How devices will mutually authenticate to a reliable
degree of authenticity to prevent rogue commands
and communications or data leakage is a priority
consideration. Communications could be interrupted
given a variety of factors and unless there is an
assurance that corresponding devices are legitimate,
there is no basis for secure operations