Abstract: In the present IoT context, typical focused security validation approaches are unable to offer security verification due to the restricted performance and flexibility of the devices. These ...