VI. CONCLUSION
In this paper, we propose a secure network architecture to address IoT-related security requirements, as summarized in Table V. The proposed approach supports frequent, automated authentication and authorization by using a local authorization entity called Auth. Auth authorizes registered entities through session key distribution. By caching the session keys and allowing a variety of cryptographic algorithms, even the entities with intermittent connectivity or resource constraints can be authorized effectively. For authentication and authorization, an entity only needs to use temporary session keys provided by Auth. Thus, it does not have to risk exposing its identity by using its unique value such as a certificate, maintaining its privacy. Through experiments, we show our approach has significantly better scalability than SSL/TLS for the scenarios common in the IoT, while providing a comparable level of security as SSL/TLS.