Interoperability:

Relevant security solutions should not prevent the functionality of interconnected heterogeneous devices in IoT network system [27] .

Resource constraints:

In IoT architecture, most of nodes lack of storage capacity, power and CPU. They generally use low-bandwidth communication channels. Hence, it is unable to apply some security techniques such as frequency hopping communication and public key encryption algorithm. Setup of security system is very difficult under these circumstances [6] .

Data volumes:

Although some IoT applications use brief and infrequent communication channels, there are considerable number of IoT system such as sensor-based, logistics and large scale system that have potentials to entail huge volume of data on central network or servers [28] .

Privacy protection:

Since a great number of RFID systems are short of suitable authentication mechanism, anyone can tracks tags and find the identity of the objects carrying them. Intruders can not only read the data, but can also modify or even delete data as well [21] .

Scalability:

The IoT network consists of a large number of nodes. The proposed security mechanism on IoT should be scalable [19] .

Autonomic control:

Traditional computers need users to configure and adapt them to different application domains and different communication environments. However, objects in IoT network should establish connections spontaneously, and organize/configure themselves for adapting to the platform they are operating in. This kind of control also involves some techniques and mechanisms such as self-configuring, self-optimizing, self-management, self-healing and self-protecting [27] .