2016
DOI: 10.1007/s11227-016-1841-5
|View full text |Cite|
|
Sign up to set email alerts
|

Geocasting-based synchronization of Almanac on the maritime cloud for distributed smart surveillance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 41 publications
(15 citation statements)
references
References 10 publications
0
12
0
Order By: Relevance
“…This work analyzed the main security issues, examined the different RFID systems, and detailed the main type of cyber-attacks. In 2017, Lee et al [ 7 ] proposed the synchronization method from Almanac as a safety method when applied to a maritime cloud for synchronizing different vessels. Finally, Xing et al [ 105 ] developed an algorithm for improving safety on board.…”
Section: Digitalization On Maritime Transport: the Situation At Thmentioning
confidence: 99%
See 2 more Smart Citations
“…This work analyzed the main security issues, examined the different RFID systems, and detailed the main type of cyber-attacks. In 2017, Lee et al [ 7 ] proposed the synchronization method from Almanac as a safety method when applied to a maritime cloud for synchronizing different vessels. Finally, Xing et al [ 105 ] developed an algorithm for improving safety on board.…”
Section: Digitalization On Maritime Transport: the Situation At Thmentioning
confidence: 99%
“… Basic security is still more of an aim than a reality, even with the tools of the internet of things (IoT), which are as widely-used as radio frequency identification (RFID), where it is difficult to find commercial systems without critical security flaws and vulnerabilities [ 6 ]. This is also the case with security in the maritime cloud, which is still in its fledging stages [ 7 ]. …”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Accessing any surveillance video data must first ensure secure access control. Accessing the surveillance server in particular must absolutely guarantee the implementation of access control measures with the highest possible degree of security [8][9][10][11][12][13]. Moreover, it is imperative that a secure authentication approach be applied for the CCTV cameras, the interoperability server, the monitoring client, and other elements of the whole surveillance system.…”
Section: B Requirements For Cctv Surveillance Environmentsmentioning
confidence: 99%
“…In this process, encryption of CCTV image data is required. Yet, overhead of encryption itself exists in quality, so an efficient encryption method proper for mass data is necessary [7,8,9,10,11].…”
Section: Introductionmentioning
confidence: 99%