Answer:A more secure protocol should be used.
Explanation: For controlling the traffic flow , there is requirement of certain protocols to maintain traffic as well the security. Traffic flow contain the reaching of any data packet from the source to the destination and this process can have multi-path , thus it creates a traffic. So, there should be the adequate protocols for handling the traffic as well as security handling.