Research Article

A Comparative Study of JASO TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design

Table 30

: Impact for RSS-CVSSv3.

Confidentiality
(Im-C)
  Integrity (Im-I) Availability (Im-A)
# Module nameAsset to be protectedNoneLowHighNoneLowHighNoneLowHigh
0.000.220.560.000.220.560.000.220.56

1Power-trainControl function
Authentication function
Authentication information
Sensor information

2ChassisControl function

3BodyControl function
Control input data

4ADASControl function
Sensor information

5CGWControl function
(Central Gateway)Flow/Storage data

6ITSAuthentication function
Authentication information
Control information

7TelematicsAuthentication function
Authentication information
Personal information
Request information to server
Vehicle status information

8InfotainmentAuthentication function
Authentication information