There are two authentication methods in the 802.11 standard:
The shared-key authentication process is a four-step process that begins when the AP receives the validated request for association. After the AP receives the request, a series of management frames are transmitted between the stations to produce the authentication. This includes the use of the cryptographic mechanisms employed by WEP as a validation and break down in the following manner:
- The requestor (the client) sends a request for association.
- The authenticator (the AP) receives the request, and responds by producing a random challenge text and transmitting it back to the requestor.
- The requestor receives the transmission, encrypts the challenge ...