Where applicable, use location-aware technologies to validate connection authentication integrity based on known equipment locations.
Use equipment identification as a method for connection authentication.