Authentication
There are two authentication methods in the 802.11 standard:
Crunch Time
The shared-key authentication process is a four-step process that begins when the AP receives the validated request for association. After the AP receives the request, a series of management frames are transmitted between the stations to produce the authentication. This includes the use of the cryptographic mechanisms employed by WEP as a validation and break down in the following manner:
- The requestor (the client) sends a request for association.
- The authenticator (the AP) receives the request, and responds by producing a random challenge text and transmitting it back to the requestor.
- The requestor receives the transmission, encrypts the challenge ...
Get Eleventh Hour Security+ now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.