Research Article
A Comparative Study of JASO TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design
Table 28
: Prioritized Threat List for Our Drone System.
| # | When | Where | What | (At, | Asset) | AV | AC | Au | AE | EF-C | EF-I | EF-A | EF | Risk Value |
| 1 | Operation | GPA | Malfunction | GPS | Receive function | N | L | N | 10.0 | N | C | C | 9.2 | 9.43 | 2 | Operation | GPA | Tampering | GPS | Location information | N | L | N | 10.0 | C | C | N | 9.2 | 9.43 | 26 | Operation | Wireless | Malfunction | Receiver | Authentication function | N | L | S | 8.0 | N | C | C | 9.2 | 8.47 | 27 | Operation | Wireless | Leakage | Receiver | Authentication information | N | L | S | 8.0 | C | C | N | 9.2 | 8.47 | 28 | Operation | Wireless | Malfunction | Receiver | Communication function | N | L | S | 8.0 | N | C | C | 9.2 | 8.47 | 10 | Operation | Wireless | Tampering | CPU | Firmware | N | M | S | 6.8 | C | C | N | 9.2 | 7.95 | 11 | Purchase | Wireless | Leakage | CPU | Firmware | N | M | S | 6.8 | C | C | N | 9.2 | 7.95 | 13 | Operation | Wireless | Malfunction | CPU | Control function | N | M | S | 6.8 | N | C | C | 9.2 | 7.95 | 15 | Operation | Wireless | Malfunction | CPU | Data handling function | N | M | S | 6.8 | N | C | C | 9.2 | 7.95 | 18 | Operation | Wireless | Tampering | CPU | Location information | N | M | S | 6.8 | C | C | N | 9.2 | 7.95 | 19 | Operation | Wireless | Leakage | CPU | Location information | N | M | S | 6.8 | C | C | N | 9.2 | 7.95 | 5 | Operation | Electromagnetic wave/ Supersonic wave | Malfunction | Position Sensor | Sensor function | A | L | N | 6.5 | N | C | C | 9.2 | 7.77 | 29 | Operation | Wireless | Tampering | Receiver | Control command | N | L | S | 8.0 | P | C | N | 7.8 | 7.51 | 32 | Operation | Wireless | Tampering | Receiver | Video image | N | L | S | 8.0 | C | P | N | 7.8 | 7.51 | 33 | Operation | Wireless | Leakage | Receiver | Video image | N | L | S | 8.0 | C | P | N | 7.8 | 7.51 |
|
|