Preserving Privacy and Integrity in Automotive Tire Sensors

被引:0
作者
Hacker, Kenneth [1 ]
Graham, Scott [2 ]
机构
[1] Air Force Inst Technol, Wright Patterson AFB, OH 45433 USA
[2] Air Force Inst Technol, Comp Engn, Wright Patterson AFB, OH USA
来源
PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2019) | 2019年
关键词
hopping ID; tire pressure monitoring system; vehicular tracking; privacy; wireless sensors;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The automotive industry is following the rest of technology in moving towards more connected, and often wireless, systems. However, in the pursuit of these technological advances and to quickly satisfy requirements imposed on manufacturers, the security of these systems is often an afterthought. It has been shown that systems in a standard new automobile that one would not expect to be vulnerable can be exploited for a variety of harmful effects. In this paper, we look at Tire Pressure Monitoring Systems (TPMS), which have become standard on all modern vehicles. As they currently exist, they have no security-oriented features, leaking data that can be used for reliable tracking to a determined attacker, and being completely open to spoofing attacks. We will examine the resources needed for an attacker to leverage this common technology to track a vehicle and link travel routes to an individual, then propose an update to the present system to thwart such an ability. The sensors that transmit information have requirements to guide our solution, primarily the impact on power consumption and the cost of implementation compared to the gains in privacy and integrity. Our proposed solution uses an ID-hopping scheme to thwart the association of sensor ID's with a single identity. We also explore the possibility of using other sensor information, such as pressure and temperature, to fingerprint a vehicle and then associate readings with a unique car. Given that likelihood, a scheme for obfuscating this non-critical but potentially privacy-leaking information is a part of our solution. With as little modification to the hardware as possible, it is possible to create a new paradigm, TPMS 2.0, which is dramatically more resistant to attacks on the privacy and integrity of Tire Pressure Monitoring Systems.
引用
收藏
页码:110 / 115
页数:6
相关论文
共 10 条
[1]  
El-Arini K, 2013, 19TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING (KDD'13), P14
[2]  
Emura K, 2016, PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), P403
[3]  
Ishtiaq Roufa R. M., 2010, P 19 USENIX SECURITY, P11
[4]  
Kilcoyne DK, 2016, IEEE MILIT COMMUN C, P1219, DOI 10.1109/MILCOM.2016.7795497
[5]  
National Highway Traffic Safety Administration, 2012, 811681 DOT HS NAT HI
[6]  
National Highway Traffic Safety Administration, 2012, 811617 DOT HS NAT HI
[7]  
National Highway Traffic Safety Administration, 2005, FED REGISTER, V70, P18135
[8]   LiMon - Lightweight Authentication for Tire Pressure Monitoring Sensors [J].
Solomon, Cristina ;
Groza, Bogdan .
Security of Industrial Control Systems and Cyber Physical Systems, 2016, 9588 :95-111
[9]  
Velupillai S., 2007, CONTROL SYSTEMS IEEE, V2007, P22
[10]  
Wyatt S, 2013, VIRTUAL KNOWLEDGE: EXPERIMENTING IN THE HUMANITIES AND THE SOCIAL SCIENCES, P1