O'Reilly logo

Wireless Networks first-step by Jim Geier

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Authentication

The use of mutual authentication is important in a wireless network. This will guard against many security issues, such as man-in-the-middle attacks. With mutual authentication, the wireless client and the wireless network must prove their identity to each other. This process uses an authentication server, such as Remote Authentication Dial-In User Service (RADIUS), to perform the authentication. Figure 8-6 illustrates the process of authentication.

Figure 8-6. Authentication Verifies the Identity of Users and Client Devices Through Credentials, Such as Passwords and Digital Certificates

802.11 Authentication Vulnerabilities

WEP ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required