On Detecting Relay Attacks on RFID Systems Using Qubits

被引:1
|
作者
Abidin, Aysajan [1 ]
机构
[1] Imec COSIC KU Leuven, Kasteelpk Arenberg 10 Bus 2452, B-3001 Heverlee, Belgium
关键词
relay attack; distance bounding; RFID systems; quantum communication; quantum cryptography;
D O I
10.3390/cryptography4020014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As RFID technology is being widely used in access control systems to identify and track both objects and people, relay attacks on RFID systems continue to pose serious threats to security. To mitigate relay attacks, distance bounding protocols can be used. Until recently, all distance bounding protocols were based on classical cryptography and communication techniques. In this paper, we take a closer look at a recently proposed protocol by Jannati and Ardeshir-Larijani [Quantum Information Processing 2016, 18] to detect relay attacks using qubits. We first observe that the protocol has a weakness which allows an adversary to mount a successful attack on the protocol. We then propose a countermeasure to restore security and compare the fixed protocol with the state of the art.
引用
收藏
页码:1 / 12
页数:12
相关论文
共 50 条
  • [31] Deterministic Detection of Cloning Attacks for Anonymous RFID Systems
    Bu, Kai
    Xu, Mingjie
    Liu, Xuan
    Luo, Jiaqing
    Zhang, Shigeng
    Weng, Minyu
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2015, 11 (06) : 1255 - 1266
  • [32] Detecting Unknown Shilling Attacks in Recommendation Systems
    Singh, Pradeep Kumar
    Pramanik, Pijush Kanti Dutta
    Sinhababu, Nilanjan
    Choudhury, Prasenjit
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 137 (01) : 259 - 286
  • [33] Classification of major security attacks against RFID systems
    El Beqqal, Mohamed
    Azizi, Mostafa
    2017 INTERNATIONAL CONFERENCE ON WIRELESS TECHNOLOGIES, EMBEDDED AND INTELLIGENT SYSTEMS (WITS), 2017,
  • [34] DETECTING INTEGRITY ATTACKS ON INDUSTRIAL CONTROL SYSTEMS
    Arnold, Chad
    Butts, Jonathan
    Thirunarayan, Krishnaprasad
    CRITICAL INFRASTRUCTURE PROTECTION VIII, 2014, 441 : 3 - +
  • [35] Detecting Collaborative Insider Attacks in Information Systems
    Khanh Viet
    Panda, Brajendra
    Hu, Yi
    PROCEEDINGS 2012 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2012, : 502 - 507
  • [36] Detecting integrity attacks on industrial control systems
    Arnold, Chad
    Butts, Jonathan
    Thirunarayan, Krishnaprasad
    IFIP Advances in Information and Communication Technology, 2014, 441 : 3 - 13
  • [37] Detecting attacks in routers using sketches
    Barman, Dhiman
    Satapathy, Piyush
    Ciardo, Gianfranco
    2007 WORKSHOP ON HIGH PERFORMANCE SWITCHING AND ROUTING, 2007, : 179 - +
  • [38] A Security Protocol Resistant to Intermittent Position Trace Attacks and Desynchronization Attacks in RFID Systems
    Gao, Lijun
    Ma, Maode
    Shu, Yantai
    Wei, Yuhua
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 68 (04) : 1943 - 1959
  • [39] A Security Protocol Resistant to Intermittent Position Trace Attacks and Desynchronization Attacks in RFID Systems
    Lijun Gao
    Maode Ma
    Yantai Shu
    Yuhua Wei
    Wireless Personal Communications, 2013, 68 : 1943 - 1959
  • [40] Readout of quasiperiodic systems using qubits
    Saha, Madhumita
    Agarwalla, Bijay Kumar
    Venkatesh, B. Prasanna
    PHYSICAL REVIEW A, 2021, 103 (02)