Research Article
A Systematic Approach for Cybersecurity Design of In-Vehicle Network Systems with Trade-Off Considerations
Table 9
Possible countermeasures of each asset attack.
| Asset attack index | Possible countermeasures |
| [1.1.1] | [C1] Add authentication mechanisms when establishing connection | [1.2.1] | [C2] Enhance authentication mechanisms when establishing connection | [1.3.1] | [C3] Add authentication mechanisms in every diagnostic request and response | [2.1.1] | [C1] Add authentication mechanisms when establishing connection | [2.1.2] | [C8] Add authentication mechanisms when configuring switches | [2.2.1] | [C4] Add detecting and handling mechanisms of flooding attacks | [2.2.2] | [C1] Add authentication mechanisms when establishing connection | [2.2.3] | [C5] Add detecting and handling mechanisms of unexpected messages | [3.1.1] | [C6] Add detecting and handling mechanisms of illegal monitors | [3.1.2] | [C7] Encrypt messages | [3.2.1] | [C8] Add authentication mechanisms when configuring switches | [3.2.2] | [C7] Encrypt messages |
|
|