Skip to main content
Background Image
  1. Posts/

Wi-Fi: How It Works, Security, and Best Practices

Quentin Marques
Author
Quentin Marques
Future Security Architect
Table of Contents

Introduction
#

Wi-Fi is an ever-present technology that connects devices to local networks or the internet wirelessly. Despite its convenience, it is frequently targeted by attacks exploiting its vulnerabilities. This article explores its history, functionality, risks, and best practices for secure use.


Wi-Fi Characteristics
#

TermDescription
NameWi-Fi (Wireless Fidelity)
Technical StandardIEEE 802.11 (and its evolutions: b, g, n, ac, ax, etc.)
Creation Date1997 (standardization)
Frequencies2.4 GHz, 5 GHz, 6 GHz (depending on the standard)
RangeUp to 100 meters indoors (varies with obstacles and power)
Theoretical SpeedUp to 9.6 Gbps (Wi-Fi 6E)
UsageAccess to a local network or the internet
Secure ProtocolWPA3 (recommended)

History of Wi-Fi
#

  • 1971: Invention of wireless networking (AlohaNet) in Hawaii.
  • 1997: Wi-Fi standardization by the IEEE (802.11 standard).
  • 1999: The term “Wi-Fi” is coined, and the Wi-Fi Alliance is formed.
  • 2003: Introduction of WPA (Wi-Fi Protected Access) to replace vulnerable WEP.
  • 2018: Launch of WPA3, enhancing network security.

How Wi-Fi Works
#

Required Hardware
#

  • Router: Manages the connection between the local network and the internet.
  • Wi-Fi Access Point: Emits the wireless signal (integrated into the router or separate).
  • Client Device: Smartphone, computer, tablet, etc.

Connection Steps (Simplified)
#

  1. Network Detection: The device scans for available SSIDs (network names).
  2. Authentication:
    • The user selects an SSID (e.g., “Kiwi”).
    • The access point sends a challenge (cryptographic challenge).
    • The device responds with the password, encrypted according to the protocol (WPA3).
  3. Validation: If the password is correct, the access point grants connection.
  4. IP Assignment: A DHCP server (usually built into the router) assigns an IP address to the device.

Key Vocabulary
#

TermDefinition
SSIDName of the Wi-Fi network (e.g., “Kiwi”).
DHCPProtocol that automatically assigns IP addresses to devices.
ChannelFrequency band used to avoid interference (e.g., channel 6).
WEP/WPA/WPA3Encryption protocols (WPA3 is the most secure).
VLANVirtual Local Area Network to segment traffic (e.g., guest network).

Risks and Common Attacks
#

Type of AttackDescriptionConsequences
Man-in-the-Middle (MitM)Interception of data between the device and the access point.Data theft (passwords, emails).
Rogue Access PointFake access point mimicking a legitimate network.Connection to a malicious network.
Malware SpreadDistribution of malicious software via a compromised network.Infection of connected devices.
Brute Force AttackAttempt to guess the Wi-Fi password.Unauthorized network access.

Security Best Practices
#

For the Wi-Fi Network
#

  • Use WPA3: Avoid WEP and WPA (outdated).
  • Strong Password: 12+ characters, mix of letters, numbers, and symbols.
  • Network Segmentation: Create VLANs to isolate IoT and guest devices.
  • Disable WPS: Vulnerable protocol, often enabled by default.
  • Update Firmware: Patch router vulnerabilities.

For Devices
#

  • Avoid Public Networks: Use a VPN if necessary.
  • Disable Auto-Wi-Fi: Prevent unwanted connections.
  • Check Certificates: On public networks, verify the authenticity of the access point.

Conclusion
#

Wi-Fi is essential technology, but its security depends on best practices. By understanding how it works and its risks, everyone can protect their data and devices. Adopt WPA3, segment your networks, and stay vigilant against public networks!


Further Reading
#