Routing protocols for bluetooth-based networks are very wide. Some of them are reactive and some proactive. There are also hybrid protocols that merge reactive & proactive approaches to use advantages of both them. I work on a paper that suggest a new hybrid routing protocol but this paper don't consider security aspects for routing. How can I secure this routing protocol? For example, authentication & fuzzy logic are two way. Can anyone tell me how authentication for this purpose should be done and simulated? and what kind of cryptography should be used for authentication? I can also wait for any other way to secure routing protocols.

Conference Paper A Study on the Global Configured Method of Blueweb Routing Protocol

Similar questions and discussions