Security
Following are the security considerations for this guide:
- 
                For the Device Adaption Interfaces APIs, the Device Adapter has to handle the security. 
- 
                For other devices, the network will be used for security, authentication, and encryption. 
For example, the LORAWAN devices will be secured by the adapter using OTA or personalized methods.