An Active Attack on Token-Based Security Protocol

Research output: Contribution to journalArticle

Abstract

In this paper, we analyzed the token-based security protocol [1] using the GNY logic to determine the security flaws of the protocol. We found out that the token-based protocol has two security flaws. The first one leads to an active attack which enables the intruder to get sensitive information whereas the second may result in gumming up the network and thus reducing the efficiency of its operation. Therefore, this protocol can not be approved for authentication. We conclude our paper by proposing a modification to the token-based protocol that overcomes these attacks.
Original languageEnglish
Pages (from-to)365-374
Number of pages10
JournalJournal of Engineering and Applied Science, Cairo University
Volume48
Issue number2
Publication statusPublished - Apr 2001

Fingerprint Dive into the research topics of 'An Active Attack on Token-Based Security Protocol'. Together they form a unique fingerprint.

  • Cite this