On Detecting Relay Attacks on RFID Systems Using Qubits

As RFID technology is being widely used in access control systems to identify and track both objects and people, relay attacks on RFID systems continue to pose serious threats to security. To mitigate relay attacks, distance bounding protocols can be used. Until recently, all distance bounding proto...

Full description

Bibliographic Details
Main Author: Aysajan Abidin
Format: Article
Language:English
Published: MDPI AG 2020-05-01
Series:Cryptography
Subjects:
Online Access:https://www.mdpi.com/2410-387X/4/2/14
_version_ 1797568567096377344
author Aysajan Abidin
author_facet Aysajan Abidin
author_sort Aysajan Abidin
collection DOAJ
description As RFID technology is being widely used in access control systems to identify and track both objects and people, relay attacks on RFID systems continue to pose serious threats to security. To mitigate relay attacks, distance bounding protocols can be used. Until recently, all distance bounding protocols were based on classical cryptography and communication techniques. In this paper, we take a closer look at a recently proposed protocol by Jannati and Ardeshir-Larijani [Quantum Information Processing 2016, 18] to detect relay attacks using qubits. We first observe that the protocol has a weakness which allows an adversary to mount a successful attack on the protocol. We then propose a countermeasure to restore security and compare the fixed protocol with the state of the art.
first_indexed 2024-03-10T19:58:45Z
format Article
id doaj.art-c5bde7c9af4f484395a121cb48d5ab19
institution Directory Open Access Journal
issn 2410-387X
language English
last_indexed 2024-03-10T19:58:45Z
publishDate 2020-05-01
publisher MDPI AG
record_format Article
series Cryptography
spelling doaj.art-c5bde7c9af4f484395a121cb48d5ab192023-11-19T23:46:55ZengMDPI AGCryptography2410-387X2020-05-01421410.3390/cryptography4020014On Detecting Relay Attacks on RFID Systems Using QubitsAysajan Abidin0imec-COSIC KU Leuven, Kasteelpark Arenberg 10-bus 2452, 3001 Heverlee, BelgiumAs RFID technology is being widely used in access control systems to identify and track both objects and people, relay attacks on RFID systems continue to pose serious threats to security. To mitigate relay attacks, distance bounding protocols can be used. Until recently, all distance bounding protocols were based on classical cryptography and communication techniques. In this paper, we take a closer look at a recently proposed protocol by Jannati and Ardeshir-Larijani [Quantum Information Processing 2016, 18] to detect relay attacks using qubits. We first observe that the protocol has a weakness which allows an adversary to mount a successful attack on the protocol. We then propose a countermeasure to restore security and compare the fixed protocol with the state of the art.https://www.mdpi.com/2410-387X/4/2/14relay attackdistance boundingRFID systemsquantum communicationquantum cryptography
spellingShingle Aysajan Abidin
On Detecting Relay Attacks on RFID Systems Using Qubits
Cryptography
relay attack
distance bounding
RFID systems
quantum communication
quantum cryptography
title On Detecting Relay Attacks on RFID Systems Using Qubits
title_full On Detecting Relay Attacks on RFID Systems Using Qubits
title_fullStr On Detecting Relay Attacks on RFID Systems Using Qubits
title_full_unstemmed On Detecting Relay Attacks on RFID Systems Using Qubits
title_short On Detecting Relay Attacks on RFID Systems Using Qubits
title_sort on detecting relay attacks on rfid systems using qubits
topic relay attack
distance bounding
RFID systems
quantum communication
quantum cryptography
url https://www.mdpi.com/2410-387X/4/2/14
work_keys_str_mv AT aysajanabidin ondetectingrelayattacksonrfidsystemsusingqubits