In this paper, we analyzed the token-based security protocol  using the GNY logic to determine the security flaws of the protocol. We found out that the token-based protocol has two security flaws. The first one leads to an active attack which enables the intruder to get sensitive information whereas the second may result in gumming up the network and thus reducing the efficiency of its operation. Therefore, this protocol can not be approved for authentication. We conclude our paper by proposing a modification to the token-based protocol that overcomes these attacks.
|Number of pages||10|
|Journal||Journal of Engineering and Applied Science, Cairo University|
|Publication status||Published - Apr 2001|