BWM Integrated VIKOR method using Neutrosophic fuzzy sets for cybersecurity risk assessment of connected and autonomous vehicles

被引:2
|
作者
Tanaji, Bhosale Akshay [1 ]
Roychowdhury, Sayak [1 ]
机构
[1] Indian Inst Technol Kharagpur, Dept Ind & Syst Engn, Kharagpur 721302, West Bengal, India
关键词
Connected and autonomous vehicles; Threat; -agents; Cybersecurity; Multi -criteria decision making; Fuzzy sets; DECISION-MAKING PROBLEM; INSIDER THREATS; PROMETHEE II; TOPSIS; MODEL; EXTENSION; SYSTEMS;
D O I
10.1016/j.asoc.2024.111628
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Connected and autonomous vehicles (CAVs) have gained significant importance in intelligent transportation systems. However, CAVs are associated with significant cyber-risks caused by different threat-agents, which require robust mitigation strategies for secure operation. Different categories of threat-agents come with varying resources, motivation, and skills that must be addressed effectively for the secure operation of CAVs. This study offers a comprehensive analysis of cybersecurity risks from different categories of threat-agents targeting CAVs. A novel hybrid multi-criteria decision making (MCDM) technique has been developed to prioritize the threat-agent categories as part of the cyber defense mechanism. In this study, the major threat-agent categories are identified from the existing literature and cybersecurity reports. Then expert opinion is collected on the likelihood and severity of cyber-attacks undertaken by different threat-agent categories. Single-valued neutrosophic fuzzy sets (SVNFS) are implemented to consolidate the subjectivity of the linguistic opinions given by the experts. Then Best-Worst Method (BWM) is used to determine the relative criteria weightage on the cyber-attack consequences. These weights are then supplied to the ViseKriterijum-ska Optimizacija I Kompromisno Resenj (VIKOR) method for ranking the categories of threat-agents based on the risk perceived by the experts. A case study is presented with five categories of threat-agents and five loss criteria targeting CAVs to validate the viability of the proposed model. The result shows that insider attackers pose maximum risk for cybersecurity of CAVs. The proposed technique will provide helpful insights to the decision-makers for formulating effective defense strategies against cyber-attackers.
引用
收藏
页数:18
相关论文
共 50 条
  • [31] Risk Assessment in Mass Housing Projects Using the Integrated Method of Fuzzy Shannon Entropy and Fuzzy EDAS
    Hatefi, Seyed Morteza
    Ahmadi, Hanieh
    Tamosaitiene, Jolanta
    SUSTAINABILITY, 2025, 17 (02)
  • [32] Evaluating performance of Iranian cement firms using an integrated fuzzy AHP-VIKOR method
    Rezaie, Kamran
    Ramiyani, Sara Saeidi
    Nazari-Shirkouhi, Salman
    Badizadeh, Ali
    APPLIED MATHEMATICAL MODELLING, 2014, 38 (21-22) : 5033 - 5046
  • [33] An integrated risk assessment method using Z-fuzzy clouds and generalized TODIM
    Xiao, Liming
    Huang, Guangquan
    Zhang, Genbao
    QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL, 2022, 38 (04) : 1909 - 1943
  • [34] A new method for student project assessment using fuzzy sets
    Zhou, DN
    Kwok, RCW
    Zhang, Q
    Ma, J
    JOINT 9TH IFSA WORLD CONGRESS AND 20TH NAFIPS INTERNATIONAL CONFERENCE, PROCEEDINGS, VOLS. 1-5, 2001, : 586 - 591
  • [35] Logistic autonomous vehicles assessment using decision support model under spherical fuzzy set integrated Choquet Integral approach
    Bonab, Shabnam Rahnamay
    Ghoushchi, Saeid Jafarzadeh
    Deveci, Muhammet
    Haseli, Gholamreza
    EXPERT SYSTEMS WITH APPLICATIONS, 2023, 214
  • [36] Risk Assessment Method for Driving Scenarios of Autonomous Vehicles Based on Drivable Area
    Wu, Xinzheng
    Xing, Xingyu
    Chen, Junyi
    Shen, Yong
    Xiong, Lu
    2022 IEEE 25TH INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS (ITSC), 2022, : 2206 - 2213
  • [37] Modelling Road Congestion Using a Fuzzy System and Real-World Data for Connected and Autonomous Vehicles
    Abberley, Luke
    Crockett, Keeley
    Cheng, Jianquan
    2019 WIRELESS DAYS (WD), 2019,
  • [38] Assessment of consumers' motivations to purchase a remanufactured product by applying Fuzzy Delphi method and single valued neutrosophic sets
    Vafadarnikjoo, Amin
    Mishra, Nishikant
    Govindan, Kannan
    Chalvatzis, Konstantinos
    JOURNAL OF CLEANER PRODUCTION, 2018, 196 : 230 - 244
  • [39] Securing Cloud-Assisted Connected and Autonomous Vehicles: An In-Depth Threat Analysis and Risk Assessment
    Sheik, Al Tariq
    Maple, Carsten
    Epiphaniou, Gregory
    Dianati, Mehrdad
    SENSORS, 2024, 24 (01)
  • [40] An Integrated Approach of Best-Worst Method (BWM) and Triangular Fuzzy Sets for Evaluating Driver Behavior Factors Related to Road Safety
    Moslem, Sarbast
    Gul, Muhammet
    Farooq, Danish
    Celik, Erkan
    Ghorbanzadeh, Omid
    Blaschke, Thomas
    MATHEMATICS, 2020, 8 (03)