I. Introduction
Conventional security systems cannot be directly applied to IoT systems. This is because objects in the IoT are dynamic and different from the traditional computer network. Characteristics of objects in internet of things (IoT) systems include dynamic (often joining and separating) and resource limitations (battery, processor, memory) [1]. In addition, communication networks in IoT systems are often unstable. This condition makes the characteristics and security problems of IoT different from computer networks in general. One of the attacks on IoT is related to privacy. Data and user access restrictions are important so that IoT objects can only interact with trustworthy objects.