🔐

Wireless Security Evolution

Jun 12, 2025

Overview

This lecture discusses wireless network security, focusing on authentication, encryption, integrity checks, and the evolution of wireless encryption standards (WEP, WPA, WPA2, WPA3).

Wireless Network Security Concerns

  • Wireless networks transmit private and sensitive information that can be intercepted by nearby devices.
  • Security measures are essential to prevent unauthorized access and data breaches.

Authentication Methods

  • Restricting network access is commonly achieved through authentication, such as usernames, passwords, or multi-factor authentication.

Data Protection: Confidentiality and Integrity

  • Encryption ensures confidentiality so data sent over wireless networks can't be easily read if intercepted.
  • Message integrity checks verify that received data has not been altered during transmission.

Evolution of Wireless Encryption Standards

  • WEP (Wired Equivalent Privacy): First wireless encryption method, but found to have severe cryptographic flaws.
  • WPA (Wi-Fi Protected Access): Introduced as a temporary fix to replace WEP, compatible with existing hardware.
  • WPA2 (Wi-Fi Protected Access Version 2): Launched in 2004 with stronger security, commonly using CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol).
  • WPA3: Introduced in 2018, uses GCMP (Galois Counter Mode Protocol) for improved encryption and integrity; continues to use AES and adds GMAC for message authentication.

Best Practices

  • Use the highest available security standard (preferably WPA3) on all wireless network devices.
  • Upgrade access points and client devices to support the most secure methods.

Key Terms & Definitions

  • Encryption — The process of encoding data to keep it confidential from unauthorized parties.
  • Authentication — Verifying the identity of users before granting network access.
  • Message Integrity Check — A method to confirm data has not been tampered with in transit.
  • WEP — Wired Equivalent Privacy, a now-obsolete wireless encryption protocol.
  • WPA/WPA2/WPA3 — Successive generations of Wi-Fi Protected Access protocols that secure wireless communications.
  • AES — Advanced Encryption Standard, a strong encryption algorithm used in WPA2/WPA3.
  • CCMP — Counter Mode with Cipher Block Chaining Message Authentication Code Protocol, combines encryption and integrity.
  • GCMP — Galois Counter Mode Protocol, an advanced encryption and integrity protocol used in WPA3.

Action Items / Next Steps

  • Review current wireless devices and upgrade to WPA3 where possible.
  • Ensure all wireless communications use the most secure settings available.