WiFi Security
With a wireless network the arriving mobile must:
- Associate with the access point.
- Authenticate to the network.
802.11 Authentication & Encryption
- Discovery of Security Capabilities:
- AP advertises its presence, forms of authentication and encryption provided.
- Device requests specific forms of authentication and encryption desired.
Although the device and AP are already exchanging messages the device is not yet authenticated and does not have encryption keys.
- Mutual Authentication & Shared Symmetric Key Derivation:
- AS and the mobile already have a shared common secret (the password).
- AS and the mobile use the shared secret, nonces (to prevent replay attacks) and cryptographic hashing (to ensure message integrity) to authenticate each other.
- AS and the mobile derive a symmetric session key.
AS is the authentication server (could be combined into the AP).
- Shared Symmetric Session Key Distribution (for AES encryption):
- Same key derived at the mobile and AS.
- The AS informs the AP of the shared symmetric session.
- Encrypted communication between the mobile and remote host via the AP.