style="font-size:15px;"> 7 Chapter 7Figure 7.1. Data flow within the IoT (Schmitt 2019). For a color version of this...Figure 7.2. Attack types in IP networks (Schmitt 2019)Figure 7.3. Assumed WSN Setup for the sTiki Implementation (Siffert 2018)Figure 7.4. Messages sent in the ANOR handshake (Lowack 2013)Figure 7.5. sTiki’s architecture (Siffert 2018). For a color version of this fig...Listing 7.1. sTiki’s main processing function on CoMaDa (Siffert 2018)Figure 7.6. sTiki message M1 captured with Wireshark (Siffert 2018). For a color...Figure 7.7. Testing setup for sTiki (Siffert 2018)Figure 7.8. sTiki messageM4 captured with Wireshark (Siffert 2018). For a color...Figure 7.9. Data Packet with an IV captured with Wireshark (Siffert 2018). For a...Listing 7.2. Debugging output for messageM1in CoMaDa (Siffert 2018)Figure 7.10. Data Packet with a MC captured with Wireshark (Siffert 2018). For a...Listing 7.3. Debugging output for Data Packet received with MC (Siffert 2018)Figure 7.11. sTiki messageM2 captured with Wireshark (Siffert 2018). For a colo...Figure 7.12. sTiki messageM3 captured with Wireshark (Siffert 2018). For a colo...Listing 7.4. XML example for sensors (Sgier 2017)Figure 7.13. CoMaDa’s live stream showing the message aggregation