Review Article

WiFi and WiMAX Secure Deployments

Figure 5

WPA2 Authentication procedure.
423281.fig.005