Abstract:In the last several years, wireless Battery Management Systems (BMS) have slowly become a topic of interest from both academia and industry. It came from a necessity derived from the increased production and use in different systems, including the electrical vehicles. Wireless communication allows for a more flexible and cost-efficient sensor installation in battery packs. However, many wireless technologies, such as those that use the 2.4 GHz frequency band, suffer from the interference limitations that need … Show more
“…Edge nodes could also serve as trusted gateways, adding new IIoT devices, removing existing ones, and being responsible for re-keying. Some existing works have detailed devices with the required authentication ability through various types of servers, including NFC tags [228][229][230], smart cards [231][232][233], RFID tags [234][235][236][237][238], and biometric traits [239][240][241]. Edge nodes could become a substitute for such a server, and may be attached to sensors, acting as proxies for sensor measurements.…”
Section: Authentication and Access Controlmentioning
The Industrial Internet of Things (IIoT) paradigm is a key research area derived from the Internet of Things (IoT). The emergence of IIoT has enabled a revolution in manufacturing and production, through the employment of various embedded sensing devices connected by an IoT network, along with a collection of enabling technologies, such as artificial intelligence (AI) and edge/fog computing. One of the unrivaled characteristics of IIoT is the inter-connectivity provided to industries; however, this characteristic might open the door for cyber-criminals to launch various attacks. In fact, one of the major challenges hindering the prevalent adoption of the IIoT paradigm is IoT security. Inevitably, there has been an inevitable increase in research proposals over the last decade to overcome these security concerns. To obtain an overview of this research area, conducting a literature survey of the published research is necessary, eliciting the various security requirements and their considerations. This paper provides a literature survey of IIoT security, focused on the period from 2017 to 2023. We identify IIoT security threats and classify them into three categories, based on the IIoT layer they exploit to launch these attacks. Additionally, we characterize the security requirements that these attacks violate. Finally, we highlight how emerging technologies, such as AI and edge/fog computing, can be adopted to address security concerns and enhance IIoT security.
“…Edge nodes could also serve as trusted gateways, adding new IIoT devices, removing existing ones, and being responsible for re-keying. Some existing works have detailed devices with the required authentication ability through various types of servers, including NFC tags [228][229][230], smart cards [231][232][233], RFID tags [234][235][236][237][238], and biometric traits [239][240][241]. Edge nodes could become a substitute for such a server, and may be attached to sensors, acting as proxies for sensor measurements.…”
Section: Authentication and Access Controlmentioning
The Industrial Internet of Things (IIoT) paradigm is a key research area derived from the Internet of Things (IoT). The emergence of IIoT has enabled a revolution in manufacturing and production, through the employment of various embedded sensing devices connected by an IoT network, along with a collection of enabling technologies, such as artificial intelligence (AI) and edge/fog computing. One of the unrivaled characteristics of IIoT is the inter-connectivity provided to industries; however, this characteristic might open the door for cyber-criminals to launch various attacks. In fact, one of the major challenges hindering the prevalent adoption of the IIoT paradigm is IoT security. Inevitably, there has been an inevitable increase in research proposals over the last decade to overcome these security concerns. To obtain an overview of this research area, conducting a literature survey of the published research is necessary, eliciting the various security requirements and their considerations. This paper provides a literature survey of IIoT security, focused on the period from 2017 to 2023. We identify IIoT security threats and classify them into three categories, based on the IIoT layer they exploit to launch these attacks. Additionally, we characterize the security requirements that these attacks violate. Finally, we highlight how emerging technologies, such as AI and edge/fog computing, can be adopted to address security concerns and enhance IIoT security.
“…The system is further evaluated on its (i) security dependability by a threat model analysis, (ii) time measurements for individual BMS NFC readout phases, (iii) protocol overhead analysis for the secure BMS monitoring and diagnostic data logging (Section V), (iv) system energy consumption, and (v) potential NFC sensor readout throughput. This article presents an extended version of the published paper [22] that includes a more detailed analysis and investigation of the proposed design specifications related to the NFC integration for the BMS inter-module communication and sensor data readout. On top of the design and authentication approach presented in that paper, an additional security investigation and evaluation for the purpose of securely logging sensor monitoring and diagnostic BMS data were conducted.…”
Wireless Battery Management Systems (BMS) are increasingly being considered for modern applications. The everincreasing complexity and production costs of BMS modules and wired connections resulted in a necessity for new ideas and approaches. Despite this growing trend, there is a lack of generic solutions focused on battery cells' sensor readout, where wireless communication allows for a more flexible and cost-efficient sensor installation in battery packs. Many wireless technologies, such as those that use the 2.4 GHz frequency band, suffer from interference and other limitations. In this article, we present an alternative approach to communication in BMS that relies on the use of Near Field Communication (NFC) technology for battery sensor readouts. As an answer to the rising concern over the counterfeited battery packs, we consider an authentication schema for battery pack validation. We further consider security measures for the processed and stored BMS status data. To show that a general BMS application can make use of our design, we implement a BMS demonstrator using the targeted components. We further test the demonstrator on the technical and functional level, by also performing evaluation on its performance, energy usage, and a security threat model.
“…Combining NFC applications with BMS is a relatively novel topic, as not much work has yet been done by the research community as mentioned in a current survey study of wireless BMS [14]. A recent paper published by Basic et al [15] proposes a solution for wireless sensor readouts from battery cells to BCCs by using NFC technology, and also presents an anti-counterfeiting authentication measure, but only for closed active systems. In this work, we further try to bridge the gap of some of the open questions in respect to design requirements between NFC and BMS by also extending the security application for external communication interactions.…”
Section: A Wireless Battery Management System (Bms)mentioning
confidence: 99%
“…This is done with the intention that the security functions and the secure data would be stored inside a trusted environment, which in this case would be an SM that resides on the battery pack together with the MCU. The NTAG can also be boosted with additional device authorization mechanisms [15].…”
Section: Design Of a Novel Secure Bms Nfc Readoutmentioning
In modern systems that rely on the use of Battery Management Systems (BMS), longevity and the re-use of battery packs have always been important topics of discussion. These battery packs would be stored inside warehouses where they would need to be properly monitored and configured before their re-integration into the new systems. Traditional use of wired connections can be very cumbersome, and sometimes even impossible, due to the outer layers and packaging. To circumvent these issues, we propose an extension to the conventional BMS design that incorporates the use of Near Field Communication (NFC) for the purpose of wireless battery pack status readout. Additionally, to ensure that these packs are only managed by authenticated devices and that the data that is communicated with is protected against outside eavesdropping and tampering, we present a solution in the form of a lightweight security layer on top of the NFC protocol. To show the feasibility of our design, an accompanying prototype has been implemented and evaluated.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.