Your Car’s Tire Sensors Are Broadcasting Your Location to Anyone With $100 in Radio Gear

Spanish researchers tracked 20,000 vehicles using $100 radio gear that intercepts unencrypted tire sensor signals

Alex Barrientos Avatar
Alex Barrientos Avatar

By

Image: Wikimedia

Key Takeaways

Key Takeaways

  • TPMS sensors broadcast unencrypted signals trackable by $100 radio equipment up to 60 meters
  • Spanish researchers captured 6 million signals from 20,000 vehicles during 10-week surveillance study
  • UN Regulation 155 excludes TPMS from cybersecurity requirements across 54 countries

Your car’s tire pressure monitoring system—that helpful dashboard light warning you about flat tires—doubles as an unintentional tracking beacon. Spanish researchers from IMDEA Networks Institute just proved this vulnerability works in the real world, deploying cheap radio receivers along roads to capture over 6 million signals from more than 20,000 vehicles during a 10-week study. If you’re driving a Toyota, Renault, Hyundai, or Mercedes with direct TPMS sensors, your movements are broadcasting in cleartext to anyone who cares to listen.

Radio Signals With Zero Privacy Protection

The technical reality sounds like something from a spy thriller, except it’s embarrassingly simple. Those TPMS sensors transmit unencrypted radio signals containing unique lifetime IDs, detectable up to 50-60 meters away using $100 software-defined radio equipment and basic antennas. Unlike security cameras that need visual line-of-sight, these radio signals penetrate walls and obstacles. Think AirTag-level tracking capabilities, except the device is already installed in your wheels and you can’t turn it off.

From Convenience to Criminal Opportunity

The attack scenarios read like a privacy nightmare checklist:

  • Burglars could monitor residential areas to learn when you consistently leave for work
  • Cargo truck thieves might analyze routes and vehicle weight changes by monitoring pressure baselines, then spoof flat-tire alerts to force drivers into roadside stops
  • Employers could track delivery drivers without consent
  • Data brokers or government agencies could deploy receiver networks for mass surveillance

Your daily Starbucks run becomes a trackable pattern available to the highest bidder.

Regulatory Blindspot Meets Industry Ignorance

Here’s the regulatory gap that enabled this mess: UN Regulation No. 155, which covers vehicle cybersecurity in 54 countries, explicitly excludes TPMS from its requirements. No encryption standards exist for these systems, and reports suggest automakers remain largely unaware of the vulnerability.

“As vehicles become increasingly connected, even safety-oriented sensors like TPMS should be designed with security in mind,” notes Dr. Alessio Scalingi from the research team. The industry mandated these sensors for safety in 2007 but apparently forgot about basic privacy protection.

Limited Fixes for an Industry-Wide Problem

Your immediate options are frustratingly limited since retrofitting encryption into existing TPMS hardware isn’t feasible. Some vehicles use indirect monitoring systems that analyze wheel speed rather than broadcasting radio signals, but these generate more false alarms. The real fix demands industry-wide adoption of encrypted TPMS standards and updated regulations that treat safety systems as potential privacy risks. Until then, your tire sensors keep broadcasting your business to anyone with curiosity and basic radio equipment.

Share this

At Gadget Review, our guides, reviews, and news are driven by thorough human expertise and use our Trust Rating system and the True Score. AI assists in refining our editorial process, ensuring that every article is engaging, clear and succinct. See how we write our content here →