802.11 Authentication and Association
802.11 Authentication and Association
802.11 Authentication and Association
11 Authentication
and Association
Mohit P. Tahiliani
Assistant Professor,
Dept. of Computer Science and Engineering,
NITK Surathkal
Overview
Wireless medium has its own share of security
concerns because the radio waves cannot be
confined within the premises, unlike the wired
medium whose access can be controlled.
➔ Authentication techniques
3
802.11 Authentication and Association
1. Periodic beacons broadcasted by AP
2. Probe request from the STA
3. Probe response from the AP
4. Authentication request from STA to AP
5. Authentication response from AP to STA
6. Association request from STA to AP
7. Association response from AP to STA
8. Data exchange begins
Note
Probe is a special type of
frame.
Note
Beacon is a special type
of frame which is
periodically broadcasted
by an AP.
7
Image Credits: CWAP Official Study Guide
Beacon Frame Format
● Frame Control (2 bytes) has three sub-fields
a. Version (2 bits -- typically 0) [1]
b. Type (2 bits -- Management frame in this example - 00) [2]
c. Subtype (4 bits -- 1000 is for beacon) [2]
d. Flags (8 bits) -- details are in [1]
● Sequence Control (2 bytes) has two sub-fields
a. Frame Number (4 bits)
b. Sequence Number (12 bits)