🔐

Wireless Security Protocols

Jun 16, 2025

Overview

This lecture discusses wireless network security, focusing on authentication, encryption protocols (WEP, WPA, WPA2, WPA3), and methods for protecting network access in both personal and enterprise environments.

Wireless Network Security Challenges

  • Wireless signals are accessible to anyone nearby, increasing risk of eavesdropping.
  • Authentication is needed to allow only authorized users to connect.
  • Even with authentication, unencrypted data can be intercepted.

Encryption and Integrity

  • All wireless traffic should be encrypted to prevent unauthorized access.
  • Message Integrity Check (MIC) prevents malicious data modification during transmission.
  • Wireless protocol analyzers can capture unencrypted data easily.

Wireless Encryption Protocols

  • Early wireless networks used WEP (Wired Equivalent Privacy), which had major security flaws.
  • WPA (Wi-Fi Protected Access) introduced as a temporary solution, using TKIP (Temporal Key Integrity Protocol) to work with existing hardware.
  • WPA2 replaced WPA in 2004, offering stronger AES (Advanced Encryption Standard) encryption, often requiring new hardware.
  • WPA3, introduced in 2018, further strengthened AES encryption, improved initial key exchange, and enabled encryption even on open networks.

Wireless Network Configurations

  • Open system networks have no password and allow unrestricted access (e.g., coffee shops, hotels).
  • Personal/home networks usually use WPA2 or WPA3 with a shared password, known as a pre-shared key (PSK).
  • Enterprise settings use WPA2/WPA3 Enterprise (or 802.1x mode), requiring unique usernames and passwords for each user, authenticated via a central database.

Key Terms & Definitions

  • Authentication — Verifying if a user is allowed to access the network.
  • Encryption — Encoding data so only authorized parties can read it.
  • Message Integrity Check (MIC) — Confirms data has not been altered during transmission.
  • WEP — Early, insecure wireless encryption protocol.
  • WPA — Interim wireless security standard using TKIP.
  • WPA2 — Enhanced wireless encryption using AES.
  • WPA3 — Latest standard with improved encryption and security features.
  • Pre-shared Key (PSK) — A shared password used by all users on a network.
  • 802.1x — Authentication framework for individual user logins in enterprise networks.

Action Items / Next Steps

  • Review types of wireless network configurations and when to use each.
  • Confirm your own network uses WPA2 or WPA3 for security.
  • Read about the differences between WPA2 Personal and Enterprise modes.