“…Table 1 highlights a summary of the attacks that occur in the IoT according to previous studies. Reference Attacks [12] Spoofing, Sleep deprivation, Replay, Session hijacking [13] Spyware, Trojans, Sinkhole, Spoofing, Jamming, Tag cloning, Physical tampering [14] DDoS, Botnets, Falsified sensor data, Attacks on cloud services, Physical tampering [15] DDoS, Man-in-the-Middle, Spoofing, Physical tampering, Data breach, Malware, Ransomware [16] DDoS, Man-in-the-Middle, Malware, Ransomware, Physical tampering, Data breach, Spoofing [17] Physical damage, Exhaustion attacks, Cryptanalysis, Side-channel information, Man-in-the-Middle, DoS/DDoS, Message forging [18] Physical, Malware, DoS, Man-in-the-Middle, Replication, Spoofing, Injection, Social engineering [19] DoS, Man-in-the-Middle, Malware, Physical, Password [20] DoS, Man-in-the-Middle, Physical, Malware, Botnet, Spoofing, Eavesdropping [21] DDoS, Ransomware, Industrial spying, Click fraud…”