Hacking Encrypted Wireless Power: Cyber-Security of Dynamic Charging

Read original: arXiv:2406.12019 - Published 6/19/2024 by Hui Wang, Nima Tashakor, Wei Jiang, Wei Liu, C. Q. Jiang, Stefan M. Goetz
Total Score

0

🛸

Sign in to get full access

or

If you already have an account, we'll log you in

Overview

  • Researchers have developed a method to decrypt wireless power transfer systems that use frequency variation to prevent unauthorized energy extraction.
  • The decryption method uses an auxiliary coil to detect the frequency and a switched-capacitor array to adaptively compensate the receiver, allowing it to extract energy even as the frequency changes.
  • Simulation and experimental results show the decryption method can steal 78% to 84% of the energy an authorized receiver can obtain, even from fast frequency-varying encrypted systems.

Plain English Explanation

Wireless power transfer systems are being designed with energy encryption to prevent unauthorized users from extracting energy, which is important in public places. A common technique is to vary the frequency so unauthorized receivers can't extract energy due to non-resonance. However, this can be unreliable.

The researchers in this paper propose a method to decrypt these frequency-varying wireless power transfer systems. Their approach uses an auxiliary coil to detect the changing frequency and a special circuit with two capacitors and a switch to adaptively compensate the receiver. This allows the decryption receiver to steal a significant amount of the energy - between 78% and 84% of what an authorized receiver can get. This method can work even against fast frequency-varying encrypted systems.

Technical Explanation

The researchers developed a decryption method for wireless power transfer systems that use frequency variation to prevent unauthorized energy extraction. Their approach utilizes an auxiliary coil to detect the changing frequency and a switched-capacitor array to adaptively compensate the receiver.

The switched-capacitor array contains two capacitors and one semiconductor switch. One capacitor compensates the receiver at all times, while the other capacitor's active time during each wireless power transfer cycle is regulated by the switch. This allows the decryption receiver to control the equivalent capacitance of the compensation circuit and steal a significant portion of the transmitted energy.

Detailed simulation models and experimental results demonstrate the effectiveness of this decryption attack on frequency-hopping energy encryption systems. The researchers were able to steal 78% to 84% of the energy an authorized receiver could obtain, and the interceptor can be quickly tuned as the frequency changes to hack even fast frequency-varying encrypted systems.

Critical Analysis

The researchers acknowledge that any nontrivial amount of energy extracted by an unauthorized receiver would be problematic for the security of wireless power transfer systems. Their decryption method is able to steal a large majority of the energy, which raises serious concerns about the reliability of frequency-varying encryption techniques.

While the paper provides a comprehensive technical explanation and experimental validation of the decryption approach, it does not address potential countermeasures or ways to enhance the security of these systems against such attacks. Further research may be needed to develop more robust energy encryption techniques that can withstand sophisticated decryption efforts.

Additionally, the paper does not explore the broader implications of this research, such as the potential for misuse by bad actors or the ethical considerations around developing decryption methods. Careful consideration of the societal impacts and responsible disclosure practices would be important in this context.

Conclusion

This research paper presents a decryption method for wireless power transfer systems that use frequency variation as a security measure. The proposed approach, which utilizes an auxiliary coil and a switched-capacitor array, can successfully steal a large portion of the transmitted energy, even from fast frequency-varying encrypted systems.

The findings of this study raise significant concerns about the reliability of current energy encryption techniques and highlight the need for more robust security measures to protect wireless power transfer systems, especially in public spaces. Further research and development of secure wireless power transfer technologies will be crucial to ensure the safety and integrity of these systems as they become more prevalent in our daily lives.



This summary was produced with help from an AI and may contain inaccuracies - check out the links to read the original source documents!

Follow @aimodelsfyi on 𝕏 →

Related Papers

🛸

Total Score

0

Hacking Encrypted Wireless Power: Cyber-Security of Dynamic Charging

Hui Wang, Nima Tashakor, Wei Jiang, Wei Liu, C. Q. Jiang, Stefan M. Goetz

Recently, energy encryption for wireless power transfer has been developed for energy safety, which is important in public places to suppress unauthorized energy extraction. Most techniques vary the frequency so that unauthorized receivers cannot extract energy because of non-resonance. However, this strategy is unreliable. To stimulate the progress of energy encryption technology and point out security holes, this paper proposes a decryption method for the fundamental principle of encrypted frequency-varying wireless power transfer. The paper uses an auxiliary coil to detect the frequency and a switched-capacitor array to adaptively compensate the receiver for a wide frequency range. The switched-capacitor array contains two capacitors and one semi-conductor switch. One capacitor compensates the receiver all the time while the other's active time during one wireless power transfer cycle is regulated by the switch. Thus, the proposed hacking receiver controls the equivalent capacitance of the compensation and steals energy. Finally, a detailed simulation model and experimental results prove the effectiveness of the attack on frequency-hopping energy encryption. Although any nonnegligible energy extracted would be problematic, we achieved to steal 78% to 84% of the energy an authorized receiver could get. When the frequency changes, the interceptor is coarsely tuned very quickly, which can hack fast frequency-varying encrypted system.

Read more

6/19/2024

💬

Total Score

0

Chaotic Waveform-based Signal Design for Noncoherent SWIPT Receivers

Priyadarshi Mukherjee, Constantinos Psomas, Ioannis Krikidis

This paper proposes a chaotic waveform-based multi-antenna receiver design for simultaneous wireless information and power transfer (SWIPT). Particularly, we present a differential chaos shift keying (DCSK)-based SWIPT multiantenna receiver architecture, where each antenna switches between information transfer (IT) and energy harvesting (EH) modes depending on the receiver's requirements. We take into account a generalized frequency-selective Nakagami-m fading model as well as the nonlinearities of the EH process to derive closed-form analytical expressions for the associated bit error rate (BER) and the harvested direct current (DC), respectively. We show that, both depend on the parameters of the transmitted waveform and the number of receiver antennas being utilized in the IT and EH mode. We investigate a trade-off in terms of the BER and energy transfer by introducing a novel achievable `success rate - harvested energy' region. Moreover, we demonstrate that energy and information transfer are two conflicting tasks and hence, a single waveform cannot be simultaneously optimal for both IT and EH. Accordingly, we propose appropriate transmit waveform designs based on the application specific requirements of acceptable BER or harvested DC or both. Numerical results demonstrate the importance of chaotic waveform-based signal design and its impact on the proposed receiver architecture.

Read more

4/4/2024

Learning-based Power Control for Secure Covert Semantic Communication
Total Score

0

Learning-based Power Control for Secure Covert Semantic Communication

Yansheng Liu, Jinbo Wen, Zongyao Zhang, Kun Zhu, Jiawen Kang

Despite progress in semantic communication (SemCom), research on SemCom security is still in its infancy. To bridge this gap, we propose a general covert SemCom framework for wireless networks, reducing eavesdropping risk. Our approach transmits semantic information covertly, making it difficult for wardens to detect. Given the aim of maximizing covert SemCom performance, we formulate a power control problem in covert SemCom under energy constraints. Furthermore, we propose a learning-based approach based on the soft actor-critic algorithm, optimizing the power of the transmitter and friendly jammer. Numerical results demonstrate that our approach effectively enhances the performance of covert SemCom.

Read more

7/11/2024

Online Event-Triggered Switching for Frequency Control in Power Grids with Variable Inertia
Total Score

0

Online Event-Triggered Switching for Frequency Control in Power Grids with Variable Inertia

Jie Feng, Wenqi Cui, Jorge Cort'es, Yuanyuan Shi

The increasing integration of renewable energy resources into power grids has led to time-varying system inertia and consequent degradation in frequency dynamics. A promising solution to alleviate performance degradation is using power electronics interfaced energy resources, such as renewable generators and battery energy storage for primary frequency control, by adjusting their power output set-points in response to frequency deviations. However, designing a frequency controller under time-varying inertia is challenging. Specifically, the stability or optimality of controllers designed for time-invariant systems can be compromised once applied to a time-varying system. We model the frequency dynamics under time-varying inertia as a nonlinear switching system, where the frequency dynamics under each mode are described by the nonlinear swing equations and different modes represent different inertia levels. We identify a key controller structure, named Neural Proportional-Integral (Neural-PI) controller, that guarantees exponential input-to-state stability for each mode. To further improve performance, we present an online event-triggered switching algorithm to select the most suitable controller from a set of Neural-PI controllers, each optimized for specific inertia levels. Simulations on the IEEE 39-bus system validate the effectiveness of the proposed online switching control method with stability guarantees and optimized performance for frequency control under time-varying inertia.

Read more

8/29/2024