Ultra-Fast Wireless Power Hacking
By: Hui Wang, Hans D. Schotten, Stefan M. Goetz
Potential Business Impact:
Steals power from electric car chargers.
The rapid growth of electric vehicles (EVs) has driven the development of roadway wireless charging technology, effectively extending EV driving range. However, wireless charging introduces significant cybersecurity challenges. Any receiver within the magnetic field can potentially extract energy, and previous research demonstrated that a hacker could detect the operating frequency and steal substantial power. However, our approach required time to track new frequencies or precise adjustments of inductance and capacitance, which would be less effective against potential rapid transmitter frequency changes or capacitance drift. As a solution, we enhanced the interceptor and enabled it to intrude as well as steal energy within just three cycles of the high-frequency signal. Moreover, it can work without any circuit parameters or look-up tables. The key innovation is synchronizing the receiver current with the phase of the magnetic sensor voltage. Through MATLAB / Simulink simulations, finite-element analysis, and experimental validation, we demonstrated that our improved method can steal over 76% of the power received by a fully resonant receiver under identical conditions. This attack demonstrates that simple frequency-changing power encryption offers limited protection against such threats.
Similar Papers
Addressing Weak Authentication like RFID, NFC in EVs and EVCs using AI-powered Adaptive Authentication
Cryptography and Security
Secures electric cars from hackers using smart AI.
Talking to the Airgap: Exploiting Radio-Less Embedded Devices as Radio Receivers
Cryptography and Security
Computers can secretly receive secret messages wirelessly.
Frequency-Domain Characterization of Load Demand from Electrified Highways
Systems and Control
Powers electric cars wirelessly while they drive.