
1. Introduction
A large number of batteries from NEV start to reach the guarantee time and wait for recycling. But the series problem now is when you face a bunch of the retired battery, how could you judge if these battery are good enough for the next jobs? Though the batteries actually generate thousands of working data per day, the truth is that these data stored in different database which are totally isolated and barely interact with each other. How to connect these data and guarantee the authenticity of these data is a realistic topic.
This paper studies the data collection from the all kinds of sensor, data analysis from the analysis database, report generation from the battery information, and using MD5 to generate the abstract of the report and transfer it to the blockchain network for persistent recording, and the information stored in the blockchain system cannot be tampered. Finally, it is convenient for different parts to apply for access to relevant data and trace back the relevant responsibilities when the battery hit troubles. By setting up a reasonable incentive mechanism, the whole system can operate stably and independently, so that each part in the whole battery manufactory chain can focus more on the improvement and development of their own business, and at the same time, promote the stable and efficient operation of the whole system.
2. Test SOH of Lithium Ion Power Batter
2.1. Battery Healthy State Estimation
As we all know, after a long time work, the power battery system will continue to decay to the retired edge, so how to effectively evaluate the battery health is not only offer the important basis parameters for the calculation of SOC (state of charge), SOP (state of power) but at the same time to judge whether power battery system need to be changed. At the same time, different application scenarios have different requirements on the battery, and there are multiple parameters could affect the process of the attenuation (SOC interval, multiple rates, environmental temperature, etc.) (Figure 1) For example, EV models usually open the SOC interval of 20% to 100%, while PHEV models tend to open the SOC interval of a little bit, once they enter the low SOC interval, they will enter the CS mode [1] .
![]()
Figure 1. Different requirements of the power battery.
Therefore, in the process of the evaluation, it is necessary to evaluate the battery life according to the actual operating conditions, so that the battery system can meet the application requirements of the whole life cycle as much as possible, and only the test experiment design combined with the actual operating conditions can make the subsequent SOH estimation feasible.
However, the attenuation process of lithium battery is a typical nonlinear electrochemical system, and the chemical internal characteristic parameters are not easy to be measured, which lead to evaluate SOH inaccurately. So we should find another kind of the data which are easy to get to evaluate the SOH. Multiple researchers have found out that the estimation of SOH is usually analyzed from two different dimensions. The first dimension is based on the electrochemical mechanism, and the observation content is dominated by internal reaction mechanisms such as loss of active lithium ions and collapse of material lattice. The second dimension is the dimension based on the performance of battery external characteristics, which is dominated by the observation of external characteristic parameters such as current, voltage and temperature. Because the internal characteristics involved in the former are not easy to be measured, the BMS algorithm usually uses the second dimension to evaluate SOH [2] . This paper also mainly discusses the SOH estimation method based on external characteristics (Figure 2).
As consumers, our experience with batteries tends to be that the longer we use them, the worse battery power performance it would be. In general, power battery performance will continue to “degrade” along with “operation”. At the algorithm level, “run use” is generally broken down into calendar life and cycle life, while “performance fade” is broken down into “Capacity fade” and “DCR growth” [3] . Through a series of core tests, we try to find the relationship between the above factors.
2.2. Battery Attenuation Experiment
Figure 3 shows the schematic diagram of the whole experiment, we use the 80 v/60 Ah battery pack as the measured object.
We use Repower to charge and discharge the battery pack. All the experiment run under the 24˚C environment. We set different operation conditions to check out how those factor effect the health of battery.
2.3. Result Analysis of Battery Attenuation
After long-term test and experiments, it is generally believed that the charge-discharge ratio (C rate), discharge depth (DOD), and temperature (T) play a key role in the attenuation of battery performance. Therefore, current, monomer voltage, SOC, temperature and scheduling time are the most important input parameters in the cycle life model (Table 1).
The first experiment to check out the how temperature influence the attenuation of the battery. We put the battery in three different temperature 0˚C, 30˚C,
![]()
Figure 2. The basic external characteristics of battery model used.
![]()
Figure 3. Battery data collection system.
![]()
Table 1. How temperature affect the attenuation process.
60˚C respectively, and keep putting test battery in the cycle of charge, impedance and discharge until the battery decline by 30% from the original capacity. Figure 4 shows the results of the experiment.
![]()
Figure 4. Battery accelerated aging test under different temperature. (a) 70%DOD, 1C, 0˚C; (b) 70%DOD, 1C, 30˚C; (c) 70%DOD, 1C, 60˚C.
Analysis results show that under the same number of charge and discharge cycle, as the temperature rise, the batteries are more easily to get old. So we should pay special attention to the temperature factor when we evaluate the battery life decline (Table 2).
Table 2 is aimed to study on how DOD (depth of discharge) influences the process of the battery capacity decline. The average situation of the discharge is from 4.2 v to 2.7 v, for the purpose to get the different DOD, we should set the different stop voltage while discharging. We decide to set 5 layers, which are 3.45 v, 3.2 v, 3.05 v, 2.90 v, and 2.85 v separately, which are corresponding DOD are 50%, 60%, 70%, 80% and 90%. Through this experiment we could find out compared to temperature, if the battery capacity decline is more sensitive to the DOD.
Left result of Figure 5 shows the relation between battery capacity attenuation with cycles in different DOD. To more easy to compare, transfer the cycles to time. Through the experiment we could find that compared to the temperature, the battery capacity attenuation is lower sensitive to DOD.
3. Data Persistence with Blockchain
Blockchain technology is not only one technology, but the integration of multiple
![]()
Table 2. How DOD affect the attenuation process.
![]()
Figure 5. Battery accelerated aging test under different DOD. (a) Capacity decline under number; (b) Capacity decline under date.
technologies. As shown in Figure 6, the block chain can be divided into six layers compared with OSI protocol [4] [5] , which are data layer, network layer, consensus layer, incentive layer, contract layer and application layer.
3.1. Data Layer
The structure of blockchain contains the head and body, head store the special information include the Merkel root, the timestamp and nonce and difficult factor which generated by mining in Bitcoin. The most import information in the head is the hash number of self-block and the hash number of last-block, which make the all the blocks connect together like Figure 7 shows. The body records every single transaction data.
Rather than motivating by bookkeeping, we design the motivation and punishment by the battery health data. And in the block body we stored the every single battery heath data.
3.2. Network Layer
After all, blockchain technology runs on the Internet. Compared with the openness of Internet interaction, blockchain actually adds many rules to guarantee
the high coupling and tampering of valuable information. The network layer of blockchain contains P2P network, network transmission and network verification. For the network communication layer, the first thing to be recorded is valuable information sorted by time or by remuneration, which is also the information recorded by blockchain as a Shared ledger.
Though the network layer could guarantee all the information should be checked before record on blockchain, but considering the huge amount of the battery data, it’s not realistic to record all of the battery data. So we design the database architecture. Whether the power battery used for EV or building storage, the data should be transfer to the local database and generate a battery health state report termly and automatically based on agreement. The digest of these reports will be sent to the blockchain network, like Figure 8 shows. After applying for the access of these documents and getting the permission, the applicant could compare the documents with the digest stored in blockchain to check out if these information are the original one and have not be changed
3.3. Consensus Layer and Incentive Layer
These two layer always be put together is because to reach the consensus there must be the incentive or punishment. In bitcoin world, they use the POW (proof of work) consensus to reach the agreement, which means if someone did more jobs to push the whole book-keeping forward than he will get the reward. The amazing thing about the bitcoin is that each part of the bitcoin society member does the jobs for their owe benefits, than the whole bitcoin system stably works for ten years with no one claimed responsible for the bitcoin. So we can see that a well-designed consensus and incentive mechanism will promote the blockchain system functional efficiently and automatically. But as we all know the POW will cause a large amount of electricity waste. Using the blockchain to store the battery data is not necessary to use the public blockchain as the bitcoin or ethereum system. We could use Hyper-Ledger Fabric as a reference, which uses the quality of the battery data to offer the award or punishment.
3.4. Contract Layer
The symbol of blockchain 2.0 is the birth of the blockchain platform with the ability to write smart contract like ethereum. Smart contracts are programmatic environments with Turing complete logic [6] based on the blockchain network. Smart contract is aimed to perform the contract automatically based on certain triggering mechanism. In our batter health data sharing blockchain platform, a very useful application scenario is when members of this consortium proposed a new type of consensus mechanism, once the proposal agreed by certain number of the members, it will pass and deploy to the whole system automatically.
4. Identify Verification and Accessibility
4.1. Asymmetric Encryption
Data confidentiality is involved in many application scenarios of consortium chain, and many blockchain solutions are implemented through asymmetric encryption technology. The main application scenarios of asymmetric encryption are data encryption and digital signature. The advantage of asymmetric encryption over symmetric encryption is that it does not need to synchronize the decryption information, which avoids the interception of the key during transmission.
Asymmetric encryption is implemented by having two keys-public key and private key. Public key broadcast in the whole internet, everyone can get the public key information, but only the sender has the private key (Figure 9). So
![]()
Figure 9. Asymmetric encryption schematic diagram.
that all the people in the internet can use A’s public key to encrypt files, but only A can get the information to use the private key to decrypt the file. Or A encrypts the file by its private key. Any node in the network can use A’s public key and get the file information. At this point, it can be proved that the owner of the file is indeed A. This is the application scenario of asymmetric encryption used in encryption, decryption and digital signatures. Two typical application scenarios for asymmetric encryption are described below.
4.2. Message Digest
When applying for the battery sensitive information, we use asymmetric encryption as our signature certification. Assuming the battery manufacturer A signs the battery health report with its own private key and then transfer to the blockchain network, once this report is downloaded and decrypted by A’s public key. The truth of this report is totally guaranteed by A.
This model adopts RSA asymmetric encryption and adopts the lattice algorithm in [7] to design the protocol.
1) Generate the random matrix
, chose the safe integer
2) Generate public or private key: public key
,
are the Gauss parameters, private key is
3) Encryption algorithm:
are the error parameters.
4) Decryption algorithm:
Determine 0 or 1 based on the distance from 0
5) Re-encryption algorithm to generate the private key:
X is the random matrix, E is the noise.
6) Re-encryption algorithm:
are the error parameters
Figure 10 shows the three steps the battery health information be recorded on the blockchain. First step, generate the report in the local database termly and automatically based on agreement. Step two, using MD5 (message digest 5) [8] toolkit to generate the digest. Sept three, put the digest to the blockchain system.
4.3. Accessibility and Verification
In our system, the valued information stored in the blockchain network is just the message digest, which is not what we want. Figure 11 shows the process of the accessibility and verification when applying for battery data stored in different local database.
![]()
Figure 10. Recording on blockchain with report digest.
![]()
Figure 11. Process of the accessibility and verification.
The blockchain network here guaranteed the battery data required from other database is really the original one. Once the data changed, the verification process will detect and alert.
5. Conclusions
Battery capacity will keep declining along with working. If we could use the battery data generated in the daily working, we could evaluate the batter health condition accurately. But how could we get access to the data? How could we guarantee whether the data are safe and not be changed? We try to create a system to solve this problem.
First we do the experiment to put the battery in all kinds of different situation to find out how the environment factors work on the battery attenuation. The data shows that the temperature has more effects on the battery attenuation than DOD and C rate. So when we design the report we should pay more attention on the temperature factor than others.
Then we design the blockchain network which is more like a consortium blockchain. This blockchain offers a reliable channel for members in the battery data sharing chain platform. All the members should upload the battery data on the blockchain with their signature, and the regulation of the data is made by more than half of the members. After get the permission and download the data from other database, the blockchain network will verify the whether the report is fake one. With the appropriate Consensus and incentive mechanism, the whole system will work stably and automatically.
This article proposes a combination of IOT (internet of things) and blockchain network. The battery data are stored in our blockchian system. Compared to the central database, the distributed database with blockchain technology will make the information more open and transparent and create a trustful environment to transfer data.
Acknowledgements
First and foremost, I would like to show my deepest gratitude to my supervisor, Dr. Yan Xiao, a respectable, responsible and resourceful scholar, who has provided me with valuable guidance in every stage of the writing of this thesis. Without his enlightening instruction, impressive kindness and patience, Icould not have completed my thesis. His keen and vigorous academic observation enlightens me not only in this thesis but also in my future study. I would also like to thank all my teachers who have helped me to develop the fundamental and essential academic competence. My sincere appreciation also goes to the teachers and students from Shanghai University of Engineering and Technology who participated this study with great cooperation. Last but not least, I would like to thank all my friends, especially my three lovely roommates, for their encouragement and support.