


\section{Conclusions}
\label{sec:conclusions}

In this paper, we have explained how distributed peer-to-peer networks need to
be secured, and why this problem requires a specific approach.  We have
identified the major threats; and also we have then proposed a security
architecture along with the related protocols.  Finally, we have analyzed the
limitations of our proposal, and we have assessed its performance.  Other
challenges in deployment of this type of networks relate to the issues of
manageability, security, and availability of communication through this design.
In terms of future work, we intend to further develop this proposal.  In
particular, we intend to explore in more detail the effectiveness of key
distribution; we will also perform additional numerical evaluations of the
solutions.




%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%





