Useful Links
Computer Science
Computer Networking
Wireless Communication
WiFi Technology
1. Introduction to Wireless Networking
2. Fundamentals of Radio Frequency (RF)
3. The IEEE 802.11 Standards
4. WiFi Network Architecture and Topologies
5. The WiFi Physical Layer (PHY)
6. The WiFi MAC Layer
7. WiFi Security
8. Advanced WiFi Technologies
9. Planning and Deploying a WLAN
10. WiFi Troubleshooting and Performance Optimization
WiFi Security
Security Threats and Vulnerabilities
Eavesdropping
Man-in-the-Middle Attacks
Denial of Service Attacks
Rogue Access Points
Evil Twin Attacks
Legacy Security Protocols (Deprecated)
Wired Equivalent Privacy (WEP)
RC4 Encryption
Initialization Vector Issues
Key Management Problems
Encryption Weaknesses
MAC Address Filtering
Implementation Methods
Security Limitations
Spoofing Vulnerabilities
SSID Hiding (Cloaking)
Implementation
Effectiveness and Drawbacks
Security Through Obscurity
Wi-Fi Protected Access (WPA)
Temporal Key Integrity Protocol (TKIP)
Key Mixing
Message Integrity Check
Improvements over WEP
Known Vulnerabilities
WPA Authentication
Pre-Shared Key Mode
Enterprise Mode
Wi-Fi Protected Access II (WPA2)
Advanced Encryption Standard (AES)
Block Cipher Operation
Key Sizes
Encryption Strength
Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP)
Encryption and Authentication
Integrity Protection
Replay Protection
WPA2 Authentication Modes
Personal Mode (PSK)
Enterprise Mode (802.1X)
Wi-Fi Protected Access 3 (WPA3)
Simultaneous Authentication of Equals (SAE)
Dragonfly Key Exchange
Forward Secrecy
Enhanced Authentication
Enhanced Open (Opportunistic Wireless Encryption)
Open Network Encryption
Individual Data Protection
Protected Management Frames (PMF)
Management Frame Protection
Mandatory Implementation
WPA3 Improvements
Stronger Encryption
Better Password Security
Simplified Configuration
Authentication Methods
Pre-Shared Key (PSK) / Personal Mode
Passphrase Configuration
Key Derivation
Use Cases and Limitations
Extensible Authentication Protocol (EAP) / Enterprise Mode
EAP Framework
EAP Methods
EAP-TLS
EAP-TTLS
EAP-PEAP
EAP-FAST
Certificate-Based Authentication
Username/Password Authentication
802.1X Port-Based Network Access Control
Supplicant Role
Authenticator Role
Authentication Server Role
Authentication Process Flow
RADIUS Server
Authentication, Authorization, Accounting
RADIUS Attributes
Role in Enterprise Authentication
Previous
6. The WiFi MAC Layer
Go to top
Next
8. Advanced WiFi Technologies