Research Article

Design of Cyberwar Laboratory Exercises to Implement Common Security Attacks against IEEE 802.11 Wireless Networks

Figure 15

Bit structure of forgery control frames generated by the attacker team.
218271.fig.0015