After a careful review and analysis of the possible Zeroconf’s security solutions (as discussed above), we conclude that, as Aidan William also recommended in his Internet Draft paper [20], that bootstrapping IPSec appears to be a secure approach to enable security in Zeroconf networks. Most of the techniques that attempt to secure the candidate protocols of Zeroconf provide authentication but not confidentiality which is also an important criteria that has to be taken into consideration. Moreover, IPSec not only provides both confidentiality and authentication but also reduces configuration overhead. To illustrate the choice of the solution, Fig. 12 shows the protocol stack of Zeroconf with added security with the TCP/IP reference model.