MILCOM 2016 - 2016 IEEE Military Communications Conference 2016
DOI: 10.1109/milcom.2016.7795497
|View full text |Cite
|
Sign up to set email alerts
|

Tire Pressure Monitoring System encryption to improve vehicular security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
2
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…Because intelligent algorithms are widely applied in onboard sensing systems to improve control performance, adversaries can use traditional machine learning algorithms like k-nearest neighbor (KNN) or conventional deep learning algorithms like deep neural network (DNN) to conduct sensing level algorithm attacks [13][14][15]. In addition to the abovementioned raw data attack and intelligent algorithm attacks for in-vehicle sensors, more malicious cyber characteristics attacks also occur with the continuous transmission of sensor data, which signal attacks can mimic a sensor to conduct spoofing or jamming attack [16], and wireless signal attacks can listen and inject spoof message to cheat a central node in a victim in-vehicle TPMS [17].…”
Section: Related Workmentioning
confidence: 99%
“…Because intelligent algorithms are widely applied in onboard sensing systems to improve control performance, adversaries can use traditional machine learning algorithms like k-nearest neighbor (KNN) or conventional deep learning algorithms like deep neural network (DNN) to conduct sensing level algorithm attacks [13][14][15]. In addition to the abovementioned raw data attack and intelligent algorithm attacks for in-vehicle sensors, more malicious cyber characteristics attacks also occur with the continuous transmission of sensor data, which signal attacks can mimic a sensor to conduct spoofing or jamming attack [16], and wireless signal attacks can listen and inject spoof message to cheat a central node in a victim in-vehicle TPMS [17].…”
Section: Related Workmentioning
confidence: 99%
“…To protect the identity, one option is to encrypt the uniquely identifying number broadcasted in messages. For example, in a TPMS encrypting the per sensor identifier while leaving the rest of the message unencrypted protects the identity and facilitates issue diagnosis by humans due to the unencrypted contents [61]. Each time a message is broadcast a different encrypted value would be sent, essentially making it appear as if a random identifier was being used.…”
Section: B Perturbing Identitymentioning
confidence: 99%
“…This means that the message contents can still be used by existing tools, meaning both backwards compatibility and privacy are provided. To obtain a stronger encryption the authors of [61] propose the encrypted identifier be lengthened from 32 bit to 64 bit, but this would break backwards compatibility. This technique works for TPMS because the sender and receiver are only a single communication hop away from each other, and hardware deployers can ensure the vehicle is aware of what TPMS identifiers to expect and how they will be encrypted.…”
Section: B Perturbing Identitymentioning
confidence: 99%
“…Emura et al [2] have examined sensor costs and have demonstrated a protocol that could be used under current TPMS constraints. Other researchers [4,8] have shown that rolling IDs that change between TPMS transmissions are feasible and can defeat tracking methods. The next generation of TPMSs may incorporate these and other upgrades.…”
Section: Securitymentioning
confidence: 99%