Methods in this category suffer largely in overall effectiveness (due to not having enough wireless detection coverage) as well as poor scalability and high deployment, maintenance, and management costs. Further, they require different detection methods for layer-2 and layer-3 access points [13, 14] and,
in some cases, rely on manual inspection of data.