Wireless client authentication methods
This section covers key wireless client authentication methods, including open authentication, WEP, PSK, SAE, and 802.1x/EAP
Learning objectives
Identify IEEE 802.11 as a basis for a wireless security management framework
Become familiar with common wireless client authentication methods
Identify common EAP-based authentication methods
This section has two main goals. First, this section introduces the IEEE 802.11 networking standard, which provides a basis for a wireless security management framework: client authentication, message privacy, and message integrity. The section then traces the critical evolution of these security components through modern protocols like WPA2 and WPA3. Second, this section introduces the wireless client authentication methods of open authentication, WEP, PSK, SAE, and 802.1x/EAP, including LEAP, EAP-FAST, PEAP, and EAP-TLS.
Topics covered in this section
Introduction
The IEEE 802.11 standard as a wireless security management framework
Authentication (trust)
Open authentication
WEP (Wired Equivalent Privacy)
Data privacy
Data integrity
Wireless client authentication methods in chronological order
Pre-Shared Key (PSK) and SAE (Simultaneous Authentication of Equals)
Key developments within the IEEE 802.1x/EAP standard
IEEE 802.1x/EAP (Extensible Authentication Protocol)
EAP-based authentication methods
LEAP (Lightweight EAP)
EAP-FAST (Flexible Authentication by Secure Tunneling)
PEAP (Protected EAP)
EAP-TLS (EAP Transport Layer Security)
Introduction
In a wireless connection, data is transmitted via radio waves that propagate in all directions, making it accessible to any nearby device within range. Unlike wired connections, which confine signals to physical cables, wireless signals are inherently broadcasted, allowing unintended recipients to potentially intercept them if not properly encrypted or secured.
A comprehensive approach to securing a wireless network involves:
Identifying the endpoints (authenticating client devices) – for example, using MAC address filtering or IEEE 802.1X certificate-based device authentication.
Authenticating the end user accessing the network – for example, via WPA2-Enterprise with EAP-TLS or EAP-PEAP for username/password verification.
Protecting the wireless data from eavesdroppers using encryption – for example, using AES-CCMP encryption (WPA3) or TKIP (legacy WPA).
Protecting the wireless data from tampering with frame authentication – for example, with IEEE 802.11’s frame integrity checks (MIC) or GCMP in WPA3.
Endpoint identification ensures only authorized devices connect, while user authentication verifies legitimate users. Together, these measures strengthen access control, while encryption and integrity checks safeguard data in transit.
The IEEE 802.11 standard as a wireless security management framework
IEEE 802.11 is part of the IEEE 802 collection of technical standards for local area networks (LANs). The IEEE 802 standards are created and maintained by the Institute of Electrical and Electronics Engineers (IEEE) LAN/MAN Standards Committee (IEEE 802).
IEEE 802.11 specifies the set of protocols for the medium access control (MAC) and physical layer (PHY) that implement wireless local area network (WLAN) computer communication. This standard and its amendments are the underlying technology for Wi-Fi branded products, making them the most widely used wireless computer networking standards globally. Commonly used in home and office settings, IEEE 802.11 allows devices such as laptops, printers, and smartphones to communicate with each other and access the Internet without wires. Furthermore, IEEE 802.11 provides the foundation for vehicle-based communication networks via IEEE 802.11p.
The IEEE 802.11 standard provides a basis for a wireless security management framework that can be used to add trust, privacy, and integrity to a wireless network. The following discussion gives a brief overview of the IEEE 802.11 standard.
Authentication (trust)
Clients must first discover a BSS (Basic Service Set) and then request permission to associate with it. Only trusted and expected devices should be given network access. Clients should be authenticated before they are allowed to associate. Potential clients must present a form of credentials to the APs (Access Points) to identify themselves. The original IEEE 802.11 standard gave only two options to authenticate clients: open authentication and WEP.
Open authentication
The open authentication process has only one requirement for a client wishing to access a WLAN, that they must use an IEEE 802.11 authentication request before attempting to associate with an AP. No other credentials are needed.
With no challenge, any IEEE 802.11 client may authenticate to access the network. That is, in fact, the whole purpose of open authentication—to validate that a client is a valid IEEE 802.11 device by authenticating the wireless hardware and the protocol. Authenticating the user’s identity is handled as a true security process through other means. (Odom, 2020, p. 710)
Client screening in WLANs with open authentication will often be a form of web authentication. Most client operating systems will flag WLANs with open authentication to warn you that your wireless data will not be secured in any way if you join.
After the open IEEE 802.11 connection is established, the user’s identity is authenticated by higher-layer security methods. These methods include Pre-Shared Key (PSK) for personal networks (like WPA2/3-Personal), the robust IEEE 802.1X framework with EAP for enterprise environments, and captive portals for public guest access.
WEP (Wired Equivalent Privacy)
WEP uses a shared key (WEP key) that must be known to both the sender and receiver ahead of time in order to encrypt and decrypt data. WEP keys are either 40 or 104 bits in length, represented by a string of 10 or 26 hex digits. Every potential client and AP must share the same key before any client can associate with the AP.
WEP uses the RC4 cipher algorithm to encrypt data that is transmitted over a wireless network. “The same algorithm encrypts data at the sender and decrypts it at the receiver. The algorithm uses a string of bits as a key, commonly called a WEP key, to derive other encryption keys—one per wireless frame” (Odom, 2020, p. 711).
The WEP key can also be used as an optional authentication method. A client not using the correct WEP key cannot associate with an AP. The AP sends a random challenge phrase to the client. The client must then encrypt this phrase using its WEP key and send the encrypted result back. The AP verifies the client's key by encrypting the same challenge itself and comparing the two results.
Data privacy
To protect data privacy on a wireless network, the data must be encrypted while it is traveling between clients and APs. This is done by encrypting the data payload in each wireless frame just before it is transmitted, and then decrypting it as it is received. The encryption method must be one that the transmitter and receiver share so that the data can be encrypted and decrypted successfully.
Only WEP (RC4-based) is defined in the original IEEE 802.11 standard. As noted, WEP’s shared key is both the authentication secret and encryption key, making it fundamentally insecure. Modern protocols such as Wi-Fi Protected Access (WPA2 and WPA3) derive temporary keys instead. WEP’s encryption was optional – networks could run without encryption (open authentication + no encryption was one option; open authentication + WEP encryption was another option). No other encryption options existed until TKIP (WPA, 2003) and AES-CCMP (WPA2, 2004).
Data integrity
No true message authentication existed within the original IEEE 802.11 standard. WPA introduced Michael MIC (Message Integrity Check), which was better than WEP but still vulnerable to forgery.
To address the critical weaknesses in WEP and the interim fixes in WPA, modern Wi-Fi security standards employ robust cryptographic suites. The Counter/CBC-MAC Protocol (CCMP), which is mandatory for WPA2 certification, is a fundamental advance. CCMP combines two strong algorithms: the Advanced Encryption Standard (AES) in counter mode for data confidentiality, and the Cipher Block Chaining Message Authentication Code (CBC-MAC) for data integrity, providing a much more secure alternative to TKIP. The subsequent Galois/Counter Mode Protocol (GCMP), used in WPA3, offers even greater security and efficiency. GCMP also uses AES counter mode for encryption but employs the Galois Message Authentication Code (GMAC) for integrity, making it a more advanced authenticated encryption suite than CCMP.
Evolution of the IEEE 802.11 Security Protocols
Feature
Original 802.11 (1997)
Modern Fix (WPA2/WPA3)
Privacy
WEP (RC4) or None (Open)
AES-CCMP / GCMP
Integrity
CRC-32 (ICV) – No security
AES-CBC-MAC (CCMP) / GMAC (GCMP)
Authentication
Open System or Shared Key (WEP PSK)
802.1X/EAP or SAE (WPA3)
While IEEE 802.11 defines the fundamental operation of Wi-Fi, its built-in security (Open and WEP) was fundamentally weak. The modern wireless security management framework is based primarily on the IEEE 802.11i amendment (2004), which introduced the Robust Security Network (RSN) framework. This framework underpins WPA2 and WPA3, providing the basis for strong authentication, encryption, and integrity.
The Wi-Fi Protected Access (WPA) protocol was introduced by the Wi-Fi Alliance in 2003 as an interim security standard to address the critical vulnerabilities of WEP, which by then were well-known. The full, robust IEEE 802.11i amendment was still under development and years away from final ratification. To provide a immediate solution, the Wi-Fi Alliance created WPA by defining a subset of the draft IEEE 802.11i specifications that were mature enough to implement. Essentially, WPA served as a "pre-standard" version of IEEE 802.11i, incorporating its key enhancements like the Temporal Key Integrity Protocol (TKIP) for dynamic encryption keys and the Michael message integrity check, thus providing a crucial stopgap of improved security while the industry awaited the stronger, final IEEE 802.11i standard (which would later be branded as WPA2).
Comparison Table (WEP, WPA, WPA2, WPA3)
WEP
Open System or Shared Key (WEP PSK)
RC4 (weak)
CRC-32 (ICV) – Easily forged
40-bit / 104-bit
1997 (802.11)
WPA
WPA-Personal (PSK) or WPA-Enterprise (802.1X/EAP)
TKIP (RC4 with fixes)
Michael MIC – Weak, but better than WEP
128-bit (TKIP)
2003 (Wi-Fi Alliance)
WPA2-Personal
PSK (Pre-Shared Key)
AES-CCMP (mandatory)
CCMP (AES-CBC-MAC) – Strong
128-bit (AES)
2004 (802.11i)
WPA2-Enterprise
802.1X/EAP
AES-CCMP (mandatory)
CCMP (AES-CBC-MAC) – Strong
128-bit (AES)
2004 (802.11i)
WPA3-Personal
SAE (Simultaneous Authentication of Equals)
AES-GCMP
GCMP (AES-GMAC)
256-bit (AES)
2018
WPA3-Enterprise
802.1X/EAP (with stricter requirements)
AES-GCMP
GCMP (AES-GMAC)
256-bit (AES)
2018
Technically, both the WEP key and the WPA/WPA2 PSK are pre-shared secrets used for network access. However, their security differs drastically due to how they are implemented, particularly in how they handle authentication and key management.
WEP uses the WEP key directly for both authentication (the client proves it knows the key by encrypting a challenge from the AP) and encryption (the same static key is used to encrypt all data packets via RC4). This direct use means compromising the key through the authentication process breaks both trust and privacy. In contrast, in WPA/WPA2-Personal the PSK itself is never used for encryption. Instead, the PSK serves as a starting point in a secure 4-Way Handshake that achieves two separate goals:
Secure authentication: The 4-Way Handshake mutually verifies that both the client and AP know the PSK.
Dynamic key derivation: The 4-Way Handshake generates unique, temporary session keys used solely for encrypting data with strong algorithms (TKIP or AES-CCMP).
This fundamental shift from a static secret to a dynamic key management system was a monumental security improvement. This separation of the authentication secret from the encryption keys is why PSK is fundamentally more secure than the WEP key.
Wireless client authentication methods in chronological order
Wireless client authentication methods (sometimes generically referred to as IEEE 802.11 authentication methods or Wi-Fi authentication methods) can be categorized into Open System Authentication, Shared Key Authentication, and more advanced methods used in WPA/WPA2/WPA3. Follows is a list of wireless authentication methods in chronological order.
1. Open System Authentication (1997 – IEEE 802.11 original standard)
No real authentication; any client can connect.
Most common in public hotspots (e.g., cafes, airports).
Often paired with captive portals (web-based login).
2. Shared Key Authentication (WEP – 1997, deprecated)
Used a static 40/104-bit WEP key (easily crackable).
Easily crackable; deprecated by early 2000s.
3. WPA-Personal/WPA-Enterprise (2003 – Wi-Fi Alliance interim fix)
Introduced WPA-PSK (Pre-Shared Key) as a WEP replacement for home users.
WPA-Enterprise (802.1X/EAP) for businesses. 802.1X/EAP is defined in IEEE 802.1X, not IEEE 802.11 itself. Used in WPA/WPA2/WPA3-Enterprise.
4. WPA2-Personal/WPA2-Enterprise (2004 – IEEE 802.11i standard)
WPA2-PSK became the dominant Wi-Fi security method.
WPA2-Enterprise (802.1X/EAP).
Replaced TKIP with AES-CCMP (stronger encryption).
5. Wi-Fi Protected Setup (WPS – 2006)
Simplified device onboarding (Push Button/PIN).
Later found vulnerable to brute-force attacks.
6. WPA3-Personal (2018 – Wi-Fi Alliance)
Introduced Simultaneous Authentication of Equals (SAE) to replace PSK.
Protects against offline dictionary attacks.
7. WPA3-Enterprise (2018)
WPA3-Enterprise (802.1X/EAP).
Added 192-bit cryptographic suite for higher-security environments.
Mandates use of AES-GCMP instead of TKIP.
Note:
802.1X/EAP is not part of the original IEEE 802.11 standard:
It was introduced later (via IEEE 802.11i/WPA) for enterprise security.
802.1X is a port-based authentication framework (from wired networks) adapted for Wi-Fi.
EAP methods (LEAP, PEAP, EAP-TLS, etc.) are not IEEE 802.11 authentication:
They are authentication protocols running inside 802.1X.
The actual IEEE 802.11 layer just facilitates the exchange (EAPoL frames).
Modern Wi-Fi uses a mix of IEEE 802.11 and non-802.11 auth methods:
WPA/WPA2-Personal (PSK/SAE) uses pre-shared keys, not part of original IEEE 802.11 auth.
WPA/WPA2/WPA3-Enterprise relies on 802.1X/EAP, not native IEEE 802.11.
Pre-Shared Key (PSK) and SAE (Simultaneous Authentication of Equals)
There are several methods of wireless client authentication. One common method is to use a shared static text string, also known as a pre-shared key (PSK). The PSK is stored on the client device and is presented to the AP when the client attempts to connect to the network. Any user who possessed the device could authenticate to the network. More stringent authentication methods require interaction with a user database, with the end user entering a valid username and password.
In WPA-Personal and WPA2-Personal, the PSK (your Wi-Fi password) is used to derive encryption keys. In WPA3-Personal, PSK is replaced by SAE (Simultaneous Authentication of Equals) for authentication, a more secure method for key exchange (WPA3-Enterprise uses 802.1X for authentication)—the actual encryption in WPA3 uses AES-CCMP.
Key developments within the IEEE 802.1x/EAP standard
IEEE 802.1X (Port-Based Network Access Control) and EAP (Extensible Authentication Protocol) are not tied to a single Wi-Fi security generation but have evolved alongside Wi-Fi authentication methods. The IEEE 802.1x/EAP standard is used in corporate/enterprise networks and relies on RADIUS servers and uses EAP-based authentication methods.
Here is a chronology of key developments within the IEEE 802.1x/EAP standard.
1. Initial Introduction (2001 – IEEE 802.1X standard)
The IEEE 802.1X standard was originally ratified for port-based access control on wired Ethernet networks, providing a framework to authenticate devices before granting them network access.
IEEE 802.1X was later adopted as a cornerstone of Wi-Fi authentication with the introduction of WPA-Enterprise in 2003.
EAP (RFC 2284, 1998) was integrated into 802.1X to provide a flexible authentication framework.
Used in early enterprise Wi-Fi networks even before WPA/WPA2.
2. Formal Wi-Fi Adoption (2003 – WPA-Enterprise)
When WPA was introduced, 802.1X/EAP became the backbone of WPA-Enterprise.
Replaced WEP’s weak authentication with dynamic key generation via RADIUS servers.
Common EAP methods at the time:
EAP-TLS (certificate-based, most secure but complex).
EAP-MD5 (deprecated, no encryption).
LEAP (Cisco-proprietary, later found insecure).
3. WPA2-Enterprise (2004 – IEEE 802.11i)
802.1X/EAP became the gold standard for enterprise Wi-Fi under WPA2.
Newer EAP methods emerged:
PEAP (Protected EAP, e.g., PEAP-MSCHAPv2 for username/password).
EAP-TTLS (similar to PEAP but more flexible).
EAP-FAST (Cisco’s replacement for LEAP).
4. WPA3-Enterprise (2018)
Still relies on 802.1X/EAP but with stricter security:
Mandates AES-256-GCMP encryption (vs. AES-CCMP in WPA2).
Introduces 192-bit security mode (for governments/enterprises).
EAP-TLS remains the most secure method (certificate-based).
5. Modern Usage (2020s)
802.1X/EAP is still dominant in enterprises, universities, and large orgs.
Cloud RADIUS services (e.g., Azure AD, Okta) now integrate with 802.1X.
EAP-TLS is growing due to zero-trust security trends.
IEEE 802.1x/EAP (Extensible Authentication Protocol)
When 802.1x is enabled, for a wireless client to gain access to the network, the client must first associate with an AP and then successfully authenticate. The client uses open authentication to associate with the AP, and then the actual client authentication occurs at a dedicated authentication server. This is different from open and WEP authentication where wireless clients are authenticated locally at the AP without further intervention.
The three-party 802.1x arrangement involves of the following entities:
Supplicant: The client device requesting access. The client is the device that is trying to connect to the network, while the supplicant is the software on the client that is responsible for actually authenticating with the network.
Authenticator: The network device providing (controlling) access to the network, a LAN switch or a WLC.
Authentication server (AS): The device that takes client credentials and permits or denies network access based on a user database and policies (usually a RADIUS server).

The WLC acts as a middleman in the client authentication process, controlling user access according to 802.1x and communicating with the authentication server using the EAP framework.
The Extensible Authentication Protocol (EAP) is a flexible and scalable authentication framework. “EAP defines a set of common functions that actual authentication methods can use to authenticate users” (p. 712). EAP is commonly integrated with the IEEE 802.1x port-based access control standard.
The client authentication process involving a WLC is as follows:
The client device sends a wireless association request to the AP.
The AP forwards the request to the WLC.
The WLC authenticates the client device via a RADIUS server.
If the client device is authenticated successfully, the WLC grants access to the network.
The client device can then start sending and receiving data on the network.
The RADIUS server uses a variety of authentication methods, such as passwords, certificates, and biometrics. The WLC uses the RADIUS server to authenticate client devices because it is a more secure and scalable approach to protecting wireless networks from unauthorized access than authenticating client devices directly on the AP. The RADIUS server can be located in a central location, which makes it easier to manage and secure. Additionally, the RADIUS server can support a large number of client devices, which is ideal for large networks.
Benefits of using a WLC for client authentication include:
Centralized management: WLCs allow network administrators to manage all of their APs from a single location. This can save time and effort, and it can also help to improve security.
Increased scalability: WLCs can support more APs than standalone APs. This makes them ideal for large networks.
Improved performance: WLCs can improve the performance of wireless networks by offloading some of the processing tasks from the APs.
Robust security: WLCs can use a variety of authentication methods, such as passwords, certificates, and biometrics. This makes them a more secure solution than authenticating client devices directly on the AP.
EAP-based authentication methods
When configuring user authentication on a WLAN, you do not need to select a specific authentication method. Instead, you select 802.1x on the WLC. This will allow the WLC to handle a variety of EAP methods. The client and authentication server will then use a compatible method. Once 802.1X is enabled on the WLC, the client and authentication server will negotiate a method to use.
The following discussion gives an overview of some common EAP-based authentication methods.
LEAP (Lightweight EAP)
EAP-FAST (Flexible Authentication by Secure Tunneling)
PEAP (Protected EAP)
EAP-TLS (EAP Transport Layer Security)
LEAP (Lightweight EAP)
Lightweight Extensible Authentication Protocol (LEAP) is a wireless authentication method that uses challenge-response messages to authenticate clients. LEAP was developed by Cisco in an early attempt to address the weaknesses in WEP.
The client sends its username and password to the authentication server, which then generates a challenge message and sends it back to the client. The client encrypts the challenge message using its password and sends it back to the authentication server. The authentication server then decrypts the challenge message and compares it to the original challenge message. If the messages match, the authentication server grants access to the client.
This process provides mutual authentication because both the client and the authentication server must be able to successfully decrypt the challenge messages. If either party is unable to decrypt the messages, the authentication will fail.
LEAP attempted to overcome WEP weaknesses by using dynamic WEP keys that changed frequently. Nevertheless, the method used to encrypt the challenge messages was found to be vulnerable, so LEAP has since been deprecated. (p. 713)
Wireless clients and controllers may still offer LEAP, but you should not use it.
EAP-FAST (EAP Flexible Authentication by Secure Tunneling)
In Cisco’s more secure authentication method called EAP Flexible Authentication by Secure Tunneling (EAP-FAST), authentication credentials are protected by passing a protected access credential (PAC) between the AS and the supplicant. The PAC is a shared secret generated by the AS and used for mutual authentication.
EAP-FAST constitutes of a sequence of three phases:
Phase 0: The PAC is generated by the AS and installed on the client.
Phase 1: The supplicant and AS authenticate each other and then they negotiate a Transport Layer Security (TLS) tunnel.
Phase 2: The end user can then be authenticated through the TLS tunnel.
Like in other EAP-based authentication, a RADIUS server (AS) is required. However, the RADIUS server must also operate as an EAP-FAST server to be able to generate PACs, one per user.
PEAP (Protected EAP)
The Protected EAP (PEAP) method, like EAP-FAST, uses an inner authentication (inside the TLS tunnel) and outer authentication (outside the TLS tunnel), but in the outer authentication the AS presents a digital certificate to authenticate itself with the supplicant. If the supplicant authenticates the AS, they both build a TLS tunnel to be used for the inner client authentication and encryption key exchange.
The digital certificate of the AS consists of data in a standard format that identifies the owner and is “signed” or validated by a third party. The third party is known as a certificate authority (CA) and is known and trusted by both the AS and the supplicants. The supplicant must also possess the CA certificate just so that it can validate the one it receives from the AS. The certificate is also used to pass a public key, in plain view, which can be used to help decrypt messages from the AS. (p. 713)
In this process, only the AS has a certificate for PEAP, so the supplicant can readily authenticate the AS. Since the client does not use a certificate of its own, the client must be authenticated within the TLS tunnel via one of the following two methods:
MSCHAPv2: Microsoft Challenge Authentication Protocol version 2.
GTC: Generic Token Card; a hardware device that generates one-time passwords for the user or a manually generated password.
EAP-TLS (EAP Transport Layer Security)
PEAP uses a digital certificate on the AS to authenticate the RADIUS server. The clients have to identify themselves through other means. EAP Transport Layer Security (EAP- TLS) goes one step above PEAP by requiring certificates on the AS and on every client device. With EAP-TLS, the AS and the supplicant exchange certificates and authenticate each other. A TLS tunnel is then built to exchange encryption key material.
EAP-TLS is considered “the most secure wireless authentication method available” but its implementation can be complex.
Along with the AS, each wireless client must obtain and install a certificate. Manually installing certificates on hundreds or thousands of clients can be impractical. Instead, you would need to implement a Public Key Infrastructure (PKI) that could supply certificates securely and efficiently and revoke them when a client or user should no longer have access to the network. (p. 714)
EAP-TLS can only be used if the wireless clients can accept and use digital certificates.
Key takeaways
The original IEEE 802.11 standard provided only basic and insecure authentication methods, Open System and WEP, which used a static key for both authentication and weak RC4 encryption.
The modern Wi-Fi security framework is based on the IEEE 802.11i amendment, which introduced strong, dynamic encryption (AES-CCMP) and robust integrity checking, forming the basis for WPA2 and WPA3.
Wireless authentication evolved from Open and WEP to Pre-Shared Key (PSK) in WPA/WPA2-Personal, which uses a secure handshake to derive temporary keys, and further to Simultaneous Authentication of Equals (SAE) in WPA3-Personal to prevent offline attacks.
For enterprise security, the IEEE 802.1X standard provides a port-based authentication framework that leverages the Extensible Authentication Protocol (EAP). This framework underpins WPA-Enterprise, WPA2-Enterprise, and WPA3-Enterprise.
EAP-based methods have evolved from weak protocols like LEAP to more robust ones. PEAP creates a secure tunnel using a server-side certificate, while EAP-TLS provides the highest security through mutual certificate-based authentication.
References
Coleman, D. D., & Westcott, D. A. (2022). CWNA Certified Wireless Network Administrator Official Study Guide: Exam CWNA-109. John Wiley & Sons.
Odom, W. (2020). CCNA 200-301 Official Cert Guide, Volume 1. Cisco Press.
Last updated