Authentication in the IoT: Challenge or Opportunity?