Vulnerability Analysis and Performance Enhancement of Authentication Protocol in Dynamic Wireless Power Transfer Systems

by   Tommaso Bianchi, et al.

Recent advancements in wireless charging technology, as well as the possibility of utilizing it in the Electric Vehicle (EV) domain for dynamic charging solutions, have fueled the demand for a secure and usable protocol in the Dynamic Wireless Power Transfer (DWPT) technology. The DWPT must operate in the presence of malicious adversaries that can undermine the charging process and harm the customer service quality, while preserving the privacy of the users. Recently, it was shown that the DWPT system is susceptible to adversarial attacks, including replay, denial-of-service and free-riding attacks, which can lead to the adversary blocking the authorized user from charging, enabling free charging for free riders and exploiting the location privacy of the customers. In this paper, we study the current State-Of-The-Art (SOTA) authentication protocols and make the following two contributions: a) we show that the SOTA is vulnerable to the tracking of the user activity and b) we propose an enhanced authentication protocol that eliminates the vulnerability while providing improved efficiency compared to the SOTA authentication protocols. By adopting authentication messages based only on exclusive OR operations, hashing, and hash chains, we optimize the protocol to achieve a complexity that varies linearly with the number of charging pads, providing improved scalability. Compared to SOTA, the proposed scheme has a performance gain in the computational cost of around 90


page 1

page 2

page 3

page 4


Identity-Based Authentication for On-Demand Charging of Electric Vehicles

Dynamic wireless power transfer provides means for charging Electric Veh...

Key management system for WSNs based on hash functions and elliptic curve cryptography

Due to hostile environment and wireless communication channel, security ...

A Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing

With the advent of the Internet-of-Things (IoT), vehicular networks and ...

Peripheral Authentication for Parked Vehicles over Wireless Radio Communication

Peripheral authentication is an important aspect in the vehicle networks...

Cloud-Based Secure Authentication (CSA) Protocol Suite for Defense against DoS Attacks

Cloud-based services have become part of our day-to-day software solutio...

How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy

This paper presents a timing attack on the FIDO2 (Fast IDentity Online) ...

Achieving Trust-Based and Privacy-Preserving Customer Selection in Ubiquitous Computing

The recent proliferation of smart devices has given rise to ubiquitous c...

Please sign up or login with your details

Forgot password? Click here to reset