丰田、奔驰等主流汽车品牌的胎压系统可实现静默车辆追踪
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户的要求很明确,不需要以“文章内容总结”或“这篇文章”这样的开头,直接写描述即可。 首先,我仔细阅读了用户提供的文章。文章主要讨论了丰田、雷诺、现代和奔驰等汽车制造商的轮胎压力监测系统(TPMS)存在安全漏洞。这些系统广播未加密的数据,导致车辆和驾驶者的隐私风险增加。 接下来,我注意到研究人员使用低成本设备在10周内捕获了大量信号,揭示了严重的隐私问题。这说明问题不仅存在,而且已经被实证。 然后,我需要将这些信息浓缩到100字以内。重点包括:受影响的汽车品牌、TPMS的问题(未加密)、数据泄露的风险、以及研究人员的发现和建议。 最后,确保语言简洁明了,不使用复杂的术语,同时涵盖所有关键点。这样用户就能快速了解文章的核心内容。 </think> 丰田、雷诺、现代和奔驰等品牌车辆的轮胎压力监测系统(TPMS)因未加密,易被低成本设备追踪,暴露车主隐私。研究显示,只需100美元设备即可捕获600万信号,识别车辆及驾驶习惯,带来严重安全风险。 2026-3-2 11:15:45 Author: cybersecuritynews.com(查看原文) 阅读量:3 收藏

Tire Pressure Systems Vehicle Tracking
Tire Pressure Systems Vehicle Tracking

Tire Pressure Monitoring Systems (TPMS) in vehicles from Toyota, Renault, Hyundai, and Mercedes broadcast unencrypted tire data, enabling low-cost passive tracking of cars and drivers.

Researchers from IMDEA Networks and partners have revealed that a 10-week study captured over 6 million signals from 20,000 vehicles using $100 receivers, highlighting severe privacy risks.

Direct TPMS (dTPMS) sensors, embedded in tires, transmit pressure, temperature, battery status, and a unique 24-32 bit ID in cleartext via 315/433 MHz radio at 20 kbps.

Unlike indirect TPMS (iTPMS) used by Volkswagen Group, dTPMS lacks encryption or rotation of IDs, making signals eavesdroppable up to 55 meters, even non-line-of-sight. Transmissions occur every 30-120 seconds while driving or hourly when parked for some brands, creating persistent digital fingerprints.

Attack Chain

Affected Manufacturers

Toyota, Renault, Hyundai, and Mercedes favor battery-powered dTPMS with proprietary protocols like ASK/FSK modulation. Toyota sensors transmit continuously, even when stationary, while Renault activates mainly on motion.

ManufacturerTPMS TypeKey TraitsExample Transmission Behavior
ToyotadTPMSContinuous broadcastsHourly when parked
RenaultdTPMSMotion-triggeredLess frequent stationary
HyundaidTPMSUnencrypted IDVulnerable to SDR capture
MercedesdTPMSProprietary protocolCleartext pressure data

These systems have been mandatory worldwide since 2007-2012 for safety, but cybersecurity gaps persist despite UN Regulation 155.

google

The team deployed five RTL-SDR receivers on Raspberry Pi (~$100 each) indoors near roads, covering 10,050 m² over 10 weeks. Using the open-source rtl_433 decoder, they ingested data via MQTT/InfluxDB, filtering 12 verified cars’ IDs via the Autel TS501 tool. Moving vehicle tests at 50 km/h confirmed reliable capture omnidirectionally.

Receiver

Vehicle Identification Techniques

Tire-to-car matching used Jaccard index on 1-minute windows: J(A,B) = |A ∩ B| / |A ∪ B|, clustering co-occurring IDs with transitive merging. This outperformed cross-correlation, accurately identifying all 12 cars despite sparse signals, according to the research.

Coverage improves from 40% (1 ID) to near-100% (4 IDs), vital for mobile tracking.

Attackers can infer routines like work hours (e.g., 8 AM-5 PM arrivals), remote days, lunch breaks, or trips from temporal patterns.

Tire pressure reveals vehicle type/weight (e.g., 230 kPa for sedans) or loads; combined with cameras, it links to owners. Risks include burglary (absence detection), corporate surveillance, or spoofing for hijacks/denials-of-service.

Analysis of anonymized cars showed part-time workers (e.g., Car 1: 8 AM arrivals, university detours), full-timers (Fridays absent), and externals (gaps for travel). Pressure trends tracked inflation (e.g., front tires on Day 13). Scaled networks could surveil cities covertly, bypassing license plate readers.

UN R155 mandates vehicle cybersecurity but omits TPMS; 54 countries have enforced it since 2022. Prior works proposed encryption/timed transmissions, but none were widely adopted. New Pirelli/Bosch Cyber Tyre uses BLE (still eavesdroppable), limited to premium vehicles.

Manufacturers should encrypt IDs, rotate them, or adopt ultra-low-power modes without fixed beacons. Policymakers must update regulations like EU 2019/2144 for TPMS inclusion.

Drivers can use TPMS trigger tools for ID verification, but lack disable options; aftermarket encrypted sensors are unproven. Near-term: Deploy directional antennas or LF shielding, though impractical.

This flaw underscores how safety features become surveillance vectors in connected cars, urging swift protocol overhauls.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews


文章来源: https://cybersecuritynews.com/tire-pressure-systems-vehicle-tracking/
如有侵权请联系:admin#unsafe.sh