PIER: cyber-resilient risk assessment model for connected and autonomous vehicles
نویسندگان
چکیده
Abstract As more vehicles are being connected to the Internet and equipped with autonomous driving features, robust safety security measures required for (CAVs). Therefore, threat analysis risk assessment essential prepare against cybersecurity risks CAVs. Although prior studies have measured possibility of attack damage from as indices, they not analyzed expanding surface or indices that rely upon real-time resilience. This study proposes PIER method evaluate We implemented cyber resilience CAVs by presenting new criteria, such exposure recovery, in addition probability impact, vehicles. To verify its effectiveness, was evaluated respect software update over-the-air collision avoidance features. Furthermore, we found implementing requirements mitigate serious successfully diminishes indices. Using matrix, can shorten determination time through high-risk coverage a simple process.
منابع مشابه
Cyber Risk Exposure and Prospects for Cyber Insurance
This study draws attention to the ubiquitous and borderless nature of cybercrime. It examines the prospect of introducing customized cyber insurance policy in the Nigerian market. As secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four Trade Groups that rely heavily on Internet transactions for...
متن کاملBenefits of V2V Communication for Autonomous and Connected Vehicles
In this paper, we investigate the benefits of Vehicleto-Vehicle (V2V) communication for autonomous vehicles and provide results on how V2V information helps reduce employable time headway in the presence of parasitic lags. For a string of vehicles adopting a Constant Time Headway Policy (CTHP) and availing the on-board information of predecessor’s vehicle position and velocity, the minimum empl...
متن کاملcyber risk exposure and prospects for cyber insurance
this study draws attention to the ubiquitous and borderless nature of cybercrime. it examines the prospect of introducing customized cyber insurance policy in the nigerian market. as secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four trade groups that rely heavily on internet transactions for...
متن کاملKey Considerations for a Resilient and Autonomous Deployment and Configuration Infrastructure for Cyber-Physical Systems
Multi-module Cyber-Physical Systems (CPSs), such as satellite clusters, swarms of Unmanned Aerial Vehicles (UAV), and fleets of Unmanned Underwater Vehicles (UUV) are examples of managed distributed real-time systems where mission-critical applications, such as sensor fusion or coordinated flight control, are hosted. These systems are dynamic and reconfigurable, and provide a “CPS cluster-as-a-...
متن کاملA Risk-Assessment Model for Cyber Attacks on Information Systems
Industrial process-plants are an integral part of a nation’s economy and critical infrastructure. The information systems used by automated industrial plants are enticing targets of cyber attacks. However, the financial damages resulting from these cyber attacks are difficult to estimate since the resultant losses are not as tangible as physical losses. In this paper, we propose a mathematical ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Wireless Networks
سال: 2022
ISSN: ['1572-8196', '1022-0038']
DOI: https://doi.org/10.1007/s11276-022-03084-9