Shared-Key Authentication

In the realm of WLANs, the shared key is one of the more secure methods of authentication; it is based on a challenge-response protocol. The shared-key authentication requires WEP mechanisms and thus depends on a WEP infrastructure.

Note

Shared-key authentication is not a true authentication mechanism per se. Looking at the messages, it is a protocol that merely establishes proof that both parties share the same secret, but it does not prove or authenticate each party’s identity.

Protocol Choreography

Shared-key authentication requires a six-step process with four messages, as detailed in Figure 5-3.

Figure 5-3. Shared-Key Authentication

Step 1 is the authentication request to an AP, followed ...

Get Cisco Wireless LAN Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.