Skip to main navigation
Skip to search
Skip to main content
Illinois Experts Home
LOGIN & Help
Home
Profiles
Research units
Research & Scholarship
Datasets
Honors
Press/Media
Activities
Search by expertise, name or affiliation
Wormhole attacks in wireless networks
Yih Chun Hu
, Adrian Perrig
Electrical and Computer Engineering
Information Trust Institute
Coordinated Science Lab
Siebel School of Computing and Data Science
Research output
:
Contribution to journal
›
Article
›
peer-review
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Wormhole attacks in wireless networks'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Wireless Networks
100%
Wormhole Attack
100%
Attacker
28%
Network Routing Protocol
28%
Ad Hoc Network Routing
28%
General Mechanism
14%
Network Applications
14%
Location-based
14%
Security System
14%
Ad Hoc Networks
14%
Confidentiality
14%
Mobile Ad Hoc Network (MANET)
14%
Wireless Security
14%
Leash
14%
Two-hop
14%
Topological Methods
14%
Severe Attack
14%
One-hop
14%
Wormhole
14%
Wormhole Detection
14%
Packet Leash
14%
Computer Science
Wireless Networks
100%
Wormhole Attack
100%
ad-hoc network
42%
Attackers
28%
Routing Protocol
28%
Network Routing
28%
Security Systems
14%
Network Application
14%
mobile ad-hoc network
14%
Wireless Security
14%
Specific Protocol
14%