Research Article

A Systematic Approach for Cybersecurity Design of In-Vehicle Network Systems with Trade-Off Considerations

Table 10

Example security requirements.

Requirement no.Description

R1Authentication mechanisms should be used during the connection establishment
R2Encryption mechanisms which require average computing resources should be used when transmitting firmware data