Return to Article Details Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes Download Download PDF