Concepts and definitions
Wi-Fi roaming
The technical definition of Wi-Fi roaming is when a wireless client leaves one Access Point (AP) within a meshed network and authenticates/associates to a new Access Point within the same meshed network, without losing connection. However, for the purpose of this report, the definition of Wi-Fi roaming is:
“Providing generic internet access to end user devices (or IoT devices) which are not in their usual corporate Wi-Fi network location (and not necessarily with accompanying private network access or routing to their corporate networks, which can be delivered via overlay Virtual Private Network services), but are in a Wi-Fi network location owned/managed by another publicly funded NHS/ICB Partner.”
IEEE Standard 802.1x
IEEE Standard 802.1x is a standard for network access control that provides an authentication framework to protect networks against unauthorised access. IEEE Standard 802.1x supports Extensible Authentication Protocol (EAP) authentication methods such as passwords, smart cards and biometrics. IEEE Standard 802.1x also provides other security features, such as encryption and access control. IEEE Standard 802.1x can be vulnerable to certain types of attacks, such as man-in-the-middle attacks and spoofing. These risks can be mitigated by the use of strong authentication methods and additional security measures such as firewalls and intrusion detection systems.
Extensible Authentication Protocol (EAP)
The EAP security protocol that defines how to provide authentication and authorisation in a wireless network. Access to Wi-Fi networks is typically protected by a password. However, EAP provides more secure ways to authenticate users. A user’s identity can be verified through a digital certificate, a smart card or biometrics such as fingerprint or face recognition. EAP provides an additional layer of security beyond the basic Wi-Fi password and protects against man-in-the-middle attacks, where an attacker intercepts and alters communications between two parties.
Wi-Fi Protected Access 2 (WPA2)
Wi-Fi Protected Access 2 (WPA2) is currently the most widely used Wi-Fi security protocol. WPA2 uses the Advanced Encryption Standard (AES) to encrypt data in transit and provides authentication using the 802.1X protocol with EAP or Pre-Shared Key (PSK). WPA2 is vulnerable to brute-force attacks and Key Reinstallation Attacks (KRACK), which exploit weaknesses in the WPA2 handshake to intercept and decrypt network traffic.
Wi-Fi Protected Access 3 (WPA3)
WPA3 was introduced in 2018 and is the most secure Wi-Fi security protocol available today. It uses a new encryption algorithm named Simultaneous Authentication of Equals (SAE) to address the weaknesses of WPA2. It also improves how devices connect to the network and improves protection against phishing attacks. WPA3 supports individualised data encryption, which provides a unique encryption key for each device, making it more difficult for attackers to decrypt network traffic.
Virtual Private Networks (VPN)
Virtual Private Networks create a secure, encrypted connection between a user’s device and a remote server, allowing the user to access the internet as if they were directly connected to the server’s network. VPNs can be used to provide remote access to a network, allowing employees to securely connect to their employer’s private network from anywhere in the world. VPNs hide the user’s IP address to provide privacy and to prevent the collection of data regarding online behaviour. VPNs encrypt data during transit using one of several protocols such as PPTP (Point-to-Point Tunnelling Protocol), L2TP/IPSec (Layer 2 Tunnelling Protocol with Internet Protocol Security), OpenVPN, SSTP (Secure Socket Tunnelling Protocol) and IKEv2 (Internet Key Exchange version 2). Each of the protocols has strengths and weaknesses regarding security, speed and ease of use.
Last edited: 12 March 2025 11:10 am