Abstract
The paper documents the authentication mechanisms in a wireless network like Open system, shared key, WPA, 802.1x etc. The detailed functionality analysis of the mechanisms are researched and documented. A comparative study of WEP and WPA along with the weaknesses are identified. Security vulnerabilities with WEP and how it is mitigated with 802.11i is understood. Flavors of WPA like WPA – Personal and WPA- Enterprise is documented. WPA and TKIP key derivation