Professional Documents
Culture Documents
IoT Systems
M. Jović*, E. Tijan**, S. Aksentijević ***, and D. Čišić ****
*Faculty of Maritime Studies/Department of maritime logistics and management, Rijeka, Croatia
jovic@pfri.hr
** Faculty of Maritime Studies/Department of maritime logistics and management, Rijeka, Croatia
etijan@pfri.hr
*** Aksentijević Forensics and Consulting, Ltd., Viškovo, Croatia
sasa.aksentijevic@gmail.com
**** Faculty of Maritime Studies/Department of maritime logistics and management, Rijeka, Croatia
dragan@pfri.hr
Abstract - Introduction of Internet of Things (IoT) and solutions after attacks which occur more often as density
accelerated digitalization have globally improved of devices increases. If the focus is only on benefits of
productivity of seaports. The underlying problem of IoT is IoT, assuming that security is maximized, huge
data vulnerability, and the effects are very pronounced advantages can be noticed: effective monitoring of
within the complex business processes that take place in operations concerning the vessels, timely reactions and
seaports. The main consequences of the unprotected speeding up of overall business processes.
connected devices are unauthorized access, theft of
important information, and loss of information control. In
the future, new vectors of intrusions will be developed, and II. SECURITY AS A BASIS FOR SUCCESSFUL
it is important to anticipate possible weaknesses. DIGITALIZATION OF PROCESSES AT THE SEAPORTS
Furthermore, IoT data must be continuously backed up in The Internet of Things represents the digital, or
remote locations, which would facilitate the prevention of "smart" connection of objects using RFID sensors, Wi-Fi,
irrecoverable loss of data. Some seaports, where large
Bluetooth and other “smart” protocols in order to
volume of traffic is present, demonstrate that it is possible to
accelerate business processes. By 2020, there will be
utilize IoT advantages after the correct implementation and
monitoring of the entire system, while minimizing errors or
about 26 billion devices connected to the Internet [4]. The
consequences of security attacks. maritime industry, due to the digitalization process, comes
out of its traditional frameworks by creating solutions to
Keywords - Internet of Things, Seaports, Security systems improve the productivity and the sustainability of logistics
[5].
I. INTRODUCTION The goal of IoT is facilitating planning and
With the development of international trade and management of business processes by introducing modern
globalization, it is possible to notice the tendency of the information technologies. Preventive security mechanisms
traffic and cargo increase, so numerous seaports were are needed to ensure the entire network implemented by
compelled to accept changes in the transport sector and protocol such as: “managing identity devices, entering and
turn to more effective practices by introducing the Internet controlling a device access and monitoring” [6].
of Things (IoT) in their own seaports. The IoT can be Figure 1 [7] shows the global number of connected
considered as “the novel generation of Wireless Sensor Internet of Things devices (in billions) from 2016 to 2024
Networks (WSN) and it represents a network composed of (projected).
heterogeneous sensing devices, connected together over
the Internet, to acquire information and forward it to a
center of collect (base station)” [1]. The main goal of
digitalization is to speed up business processes but also to
reduce environmental pollution which is increasingly
being regulated by the “green laws”. “The most obvious
benefit of IoT connectivity lies in how it can transform
day-to-day operations at sea, at port and as part of a wider
logistics network: issues can be pinpointed, downtime can
be reduced, and processes can be streamlined, changing
the face of the maritime industry as we know it” [2].
Adequate security levels are required in ports, with
respect to the facilities and assets they utilize. Therefore,
the infrastructure and access to the restricted areas should
be monitored [3]. The main concern is directed towards
Figure 1: Connected devices in billions 2016 – 2024 [7]
consequences, security of the system and possible
According to the Internet Society, overall system • Many types of network attacks like eavesdropping
security is as good as its weakest connection because attack, DoS attack, Man in the Middle attack, and
various components can be controlled by different actors virus invasion are still affecting network layer.
in different jurisdictions (e.g. a server may be located in • Support Layer Security hosts IoT user’s data and
one country, while the device may be manufactured in applications so both should be protected from
another, and in use in yet another), making it more security breaches.
difficult to cooperate while solving security issues [8].
According to Statista, an investment in the endpoint • Data sharing is one of the characteristics of IoT
security amounted to US $ 302 million in 2017 [7]. It is application layer.
also predicted that $ 631 million will be invested in end- In a study commissioned by Inmarsat (the world leader
point security for affiliated devices in 2021, while $ 415 in global mobile satellite communications) and presented
million will be invested in the access points, which is 216 at the Press Briefing during the international shipping
million less than the 'end-point investment. From 2016 to exhibition “Posidonia” in 2018, the following question
2021, the trend of the security investment will be on the
was asked: ''How mature is the maritime sector’s approach
rise, given that security is the basis for the undisturbed
to the IoT security?'' The answers were [10]:
functioning of the system of interconnected devices.
• The cyber security fears focus on inward-facing
The classification of IoT architecture related to
matters such as data storage (55%)
security consists of 4 layers, as shown in Figure 2, and
each of them has its own security issues [9]. • 53% believe that more security skills would help
deliver IoT based solutions.
• 87% believe that data mishandling processes
could be improved