A Security Perspective on Battery Systems of the Internet of Things

@article{Lopez2017ASP,
  title={A Security Perspective on Battery Systems of the Internet of Things},
  author={Anthony Bahadir Lopez and Korosh Vatanparvar and Atul Prasad Deb Nath and Shuo Yang and Swarup Bhunia and Mohammad Abdullah Al Faruque},
  journal={Journal of Hardware and Systems Security},
  year={2017},
  volume={1},
  pages={188-199}
}
Battery (sub)systems are used in many systems (systems-of-systems) in the Internet of Things (IoT) ranging from everyday ones (e.g., mobile systems, home appliances, etc.) to safety-critical and/or mission-critical ones (e.g., electrical vehicles, unmanned aerial vehicles, autonomous underwater vehicles, etc.). As these systems become more interconnected with each other and their environments and batteries become more energy dense, the safety risks of using batteries increase. To guarantee… 
FACTS Approach to Address Cybersecurity Issues in Electric Vehicle Battery Systems
TLDR
The Framework for Analysis, Comparison, and Test of Standards (FACTS), is presented in this paper after identifying the key player in EV cybersecurity by comparing existing frameworks.
Securing Electric Vehicle Charging Systems Through Component Binding
In Vehicle-to-Grid (V2G) scenarios, Electric Vehicle (EV) batteries serve as distributed energy resources that help stabilize power supply through managed (dis)charging. The effective and safe grid
Security risks in cyber physical systems—A systematic mapping study
TLDR
A systematic mapping study on the data collected from 312 papers published between 2000 and 2020, focused on the security requirements, challenges, and the risk management processes of CPS, reveals integrity authentication and confidentiality as the most targeted security attributes in CPS.
A Blockchain-Based Internet of Things (IoT) Network for Security-Enhanced Wireless Battery Management Systems
TLDR
This paper explores blockchain technology for ensuring the communication and data security of an loT-enabled WBMS from malicious cyber-attacks and the proposed blockchain-based IoT network for WBMSs is validated by experimental studies.
Fusion-On-Field Security and Privacy Preservation for IoT Edge Devices: Concurrent Defense Against Multiple Types of Hardware Trojan Attacks
TLDR
This is the first work where multiple HT based attacks are concurrently detected in IoT-ED without requiring any design time intervention, and the proposed technique can also detect all the attacks concurrently with 92% accuracy.
Reliable and Energy Efficient Battery-Powered Cyber-Physical Systems
TLDR
This thesis investigates issues with Electric Vehicles (EV) which are common battery-powered Cyber-Physical Systems, and applies intelligent control methodologies that leverage the modeling and interaction within CPS to achieve reliable and efficient operation.
A Survey on Security and Privacy Issues of UAVs
TLDR
This paper extensively survey the security and privacy issues of UAVs by providing a systematic classification at four levels: Hardware-level, Software- level, Communication- Level, and Sensor-level.
Cybersecurity of Plug-In Electric Vehicles: Cyberattack Detection During Charging
  • S. Dey, M. Khanra
  • Computer Science, Engineering
    IEEE Transactions on Industrial Electronics
  • 2021
TLDR
This article focuses on designing algorithms for detecting cyberattacks that can potentially affect PEV battery packs during charging, and proposes a filter-based design approach for the dynamic detector that considers a multiobjective criterion including stability, robustness, and attack sensitivity.
Self-Secured Control with Anomaly Detection and Recovery in Automotive Cyber-Physical Systems
TLDR
This paper proposes a novel control design using conditional generative adversarial networks that will enable a self-secured controller to capture the normal behavior of the control loop and the physical system, detect the anomaly, and recover from them.
Systematic Review of Internet of Things Security
TLDR
This paper aims at providing a more comprehensive and systematic review of IoT security based on the survey result of the most recent literature over the past three years (2015 to 2017).
...
...

References

SHOWING 1-10 OF 66 REFERENCES
Ensuring Safety, Security, and Sustainability of Mission-Critical Cyber–Physical Systems
TLDR
The formal underpinnings of recent CPS S3 solutions are aligned together in a theoretical framework for cyber-physical interactions, empowering CPS researchers to systematically design solutions for ensuring safety, security, or sustainability.
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study
TLDR
It is shown that eavesdropping is easily possible at a distance of roughly 40m from a passing vehicle and that messages can be easily triggered remotely, which raises privacy concerns as vehicles can be tracked through these identifiers.
Security challenges in automotive hardware/software architecture design
TLDR
The challenges arising in electric vehicles, like the vulnerability to attacks involving tampering with the battery safety, are discussed, and future automotive architectures based on Ethernet/IP and how formal verification methods might be used to increase their security are discussed.
Eco-Friendly Automotive Climate Control and Navigation System for Electric Vehicles
TLDR
A novel jointly optimized eco-friendly automotive climate control and navigation system methodology to optimize the HVAC utilization and route for better battery lifetime and driving range and compared the performance with the state-of-the-arts for different weather and route behavior.
Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices
TLDR
An insight into the ramifications of battery exhaustion Denial of Service (DoS) attacks on battery-powered mobile devices is provided and a hybrid Intrusion Detection System (IDS) designed to thwart this form of malicious activity is presented.
Multimedia-based battery drain attacks for Android devices
TLDR
An energy-based attack based on soliciting hardware-level encoding/decoding functions through properly crafted multimedia files is analyzed and its impact evaluated and such kind of attacks are performed without accessing the device by taking advantage of the new HTML5 functionalities.
The vulnerability of UAVs to cyber attacks - An approach to the risk assessment
TLDR
A first approach to an UAV specific risk assessment is provided and take into account the factors exposure, communication systems, storage media, sensor systems and fault handling mechanisms to assess the risk of some currently used UAVs: The “MQ-9 Reaper” and the “AR Drone”.
Automatic Battery Replacement System for UAVs: Analysis and Design
TLDR
A model to evaluate the coverage of a given UAS and a ground station capable of swapping a UAV’s batteries are proposed, followed by a discussion of prototype components and tests of some of the prototype modules.
Denial-of-service attacks on battery-powered mobile computers
TLDR
This work describes three main methods for an attacker to drain the battery and proposes a power-secure architecture to thwart these power attacks by employing multi-level authentication and energy signatures.
...
...