This document discusses authentication for wireless networks. It begins by introducing wireless networks and some of the security threats they face, such as war driving and denial of service attacks. It then covers various authentication methods including EAP-TLS, an authentication protocol that uses certificates to authenticate clients and servers. The document also briefly discusses other protocols like EAP-FAST, PEAP and LEAP. It concludes by mentioning the IEEE is working on the 802.11i standard to replace WEP with stronger encryption methods like WPA2 using AES.