Abstract :
Recent thinking has uncovered certain weak points in the authentication protocol of the internet access control security scheme proposed by Poon and Iqbal (see ibid., vol.25, no.25, p.1742-4, 1989). These would enable malicious attacks to disrupt legitimate remote connection requests. The authors describe modifications made to prevent such attacks.