{"id":1484,"date":"2023-02-25T03:26:42","date_gmt":"2023-02-25T03:26:42","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1484"},"modified":"2023-02-25T03:26:42","modified_gmt":"2023-02-25T03:26:42","slug":"%eb%aa%a8%eb%b0%94%ec%9d%bc-%ec%84%bc%ec%8b%b1-wifi-%ec%8b%a4%eb%82%b4-%ec%9c%84%ec%b9%98-%ed%99%95%ec%9d%b8","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ko\/%ea%b8%b0%ec%88%a0\/%eb%aa%a8%eb%b0%94%ec%9d%bc-%ec%84%bc%ec%8b%b1-wifi-%ec%8b%a4%eb%82%b4-%ec%9c%84%ec%b9%98-%ed%99%95%ec%9d%b8\/","title":{"rendered":"\ubaa8\ubc14\uc77c \uac10\uc9c0: WiFi \uc2e4\ub0b4 \ub85c\uceec\ub77c\uc774\uc81c\uc774\uc158"},"content":{"rendered":"<h2 class=\"wp-block-heading\" id=\"introduction\">\uc18c\uac1c<\/h2>\n\n\n<p>\ucd5c\uadfc \uba87 \ub144 \ub3d9\uc548 \uc704\uce58 \ubb38\uc81c\ub294 \uc810\uc810 \ub354 \uc911\uc694\ud574\uc84c\uc2b5\ub2c8\ub2e4. Google Maps\uc640 \uac19\uc740 \uc11c\ube44\uc2a4\ub294 \uc704\uc131\uc744 \uc0ac\uc6a9\ud558\uc5ec \uc804 \uc138\uacc4 \uc5b4\ub514\uc5d0\uc11c\ub098 \ud2b9\uc815 \uc9c0\uc810\uc744 \uc27d\uac8c \ud0d0\uc0c9\ud558\uace0 \ucc3e\uc744 \uc218 \uc788\uac8c \ud588\uc2b5\ub2c8\ub2e4. \uc774\ub7ec\ud55c \uc2dc\uc2a4\ud15c\uc774 \uc774\ubbf8 \uc57c\uc678\uc5d0\uc11c \uc815\ud655\ud558\uac8c \uc791\ub3d9\ud558\uae30 \ub54c\ubb38\uc5d0 \ub2e4\uc74c \ub2e8\uacc4\ub294 \ubc15\ubb3c\uad00\uc774\ub098 \uc0c1\uc5c5 \uc13c\ud130\uc640 \uac19\uc740 \uac74\ubb3c \ub0b4\ubd80\uc5d0\uc11c \uc720\uc0ac\ud55c \uae30\uc220\uc744 \uc801\uc6a9\ud558\ub294 \uac83\uc785\ub2c8\ub2e4. \uc544\ub0a0\ub85c\uadf8 \uc2dc\uc2a4\ud15c\uc740 \uc0ac\ub78c\ub4e4\uc744 \ubc15\ubb3c\uad00\uc758 \uc608\uc220 \uc791\ud488\uacfc \uac19\uc740 \uad00\uc2ec \uc7a5\uc18c\ub85c \uc548\ub0b4\ud558\uac70\ub098 \uc1fc\ud551 \uc13c\ud130\uc758 \ub9e4\uc7a5\uc744 \uc9c0\ub098\uac08 \ub54c \uad11\uace0\uc640 \uac19\uc740 \uc704\uce58 \uae30\ubc18 \ucf58\ud150\uce20\ub97c \uc81c\uacf5\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \ud3d0\uc1c4\ub41c \ud658\uacbd\uc5d0\uc11c\ub294 \uc704\uc131 \uc815\ud655\ub3c4\uac00 \ub0ae\uc544 \ud6a8\uacfc\uc801\uc778 \uc704\uce58 \ud30c\uc545\uc744 \uc704\ud574 \ub2e4\ub978 \uae30\uc220\uc744 \uc0ac\uc6a9\ud574\uc57c \ud569\ub2c8\ub2e4.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"indoor-location-technology\">\uc2e4\ub0b4 \uc704\uce58 \uae30\uc220<\/h2>\n\n\n<p>\uc2e4\ub0b4 \uc704\uce58 \uae30\ubc18 \uc11c\ube44\uc2a4\ub294 2020\ub144\uae4c\uc9c0 \uc2dc\uc7a5 \uac00\uce58\uac00 100\uc5b5 \ub2ec\ub7ec\uc5d0 \ub2ec\ud560 \uac83\uc73c\ub85c \uc608\uc0c1\ub418\ub294 \ub4f1 \uc0ac\ud68c\uc801, \uae08\uc804\uc801 \uc911\uc694\uc131\uc73c\ub85c \uc778\ud574 \ud070 \uad00\uc2ec\uc744 \ubd88\ub7ec\uc77c\uc73c\ud0a4\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uc2e4\ub0b4 \ud658\uacbd\uc5d0\uc11c\ub294 GPS\uc758 \ube44\ud6a8\uc728\uc131\uc73c\ub85c \uc778\ud574 WiFi\ub098 Bluetooth\uc640 \uac19\uc740 \ub300\uccb4 \uae30\uc220\uc774 \ud544\uc694\ud569\ub2c8\ub2e4. \ube44\ucf58\uc740 \ud56d\uc0c1 \ub2e4\ub978 BLE \ud638\ud658 \ub514\ubc14\uc774\uc2a4\uc5d0\uc11c \ud3ec\ucc29\ud560 \uc218 \uc788\ub294 \uc2e0\ud638\ub97c \ubcf4\ub0c5\ub2c8\ub2e4. \ube44\ucf58\uc740 \uc800\ub834\ud558\uace0 \uc5d0\ub108\uc9c0 \uc0ac\uc6a9\ub7c9\uc774 \uc801\uc73c\uba70 \uc124\uce58\uac00 \uac04\ud3b8\ud558\uae30 \ub54c\ubb38\uc5d0 \uc704\uce58 \ucd94\uc801 \uc2dc\uc2a4\ud15c\uc5d0 \uc801\ud569\ud569\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \ubb34\uc120 \uae30\uc220\uc744 \uc0ac\uc6a9\ud558\ub294 \uae30\uc874\uc758 \ub2e4\uc591\ud55c \uc2e4\ub0b4 \ucd94\uc801 \uc54c\uace0\ub9ac\uc998\uc740 \uc815\ud655\ub3c4\uac00 \ub5a8\uc5b4\uc9c0\ub294 \uacbd\uc6b0\uac00 \ub9ce\uc2b5\ub2c8\ub2e4. WiFi \ub124\ud2b8\uc6cc\ud06c\uc5d0\uc11c RSSI \uce21\uc815\uc744 \uae30\ubc18\uc73c\ub85c \ud558\ub294 \uc54c\uace0\ub9ac\uc998\uc740 \ub9e4 \uc21c\uac04 \uce21\uc815\ub418\ub294 \uc2e0\ud638\uc758 \ubcc0\ud654\uac00 \ud06c\uae30 \ub54c\ubb38\uc5d0 \uc77c\ubc18\uc801\uc73c\ub85c \ubd80\uc815\ud655\ud569\ub2c8\ub2e4. WiFi\uc758 \uc5ec\ub7ec \uce21\uba74\uc774 \uac1c\uc120\ub418\uace0 \uc788\uc9c0\ub9cc \uc815\ud655\ub3c4\ub294 \uc544\uc9c1 \uac08 \uae38\uc774 \uba40\ub2e4.&nbsp;<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"wireless-communications\">\ubb34\uc120 \ud1b5\uc2e0<\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Wireless-Communications-banner-1-1-2.jpg\" alt=\"\ubb34\uc120 \ud1b5\uc2e0\" class=\"wp-image-1502\"\/><\/figure>\n\n\n\n<div style=\"height:18px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>\ubb34\uc120 \ud1b5\uc2e0\uc5d0\uc11c\ub294 \uc815\ubcf4\ub97c \uc804\uc1a1\ud558\ub294 \ub9e4\uccb4\uac00 \ud56d\uc0c1 \uacf5\uc720\ub429\ub2c8\ub2e4. \uc774\ub294 \uc720\uc120 \uae30\uc220\uacfc\ub294 \ud070 \ucc28\uc774\uc810\uc785\ub2c8\ub2e4. \uc8fc\ud30c\uc218 \ub300\uc5ed \uc911\ucca9\uacfc \uac04\uc12d\uc744 \ud53c\ud558\ub824\uba74 \uacf5\uac04 \uc0ac\uc6a9 \ubc29\uc2dd\uc5d0 \ub300\ud55c \uc5c4\uaca9\ud55c \uaddc\uce59\uc774 \uc788\uc5b4\uc57c \ud569\ub2c8\ub2e4. \uac01 \ucc38\uc5ec \uc7a5\uce58\uc5d0\uc11c \uc0ac\uc6a9\ud558\ub294 \ud1b5\uc2e0 \ud504\ub85c\ud1a0\ucf5c\uc740 \ub9e4\uccb4\uc5d0 \ub300\ud55c \uc561\uc138\uc2a4\ub97c \uc870\uc815\ud569\ub2c8\ub2e4. \ubb34\uc120 \ub124\ud2b8\uc6cc\ud06c\uc758 \ud6a8\uc728\uc131\uc740 \ub124\ud2b8\uc6cc\ud06c\ub97c \uacf5\uc720\ud558\ub294 \ucef4\ud4e8\ud130\uc758 \uc218, \ud658\uacbd \uc870\uac74, \uc804\uc790\uae30 \uac04\uc12d, \uc7a5\uc560\ubb3c, \uc9c0\uc5f0 \uc2dc\uac04 \ub4f1 \uc5ec\ub7ec \uc694\uc778\uc5d0 \ub530\ub77c \ub2ec\ub77c\uc9d1\ub2c8\ub2e4. <\/p>\n\n\n\n<p>\ucd5c\ub300 \ub370\uc774\ud130 \uc804\uc1a1 \uc18d\ub3c4\ub294 \ud504\ub808\uc784\uc758 \uc77c\ubd80\uac00 \ub9e4\uccb4\uc5d0 \ub300\ud55c \uc561\uc138\uc2a4 \uc81c\uc5b4, \ud750\ub984 \uc81c\uc5b4, \uc554\ud638\ud654 \ub4f1\uc5d0 \ub300\ud55c \uc815\ubcf4\ub85c \ucc44\uc6cc\uc9c0\uae30 \ub54c\ubb38\uc5d0 \ucd5c\ub300 \"\uc720\uc6a9\ud55c\" \ub370\uc774\ud130 \uc804\uc1a1 \uc18d\ub3c4\ub97c \uacb0\ucf54 \ub098\ud0c0\ub0b4\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4. \uc2e4\uc81c \ub370\uc774\ud130 \uc804\uc1a1 \uc18d\ub3c4\ub294 \ud56d\uc0c1 \ud45c\uc900\uc5d0 \uc815\uc758\ub41c \uac83\ubcf4\ub2e4 \ub0ae\uc2b5\ub2c8\ub2e4. \ubb34\uc120 \ub124\ud2b8\uc6cc\ud06c\ub294 \ubb34\uc120\uc73c\ub85c \ube0c\ub85c\ub4dc\uce90\uc2a4\ud2b8\ub418\uae30 \ub54c\ubb38\uc5d0 \ubcf4\uc548\uc774 \uc911\uc694\ud55c \uc694\uc18c\uac00 \ub418\uba70, \ubb34\ub2e8 \uc561\uc138\uc2a4\ub97c \ubc29\uc9c0\ud558\uae30 \uc704\ud574 \uc778\uc99d \ubc0f \ub370\uc774\ud130 \uc554\ud638\ud654\uac00 \ud544\uc694\ud569\ub2c8\ub2e4.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"wifi-indoor-localization\">WiFi \uc2e4\ub0b4 \ub85c\uceec\ub77c\uc774\uc81c\uc774\uc158<\/h2>\n\n\n<p>\ubb34\uc120 \ucda9\uc2e4\ub3c4\uc758 \uc57d\uc790\uc778 Wi-Fi\ub294 \uc11c\ub85c \ub2e4\ub978 \uc7a5\uce58 \uac04\uc5d0 \ud638\ud658\ub418\ub294 \ubb34\uc120 \uc5f0\uacb0 \uba54\ucee4\ub2c8\uc998\uc744 \uad6c\ucd95\ud574\uc57c \ud560 \ud544\uc694\uc131\uc5d0\uc11c \ud0c4\uc0dd\ud588\uc2b5\ub2c8\ub2e4. \uc989, Wi-Fi\ub294 \uc561\uc138\uc2a4 \ud3ec\uc778\ud2b8(AP) \ub610\ub294 \ud56b\uc2a4\ud31f\uc73c\ub85c \uc54c\ub824\uc9c4 \uc7a5\uce58\ub97c \ud1b5\ud574 \uc0ac\uc6a9\uc790\uac00 \uc11c\ub85c \ubb34\uc120\uc73c\ub85c \uc5f0\uacb0\ud560 \uc218 \uc788\ub294 \ubb34\uc120 \uae30\uc220\uc785\ub2c8\ub2e4. \uc77c\ubc18\uc801\uc73c\ub85c 2.4GHz \ubc0f 5GHz \uc8fc\ud30c\uc218\uc5d0\uc11c \uc791\ub3d9\ud558\uba70 \uc804\uae30\uc804\uc790\uae30\uc220\uc790\ud611\ud68c(IEEE)\uc5d0\uc11c \ud45c\uc900\ud654\ud588\uc2b5\ub2c8\ub2e4. \uc218\ub144\uc5d0 \uac78\uccd0 \uc218\ub9ce\uc740 WiFi \ud504\ub85c\ud1a0\ucf5c \ud45c\uc900\uc774 \uac1c\ubc1c\ub418\uc5b4 \uc774\uc804 \ud504\ub85c\ud1a0\ucf5c\uc758 \uc5ec\ub7ec \uce21\uba74\uc774 \uac1c\uc120\ub418\uc5c8\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-evolution-of-wifi-technology\">Wi-Fi \uae30\uc220\uc758 \uc9c4\ud654<\/h2>\n\n\n<p>\ucd5c\ucd08\uc758 \uacf5\uc2dd \ud45c\uc900\uc740 802.11b\uc600\uc73c\uba70, 802.11a, 802.11g, 802.11n \ubc0f 802.11ac\uac00 \uadf8 \ub4a4\ub97c \uc774\uc5c8\uc2b5\ub2c8\ub2e4. b\uc640 g \ubc84\uc804\uc740 2.4GHz \ub300\uc5ed\uc5d0\uc11c \uc791\ub3d9\ud558\uba70 \uac00\uc7a5 \ub110\ub9ac \uc0ac\uc6a9\ub429\ub2c8\ub2e4. 2019\ub144\uc5d0\ub294 802.11ax(Wi-Fi 6\ub77c\uace0 \ud568)\uac00 \ucd9c\uc2dc\ub418\uc5c8\ub294\ub370, 802.11ac\ubcf4\ub2e4 \uc131\ub2a5\uc774 4\ubc30 \ub354 \ub6f0\uc5b4\ub09c \uac83\uc73c\ub85c \ucd94\uc815\ub429\ub2c8\ub2e4. 5GHz \ub124\ud2b8\uc6cc\ud06c\ub294 2.4GHz\ubcf4\ub2e4 \uc18d\ub3c4\uac00 \ube60\ub974\uc9c0\ub9cc \ubcbd\uc774\ub098 \uac00\uad6c\uc640 \uac19\uc740 \uc7a5\uc560\ubb3c\uc744 \ud1b5\uacfc\ud558\ub294 \ub370 \ud6a8\uc728\uc801\uc774\uc9c0 \uc54a\uc544 \ucee4\ubc84\ub9ac\uc9c0 \ubc94\uc704\uac00 \ub354 \uc881\uc2b5\ub2c8\ub2e4. \ud3c9\uade0 Wi-Fi \ub124\ud2b8\uc6cc\ud06c\uc758 \ubc94\uc704\ub294 \uc2e4\uc678 300\ud53c\ud2b8, \uc2e4\ub0b4 150\ud53c\ud2b8\uc785\ub2c8\ub2e4.<\/p>\n\n\n\n<p>Wi-Fi \ub124\ud2b8\uc6cc\ud06c\ub97c \ud3ec\uc9c0\uc154\ub2dd\uc5d0 \uc0ac\uc6a9\ud558\ub294 \uc8fc\uc694 \uc774\uc810\uc740 \uc778\ud504\ub77c\uac00 \uc774\ubbf8 \uac74\ubb3c\uc5d0 \uc788\ub2e4\ub294 \uac83\uc785\ub2c8\ub2e4.\uac00\uc815 \ubc0f \ube44\uc988\ub2c8\uc2a4\uc6a9 \ubb34\uc120 \ub124\ud2b8\uc6cc\ud06c\uc758 \uae09\uc18d\ud55c \uc131\uc7a5\uc73c\ub85c \uc778\ud574 \ud55c \uac74\ubb3c\uc5d0\uc11c \ub450 \uac1c \uc774\uc0c1\uc758 Wi-Fi \uc561\uc138\uc2a4 \ud3ec\uc778\ud2b8\ub97c \ucc3e\ub294 \uac83\uc774 \uc77c\ubc18\uc801\uc785\ub2c8\ub2e4. \uc774\ub7ec\ud55c \uc561\uc138\uc2a4 \ud3ec\uc778\ud2b8\ub294 \uc790\uccb4\uc801\uc73c\ub85c \uc124\uce58\ud558\uac70\ub098 \uadfc\ucc98\uc758 \ub2e4\ub978 \uc7a5\uc18c\uc5d0\uc11c \uac00\uc838\uc62c \uc218 \uc788\uc2b5\ub2c8\ub2e4.\ubc18\uba74\uc5d0 \uac00\uc7a5 \ud070 \ubb38\uc81c\ub294 802.11 \ud504\ub85c\ud1a0\ucf5c\uc774 \uc774\ub7ec\ud55c \ubc29\uc2dd\uc73c\ub85c \uc0ac\uc6a9\ub418\ub3c4\ub85d \ub9cc\ub4e4\uc5b4\uc9c0\uc9c0 \uc54a\uc558\ub2e4\ub294 \uac83\uc785\ub2c8\ub2e4. \ud604\uc7ac \uc704\uce58\ub97c \ucc3e\uc73c\ub824\uba74 \ub9e4\ubc88 \ubaa8\ub4e0 Wi-Fi \uc561\uc138\uc2a4 \ud3ec\uc778\ud2b8\uc5d0 \uc62c\ubc14\ub978 \uc815\ubcf4\ub97c \uc694\uccad\ud558\ub294 \uba54\uc2dc\uc9c0\ub97c \ubcf4\ub0b4\uc57c\ud558\ubbc0\ub85c \ub124\ud2b8\uc6cc\ud06c \uc18d\ub3c4\uac00 \ub290\ub824\uc9c0\uace0 \ud0c0\uc0ac\uc5d0 \uc18d\ud55c \uc77c\ubd80 \uc561\uc138\uc2a4 \ud3ec\uc778\ud2b8\uac00 \uc774\ub7ec\ud55c \uc694\uccad\uc744 \ucc28\ub2e8\ud558\ub294 \uacbd\uc6b0\uac00 \ubc1c\uc0dd\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>IEEE 802.11 \ubb34\uc120 \ud45c\uc900\uc740 CSMA\/CA(\ucda9\ub3cc \ud68c\ud53c \uae30\ub2a5\uc774 \uc788\ub294 \uce90\ub9ac\uc5b4 \uac10\uc9c0 \ub2e4\uc911 \uc561\uc138\uc2a4)\ub77c\ub294 \ub9e4\uccb4 \uc561\uc138\uc2a4 \ud504\ub85c\ud1a0\ucf5c\uc744 \uc0ac\uc6a9\ud569\ub2c8\ub2e4. \uc774\ub984\uc740 \uc720\uc120 \uc774\ub354\ub137 \ub124\ud2b8\uc6cc\ud06c\uc5d0\uc11c \uc0ac\uc6a9\ub418\ub294 \uac83\uacfc \ube44\uc2b7\ud558\uc9c0\ub9cc(CSMA\/CD: \ucda9\ub3cc \uac10\uc9c0 \uae30\ub2a5\uc774 \uc788\ub294 \uce90\ub9ac\uc5b4 \uac10\uc9c0 \ub2e4\uc911 \uc561\uc138\uc2a4), \uc791\ub3d9 \ubc29\uc2dd\uc740 \ub2e4\ub985\ub2c8\ub2e4. \ubb34\uc120\uc758 \uacbd\uc6b0 CA\ub294 \ucda9\ub3cc \ud68c\ud53c\ub97c \uc758\ubbf8\ud558\uc9c0\ub9cc \uc774\ub354\ub137\uc5d0\uc11c\ub294 \ucda9\ub3cc \uac10\uc9c0\uc5d0 \uad00\ud55c \uac83\uc785\ub2c8\ub2e4. Wi-Fi \ub124\ud2b8\uc6cc\ud06c\ub294 \ubc18\uc774\uc911 \ubc29\uc2dd\uc774\ubbc0\ub85c \ub514\ubc14\uc774\uc2a4\uac00 \ub3d9\uc77c\ud55c \ubb34\uc120 \ucc44\ub110\uc5d0\uc11c \ub3d9\uc2dc\uc5d0 \uc1a1\uc2e0 \ubc0f \uc218\uc2e0\ud560 \uc218 \uc5c6\uc2b5\ub2c8\ub2e4. \ub514\ubc14\uc774\uc2a4\ub294 \uc804\uc1a1\uacfc \ub3d9\uc2dc\uc5d0 '\uc218\uc2e0'\ud560 \uc218 \uc5c6\uc73c\ubbc0\ub85c \ucda9\ub3cc\uc744 \uac10\uc9c0\ud560 \uc218 \uc5c6\uc2b5\ub2c8\ub2e4. \uc774 \ub54c\ubb38\uc5d0 IEEE \uc804\ubb38\uac00\ub4e4\uc740 DCF(\ubd84\uc0b0 \uc81c\uc5b4 \uae30\ub2a5)\ub77c\ub294 \ucda9\ub3cc \ubc29\uc9c0 \uba54\ucee4\ub2c8\uc998\uc744 \uc0ac\uc6a9\ud588\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"wifi-network-security\">WiFi \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548<\/h2>\n\n\n<p class=\"translation-block\">\uc804\uc1a1 \ub9e4\uccb4\uac00 \uacf5\uae30\uc774\uae30 \ub54c\ubb38\uc5d0 \uc5b4\ub5a4 \uc7a5\uce58\uc5d0\uc11c\ub3c4 \uc790\uc5f0\uc2a4\ub7fd\uac8c \uc811\uadfc\ud560 \uc218 \uc788\uc73c\ubbc0\ub85c \ub124\ud2b8\uc6cc\ud06c \uc811\uadfc\uc774 \uc2b9\uc778\ub41c \uc7a5\uce58\ub85c \uc81c\ud55c\ub418\ub3c4\ub85d \ud558\ub294 \uac83\uc774 \uc911\uc694\ud569\ub2c8\ub2e4. \uc774\ub97c \ub2ec\uc131\ud558\uae30 \uc704\ud574 802.11i \ud45c\uc900\uc740 <strong>WEP<\/strong>, <strong>WPA<\/strong>, <strong>WPA2<\/strong>\uc640 \uac19\uc740 \ub2e4\uc591\ud55c \uc2dc\uc2a4\ud15c\uc744 \uc815\uc758\ud558\uba70, \uc5ec\uae30\uc11c \uc7a5\uce58\ub294 \uc778\uc99d\uc744 \uc704\ud574 \ud0a4\ub97c \uc0ac\uc6a9\ud569\ub2c8\ub2e4. \uc561\uc138\uc2a4 \ud3ec\uc778\ud2b8\ub294 \uc8fc\uae30\uc801\uc73c\ub85c <strong>SSID<\/strong>(Service Set Identifier)\ub97c \ud3ec\ud568\ud55c \uad11\uace0\ub97c \ube0c\ub85c\ub4dc\uce90\uc2a4\ud2b8\ud558\uc5ec \uc0ac\uc6a9\uc790\uac00 \uc62c\ubc14\ub978 AP\ub97c \uc2dd\ubcc4\ud558\uace0 \uc5f0\uacb0\ud560 \uc218 \uc788\ub3c4\ub85d \ud569\ub2c8\ub2e4. \uc5f0\uacb0 \ud504\ub85c\uc138\uc2a4\ub294 \ud0a4\uac00 \uc0dd\uc131\ub418\ub294 \uc778\uc99d \uc808\ucc28\ub85c \uc2dc\uc791\ub429\ub2c8\ub2e4. WiFi \ub124\ud2b8\uc6cc\ud06c\uc5d0\ub294 \uc138 \uac00\uc9c0 \uc720\ud615\uc758 \uc778\uc99d\uc774 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>\uc720\uc120 \ub3d9\ub4f1\ud55c \uac1c\uc778 \uc815\ubcf4 \ud0a4(WEP)<\/strong>:<\/li>\n<\/ol>\n\n\n\n<p>\uc774 \ubcf4\uc548 \uc2dc\uc2a4\ud15c\uc758 \ubaa9\ud45c\ub294 \ubb34\uc120 \ub124\ud2b8\uc6cc\ud06c\ub97c \uc720\uc120 \ub124\ud2b8\uc6cc\ud06c\ub9cc\ud07c \uc548\uc804\ud558\uac8c \ub9cc\ub4dc\ub294 \uac83\uc785\ub2c8\ub2e4. \uc548\ud0c0\uae5d\uac8c\ub3c4 \uc774 \ubcf4\uc548 \uc2dc\uc2a4\ud15c\uc740 \ube60\ub974\uac8c \uc190\uc0c1\ub418\uc5b4 \ud604\uc7ac \uc0ac\uc6a9\uc744 \uad8c\uc7a5\ud558\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4. \uc778\uc99d \ud504\ub85c\uc138\uc2a4\uac00 \uc2dc\uc791\ub420 \ub54c \ud074\ub77c\uc774\uc5b8\ud2b8 \ub514\ubc14\uc774\uc2a4\ub294 \uc554\ud638\ud654\ub418\uc9c0 \uc54a\uc740 \ubb38\uc790 \uba54\uc2dc\uc9c0\ub97c \uc804\uc1a1\ud558\uace0, AP\ub294 \uacf5\uc720 \ud0a4\ub97c \uc0ac\uc6a9\ud558\uc5ec \uc774\ub97c \uc554\ud638\ud654\ud558\uc5ec \ud074\ub77c\uc774\uc5b8\ud2b8\uc5d0 \ubc18\ud658\ud569\ub2c8\ub2e4. \ud0a4\ub294 \uc77c\ubc18\uc801\uc73c\ub85c 128\ube44\ud2b8 \ub610\ub294 256\ube44\ud2b8\uc785\ub2c8\ub2e4. WEP\uc758 \uc8fc\uc694 \ubb38\uc81c\uc810\uc740 \ud0a4 \uad00\ub9ac\uc785\ub2c8\ub2e4. \uc77c\ubc18\uc801\uc73c\ub85c \ud0a4\ub294 \uc218\ub3d9\uc73c\ub85c \ub610\ub294 \ub2e4\ub978 \ubcf4\uc548 \uacbd\ub85c\ub97c \ud1b5\ud574 \ubc30\ud3ec\ub429\ub2c8\ub2e4. WEP\ub294 \uacf5\uc720 \ud0a4\ub97c \uc0ac\uc6a9\ud558\ubbc0\ub85c \ubaa8\ub4e0 \ud074\ub77c\uc774\uc5b8\ud2b8\uc5d0 \ub3d9\uc77c\ud55c \ud0a4\ub97c \uc0ac\uc6a9\ud558\ubbc0\ub85c \ud0a4\uac00 \ubc1c\uacac\ub418\uba74 \ubaa8\ub4e0 \uc0ac\uc6a9\uc790\uac00 \uc704\ud5d8\uc5d0 \ub178\ucd9c\ub429\ub2c8\ub2e4. \ud0a4\ub97c \uc5bb\uc73c\ub824\uba74 \uc778\uc99d \ud504\ub808\uc784\uc744 \ubc18\ud658\ubc1b\uc744 \ub54c\uae4c\uc9c0\ub9cc \uc218\uc2e0 \ub300\uae30\ud558\uba74 \ub429\ub2c8\ub2e4. WEP\ub97c \uc0ac\uc6a9\ud558\ub294 \uac83\uc774 \uc5c6\ub294 \uac83\ubcf4\ub2e4\ub294 \ub0ab\uc9c0\ub9cc, \ub354 \ub098\uc740 \ubc29\ubc95\uc774 \uc5c6\uc744 \ub54c\ub294 \uc0ac\uc6a9\ud558\ub294 \uac83\uc774 \uc88b\uc2b5\ub2c8\ub2e4. SSL, TSL \uc554\ud638\ud654 \ub4f1\uacfc \uac19\uc740 \uc0c1\uc704 \uacc4\uce35\uc758 \ubcf4\uc548\uc744 \uc0ac\uc6a9\ud558\ub294 \uac83\uc774 \uc88b\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li><strong>Wi-Fi \ubcf4\ud638 \uc561\uc138\uc2a4(WPA)<\/strong><\/li>\n<\/ol>\n\n\n\n<p class=\"translation-block\">WEP\uc758 \ubcf4\uc548 \uacb0\ud568\uc744 \uadf9\ubcf5\ud558\uae30 \uc704\ud574 WPA\uac00 \uac1c\ubc1c\ub418\uc5c8\uc2b5\ub2c8\ub2e4. \uc774 \uc2dc\uc2a4\ud15c\uc740 WiFi Alliance\uc758 \ud6c4\uc6d0 \ud558\uc5d0 \uc124\uacc4\ub418\uc5c8\uc73c\uba70 802.11i \ud45c\uc900\uc758 \uc77c\ubd80\ub97c \uc0ac\uc6a9\ud588\uc2b5\ub2c8\ub2e4. \uc774 \ud45c\uc900\uc740 \ub098\uc911\uc5d0 WEP\ub97c \ub300\uccb4\ud558\uae30 \uc704\ud574 \uc5c5\ub370\uc774\ud2b8\ub418\uc5c8\uc2b5\ub2c8\ub2e4. WPA\uc758 \uc8fc\uc694 \uc694\uc18c \uc911 \ud558\ub098\ub294 <strong>TKIP<\/strong>(Temporal Key Integrity Protocol)\uc785\ub2c8\ub2e4. \uc774\ub294 802.11i \ud45c\uc900\uc758 \uc77c\ubd80\uc774\uba70 \ub3d9\uc801 \ud0a4\ub97c \uc0dd\uc131\ud558\uc5ec \uc791\ub3d9\ud569\ub2c8\ub2e4. WPA\ub294 \uc120\ud0dd\uc801\uc73c\ub85c <strong>AES-CCMP<\/strong>(Advanced Encryption Standard \u2013 Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)\ub97c TKIP \ub300\uc2e0 \uc0ac\uc6a9\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li><strong>WPA2\/WPAv2<\/strong>:<\/li>\n<\/ol>\n\n\n\n<p>\ud604\uc7ac \uc640\uc774\ud30c\uc774 \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548\uc744 \uc704\ud574 \uc0ac\uc6a9\ud560 \uc218 \uc788\ub294 \ucd5c\uace0\uc758 \uae30\uc220\uc785\ub2c8\ub2e4. \ud544\uc218 AES-CCMP\ub97c \uc0ac\uc6a9\ud558\uba70 \ud604\uc7ac \uc81c\uc870\ub418\ub294 \ubaa8\ub4e0 \ub514\ubc14\uc774\uc2a4\uc5d0\uc11c \uc0ac\uc6a9\ub429\ub2c8\ub2e4.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"standards\">\ud45c\uc900<\/h2>\n\n\n<p>\ud604\uc7ac \uc6b0\ub9ac\ub294 \ub9e4\uc77c \uc0ac\uc6a9\ud558\ub294 \uc5ec\ub7ec \uc7a5\uce58\uc5d0 \uc5f0\uacb0\ud560 \uc218 \uc788\ub294 \ub2e4\uc591\ud55c \ubb34\uc120 \ub124\ud2b8\uc6cc\ud06c\uc5d0 \uc561\uc138\uc2a4\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc77c\ubc18\uc801\uc73c\ub85c \uc0ac\uc6a9\ub418\ub294 \ud1b5\uc2e0 \ud45c\uc900\uc740 'WiFi'\ub77c\ub294 \uc774\ub984 \uc544\ub798 \ub2e4\uc74c\uacfc \uac19\uc740 \uc5ec\ub7ec \uac00\uc9c0\uac00 \uc788\uc2b5\ub2c8\ub2e4:<\/p>\n\n\n\n<p class=\"translation-block\"><strong>802.11a<\/strong>: 5 GHz ISM \ub300\uc5ed\uc758 \uce90\ub9ac\uc5b4\ub97c \uc0ac\uc6a9\ud558\uba70 \ucd5c\ub300 54 Mbps\uc758 \ub370\uc774\ud130 \uc804\uc1a1 \uc18d\ub3c4\ub97c \uc81c\uacf5\ud558\ub294 \ubb34\uc120 \ub124\ud2b8\uc6cc\ud06c.<\/p>\n\n\n\n<p>- <strong>802.11b<\/strong>2.4GHz ISM \ub300\uc5ed\uc758 \ud1b5\uc2e0\uc0ac, \ucd5c\ub300 11Mbps\uc758 \ub370\uc774\ud130 \uc804\uc1a1 \uc18d\ub3c4\ub97c \uc9c0\uc6d0\ud558\ub294 \ubb34\uc120 \ub124\ud2b8\uc6cc\ud06c\uc785\ub2c8\ub2e4. <\/p>\n\n\n\n<p class=\"translation-block\">\u2022 <strong>802.11g<\/strong>: 2.4 GHz ISM \ub300\uc5ed\uc758 \uce90\ub9ac\uc5b4\ub97c \uc0ac\uc6a9\ud558\uba70 \ucd5c\ub300 54 Mbps\uc758 \ub370\uc774\ud130 \uc804\uc1a1 \uc18d\ub3c4\ub97c \uc9c0\uc6d0\ud558\ub294 \ubb34\uc120 \ub124\ud2b8\uc6cc\ud06c.<\/p>\n\n\n\n<p class=\"translation-block\">\u2022 <strong>802.11i<\/strong>: \uc778\uc99d \ubc0f \uc554\ud638\ud654.<\/p>\n\n\n\n<p class=\"translation-block\">\u2022 <strong>802.11n<\/strong>: 2.4 GHz \ubc0f 5 GHz ISM \ub300\uc5ed\uc758 \uce90\ub9ac\uc5b4\ub97c \uc0ac\uc6a9\ud558\ub294 \ubb34\uc120 \ub124\ud2b8\uc6cc\ud06c\ub85c, \ucd5c\ub300 600 Mbps\uc758 \ub370\uc774\ud130 \uc804\uc1a1 \uc18d\ub3c4\ub97c \uc81c\uacf5\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p class=\"translation-block\">\u2022 <strong>802.11ac<\/strong>: 6 GHz \ubbf8\ub9cc\uc758 \uce90\ub9ac\uc5b4\ub97c \uc0ac\uc6a9\ud558\ub294 \ubb34\uc120 \ub124\ud2b8\uc6cc\ud06c\ub85c, \ub2e4\uc911 \uc2a4\ud14c\uc774\uc158 \uc6b4\uc601\uc5d0\uc11c \ucd5c\uc18c 1 Gbps, \ub2e8\uc77c \ub9c1\ud06c\uc5d0\uc11c 500 Mbps\uc758 \ub370\uc774\ud130 \uc804\uc1a1 \uc18d\ub3c4\ub97c \uc81c\uacf5\ud569\ub2c8\ub2e4.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-bottom-line\">\uacb0\ub860<\/h2>\n\n\n<p>\uc640\uc774\ud30c\uc774 \ub124\ud2b8\uc6cc\ud06c\ub97c \uc548\uc804\ud558\uac8c \ubcf4\ud638\ud558\ub294 \uac83\uc740 \ud604\uad00\ubb38\uc744 \uc7a0\uadf8\ub294 \uac83\uacfc \uac19\uc2b5\ub2c8\ub2e4. \uc544\ubb34\ub098 \ub4e4\uc5b4\uc624\ub294 \uac83\uc744 \uc6d0\ud558\uc9c0 \uc54a\uc73c\uc2dc\uc8e0? WEP(Wired-Equivalent Privacy)\ub294 \ud55c\ub54c \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548\uc744 \uc704\ud55c \uc635\uc158\uc774\uc5c8\uc9c0\ub9cc, \uc9c0\uae08\uc740 \uad6c\uc2dd\uc774\uba70 \uacb0\ud568\uc774 \uc788\ub294 \uac83\uc73c\ub85c \uc54c\ub824\uc838 \uc788\uc2b5\ub2c8\ub2e4. Wi-Fi \ubcf4\ud638 \uc561\uc138\uc2a4(WPA)\uc640 \uadf8 \ud6c4\uc18d \ubc84\uc804\uc778 WPA2\/WPAv2\ub294 \ud6e8\uc52c \ub354 \ud6a8\uacfc\uc801\uc778 \ubcf4\uc548 \uc870\uce58\uc785\ub2c8\ub2e4. \uc640\uc774\ud30c\uc774 \ud1b5\uc2e0 \ud45c\uc900\ub9c8\ub2e4 \ub2e4\uc591\ud55c \ub370\uc774\ud130 \uc804\uc1a1 \uc18d\ub3c4\uc640 \uc8fc\ud30c\uc218\ub97c \uc81c\uacf5\ud558\ubbc0\ub85c \ud544\uc694\uc5d0 \ub530\ub77c \uc801\ud569\ud55c \ud45c\uc900\uc744 \uc120\ud0dd\ud558\ub294 \uac83\uc774 \uc911\uc694\ud569\ub2c8\ub2e4. \uc774\ub7ec\ud55c \uc870\uce58\ub97c \ucde8\ud558\uba74 \ubb34\uc120 \uc5f0\uacb0\uc758 \ud3b8\ub9ac\ud568\uc744 \ud76c\uc0dd\ud558\uc9c0 \uc54a\uace0\ub3c4 WiFi \ub124\ud2b8\uc6cc\ud06c\ub97c \uc548\uc804\ud558\uac8c \ubcf4\ud638\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>","protected":false},"excerpt":{"rendered":"<p>DNS \ub610\ub294 \ub3c4\uba54\uc778 \uc774\ub984 \ud574\uc0c1\uc740 \ubaa8\ub4e0 \uc6f9\uc0ac\uc774\ud2b8\ub97c \ub098\uc5f4\ud558\ub294 \uc778\ud130\ub137 \uae30\ubc18 \uc804\ud654\ubc88\ud638\ubd80\ub85c \uae30\ub2a5\ud569\ub2c8\ub2e4. \uc6f9\ud398\uc774\uc9c0\ub97c \ud638\uc2a4\ud305\ud558\ub294 \uc11c\ubc84\uc5d0\ub294 \uc774\ub97c \uc2dd\ubcc4\ud558\ub294 IP \uc8fc\uc18c\uac00 \uc788\uc2b5\ub2c8\ub2e4\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ko\/%ea%b8%b0%ec%88%a0\/%eb%aa%a8%eb%b0%94%ec%9d%bc-%ec%84%bc%ec%8b%b1-wifi-%ec%8b%a4%eb%82%b4-%ec%9c%84%ec%b9%98-%ed%99%95%ec%9d%b8\/\"><span class=\"screen-reader-text\">\ubaa8\ubc14\uc77c \uac10\uc9c0: WiFi \uc2e4\ub0b4 \ub85c\uceec\ub77c\uc774\uc81c\uc774\uc158<\/span> <strong>\uacc4\uc18d \uc77d\uae30<\/strong><\/a><\/p>","protected":false},"author":1,"featured_media":1486,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30],"tags":[],"class_list":["post-1484","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mobile Sensing: WiFi Indoor Localization | Security Briefing<\/title>\n<meta name=\"description\" content=\"Keep your WiFi network secure with WEP, WPA, or WPA2. Learn about communication standards and more for optimal data transfer rates.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ko\/\uae30\uc220\/\ubaa8\ubc14\uc77c-\uc13c\uc2f1-wifi-\uc2e4\ub0b4-\uc704\uce58-\ud655\uc778\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile Sensing: WiFi Indoor Localization | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Keep your WiFi network secure with WEP, WPA, or WPA2. Learn about communication standards and more for optimal data transfer rates.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ko\/\uae30\uc220\/\ubaa8\ubc14\uc77c-\uc13c\uc2f1-wifi-\uc2e4\ub0b4-\uc704\uce58-\ud655\uc778\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-25T03:26:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"662\" \/>\n\t<meta property=\"og:image:height\" content=\"327\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\uae00\uc4f4\uc774\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data2\" content=\"7\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Mobile Sensing: WiFi Indoor Localization\",\"datePublished\":\"2023-02-25T03:26:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/\"},\"wordCount\":1431,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg\",\"articleSection\":[\"Tech\"],\"inLanguage\":\"ko-KR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/\",\"url\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/\",\"name\":\"Mobile Sensing: WiFi Indoor Localization | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg\",\"datePublished\":\"2023-02-25T03:26:42+00:00\",\"description\":\"Keep your WiFi network secure with WEP, WPA, or WPA2. Learn about communication standards and more for optimal data transfer rates.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg\",\"width\":662,\"height\":327,\"caption\":\"Mobile Sensing WiFi Indoor Localization\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Sensing: WiFi Indoor Localization\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/ko\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\ubaa8\ubc14\uc77c \uc13c\uc2f1: WiFi \uc2e4\ub0b4 \uc704\uce58 \ucd94\uc801 | \ubcf4\uc548 \ube0c\ub9ac\ud551","description":"WEP, WPA \ub610\ub294 WPA2\ub85c WiFi \ub124\ud2b8\uc6cc\ud06c\ub97c \uc548\uc804\ud558\uac8c \ubcf4\ud638\ud558\uc138\uc694. \ucd5c\uc801\uc758 \ub370\uc774\ud130 \uc804\uc1a1 \uc18d\ub3c4\ub97c \uc704\ud55c \ud1b5\uc2e0 \ud45c\uc900 \ub4f1\uc5d0 \ub300\ud574 \uc54c\uc544\ubcf4\uc138\uc694.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ko\/\uae30\uc220\/\ubaa8\ubc14\uc77c-\uc13c\uc2f1-wifi-\uc2e4\ub0b4-\uc704\uce58-\ud655\uc778\/","og_locale":"ko_KR","og_type":"article","og_title":"Mobile Sensing: WiFi Indoor Localization | Security Briefing","og_description":"Keep your WiFi network secure with WEP, WPA, or WPA2. Learn about communication standards and more for optimal data transfer rates.","og_url":"https:\/\/securitybriefing.net\/ko\/\uae30\uc220\/\ubaa8\ubc14\uc77c-\uc13c\uc2f1-wifi-\uc2e4\ub0b4-\uc704\uce58-\ud655\uc778\/","og_site_name":"Security Briefing","article_published_time":"2023-02-25T03:26:42+00:00","og_image":[{"width":662,"height":327,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"\uae00\uc4f4\uc774":"security","\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"7\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Mobile Sensing: WiFi Indoor Localization","datePublished":"2023-02-25T03:26:42+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/"},"wordCount":1431,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg","articleSection":["Tech"],"inLanguage":"ko-KR"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/","url":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/","name":"\ubaa8\ubc14\uc77c \uc13c\uc2f1: WiFi \uc2e4\ub0b4 \uc704\uce58 \ucd94\uc801 | \ubcf4\uc548 \ube0c\ub9ac\ud551","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg","datePublished":"2023-02-25T03:26:42+00:00","description":"WEP, WPA \ub610\ub294 WPA2\ub85c WiFi \ub124\ud2b8\uc6cc\ud06c\ub97c \uc548\uc804\ud558\uac8c \ubcf4\ud638\ud558\uc138\uc694. \ucd5c\uc801\uc758 \ub370\uc774\ud130 \uc804\uc1a1 \uc18d\ub3c4\ub97c \uc704\ud55c \ud1b5\uc2e0 \ud45c\uc900 \ub4f1\uc5d0 \ub300\ud574 \uc54c\uc544\ubcf4\uc138\uc694.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg","width":662,"height":327,"caption":"Mobile Sensing WiFi Indoor Localization"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Mobile Sensing: WiFi Indoor Localization"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"\ubcf4\uc548","image":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin\uc740 \uc815\ubd80 \uae30\uc220\uc758 \uc120\uc784 \uc2a4\ud0dc\ud504 \uc791\uac00\uc785\ub2c8\ub2e4. \uc774\uc804\uc5d0\ub294 PYMNTS\uc640 \ubca0\uc774 \uc2a4\ud14c\uc774\ud2b8 \ubc30\ub108\uc5d0 \uae00\uc744 \uc37c\uc73c\uba70 \uce74\ub124\uae30 \uba5c\ub860\uc5d0\uc11c \ubb38\uc608\ucc3d\uc791 \ud559\uc0ac \ud559\uc704\ub97c \ubc1b\uc558\uc2b5\ub2c8\ub2e4. \ud604\uc7ac \ubcf4\uc2a4\ud134 \uc678\uacfd\uc5d0 \uac70\uc8fc\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/ko\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/1484","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/comments?post=1484"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/1484\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media\/1486"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media?parent=1484"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/categories?post=1484"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/tags?post=1484"}],"curies":[{"name":"\uc6cc\ub4dc\ud504\ub808\uc2a4 (wp)","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}