Chapter 5 Attacks on the WLAN Infrastructure