search.noResults

search.searching

dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
BATTERY TECHNOLOGY Counterfeit batteries pose RFI risk


Michele Windsor of Accutronics explains the need to avoid counterfeit power sources to prevent reliability and RFI problems in portable electronic military equipment.


❱ ❱ Portable communication devices


for military use demand reliable and EMC compliant battery and power systems to be effective


I


n many ways, the Internet of Things (IoT) embodies the spirit of the defence industry, with a unit of devices working harmoniously to achieve one common goal in the most effective and efficient way. It makes sense, then, that the military and security sectors are seeing increased adoption of IoT technology to transmit and handle intelligence quickly, with new lightweight and portable devices being used.


UNCOMPROMISED PORTABILITY Portable devices are the cornerstone of IoT but they are only as effective as their power supply. While mission-critical fixed installations are powered by generators, field devices require a reliable military battery that is capable of not just providing sufficient power discharge but also of doing it consistently. For example, a portable communication device needs a


battery capable of withstanding lengthy periods without charging. Not only that, but the battery must be securely fitted and able to operate correctly in spite of the environment or handling of the device. Only then will it be a reliable source of power. This is one of the core challenges faced by defence and


security batteries. While it might be relatively straightforward to find one suitable for powering devices, it’s significantly harder to find one that does so effectively. Batteries for field devices need a longer operating life with accurate fuel gauging to avoid unexpected depletions.


GREY MARKET BATTERIES Counterfeit, or grey market, batteries pose a tremendous threat to the electrical integrity of military devices, sacrificing quality for a lower price. This lower cost may sway some manufacturers, but these batteries are far from cost efficient. Aesthetically, the batteries may seem legitimate and no different to genuine products, but the internal components


6 /// EMC Testing Vol 2 No. 1


will be of inferior quality. This could be due to inadequate protection circuits leaving cells unstable and vulnerable to over-current, potentially culminating in the battery swelling or even explosion in rare circumstances.


MINIMISING INTERFERENCE In avoiding counterfeit batteries, defence businesses also minimise the risk of electromagnetic interference (EMI) in IoT networks. By cutting corners on circuit insulation, electrical isolation and impedance, as well as creepage and clearance distances, counterfeit batteries typically do not meet EMC regulatory standards. As a result, when these batteries are connected to chargers plugged into the mains power supply, they can introduce issues such as voltage fluctuations and radio frequency interference that can affect other telecommunications equipment on the network. Counteracting this with technology that provides additional filtering is a key first step, but further issues lie in the design of pre-engineered smart batteries themselves. For all the benefits they can provide, they do contain microprocessors which are a source for radio frequency interference (RFI). It’s for this reason that OEMs should consult specialists during the design stages, enabling them to provide a bespoke battery system that meets application requirements while also complying with the latest EMC regulations.


ALGORITHMIC SECURITY An innovation at battery supplier Accutronics is algorithmic security, in-built software that keeps devices safe from counterfeits. Algorithmic security uses a code that is unique to each


battery. The code is matched to a correlating code, which is programmed into host devices. This prevents fake batteries being used with the device without personnel being alerted, eliminating the risk of failure during operation.


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32