.Bayesian fusion[44,56,64,109,117,169,189,238,240,247,248,249]
3.JPDA[103,119,122,145,148,223]
4.Bernoulli filter[80,122,205,227,250]
5Kinematics analysisKalman filters[44,72,99,101,106,135,137,145,178,179]
6.Ornstein-Uhlenbeck (OU)[40,42,73,84,121,125,173,203,225,227,251]
7.Trajectory-based ML—dynamic algorithms[43,49,50,60,74,82,88,97,123,131,138,140,164,171,174,176,179,180,181,182,184,186,188,190,191,197,198,200,201,214,228,231,233,235,252]
8.Gaussian mixture model[107,177,196]
9.Probabilistic CalculationJPDA[103,111,119,122,223]
10.Neural networksPredictionRecurrent[48,175,187,211,253]
11.
12AccuracyKalman filters[113,115]
13.Decision supportSeveral [58,68,76,89,92,93,105,108,128,130,161,254,255]
14.Fuzzy logicMulti-factor fuzzy[58,81,104,116,124,126,185,207]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Potamos, G.; Stavrou, E.; Stavrou, S. Enhancing Maritime Cybersecurity through Operational Technology Sensor Data Fusion: A Comprehensive Survey and Analysis. Sensors 2024, 24, 3458. https://doi.org/10.3390/s24113458

AMA Style

Potamos G, Stavrou E, Stavrou S. Enhancing Maritime Cybersecurity through Operational Technology Sensor Data Fusion: A Comprehensive Survey and Analysis. Sensors. 2024; 24(11):3458. https://doi.org/10.3390/s24113458

Chicago/Turabian Style

Potamos, Georgios, Eliana Stavrou, and Stavros Stavrou. 2024. "Enhancing Maritime Cybersecurity through Operational Technology Sensor Data Fusion: A Comprehensive Survey and Analysis" Sensors 24, no. 11: 3458. https://doi.org/10.3390/s24113458

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop