A Study on the Navigation Aids Management Based on IoT

| March 1, 2016

article image
Nowadays, most cargoes for export/import are processed through maritime transportation. Large-scale and high-speed vessels make maritime transportation more and more complex, which causes frequent maritime accidents. The risk of these maritime accidents can be reduced by providing systematic and appropriate safety information about them. For this, navigation aids are actively being used. However, because navigation aids are managed and maintained by using a manager’s visual observation, as well as by using a lighthouse and a buoy tender, checking the position error of a mooring buoy and its real-time condition becomes impossible. In accordance with this, conducting an overall review and an advance research on maritime transportation system on coastal waters should be conducted to systematically manage maritime transportation conditions, which makes it is necessary to develop a method of systematic management and efficient operation of navigation aids to help guarantee safe navigation on coastal waters

Spotlight

USAT Corp.

USAT Corp. architects and deploys wireless data solutions, specializing in cellular M2M & back-haul solutions from leading manufacturers: Sierra Wireless, Digi International, Red Lion Sixnet, CradlePoint, MultiTech Systems, CalAmp and Encore Networks. Additionally, as a full-service partner we also supply, configure and install monitoring equipment, such as digital video cameras, drop–in networking sensors and I/O arrays for state change detection, plus a full range of ruggedized computers, mounts and accessories. Our DevProv+ service is a suite of WWAN services designed to reduce your total cost of ownership and increase efficiency of your installation process by providing a host of provisioning and support services for your network devices. DevProv+ ensures that your devices are shipped "hot," connected to your carrier's network and ready to be installed, right out of the box.

OTHER ARTICLES

The Rise of the AIoT

Article | March 3, 2020

Artificial intelligence (AI) has existed in the public consciousness for decades. The (mostly) sentient machines playing the villains in Hollywood movies have never been realistic depictions of the technology, but they have left an impression, nonetheless. AI has proved as exciting to the layman as it is to the expert. Usually based in remote data centers, AI is capable of collecting and examining immense volumes of data, generating insights based on analytical algorithms. With varying degrees of autonomy, these capabilities have been put to use streamlining decision-making processes. While AI is often thought of as a product in its own right, it is increasingly intersecting with other parallel trends. Chief among these is the Internet of things (IoT), which enables previously isolated machines to “talk” to one another and, at the same time, generate data that makes new modes of operation a possibility.

Read More

Microsoft acquires ReFirm Labs to enhance IoT security

Article | March 3, 2020

Modern computing devices can be thought of as a collection of discrete microprocessors each with a dedicated function like high-speed networking, graphics, Disk I/O, AI, and everything in between. The emergence of the intelligent edge has accelerated the number of these cloud-connected devices that contain multiple specialized sub-processors each with its own firmware layer and often a custom operating system. Many vulnerability analysis and endpoint detection and response (EDR) tools find it challenging to monitor and protect devices at the firmware level, leading to an attractive security gap for attackers to exploit. At the same time, we have also seen growth in the number of attacks against firmware where sensitive information like credentials and encryption keys are stored in memory. A recent survey commissioned by Microsoft of 1,000 security decision-makers found that 83 percent had experienced some level of firmware security incident, but only 29 percent are allocating resources to protect that critical layer. And according to March 2021 data from the National Vulnerability Database included in a presentation from the Department of Homeland Security’s Cybersecurity and Infrastructure Agency (CISA) at the 2021 RSA, difficult-to-patch firmware attacks are continuing to rise. Microsoft’s Azure Defender for IoT team (formerly CyberX) recently announced alongside the Department of Homeland Security a series of more than 25 critical severity vulnerabilities in IoT and OT devices

Read More

12 Industrial IoT Companies You Should Know

Article | March 3, 2020

As the industrial IoT market continues to expand at rapid rates, companies across the world are reaping the benefits. Utilizing this growing network of tools and systems, businesses have been able to prevent costly downtime, decrease product development costs, enhance customer engagement and satisfaction and acquire and implement intelligent data for strategic planning purposes.The potential benefits are seemingly endless, and the list of organizations that are embracing this industrial revolution is continuing to grow, so let’s highlight some of the main IIoT companies you need to know for a number of the most common IIoT use cases.

Read More

Securing industrial networks: it’s a journey

Article | March 3, 2020

Trying to secure the industrial network in one go is like boiling the ocean. Better to view it as a journey. At each step in the journey, you’ll make incremental changes to people, process, and technology. Minimal security. This is the current state for most manufacturers. If you’re here, you’ve segmented the industrial network from the IT network. Traffic can’t cross from the IT network to the industrial network without clearing the DMZ. You can block malware from entering the industrial network. You can block malware from leaving the industrial network to infect the enterprise network. But if the industrial network is exposed to malicious software, you don’t have a way to contain it. That means the malware might affect multiple manufacturing cells or production lines — even multiple plants.

Read More

Spotlight

USAT Corp.

USAT Corp. architects and deploys wireless data solutions, specializing in cellular M2M & back-haul solutions from leading manufacturers: Sierra Wireless, Digi International, Red Lion Sixnet, CradlePoint, MultiTech Systems, CalAmp and Encore Networks. Additionally, as a full-service partner we also supply, configure and install monitoring equipment, such as digital video cameras, drop–in networking sensors and I/O arrays for state change detection, plus a full range of ruggedized computers, mounts and accessories. Our DevProv+ service is a suite of WWAN services designed to reduce your total cost of ownership and increase efficiency of your installation process by providing a host of provisioning and support services for your network devices. DevProv+ ensures that your devices are shipped "hot," connected to your carrier's network and ready to be installed, right out of the box.

Events