802.11 Authentication and Association
802.11 Authentication and Association
11 Authentication
and Association
Mohit P. Tahiliani
Assistant Professor,
Dept. of Computer Science and Engineering,
NITK Surathkal
Overview
Wireless medium has its own share of security
concerns because the radio waves cannot be
confined within the premises, unlike the wired
medium whose access can be controlled.
➔ Authentication techniques
3
Image Credits: CWAP Official Study Guide
Subtype bits for Management frames
4
Image Credits: CWAP Official Study Guide
802.11 connection states
S1: Not
authenticated
or
associated
5
Types of 802.11 authentication
The main goal of 802.11 authentication is to verify that the requesting STA has
6
proper 802.11 capability to join the BSS
Key takeaway
These legacy authentication methods were not
so much an authentication of user identity, but
more of an authentication of device capability.
7
Open system authentication
8
Image Credits: https://mrncciew.com/
Shared key authentication
9
Image Credits: https://mrncciew.com/
Authentication frame format
10
Image Credits: CWAP Official Study Guide
Very Important!
802.11 authentication = techniques used with
Wired Equivalent Privacy (WEP)
S2: Authenticated
but not
yet
associated
12
Association request frame format
13
Image Credits: CWAP Official Study Guide
Image Credits: https://mrncciew.com/ 14
Association response frame format
15
Image Credits: CWAP Official Study Guide
802.11 connection states
S3: Authenticated
and
associated
16