Exploring the Security Landscape of Underwater Positioning and Navigation Systems: An Attack Surface Analysis
- UNCW Author/Contributor (non-UNCW co-authors, if there are any, appear on document)
- Hosam Alamleh (Creator)
- Institution
- The University of North Carolina Wilmington (UNCW )
- Web Site: http://library.uncw.edu/
Abstract: Underwater positioning and navigation systems are vital for maritime operations but face significant security threats like spoofing, jamming, interception, sensor manipulation, and algorithm exploitation. This paper categorizes underwater navigation techniques (acoustic, GPS buoys, multi-sensor fusion, vision-based, hybrid) and analyzes their potential attack surfaces. To mitigate these threats, a multi-layered defense strategy is proposed, encompassing cryptographic authentication, secure communications, physical security, sensor redundancy, data validation, image authentication, and algorithm robustness. Specific countermeasures against jamming, spoofing, interception, sensor attacks, and algorithm attacks are discussed. A holistic approach integrating secure software practices, anomaly detection, and fusion technique diversity is emphasized to fortify system resilience against advanced persistent threats, ensuring maritime safety and security. This research contributes to understanding security vulnerabilities and providing a comprehensive mitigation framework for enhancing the resilience of underwater navigation systems.
Exploring the Security Landscape of Underwater Positioning and Navigation Systems: An Attack Surface Analysis
PDF (Portable Document Format)
1336 KB
Created on 9/16/2024
Views: 56
Additional Information
- Publication
- H. Alamleh and B. Karabacak, "Exploring the Security Landscape of Underwater Positioning and Navigation Systems: An Attack Surface Analysis," 2024 IEEE 49th Conference on Local Computer Networks (LCN), Normandy, France, 2024, pp. 1-7. https://doi.org/10.1109/LCN60385.2024.10639769.
- Language: English
- Date: 2024
- Keywords
- Prevention and mitigation, Software algorithms, Authentication, Termination of employment, Underwater navigation, Robustness, Cryptography