Lt En

PORTATHON 2021: CHALLENGES

PORTATHON 2021: CHALLENGES
Experts, students, innovators, startups! Teams and individual participants! Join us to develop solutions for challenges:
  • Obstacle detection system for autonomous shunting locomotives

The shunting operations in bulk terminals are essential in order to ensure smooth cargo movement in the terminal. In average bulk terminals in Klaipeda port are moving 200 wagons a day, applying autonomous shunting locomotives in such an operation requires highly reliable obstacle detection systems to ensure human and infrastructure safety in the terminals.      

In order to allow robust obstacle detection for autonomous freight traffic using freight trains or shunting locomotives, several different sensors are required. Humans and other objects must be detected so that the vehicle can stop in time.

THE GOAL: Develop and technical specification or a pilot sensor fusion to be used for the obstacle detection of an autonomous shunting locomotive.

  • Setting up IOT cyber-security requirements specification during procurement of Drones/IoT for Port infrastructure operations.

Summary: Most IoT vendors do not pay attention to information security, because it is expensive and requires a deep changes in production process, well known as DevSecOps. As a result, we can be in a situation in which we find that the business activities or operations of IoT customers are attacked due to using many small, poorly protected IoT devices, such as surveillance cameras, UAV: Unmanned Aerial Vehicles, Drones, location tags, etc. One of the key constraint factors for DevSecOps of IoT vendors has been identified to be the low demand from customers on cyber-security features.  Often the little to no interest on cyber-security can be explained by the lack of understanding of cyber-security requirements for a particular infrastructure by the executive or top-management of a customer organization.

You are to assume that you are now acting as in the role as an information system project manager in a Port and you have an option to involve a person with prior information security knowledge into a project where IoT technology will be used.

THE GOAL: i) How to engage this person in cyber-security requirements engineering activities in procuring an IoT devices and integrating it into an in-house information system respectively? ii) Please suggest threat model(s) including miss-use case analysis, and corresponding cyber-security requirements specification for IoT devices selection criterion.

  • Integrated vendor management for cyber-physical environments.

The most recent global cyber-security incidents, well known as “solarwinds hack” and “kaseya attack” was performed by using “supply chain attack” approach. This happens when Cybercriminals first target less-secure elements in the supply chain – the products and services that a company is using on every day basis for a long time and thus trust it and install every new update or modification delivered by the respective vendor. It may be IoT device, industrial equipment with processing units, software, online services such as email, data storage or security services. During supply chain attack, a company may start using infected or modified copy of product or service that in some way activate vulnerabilities inside the organization infrastructure.  This will allow Cybercriminals to gain control over the organization systems in special hidden way and then pose a real damage, bypassing existing security controls.

In recent years, we argue that Ports and Terminals can be identified as complex cyber-physical systems, that are increasingly dependent on ever more on multiple vendors of various digital equipment, software, online services and IoT devices. Even if just a single vendor has a weaknesses in it’s cyber security posture mentioned in Challenge 1, the possibility of a “Supply chain” attack is very realistic.  Automatic guided vehicles (AGVs) and Drones are good examples of systems that may pose a great damage to port infrastructure including threat to human life, in case of successful “supply chain” attacks.  A number of external staff are also accessing Port facilities and they may have iterations with the software, network and equipment inside the Port perimeter. During the current COVID-19 pandemic some of external suppliers are/were granted remote access to provide support services to the Port. The examples given above are to be considered as additional sources from which “supply chain attack” could be initiated.

Of the number of cyber-security strategies that exist in cyber-physical systems, such as Ports and Terminals, is on applying a proper Vendor Management System. This approach not only manages vendors, but also includes: the assetstracking of cyber-security posture of respective vendors; and providing an integrated picture of cyber-dependencies between port infrastructure and vendor systems. The Vendor Management System allows to means to identify critical elements in a Port or Terminals infrastructure and the interdependencies between “in-house” and 3rd party vendors systems in regards of cyber-security.

THE GOAL: i) Find a solution for an integrated Vendor Management system that maintains the list of vendors of online services, software and IoT vendors and respective assets used by Port. ii) Provide a solution of relationship model between type of asset and level of potential damage to port infrastructure in case of successful “supply chain” attack. iii) Develop a Cyber-Security Risk Assessment tool integrated into Vendor Management system.

  • Navy personnel skill and training planning solution

The personnel join the Navy having already at least bachelor’s degree or other form of professional training, according to which the career line is chosen. The career line is connected with certain skills and competencies and with training courses needed for them. This mechanism is used to make sure that personnel receive courses that match the career line. Every working position in the Navy needs certain skills and competencies, which are vital prior assigning personnel to those positions. Skills and competencies normally have three levels: basic, intermediate and expert. Personnel during their time in the Navy receive on-job-training and specialist/career courses to reach certain skills and competencies that are not only vital for the personnel but also for the Navy. There can be several courses in Lithuania and abroad to meet certain skills and competencies requirements. Personnel training is allocated along time axis, which means that the personnel is not being sent to courses prior starting in the new position but it is accomplished during time, e. g. 1 level specialist training takes about 1 year, then he works for two years, and then is being sent to 2 level courses. All courses have specific requirements to the participants such as English proficiency level, rank, etc. There is need for s solution for effective administration of required skills/competencies and planning of personnel training during service period from Level 1 to Level 4 (from Ensign to Admiral).

THE GOAL: To create personnel skills/competencies and training planning tool.

  • Interior solution for Lithuanian navy warship

The Lithuanian Navy is planning to build a new single class warships and now is starting the concept development stage. Until now all Lithuanian Navy ships have been built abroad and purchased already furnished in accordance with the origin country standards. The Navy needs a warship interior solution.

THE GOAL: The warship interior solution for the officers‘ wardroom, non-commissioned officers‘ wardroom and sailors wardroom; officers, non-commissioned officers and sailors cabins which fosters motivation to serve on board, creates positive and calm rest environment and at the same time maintaining the fighting spirit.

  • Automated system for drone monitoring (air quality, water area, quays)

Currently, 24/7 monitoring is carried out by port dispatchers‘ office using real-time video surveillance cameras. Demand for improved security surveillance is increasing and more sophisticated monitoring is needed to identify air quality, monitor water areas and inspect conditions (damages) of port infrastructural installations and terminal storage sites.

THE GOAL: find/create the principles of a drone monitoring system that would cover several different surveillance targets such as air quality, water area, conditions (damages) of port infrastructural facilities and terminal storage sites.

  • To reduce pollution by using marine bioresources and marine-based biocomponents.

The Baltic Sea is a large enclosed shallow sea and its pollution has become one of the main environmental challenges of recent decades, so its prevention and control is a key objective. Marine biotechnology uses living sea organisms for various applications in many industrial sectors, like healthcare, textiles, chemicals, fuel and food. How to use these bioresources to reduce the pollution of the Baltic Sea.

THE GOAL: To create an effective system to reduce pollution by Using Marine Bioresources and Marine-based Biocomponents.

List of challenges is filling up - come and find yours!

PRACTICAL INFRMATION

Date: 24th – 26th September, 2021.

Hybrid format: teams and mentors are welcome to meet online (ZOOM platform). Also we provide physical locations if they want to meet with teammates face-to-face.

Address in Lithuania: Klaipeda Science and Technology Park; Vilhelmo Berbomo st.10, Klaipeda 92221.

Address in Germany: Hochschule Wismar, University of Applied Sciences: Technology, Business and Design. European Project Center.  Philipp-Müller-Str. 14; 23966 Wismar.

Address in Sweden: Blue Science Park. Campus Grasvik 2 371 75 Karlskrona.

Important note regarding team-making: only teams from 3 to 5 members are allowed to participate in the hackathon. If you do not have your team – you are welcome to register by yourself and organizers will combine team with members with the same interest.

Event is free of charge. Event language: English.

Coordinator contact: innovaton manager Erika Zavackiene erika@kmtp.lt

Information of KSTP.

*skip_to_content*