Research Article
A Systematic Approach for Cybersecurity Design of In-Vehicle Network Systems with Trade-Off Considerations
| Attack objective | Severity | Attack method | RL | CAP | Attack scenario no. | AP |
| [1] Install malicious firmware to DCU | SS = 3 | [1.1] No authentication | RS = R5 | P[1.1] = P[1.1.1] = 5 | [1.1.1] | 5 | SP = 0 | | RF = R5 | | | | SF = 3 | [1.2] Bogus authentication | RS = R3 | P[1.2] = P[1.2.1] = 3 | [1.2.1] | 3 | SO = 0 | | RF = R3 | | | | | [1.3] Take over control after authorization | RS = R3 | P[1.3] = P[1.2.1] = 3 | [1.3.1] | 3 | RF = R3 |
| [2] Abort firmware update | SS = 0 | [2.1] Disable CGW routing | RF = R4 | P[2.1] = min{P[2.1.1], P[2.1.1]} = 5 | [2.1.1] and [2.1.2] | 5 | SP = 0 | | RO = R5 | | 5 | SF = 2 | [2.2] Disturb transmission on links | RF = R4 | P[2.2] = max{ P[2.2.1], min{P[2.2.2], P[2.2.3]}} = 5 | [2.2.1] [2.2.2] and [2.2.3] | 5 | SO = 3 | RO = R5 | 5 | 4 |
| [3] Reverse engineering | SS = 0 | [3.1] Eavesdrop on link | RP = R5 | P[3.1] = min{P[3.1.1], P[3.1.1]} = 5 | [3.1.1] and [3.1.2] | 5 | SP = 3 | RF = R5 | 5 | SF = 3 | [3.2] Copy data to another port of the switch | RP = R4 | P[3.2] = min{P[3.2.1], P[3.2.2]} = 4 | [3.2.1] and [3.2.2] | 4 | SO = 0 | RF = R4 | 5 |
|
|