PIER: cyber-resilient risk assessment model for connected and autonomous vehicles

نویسندگان

چکیده

Abstract As more vehicles are being connected to the Internet and equipped with autonomous driving features, robust safety security measures required for (CAVs). Therefore, threat analysis risk assessment essential prepare against cybersecurity risks CAVs. Although prior studies have measured possibility of attack damage from as indices, they not analyzed expanding surface or indices that rely upon real-time resilience. This study proposes PIER method evaluate We implemented cyber resilience CAVs by presenting new criteria, such exposure recovery, in addition probability impact, vehicles. To verify its effectiveness, was evaluated respect software update over-the-air collision avoidance features. Furthermore, we found implementing requirements mitigate serious successfully diminishes indices. Using matrix, can shorten determination time through high-risk coverage a simple process.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cyber Risk Exposure and Prospects for Cyber Insurance

This study draws attention to the ubiquitous and borderless nature of cybercrime. It examines the prospect of introducing customized cyber insurance policy in the Nigerian market. As secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four Trade Groups that rely heavily on Internet transactions for...

متن کامل

Benefits of V2V Communication for Autonomous and Connected Vehicles

In this paper, we investigate the benefits of Vehicleto-Vehicle (V2V) communication for autonomous vehicles and provide results on how V2V information helps reduce employable time headway in the presence of parasitic lags. For a string of vehicles adopting a Constant Time Headway Policy (CTHP) and availing the on-board information of predecessor’s vehicle position and velocity, the minimum empl...

متن کامل

cyber risk exposure and prospects for cyber insurance

this study draws attention to the ubiquitous and borderless nature of cybercrime. it examines the prospect of introducing customized cyber insurance policy in the nigerian market. as secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four trade groups that rely heavily on internet transactions for...

متن کامل

Key Considerations for a Resilient and Autonomous Deployment and Configuration Infrastructure for Cyber-Physical Systems

Multi-module Cyber-Physical Systems (CPSs), such as satellite clusters, swarms of Unmanned Aerial Vehicles (UAV), and fleets of Unmanned Underwater Vehicles (UUV) are examples of managed distributed real-time systems where mission-critical applications, such as sensor fusion or coordinated flight control, are hosted. These systems are dynamic and reconfigurable, and provide a “CPS cluster-as-a-...

متن کامل

A Risk-Assessment Model for Cyber Attacks on Information Systems

Industrial process-plants are an integral part of a nation’s economy and critical infrastructure. The information systems used by automated industrial plants are enticing targets of cyber attacks. However, the financial damages resulting from these cyber attacks are difficult to estimate since the resultant losses are not as tangible as physical losses. In this paper, we propose a mathematical ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Wireless Networks

سال: 2022

ISSN: ['1572-8196', '1022-0038']

DOI: https://doi.org/10.1007/s11276-022-03084-9