Watchdog Detector
A watchdog detector monitors incoming light in quantum communication systems, serving as a multifunctional tool for security and signal integrity.
Literature
[BSI2023] | BSI. "Implementation Attacks against QKD Systems". (2023) https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/QKD-Systems/QKD-Systems.pdf. |
[Sajeed2015] | S. Sajeed, I. Radchenko, S. Kaiser, J. Bourgoin, A. Pappa, L. Monat, M. Legr, and V. Makarov. "Attacks exploiting deviation of mean photon number in quantum key distribution and coin tossing" In: Phys. Rev. A 91, 032326. (2015) 10.1103/PhysRevA.91.03232. |
Technique → Countermeasures
List of techniques where this countermeasure can be applied.
Items: 15
Description | Technique |
---|---|
Monitoring of incoming pulses at the transmitter party. |
Quantum Trojan-Horse Attack (THA) |
Employing a watchdog monitor can be beneficial, but it can also be attacked—damaged [Huang2019] or blinded [Lovic2023]. |
Laser Seeding Attack (LSA) |
Use of watchdog monitoring. |
Frequency-Shift Attack |
Employment of watchdog monitoring. |
Wavelength Manipulation Attack in Free-Space |
Use of watchdog monitor. |
Partially-Random-Phase Attack |
Use of watchdog detector. Especially, the monitoring of the first-order moments (mean values) can be effective. |
Saturation Attack |
Using spectral monitoring at the receiver. Bob should randomly perform monitoring with and without a wavelength filter [Huang2013]. |
Wavelength-Dependent Beamsplitter Attack on CV-QKD |
Use of watchdog detector. |
CV Detector-Control Attack |
Employment of watchdog monitoring. |
Laser Seeding Attack on Two-Way Scheme |
Employment of watchdog monitoring. |
Injection-Locking Attack (ILA) |
Using spectral monitoring at the receiver. Note that the idea is that the light of the operating wavelength is used for the quantum state decoding. The light of non-operating wavelength is separated and measured by a monitoring detector. [Li2022] |
Wavelength-Dependent Beamsplitter Attack |
Using watchdog detectors |
Phase-Remapping Attack |
Employment of watchdog monitoring, especially on the transmitter side. |
Laser Damage Attack on Quantum Communication Systems |
Employment of watchdog monitoring. |
Illuminating and Faked States Attack on SNSPDs |
The watchdog at the receiver side can take a certain fraction of the incoming signal to monitor it. |
Blinding Attack with Faked States |