Components required in securing wireless network
802.11i
Cipher Algorithms used
802.1w
Authentication in 802.11i
Encryption in 802.11i