from a wireless user is already authenticated with
access point [9], [10]. Attacker will send a wireless
message to the user disassociate with him as if
coming from the access point. Wireless users will
think that the connection to the access point has been
lost, but maintained that the access point is still
connected to her wireless user. Then the attacker will
use the MAC address and IP address to connect to
the access point act as the user wireless [