297 
128-bit security: Z
p=256 bits, G1=512 bits, G2=3072 bits, 
G
T=3072 bits. Also [32] defines  an “indicative” time-
unit as the time needed for point multiplication on a 
random 171-bit elliptic curve for a random 160-bit 
exponent. Under the above settings, the following 
indicative results for SK-IBE are derived: For Super-
Singular (SS) elliptic curve at 80-bit security: Secret 
(Private) key extraction costs 2-time units, encryption 
costs 6-time units and decryption costs 104-time units. 
For MNT elliptic curve at 128-bit security: Secret 
(Private) key extraction costs 100-time units, 
encryption costs 36-time units and decryption costs 
1506 time units. Finally, the BLMQ Signcryption 
scheme that has similar characteristics  needs 2.65 
milliseconds to Sign and Encrypt for one group 
exponentiation and two scalar point multiplications 
[31].  The processing time for Decryption and 
Verification  is  6.09 milliseconds for one group 
exponentiation and two pairing evaluations. 
7  CONCLUSION 
In our previous work [1] we introduced the concept of 
a secure AIS founded on Identity Based 
Cryptography. In this work, we focused  on proving 
the feasibility of our idea by describing a working 
model based on specific AIS attributes and specific 
Identity Based Cryptographic schemes. We have 
proposed a Maritime  Identity Based Cryptographic 
infrastructure  (mIBC) under the IMO.  We described 
five usage modes for the proposed secure mIBC-AIS. 
The mIBC-Typical-AIS (mode 1) works like the typical 
AIS; it is the default mIBC-AIS usage mode. The 
mIBC-  Authenticated-AIS (mode 2) enhances AIS 
transmissions with source authentication capabilities; 
its implementation is  based on the BLMQ identity-
based signatures operations formalized in the  IEEE 
1363.3-2013  standard. The mIBC-Anonymous-AIS 
(mode 3) uses  Pseudo-MMSIs to provide AIS with 
anonymity, as described  in detail in  [1].  When in 
mIBC-SK-IBE-AIS (mode 4) usage mode,  the mIBC-
AIS can send arbitrary encrypted data to any entity 
under mIBC without any previous contact or pre-
configuration with the receiver entity. For the 
implementation of the mIBC-SK-IBE-AIS (mode 4), 
we used  the  security proof of Sakai-Kasahara’s 
Identity-Based Encryption scheme in [19]. The last 
usage mode is the mIBC-AES-AIS (mode 5), which 
provides for  Encrypted AIS secure (group)-
communication with symmetric cryptography (e.g., 
AES). Today, encrypted AIS with symmetric ciphers 
(e.g., AES) is offered  by various vendors of 
commercial AIS devices but always for pre-defined 
“blue-forces” that they use pre-installed symmetric 
AES keys.  In contrast,  we use the mIBC-SK-IBE-AIS 
(mode 4) to disseminate the symmetric AES keys of 
the mIBC-AES-AIS (mode 5), to any trustworthy 
entity, ad-hoc, without any pre-communication or 
symmetric-key pre-installation. Responsible for the 
proposed mIBC-AIS functionality is the  mIBC-AIS-
App intermediate application, that lies between the 
typical AIS devise and its AIS antenna. The mIBC-
AIS-App is responsible for intercepting the original 
AIS data, to perform  the cryptographic operations 
and to encapsulate/decapsulate the mIBC-AIS data 
into standard AIS Messages ID6/8 as arbitrary data 
payloads.  In this way, the implementation of the 
mIBC-AIS uses the currently available AIS 
infrastructure but does not directly interact with it. 
This enables the mIBC-AIS to be a transparent add-on 
to  the currently available AIS infrastructure. We 
conclude  that a practical implementation of our 
approach is feasible. We intend to proceed with a 
prototype implementation of the proposed scheme, 
including the mIBC-App, and to experiment with it in 
order to assess its performance.     
REFERENCES 
[1] A. Goudossis and S. Katsikas, "Towards a secure 
automatic identification system (AIS)," Journal of Marine 
Science and Technology, vol. 24, no. 2, pp. 410-423, 2019.   
[2] U. C. G. N. Center, "HOW AIS WORKS," U.S. Coast 
Guard Navigation Center , 09 08 2016. [Online]. 
Available: 
https://www.navcen.uscg.gov/?pageName=AISworks. 
[Accessed 02 08 2019]. 
[3] U. C. G. N. Center, "AIS CLASS A SHIP STATIC AND 
VOYAGE RELATED DATA (MESSAGE 5)," U.S. Coast 
Guard Navigation Center,  16 11 2017. [Online]. 
Available: 
https://www.navcen.uscg.gov/?pageName=AISMessage
sAStatic. [Accessed 02 08 2019]. 
[4] B. Ellison, "Mandated AIS, an aid to pirates?," Panbo, 
2019. [Online]. Available: 
https://www.panbo.com/mandated-ais-an-aid-to-
pirates/. [Accessed 02 08 2019]. 
[5] C. Guarnieri, "Should ship data be open to the public?," 
Verdict Media Limited, 25 06 2013. [Online]. Available: 
https://www.ship-technology.com/features/featureship-
data-be-open-public-security/. [Accessed 02 08 2019]. 
[6] M. Balduzzi, K. Wilhoit and A. Pasta, "A Security 
Evaluation of AIS," Trend Micro. 
[7] I. M. O. (IMO), "Maritime Security and Piracy," 
International Maritime Organization (IMO), [Online]. 
Available: 
http://www.imo.org/en/OurWork/Security/Pages/Mariti
meSecurity.aspx. [Accessed 02 08 2019]. 
[8] G. Kessler, Craiger, J.P. and J. Haass, "A Taxonomy 
Framework for Maritime Cybersecurity: A 
Demonstration Using the Automatic Identification 
System,"  TransNav,  the  International  Journal  on  Marine 
Navigation and Safety of Sea Transportation, vol. 12, no. 3, 
pp. 429-437, 2018.   
[9] F. Lazaro, R. Raulefs, W. Wang, F. Clazzer and S. Plass, 
"VHF Data Exchange System (VDES): an enabling 
technology for maritime communications," CEAS  Space 
Journal, vol. 11, no. 1, pp. 55-63, 2019.   
[10] J. Hall, J. Lee, J. Benin, C. Armstrong and H. Owen, 
"IEEE 1609 influenced automatic identification system 
(AIS)," in IEEE Vehicular Technology Conference, Glasgow, 
UK, 2015.   
[11] I. M. Organization, Resolution  A.1106(29),  IMO 
REVISED  GUIDELINES  FOR  THE  ONBOARD 
OPERATIONAL  USE  OF  SHIPBORNE  AUTOMATIC 
IDENTIFICATION  SYSTEMS  (AIS),  International 
Maritime Organization, 2015.   
[12] A. Goudosis, T. Kostis and N. Nikitakos, "Automatic 
Identification System Stated Requirements for Naval 
Transponder Security Assurance," in N. Goudosis, A ; 
Kostis, T ; Nikitakos, “Automatic Identification System Stated 
Requirements  for  Naval  Transponder  2nd  International 
Conference on Applications of Mathematics & Informatics In 
Military Sciences (AMIMS), Vari, Greece, 2012.   
[13] D. He, N. Kumar, K.-K. R. Choo and W. Wu, "Efficient 
Hierarchical Identity-Based Signature with Batch 
Verification for Automatic Dependent Surveillance-