Following are the security considerations for this guide:

  • For the Device Adaption Interfaces APIs, the Device Adapter has to handle the security.

  • For other devices, the network will be used for security, authentication, and encryption.

For example, the LORAWAN devices will be secured by the adapter using OTA or personalized methods.