I. Introduction
Internet of Things (IoT) is a paradigm that ranges from small, localized systems to large, geographically distributed systems that interconnect things to the Internet by using standard communication protocols [1]. IoT received massive attention from numerous business and technological industries that made the IoT one of the most demanded technologies of the future. However, modern IoT systems come with stringent network delay needs. Apart from this, the existing IoT systems are cloud centered. And, sending the data all the way to the cloud servers can easily break the delay requirements. Despite centralization and controlled data, cloud-supported IoT devices are not safe from cyber-crime, privacy issues, and security breaches. It is a fact that the single point of failure and the security flaws in IoT devices have placed data integrity and privacy at risk. It is shown that more than 25% of corporate attacks and cyber-crimes would be because of the compromised IoT devices [2]. It has become mandatory that the operational model of IoT devices should be shifted from over-arched centralized model to automated decentralized architecture. This transformation will help to make the IoT devices more self-regulating and autonomous.