... Along with technology advances, there are always security challenges. IoT security vulnerabilities or threats range on wide surface as follows: access control [19,22,[66][67][68], bad output [69], brute force [21,70], cloud attacks [71], computation overhead [33,72,73], cryptanalysis [64,74], cryptography [2,56,75,76], data attacks [1,18,19,22 As we can see in Figure 2, the main vulnerabilities/threats that have been paid more attention to deal with in IoT security research are device attacks (10%), data attacks (9%), Denial of Service (DoS) (8%), eavesdropping (4,4%), disruption (4,4%), network attacks (4,4%) and development attacks (4,4%). However, there are several new types of vulnerabilities or attacks that have not been widely studied and discussed in literature such as social context which can be used for social engineering, quantum computing that can be used to easily break modern cryptographic algorithms, machine learning to direct targeted individuals or information, and bad output that can be used as entry point of analysis. ...