Research Article
Towards a Severity Assessment Method for Potential Cyber Attacks to Connected and Autonomous Vehicles
Table 5
Categories of severity of attacks.
| Level | Description | Attack types |
| 1 | Critical | Remote control (audio/video devices); mislead cameras/fake vision (cameras); hidden objects (LiDAR); hidden objects (radar); spoofing (GNSS); fake identity (cloud authority) |
| 2 | Important | Fake objects (LiDAR); fake objects (radar); DoS attack (battery system); injection (in-vehicle system); modification (in-vehicle system); modification (V2V communication); fake/ghost message (V2V communication); change infrastructure sign (V2I communication); injection (cloud dataset); modification (cloud dataset) |
| 3 | Moderate | Blind vision (cameras); jamming (LiDAR); jamming (radar); jamming (GNSS); eavesdropping (in-vehicle system); traffic analysis (in-vehicle system); DoS attack (V2V communication); block/remove sign (infrastructure sign); road line changing (road) |
| 4 | Minor | Loud volume (audio/video devices); fake sound (audio/video devices) |
|
|