Aller au contenu principal
← Use Cases · MARITIME · AIS / VDES

Maritime AIS/VDES & autonomous navigation

AllEyes Resilient (marine variant)GARANCE PKI
01 — Analysis

Problem

AIS (Automatic Identification System) is historically unencrypted and massively spoofable — vessel spoofing is common (ghost ships, sanctions evasion). Its successor VDES integrates VDE-SAT (satellite) but keeps classical crypto schemes. EEZ surveillance and autonomous navigation (Rolls-Royce, MSC) require robust, encrypted on-board sensor fusion.

CryptOps Solution

AllEyes Resilient (NEBS/marine variant) onboard or at coastal stations: the hardware crypto engine encrypts AIS/VDE-TER/VDE-SAT with ML-DSA-87, FPGA processes VHF modems and radar, CPU fuses radar/AIS/ECDIS, GPU runs multi-target tracking and navigation anomaly detection.

Deployment architecture

02 — Performance

Key metrics

ML-DSA signed
anti-spoofing
AIS/VDES
Native PQC
uplink + downlink
VDE-SAT
300+
concurrent tracks
Target detection
96+ NM
10 cm X-band
Radar range
03 — ROI

ROI analysis

Item Before With CryptOps Impact
AIS spoofing Sanctions + safety impact PQC signatures Traceability
EEZ surveillance Leased drones or satellites Sovereign coastal stations Autonomy
Autonomous navigation 24/7 human supervision IMO MASS L3/L4 -40% crew
04 — Compliance

Applicable regulation

IMO MASS framework
Maritime Autonomous Surface Ships

IMO regulatory framework for autonomous vessels — L4 target 2030+.

IALA G1125 VDES
VDES standards

AIS successor with terrestrial and satellite VDE — PQC under discussion.

EU Maritime Security
EEZ surveillance

Surveillance obligations for European exclusive economic zones.

05 — Target clients

Target clients

National navy and coast guards Shipowners (CMA CGM, MSC) Port authorities VTS operators Autonomous vessel builders
06 — Business applications

Data processing on the same appliance

Beyond post-quantum encryption, every AllEyes Resilient appliance hosts your data-processing workloads on its FPGA, CPU and GPU resources — all isolated from the certified crypto core.

Next step

Secure your infrastructure today

Our team will guide you through the deployment tailored to your use case.