BWM Integrated VIKOR method using Neutrosophic fuzzy sets for cybersecurity risk assessment of connected and autonomous vehicles

被引:2
|
作者
Tanaji, Bhosale Akshay [1 ]
Roychowdhury, Sayak [1 ]
机构
[1] Indian Inst Technol Kharagpur, Dept Ind & Syst Engn, Kharagpur 721302, West Bengal, India
关键词
Connected and autonomous vehicles; Threat; -agents; Cybersecurity; Multi -criteria decision making; Fuzzy sets; DECISION-MAKING PROBLEM; INSIDER THREATS; PROMETHEE II; TOPSIS; MODEL; EXTENSION; SYSTEMS;
D O I
10.1016/j.asoc.2024.111628
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Connected and autonomous vehicles (CAVs) have gained significant importance in intelligent transportation systems. However, CAVs are associated with significant cyber-risks caused by different threat-agents, which require robust mitigation strategies for secure operation. Different categories of threat-agents come with varying resources, motivation, and skills that must be addressed effectively for the secure operation of CAVs. This study offers a comprehensive analysis of cybersecurity risks from different categories of threat-agents targeting CAVs. A novel hybrid multi-criteria decision making (MCDM) technique has been developed to prioritize the threat-agent categories as part of the cyber defense mechanism. In this study, the major threat-agent categories are identified from the existing literature and cybersecurity reports. Then expert opinion is collected on the likelihood and severity of cyber-attacks undertaken by different threat-agent categories. Single-valued neutrosophic fuzzy sets (SVNFS) are implemented to consolidate the subjectivity of the linguistic opinions given by the experts. Then Best-Worst Method (BWM) is used to determine the relative criteria weightage on the cyber-attack consequences. These weights are then supplied to the ViseKriterijum-ska Optimizacija I Kompromisno Resenj (VIKOR) method for ranking the categories of threat-agents based on the risk perceived by the experts. A case study is presented with five categories of threat-agents and five loss criteria targeting CAVs to validate the viability of the proposed model. The result shows that insider attackers pose maximum risk for cybersecurity of CAVs. The proposed technique will provide helpful insights to the decision-makers for formulating effective defense strategies against cyber-attackers.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] A conceptual system dynamics model for cybersecurity assessment of connected and autonomous vehicles
    Khan, Shah Khalid
    Shiwakoti, Nirajan
    Stasinopoulos, Peter
    ACCIDENT ANALYSIS AND PREVENTION, 2022, 165
  • [2] Assessment of risk in the management of Halal supply chain using fuzzy BWM method
    Khan, Shahbaz
    Haleem, Abid
    Khan, Mohd Imran
    SUPPLY CHAIN FORUM, 2021, 22 (01): : 57 - 73
  • [3] Assessment of polluted region using an integrated weighting approach and fuzzy VIKOR method
    Nusaf, A. Mohamed
    Kumaravel, R.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2024, 46 (01) : 2649 - 2663
  • [4] Cyber Risk Assessment Approach in Connected Autonomous Vehicles
    Bell, Marcielo
    Wei, June
    Francia, Guillermo, III
    HUMAN-CENTERED DESIGN, OPERATION AND EVALUATION OF MOBILE COMMUNICATIONS, PT II, MOBILE 2024, 2024, 14738 : 157 - 165
  • [5] VIKOR method using interval type two fuzzy sets
    Yazici, Ibrahim
    Kahraman, Cengiz
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2015, 29 (01) : 411 - 421
  • [6] Risk assessment of hot and humid environments through an integrated fuzzy AHP-VIKOR method
    Ramavandi, Bahman
    Darabi, Amir Hossein
    Omidvar, Mohsen
    STOCHASTIC ENVIRONMENTAL RESEARCH AND RISK ASSESSMENT, 2021, 35 (12) : 2425 - 2438
  • [7] Risk assessment of hot and humid environments through an integrated fuzzy AHP-VIKOR method
    Bahman Ramavandi
    Amir Hossein Darabi
    Mohsen Omidvar
    Stochastic Environmental Research and Risk Assessment, 2021, 35 : 2425 - 2438
  • [8] Risk prioritization in a core preparation experiment using fuzzy VIKOR integrated with Shannon entropy method
    Ali, Syed Imran
    Lalji, Shaine Mohammadali
    Haider, Syed Aqeel
    Haneef, Javed
    Syed, Adnan-ul-Haque
    Husain, Nusrat
    Yahya, Ashraf
    Rashid, Zeeshan
    Arfeen, Zeeshan Ahmad
    AIN SHAMS ENGINEERING JOURNAL, 2024, 15 (02)
  • [9] A new integrated collision risk assessment methodology for autonomous vehicles
    Katrakazas, Christos
    Quddus, Mohammed
    Chen, Wen-Hua
    ACCIDENT ANALYSIS AND PREVENTION, 2019, 127 : 61 - 79
  • [10] AHP integrated TOPSIS and VIKOR methods with Pythagorean fuzzy sets to prioritize risks in self-driving vehicles
    Bakioglu, Gozde
    Atahan, Ali Osman
    APPLIED SOFT COMPUTING, 2021, 99