On Detecting Relay Attacks on RFID Systems Using Qubits

被引:1
|
作者
Abidin, Aysajan [1 ]
机构
[1] Imec COSIC KU Leuven, Kasteelpk Arenberg 10 Bus 2452, B-3001 Heverlee, Belgium
关键词
relay attack; distance bounding; RFID systems; quantum communication; quantum cryptography;
D O I
10.3390/cryptography4020014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As RFID technology is being widely used in access control systems to identify and track both objects and people, relay attacks on RFID systems continue to pose serious threats to security. To mitigate relay attacks, distance bounding protocols can be used. Until recently, all distance bounding protocols were based on classical cryptography and communication techniques. In this paper, we take a closer look at a recently proposed protocol by Jannati and Ardeshir-Larijani [Quantum Information Processing 2016, 18] to detect relay attacks using qubits. We first observe that the protocol has a weakness which allows an adversary to mount a successful attack on the protocol. We then propose a countermeasure to restore security and compare the fixed protocol with the state of the art.
引用
收藏
页码:1 / 12
页数:12
相关论文
共 50 条
  • [41] A protocol for detecting missing target tags in RFID systems
    Han, Wenyuan
    Liu, Weijiang
    Zhang, Kaiye
    Li, Zhiyang
    Liu, Zhaobin
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 132 (40-48) : 40 - 48
  • [42] A Probabilistic Approach for Detecting Blocking Attack in RFID Systems
    Vahedi, Ehsan
    Shah-Mansouri, Vahid
    Wong, Vincent W. S.
    Blake, Ian F.
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS - ICC 2010, 2010,
  • [43] Detecting Cyber Attacks in Industrial Control Systems Using Spatio-Temporal Autoencoder
    Lan, Bin
    Yu, Shunzheng
    2023 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, IJCNN, 2023,
  • [44] Time-based Countermeasures for Relay Attacks on PKES Systems
    Xie, Yifan
    Kim, Hyung June
    Chong, Sa Yong
    Song, Taek Lyul
    ICINCO: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON INFORMATICS IN CONTROL, AUTOMATION AND ROBOTICS, VOL 1, 2019, : 795 - 801
  • [45] False Relay Operation Attacks In Power Systems with High Renewables
    Jafari, Mohamadsaleh
    Shahriar, Md Hassan
    Rahman, Mohammad Ashiqur
    Paudyal, Sumit
    2021 IEEE POWER & ENERGY SOCIETY GENERAL MEETING (PESGM), 2021,
  • [46] Elliptic curve-based RFID/NFC authentication with temperature sensor input for relay attacks
    Urien, Pascal
    Piramuthu, Selwyn
    DECISION SUPPORT SYSTEMS, 2014, 59 : 28 - 36
  • [47] Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems
    Bu, Kai
    Liu, Xuan
    Luo, Jiaqing
    Xiao, Bin
    Wei, Guiyi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (03) : 429 - 439
  • [48] An Effective Intrusion Detection Approach for Jamming Attacks on RFID Systems
    Avanco, Leandro
    Guelfi, A. E.
    Pontes, Elvis
    Silva, A. A. A.
    Kofuji, S. T.
    Zhou, F.
    2015 INTERNATIONAL EURASIP WORKSHOP ON RFID TECHNOLOGY (EURFID), 2015, : 73 - 80
  • [49] A visual algebra for detecting port attacks on computer systems
    Vert, G
    Yuan, B
    Cole, N
    COMPUTER APPLICATIONS IN INDUSTRY AND ENGINEERING, 2003, : 131 - 135
  • [50] An efficient authentication protocol for RFID systems resistant to active attacks
    Peris-Lopez, Pedro
    Cesar Hernandez-Castro, Julio
    Estevez-Tapiador, Juan M.
    Ribagorda, Arturo
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4809 : 781 - 794