Hacking Encrypted Frequency-Varying Wireless Power: Cyber-Security of Dynamic Charging

被引:3
|
作者
Wang, Hui [1 ]
Tashakor, Nima [1 ]
Jiang, Wei [2 ]
Liu, Wei [3 ,4 ]
Jiang, C. Q. [5 ,6 ]
Goetz, Stefan M. [1 ]
机构
[1] Duke Univ, Dept Elect & Comp Engn, Durham, NC 27710 USA
[2] Rhineland Palatinate Tech Univ, Dept Elect & Comp Engn, D-67663 Kaiserslautern, Germany
[3] Hong Kong Polytech Univ, Res Ctr Elect Vehicles, Hong Kong 999077, Peoples R China
[4] Hong Kong Polytech Univ, Dept Elect & Elect Engn, Hong Kong 999077, Peoples R China
[5] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Peoples R China
[6] City Univ Hong Kong, State Key Lab Terahertz & Millimeter Waves, Hong Kong, Peoples R China
基金
美国国家科学基金会;
关键词
Receivers; Capacitors; Switches; Encryption; Capacitance; Computer crime; Auxiliary transmitters; Wireless power transfer; cyber security; energy hacking; frequency varying; energy encryption; energy decryption; variable capacitor; SYSTEM; TORQUE;
D O I
10.1109/TEC.2024.3355743
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Recently, energy encryption for wireless power transfer (WPT) has been developed for energy safety, which is important in public places to suppress unauthorized energy extraction. Most techniques vary the frequency so that unauthorized receivers cannot extract energy because of non-resonance. However, this strategy is unreliable. To stimulate the progress of energy encryption technology and point out security holes, this paper proposes a decryption method for the fundamental principle of encrypted frequency-varying WPT. The paper uses an auxiliary coil to detect the frequency and a switched-capacitor array to adaptively compensate the receiver for a wide frequency range. The switched-capacitor array contains two capacitors and one semiconductor switch. One capacitor compensates the receiver all the time while the other's active time during one WPT cycle is regulated by the switch. Thus, the proposed hacking receiver controls the equivalent capacitance of the compensation and steals WPT energy. Finally, a simulation model and experimental results prove the effectiveness of the attack on frequency-hopping energy encryption. Although any nonnegligible energy extracted would be problematic, we achieved to steal 78 similar to 84% of the energy an authorized receiver could get. When the frequency changes, the interceptor is coarsely tuned very quickly, which can hack fast frequency-varying encrypted system.
引用
收藏
页码:1947 / 1957
页数:11
相关论文
共 50 条
  • [41] Orthogonal-Frequency Simultaneous Wireless Power and Data Transfer for High-Power Wireless EV Charging
    Liu, Chengyin
    Zhang, Yi
    Chen, Hao
    Wu, Jiande
    He, Xiangning
    ENERGIES, 2024, 17 (08)
  • [42] Comprehensive Review on Power Pulsation in Dynamic Wireless Charging of Electric Vehicles
    Behnamfar, Milad
    Olowu, Temitayo O.
    Tariq, Mohd
    Sarwat, Arif
    IEEE ACCESS, 2024, 12 : 66858 - 66882
  • [43] Power system operational impacts of electric vehicle dynamic wireless charging
    Sauter, A. J.
    Lara, Jose Daniel
    Turk, Jennifer
    Milford, Jana
    Hodge, Bri-Mathias
    APPLIED ENERGY, 2024, 364
  • [44] Dynamic Wireless Charging for Inductive Power Transfer Systems in Electric Vehicles
    Ponmani Raja, M.
    Karthik, C.
    Jeyakkannan, N.
    Paul, John
    Jaison, Jibin
    ECS Transactions, 2022, 107 (01): : 2665 - 2672
  • [45] Valuing the cyber-attacks budget in high voltage power substations to increase cyber-security; providing a method based on Fuzzy Analytical Hierarchy Process
    Xiao, Yongcai
    Yang, Lianghan
    Li, Jun
    Xu, Jian
    Liu, Kuangye
    ENERGY REPORTS, 2021, 7 : 8322 - 8331
  • [46] Analysis and Control of Dynamic Wireless Charging Output Power for Electric Vehicle
    Zhang Qiang
    Huang Yun-xiao
    Niu Tian-lin
    Xu Chen-yang
    2017 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA 2017), 2017, : 349 - 354
  • [47] Building Low-Power Trustworthy Systems: Cyber-security Considerations for Real-Time Physiological Status Monitoring
    Holliman, John
    Zhivich, Michael
    Khazan, Roger
    Swiston, Albert
    Telfer, Brian
    MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 1083 - 1089
  • [48] Modular Power Electronics Approach for High-Power Dynamic Wireless Charging System
    Xue, Lingxiao
    Galigekere, Veda Prakash
    Gurpinar, Emre
    Su, Gui-Jia
    Chowdhury, Shajjad
    Mohammad, Mostak
    Onar, Omer C.
    IEEE TRANSACTIONS ON TRANSPORTATION ELECTRIFICATION, 2024, 10 (01): : 976 - 988
  • [49] Charging wireless sensor network security technology based on encryption algorithms and dynamic model
    Li, Yuanming
    Guo, Wei
    Meng, Xuejun
    Xia, Wen
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (03)
  • [50] Decision-Makers' Understanding of Cyber-Security's Systemic and Dynamic Complexity: Insights from a Board Game for Bank Managers
    Zeijlemaker, Sander
    Rouwette, Etienne A. J. A.
    Cunico, Giovanni
    Armenia, Stefano
    von Kutzschenbach, Michael
    SYSTEMS, 2022, 10 (02):