Car Tyre Sensors Expose Driver Tracking Without Consent
Tire Pressure Monitoring Systems (TPMS) Vulnerability Exposed
A recent study by IMDEA Networks Institute has exposed a significant vulnerability in the Tire Pressure Monitoring Systems (TPMS) used in millions of vehicles worldwide. The research reveals that the unencrypted signals emitted by these systems can be intercepted and used to track drivers without their knowledge or consent.
How TPMS Works
The TPMS, designed to alert drivers to low tire pressure, relies on small, battery-powered sensors installed in each wheel. These sensors broadcast radio signals containing a unique identifier for each tire, which rarely changes. However, because these signals are unencrypted, they can be easily intercepted by anyone with a basic receiver.
Tracking Vehicles
The research team, comprising experts from IMDEA Networks and partner institutions, discovered that by grouping the four unique tire IDs that move together, an observer can create a fingerprint for a specific vehicle. Using a mathematical tool called the Jaccard index, the researchers were able to match these signals to specific vehicles with high accuracy.
To demonstrate the feasibility of this tracking method, the team set up five low-cost radio receivers along roads for ten weeks. Using equipment costing approximately $100 per device, they collected over six million messages from more than 20,000 vehicles. The signals can be picked up at distances of over 50 meters, often through walls and without a direct line of sight.
Implications and Recommendations
This vulnerability allows an observer to map out a driver’s daily routine, including their work schedule, lunch breaks, and other regular activities. The sensors also broadcast the actual pressure levels, which can reveal the vehicle’s weight and potentially even the type of cargo being carried.
The researchers warn that it is relatively easy to link TPMS sensors to a specific person of interest. By combining a TPMS signal receiver with a camera or targeted recording at the person’s home, an attacker can reveal the unique TPMS sensor IDs and track the person’s movements using inexpensive software-defined radios.
The study highlights a regulatory gap in the current cybersecurity standards for vehicles. While UN Regulation No. 155 requires carmakers to improve cybersecurity, it does not explicitly mandate encryption for tire pressure signals. The researchers are calling on manufacturers and policymakers to adopt rotating IDs that change frequently, providing an additional layer of security for drivers.
Conclusion
The implications of this vulnerability are significant, as it can be exploited by malicious actors to track individuals without their knowledge or consent. The study’s findings emphasize the need for increased security measures in the development of connected vehicle systems.
