Towards Blockchain-Enabled Cybersecurity Risk Assessment for Cyber-Ship Systems

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The shipping sector is undergoing significant technological advancements, with vessels becoming more interconnected and reliant on automation, artificial intelligence, and real-time data. While these advancements improve the intelligence and efficiency of shipping, they also increase the vulnerabilities of ships to escalating cyber threats, such as GPS spoofing, ransomware attacks, and communication. These threats can disrupt global supply chains, compromise safety, and cost millions in damages. Despite these challenges, most cybersecurity measures in the maritime industry still rely on centralized security models, which are slow to detect threats and leave ships vulnerable to large scale attacks. This work proposes a Blockchain-Enabled Cybersecurity Risk Assessment Framework for cyber-ship systems. Our approach utilizes the immutable capabilities of blockchain, along with decentralized threat intelligence and automated security, to create a robust and proactive cybersecurity framework.

Original languageEnglish
Title of host publicationData Security and Privacy Protection - 3rd International Conference, DSPP 2025, Proceedings
EditorsXiaofeng Chen, Haibo Hu, Ding Wang
Pages176-195
Number of pages20
DOIs
StatePublished - 2026
Event3rd International Conference on Data Security and Privacy Protection, DSPP 2025 - Xi'an, China
Duration: 16 Oct 202518 Oct 2025

Publication series

NameLecture Notes in Computer Science
Volume16176 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference3rd International Conference on Data Security and Privacy Protection, DSPP 2025
Country/TerritoryChina
CityXi'an
Period16/10/2518/10/25

Keywords

  • Analysis standard
  • Blockchain
  • Cyber-ship security
  • Risk analysis
  • Ship industry

Fingerprint

Dive into the research topics of 'Towards Blockchain-Enabled Cybersecurity Risk Assessment for Cyber-Ship Systems'. Together they form a unique fingerprint.

Cite this