The 802.11 Timeline

The 802.11 Timeline: From 1997 to WiFi 7

The Beginning - 802.11 Original (1997)

The first 802.11 standard was ratified by the IEEE in 1997. It specified two physical layer options: Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS), both operating in the 2.4 GHz ISM band. Maximum data rate: 2 Mbps.

By modern standards, 2 Mbps is absurdly slow. But in 1997, wired Ethernet was running at 10 Mbps, and the idea of wireless networking at any speed was remarkable. The original 802.11 was designed for warehouse inventory systems and campus networks where pulling cable was impractical.

Security was an afterthought. The standard included WEP (Wired Equivalent Privacy), which used RC4 encryption with 40-bit or 104-bit keys. WEP was broken almost immediately after deployment. The initialization vector was too short, the key scheduling algorithm was flawed, and the same key was shared among all devices. WEP could be cracked in minutes with tools like aircrack-ng.

The First Wave - 802.11a and 802.11b (1999)

Two standards arrived in 1999, each taking a different approach.

802.11b stayed on 2.4 GHz and used DSSS with CCK (Complementary Code Keying) modulation. Maximum rate: 11 Mbps. This was the standard that made WiFi a consumer technology. It was cheap to manufacture, had decent range, and 11 Mbps was fast enough for web browsing and email. The "WiFi" brand name was created by the Wi-Fi Alliance specifically to market 802.11b products.

802.11a moved to the 5 GHz band and introduced OFDM (Orthogonal Frequency Division Multiplexing). Maximum rate: 54 Mbps. Despite being faster and operating on a less crowded band, 802.11a failed commercially. The 5 GHz equipment was expensive, the range was shorter than 2.4 GHz, and most consumer devices only supported 802.11b. 802.11a found its niche in enterprise networks where the higher speed and cleaner spectrum justified the cost.

Going Mainstream - 802.11g (2003)

802.11g combined the best of both worlds: OFDM modulation (from 802.11a) on the 2.4 GHz band (from 802.11b). Maximum rate: 54 Mbps. It was backward-compatible with 802.11b devices, which made migration painless.

This was the standard that put WiFi in every home. Linksys WRT54G routers running 802.11g became one of the best-selling networking products in history. The WRT54G also became famous in the security community when its Linux firmware was released as open source, spawning DD-WRT and OpenWrt.

Security still used WEP by default on most devices, though WPA (Wi-Fi Protected Access) was introduced in 2003 as a stopgap before the full 802.11i security standard was complete.

gantt
    title 802.11 Standard Timeline
    dateFormat YYYY
    axisFormat %Y
    section Standards
    802.11 Original (2 Mbps)       :1997, 2000
    802.11b (11 Mbps)              :1999, 2004
    802.11a (54 Mbps - 5GHz)       :1999, 2004
    802.11g (54 Mbps - 2.4GHz)     :2003, 2009
    802.11n / WiFi 4 (600 Mbps)    :2009, 2014
    802.11ac / WiFi 5 (6.9 Gbps)   :2013, 2020
    802.11ax / WiFi 6 (9.6 Gbps)   :2020, 2024
    802.11be / WiFi 7 (46 Gbps)    :2024, 2030
    section Security
    WEP                            :1997, 2004
    WPA                            :2003, 2006
    WPA2                           :2004, 2020
    WPA3                           :2018, 2030

The timeline of 802.11 standards and WiFi security protocols from 1997 to present

The MIMO Revolution - 802.11n / WiFi 4 (2009)

802.11n was the biggest leap in WiFi technology. It introduced MIMO (Multiple Input, Multiple Output) - using multiple antennas to send and receive multiple data streams simultaneously. With up to four spatial streams and 40 MHz channel bonding, the theoretical maximum rate jumped to 600 Mbps.

Key innovations: MIMO spatial multiplexing (multiple parallel data streams), dual-band operation (2.4 GHz and 5 GHz), 40 MHz channel width (double the 20 MHz of previous standards), frame aggregation (sending multiple frames in one transmission), and block acknowledgments (confirming multiple frames at once).

802.11n also changed security research. MIMO makes passive sniffing harder because the receiver needs to be able to decode spatial streams. A single-antenna sniffer cannot capture all data from a multi-stream MIMO transmission. This pushed researchers toward dedicated multi-antenna capture setups.

WiFi 4 remains widely deployed in 2026. Most IoT devices - smart plugs, sensors, cheap cameras - use 802.11n on 2.4 GHz because the chips are cheap and the range is good. The BLEShark Nano's 2.4 GHz scanner sees these devices every day.

Speed Surge - 802.11ac / WiFi 5 (2013)

802.11ac moved exclusively to 5 GHz and pushed throughput to new levels. Wave 1 (2013) delivered up to 1.3 Gbps with 80 MHz channels and three spatial streams. Wave 2 (2016) added MU-MIMO (Multi-User MIMO), 160 MHz channels, and a fourth spatial stream, reaching a theoretical 6.9 Gbps.

Key changes: 5 GHz only (no 2.4 GHz in the specification), MU-MIMO for simultaneous downlink to multiple clients, 256-QAM modulation (more bits per symbol), beamforming as a standard feature (focusing signal toward specific clients).

The 5 GHz-only specification is important for security researchers. Tools that operate on 2.4 GHz - including the BLEShark Nano and many ESP32-based tools - cannot see 802.11ac traffic. In practice, most routers run dual-band, transmitting 802.11n on 2.4 GHz and 802.11ac on 5 GHz simultaneously. But 5 GHz-only clients are invisible to 2.4 GHz scanners.

Efficiency First - 802.11ax / WiFi 6 (2020)

WiFi 6 optimized for environments with many devices rather than just raw speed. Its theoretical maximum of 9.6 Gbps was a modest increase over WiFi 5, but the real improvements were in efficiency and coexistence.

OFDMA (Orthogonal Frequency Division Multiple Access) allows a single transmission to serve multiple clients simultaneously by dividing the channel into smaller resource units. TWT (Target Wake Time) lets devices schedule their transmissions and sleep between them, dramatically improving battery life for IoT devices. BSS Coloring reduces interference between overlapping networks by tagging frames so devices can ignore signals from neighboring networks.

WiFi 6 returned to dual-band operation (2.4 GHz and 5 GHz), unlike WiFi 5's 5 GHz-only approach. 1024-QAM modulation increased the data per symbol by 25% over WiFi 5's 256-QAM.

For security: WPA3 became mandatory for WiFi 6 certified devices. This means WiFi 6 networks increasingly use SAE (Simultaneous Authentication of Equals) instead of PSK, making traditional handshake capture and offline cracking significantly harder.

graph TD
    subgraph "WiFi Generation Comparison"
        subgraph "WiFi 4 - 802.11n"
            A1[600 Mbps max]
            A2[2.4 + 5 GHz]
            A3[MIMO - 4 streams]
            A4[WPA2]
        end
        subgraph "WiFi 5 - 802.11ac"
            B1[6.9 Gbps max]
            B2[5 GHz only]
            B3[MU-MIMO - downlink]
            B4[WPA2]
        end
        subgraph "WiFi 6 - 802.11ax"
            C1[9.6 Gbps max]
            C2[2.4 + 5 GHz]
            C3[OFDMA + MU-MIMO]
            C4[WPA3 mandatory]
        end
        subgraph "WiFi 7 - 802.11be"
            D1[46 Gbps max]
            D2[2.4 + 5 + 6 GHz]
            D3[MLO + 4096-QAM]
            D4[WPA3 mandatory]
        end
    end

Key specifications across the four most recent WiFi generations

Everything at Once - 802.11be / WiFi 7 (2024)

WiFi 7 introduces Multi-Link Operation (MLO), which allows a device to use multiple frequency bands simultaneously. A WiFi 7 device can transmit on 2.4 GHz, 5 GHz, and 6 GHz at the same time, aggregating bandwidth and providing seamless failover if one band becomes congested.

Other improvements: 320 MHz channel width (double WiFi 6's maximum), 4096-QAM modulation, up to 16 spatial streams, and multi-RU (resource unit) puncturing that allows channels to work around occupied frequencies rather than avoiding them entirely.

The theoretical maximum of 46 Gbps is unlikely to be achieved in practice - it requires 16 spatial streams across 320 MHz channels with 4096-QAM. Real-world WiFi 7 devices in 2026 typically achieve 2-5 Gbps, which is still a significant improvement over WiFi 6.

WiFi 7 uses the 6 GHz band extensively (where regulatory approval exists). Security on 6 GHz requires WPA3 - WPA2 is not permitted. This means the 6 GHz band is inherently more secure than 2.4 GHz or 5 GHz, where legacy WPA2 devices still operate.

Security Evolution: WEP to WPA3

WiFi security has evolved through four major phases, each responding to the failures of its predecessor.

WEP (1997-2004): Broken by design. Static shared keys, weak IV, no per-packet key mixing. Crackable in minutes. Should never be used.

WPA (2003-2004): Emergency fix for WEP. Added TKIP (Temporal Key Integrity Protocol) for per-packet key mixing. Better than WEP, but TKIP itself had vulnerabilities. Was always intended as a temporary solution.

WPA2 (2004-present): Replaced TKIP with AES-CCMP encryption. Robust against most attacks when configured properly with a strong passphrase. Vulnerable to offline dictionary attacks via captured 4-way handshakes (the PMKID attack made this easier). Also vulnerable to KRACK (Key Reinstallation Attack) discovered in 2017, which was patched via software updates.

WPA3 (2018-present): Replaces PSK with SAE (Simultaneous Authentication of Equals), which provides forward secrecy and resistance to offline dictionary attacks. Even if an attacker captures the authentication exchange, they cannot perform offline cracking. Also adds Protected Management Frames (PMF) as mandatory, making deauthentication attacks harder (but not impossible on mixed networks).

flowchart LR
    subgraph "WiFi Security Timeline"
        A["WEP
        1997
        RC4 + static key
        BROKEN"] -->|Replaced by| B["WPA
        2003
        TKIP
        Temporary fix"]
        B -->|Replaced by| C["WPA2
        2004
        AES-CCMP
        Strong but PSK crackable"]
        C -->|Replaced by| D["WPA3
        2018
        SAE + PMF
        Forward secrecy"]
    end
    subgraph "Attack Evolution"
        E[WEP cracking - minutes] --> F[WPA TKIP attacks]
        F --> G[WPA2 PMKID + handshake]
        G --> H[WPA3 - no offline crack]
    end

WiFi security protocols and their weaknesses through four generations

What Comes Next

802.11bn (WiFi 8) is in early development. Expected features include coordinated multi-AP operation (access points working together as a single system), AI-driven resource allocation, and further improvements to latency for real-time applications.

For security researchers, the trend is clear: each generation makes passive attacks harder. WPA3's SAE eliminates offline dictionary attacks. Mandatory PMF reduces deauthentication effectiveness. The 6 GHz band requires WPA3 and excludes legacy devices. Tools that focus on 2.4 GHz WPA2 networks - including the BLEShark Nano - remain useful because billions of legacy devices will run WPA2 on 2.4 GHz for years to come. But the window for traditional WiFi security testing is gradually closing as WPA3 adoption grows.

Get the BLEShark Nano - $36.99+
Back to blog

Leave a comment