“…There have been many studies to analyze the Z-Wave protocol (e.g., [3], [4], [5], [6], [7], [8], [9], [16], [17], [19], [20], [21], [22], [23], [24], [25], [26], [27], [28]); among these, some focused on the analysis of the Z-Wave traffic. MBIDS [8] analyzed 11 Z-Wave CMDCLs to find misuse cases.…”