Research Article
A Comparative Study of JASO TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design
Table 32
: Effect Factor for Our Drone System.
| # | Module name | Assets to be protected | Confidentiality | Integrity | Availability | | | | None | Partial | Complete | None | Partial | Complete | None | Partial | Complete | | | | 0.000 | 0.275 | 0.660 | 0.000 | 0.275 | 0.660 | 0.000 | 0.275 | 0.660 |
| 1 | CPU (Flight Controller) | Firmware | | | ✓ | | | ✓ | ✓ | | | | | Configuration information | ✓ | | | | | ✓ | ✓ | | | | | Control function | ✓ | | | | | ✓ | | | ✓ | | | Control command | | ✓ | | | | ✓ | ✓ | | | | | Data handling function | ✓ | | | | | ✓ | | | ✓ | | | Status information | ✓ | | | | | ✓ | ✓ | | | | | Location information | | | ✓ | | | ✓ | ✓ | | | | | Position information | | ✓ | | | | ✓ | ✓ | | | | | Battery information | ✓ | | | | | ✓ | ✓ | | | | | Video image | | | ✓ | | ✓ | | ✓ | | |
| 2 | Receiver (Network Interface) | Authentication function | ✓ | | | | | ✓ | | | ✓ | | | Authentication information | | | ✓ | | | ✓ | ✓ | | | | | Communication function | ✓ | | | | | ✓ | | | ✓ | | | Control command | | ✓ | | | | ✓ | ✓ | | | | | Status information | ✓ | | | | | ✓ | ✓ | | | | | Video image | | | ✓ | | ✓ | | ✓ | | |
| 3 | GPS | Receive function | ✓ | | | | | ✓ | | | ✓ | | | Location information | | | ✓ | | | ✓ | ✓ | | |
| 4 | Camera | Recording function | ✓ | | | | ✓ | | | ✓ | | | | Video image | | | ✓ | | ✓ | | ✓ | | |
| 5 | Position Sensor (Altitude, Attitude, Direction) | Sensor function | ✓ | | | | | ✓ | | | ✓ | | | Position information | | ✓ | | | | ✓ | ✓ | | |
| 6 | Storage | Storage function | ✓ | | | | ✓ | | | ✓ | | | | Video image | | | ✓ | | ✓ | | ✓ | | |
| 7 | Li-Po Battery | Charging function | ✓ | | | | ✓ | | | ✓ | | | | Battery information | ✓ | | | | | ✓ | ✓ | | |
|
|