2022 IEEE International Conference on RFID (RFID) 2022
DOI: 10.1109/rfid54732.2022.9795979
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Secure NFC-based Approach for BMS Monitoring and Diagnostic Readout

Abstract: In modern systems that rely on the use of Battery Management Systems (BMS), longevity and the re-use of battery packs have always been important topics of discussion. These battery packs would be stored inside warehouses where they would need to be properly monitored and configured before their re-integration into the new systems. Traditional use of wired connections can be very cumbersome, and sometimes even impossible, due to the outer layers and packaging. To circumvent these issues, we propose an extension… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…We base our design of the DKD on the use of the STS protocol [11], [17]. STS is a known protocol used in wide networks; however, it has not been previously investigated for use with the ECQV.…”
Section: B Protocol Formalizationmentioning
confidence: 99%
“…We base our design of the DKD on the use of the STS protocol [11], [17]. STS is a known protocol used in wide networks; however, it has not been previously investigated for use with the ECQV.…”
Section: B Protocol Formalizationmentioning
confidence: 99%
“…By relying only on NFC, we are able to provide a solution for three different scenarios that extend the BMS functionality, as described in Table I. : (i) active readout of internal sensors [19], (ii) idle state scenario considered for off-vehicle use cases, and (iii) active diagnostic readout [20].…”
Section: The Novel Bms Design For Wireless Readoutmentioning
confidence: 99%
“…Therefore, it is of utmost importance to secure the location of the master key with an SM. We rely on the use of SNDEF records [20].…”
Section: B Security Protocol For External Bms Readoutmentioning
confidence: 99%
See 2 more Smart Citations