Unique Security Challenges of Connected Devices