Reading the paper on the attack it would seem you need about 4,000,000 packets (assuming you have selected a truely random key, which I have) to mount an attack. My WLAN is very, very lightly used. I average less than a packet a second, even my five minute averages rarely peak at more than 5 packets a second. So even collecting at my peak times it would take over 200 hours to collect 4,000,000 packets.

Is my math correct ?
_________________________
Remind me to change my signature to something more interesting someday