From: Client-side rogue access-point detection using a simple walking strategy and round-trip time analysis
Method
Running time
Yang et al. [29]
\({\mathcal {O}}(n^2 \log n)\)
Kitisriworapan et al. [24]
Han et al. [27, 28]
\({\mathcal {O}}(n^2)\)
Ours
\({\mathcal {O}}(n\log n)\)