Security
Following are the security considerations for this guide:
- 
                
For the Device Adaption Interfaces APIs, the Device Adapter has to handle the security.
 - 
                
For other devices, the network will be used for security, authentication, and encryption.
 
For example, the LORAWAN devices will be secured by the adapter using OTA or personalized methods.