🔐

Wireless Security Protocols

Sep 2, 2025

Overview

This lecture explains how wireless networks protect private information using authentication, encryption, and integrity checks, and describes the evolution of wireless security protocols.

Wireless Network Security Concerns

  • Wireless networks transmit private and sensitive data that can be intercepted by nearby devices.
  • Security is needed to prevent unauthorized access and eavesdropping on these networks.

Authentication Methods

  • User access is restricted using authentication such as usernames, passwords, or multi-factor authentication.

Confidentiality and Integrity

  • Encryption provides confidentiality to protect data sent over wireless networks.
  • Message Integrity Checks verify that received data matches what was originally sent.

Evolution of Wireless Encryption Protocols

  • WEP (Wired Equivalent Privacy) was the first wireless encryption type, but it had major vulnerabilities.
  • WPA (Wi-Fi Protected Access) replaced WEP as a temporary, more secure option, compatible with existing hardware.
  • WPA2 (introduced 2004) offers enhanced security with CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) using AES for encryption and CBC-MAC for integrity.
  • WPA3 (introduced 2018) further improves security using GCMP (Galois/Counter Mode Protocol) and GMAC (Galois Message Authentication Code) for integrity, both utilizing AES.

Recommendations for Wireless Security

  • Always use the most secure protocol your devices can support.
  • Upgrade devices and access points to utilize the highest available security standards.

Key Terms & Definitions

  • Authentication — process of verifying user identity before granting network access.
  • Encryption — process of encoding information to protect its confidentiality.
  • Message Integrity Check — ensures received information is unchanged from when it was sent.
  • WEP — Wired Equivalent Privacy; an early, insecure wireless encryption standard.
  • WPA — Wi-Fi Protected Access; a more secure replacement for WEP.
  • WPA2 — Second version of WPA, employing AES and CCMP for security.
  • WPA3 — Third version of WPA, enhancing security with GCMP and GMAC.
  • AES — Advanced Encryption Standard; a strong encryption method.
  • CCMP — Counter with Cipher Block Chaining Message Authentication Code Protocol; combines encryption and integrity.
  • GCMP — Galois/Counter Mode Protocol; advanced encryption and integrity method.
  • GMAC — Galois Message Authentication Code; integrity check used in WPA3.

Action Items / Next Steps

  • Check and upgrade your wireless network devices to support the latest security protocol available.