Leveraging aviation risk models to combat cybersecurity threats in vehicular networks

2Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.

Abstract

The rapidly developing technology and lack of standards in the transportation industry for the proposed Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), and Vehicle-to-Everything (V2X) networks, which all vehicles will operate under, drives concern about information validity and authenticity due to the risk of erroneous or malicious information being injected into a vehicular network (VN). In this paper, we apply a risk management process to a vehicular network that will identify hazards and possible controls that can lower their risk. After researching and reviewing various technologies along with several risk models, we have developed a basic framework for assessing and assigning risk through a phased method that leads to input for our developed model.

Cite

CITATION STYLE

APA

Ebert, J., Newton, O., O’rear, J., Riley, S., Park, J., & Gupta, M. (2021). Leveraging aviation risk models to combat cybersecurity threats in vehicular networks. Information (Switzerland), 12(10). https://doi.org/10.3390/info12100390

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free