References
- Editors of IEEE 802.11, "Wireless LAN medium access control (MAC and physical layer (PHY) specification, draft," Standard IEEE 802.11, 1997.
- I. Kim, J. Cho, T. Shon, and J. Moon, "A method for detecting unauthorized access point over 3G network," J. The Korea Institute of Information Security & Cryptology(JKIISC), vol. 22, no. 2, pp. 259-266, Apr. 2012.
- S. Kang, D. Nyang, J. Choi, and S. Lee, "Relaying rogue AP detection scheme using SVM," J. The Korea Institute of Information Security & Cryptology(JKIISC), vol. 23, no. 3, pp. 431-444, Jun. 2013. https://doi.org/10.13089/JKIISC.2013.23.3.431
- H. Han, B. Sheng, C. C. Tan, Q. Li, and S. Lu, "A measurement based rogue ap detection scheme," in Proc. INFOCOM, pp. 1593-1601, Rio de Janeiro, Brasil, Apr. 2009.
- H. Han, B. Sheng, C.C. Tan, Q. Li, and S. Lu, "A timing-based scheme for rogue AP detection," IEEE Trans. Parallel and Distributed Syst., vol. 22, no. 11, pp. 1912-1925, Nov. 2011. https://doi.org/10.1109/TPDS.2011.125
- A. J. Nicholson, Y. Chawathe, M. Y. Chen, B. D. Noble, and D. Wetherall, "Improved access point selection," in Proc. MobiSys '06, pp. 233-245, NY, Jun. 2006.
- D. Denning and P. Macdoran, "Location-based authentication: Grouding cyberspace for better security," Computer Fraud & Security, vol. 2, pp. 12-16, Feb. 1996.
- H. Takamizawa and K. Kaijiri, "A web authentication system using location information from mobile telephones," in Proc. IASTED Int'l Conf. Web-based Education, pp. 31-36, Phuket, Thailand, Mar. 2009.
- F. Zhang, A. Kondoro, and S. Muftic, "Location-based authentication and authorization using smart phones," in Proc. Trust, Security and Privacy in Computing and Commun. (TrustCom), pp. 1285-1292, Liverpool, UK, Jun. 2012.
- Korea Internet & Security Agency, Wireless LAN security guide, Dec. 2011.
- SKT, T Wi-Fi zone, Retrieved Dec., 5, 2013, from http://www.twifi.co.kr/.
- KT, olleh Wi-Fi zone, Retrieved Dec., 5, 2013, from http://zone.wifi.olleh.com/.
- LG U+, U+ Wi-Fi zone, Retrieved Dec. 5, 2013, from http://www.wifiworld.co.kr/main.s2.
- Daum DNA Developer Network, Local API, Retrieved Dec. 5, 2013, from http://dna.daum.net/apis/local.
- Naver Developer Center, Map API, Retrieved Dec. 5, 2013, from http://developer.naver.com/wiki/pages/MapAPI.
- Google Developers, Google Maps API, Retrieved Dec. 5, 2013, from https://developers.google.com/maps/.
- IEEE Report 802.11-03/845r1. (2003). Receiver sensitivity tables for MIMO-OFDM 802.11n, Nov. 2003.
- J. M. Keenan, and A. J. Motley, "Radio coverage in buildings," J. British Telecom Technol., vol. 8, no. 1, pp. 19-24, Jan. 1990.
- B. Schneier, Applied Cryptography, Second Edition, John Wiley & Sons, 1996.
- E. Spafford, "Opus: Preventing weak password choices," Computer and Security, vol. 11, pp. 273-278, May 1992. https://doi.org/10.1016/0167-4048(92)90207-8
- Y. Maeng, K. Kang, D. Nyang, and K. Lee, "On nessage length efficiency of two security schemes using bloom filter", KIPS Trans.: Part C, vol. 19C, no, 3, pp. 173-178, Jun. 2012. https://doi.org/10.3745/KIPSTC.2012.19C.3.173
- S. von Watzdorf and F. Michahelles, "Accuracy of positioning data on smartphones," in Proc. 3rd Int'l Workshop on Location and the Web (LOCWEB), Article no. 2, NY, USA, Nov. 2010.
- Ministry of Science, ICT and Future Planning, Plan to increase the number of public Wi-Fi zones to 12,000 by 2017, Retrieved Jul., 12, 2013, from http://www.msip.go.kr.