I. Introduction (Use Heading 1)
IoT is a growing field. With its growth comes the increase in data traffic related to IoT. As IoT devices access more critical user data, the need for managing and hardening this access becomes increasingly obvious [1]. Nowadays, homes have IoT devices embedded within them, granting access to a variety of sensitive data, including things like voice recordings of a room or a detailed map of the house. It’s worth mentioning that if the data were stored on a single device without the need for transferring the data between devices, there wouldn’t be many concerns about the safety of the data. However, this is not the case. Most of the time, devices and users need to transfer potentially critical data. Considering that over 20 billion IoT devices, including but not limited to cameras and voice recorders, will be connected to networks, the security of user data and the management of data access seem like serious challenges [2]. While encryption is a good way to keep the data safe during transfer, the lack of control over the data traversal path or receivers suggests that we need other mechanisms to manage the data flows in the data plane [3]. In enterprise networks, managing data access within the network is often accomplished through the use of firewalls. However, in IoT, the environment is somewhat different, and traditional firewalls are not the best solution for controlling network access [4].