To enhance Auth availability under a DoS attack and avoid being a single point of failure, a distributed implementation of Auth will be required. To provide further security guarantees, we can use Auth as a point of intrusion detection, given that it can see the access-related activities of local devices.a distributed implementation of Auth will be required.deployed