This educational material explains the basic principles of how Wi-Fi networks operate, focusing on the security risks associated with their use, as well as appropriate security measures (for example, WPA3, IEEE 802.1X, EAP). The emphasis is placed not only on the theoretical explanation of the concepts, but also on understanding the practical context and real-life situations. Given the focus of the text, the specifics of school and corporate Wi-Fi networks are discussed in more detail.
The student will learn about the types of threats and attack mechanisms in Wi-Fi networks, the standards used for security, authentication and encryption, and of course the principles that must be followed for the safe operation of Wi-Fi networks. The text does not go into unnecessary depth that would exceed its purpose, but the key facts are explained in sufficient detail.
- Edney, JJ, & Arbaugh, WA (2003). Real 802.11 Security: Wi-Fi Protected Access and 802.11i. Addison-Wesley Professional.
- IEEE Standards Association. (2004). IEEE 802.11i-2004 – Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Medium Access Control (MAC) Security Enhancements. IEEE. Accessible from https://standards.ieee.org/standard/802_11i-2004.html
- Khatri, R., & Kumar, A. (2023). Security of Wi-Fi Networks: A Systematic Review. Accessible from https://aris-journal.com/aris/index.php/journal/article/view/18
- Security Analysis Team. (2024). Security Analysis of Modern Wi-Fi Network Protection Protocols. Accessible from https://science.lpnu.ua/csn/all-volumes-and-issues/volume-6-number-1-2024/security-analysis-modern-wifi-network-protection-protocols-assessment-wpa3-protocol-resistance-attacks-dragonblood-utility
- Gómez, R., & López, M. (2025). Recovering WPA-3 Network Password … using Social Engineering Captive Portal. arXiv. Accessible from https://arxiv.org/abs/2412.15381
- Al- Ghazi, HK, & Almubaiyedh, F. (2023). An Enhanced Approach for Wi-Fi Security and Authentication Protocols. SES Journal of Computer Science. Accessible from https://www.sesjournal.com/index.php/1/article/view/117
- TP-Link. (n.d.). What What is WPA3 and why? is it Important ? Accessible from https://www.tp-link.com/cz/wpa3/
- Ali, U., & Ahmad, H. (2022). RIDS: Real- time Intrusion Detection System for WPA3 Enabled Enterprise Networks. arXiv. Accessible from https://arxiv.org/abs/2207.02489
- Apple Support. (n.d.). About Wi-Fi Security – WPA3. Accessible from https://support.apple.com/en-us/HT211218
- Kumar, J., & Singh, P. (2021). And Wireless Intrusion Detection System for 802.11 WPA3 Networks. arXiv. Accessible from https://arxiv.org/abs/2110.04259
- Mohanty, SP, et al. (2021). ComPass: Proximity Aware Common Passphrase Agreement Protocol. arXiv. Accessible from https://arxiv.org/abs/2103.06763
- Shekh, A., & Dubey, S. (2023). Security Research of Wi-Fi Protected Access 3 (WPA3) Standard. Journal of Information Security. Accessible from https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/17549