I. Introduction
The usage of Internet-enabled devices, most recently the Internet of Things (IoT), is becoming widely spread. While IoT provides enormous benefits, they continuously face severe cyber threats that create various vulnerabilities. The hetero-geneity of devices, services, communication protocols, data formats, and data generated from various smart devices in the IoT environment is one of the biggest concerns [1]–[3]. IoT devices are simple devices, mostly built with minimal security concerns and low computational capabilities, thus coupled with various device-level vulnerabilities. Consequently, IoT devices offer an attractive target for adversaries [2].