Part III: Architecting the Secure IoT