I. Introduction
As Internet of Things technology continues to grow, current trends demonstrate a shift away from centralized and cloud architectures to edge architectures. This shift is driven by the fact that edge architectures are needed to enable more flexible, responsive and intelligent IoT systems. The addition of numerous edge devices to Internet interactions introduces challenges in securing the communication between IoT systems. For secure communication in a typical IoT architecture, the following security goals must be achieved [1] :
Each participant involved in passing data, including the sensing and/or actuating devices, user devices, and edge gateways and servers must be authenticated.
During any communication session, data must be protected from any alterations and data integrity validated.
Encryption and decryption techniques must be employed to ensure data confidentiality while the data is in transport between any two entities.