Figure 6 - uploaded by Ahmed Amro
Content may be subject to copyright.
The proposed Network Security Zones and Levels

The proposed Network Security Zones and Levels

Source publication
Preprint
Full-text available
Recent innovations in the smart city domain have led to the proposition of a new mode of transportation utilizing Autonomous Passenger Ships (APS) or ferries in inland waterways. The novelty of the APS concept influenced the cyber risk paradigm and led to different confederations regarding attack objectives, techniques as well as risk management ap...

Contexts in source publication

Context 1
... proposed zoning architecture divides the network into six network levels across three zones each connecting a group of components with a specific set of functions. The proposed network security zones and their levels for the APS ecosystem are shown in Figure 6 following the recommended practice in DiD strategy [34]. The zones are the enterprise security zone, the manufacturing security zone, and the Demilitarized Zones (DMZ). ...
Context 2
... several network security levels reside within each security zone. Figure 6 depicts examples of the components hosted at each network level. Due to space restrictions, additional components within some levels are not presented. ...

Similar publications

Conference Paper
Full-text available
In recent years, there has been growing concern among experts regarding the risks of hacking autonomous vehicles. As these vehicles become increasingly complex, the number of potential vulnerabilities and challenges associated with securing them also rises. This paper presents a model checking-based framework that utilizes a predefined set of attac...
Chapter
Full-text available
The central concepts underlying Industry 4.0 are the inter-connectivity between smart machines, production equipment, storage systems, algorithms with autonomous data exchange, action triggers, and, autonomous process controls. The goal of Industry 4.0 is to improve monitoring and control of manufacturing processes and systems, leading to high-qual...
Preprint
Full-text available
In various domains such as energy, manufacturing, and maritime, cyber-physical systems (CPS) have seen increased interest. Both academia and industry have focused on the cybersecurity aspects of such systems. The assessment of cyber risks in CPS is a popular research area with many existing approaches that aim to suggest relevant methods and practi...
Article
Full-text available
Recent innovations in the smart city domain have led to the proposition of a new mode of transportation utilizing Autonomous Passenger Ships (APS) or ferries in inland waterways. The novelty of the APS concept influenced the cyber risk paradigm and led to different considerations regarding attack objectives, techniques as well as risk management ap...
Preprint
Full-text available
The major vehicle manufacturers deploy Over-the-Air (OTA) software update technology for their vehicle systems. In this research, we review the literature on the cybersecurity of the OTA software update mechanism. This allowed the derivation of a high-level reference architecture for the OTA system. The architecture and review guided the analysis o...

Citations

Chapter
Many industrial sectors are undergoing a digital transformation, including maritime. New technological advancements and modes of operations are being introduced to maritime infrastructure, which includes ships, ports, and other facilities. Digital transformation in maritime has among its goals reducing human involvement and improving remote connectivity. The achievement of these goals hinges on several components, including communication technologies and cybersecurity. Consequently, maritime-related communication and cybersecurity solutions are in high demand. This paper targets the development of a maritime-themed testbed utilized to evaluate and analyze several maritime use cases, including autonomous passenger ships (APS) with a prime focus on the communication and cybersecurity aspects. We have proposed abstraction of processes guiding the utilization of the testbed capabilities. Also, we proposed an approach for replicating the target system of analysis which facilitates the analysis and evaluation activities. The proposed testbed and its processes have been evaluated by discussing some of the projects that utilized it, including evaluating communication and cybersecurity architectures for an APS use case. Additionally, after comparison with the state-of-the-art in cybersecurity testbeds, the testbed was found to be supporting the majority of the concepts and properties observed in the literature while the missing elements were highlighted and designated as suggestions for future work. Moreover, we provide a discussion of the challenges in cybersecurity evaluation in maritime in general and autonomous ships in particular.