“…Additionally, IoT solutions consider UPnP for automatic discovering IoT devices connected to a network [33], but this service can become a vulnerability since an attacker can get important information using the UPnP's service discovery protocol [32]. Iacono et al [34] mention that API-keys share the same drawbacks as HTTP basic authentication. The API-key is transferred to the server in plain-text.…”