从被动轮胎压力监测系统 (TPMS) 测量值推断车辆运动模式
Inferring car movement patterns from passive TPMS measurements

原始链接: https://dspace.networks.imdea.org/handle/20.500.12761/2011

现代汽车的轮胎压力监测系统 (TPMS) 以明文无线广播数据,包括一个一致的车輛识别码。最近一项研究利用此漏洞,部署低成本接收器分析TPMS信号长达10周,追踪了12辆汽车的数据(潜在可监测数千辆)。 该研究表明,这些易于获取的数据可以泄露驾驶员的敏感信息——包括他们的存在、车辆类型、重量,甚至驾驶习惯。重要的是,收集和分析这些数据所需的设备价格低廉(每个接收器约100美元),使其成为一个容易被利用的隐私风险。 这些发现凸显了当前TPMS设计中一个重大的安全缺陷,并敦促汽车制造商和政策制定者优先开发更安全、更注重隐私的未来车辆系统。

## TPMS 与车辆追踪总结 一则Hacker News讨论围绕着一篇研究论文,该论文详细说明了如何从轮胎压力监测系统 (TPMS) 数据推断车辆移动。用户指出,TPMS信号会广播可识别的信息,可能允许在未经明确同意的情况下追踪车辆,以及其车主。 多位评论者分享了展示这种漏洞的经验。一人回忆说,几年前曾利用TPMS数据结合WiFi信标追踪,构建了一个能够识别工作场所、酒店甚至朋友家的地方的系统。虽然手机硬件地址随机化提供了一些保护,但仍存在其他方法。 对话还涉及通过蜂窝信号收集数据,以及将TPMS数据与销售点 (POS) 系统关联以识别客户的可能性。人们对隐私表示担忧,并建议购买加拿大规格的车辆(TPMS并非总是强制性的)可能是一种解决方法。较新的汽车越来越多地使用轮胎换位来检测低压,未来可能会减少对TPMS传感器的依赖。
相关文章

原文
Resumen

Tire Pressure Monitoring System (TPMS) transmissions of modern cars are sent over the air in clear text and entail a unique identifier that does not change over very long periods of time. In this work, we investigate the privacy implications for car owners of this design choice by collecting and analyzing TPMS transmissions from a network of low-cost spectrum receivers that we deploy along the road over a period of 10 weeks. Our measurement study comprises data from 12 verified cars, but malicious actors could easily scale their efforts to track several thousands of cars, given that we observed at least 20k cars during our measurements. Our results show that TPMS transmissions can be used to systematically infer potentially sensitive information such as the presence, type, weight, or driving pattern of the driver. The affordability of the equipment to cause these threats, as low as $100 per receiver, urges policymakers and car manufacturers to design a more secure and privacy-preserving TPMS for future cars.

联系我们 contact @ memedata.com