Research Article

A Comparative Study of JASO TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design

Table 29

Risk Score Comparison for Threat #6 Exploiting the Sensor Input.

# WhoWhenWhyWhereWhatCRSSRSS-CVSSv3Q-RSMA
(AtAsset)Score, LevelScore, LevelScore, Level

6OutsiderOperationMaliciouslyElectromagnetic wave/ Supersonic waveTamperingPosition SensorPosition information6.81 Level II7.05 Level III6.00 Level II