Header and Body 2

Problem Addressed

Coupled inductors enable wireless recharging of personal electronics, wearable technologies, and IOT devices. Counterfeit wireless chargers that do not fulfil power specs of a device can send harsh transient signals, causing damage in the device’s battery and surrounding hardware. Secure hash algorithm (SHA) authentication protocols have been used to avoid charging problems between a charger-device pair. Unfortunately, these security protocols are not suitable for IOT systems, where a charger supplies power to multiple devices.