Fast Energy-Theft Attack on Frequency-Varying Wireless Power without Additional Sensors
- URL: http://arxiv.org/abs/2509.25394v1
- Date: Mon, 29 Sep 2025 18:49:09 GMT
- Title: Fast Energy-Theft Attack on Frequency-Varying Wireless Power without Additional Sensors
- Authors: Hui Wang, Nima Tashakor, Xiaoyang Tian, Hans D. Schotten, Stefan M. Goetz,
- Abstract summary: Energy access protection and cybersecurity are gaining importance, especially in public places.<n>Currently, the most common energy encryption method uses frequency and associated impedance variation.<n>We have proven that this method is not reliable, since a hacker can detect the changing frequency and adjust the compensation.<n>We have optimized the attack and the associated system, which can intrude and steal energy within 0.2 ms.
- Score: 4.685485746257755
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: With the popularity of wireless charging, energy access protection and cybersecurity are gaining importance, especially in public places. Currently, the most common energy encryption method uses frequency and associated impedance variation. However, we have proven that this method is not reliable, since a hacker can detect the changing frequency and adjust the compensation. However, the previously presented system needed time to follow the updated frequency, while encryption systems may vary the frequency faster to avoid energy theft. Furthermore, the previous system required an additional sensor coil. To solve these problems, we optimized the attack and the associated system, which can intrude and steal energy within 0.2 ms. The key is the elimination of the time-consuming maximum receiver current regulation. Also, we use the main receiving coil rather than any additional sensor antenna to detect the magnetic field. Thus, the new hardware is even simpler. A simulation model and experimental results demonstrate the fast response speed of the attack on encrypted wireless power and steal 65% of the power. Overall, the applicability of the attack is highly improved and leaves less room for hardening the encryption. The results demonstrate that energy access protection needs to be given great attention.
Related papers
- Ultra-Fast Wireless Power Hacking [5.147320584332304]
Wireless charging introduces significant cybersecurity challenges.<n>Previous research demonstrated that a hacker could detect the operating frequency and steal substantial power.<n>This attack demonstrates that simple frequency-changing power encryption offers limited protection against such threats.
arXiv Detail & Related papers (2025-10-22T22:12:47Z) - WavInWav: Time-domain Speech Hiding via Invertible Neural Network [78.85443308774484]
Previous audio hiding methods often result in unsatisfactory quality when recovering secret audio.<n>We use a flow-based invertible neural network to establish a direct link between stego audio, cover audio, and secret audio.<n>We also add an encryption technique to protect the hidden data from unauthorized access.
arXiv Detail & Related papers (2025-10-03T11:36:16Z) - SRAM-based Physically Unclonable Function using Lightweight Hamming-Code Fuzzy Extractor for Energy Harvesting Beat Sensors [0.0]
Batteryless energy harvesting IoT sensor nodes such as beat sensors can be deployed in millions without the need to replace batteries.<n>They are ultra-low-power and cost-effective wireless sensor nodes without the maintenance cost and can work for 24 hours/365 days.<n>Data encryption and authentication can be used to secure beat sensor applications, but generating a secure key is challenging.
arXiv Detail & Related papers (2025-08-10T23:41:06Z) - Backscattering-Based Security in Wireless Power Transfer Applied to Battery-Free BLE Sensors [44.99833362998488]
Integration of security and energy efficiency in Internet of Things systems remains a critical challenge.<n>This paper explores the scalability and protocol-agnostic nature of a backscattering-based security mechanism by integrating it into Bluetooth Low Energy battery-free Wireless Sensor Network.
arXiv Detail & Related papers (2025-07-17T12:15:09Z) - Encryption-Aware Anomaly Detection in Power Grid Communication Networks [0.0]
The shift to smart grids has made electrical power systems more vulnerable to sophisticated cyber threats.<n>Our research focuses on the low-level communication layers of encrypted power grid systems to identify irregular patterns using statistics and machine learning.
arXiv Detail & Related papers (2024-12-06T09:58:56Z) - Sensor Deprivation Attacks for Stealthy UAV Manipulation [51.9034385791934]
Unmanned Aerial Vehicles autonomously perform tasks with the use of state-of-the-art control algorithms.
In this work, we propose a multi-part.
Sensor Deprivation Attacks (SDAs), aiming to stealthily impact.
process control via sensor reconfiguration.
arXiv Detail & Related papers (2024-10-14T23:03:58Z) - Hacking Encrypted Wireless Power: Cyber-Security of Dynamic Charging [9.132666650719715]
This paper proposes a decryption method for the principle of encrypted frequency-varying wireless power transfer.
A switched-capacitor array adaptively compensates the receiver for a wide frequency range.
Although any nonnegligible energy extracted would be problematic, we achieved to steal 78% to 84% of the energy an authorized receiver could get.
arXiv Detail & Related papers (2024-06-17T18:35:45Z) - Cybersecurity Assessment of the Polar Bluetooth Low Energy Heart-rate Sensor [0.0]
Bluetooth low energy (BLE) is a low-power protocol widely used in wireless personal area networks (WPANs)
This paper analyzes the security vulnerabilities of a BLE heart-rate sensor.
Case-study shows that an attacker can easily intercept and manipulate the data transmitted between the mobile app and the BLE device.
arXiv Detail & Related papers (2024-04-24T18:18:09Z) - DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles [61.394095512765304]
Dynamic Wireless Power Transfer (DWPT) is a novel technology that allows charging an electric vehicle while driving.
Recent advancements in quantum computing jeopardize classical public key cryptography.
We propose DynamiQS, the first post-quantum secure authentication protocol for dynamic wireless charging.
arXiv Detail & Related papers (2023-12-20T09:40:45Z) - Spatial-Frequency Discriminability for Revealing Adversarial Perturbations [53.279716307171604]
Vulnerability of deep neural networks to adversarial perturbations has been widely perceived in the computer vision community.
Current algorithms typically detect adversarial patterns through discriminative decomposition for natural and adversarial data.
We propose a discriminative detector relying on a spatial-frequency Krawtchouk decomposition.
arXiv Detail & Related papers (2023-05-18T10:18:59Z) - A Deep Reinforcement Learning-based Adaptive Charging Policy for
Wireless Rechargeable Sensor Networks [14.67786743033424]
Wireless power transfer technology is emerging as a reliable solution for energizing the sensors.
We propose a novel adaptive charging scheme using a deep reinforcement learning (DRL) approach.
Our model can adapt to spontaneous changes in the network topology.
arXiv Detail & Related papers (2022-08-16T16:10:52Z) - Complex-valued Convolutional Neural Networks for Enhanced Radar Signal
Denoising and Interference Mitigation [73.0103413636673]
We propose the use of Complex-Valued Convolutional Neural Networks (CVCNNs) to address the issue of mutual interference between radar sensors.
CVCNNs increase data efficiency, speeds up network training and substantially improves the conservation of phase information during interference removal.
arXiv Detail & Related papers (2021-04-29T10:06:29Z) - When Wireless Communications Meet Computer Vision in Beyond 5G [43.95612222496595]
This article articulates the emerging paradigm, sitting at the confluence of computer vision and wireless communication.
From a computer vision perspective, we highlight how radio frequency (RF) based sensing and imaging are instrumental in robustifying computer vision applications.
This article sheds light on the much-needed convergence of RF and non-RF modalities to enable ultra-reliable communication and truly intelligent 6G networks.
arXiv Detail & Related papers (2020-10-13T05:25:35Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.