On Detecting Relay Attacks on RFID Systems Using Qubits

被引:1
|
作者
Abidin, Aysajan [1 ]
机构
[1] Imec COSIC KU Leuven, Kasteelpk Arenberg 10 Bus 2452, B-3001 Heverlee, Belgium
关键词
relay attack; distance bounding; RFID systems; quantum communication; quantum cryptography;
D O I
10.3390/cryptography4020014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As RFID technology is being widely used in access control systems to identify and track both objects and people, relay attacks on RFID systems continue to pose serious threats to security. To mitigate relay attacks, distance bounding protocols can be used. Until recently, all distance bounding protocols were based on classical cryptography and communication techniques. In this paper, we take a closer look at a recently proposed protocol by Jannati and Ardeshir-Larijani [Quantum Information Processing 2016, 18] to detect relay attacks using qubits. We first observe that the protocol has a weakness which allows an adversary to mount a successful attack on the protocol. We then propose a countermeasure to restore security and compare the fixed protocol with the state of the art.
引用
收藏
页码:1 / 12
页数:12
相关论文
共 50 条
  • [21] Technique for preventing DoS attacks on RFID systems
    Faculty of Computer Science, Dalhousie University, Halifax, NS B3H 1W5, Canada
    SoftCOM - Int. Conf. Softw., Telecommun. Comput. Networks, (6-10):
  • [22] Detecting Integrity Attacks on Control Systems using a Moving Target Approach
    Weerakkody, Sean
    Sinopoli, Bruno
    2015 54TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2015, : 5820 - 5826
  • [23] Detecting Data Integrity Attacks on SCADA Systems Using Limited PMUs
    Pal, Seemita
    Sikdar, Biplab
    Chow, Joe
    2016 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2016,
  • [24] Detecting Integrity Attacks on Control Systems using Robust Physical Watermarking
    Weerakkody, Sean
    Mo, Yilin
    Sinopoli, Bruno
    2014 IEEE 53RD ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2014, : 3757 - 3764
  • [25] Detecting Data Injection Attacks in ROS Systems using Machine Learning
    Antunes, Rodrigo Abrantes
    Dalmazo, Bruno L.
    Drews-Jr, Paulo L. J.
    2022 LATIN AMERICAN ROBOTICS SYMPOSIUM (LARS), 2022 BRAZILIAN SYMPOSIUM ON ROBOTICS (SBR), AND 2022 WORKSHOP ON ROBOTICS IN EDUCATION (WRE), 2022, : 223 - 228
  • [26] Lightweight non-distance-bounding means to address RFID relay attacks
    Tu, Yuju
    Piramuthu, Selwyn
    DECISION SUPPORT SYSTEMS, 2017, 102 : 12 - 21
  • [27] Securing RFID Systems by Detecting Tag Cloning
    Lehtonen, Mikko
    Ostojic, Daniel
    Ilic, Alexander
    Michahelles, Florian
    PERVASIVE COMPUTING, PROCEEDINGS, 2009, 5538 : 291 - +
  • [28] Detecting Cyber Attacks in Industrial Control Systems Using Convolutional Neural Networks
    Kravchik, Moshe
    Shabtai, Asaf
    CPS-SPC'18: PROCEEDINGS OF THE 2018 WORKSHOP ON CYBER-PHYSICAL SYSTEMS SECURITY AND PRIVACY, 2018, : 72 - 83
  • [29] Investigating attacks to improve security and privacy in RFID systems using the security bit method
    Damghani, Hamidreza
    Hosseinian, Heliasadat
    Damghani, Leila
    2019 IEEE 5TH CONFERENCE ON KNOWLEDGE BASED ENGINEERING AND INNOVATION (KBEI 2019), 2019, : 833 - 838
  • [30] Detecting DoS attacks in mobile agent systems and using trust policies for their prevention
    Cubaleska, B
    Schneider, M
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IV, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS I, 2002, : 177 - 184