Exploring Vulnerabilities and Security Schemes of Service-Oriented Internet 0f Things (IoT) Protocols