Research Article

A Crowd-Based Intelligence Approach for Measurable Security, Privacy, and Dependability in Internet of Automated Vehicles with Vehicular Fog

Table 7

Calculation table for privacy criticality for selected configuration.

Cp1Cp2Component weight_w1Significance weight_w1Component weight_w2Significance weight_w2Total significance weight (∑)Final configuration criticalityPrivacy levelConfigurationSubsystemSelected configuration

4080700.49500.250.745743Configuration1Vehicular fog
4040700.49500.250.744060Configuration2Selected for scenario 1
8080700.49500.250.748020Configuration3
8040700.49500.250.746931Configuration4
3030600.36700.490.853070Configuration1Radio link
3080600.36700.490.856436Configuration2
3020600.36700.490.852575Configuration3
3070600.36700.490.855743Configuration4
8030600.36700.490.855743Configuration5
8080600.36700.490.858020Configuration6
8020600.36700.490.855446Configuration7
8070600.36700.490.857426Configuration8
2030600.36700.490.852674Configuration9
2080600.36700.490.856238Configuration10
2020600.36700.490.852080Configuration11Selected for scenario 2
2070600.36700.490.855545Configuration12
7030600.36700.490.855149Configuration13
7080600.36700.490.857624Configuration14
7020600.36700.490.854852Configuration15
7070600.36700.490.857030Configuration16
2030600.36700.490.852674Configuration1Mobile linkSelected for scenario 3
2080600.36700.490.856238Configuration2
6030600.36700.490.854555Configuration3
6080600.36700.490.857228Configuration4