Wireless security tools perform security analysis in sensors scattered throughout a wireless LAN or in a central server, but both options have drawbacks. With a server-centric approach, raw data is ...