{"id":"https://openalex.org/W2914424486","doi":"https://doi.org/10.1155/2019/4614721","title":"A Comparative Study of JASO TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design","display_name":"A Comparative Study of JASO TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design","publication_year":2019,"publication_date":"2019-02-03","ids":{"openalex":"https://openalex.org/W2914424486","doi":"https://doi.org/10.1155/2019/4614721","mag":"2914424486"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/4614721","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1155/2019/4614721","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002181679","display_name":"Yasuyuki Kawanishi","orcid":"https://orcid.org/0000-0003-1499-7115"},"institutions":[{"id":"https://openalex.org/I73613424","display_name":"National Institute of Advanced Industrial Science and Technology","ror":"https://ror.org/01703db54","country_code":"JP","type":"government","lineage":["https://openalex.org/I73613424"]},{"id":"https://openalex.org/I4210166210","display_name":"Sumitomo Electric Industries (Japan)","ror":"https://ror.org/05rnkb382","country_code":"JP","type":"company","lineage":["https://openalex.org/I4210166210"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yasuyuki Kawanishi","raw_affiliation_strings":["Cyber-Security R&D Office, Sumitomo Electric Industries, Ltd., Osaka, Japan","SEI-AIST Cyber Security Cooperative Research Laboratory, National Institute of Advanced Industrial Science and Technology (AIST), Osaka, Japan"],"affiliations":[{"raw_affiliation_string":"SEI-AIST Cyber Security Cooperative Research Laboratory, National Institute of Advanced Industrial Science and Technology (AIST), Osaka, Japan","institution_ids":["https://openalex.org/I73613424"]},{"raw_affiliation_string":"Cyber-Security R&D Office, Sumitomo Electric Industries, Ltd., Osaka, Japan","institution_ids":["https://openalex.org/I4210166210"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079299885","display_name":"H. Nishihara","orcid":"https://orcid.org/0000-0002-1604-2075"},"institutions":[{"id":"https://openalex.org/I73613424","display_name":"National Institute of Advanced Industrial Science and Technology","ror":"https://ror.org/01703db54","country_code":"JP","type":"government","lineage":["https://openalex.org/I73613424"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hideaki Nishihara","raw_affiliation_strings":["SEI-AIST Cyber Security Cooperative Research Laboratory, National Institute of Advanced Industrial Science and Technology (AIST), Osaka, Japan"],"affiliations":[{"raw_affiliation_string":"SEI-AIST Cyber Security Cooperative Research Laboratory, National Institute of Advanced Industrial Science and Technology (AIST), Osaka, Japan","institution_ids":["https://openalex.org/I73613424"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079674271","display_name":"Daisuke Souma","orcid":"https://orcid.org/0000-0003-4022-0975"},"institutions":[{"id":"https://openalex.org/I73613424","display_name":"National Institute of Advanced Industrial Science and Technology","ror":"https://ror.org/01703db54","country_code":"JP","type":"government","lineage":["https://openalex.org/I73613424"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Daisuke Souma","raw_affiliation_strings":["SEI-AIST Cyber Security Cooperative Research Laboratory, National Institute of Advanced Industrial Science and Technology (AIST), Osaka, Japan"],"affiliations":[{"raw_affiliation_string":"SEI-AIST Cyber Security Cooperative Research Laboratory, National Institute of Advanced Industrial Science and Technology (AIST), Osaka, Japan","institution_ids":["https://openalex.org/I73613424"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047612331","display_name":"Hirotaka Yoshida","orcid":"https://orcid.org/0000-0003-4870-8561"},"institutions":[{"id":"https://openalex.org/I73613424","display_name":"National Institute of Advanced Industrial Science and Technology","ror":"https://ror.org/01703db54","country_code":"JP","type":"government","lineage":["https://openalex.org/I73613424"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Hirotaka Yoshida","raw_affiliation_strings":["SEI-AIST Cyber Security Cooperative Research Laboratory, National Institute of Advanced Industrial Science and Technology (AIST), Osaka, Japan"],"affiliations":[{"raw_affiliation_string":"SEI-AIST Cyber Security Cooperative Research Laboratory, National Institute of Advanced Industrial Science and Technology (AIST), Osaka, Japan","institution_ids":["https://openalex.org/I73613424"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016468929","display_name":"Yoichi Hata","orcid":null},"institutions":[{"id":"https://openalex.org/I4210166210","display_name":"Sumitomo Electric Industries (Japan)","ror":"https://ror.org/05rnkb382","country_code":"JP","type":"company","lineage":["https://openalex.org/I4210166210"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yoichi Hata","raw_affiliation_strings":["Cyber-Security R&D Office, Sumitomo Electric Industries, Ltd., Osaka, Japan"],"affiliations":[{"raw_affiliation_string":"Cyber-Security R&D Office, Sumitomo Electric Industries, Ltd., Osaka, Japan","institution_ids":["https://openalex.org/I4210166210"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5047612331"],"corresponding_institution_ids":["https://openalex.org/I73613424"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100,"provenance":"doaj"},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100,"provenance":"doaj"},"fwci":1.395,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":11,"citation_normalized_percentile":{"value":0.999806,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":86,"max":87},"biblio":{"volume":"2019","issue":null,"first_page":"1","last_page":"35"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.9986,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.9986,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9975,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.974,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/rss","display_name":"RSS","score":0.59085345},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability","score":0.5638994}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8454301},{"id":"https://openalex.org/C2385561","wikidata":"https://www.wikidata.org/wiki/Q45432","display_name":"RSS","level":2,"score":0.59085345},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5638994},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.5563233},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.55116725},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5090665},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.5043503},{"id":"https://openalex.org/C526921623","wikidata":"https://www.wikidata.org/wiki/Q190117","display_name":"Automotive industry","level":2,"score":0.41662604},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/4614721","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":false,"landing_page_url":"https://doaj.org/article/cdbee0e343044c2a8f8bc2d4ae3699dc","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/4614721","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.64,"display_name":"Industry, innovation and infrastructure"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":26,"referenced_works":["https://openalex.org/W110993677","https://openalex.org/W1963983949","https://openalex.org/W1977553727","https://openalex.org/W1992208352","https://openalex.org/W1994621643","https://openalex.org/W2022556651","https://openalex.org/W2029154761","https://openalex.org/W2049973206","https://openalex.org/W2052202336","https://openalex.org/W2061781550","https://openalex.org/W2069452717","https://openalex.org/W2082636556","https://openalex.org/W2122445727","https://openalex.org/W2124105024","https://openalex.org/W2145071552","https://openalex.org/W2280566217","https://openalex.org/W2314911809","https://openalex.org/W2433826730","https://openalex.org/W2566763967","https://openalex.org/W2759891682","https://openalex.org/W2782556342","https://openalex.org/W2789451771","https://openalex.org/W2797821788","https://openalex.org/W2805500650","https://openalex.org/W3161918289","https://openalex.org/W4240110967"],"related_works":["https://openalex.org/W426968574","https://openalex.org/W2619844325","https://openalex.org/W2539387137","https://openalex.org/W2393709043","https://openalex.org/W2385449752","https://openalex.org/W2382520895","https://openalex.org/W2374952201","https://openalex.org/W2374808384","https://openalex.org/W2365639220","https://openalex.org/W2080567403"],"abstract_inverted_index":{"In":[0,40,165],"recent":[1],"years,":[2],"much":[3],"attention":[4],"has":[5,62],"been":[6],"paid":[7],"to":[8,42,110,192,195,245,268],"autonomous":[9],"vehicles":[10,16],"and":[11,89,190,230,242,249],"security":[12,72],"threats":[13],"on":[14,31,105,170,210,227],"such":[15,74,236],"have":[17],"become":[18,63],"an":[19,185,260],"important":[20,65],"issue.":[21],"One":[22],"of":[23,49,108,161,187,251,266],"these":[24,44],"examples":[25],"is":[26,54,129,153,213],"a":[27,32,71,179,196,224,238,243],"command":[28],"injection":[29],"issue":[30],"gateway":[33],"ECU,":[34],"which":[35,53,78,211],"was":[36,97,115],"reported":[37],"in":[38,66,100,117,123,141,175,271],"2016.":[39],"order":[41],"mitigate":[43],"threats,":[45],"the":[46,57,106,111,120,137,147,158,171,219,247,264,269],"secure":[47],"design":[48],"connected":[50,162],"vehicle":[51,163],"systems,":[52],"done":[55],"at":[56,146],"concept":[58],"phase":[59,174],"during":[60],"development,":[61],"increasingly":[64],"industry.":[67],"From":[68],"this":[69,124,133,166,255],"perspective,":[70],"guideline":[73],"as":[75,237],"JASO":[76,176],"TP15002":[77,109,142],"specifies":[79],"two":[80],"concrete":[81],"methods,":[82],"CRSS":[83,194,212,273],"(CVSS":[84],"Based":[85],"Risk":[86],"Scoring":[87,92,200],"System)":[88],"RSMA":[90,267],"(Risk":[91,199],"Methodology":[93],"for":[94,232,263],"Automotive":[95],"System),":[96,201],"made":[98],"public":[99],"2015.":[101],"The":[102],"latest":[103],"work":[104],"application":[107],"ITU-T":[112],"X.1373":[113],"standard":[114],"published":[116],"2017.":[118],"However,":[119],"risk":[121,138,159,172,181],"assessment":[122,139,173],"publication":[125,134],"seems":[126],"limited.":[127],"It":[128],"not":[130],"clear":[131],"from":[132],"how":[135,154],"systematically":[136],"task":[140],"can":[143],"be":[144],"performed":[145],"implementation":[148],"level.":[149],"Another":[150],"interesting":[151,261],"question":[152],"different":[155],"methods":[156],"affect":[157],"scores":[160],"systems.":[164],"paper,":[167],"we":[168,183,222,258],"focus":[169],"TP15002.":[177],"For":[178,254],"systematic":[180],"assessment,":[182],"introduce":[184],"idea":[186],"asset":[188],"container":[189],"propose":[191],"extend":[193],"novel":[197],"RSS":[198],"RSS-CVSSv3,":[202],"by":[203],"appropriately":[204],"replacing":[205],"CVSSv2":[206],"vulnerability":[207],"scoring":[208],"system":[209],"based":[214],"with":[215,274],"CVSSv3.":[216],"To":[217],"address":[218],"above":[220],"questions,":[221],"perform":[223],"comparative":[225,256],"study":[226],"CRSS,":[228],"RSMA,":[229],"RSS-CVSSv3":[231],"multiple":[233],"use":[234],"cases":[235],"CGW":[239],"(Central":[240],"Gateway)":[241],"drone,":[244],"examine":[246],"efficiency":[248],"usefulness":[250],"our":[252],"methods.":[253],"purpose,":[257],"devise":[259],"approach":[262],"refinement":[265],"obstacles":[270],"comparing":[272],"RSMA.":[275]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2914424486","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1}],"updated_date":"2024-12-08T05:05:24.660556","created_date":"2019-02-21"}