Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes