Research Article
A Comparative Study of JASO TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design
Table 31
: Attack Ease for Our Drone System.
| Metric | Classification | Rank | Criteria | Value |
| Access Vector (AV): | Distance from threat | Local (L) | Serial, USB, Physical connector | 0.395 | | | Adjacent (A) | Optical wave, Electromagnetic wave, Supersonic wave | 0.646 | | | Network (N) | Wi-Fi, GPA | 1.000 |
| Access Complexity (AC): | Number of penetrations | High (H) | 3 or more | 0.350 | | | Medium (M) | 2 | 0.610 | | | Low (L) | 1 | 0.710 |
| Authentication (Au): | Number of authentication | Multiple (M) | 2 or more | 0.450 | | | Single (S) | 1 | 0.560 | | | None (N) | 0 | 0.704 |
|
|