Wireless Mesh
A decentralized wireless topology where each node relays data, providing redundancy and extended coverage.
Ad Hoc
Also called Independent Basic Service Set (IBSS); devices connect directly to one another without a central access point, commonly used for IoT or temporary setups.
Point-to-Point Wireless Mode
A wireless connection between two devices or sites using directional antennas for long-range communication.
Infrastructure Wireless Mode
The most common Wi-Fi setup where clients connect through an access point for centralized communication and management.
AES
A symmetric block cipher used for encrypting data in WPA2 and WPA3 wireless security protocols.
MIC
Message Integrity Check: Ensures data packets haven’t been altered during transmission, providing integrity verification.
GMAC
Galois Message Authentication Code: Used in WPA3 and ensures data packets haven’t been altered during transmission, providing integrity verification. Stronger method than the older MIC
WEP
Wired Equivalent Privacy: An outdated and insecure encryption standard that should no longer be used.
WPA
Wi-Fi Protected Access: Introduced TKIP encryption as an improvement over WEP but still considered outdated and less secure.
WPA2
Wi-Fi Protected Access Version 2: Uses AES encryption with CCMP mode, providing strong confidentiality and integrity for Wi-Fi networks.
CCMP
Cipher Block Chaining Message Authentication Code Protocol: A block cipher mode that combines AES encryption with MIC for security in WPA2.
WPA3
Wi-Fi Protected Access Version 3: The latest standard providing stronger encryption, forward secrecy, and protection against offline password attacks using SAE.
GCMP
Galois/Counter Mode Protocol: A block cipher mode combining AES encryption with MIC and GMAC integrity checks, used in WPA3 for enhanced security.