Research Article

A Crowd-Based Intelligence Approach for Measurable Security, Privacy, and Dependability in Internet of Automated Vehicles with Vehicular Fog

Table 8

Calculation table for dependability criticality for selected configuration.

Cd1Cd2Component weight_w1Significance weight_w1Component weight_w2Significance weight_w2Total significance weight (∑)Final configuration criticalityDependability levelConfigurationSubsystemSelected configuration

2060700.49500.250.743862Configuration1Vehicular fog
2040700.49500.250.742872Configuration2Selected for scenario 1
5060700.49500.250.745446Configuration3
5040700.49500.250.744753Configuration4
4040600.36700.490.854060Configuration1Radio link
4060600.36700.490.855248Configuration2
4020600.36700.490.853070Configuration3
4070600.36700.490.855941Configuration4
6040600.36700.490.854951Configuration5
6060600.36700.490.856040Configuration6
6020600.36700.490.854258Configuration7
6070600.36700.490.856634Configuration8
2040600.36700.490.853367Configuration9
2060600.36700.490.854753Configuration10
2020600.36700.490.852080Configuration11Selected for scenario 2
2070600.36700.490.855545Configuration12
7040600.36700.490.855545Configuration13
7060600.36700.490.856436Configuration14
7020600.36700.490.854852Configuration15
7070600.36700.490.857030Configuration16
3030600.36700.490.853070Configuration1Mobile linkSelected for scenario 3
3070600.36700.490.855743Configuration2
7030600.36700.490.855149Configuration3
7070600.36700.490.857030Configuration4