Risk Analysis for Connected and Autonomous Vehicles (CAVs)

dc.contributor.advisorPardeep Kumar
dc.contributor.authorABDULAZIZ MOHAMMED ABDULLAH ALMULHIM
dc.date2021
dc.date.accessioned2022-05-29T14:43:22Z
dc.date.available2022-05-29T14:43:22Z
dc.degree.departmentCyber Security
dc.degree.grantorSwansea University
dc.description.abstractCAVs (Connected and Autonomous Vehicles) are vehicles which can drive them- selves with minimal or no human intervention. However, because CAV technology relies on a network of interconnected systems communicating via a share network or the cloud, there are numerous methods by which the system can be hacked, com- promising its confidentiality, integrity, or availability (CIA). Research is required to understand the security risks surrounding CAVs and develop solutions. To this end, this study focuses on CAV technological infrastructure, divided into internal and external, and identified the security requirements by reference to the CIA triad. The internal environment components include GPS, LiDAR, CAN, and ECU, with attacks on CAN and GPS found to be the most severe. The external environment includes V2V, V2I, and V2X communications systems. Among the network attacks studied were Denial of Service (DoS), replay, impersonation, Sybil and black-hole, the most severe of these were external black-hole and replay attacks. Unlike other studies that only focus on CAV risks and potential solutions, this study assessed risk using a literature review, the STRIDE threat modelling framework, and the DREAD analysis framework to assess the level of risk. Most threats were rated as medium or high risk, and the most frequently violated requirement of the CIA triad was found to be the availability of CAVs.
dc.identifier.urihttps://drepo.sdl.edu.sa/handle/20.500.14154/49020
dc.language.isoen
dc.titleRisk Analysis for Connected and Autonomous Vehicles (CAVs)
sdl.thesis.levelMaster
sdl.thesis.sourceSACM - United Kingdom

Files

Copyright owned by the Saudi Digital Library (SDL) © 2025