2022
DOI: 10.1007/s11276-022-03084-9
|View full text |Cite
|
Sign up to set email alerts
|

PIER: cyber-resilient risk assessment model for connected and autonomous vehicles

Abstract: As more vehicles are being connected to the Internet and equipped with autonomous driving features, more robust safety and security measures are required for connected and autonomous vehicles (CAVs). Therefore, threat analysis and risk assessment are essential to prepare against cybersecurity risks for CAVs. Although prior studies have measured the possibility of attack and damage from attack as risk assessment indices, they have not analyzed the expanding attack surface or risk assessment indices that rely up… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 34 publications
0
5
0
Order By: Relevance
“…In addition, the framework 16 defines parameters for determining the impact value and the threat probability, as well as the weights for each of their levels. In this case, the PIER model proposed for connected and autonomous vehicles 68 could be an inspiration for risk-level assessment. The model works with a combination of probability (P) and impact (I) but complements the assessment with the categories exposure (E) and recovery (R).…”
Section: Discussionmentioning
confidence: 99%
“…In addition, the framework 16 defines parameters for determining the impact value and the threat probability, as well as the weights for each of their levels. In this case, the PIER model proposed for connected and autonomous vehicles 68 could be an inspiration for risk-level assessment. The model works with a combination of probability (P) and impact (I) but complements the assessment with the categories exposure (E) and recovery (R).…”
Section: Discussionmentioning
confidence: 99%
“…In order to accurately determine the risk level, a comprehensive risk assessment must be conducted by taking into account the impact level of potential damage scenarios and the attack feasibility level of possible attack paths. This ensures that a precise evaluation can be made regarding the feasibility of each threat that may occur [74].…”
Section: Methodmentioning
confidence: 99%
“…As the connection of vehicles keeps developing, the detrimental consequences of cyberattacks that transmit erroneous information over the network are becoming more severe. Furthermore, the frequency of these attacks is not decreasing, which is more evident that the risk level magnitude is high [74], [81]. As shown in Table 15, the minimum and maximum ranges for the impact rating are defined and divided into three groups for intuitive interpretation.…”
Section: B Mathematical Modeling Of Proposed Approachmentioning
confidence: 99%
“…Additionally, secure over‐the‐air (OTA) update mechanisms can be employed (Park & Park, 2022; Nilsson & Larson, 2008; Zandberg et al, 2019), which encrypt the update packages and verify their integrity before installation. By implementing secure communication protocols and encryption techniques, the confidentiality and integrity of the update process can be maintained, safeguarding against potential attacks.…”
Section: Cav Cybersecuritymentioning
confidence: 99%