On Detecting Relay Attacks on RFID Systems Using Qubits

被引:1
|
作者
Abidin, Aysajan [1 ]
机构
[1] Imec COSIC KU Leuven, Kasteelpk Arenberg 10 Bus 2452, B-3001 Heverlee, Belgium
关键词
relay attack; distance bounding; RFID systems; quantum communication; quantum cryptography;
D O I
10.3390/cryptography4020014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As RFID technology is being widely used in access control systems to identify and track both objects and people, relay attacks on RFID systems continue to pose serious threats to security. To mitigate relay attacks, distance bounding protocols can be used. Until recently, all distance bounding protocols were based on classical cryptography and communication techniques. In this paper, we take a closer look at a recently proposed protocol by Jannati and Ardeshir-Larijani [Quantum Information Processing 2016, 18] to detect relay attacks using qubits. We first observe that the protocol has a weakness which allows an adversary to mount a successful attack on the protocol. We then propose a countermeasure to restore security and compare the fixed protocol with the state of the art.
引用
收藏
页码:1 / 12
页数:12
相关论文
共 50 条
  • [1] Detecting relay attacks on RFID communication systems using quantum bits
    Hoda Jannati
    Ebrahim Ardeshir-Larijani
    Quantum Information Processing, 2016, 15 : 4759 - 4771
  • [2] Detecting Relay Attacks in RFID Systems Using Physical Layer Characteristics
    Tmar-Ben Hamida, S.
    Thevenon, P-H.
    Pierrot, J-B.
    Savry, O.
    Castelluccia, C.
    2013 6TH JOINT IFIP WIRELESS AND MOBILE NETWORKING CONFERENCE (WMNC 2013), 2013,
  • [3] Detecting relay attacks on RFID communication systems using quantum bits
    Jannati, Hoda
    Ardeshir-Larijani, Ebrahim
    QUANTUM INFORMATION PROCESSING, 2016, 15 (11) : 4759 - 4771
  • [4] Analysis of Relay Attacks on RFiD Systems
    Lima, J. A.
    Miri, A.
    Nevins, M.
    IEEE LATIN AMERICA TRANSACTIONS, 2012, 10 (01) : 1274 - 1282
  • [5] Research on Defense Technology of Relay Attacks in RFID systems
    Shen, Weiwei
    Xu, He
    Sun, Rui
    Wang, Ruchuan
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENT COMMUNICATION, 2015, 16 : 18 - 22
  • [6] Chaotic masking for securing RFID systems against relay attacks
    Malek, Behzad
    Miri, Ali
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1496 - 1508
  • [7] A lightweight RFID authentication protocol using qubits against relay attack
    Zhu, Hong Feng
    Wang, Rui
    Liu, Jun Lin
    Journal of Information Hiding and Multimedia Signal Processing, 2018, 9 (04): : 874 - 883
  • [8] Security Analysis of RFID Relay Attacks
    Guizani, Sghaier
    JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02): : 191 - 196
  • [9] Analysis of relay, terrorist fraud and distance fraud attacks on RFID systems
    Jannati, Hoda
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2015, 11 : 51 - 61
  • [10] A context-aware approach to defend against unauthorized reading and relay attacks in RFID systems
    Ma, Di
    Saxena, Nitesh
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2684 - 2695