2016
DOI: 10.1007/s11128-016-1418-5
|View full text |Cite
|
Sign up to set email alerts
|

Detecting relay attacks on RFID communication systems using quantum bits

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(11 citation statements)
references
References 19 publications
0
11
0
Order By: Relevance
“…All DB protocols; according to them; are based on traditional crypto-graphical techniques. They found a weakness on the protocol of Jannati & Ardeshir-Larijani (2016) . In this loophole, attacker with Quantum Memory can easily mount a relay attack.…”
Section: Distance Bounding Protocols In Literaturementioning
confidence: 99%
“…All DB protocols; according to them; are based on traditional crypto-graphical techniques. They found a weakness on the protocol of Jannati & Ardeshir-Larijani (2016) . In this loophole, attacker with Quantum Memory can easily mount a relay attack.…”
Section: Distance Bounding Protocols In Literaturementioning
confidence: 99%
“…This is the basic principle behind many quantum cryptographic protocols, most notably, the Quantum Key Distribution (QKD) protocol by Bennet and Brassard [19]. The authors of [18] also use this principle to replace the distance-bounding phases of a DB protocol with a qubit transmission phase, as we shall see in the next section.…”
Section: Qubitsmentioning
confidence: 99%
“…In this section we first take a closer look at the protocol for relay attack detection, namely, the RAD protocol, using qubits proposed in [18]. We then observe its weaknesses and show that it is still vulnerable to relay attacks.…”
Section: Rad Protocol and Its Weaknessesmentioning
confidence: 99%
See 2 more Smart Citations