Security
Following are the security considerations for this guide:
-
For the Device Adaption Interfaces APIs, the Device Adapter has to handle the security.
-
For other devices, the network will be used for security, authentication, and encryption.
For example, the LORAWAN devices will be secured by the adapter using OTA or personalized methods.