This document discusses IEEE 802.11i wireless LAN security and wireless transport layer security (WTLS). It describes the authentication, access control, and privacy services provided by IEEE 802.11i. It also explains the five phases of operation: discovery, authentication, key generation and distribution, protected data transfer, and connection termination. Additionally, it outlines the features of WTLS, including data integrity, privacy, authentication, and denial-of-service protection. WTLS uses sessions and connections to securely transmit data between wireless devices and gateways.