End-to-End IoT Security: Authentication, Vulnerability Exploration and Data Analysis