Figure 1: The IoT threats model.