Hi, I'm using BT2 with upgraded aircrack suit (ver 0.9.3)

I have an atheros chipset and I successfuly started it in monitor mode with
airmon-ng stop ath0
airmon-ng start wifi0 3
I have tried "Interactive packet replay"
with the command:
aireplay-ng -2 -b <AP MAC> -d FF:FF:FF:FF:FF:FF -t 1 ath0
I have checked the injected packets with a true wifi sniffer.
they seemed to be fine.

the destination MAC was FF:FF:FF:FF:FF:FF
and the source MAC was the same MAC of the associated client.
and my REAL MAC was not mentioned in the injected packets.

so , everything seems to be OK, since in this kind of attack I don't need to associate my REAL MAC, right?

but I didn't succeed to increase the IVs.

so, whats going on here?
why the AP does not respond to those injected packets?

mybe some security settings in the AP ?
as I know , I configured the AP without additional securtiy settings.. but since I'm newbie , whos knows..