Cell phones are authenticated - yes. To ensure they belong on that network. But how do YOU ensure that this is a person you want to extract data from your phone? With a call, you filter based on caller-id, which can be manipulated.
What are the engineering and design challenges in creating successful IoT devices? These devices are usually small, resource-constrained electronics designed to sense, collect, send, and/or interpret data. Some of the devices need to be smart enough to act upon data in real time, 24/7. Specifically the guests will discuss sensors, security, and lessons from IoT deployments.