Research Article
A Comparative Study of JASO TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design
| | | | Confidentiality (Im-C) | Integrity (Im-I) | Availability (Im-A) | # | Module name | Asset to be protected | None | Low | High | None | Low | High | None | Low | High | | | | 0.00 | 0.22 | 0.56 | 0.00 | 0.22 | 0.56 | 0.00 | 0.22 | 0.56 |
| 1 | Power-train | Control function | ✓ | | | | | ✓ | | | ✓ | | | Authentication function | ✓ | | | | | ✓ | | | ✓ | | | Authentication information | | | ✓ | | | ✓ | ✓ | | | | | Sensor information | ✓ | | | | | ✓ | ✓ | | |
| 2 | Chassis | Control function | ✓ | | | | | ✓ | | | ✓ |
| 3 | Body | Control function | ✓ | | | | ✓ | | | ✓ | | | | Control input data | ✓ | | | | | ✓ | ✓ | | |
| 4 | ADAS | Control function | ✓ | | | | | ✓ | | | ✓ | | | Sensor information | ✓ | | | | ✓ | | ✓ | | |
| 5 | CGW | Control function | ✓ | | | | | ✓ | | | ✓ | | (Central Gateway) | Flow/Storage data | ✓ | | | | | ✓ | ✓ | | |
| 6 | ITS | Authentication function | ✓ | | | | ✓ | | | ✓ | | | | Authentication information | | | ✓ | | | ✓ | ✓ | | | | | Control information | ✓ | | | | ✓ | | | ✓ | |
| 7 | Telematics | Authentication function | ✓ | | | | ✓ | | | ✓ | | | | Authentication information | | | ✓ | | | ✓ | ✓ | | | | | Personal information | | | ✓ | | | ✓ | ✓ | | | | | Request information to server | ✓ | | | | ✓ | | | ✓ | | | | Vehicle status information | | ✓ | | | ✓ | | ✓ | | |
| 8 | Infotainment | Authentication function | ✓ | | | | | ✓ | | | ✓ | | | Authentication information | | | ✓ | | | ✓ | ✓ | | |
|
|