“…2 As sensors proliferate all around us, we will want to be assured that our privacy is protected from snooping and that our identity and financial resources are safe from malicious attack. Data encryption is important, but best security practices and strong authentication procedures for users, devices, services, and applications are also required.…”