A smart utility company is deploying a large-scale mesh network of smart meters using 6LoWPAN. To prevent unauthorized devices from joining the network and injecting malicious data, which of the following is the most effective and resource-efficient security mechanism to implement at the network layer for device onboarding?