A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes
2016
unpublished
Mobile Ad-Hoc Networks(MANET) geared towards routing efficiency. The resulting protocols tend to various attacks. Number of solutions has been proposed for different types of attacks however these solutions often compromiserouting efficiency or network overload. One major attack is DDOS attack against the OptimizedLink State Routing protocol (OLSR) known as the node isolation attack. It occurs whentopological knowledge of the network is exploited by an attacker who is able to isolate the
fatcat:nj55drfkqzbpzjcwo6qo3yluty