2021
DOI: 10.1007/978-3-030-79108-7_2
|View full text |Cite
|
Sign up to set email alerts
|

Security Risk Estimation and Management in Autonomous Driving Vehicles

Abstract: Autonomous vehicles (AV) are intelligent information systems that perceive, collect, generate and disseminate information to improve knowledge to act autonomously and provide its required services of mobility, safety, and comfort to humans. This paper combines the security risk management (ISSRM) and operationally critical threat, asset, and vulnerability evaluation (OCTAVE allegro) methods to define and assess the AV protected assets, security risks, and countermeasures.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 18 publications
(19 reference statements)
0
2
0
Order By: Relevance
“…To study the security aspects and possible risks with IoTHDs, we apply information systems security risk management (ISSRM) concepts, defined by Dubois et al [89], that define the asset, risk, and risk treatment-related concepts to guide security risk management. We selected the ISSRM method because it supported systematic asset identification and functional decomposition of the system [90,91] when compared to other risk management methods used for IoT systems, such as NIST (National Institute of Standards and Technology) [92], OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation Method) [93], and TARA (Threat Assessment and Remediation Analysis) [94]. Affia et al [95] provides a more detailed comparison of these methods.…”
Section: Security Risk Managementmentioning
confidence: 99%
“…To study the security aspects and possible risks with IoTHDs, we apply information systems security risk management (ISSRM) concepts, defined by Dubois et al [89], that define the asset, risk, and risk treatment-related concepts to guide security risk management. We selected the ISSRM method because it supported systematic asset identification and functional decomposition of the system [90,91] when compared to other risk management methods used for IoT systems, such as NIST (National Institute of Standards and Technology) [92], OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation Method) [93], and TARA (Threat Assessment and Remediation Analysis) [94]. Affia et al [95] provides a more detailed comparison of these methods.…”
Section: Security Risk Managementmentioning
confidence: 99%
“…The IoT system architecture covers how software and hardware components act and work mutually in gathering, processing, storing, distributing, and using information from distributed sources to perform specific tasks and make decisions that meet their design objectives (Affia et al, 2021;Lombardi et al, 2021). Due to the heterogeneous nature of IoT components, each of which depends on different design specifications and system requirements, no standard approach for IoT deployments fits all use-cases (Kumar and Mallick, 2018).…”
Section: Iot System Architecture Perspective To Security Risk Managementmentioning
confidence: 99%
“…Depending on the use case, various network protocols such as CoAP, Zigbee, 3G, LAN, Bluetooth, RFID, or NFC (Kumar and Mallick, 2018) can be used. Additionally, the network layer comprises the communication infrastructure and supporting protocols allowing end-users and objects to interact (Affia et al, 2021).…”
Section: Network Layer: •mentioning
confidence: 99%
“…Research such as [33][34][35][36][37] has paid great attention to influence and acceptance factors. In contrast, [8,[38][39][40][41][42][43][44][45][46] have focused on cybersecurity challenges and evaluations. Drawing parallelism from cybersecurity, risk assessment, security management techniques, security impacts and effects, and threat analysis has been beneficial for quantifying security.…”
Section: Two-factor Authentication (2fmentioning
confidence: 99%