(This paper analyzes the loopholes and vulnerabilities existing in the version of #38;5)9 routing protocol at that time, as well as the possible attacks, and introduces the prevention strategies proposed for these loopholes, which are helpful for strengthening the #38;Χ)9 routing protocol. Security presents some recommendations and typical configurations)