Download the Wi-Fi Security Guidelines Whitepaper
Download the Wi-Fi Security FAQ document

The WBA Wi-Fi Security report is designed to identify the key network security concerns head-on, by addressing the major attack surfaces and specifying concrete controls for each one.

Here are the highlights:

1. Stops users connecting to rogue / fake networks

Concern:
Users accidentally connect to fake hotspots (coffee shop SSID clones, evil-twins) and have their traffic sniffed or credentials stolen.

How the paper addresses it:

  • Mandates 802.1X + EAP mutual authentication (client authenticates the network and the network authenticates the client).
  • Recommends only strong, Passpoint-certified EAP methods (EAP-TLS, EAP-SIM/AKA/AKAʹ, EAP-TTLS with MSCHAPv2).
  • Requires clients to validate server certificates (Root CA, CN/SAN checks) before sending credentials.

Result: a device will only complete authentication with a legitimate, certificate-validated network, making rogue APs much harder to exploit.

2. Protects data in the air (no easy sniffing / MITM)

Concern:
Attackers sniff traffic or tamper with frames over the air (classic café Wi-Fi issue).

How it’s handled:

  • Uses WPA2-Enterprise / WPA3-Enterprise with:
    • AES-CCMP / AES-GCMP for strong encryption
    • Per-session keys derived via EAP (MSK → PTK).
  • Optional (mandatory with WPA3) Protected Management Frames (PMF) to protect:
    • Deauth/disassoc frames
    • Against deauth and some MITM attacks.

Result: traffic between client and AP is strongly encrypted, and key management is robust. This brings Wi-Fi much closer to cellular-grade security.

3. Preserves user identity privacy (while still allowing traceability)

Concerns:

  • User identities exposed in the clear during authentication.
  • Operators unable to correlate sessions for legal / accounting purposes without exposing PII.

Mitigations:

  • Uses anonymous outer identities (e.g. anonymous@example.com) for initial EAP identity exchange.
  • Keeps real identity inside the encrypted EAP tunnel (inner identity).
  • Recommends Chargeable-User-Identity (CUI) as an opaque ID to:
    • Correlate sessions for billing / incident handling
    • Refresh regularly to protect privacy.
  • For SIM-based methods (EAP-SIM/AKA/AKAʹ), relies on pseudonyms and fast-re-auth identities instead of exposing raw IMSI.

Result: roaming and AAA routing work, regulators can still tie traffic back to a subscriber when required, but day-to-day traffic doesn’t spray PII all over the network.

4. Secures credentials at rest and in use

Concern:
Credentials (passwords, certificates, IMSIs, tokens) are stolen from devices or back-end systems.

How it’s addressed:

  • On devices: store credentials only in secure OS key stores (iOS Keychain, Android Keystore, etc.).
  • In the network: IDPs must store credentials in secure, hashed/encrypted databases, never in plain text or weak hash formats.
  • For SIM-based methods: rely on tamper-resistant SIM/USIM smart cards for credential storage.
  • Provides patterns for mapping encrypted IMSI ↔ real identity via RADIUS and logs, to satisfy lawful intercept/charging without exposing that mapping widely.

Result: credentials are hardened across the full chain: device → AP → AAA → IDP.

5. Hardens the access network (APs, controllers, cables, backhaul)

Concerns:

  • Someone plugs into AP wiring, hijacks or sniffs traffic.
  • APs are physically tampered with.
  • Backhaul links to controllers or hubs are unprotected.

Controls:

  • Physical security guidance for controllers and APs (placement, tamper-resistance, no sensitive secrets stored on AP if compromised).
  • Over-the-wire protection:
    • Secure tunnels (VPN/MACsec) between AP and controller/switch.
    • Local Breakout architectures to avoid backhauling sensitive or high-bandwidth traffic unsecured over long links.
  • Backhaul security:
    • Use IPsec or equivalent tunnels where traffic is centralised.
    • Encourage end-users to use application-layer VPNs for additional protection over the wider internet.

Result: it’s not just the radio link; the whole path from AP to core is considered in the threat model.

6. Secures AAA and roaming/hub signalling (RADIUS)

Measures:

  • Strongly recommends RADIUS/TLS (RadSec) or RADIUS/DTLS instead of classic RADIUS/UDP with weak MD5.
  • Aligns with WRIX and OpenRoaming requirements:
    • All AAA links between ANP ↔ hub ↔ IDP must be over secure tunnels or RadSec.
    • Certificates and TLS configurations follow modern best practices (RFC 9325, service identity RFCs).

Result: the control plane (auth/accounting) is encrypted and authenticated, not just the user data plane.

7. Adds Layer-2 protections inside the Wi-Fi domain

Concerns:

  • Clients attacking each other on the same SSID (ARP spoofing, broadcast abuse, worms).
  • Excess broadcast/multicast traffic enabling attacks or data leakage.

Mitigations:

  • L2 traffic inspection and filtering:
    APs/network devices can inspect and block suspicious frames between clients.
  • Proxy ARP, broadcast/multicast suppression:
    • Reduces noise, mitigates some broadcast-based attacks.
  • Client isolation as a best practice in many public deployments.

Result: even if a malicious client connects, its ability to attack neighbours at L2 is significantly reduced.

8. Wraps it all in a legal & federation framework (OpenRoaming + WRIX)

Finally, OpenRoaming isn’t just technology; it’s:

  • A federation + legal + policy framework (built on WRIX) that:
    • Defines responsibilities between ANPs, IDPs, and hubs.
    • Sets expectations for security, privacy, and logging.
    • Reduces the risk of “bad actors” inside the federation.

That means security isn’t just “best effort per operator”; it’s contractually and technically enforced at the federation level.

Short answer

The report addresses Wi-Fi network security concerns by specifying concrete, layered controls:

  • Strong mutual authentication (EAP + Passpoint)
  • WPA2/WPA3-Enterprise with AES + PMF
  • Privacy-preserving identities and CUI
  • Secure credential storage and lawful intercept-aware logging
  • AP, backhaul, and RADIUS/RadSec hardening
  • L2 filtering, client isolation, and multicast/broadcast controls
  • A legal and operational framework via OpenRoaming/WRIX

Together, these turn Wi-Fi from “open hotspot risk” into something that behaves much more like a secure, carrier-grade access technology.