scholarly journals AIS Meets IoT: A Network Security Mechanism of Sustainable Marine Resource Based on Edge Computing

2021 ◽  
Vol 13 (6) ◽  
pp. 3048
Author(s):  
Han-Chieh Chao ◽  
Hsin-Te Wu ◽  
Fan-Hsun Tseng

The sustainable utilization of marine resources is a vital issue to enrich marine life and to prevent species extinction caused by overfishing. Nowadays, it is common that commercial and smaller vessels are equipped with an Automatic Identification System (AIS) and GPS for better vessel tracking to avoid vessel collision as well as mayday calls. Additionally, governments can monitor vessels’ sea activities through AIS messages, stopping them from overfishing or tracking if any vessel has caused marine pollution. However, because AIS devices cannot guarantee data security, they are susceptible to malicious attacks such as message modification or an illegitimate identity faking a distress signal that causes other vessels to change their course. Given the above, a comprehensive network security system of a sustainable marine environment should be proposed to ensure secure communication. In this paper, a stationary IoT-enabled (Internet of Things) vessel tracking system of a sustainable marine environment is proposed. The system combines network security, edge computing, and tracking management. It offers the following functions: (1) The IoT-based vessel tracking system tracks each aquafarmer’s farming zone and issues periodic warning to prevent vessel collision for pursuing a sustainable marine environment; (2) the system can serve as a relay station that evaluates whether a vessel’s AIS data is correct; (3) the system detects abnormal behavior and any irregular information to law enforcement; (4) the system’s network security mechanism adopts a group key approach to ensure secure communication between vessels; and (5) the proposed edge computing mechanism enables the tracking system to perform message authentication and analysis, and to reduce computational burden for the remote or cloud server. Experiment results indicate that our proposed system is feasible, secure, and sustainable for the marine environment, and the tendered network security mechanism can reduce the computational burden while still ensuring security.

2019 ◽  
Vol 44 (5) ◽  
pp. 881-899 ◽  
Author(s):  
Lorenzo Pezzani ◽  
Charles Heller

Automatic identification system (AIS) is a vessel tracking system, which since 2004 has become a global tool for the detection and analysis of seagoing traffic. In this article, we look at how this technology, initially designed as a collision avoidance system, has recently become involved in debates concerning migration across the Mediterranean Sea. In particular, after having briefly discussed its emergence and characteristics, we examine how through different practices of (re)appropriation AIS, and the data it generate, have been seized upon, both to contest and to sustain the exclusionary nature of borders, and the mass dying of migrants at sea to which it leads. We do so by referring to forms of data activism we have contributed to in the frame of our Forensic Oceanography project as well as to situations in which AIS has been mobilized by xenophobic groups to demand even stronger exclusionary measures. At the same time, we point to the multiplicity of actors who participate in the politics of migration through AIS in unexpected ways. We conclude by highlighting the irreducible ambivalence of practices of appropriation and call for persistent attention to one’s own positioning within the global datascape constituted by AIS and other data.


2020 ◽  
Vol 2020 (9) ◽  
Author(s):  
Patrick Draper ◽  
Jonathan Kozaczuk ◽  
Scott Thomas

Abstract A primary goal of a future e+e− collider program will be the precision measurement of Higgs boson properties. For practical reasons it is of interest to determine the minimal set of detector specifications required to reach this and other scientific goals. Here we investigate the precision obtainable for the e+e−Zhμ+μ−X inclusive cross section and the Higgs boson mass using the di-muon recoil method, considering a detector that has only an inner tracking system within a solenoidal magnetic field, surrounded by many nuclear interaction lengths of absorbing material, and an outer muon identification system. We find that the sensitivity achievable in these measurements with such a tracking detector is only marginally reduced compared to that expected for a general purpose detector with additional electromagnetic and hadronic calorimeter systems. The difference results mainly from multi-photon backgrounds that are not as easily rejected with tracking detectors. We also comment on the prospects for an analogous measurement of the e+e−→Zh→e+e−X inclusive cross section. Finally, we study searches for light scalars utilizing the di-muon recoil method, estimating the projected reach with a tracking or general purpose detector.


Mathematics ◽  
2021 ◽  
Vol 9 (22) ◽  
pp. 2871
Author(s):  
Sergio Isai Palomino-Resendiz ◽  
Norma Beatriz Lozada-Castillo ◽  
Diego Alonso Flores-Hernández ◽  
Oscar Octavio Gutiérrez-Frías ◽  
Alberto Luviano-Juárez

In this article, the trajectory tracking control of a solar tracking system is tackled by means of an adaptive active disturbance rejection control scheme. The state and disturbance estimation system is based on the combination of a time varying identification system and an adaptive observer. The stability and robustness of the controller is mathematically tested by means of the second method of Lyapunov, and its effectiveness is experimentally tested in a robotic test bed, achieving both lower energy consumption and better tracking results with respect to a PID-based controller.


2014 ◽  
Vol 926-930 ◽  
pp. 2434-2437
Author(s):  
Jin Meng ◽  
Yu Yang Du ◽  
Xiao Zhang

IPV6 is the next generation networking protocol. It can provide more address space than IPV4 and more secure service. This paper studies the technical features of the IPv6 protocol, discusses IPv6 network security mechanisms.


Author(s):  
Yixin Jiang ◽  
Yunan Zhang ◽  
Aidong Xu ◽  
Xiaoyun Kuang ◽  
Jiaxiao Meng ◽  
...  

Author(s):  
Hoseong Jeon ◽  
Min Young Chung ◽  
Jaehyoun Kim ◽  
Hyunseung Choo

Sign in / Sign up

Export Citation Format

Share Document