The present invention relates to a method of exchanging cryptographic parameters in a network of tire monitoring devices, such as a network of aircraft tire monitoring devices.
Checking tire pressure is an important part of the maintenance of a vehicle. Tire pressures should be maintained at predetermined pressures to ensure that a tire performs as intended by the manufacturer. Incorrect tire pressure can lead to a tire failing, perhaps bursting and causing damage to the vehicle and/or a loss of control.
A first aspect of the present invention provides a method of exchanging cryptographic parameters in a network of tire monitoring devices, the method comprising broadcasting, from each tire monitoring device to a plurality of other tire monitoring devices, a message comprising a cryptographic parameter generated by that respective tire monitoring device.
The network of tire monitoring devices may comprise a wireless network of tire monitoring devices.
The method may comprise broadcasting the message via a Bluetooth protocol. Each tire monitoring device may be configured to operate according to a relatively short range communication protocol, and a relatively long range communication protocol, and the method may comprise broadcasting the message via the relatively long range communication protocol.
The method may comprise broadcasting, from each tire monitoring device to each other tire monitoring device, the message comprising the cryptographic parameter generated by that respective tire monitoring device.
The method may comprise utilising an intermediate device as a router for the message. The intermediate device may receive and transmit the message via Bluetooth®. Example intermediate devices include: a router, hub or access point provided at a location on or in the aircraft, and a device external to the aircraft, including a mobile device or a generally stationary device such as an access point.
In general, a cryptographic parameter, may be anything used for cryptography, including but not limited to cryptographic commitments and keys (symmetrical and asymmetric). In an example, the cryptographic parameter comprises a cryptographic commitment generated by the respective tire monitoring device.
The method may comprise broadcasting, from each tire monitoring device to a plurality of other tire monitoring devices, for example each other tire monitoring device, an input to open the cryptographic commitment generated by the respective tire monitoring device, and verifying, at each tire monitoring device, the commitments received by the respective tire monitoring device using the respective inputs.
The method may comprise broadcasting, from each tire monitoring device to a plurality of other tire monitoring devices, for example each other tire monitoring device, a public key generated by the respective tire monitoring device, and generating, at each tire monitoring device, the cryptographic parameter using the public keys generated and received by the respective tire monitoring device.
The method may comprise generating, at each tire monitoring device, a random number, and generating the cryptographic parameter using the random number generated by the respective tire monitoring device.
The method may comprise broadcasting, from each tire monitoring device to each other tire monitoring device, configuration data of that tire monitoring device, and generating the cryptographic parameter comprises using the configuration data.
The method may comprise: generating, at each tire monitoring device, a shared key pair for the tire monitoring device and each other tire monitoring device; each shared key pair comprising a first shared key and a second shared key; generating, at each tire monitoring device, using a function based on the respective first shared keys, a value to communicate to each other tire monitoring device; transmitting, from each tire monitoring device to each other tire monitoring device, a respective generated value; verifying, at each tire monitoring device, received generated values; and where received generated values are correctly verified, establishing secure future communication between respective tire monitoring devices using the respective second shared keys. The transmitting is preferably unicast to each device, but could also be broadcast, for example by combining the respective generated values into a message which is received by multiple devices and each device can extract its respective value.
Generating the value to communicate to each other tire monitoring device using a function based on the respective first shared keys may comprise using any of a random number, a public key generated by that tire monitoring device, and a public key generated by the other tire monitoring device for which the value is generated, as inputs for the function.
The method may comprise generating, at each tire monitoring device, a seed for a pseudo-random generator for each other tire monitoring device, and generating, at each tire monitoring device, the shared key pair for the tire monitoring device and each other tire monitoring device using the pseudo-random generator.
Generating the seed for a pseudo-random generator may comprise utilising a hash function, with the private key of that tire monitoring device and the public key of the other tire monitoring device for which the seed is being generated, as inputs for the hash function.
Verifying received generated values may comprise using the pseudo-random function based on the respective first shared keys.
The plurality of tire monitoring devices may comprise at least three tire monitoring devices. In other examples, the plurality of tire monitoring devices may comprise at least four, at least five, at least six, at least eight, at least ten, at least twelve or at least twenty tire monitoring devices.
The method may comprise providing, at each tire monitoring device, a signal indicative of a state of the tire monitoring device and verifying, by an operator, whether each signal matches each other signal.
The signal indicative of a state of the tire monitoring device may comprise a signal based on configuration data of the tire monitoring device, public keys generated and received by the tire monitoring device, and random numbers generated and received by the tire monitoring device. For example, the signal may be based a hash function.
The plurality of tire monitoring devices may comprise a plurality of tire pressure monitoring devices.
According to a second aspect of the present invention there is provided a tire monitoring device comprising a communication module for communication with a plurality of further tire monitoring devices, and a processor configured to generate a cryptographic parameter, the communication module configured to broadcast a message comprising the cryptographic parameter to at least two of the plurality of further tire monitoring devices.
The communication module may be configured to broadcast the message via a Bluetooth protocol. The communication module may comprise a first transceiver operable according to a relatively short range communication protocol, and a second transceiver operable according to a relatively long range communication protocol. The second transceiver may be configured to broadcast the message.
The communication module may be configured to receive, via a broadcast message, cryptographic parameters generated by other ones of the plurality of further tire monitoring devices.
The cryptographic parameter may comprise a cryptographic commitment generated by the tire monitoring device.
The communication module may be configured to broadcast, to the at least two of the plurality of further tire monitoring devices, an input to open the cryptographic commitment generated by the tire monitoring device. The communication module may be configured to receive, from other ones of the plurality of further tire monitoring devices, an input to open received cryptographic commitments from the other ones of the plurality of further tire monitoring devices. The tire monitoring device may be configured to verify the commitments received using the respective inputs.
The processor may be configured to generate a public key, and the communication module may be configured to broadcast the public key to the at least two of the plurality of further tire monitoring devices. The communication module may be configured to receive, from other ones of the plurality of further tire monitoring devices, public keys generated by the other ones of the plurality of further tire monitoring device. The processor may be configured to generate the cryptographic parameter using the public keys generated and received by the tire monitoring device.
The processor may be configured to generate a random number, and to generate the cryptographic parameter using the random number.
The communication module may be configured to broadcast configuration data of the tire monitoring device to the at least two of the plurality of further tire monitoring device. The communication module may be configured to receive configuration data of other ones of the plurality of further tire monitoring devices. The processor may be configured to generate the cryptographic parameter using received configuration data of the other ones of the plurality of further tire monitoring devices.
The processor may be configured to generate a shared key pair for the tire monitoring device and each of the at least two of the plurality of further tire monitoring devices, each shared key pair comprising a first shared key and a second shared key. The processor may be configured to generate, using a function based on the respective shared first keys, a value to communicate to the respective at least two of the plurality of further tire monitoring devices. The communication module may be configured to transmit the respective generated values to the at least two of the plurality of tire monitoring devices. The communication module may be configured to receive values generated by others of the plurality of further tire monitoring devices. The processor may be configured to verify received generated values, and where received generated values are correctly verified, the processor may be configured to establish secure future communication between the tire monitoring device and the respective ones of the at least two of the plurality of further tire monitoring devices using the respective second shared keys.
The processor may be configured to generate the value using a function based on the respective first shared keys comprises using any of a random number, a public key generated by the tire monitoring device, and a public key generated by the other tire monitoring device for which the value is generated, as inputs for the function.
The processor may be configured to generate a seed for a pseudo-random generator for each of the at least two of the plurality of further tire monitoring devices. The processor may be configured to generate the shared key pair for the tire monitoring device and the respective one of the at least two of the plurality of further tire monitoring devices using the pseudo-random generator.
The tire monitoring device may comprise an indicator configured to provide a signal indicative of a state of the tire monitoring device.
The signal indicative of a state of the tire monitoring device may comprise a signal based on configuration data of the tire monitoring device, public keys generated and received by the tire monitoring device, and random numbers generated and received by the tire monitoring device.
According to a third aspect of the present invention there is provided an aircraft system comprising a plurality of tire monitoring devices according to the second aspect of the present invention.
According to a fourth aspect of the present invention there is provided an aircraft comprising the aircraft system according to the third aspect of the present invention.
According to a fifth aspect of the present invention there is provided a method of establishing secure communication between a plurality of tire monitoring devices, the method comprising: generating, at each tire monitoring device, a public key; broadcasting, by each tire monitoring device to all other tire monitoring devices, the respective public keys; generating, at each tire monitoring device, a cryptographic commitment using all the public keys; broadcasting, by each tire monitoring device to all other tire monitoring devices, the respective cryptographic commitments; broadcasting, by each tire monitoring device to all other tire monitoring devices, an input to open the cryptographic commitment generated by that tire monitoring device; verifying, at each tire monitoring device, the commitments received by the respective tire monitoring device using the respective inputs; generating, at each tire monitoring device, a shared key pair for the tire monitoring device and all other tire monitoring devices, each shared key pair comprising a first shared key and a second shared key; generating, at each tire monitoring device, using a function based on the respective first shared keys, a value to communicate to each other tire monitoring device; unicasting, from each tire monitoring device to each other tire monitoring device, a respective generated value to each other tire monitoring device; verifying, at each tire monitoring device, received generated values; and where received generated values are correctly verified, establishing secure future communication between respective tire monitoring devices using the respective second shared keys.
Optional features of aspects of the present invention, may be equally applied to other aspects of the present invention, where appropriate.
Embodiments of the invention will now be described, by way of example only, with reference to the accompanying drawings, in which:
A tire pressure monitoring device 10 according to an example is shown schematically in
The processor 12 may be any suitable processor including single and multi-core processors, an Application Specific Integrated Circuit (ASIC) or like. The processor 12 is communicatively coupled to the transceiver 16, the LED 18, the memory 14 and the power source 21. The processor 12 is configured to generate various cryptographic parameters, as will be discussed hereinafter.
Memory 14 is a flash memory that stores configuration data 20 and also computer readable instructions for execution by the processor 12 in operation, although it will be appreciated that other types of memory may be used. The configuration data 20 can therefore be updated as required with configuration data. A reference tire pressure is stored in the configuration data 20. Additional data can also be stored in the configuration data 20, for example an aircraft identifier (such as an aircraft Tail identifier) and a wheel position.
Transceiver 16 is an appropriate transceiver capable of receiving a request to confirm the configuration data 20. In this example, the transceiver 16 comprises a first 15 short-range radio signal transceiver operating according to the NFC protocol, and a second 17 transceiver operating according to a Bluetooth low energy (BLE) communication protocol. Although described here as operating according to specific protocols, it will be appreciated that other embodiments where the first 15 and second 17 transceivers operate according to different protocols, for example with the second transceiver 17 operating via a WiFi protocol, are also envisaged. When the transceiver 16 receives a request to confirm the configuration data 20, the processor 12 encodes the configuration data 20 stored in the memory 14 of the tire pressure monitoring device 10, and transmits a signal 22 indicative of the configuration data 20 via the LED 18 to a user 24 observing the tire pressure monitoring device 10. Here the LED 18 is a three-colour LED which is capable of displaying red, blue, and green coloured light. Other examples may use a different number of colours of light than three and/or use other colours than red, blue, and green. Still further examples may utilise a display screen, for example an LCD screen, instead of or in addition to the LED 18. In examples herein, the user 24 is a human. As the user 24 can be taken to be a trusted source, and the tire pressure monitoring device 10 is itself a trusted source, an untrusted device 32 can be used to input the user's verification of the configuration data 20, as will be discussed in more detail hereafter.
The transceiver 16 is further able to transmit and receive cryptographic parameters from the tire monitoring device 10 to other tire monitoring devices 202,204,206,208,210, as will be discussed in more detail hereafter.
The tire pressure monitoring device 10 is installed on an aircraft 100 in use, and is one of a network 200 of tire pressure monitoring devices, with the aircraft 100 illustrated schematically in
As illustrated in
When initially installed on the aircraft 100, the tire pressure monitoring devices 10,202,204,206,208,210 are not configured, ie do not store the configuration data 20, and are incapable of direct communication between one another. The user 24 therefore uses the untrusted device 32 to configure the network 200 of tire pressure monitoring devices 10,202,204,206,208,210, as will now be described.
Initially, the user 24 approaches the first tire pressure monitoring device 10 to begin configuration. The user 24 inputs the desired configuration data 20 for the first tire pressure monitoring device 10, including the wheel location and reference pressure, into the untrusted device 32, and the first tire pressure monitoring device 10 is touched with the untrusted device 32 to establish near field communication using the first transceiver 15. The desired configuration data 20 may also include an aircraft tail ID, or any other appropriate configuration parameter. The near field communication is used to uniquely identify the tire pressure monitoring device 10 to the untrusted device 32. The configuration data 20 is then transferred from the untrusted device 32 to the first tire pressure monitoring device 10 via a Bluetooth® low energy protocol using the second transceiver 17 as previously described. The configuration data 20 is then stored in the memory 14, with the first tire pressure monitoring device 10 deleting any previously stored configuration data before the newly received configuration data 20 is stored. In other examples the configuration data 20 is transferred from the untrusted device 32 to the first tire pressure monitoring device 10 via near field communication.
Once the configuration data 20 has been stored, the processor 12 generates a key pair comprising a public key 212 and a private key 214, along with a random number 216, with use of these parameters described in more detail herein.
Whilst still at the first tire pressure monitoring device 10 the user 24 checks that the configuration data 20 that has been stored correctly in the memory 14, with the task being led by an aircraft maintenance manual (AMM).
One piece of configuration data 20 to be checked is the installed location of the first tire pressure monitoring device 10. Here, as an example, an AMM task card may provide to the user a list of tire pressure monitoring device locations, eg nose left, nose right, and so on, along with an associated expected flash sequence for the LED 18 which would correctly indicate the associated tire pressure monitoring device location. In the case of the first tire pressure monitoring device 10, which is used as the left nose tire pressure monitoring device in the example previously described, an appropriate flash sequence of the LED 18 may be one green flash, followed by five blue flashes, followed by one red flash. Illustrative appropriate flash sequences (ie signals 22) for tire pressure monitoring device location are shown schematically in
When checking the stored location of the first tire pressure monitoring device 10, the user 24 submits a request for the first tire pressure monitoring device 10 to display the stored location, via the LED 18, using a user interface of the untrusted device 32. The untrusted device 32 does not tell the first tire pressure monitoring device 10 which sequence to flash, but rather provides an instruction for the first tire pressure monitoring device 10 to flash its sequence indicative of the stored location. An exemplary user interface 50 for starting the check is shown in
As the user 24 can be taken to be a trusted source, and the first tire pressure monitoring device 10 is itself a trusted source, the untrusted device 32 can be used to input the user's verification of the configuration data 20. The verification can be trusted because it occurs between the user 24 (who is trusted) and tire pressure monitoring device 10 (which is trusted because of its certification to a particular DAL).
Another piece of configuration data 20 to be checked is the stored reference pressure of the first tire pressure monitoring device 10. Here, as an example, an AMM task card may provide to the user 24 a list of reference pressures for different tire pressure monitoring device locations, eg nose left, nose right, and so on, along with an associated expected flash sequence for the LED 18 which would correctly indicate the associated tire pressure monitoring device reference pressure. In the case of the first tire pressure monitoring device 10, which is used as the left nose tire pressure monitoring device in the example previously described, an appropriate reference pressure may be 178 PSI. Here separate flash sequences of the LED 18 may be performed for each digit of the reference pressure, ie a first flash sequence/signal 22 for the “hundreds” digit, a second flash sequence/signal 22 for the “tens” digit, and a third flash sequence/signal 22 for the “units” digit. The first flash sequence of the LED 18 in such a case may be one green flash, followed by one blue flash, followed by one red flash. The second flash sequence of the LED 18 in such a case may be one green flash, followed by seven blue flashes, followed by one red flash. The third flash sequence of the LED 18 in such a case may be one green flash, followed by eight blue flashes, followed by one red flash. Illustrative appropriate flash sequences (ie signals 22) for tire pressure monitoring device reference pressure are shown schematically in
When checking the stored reference pressure of the first tire pressure monitoring device 10, the user 24 submits a request for the first tire pressure monitoring device 10 to display the stored reference, via the LED 18, using a user interface of the untrusted device 32. The untrusted device 32 does not tell the first tire pressure monitoring device 10 which sequence to flash, but rather provides an instruction for the first tire pressure monitoring device 10 to flash its sequence indicative of the stored reference pressure. An exemplary user interface 60 for starting the check for the “hundreds” digit is shown in
Similarly an exemplary user interface 70 for starting the check for the “tens” digit is shown in
Once the desired configuration data 20 has been verified for the first tire pressure monitoring device 10, the user can move to the next tire pressure monitoring device 202,204,206,208,210 and perform the same steps to ensure configuration of each of the tire pressure monitoring devices 10,202,204,206,208,210.
It has been found that it may not be necessary to check the reference pressure for each tire pressure monitoring device 10,202,204,206,208,210, and that, instead, it may be sufficient to check the reference pressure for only one tire pressure monitoring device per wheel group, i.e. one tire pressure monitoring device within the first group 102 and one tire pressure monitoring device within the second group 104.
As will be appreciated from the discussion above, during the process of configuring each tire pressure monitoring device 10,202,204,206,208,210, each tire monitoring device 10,202,204,206,208,210 generates a respective key pair comprising a public key 212a-212f and a private key 214a-214f, along with a random number 216a-216f. This is illustrated schematically in
As a first step in establishing secure communication, illustrated schematically in
As a second step in establishing secure communication, illustrated schematically in
The untrusted device 32 is used as a router for the second messages 222a-222f, with each tire pressure monitoring device 10,202,204,206,208,210 receiving the other second messages 222a-222f via the untrusted device 32. Here bold arrows denote sent messages, whilst non-bold arrows denote received messages. The second messages 222a-222f are broadcast and received via the second receiver 17 of each tire pressure monitoring device 10,202,204,206,208,210, using a BLE protocol. Once all second messages 222a-222f are sent and received, each tire pressure monitoring device 10,202,204,206,208,210 knows the cryptographic commitment 220a-220f of each other tire pressure monitoring device 10,202,204,206,208,210. By broadcasting the second messages 222a-222f from the tire pressure monitoring devices 10,202,204,206,208,210, a number of messages sent by each tire pressure monitoring device 10,202,204,206,208,210 may be reduced compared to, for example, an arrangement where each tire pressure monitoring device 10,202,204,206,208,210 unicasts its cryptographic commitment 220a-220f to each other tire pressure monitoring device 10,202,204,206,208,210.
As a third step in establishing secure communication, illustrated schematically in
Where a cryptographic commitment 220a-220f cannot be verified, the establishment of secure communication is aborted, and an error message is communicated to the untrusted device 32. For example, the error message could be communicated using Bluetooth® or NFC to the untrusted device 32 for display by the untrusted device 32. Alternatively, or additionally, the error message could be communicated using the LED of the tire pressure monitoring device, such as by lighting the LED continuously red.
Where the cryptographic commitments 220a-220f are all verified, each tire pressure monitoring device 10,202,204,206,208,210 generates, for each other tire pressure monitoring device 10,202,204,206,208,210, a seed for a pseudo-random generator. The generation of the seed comprises utilising a hash function with inputs of the private key 214a-214f of the tire pressure monitoring device 10,202,204,206,208,210 performing the generation, and the public key 212a-212f of the tire pressure monitoring device 10,202,204,206,208,210 for which generation is being performed.
Using the pseudo random generator, each tire pressure monitoring device 10,202,204,206,208,210 generates a shared key pair comprising a first shared key k, and a second shared key k′, using any suitable cryptographic pseudo-random generator such as AES in counter mode.
Each tire pressure monitoring device 10,202,204,206,208,210 then generates, for each other tire pressure monitoring device 10,202,204,206,208,210, a value using a pseudo-random function based on the first shared key k, and associated random numbers 216a-216f and the respective public keys 212a-212f of the two tire pressure monitoring devices 10,202,204,206,208,210 in question as inputs to the pseudo-random function. The pseudo-random function may comprise any suitable cryptographic pseudo-random function such as HMAC.
Each tire pressure monitoring device 10,202,204,206,208,210 sends its respective values to the other tire pressure monitoring devices 10,202,204,206,208,210, with each tire pressure monitoring device 10,202,204,206,208,210 checking validity of the received values using the same pseudo-random function based on the first shared key k.
Where a value cannot be verified, the establishment of secure communication is aborted, and an error message is communicated to the untrusted device 32. For example the error message could be communicated using Bluetooth® or NFC to the untrusted device 32 for display by the untrusted device 32. Alternatively, or additionally, the error message could be communicated using the LED of the tire pressure monitoring device, such as by lighting the LED continuously red.
Where values are verified, the respective tire pressure monitoring devices 10,202,204,206,208,210 use the respective second shared keys k′ for secure future communication. Although the establishment of the secure communication required the use of unencrypted messages between the tire pressure monitoring devices, the untrusted device 32 cannot know the second shared keys k′ because generating these requires knowledge of the private keys that are not shared.
In such a manner secure communication can be established between tire pressure monitoring devices 10,202,204,206,208,210 of the network 200, i.e. with secure communication established on a pair-wise basis. The untrusted device does not know the second shared keys k′ used for communication, and the numbers of messages required to be exchanged is reduced by the use of broadcast messages. Furthermore, the secure communication does not require a pre-installed key or the like on the tire pressure monitoring devices 10, 202, 204, 206, 208, 210.
Where secure communication has been established, the tire pressure monitoring devices 10,202,204,206,208,210 can be used to communicate to the user that each tire pressure monitoring device 10,202,204,206,208,210 shares the same security code. Here each tire pressure monitoring device 10,202,204,206,208,210 generates a numerical value, representing a security code, that can be communicated to the user 24 by flashing the LED 18 in a manner similar to that previously described in relation to the checks of configuration data 20. The numerical value in some examples comprises a truncated hash of the configuration data 20, public keys 212a-212f and random numbers 216a-216f, such as a truncated hash function with an input of a concatenation of the configuration data 20, public keys 212a-212f and random numbers 216a-216f. Any suitable hash function can be used, such as SHA-3. As each of the tire pressure monitoring devices 10,202,204,206,208,210 knows the same configuration data 20, public keys 212a-212f and random numbers 216a-216f, the truncated hash, and hence the security code, should be the same for each tire pressure monitoring device 10,202,204,206,208,210.
Checking of security codes is, in some examples, led by the aircraft maintenance manual (AMM), with an AMM task card being utilised by the user 24 to fill in security codes indicated by the received signals 22. Similar to the signals for reference pressure discussed in relation to
Where the security codes flashed by the LEDs 18 of each tire pressure monitoring device 10,202,204,206,208,210 match, successful configuration may be determined. Where any of the security codes do not match, this is considered indicative of incorrect configuration, and re-configuration of the network 200 of tire pressure monitoring devices 10,202,204,206,208,210 needs to take place.
Pseudo code illustrating the steps involved in establishing secure communication and checking security codes is illustrated in
As mentioned above, in some examples broadcasting messages from a tire pressure monitoring device 10,202,204,206,208,210 to the other tire pressure monitoring devices 10,202,204,206,208,210 may reduce message count compared to a similar arrangement where each tire pressure monitoring device 10,202,204,206,208,210 unicasts a message to each other tire pressure monitoring device 10,202,204,206,208,210. Such methods may, in some examples, be thought of as comprising broadcasting, from each tire monitoring device 10,202,204,206,208,210 to each other tire monitoring device 10,202,204,206,208,210, a message comprising a cryptographic parameter generated by that respective tire monitoring device 10,202,204,206,208,210.
A method 300 illustrating steps involved in establishing secure communication in a network of tire pressure monitoring devices, in accordance with the previously described examples, is illustrated in the flow diagram of
The method 300 comprises generating 302, at each tire monitoring device, a public key, and broadcasting 304, from each tire monitoring device to each other tire monitoring device, the respective public keys. The method 300 comprises generating 306, at each tire monitoring device, a cryptographic commitment using the public keys generated and received by the respective tire monitoring device, and broadcasting 308, from each tire monitoring device to each other tire monitoring device, the respective cryptographic commitments. The method 300 comprises broadcasting 310, from each tire monitoring device to each other tire monitoring device, an input to open the cryptographic commitment generated by that tire monitoring device, and verifying 312, at each tire monitoring device, the commitments received by the respective tire monitoring device using the respective inputs.
The method 300 comprises generating 314, at each tire monitoring device, a shared key pair for the tire monitoring device and each other tire monitoring device, each shared key pair comprising a first shared key and a second shared key, and generating 316, at each tire monitoring device, using a function based on the respective first shared keys, a value to communicate to each other tire monitoring device. The method 300 comprises unicasting 318, from each tire monitoring device to each other tire monitoring device, a respective generated value to each other tire monitoring device, and verifying 320, at each tire monitoring device, received generated values. Where received generated values are correctly verified, the method 300 comprises establishing 322 secure future communication between respective tire monitoring devices using the respective second shared keys. In some examples, the method 300 may then comprise a step of performing a tire pressure check using the generated cryptographic keys, such that data transferred between the tire monitoring devices is secured.
By utilising the method 300, secure communication between tire pressure monitoring devices can be established, whilst reducing message count via use of broadcasting rather than unicasting. For example, if a protocol similar to Bluetooth's numeric comparison mode were used to establish pairwise keys between the tire monitoring devices, then to establish keys between n tire monitoring devices would require n*(n−1)/2 executions of the Bluetooth numeric comparison protocol. This would imply that each of the n tire monitoring devices sends (in the order of) n messages, and the user would have to verify each of the n*(n−1)/2 keys manually. In contrast, with the method 300, each tire monitoring device only sends (in the order of) one single message. The method 300 also enables a high level of security to be maintained in setting-up the secure communication.
While the use of the untrusted router has been described above to relay messages, this may be omitted in other examples. For example, a router may be omitted altogether and replaced with direct communication mesh communication between at least some tire pressure monitoring devices. Such a system still benefits from the establishment of secure communication which is not at risk of keys being determined from eavesdropping.
It will be appreciated that the use of broadcast messages can be applied to methods to establish secure communication between devices other than the specific examples described herein. For example, when a plurality of devices are all establishing secure communication at the same time, broadcast messages may be useful to reduce message traffic when a plurality of devices all need to receive the same piece of information (such as a device's public key). Alternatively, or additionally, broadcast messages can reduce message traffic by combining messages for multiple recipients into a single message, with each recipient retrieving its part of the combined message.
It is to noted that the term “or” as used herein is to be interpreted to mean “and/or”, unless expressly stated otherwise.
Number | Date | Country | Kind |
---|---|---|---|
22305399.2 | Mar 2022 | EP | regional |