{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T02:49:03Z","timestamp":1760237343791,"version":"build-2065373602"},"reference-count":24,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2020,5,8]],"date-time":"2020-05-08T00:00:00Z","timestamp":1588896000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004497","name":"Onderzoeksraad, KU Leuven","doi-asserted-by":"publisher","award":["C16\/15\/058"],"award-info":[{"award-number":["C16\/15\/058"]}],"id":[{"id":"10.13039\/501100004497","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>As RFID technology is being widely used in access control systems to identify and track both objects and people, relay attacks on RFID systems continue to pose serious threats to security. To mitigate relay attacks, distance bounding protocols can be used. Until recently, all distance bounding protocols were based on classical cryptography and communication techniques. In this paper, we take a closer look at a recently proposed protocol by Jannati and Ardeshir-Larijani [Quantum Information Processing 2016, 18] to detect relay attacks using qubits. We first observe that the protocol has a weakness which allows an adversary to mount a successful attack on the protocol. We then propose a countermeasure to restore security and compare the fixed protocol with the state of the art.<\/jats:p>","DOI":"10.3390\/cryptography4020014","type":"journal-article","created":{"date-parts":[[2020,5,8]],"date-time":"2020-05-08T11:26:00Z","timestamp":1588937160000},"page":"14","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["On Detecting Relay Attacks on RFID Systems Using Qubits"],"prefix":"10.3390","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5128-3608","authenticated-orcid":false,"given":"Aysajan","family":"Abidin","sequence":"first","affiliation":[{"name":"imec-COSIC KU Leuven, Kasteelpark Arenberg 10-bus 2452, 3001 Heverlee, Belgium"}]}],"member":"1968","published-online":{"date-parts":[[2020,5,8]]},"reference":[{"key":"ref_1","unstructured":"Francillon, A., Danev, B., and Capkun, S. (2011, January 6\u20139). Relay attacks on passive keyless entry and start systems in modern cars. Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA."},{"key":"ref_2","unstructured":"Brands, S., and Chaum, D. (1993, January 23\u201327). Distance-Bounding Protocols (Extended Abstract). Proceedings of the Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway."},{"key":"ref_3","unstructured":"Hancke, G.P., and Kuhn, M.G. (2005, January 5\u20139). An RFID Distance Bounding Protocol. Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SECURECOMM \u201905, Athens, Greece."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Clulow, J., Hancke, G., Kuhn, M., and Moore, T. (2006, January 20\u201321). So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks. Proceedings of the 3rd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS \u201906), Hamburg, Germany.","DOI":"10.1007\/11964254_9"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Tippenhauer, N.O., and \u010capkun, S. (2009, January 21\u201323). ID-based Secure Distance Bounding and Localization. Proceedings of the 14th European Conference on Research in Computer Security, Saint-Malo, France.","DOI":"10.1007\/978-3-642-04444-1_38"},{"key":"ref_6","unstructured":"Rasmussen, K.B., and \u010capkun, S. (2010, January 11\u201313). Realization of RF Distance Bounding. Proceedings of the 19th USENIX Conference on Security, USENIX Security\u201910; USENIX, Washington, DC, USA."},{"key":"ref_7","unstructured":"Singelee, D., and Preneel, B. (2007, January 2\u20133). Distance Bounding in Noisy Environments. Proceedings of the European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS), Cambridge, UK."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"877","DOI":"10.1016\/j.jnca.2010.04.014","article-title":"Design of a secure distance-bounding channel for RFID","volume":"34","author":"Hancke","year":"2011","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1478","DOI":"10.1109\/LCOMM.2012.073112.121134","article-title":"Distance bounding with delayed responses","volume":"16","author":"Lee","year":"2012","journal-title":"IEEE Commun. Lett."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Foresti, S., Yung, M., and Martinelli, F. (2012, January 10\u201312). Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System. Proceedings of the Computer Security\u2014ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy.","DOI":"10.1007\/978-3-642-33167-1"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Rasmussen, K.B., Castelluccia, C., Heydt-Benjamin, T.S., and Capkun, S. (2009, January 9\u201313). Proximity-based Access Control for Implantable Medical Devices. Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS \u201909, Chicago IL, USA.","DOI":"10.1145\/1653662.1653712"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"5690","DOI":"10.1109\/TWC.2014.2323979","article-title":"Distance bounding facing both mafia and distance frauds","volume":"13","author":"Martin","year":"2014","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Ranganathan, A., Danev, B., and Capkun, S. (2015, January 5\u20139). Proximity Verification for Contactless Access Control and Authentication Systems. Proceedings of the 31st Annual Computer Security Applications Conference, ACSAC 2015, Los Angeles, CA, USA.","DOI":"10.1145\/2818000.2818004"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Tippenhauer, N.O., Luecken, H., Kuhn, M., and Capkun, S. (2015, January 22). UWB rapid-bit-exchange system for distance bounding. Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, New York, NY, USA.","DOI":"10.1145\/2766498.2766504"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Singh, M., Leu, P., and Capkun, S. (2019, January 24\u201327). UWB with Pulse Reordering: Securing Ranging against Relay and Physical Layer Attacks. Proceedings of the 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, CA, USA.","DOI":"10.14722\/ndss.2019.23109"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/978-3-319-62024-4_11","article-title":"Towards quantum distance bounding protocols","volume":"Volume 10155","author":"Abidin","year":"2016","journal-title":"Radio Frequency Identification and IoT Security"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Abidin, A. (2019, January 14\u201317). Quantum Distance Bounding. Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec \u201919, Miami Beach, FL, USA.","DOI":"10.1145\/3317549.3323414"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"4759","DOI":"10.1007\/s11128-016-1418-5","article-title":"Detecting relay attacks on RFID communication systems using quantum bits","volume":"15","author":"Jannati","year":"2016","journal-title":"Quantum Inf. Process."},{"key":"ref_19","unstructured":"Bennett, C.H., and Brassard, G. (1984, January 9\u201312). Quantum cryptography: Public key distribution and coin tossing. Proceedings of the IEEE International Conference on Computers Systems, and Signal Processing, Bangalore, India."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.jnca.2013.10.014","article-title":"An ultralightweight RFID authentication protocol with CRC and permutation","volume":"41","author":"Gao","year":"2014","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_21","unstructured":"Desmedt, Y. (1988, January 15\u201317). Major security problems with the \u201cUnforgble\u201d (Feige)-Fiat-Shamir proofs of identity and how to overcome them. Proceedings of the SecuriCom, France, Paris."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Cremers, C., Rasmussen, K., Schmidt, B., and Capkun, S. (2012, January 24\u201325). Distance Hijacking Attacks on Distance Bounding Protocols. Proceedings of the 2012 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.","DOI":"10.1109\/SP.2012.17"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1145\/3264628","article-title":"Security of distance-bounding: A survey","volume":"51","author":"Avoine","year":"2019","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"8795","DOI":"10.1038\/ncomms9795","article-title":"Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks","volume":"6","author":"Gehring","year":"2015","journal-title":"Nat. Commun."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/4\/2\/14\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T09:26:42Z","timestamp":1760174802000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/4\/2\/14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,8]]},"references-count":24,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2020,6]]}},"alternative-id":["cryptography4020014"],"URL":"https:\/\/doi.org\/10.3390\/cryptography4020014","relation":{},"ISSN":["2410-387X"],"issn-type":[{"type":"electronic","value":"2410-387X"}],"subject":[],"published":{"date-parts":[[2020,5,8]]}}}