Understanding Security Flaws of IoT Protocols through Honeypot Technologies