IoT Under Siege: Cellular Security Strategies That Work