Hacking Encrypted Wireless Power: Cyber-Security of Dynamic Charging
- URL: http://arxiv.org/abs/2406.12019v1
- Date: Mon, 17 Jun 2024 18:35:45 GMT
- Title: Hacking Encrypted Wireless Power: Cyber-Security of Dynamic Charging
- Authors: Hui Wang, Nima Tashakor, Wei Jiang, Wei Liu, C. Q. Jiang, Stefan M. Goetz,
- Abstract summary: This paper proposes a decryption method for the principle of encrypted frequency-varying wireless power transfer.
A switched-capacitor array adaptively compensates the receiver for a wide frequency range.
Although any nonnegligible energy extracted would be problematic, we achieved to steal 78% to 84% of the energy an authorized receiver could get.
- Score: 9.132666650719715
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Recently, energy encryption for wireless power transfer has been developed for energy safety, which is important in public places to suppress unauthorized energy extraction. Most techniques vary the frequency so that unauthorized receivers cannot extract energy because of non-resonance. However, this strategy is unreliable. To stimulate the progress of energy encryption technology and point out security holes, this paper proposes a decryption method for the fundamental principle of encrypted frequency-varying wireless power transfer. The paper uses an auxiliary coil to detect the frequency and a switched-capacitor array to adaptively compensate the receiver for a wide frequency range. The switched-capacitor array contains two capacitors and one semi-conductor switch. One capacitor compensates the receiver all the time while the other's active time during one wireless power transfer cycle is regulated by the switch. Thus, the proposed hacking receiver controls the equivalent capacitance of the compensation and steals energy. Finally, a detailed simulation model and experimental results prove the effectiveness of the attack on frequency-hopping energy encryption. Although any nonnegligible energy extracted would be problematic, we achieved to steal 78% to 84% of the energy an authorized receiver could get. When the frequency changes, the interceptor is coarsely tuned very quickly, which can hack fast frequency-varying encrypted system.
Related papers
- Ultra-Fast Wireless Power Hacking [5.147320584332304]
Wireless charging introduces significant cybersecurity challenges.<n>Previous research demonstrated that a hacker could detect the operating frequency and steal substantial power.<n>This attack demonstrates that simple frequency-changing power encryption offers limited protection against such threats.
arXiv Detail & Related papers (2025-10-22T22:12:47Z) - Fast Energy-Theft Attack on Frequency-Varying Wireless Power without Additional Sensors [4.685485746257755]
Energy access protection and cybersecurity are gaining importance, especially in public places.<n>Currently, the most common energy encryption method uses frequency and associated impedance variation.<n>We have proven that this method is not reliable, since a hacker can detect the changing frequency and adjust the compensation.<n>We have optimized the attack and the associated system, which can intrude and steal energy within 0.2 ms.
arXiv Detail & Related papers (2025-09-29T18:49:09Z) - A continuous variable quantum battery with wireless and remote charging [12.802009684565606]
We design a wireless and remote charging scheme based on the quantized Hamiltonian of two LC coupled circuits.<n>It is found that the quantum entanglement, which is regarded as a significant quantum resource, is not a prerequisite for charging the battery and extracting useful work.
arXiv Detail & Related papers (2025-07-10T07:21:11Z) - Preventing Radio Fingerprinting through Friendly Jamming [5.074726108522963]
Radio frequency fingerprinting enables a passive receiver to recognize and authenticate a transmitter without the need for cryptographic tools.
We examine the hostile usage of radio frequency fingerprinting, which facilitates the unauthorized tracking of wireless devices in the field by malicious entities.
We suggest a method to sanitize the transmitted signal of its fingerprint using a jammer, deployed on purpose to improve devices' anonymity on the channel.
arXiv Detail & Related papers (2024-07-11T09:01:46Z) - Semantic Entropy Can Simultaneously Benefit Transmission Efficiency and Channel Security of Wireless Semantic Communications [55.54210451136529]
We propose SemEntropy to explore semantics of data for both adaptive transmission and physical layer encryption.
We show that SemEntropy can keep the semantic accuracy remain 95% with 60% less transmission.
arXiv Detail & Related papers (2024-02-05T12:25:02Z) - Exact Homomorphic Encryption [0.0]
This article proposes a framework dubbed Exact Homomorphic Encryption, EHE, enabling exact computations on encrypted data without the need for pre-decryption.
Two fundamental traits of quantum gates, invertibility and the noncommutativity, establish the success of EHE.
arXiv Detail & Related papers (2024-01-17T07:48:52Z) - Attacking at non-harmonic frequencies in screaming-channel attacks [1.2528259460055124]
Screaming-channel attacks enable Electromagnetic (EM) Side-Channel Attacks (SCAs) at larger distances due to higher EM leakage energies.
This work demonstrates that compromising signals appear not only at the harmonics and that leakage at non-harmonics can be exploited for successful attacks.
arXiv Detail & Related papers (2023-11-27T13:56:21Z) - Quantum Public-Key Encryption with Tamper-Resilient Public Keys from One-Way Functions [12.45203887838637]
We construct quantum public-key encryption from one-way functions.
In our construction, public keys are quantum, but ciphertexts are classical.
arXiv Detail & Related papers (2023-04-04T13:57:17Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - Frequency-bin entanglement from domain-engineered down-conversion [101.18253437732933]
We present a single-pass source of discrete frequency-bin entanglement which does not use filtering or a resonant cavity.
We use a domain-engineered nonlinear crystal to generate an eight-mode frequency-bin entangled source at telecommunication wavelengths.
arXiv Detail & Related papers (2022-01-18T19:00:29Z) - Moving beyond the transmon: Noise-protected superconducting quantum
circuits [55.49561173538925]
superconducting circuits offer opportunities to store and process quantum information with high fidelity.
Noise-protected devices constitute a new class of qubits in which the computational states are largely decoupled from local noise channels.
This Perspective reviews the theoretical principles at the heart of these new qubits, describes recent experiments, and highlights the potential of robust encoding of quantum information in superconducting qubits.
arXiv Detail & Related papers (2021-06-18T18:00:13Z) - Detector blinding attacks on counterfactual quantum key distribution [0.0]
Counterfactual quantum key distribution protocols allow two sides to establish a common secret key.
Part of the quantum state used to establish each bit never leaves the transmitting side, which hinders some attacks.
We present two attacks that use this ability to compromise the security of counterfactual quantum key distribution.
arXiv Detail & Related papers (2020-11-05T07:41:39Z) - WaveTransform: Crafting Adversarial Examples via Input Decomposition [69.01794414018603]
We introduce WaveTransform', that creates adversarial noise corresponding to low-frequency and high-frequency subbands, separately (or in combination)
Experiments show that the proposed attack is effective against the defense algorithm and is also transferable across CNNs.
arXiv Detail & Related papers (2020-10-29T17:16:59Z) - Hardware-Encoding Grid States in a Non-Reciprocal Superconducting
Circuit [62.997667081978825]
We present a circuit design composed of a non-reciprocal device and Josephson junctions whose ground space is doubly degenerate and the ground states are approximate codewords of the Gottesman-Kitaev-Preskill (GKP) code.
We find that the circuit is naturally protected against the common noise channels in superconducting circuits, such as charge and flux noise, implying that it can be used for passive quantum error correction.
arXiv Detail & Related papers (2020-02-18T16:45:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.