Research Article
A Crowd-Based Intelligence Approach for Measurable Security, Privacy, and Dependability in Internet of Automated Vehicles with Vehicular Fog
Table 5
Component, component weight, and configurations.
| Subsystem | Component | Component weight | Configurations | Cs | Cp | Cd |
| Vehicular fog | Radio link | 70 | With encryption | 30 | 30 | 10 | Without encryption | 70 | 80 | 30 | GSM (2G/3G or above) | 50 | 2G | 70 | 80 | 60 | 3G or above | 50 | 40 | 40 | Radio link | 802.11p | 60 | With encryption | 20 | 30 | 40 | Without encryption | 80 | 80 | 60 | With authentication | 10 | 20 | 20 | Without authentication | 90 | 70 | 70 | Cognitive radio | 70 | With encryption | 30 | 30 | 40 | Without encryption | 70 | 80 | 60 | With authentication | 30 | 20 | 20 | Without authentication | 80 | 70 | 70 | Mobile link | Access control | 60 | Enabled | 30 | 20 | 30 | Disabled | 90 | 60 | 70 | Encryption | 70 | ON | 30 | 30 | 30 | OFF | 70 | 80 | 70 |
|
|