I. Introduction
In recent years we have witnessed a remarkable proliferation of networked intelligent devices - collectively known as the Internet of Things (IoT). The IoT is a digitization of the physical world by embedding physical devices with electronics, sensors, actuators, and network connectivity that enable them to collect and exchange data without human intervention, and be controlled remotely across existing network infrastructure. It presents vast opportunities for organizations to improve efficiencies, gain a competitive advantage, and build new business models. More IoT devices are coming online each and every day. Experts estimate that the IoT will grow from 12 billion devices in 2015 to more than 50 billion by 2020 [1]. While IoT is embraced as important tools for efficiency and productivity, it is becoming an increasingly attractive target for cybercriminals. Securing IoT is fundamentally challenging due to the vast number of networked devices that are often resource-constrained and exposed in unprotected environment.