A generalized approach of design and analysis, of an authentication protocol, which is cost effective, robust and easy to be implemented in real time is presented in this book. This protocol is coupled with secure and fast authentication features and especially designed for large scale enterprise wireless networks.