SECURITY RESPONSE All of the potential weaknesses that could afflict IoT systems, such as authentication and traffic encryption, are already well known to the security industry...…