Device authentication

Device authentication requires equipping devices with characteristics that can be reliably recognized. For devices and associated processes that generate requests, authentication using cryptographic protocols may be required. Some of these protocols have been developed, but there has been little experience with deploying them and building systems that make good use of them.