Research Article
A Systematic Approach for Cybersecurity Design of In-Vehicle Network Systems with Trade-Off Considerations
Table 10
Example security requirements.
| Requirement no. | Description |
| R1 | Authentication mechanisms should be used during the connection establishment | R2 | Encryption mechanisms which require average computing resources should be used when transmitting firmware data |
|
|