Research Article

A Comparative Study of JASO TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design

Table 28

: Prioritized Threat List for Our Drone System.

# When Where What (At, Asset) AV AC Au AE EF-C EF-I EF-A EF Risk Value

1 Operation GPA Malfunction GPS Receive function N L N 10.0 N C C 9.2 9.43
2 Operation GPA Tampering GPS Location information N L N 10.0 C C N 9.2 9.43
26 Operation Wireless Malfunction Receiver Authentication function N L S 8.0 N C C 9.2 8.47
27 Operation Wireless Leakage Receiver Authentication information N L S 8.0 C C N 9.2 8.47
28 Operation Wireless Malfunction Receiver Communication function N L S 8.0 N C C 9.2 8.47
10 Operation Wireless Tampering CPU Firmware N M S 6.8 C C N 9.2 7.95
11 Purchase Wireless Leakage CPU Firmware N M S 6.8 C C N 9.2 7.95
13 Operation Wireless Malfunction CPU Control function N M S 6.8 N C C 9.2 7.95
15 Operation Wireless Malfunction CPU Data handling function N M S 6.8 N C C 9.2 7.95
18 Operation Wireless Tampering CPU Location information N M S 6.8 C C N 9.2 7.95
19 Operation Wireless Leakage CPU Location information N M S 6.8 C C N 9.2 7.95
5 Operation Electromagnetic wave/
Supersonic wave
Malfunction Position Sensor Sensor function A L N 6.5 N C C 9.2 7.77
29 Operation Wireless Tampering Receiver Control command N L S 8.0 P C N 7.8 7.51
32 Operation Wireless Tampering Receiver Video image N L S 8.0 C P N 7.8 7.51
33 Operation Wireless Leakage Receiver Video image N L S 8.0 C P N 7.8 7.51