Authentication
•Prevent unauthorized access
•Open system authentication
• send authen. with ID à get back if recognize
•Shared key authentication
• Secret shared key (through secure channel)
• Authen. through shared key
• Required Wireless Equivalent Privacy Algorithm (WEP) /or others