2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS) 2016
DOI: 10.1109/imis.2016.42
|View full text |Cite
|
Sign up to set email alerts
|

A Security Risk Assessment Framework for Smart Car

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 8 publications
0
10
0
Order By: Relevance
“…However, a study 36 conducted on such methods highlighted the limitations of using existing risk assessment techniques and mitigation strategies as there exists a distinct difference between IT security and CPS security, and these risk assessment methods are not specifically designed for CPS security. From the perspective of CPS, the lack of security testing technology, lack of risk assessment systems, and the lack of behavior audit along with the use of malicious code to gain unauthorized access are the main causes of CPS (e.g., the ICS, 28 unmanned drones, 49 medical monitoring systems, 50 autonomous automotive systems, 51 and distributed robotics 52 ) being vulnerable to cyber attacks which in turn are a major strategic issue for the national economy and the livelihood of the people 28 …”
Section: Related Workmentioning
confidence: 99%
“…However, a study 36 conducted on such methods highlighted the limitations of using existing risk assessment techniques and mitigation strategies as there exists a distinct difference between IT security and CPS security, and these risk assessment methods are not specifically designed for CPS security. From the perspective of CPS, the lack of security testing technology, lack of risk assessment systems, and the lack of behavior audit along with the use of malicious code to gain unauthorized access are the main causes of CPS (e.g., the ICS, 28 unmanned drones, 49 medical monitoring systems, 50 autonomous automotive systems, 51 and distributed robotics 52 ) being vulnerable to cyber attacks which in turn are a major strategic issue for the national economy and the livelihood of the people 28 …”
Section: Related Workmentioning
confidence: 99%
“…Based on the highest threat probability, the vehicle can predict the possible attack scenario and protect itself from the attack. Another risk assessment framework has been proposed in [27]. The proposed security risk assessment framework is based on a conventional security analysis model and attack tree.…”
Section: Risk In Vanetsmentioning
confidence: 99%
“…After determining the values for vehicle context, driver's attitude and sensitivity level of the application, risk is measured according to Equation (3). In this equation, w 1 to w 6 are the weight values of the six factors used in vehicle context determination.…”
Section: Lanementioning
confidence: 99%
“…In practice, not all vehicles are trustworthy [1,2]. A faulty, malicious, or compromised (hacked) [3] vehicle may forward or share fake and inaccurate information, which may cause undesirable things, such as, automobile fatalities and traffic congestion. Therefore, it is highly recommended to evaluate risk before a vehicle takes any decision based on the received information from the surrounding vehicles.…”
Section: Introductionmentioning
confidence: 99%