Research Article

A Crowd-Based Intelligence Approach for Measurable Security, Privacy, and Dependability in Internet of Automated Vehicles with Vehicular Fog

Table 6

Calculation table for security criticality for selected configuration.

Cs1Cs2Component weight_w1Significance weight_w1Component weight_w2Significance weight_w2Total significance weight (∑)Final configuration criticalitySecurity levelConfigurationSubsystemSelected configuration

3070700.49500.250.744753Configuration1Vehicular fog
3050700.49500.250.743862Configuration2Selected for scenario 1
7070700.49500.250.747030Configuration3
7050700.49500.250.746436Configuration4
2030600.36700.490.852674Configuration1Radio link
2070600.36700.490.855545Configuration2
2030600.36700.490.852674Configuration3
2080600.36700.490.856238Configuration4
8030600.36700.490.855743Configuration5
8070600.36700.490.857426Configuration6
8030600.36700.490.855743Configuration7
8080600.36700.490.858020Configuration8
1030600.36700.490.852476Configuration9
1070600.36700.490.855446Configuration10
1030600.36700.490.852476Configuration11Selected for scenario 2
1080600.36700.490.856139Configuration12
9030600.36700.490.856337Configuration13
9070600.36700.490.857921Configuration14
9030600.36700.490.856337Configuration15
9080600.36700.490.858416Configuration16
3030600.36700.490.853070Configuration1Mobile linkSelected for scenario 3
3070600.36700.490.855743Configuration2
9030600.36700.490.856337Configuration3
9070600.36700.490.857921Configuration4