Research Article

On WPA2-Enterprise Privacy in High Education and Science

Figure 2

Implementation setup of our passive and active attacker based on Raspberry Pi device and two external antennas.