- Today
- Holidays
- Birthdays
- Reminders
- Cities
- Atlanta
- Austin
- Baltimore
- Berwyn
- Beverly Hills
- Birmingham
- Boston
- Brooklyn
- Buffalo
- Charlotte
- Chicago
- Cincinnati
- Cleveland
- Columbus
- Dallas
- Denver
- Detroit
- Fort Worth
- Houston
- Indianapolis
- Knoxville
- Las Vegas
- Los Angeles
- Louisville
- Madison
- Memphis
- Miami
- Milwaukee
- Minneapolis
- Nashville
- New Orleans
- New York
- Omaha
- Orlando
- Philadelphia
- Phoenix
- Pittsburgh
- Portland
- Raleigh
- Richmond
- Rutherford
- Sacramento
- Salt Lake City
- San Antonio
- San Diego
- San Francisco
- San Jose
- Seattle
- Tampa
- Tucson
- Washington
Tire Pressure Monitors Vulnerable to Hacking, Tracking: Study
Researchers find tire sensors can be exploited to monitor vehicle movements without visual confirmation.
Published on Mar. 2, 2026
Got story updates? Submit your updates here. ›
A new study from the IMDEA Networks Institute reveals that tire pressure monitoring systems (TPMS) in vehicles are highly vulnerable to hacking and can be exploited to track vehicle movements. The researchers were able to collect data from 6 million tire sensors on over 20,000 cars using low-cost radio receivers, demonstrating how TPMS data can be used for widespread vehicle surveillance without the need for visual confirmation.
Why it matters
As vehicles become increasingly connected, safety systems like TPMS that were not originally designed with security in mind can pose serious privacy and security risks if exploited by bad actors. The lack of regulations governing the collection and use of TPMS data makes this an emerging threat that automakers and policymakers will need to address.
The details
The IMDEA Networks Institute study found that each TPMS sensor broadcasts a unique ID number in clear, unencrypted wireless signals that can be easily intercepted by inexpensive radio receivers. This allows vehicles to be tracked without the need for visual confirmation, such as reading license plates. The researchers deployed a network of $100 radio receivers near busy roads and parking areas, allowing them to collect data from 6 million tire sensors on over 20,000 cars.
- The study was published on March 2, 2026.
The players
IMDEA Networks Institute
A Madrid-based think tank that conducted the research on the security vulnerabilities of tire pressure monitoring systems.
Dr. Alessio Scalingi
A former PhD student at IMDEA Networks Institute who is now an assistant professor at UC3M in Madrid. He was involved in the research on TPMS security vulnerabilities.
What they’re saying
“As vehicles become increasingly connected, even safety-oriented sensors like TPMS should be designed with security in mind, since data that appears passive and harmless can become a powerful identifier when collected at scale.”
— Dr. Alessio Scalingi, Assistant Professor, UC3M
What’s next
The study's findings highlight the need for automakers and policymakers to address the security vulnerabilities of TPMS and implement stronger encryption and data protection measures to prevent unauthorized tracking and surveillance.
The takeaway
This study underscores the growing cybersecurity risks posed by connected vehicle technologies, even those originally designed for safety purposes. As the automotive industry continues to embrace more connected features, ensuring robust data security and privacy protections will be crucial to maintaining consumer trust and public safety.


