ABSTRACT
Wireless local area network (WLAN) technology gained its
popularity after 1999 through the 802.11b standardization
efforts of the IEEE and Wi-Fi Alliance, but 802.11b is
definitely not a lone protocol within the 802.11 family.
802.11a and 802.11g followed quickly as speed enhance-
ments, while others such as 802.11d, f, h, m, n, k, and i are
addressing other issues in 802.11-based networks. For infor-
mation security practitioners, it is impor-tant to understand
the differences between them as well as to know the ones
that have relevant security implications for wireless data
communications. Short descriptions and meanings of
802.11 protocols are outlined in Table 1, and more detailed
descriptions on most of them can be obtained from the
previous version of the Information Security Management
Handbook as well as the IEEE web site under the 802.11
standards. It is also important to understand that although
802.11b, a, and g were developed at different times and
describe different frequencies, numbers of channels, and
speeds of communication, they initially all together suffered
from the same security exposures.