• In the previous lesson, you learned that wireless security relies on three core principles: authentication, encryption, and integrity. These principles define what must be protected, but they do not explain how protection is implemented on a Wireless network.

    We will now look at the various wireless security protocols that implement these protections on Wi-Fi networks.
    They define how a wireless client authenticates, how data is protected, and how integrity is ensured.

    Open Authentication

    Open Authentication is the simplest possible authentication method.
    It provides no built-in security.

    As shown in Figure 2, the client sends an authentication request to the access point, and the access point accepts all authentication requests without verifying any credentials.

    Open authentication process in Wi-Fi network (CCNA)

    Figure 1 - Open authentication

    In this model:

    • No password is required

    • Any client can authenticate

    • The access point does not verify the identity of the client

    This type of authentication is commonly found in public Wi-Fi networks such as airports, cafés, or hotels.

    ⚠️ Important:
    Because Open Authentication does not verify client identity and provides no encryption or integrity protection, the wireless network itself is not secure.

    From Open Authentication to Shared Secrets

    Because Open Authentication provides no real security, additional mechanisms are required to protect wireless networks.

    At a high level, wireless authentication mechanisms can be grouped into two categories:

    • Open Authentication

    • Authentication based on a shared secret

    Wireless security protocols authentication diagram showing open networks and shared key methods including WEP, WPA, WPA2, and WPA3

    Figure 2 - Wireless authentication methods

    Figure 2 summarises this evolution, showing how wireless security protocols have changed over time.

    Answer the question below

    Shared Key–Based Security

    Shared key–based security requires the client and the access point to share a secret.
    This shared secret is used as the basis for authenticating clients and protecting wireless traffic.

    All major wireless security protocols rely on shared secrets in some form:

    • WEP

    • WPA

    • WPA2

    • WPA3

    Each new protocol improves how the shared secret is used, how encryption is performed, and how integrity is ensured.
    Let’s start with WEP, the first wireless security protocol to implement a shared secret.

    Answer the question below

    What is required by Shared Key Authentication to authenticate a wireless client?