Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/107952
| Title: | Hacking encrypted frequency-varying wireless power : cyber-security of dynamic charging | Authors: | Wang, H Tashakor, N Jiang, W Liu, W Jiang, CQ Goetz, SM |
Issue Date: | Sep-2024 | Source: | IEEE transactions on energy conversion, Sept 2024, v. 39, no. 3, p. 1947-1957 | Abstract: | Recently, energy encryption for wireless power transfer (WPT) has been developed for energy safety, which is important in public places to suppress unauthorized energy extraction. Most techniques vary the frequency so that unauthorized receivers cannot extract energy because of non-resonance. However, this strategy is unreliable. To stimulate the progress of energy encryption technology and point out security holes, this paper proposes a decryption method for the fundamental principle of encrypted frequency-varying WPT. The paper uses an auxiliary coil to detect the frequency and a switched-capacitor array to adaptively compensate the receiver for a wide frequency range. The switched-capacitor array contains two capacitors and one semiconductor switch. One capacitor compensates the receiver all the time while the other's active time during one WPT cycle is regulated by the switch. Thus, the proposed hacking receiver controls the equivalent capacitance of the compensation and steals WPT energy. Finally, a simulation model and experimental results prove the effectiveness of the attack on frequency-hopping energy encryption. Although any nonnegligible energy extracted would be problematic, we achieved to steal 78∼84% of the energy an authorized receiver could get. When the frequency changes, the interceptor is coarsely tuned very quickly, which can hack fast frequency-varying encrypted system. | Keywords: | Auxiliary transmitters Capacitance Capacitors Computer crime cyber security Encryption energy decryption energy encryption energy hacking frequency varying Receivers Switches variable capacitor Wireless power transfer |
Publisher: | Institute of Electrical and Electronics Engineers | Journal: | IEEE transactions on energy conversion | ISSN: | 0885-8969 | EISSN: | 1558-0059 | DOI: | 10.1109/TEC.2024.3355743 | Rights: | © 2024 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The following publication H. Wang, N. Tashakor, W. Jiang, W. Liu, C. Q. Jiang and S. M. Goetz, "Hacking Encrypted Frequency-Varying Wireless Power: Cyber-Security of Dynamic Charging," in IEEE Transactions on Energy Conversion, vol. 39, no. 3, pp. 1947-1957, Sept. 2024 is available at https://doi.org/10.1109/TEC.2024.3355743. |
| Appears in Collections: | Journal/Magazine Article |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| Wang_Hacking_Encrypted_Frequency-varying.pdf | Pre-Published version | 8.52 MB | Adobe PDF | View/Open |
Page views
57
Citations as of Apr 14, 2025
Downloads
46
Citations as of Apr 14, 2025
SCOPUSTM
Citations
8
Citations as of Sep 12, 2025
Google ScholarTM
Check
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.



