Apply knowledge of wireless transmission methods and security protocols (WEP, WPA, WPA2, WPA3) to configure, evaluate and improve the security of a wireless network, in line with Cambridge International AS & A Level IT 9626 (2025‑2027).
| Technology | Typical Frequency Band(s) | Typical Range | Typical Data Rate | Modulation / Key Feature | Typical Security Features |
|---|---|---|---|---|---|
| Wi‑Fi (802.11 a/b/g/n/ac/ax) | 2.4 GHz, 5 GHz, 6 GHz (Wi‑Fi 6E) | 20‑100 m indoor, up to 300 m outdoor (LOS) | Up to 9.6 Gbps (Wi‑Fi 6/6E) | OFDM, MIMO, beamforming | WPA3‑SAE, WPA2‑AES/CCMP, PMF, optional 802.1X/EAP |
| Bluetooth | 2.4 GHz ISM | ≤ 10 m (Class 2), up to 100 m (Class 1) | Up to 2 Mbps (BLE 5.2) | FHSS, GFSK, LE 2M PHY | Secure Simple Pairing, LE Secure Connections, AES‑CCM |
| Infrared (IR) | 850‑940 nm (optical) | ≤ 5 m, line‑of‑sight | Up to 4 Mbps (IrDA) | Pulse‑position modulation | Physical line‑of‑sight; optional link‑layer authentication |
| Microwave (point‑to‑point) | 2.4 GHz, 5 GHz, 11‑30 GHz, 60 GHz | 1 km‑50 km (directional) | 10 Mbps‑10 Gbps (depends on band) | PSK, QAM, OFDM | Link‑layer encryption (AES‑CCMP), MAC authentication |
| Radio (UHF/VHF) | 300 MHz‑3 GHz (UHF/VHF) | Few km to tens of km | Up to 256 kbps (typical voice/data) | FM, AM, GFSK, digital modes | Frequency‑hopping, simple stream ciphers (optional) |
| NFC | 13.56 MHz (HF RFID) | ≤ 4 cm | 424 kbps (ISO/IEC 14443) | Inductive coupling, load‑modulation | ISO/IEC 14443 authentication, secure element, mutual key exchange |
Wi‑Fi security protocols operate at the IEEE 802.11 MAC layer (Layer 2 of the OSI model). Encrypted frames are carried over the physical layer and then encapsulated in the TCP/IP suite for end‑to‑end communication. Firewalls protect the wired side of the network, while WPA3’s Protected Management Frames (PMF) safeguard the wireless management traffic that firewalls cannot see.
The choice of wireless medium influences both raw bandwidth and the processing load of encryption. For example, the 5 GHz band offers higher data rates, making the additional CPU overhead of AES‑CCMP (WPA2/WPA3) negligible, whereas older 2.4 GHz devices with limited hardware may experience reduced throughput when using strong encryption.
First security standard for IEEE 802.11. Uses RC4 stream cipher with a static secret key.
Interim improvement over WEP, introduced in 2003.
Current minimum standard for most deployments (since 2004). Replaces TKIP with the stronger AES‑based CCMP.
Introduced in 2018; provides the strongest protection for compatible hardware.
| Attack | Targeted Weakness | Mitigation (Checklist) |
|---|---|---|
| WEP cracking (FMS/KoreK) | Short IV, static key, no integrity check | Never use WEP; upgrade to WPA2‑AES or WPA3. |
| Dictionary/brute‑force on WPA/WPA2‑PSK | Weak passphrase | Use a complex, minimum 12‑character passphrase; change regularly. |
| KRACK (Key Reinstallation Attack) | Flaws in the 4‑way handshake of WPA/WPA2 | Apply latest firmware/patches; enable WPA3 where possible (SAE prevents KRACK). |
| Rogue Access Point / Evil Twin | Clients auto‑connect to stronger‑signal APs without verification | Enable 802.1X/EAP (Enterprise) or WPA3‑SAE; use certificate‑based authentication; monitor for unknown BSSIDs. |
| MAC‑address spoofing | MAC filtering relies solely on hardware addresses | Treat MAC filtering as a convenience feature only; rely on strong encryption and authentication. |
| WPS abuse | WPS PIN can be brute‑forced in a few hours | Disable WPS unless absolutely required. |
| Feature | WEP | WPA (TKIP) | WPA2 (AES‑CCMP) | WPA3 (SAE/PMF) |
|---|---|---|---|---|
| Encryption algorithm | RC4 (static key) | RC4 + TKIP (dynamic per‑packet key) | AES‑CCMP (128‑bit) | AES‑256 (SAE) + PMF |
| Integrity check | None | MIC (48‑bit) | CCMP (CBC‑MAC) | CCMP + PMF |
| Key management | Static pre‑shared key | Per‑packet key derived from PSK | Per‑session key derived from PSK or 802.1X | SAE (password‑based DH) – forward secrecy |
| Resistance to offline dictionary attacks | None | Low | Medium (depends on PSK strength) | High – SAE throttles attempts |
| Management‑frame protection | No | No | Optional (802.11w) | Mandatory (PMF) |
| Current recommendation (Cambridge syllabus) | Never use | Only for legacy devices | Minimum for most deployments | Preferred where hardware supports it |
| Term | Definition (as required for the exam) |
|---|---|
| WEP | Wired Equivalent Privacy – an early IEEE 802.11 security protocol using RC4 with a static key and a 24‑bit IV. |
| TKIP | Temporal Key Integrity Protocol – a WPA encryption method that generates a per‑packet key from a 128‑bit master key and adds a MIC. |
| AES‑CCMP | Advanced Encryption Standard with Counter Mode and CBC‑Message Authentication Code Protocol; the encryption and integrity mechanism used by WPA2. |
| SAE | Simultaneous Authentication of Equals – a password‑authenticated Diffie‑Hellman key exchange used in WPA3‑Personal to prevent offline dictionary attacks. |
| PMF | Protected Management Frames – a mandatory feature in WPA3 that secures management frames (e.g., deauthentication) against spoofing. |
| 802.1X/EAP | Port‑based Network Access Control framework that uses an authentication server (RADIUS) for individual user credentials. |
| RADIUS | Remote Authentication Dial‑In User Service – a server that validates credentials for WPA‑Enterprise and 802.1X networks. |
| KRACK | Key Reinstallation Attack – exploits a flaw in the WPA/WPA2 4‑way handshake to force reuse of encryption keys. |
| SSID | Service Set Identifier – the human‑readable name of a wireless network. |
| IV | Initialization Vector – a non‑secret value combined with a key to produce a unique keystream for each packet (used in WEP and WPA). |
| MAC filtering | A method of allowing or denying network access based on the device’s Media Access Control address. |
Create an account or Login to take a Quiz
Log in to suggest improvements to this note.
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources, past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.