How to Protect Your IoT Ecosystem from CoAP Security Vulnerabilities