Skip to content
Computer Science · 12th Grade · Network Architecture and Cryptography · Weeks 28-36

Wireless Networks and Mobile Computing

Students investigate the principles of wireless communication, Wi-Fi security, and the challenges of mobile computing.

Common Core State StandardsCSTA: 3B-NI-03CSTA: 3B-NI-04

About This Topic

Wireless networking has fundamentally changed how and where computing happens, but it introduces security challenges that wired networks do not face. At the 12th-grade level, students study the technical standards behind Wi-Fi (IEEE 802.11 family), the evolution of wireless security protocols from WEP through WPA2 to WPA3, and the specific vulnerabilities that arise when data travels through the air. Because wireless signals are broadcast rather than contained within physical cables, anyone within range can potentially intercept them , making encryption and authentication protocol design particularly important.

Mobile computing adds complexity: devices connect and disconnect from different networks continuously, creating authentication challenges, roaming handoff issues, and persistent location privacy concerns. Students examine how 4G and 5G cellular networks differ from Wi-Fi architecturally and how enterprise network design must account for both. CSTA standards 3B-NI-03 and 3B-NI-04 frame this within network transmission and security evaluation.

Active learning is productive here because security trade-offs in wireless design are genuine and context-dependent. Students who debate whether to require WPA3 on a school network , and what inconveniences that creates for older devices , are engaging in authentic systems thinking that produces more durable understanding than any textbook exercise.

Key Questions

  1. Analyze the security vulnerabilities inherent in wireless networks compared to wired connections.
  2. Explain the trade-offs between convenience and security in mobile computing environments.
  3. Compare different wireless security protocols (e.g., WPA2, WPA3) and their effectiveness.

Learning Objectives

  • Analyze the security vulnerabilities of wireless networks by comparing signal interception risks to wired connections.
  • Evaluate the trade-offs between user convenience and data security in mobile computing scenarios.
  • Compare the security protocols WPA2 and WPA3, explaining their differences in encryption and authentication effectiveness.
  • Design a basic network security policy that addresses both wired and wireless access points for a small organization.
  • Explain the architectural differences between Wi-Fi and cellular (4G/5G) networks regarding data transmission and access.

Before You Start

Introduction to Networking Concepts

Why: Students need a foundational understanding of IP addresses, routers, and basic network topology to grasp wireless network architecture.

Basic Cryptography and Encryption

Why: Understanding fundamental encryption concepts is necessary to comprehend how wireless security protocols protect data.

Key Vocabulary

SSIDService Set Identifier, the name of a wireless network that devices use to connect.
WPA3Wi-Fi Protected Access 3, the latest security protocol for wireless networks, offering enhanced encryption and protection against brute-force attacks.
AuthenticationThe process of verifying the identity of a user or device attempting to access a network, often through passwords or digital certificates.
EncryptionThe process of converting data into a secret code to prevent unauthorized access, crucial for securing wireless transmissions.
Roaming HandoffThe seamless transfer of a mobile device's connection from one access point to another as the user moves between network coverage areas.

Watch Out for These Misconceptions

Common MisconceptionUsing HTTPS makes public Wi-Fi safe for any online activity.

What to Teach Instead

HTTPS encrypts content, but metadata , which sites you visit, when, and for how long , can still be observed. An evil twin attack can also intercept traffic before HTTPS is established on improperly configured clients. Use a network capture demonstration to show what information remains visible even when HTTPS is active.

Common MisconceptionA password-protected Wi-Fi network is secure from other users on the same network.

What to Teach Instead

WPA2-Personal uses the same shared key for all users, meaning any user on the network could potentially decrypt other users' traffic captured during their association handshake. WPA3's Simultaneous Authentication of Equals (SAE) was specifically designed to fix this vulnerability.

Active Learning Ideas

See all activities

Inquiry Circle: Protocol Security Timeline

Groups each research one wireless security protocol (WEP, WPA, WPA2, WPA3) and create a one-page summary covering: how authentication works, known vulnerabilities, and when it became obsolete or recommended. Groups present in chronological order, building a class timeline on the board that shows how each protocol responded to the failures of its predecessor.

45 min·Small Groups

Think-Pair-Share: The Public Wi-Fi Dilemma

Present this scenario: a student needs to check their banking app on public Wi-Fi at a coffee shop with no password. Students individually list the risks, then pair up to rank them by severity and brainstorm mitigation strategies. Pairs share one risk and one mitigation, building a shared risk register on the board that covers both technical and behavioral responses.

25 min·Pairs

Formal Debate: Convenience vs. Security in School Networks

Students debate a proposal: the school should require device registration and certificate-based authentication for all Wi-Fi connections, eliminating the shared password. One side argues for security; the other argues for ease of access for guests and new devices. Students must address the specific technical mechanisms involved, not just abstract preferences.

35 min·Whole Class

Gallery Walk: Mobile Security Threat Scenarios

Post scenario cards describing real mobile security incidents , rogue access points, evil twin attacks, cellular IMSI catchers. Students rotate and write on sticky notes what vulnerability was exploited and what countermeasure would apply. A debrief focuses on which threats are most relevant in students' daily environment and how they can protect themselves.

35 min·Small Groups

Real-World Connections

  • Network administrators at a university must configure Wi-Fi security to balance student access with protection against unauthorized network intrusion, considering the need for WPA3 compatibility with newer devices while supporting older ones.
  • Mobile application developers must consider data security when designing apps that transmit information over cellular or Wi-Fi networks, implementing encryption to protect user privacy during transactions or logins.
  • Cybersecurity analysts at a tech company evaluate the security posture of corporate networks, recommending upgrades from WPA2 to WPA3 to mitigate risks associated with sophisticated wireless attacks.

Assessment Ideas

Discussion Prompt

Pose this question to small groups: 'Imagine your school is upgrading its Wi-Fi security to WPA3. What are two benefits and two challenges this change might introduce for students and staff? Be prepared to share your group's conclusions.'

Quick Check

Present students with three scenarios: 1) A coffee shop offering free Wi-Fi, 2) A home network with a password, 3) A corporate office network. Ask them to identify the primary security protocol likely used in each and one specific vulnerability associated with that choice.

Exit Ticket

On an index card, have students write: 1) One key difference between wireless and wired network security. 2) One example of a mobile computing challenge related to network connectivity. 3) A question they still have about wireless security.

Frequently Asked Questions

What are the main differences between WPA2 and WPA3?
WPA3 replaces WPA2-Personal's pre-shared key system with SAE (Simultaneous Authentication of Equals), eliminating offline dictionary attacks. It also provides Forward Secrecy , if an attacker captures traffic and later obtains the password, they still cannot decrypt past sessions. WPA3-Enterprise adds 192-bit security suites for high-sensitivity environments.
What is an evil twin attack?
An attacker sets up a rogue access point with the same network name as a legitimate one. Devices that automatically reconnect to known networks may join the malicious one instead. The attacker can then observe or modify all unencrypted traffic passing through their access point, intercepting credentials and sensitive data.
How do 4G and 5G networks differ from Wi-Fi?
Wi-Fi is a local area technology using unlicensed spectrum, requiring an access point within close range. Cellular networks like 4G and 5G use licensed spectrum and carrier infrastructure to provide wide-area connectivity. Cellular generally offers stronger authentication and encryption than typical public Wi-Fi.
How does active learning help students understand wireless security trade-offs?
Wireless security involves genuine engineering trade-offs , stronger authentication creates compatibility barriers, and encryption overhead affects performance. When students debate whether to deploy WPA3 on a school network and must address specific technical objections, they develop systems thinking that abstract protocol descriptions cannot build.