In which phase of operation does the STA and AS prove their identities to each other?
(a) Discovery
(b) Authentication
(c) Key generation and distribution
(d) Protected data transfer
This question was posed to me in quiz.
My query is from IEEE 802.11i WLAN Security topic in portion Wireless Network Security and Network Security Overview of Cryptograph & Network Security