Watchdog Detector

A watchdog detector monitors incoming light in quantum communication systems, serving as a multifunctional tool for security and signal integrity.


Literature

[BSI2023] BSI. "Implementation Attacks against QKD Systems". (2023) https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/QKD-Systems/QKD-Systems.pdf.
[Sajeed2015] S. Sajeed, I. Radchenko, S. Kaiser, J. Bourgoin, A. Pappa, L. Monat, M. Legr, and V. Makarov. "Attacks exploiting deviation of mean photon number in quantum key distribution and coin tossing" In: Phys. Rev. A 91, 032326. (2015) 10.1103/PhysRevA.91.03232.

QID: CM-0011
Tier: T0
Type: Quantum
Tactic: Detect
Created: 2024-03-02
Updated: 2024-05-08

Technique → Countermeasures

List of techniques where this countermeasure can be applied.

Items: 15
Description Technique

Monitoring of incoming pulses at the transmitter party.

Quantum Trojan-Horse Attack (THA)

Employing a watchdog monitor can be beneficial, but it can also be attacked—damaged [Huang2019] or blinded [Lovic2023].

Laser Seeding Attack (LSA)

Use of watchdog monitoring.

Frequency-Shift Attack

Employment of watchdog monitoring.

Wavelength Manipulation Attack in Free-Space

Use of watchdog monitor.

Partially-Random-Phase Attack

Use of watchdog detector. Especially, the monitoring of the first-order moments (mean values) can be effective.

Saturation Attack

Using spectral monitoring at the receiver. Bob should randomly perform monitoring with and without a wavelength filter [Huang2013].

Wavelength-Dependent Beamsplitter Attack on CV-QKD

Use of watchdog detector.

CV Detector-Control Attack

Employment of watchdog monitoring.

Laser Seeding Attack on Two-Way Scheme

Employment of watchdog monitoring.

Injection-Locking Attack (ILA)

Using spectral monitoring at the receiver. Note that the idea is that the light of the operating wavelength is used for the quantum state decoding. The light of non-operating wavelength is separated and measured by a monitoring detector. [Li2022]

Wavelength-Dependent Beamsplitter Attack

Using watchdog detectors

Phase-Remapping Attack

Employment of watchdog monitoring, especially on the transmitter side.

Laser Damage Attack on Quantum Communication Systems

Employment of watchdog monitoring.

Illuminating and Faked States Attack on SNSPDs

The watchdog at the receiver side can take a certain fraction of the incoming signal to monitor it.

Blinding Attack with Faked States