Research Article

A Systematic Approach for Cybersecurity Design of In-Vehicle Network Systems with Trade-Off Considerations

Table 9

Possible countermeasures of each asset attack.

Asset attack indexPossible countermeasures

[1.1.1][C1] Add authentication mechanisms when establishing connection
[1.2.1][C2] Enhance authentication mechanisms when establishing connection
[1.3.1][C3] Add authentication mechanisms in every diagnostic request and response
[2.1.1][C1] Add authentication mechanisms when establishing connection
[2.1.2][C8] Add authentication mechanisms when configuring switches
[2.2.1][C4] Add detecting and handling mechanisms of flooding attacks
[2.2.2][C1] Add authentication mechanisms when establishing connection
[2.2.3][C5] Add detecting and handling mechanisms of unexpected messages
[3.1.1][C6] Add detecting and handling mechanisms of illegal monitors
[3.1.2][C7] Encrypt messages
[3.2.1][C8] Add authentication mechanisms when configuring switches
[3.2.2][C7] Encrypt messages