Increased mobility and interoperability amplify the threat to IoT systems, in that
they complicate access control by enabling an attacker to introduce compromised
systems into the environment or remove systems in order to compromise and
reintroduce them without detection.