Research Article
A Comparative Study of JASO TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design
Table 15
: Effect Factor for CRSS: Value for Rank of Each Metric defined in [
76].
| | | | Confidentiality | Integrity | Availability | # | Module name | Asset to be protected | None | Partial | Complete | None | Partial | Complete | None | Partial | Complete | | | | 0.000 | 0.275 | 0.660 | 0.000 | 0.275 | 0.660 | 0.000 | 0.275 | 0.660 |
| 1 | Power-train | Control function | ✓ | | | | | ✓ | | | ✓ | | | Authentication function | ✓ | | | | | ✓ | | | ✓ | | | Authentication information | | | ✓ | | | ✓ | ✓ | | | | | Sensor information | ✓ | | | | | ✓ | ✓ | | |
| 2 | Chassis | Control function | ✓ | | | | | ✓ | | | ✓ |
| 3 | Body | Control function | ✓ | | | | ✓ | | | ✓ | | | | Control input data | ✓ | | | | | ✓ | ✓ | | |
| 4 | ADAS | Control function | ✓ | | | | | ✓ | | | ✓ | | | Sensor information | ✓ | | | | ✓ | | ✓ | | |
| 5 | CGW | Control function | ✓ | | | | | ✓ | | | ✓ | | (Central Gateway) | Flow/Storage data | ✓ | | | | | ✓ | ✓ | | |
| 6 | ITS | Authentication function | ✓ | | | | ✓ | | | ✓ | | | | Authentication information | | | ✓ | | | ✓ | ✓ | | | | | Control information | ✓ | | | | ✓ | | | ✓ | |
| 7 | Telematics | Authentication function | ✓ | | | | ✓ | | | ✓ | | | | Authentication information | | | ✓ | | | ✓ | ✓ | | | | | Personal information | | | ✓ | | | ✓ | ✓ | | | | | Request information to server | ✓ | | | | ✓ | | | ✓ | | | | Vehicle status information | | ✓ | | | ✓ | | ✓ | | |
| 8 | Infotainment | Authentication function | ✓ | | | | | ✓ | | | ✓ | | | Authentication information | | | ✓ | | | ✓ | ✓ | | |
|
|