Research Article

Towards a Severity Assessment Method for Potential Cyber Attacks to Connected and Autonomous Vehicles

Table 5

Categories of severity of attacks.

LevelDescriptionAttack types

1CriticalRemote control (audio/video devices); mislead cameras/fake vision (cameras); hidden objects (LiDAR); hidden objects (radar); spoofing (GNSS); fake identity (cloud authority)

2ImportantFake objects (LiDAR); fake objects (radar); DoS attack (battery system); injection (in-vehicle system); modification (in-vehicle system); modification (V2V communication); fake/ghost message (V2V communication); change infrastructure sign (V2I communication); injection (cloud dataset); modification (cloud dataset)

3ModerateBlind vision (cameras); jamming (LiDAR); jamming (radar); jamming (GNSS); eavesdropping (in-vehicle system); traffic analysis (in-vehicle system); DoS attack (V2V communication); block/remove sign (infrastructure sign); road line changing (road)

4MinorLoud volume (audio/video devices); fake sound (audio/video devices)