Tunable Asymmetric Delay Attack in Quantum Clock Synchronization
- URL: http://arxiv.org/abs/2510.21101v1
- Date: Fri, 24 Oct 2025 02:30:01 GMT
- Title: Tunable Asymmetric Delay Attack in Quantum Clock Synchronization
- Authors: Hui Han, Haotian Teng, Hailong Xu, Jinquan Huang, Yuanmei Xie, Yichen Zhang, Bo Liu, Wanrong Yu, Baokang Zhao, Shuhui Chen,
- Abstract summary: Current attack strategies rely on static delays, limiting their ability to target application-specific stability requirements.<n>We propose a tunable asymmetric delay attack (T-ADA) that dynamically controls delay parameters to induce manipulate synchronization accuracy.
- Score: 6.742670890660517
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Quantum clock synchronization underpins modern secure communications and critical infrastructure, yet its fundamental dependence on channel reciprocity introduces an exploitable vulnerability to asymmetric delay attacks. Current attack strategies rely on static delays, limiting their ability to target application-specific stability requirements. Here, we propose a tunable asymmetric delay attack (T-ADA) that dynamically controls delay parameters to induce manipulate synchronization accuracy. Through experimental implementation, we demonstrate how tailored attack trajectories can selectively compromise system stability across different scenarios. This work uncovers key vulnerabilities in synchronization protocols under customizable attacks and provide a foundation for developing secure and resilient quantum clock synchronization systems.
Related papers
- AsyncVLA: An Asynchronous VLA for Fast and Robust Navigation on the Edge [49.66156306240961]
High latency breaks the control loop, rendering powerful models unsafe for real-time deployment.<n>We propose AsyncVLA, an asynchronous control framework that decouples semantic reasoning from reactive execution.<n>AsyncVLA achieves a 40% higher success rate than state-of-the-art baselines.
arXiv Detail & Related papers (2026-02-13T21:31:19Z) - Multi-Agent-Driven Cognitive Secure Communications in Satellite-Terrestrial Networks [58.70163955407538]
Malicious eavesdroppers pose a serious threat to private information via satellite-terrestrial networks (STNs)<n>We propose a cognitive secure communication framework driven by multiple agents that coordinates spectrum scheduling and protection through real-time sensing.<n>We exploit generative adversarial networks to produce adversarial matrices, and employ learning-aided power control to set real and adversarial signal powers for protection layer.
arXiv Detail & Related papers (2026-01-06T10:30:41Z) - A New Quantum Secure Time Transfer System [3.9556117884773]
High-precision clock synchronization is essential for a wide range of network-distributed applications.<n>Current synchronization techniques are vulnerable to attacks, such as intercept-resend attacks, spoofing, and delay attacks.<n>We propose and experimentally demonstrate a new quantum secure time transfer system, subsequently used for clock synchronization.
arXiv Detail & Related papers (2025-11-13T23:15:04Z) - Asynchronous Risk-Aware Multi-Agent Packet Routing for Ultra-Dense LEO Satellite Networks [45.84384086201993]
The rise of ultra-dense LEO constellations creates a complex and asynchronous network environment, driven by their massive scale, dynamic topologies, and significant delays.<n>This unique complexity demands an adaptive packet routing algorithm that is asynchronous, risk-aware, and capable of balancing diverse and often conflicting objectives in a decentralized manner.<n>We introduce PRIMAL, an event-driven multi-agent routing framework designed specifically to allow each satellite to act independently on its own event-driven timeline.
arXiv Detail & Related papers (2025-10-31T14:29:08Z) - Pulse-to-Circuit Characterization of Stealthy Crosstalk Attack on Multi-Tenant Superconducting Quantum Hardware [0.14323566945483496]
Hardware crosstalk in superconducting quantum computers constitutes a significant security threat.<n>We present the first end-to-end framework for mapping physical pulse-level attacks to interpretable logical error channels.<n>We propose a protocol-level detection strategy based on observable attack signatures, showing that stealthy attacks can be exposed through targeted monitoring.
arXiv Detail & Related papers (2025-09-14T19:48:46Z) - Adaptive Reinforcement Learning for Unobservable Random Delays [46.04329493317009]
We introduce a general framework that enables agents to adaptively handle unobservable and time-varying delays.<n>Specifically, the agent generates a matrix of possible future actions to handle both unpredictable delays and lost action packets sent over networks.<n>Our method significantly outperforms state-of-the-art approaches across a wide range of benchmark environments.
arXiv Detail & Related papers (2025-06-17T11:11:37Z) - DRIFT: Dynamic Rule-Based Defense with Injection Isolation for Securing LLM Agents [52.92354372596197]
Large Language Models (LLMs) are increasingly central to agentic systems due to their strong reasoning and planning capabilities.<n>This interaction also introduces the risk of prompt injection attacks, where malicious inputs from external sources can mislead the agent's behavior.<n>We propose a Dynamic Rule-based Isolation Framework for Trustworthy agentic systems, which enforces both control and data-level constraints.
arXiv Detail & Related papers (2025-06-13T05:01:09Z) - Clock Synchronization for Drone-Based Entanglement Quantum Key Distribution [12.241567591136695]
Drone-based entanglement distribution provides full coverage for quantum networks, enabling quantum key distribution (QKD) in dynamic environments.<n>Our protocol enables drone-based entanglement distribution, paving the way for seamless precision of wide-area and local-area quantum internet.
arXiv Detail & Related papers (2025-06-09T14:54:12Z) - Transaction Capacity, Security and Latency in Blockchains [45.776687601070705]
We analyze how secure a block is after the block becomes $k$-deep, i.e., security-latency, for Nakamoto consensus.<n>We connect the security-latency analysis to sustainable transaction rate of the queue system.
arXiv Detail & Related papers (2024-02-15T17:43:13Z) - PTPsec: Securing the Precision Time Protocol Against Time Delay Attacks Using Cyclic Path Asymmetry Analysis [1.765099515298011]
Precision Time Protocol (PTP) can accomplish high-precision time synchronization in trusted environments.
Time delay attacks pose the highest threat to the protocol, enabling attackers to diverge targeted clocks undetected.
This work proposes an approach to detect and counteract delay attacks against PTP based on cyclic path asymmetry measurements.
arXiv Detail & Related papers (2024-01-19T12:35:00Z) - Fast and Robust Early-Exiting Framework for Autoregressive Language
Models with Synchronized Parallel Decoding [43.659680579686544]
We propose a Fast and Robust Early-Exiting framework, which incorporates a shallow-deep module and a synchronized parallel decoding.
Our framework enables faster inference by synchronizing the decoding process of the current token with previously stacked early-exited tokens.
As parallel decoding allows us to observe predictions from both shallow and deep models, we present a novel adaptive threshold estimator.
arXiv Detail & Related papers (2023-10-09T05:53:05Z) - Irregular Traffic Time Series Forecasting Based on Asynchronous Spatio-Temporal Graph Convolutional Network [46.409567044630116]
We propose an Asynchronous Spatio-tEmporal graph convolutional nEtwoRk (ASeer) tailored for irregular traffic time series forecasting.
We first propose an Asynchronous Graph Diffusion Network to capture the spatial dependency between asynchronously measured traffic states regulated by adaptive traffic signals.
Then, we propose a Transformable Time-aware Convolution Network, which adapts meta-filters for time-aware convolution on the sequences with inconsistent temporal flow.
arXiv Detail & Related papers (2023-08-31T15:49:21Z) - Time synchronization protocol for the KLJN secure key exchange scheme [0.0]
The information theoretically secure Kirchhoff-law-Johnson-noise (KLJN) key exchange scheme is also potentially vulnerable against clock attacks.
We propose and explore various ways of clock synchronization for the KLJN system and propose an ultimate protocol that preserves time and hardware integrity under arbitrary attacks.
arXiv Detail & Related papers (2022-07-04T00:33:07Z) - Secure two-way fiber-optic time transfer against sub-ns asymmetric delay
attack [20.00845773010957]
asymmetric delay attack is a serious threat which cannot be prevent by any encryption method.
Two-way fiber-optic time transfer system with time stability with 24.5ps, 3.98ps, and 2.95ps at 1s, 10s, and 100s averaging time is shown experimentally.
arXiv Detail & Related papers (2022-03-08T01:55:59Z) - Stability and Identification of Random Asynchronous Linear
Time-Invariant Systems [81.02274958043883]
We show the additional benefits of randomization and asynchrony on the stability of linear dynamical systems.
For unknown randomized LTI systems, we propose a systematic identification method to recover the underlying dynamics.
arXiv Detail & Related papers (2020-12-08T02:00:04Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.