Next Article in Journal
Understanding Collections of Related Datasets Using Dependent MMD Coresets
Next Article in Special Issue
VERCASM-CPS: Vulnerability Analysis and Cyber Risk Assessment for Cyber-Physical Systems
Previous Article in Journal
Information Content Measurement of ESG Factors via Entropy and Its Impact on Society and Security
Previous Article in Special Issue
Image Watermarking Approach Using a Hybrid Domain Based on Performance Parameter Analysis
Article

Leveraging Aviation Risk Models to Combat Cybersecurity Threats in Vehicular Networks

1
Department of Management, Marketing and Information Systems, University of Alabama in Huntsville, Huntsville, AL 35899, USA
2
Department of Computer Science, Tennessee Technological University, Cookeville, TN 38505, USA
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work and listed in alphabetic order.
Academic Editor: Sherali Zeadally
Received: 16 August 2021 / Revised: 8 September 2021 / Accepted: 12 September 2021 / Published: 23 September 2021
(This article belongs to the Special Issue Secure and Trustworthy Cyber–Physical Systems)
The rapidly developing technology and lack of standards in the transportation industry for the proposed Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), and Vehicle-to-Everything (V2X) networks, which all vehicles will operate under, drives concern about information validity and authenticity due to the risk of erroneous or malicious information being injected into a vehicular network (VN). In this paper, we apply a risk management process to a vehicular network that will identify hazards and possible controls that can lower their risk. After researching and reviewing various technologies along with several risk models, we have developed a basic framework for assessing and assigning risk through a phased method that leads to input for our developed model. View Full-Text
Keywords: vehicular network; risk model; aviation risk model; vehicular network risk model vehicular network; risk model; aviation risk model; vehicular network risk model
Show Figures

Figure 1

MDPI and ACS Style

Ebert, J.; Newton, O.; O’Rear, J.; Riley, S.; Park, J.; Gupta, M. Leveraging Aviation Risk Models to Combat Cybersecurity Threats in Vehicular Networks. Information 2021, 12, 390. https://0-doi-org.brum.beds.ac.uk/10.3390/info12100390

AMA Style

Ebert J, Newton O, O’Rear J, Riley S, Park J, Gupta M. Leveraging Aviation Risk Models to Combat Cybersecurity Threats in Vehicular Networks. Information. 2021; 12(10):390. https://0-doi-org.brum.beds.ac.uk/10.3390/info12100390

Chicago/Turabian Style

Ebert, Jonathan, Ohad Newton, Jeffery O’Rear, Scott Riley, Jaehong Park, and Maanak Gupta. 2021. "Leveraging Aviation Risk Models to Combat Cybersecurity Threats in Vehicular Networks" Information 12, no. 10: 390. https://0-doi-org.brum.beds.ac.uk/10.3390/info12100390

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop