I. Introduction
The massive adoption of IoT devices lead to new security challenges. Indeed, those devices are designed to lower the time to market and neglect most of the security recommendations and best practices. When installed in a highly secured environment containing sensitive data, their use is even more problematic. Their presence creates security holes and threatens the network as their security level is often below requirements. For instance, the Mirai botnet [1] is one example of security incidents introduced by the world wide adoption of insecure IoTs. Multiple studies have focused on different strategies to create communication mediums using IoTs to covertly exfiltrate data. For example, by using high frequency light variations on light bulbs [2].