Research Article

A Systematic Approach for Cybersecurity Design of In-Vehicle Network Systems with Trade-Off Considerations

Table 6

Risk assessment results.

Attack objectiveSeverityAttack methodRLCAPAttack scenario no.AP

[1] Install malicious firmware to DCUSS = 3[1.1] No authenticationRS = R5P[1.1] = P[1.1.1] = 5[1.1.1]5
SP = 0RF = R5
SF = 3[1.2] Bogus authenticationRS = R3P[1.2] = P[1.2.1] = 3[1.2.1]3
SO = 0RF = R3
[1.3] Take over control after authorizationRS = R3P[1.3] = P[1.2.1] = 3[1.3.1]3
RF = R3

[2] Abort firmware updateSS = 0[2.1] Disable CGW routingRF = R4P[2.1] = min{P[2.1.1], P[2.1.1]} = 5[2.1.1] and [2.1.2]5
SP = 0RO = R55
SF = 2[2.2] Disturb transmission on linksRF = R4P[2.2] = max{ P[2.2.1], min{P[2.2.2], P[2.2.3]}} = 5[2.2.1] [2.2.2] and [2.2.3]5
SO = 3RO = R55
4

[3] Reverse engineeringSS = 0[3.1] Eavesdrop on linkRP = R5P[3.1] = min{P[3.1.1], P[3.1.1]} = 5[3.1.1] and [3.1.2]5
SP = 3RF = R55
SF = 3[3.2] Copy data to another port of the switchRP = R4P[3.2] = min{P[3.2.1], P[3.2.2]} = 4[3.2.1] and [3.2.2]4
SO = 0RF = R45