Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions