Where are the security loopholes in an IoT ecosystem? Point them out from a very high level perspective.
1. Using Fig. 16.7, what other vulnerabilities can exist in this scenario?
2. Describe the potential overhead of the Security Policy Architecture without access to the DfD infrastructure.