Discovery: Step 1 of Connected Device Security