Research Article

A Comparative Study of JASO TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design

Table 13

: Threat List.

# WhereAtAssetWhoWhenWhyWhat

1OBD-IIPower-trainControl functionMaintenance staffIn maintenanceAccidentallycause malfunction
6CWC (TPMS)Power-trainControl functionOutsiderIn regular useMaliciouslycause malfunction
10DSRC (ITS)Power-trainControl functionOutsiderIn regular useMaliciouslycause malfunction
31Mobile (Telematics)ChassisControl functionOutsiderIn regular useMaliciouslycause malfunction
32BT/Wi-Fi/IR (Infotainment)ChassisControl functionOutsiderIn regular useMaliciouslycause malfunction
34SD/USB (Infotainment)ChassisControl functionOwner/UserIn regular useAccidentallyinfect with malware
52CWC (TPMS)ADASControl functionOutsiderIn regular useMaliciouslycause malfunction
55DSRC (ITS)ADASLocation informationOutsiderIn regular useMaliciouslywrite wrong data
56Mobile (Telematics)ADASControl functionOutsiderIn regular useMaliciouslycause malfunction
64OBD-IICGWControl functionOutsiderIn regular useMaliciouslycause malfunction
69CWC (TPMS)CGWFlow/Storage dataOutsiderIn regular useMaliciouslywrite wrong data
70DSRC (ITS)CGWControl functionOutsiderIn regular useMaliciouslycause malfunction
72Mobile (Telematics)CGWControl functionOutsiderIn regular useMaliciouslycause malfunction
75BT/Wi-Fi/IR (Infotainment)CGWFlow/Storage dataOutsiderIn regular useMaliciouslywrite wrong data
77SD/USB (Infotainment)CGWControl functionOwner/UserIn regular useAccidentallyinfect with malware