The research on existing solutions is divided into two main topics: optimization of the basic security functions and countermeasures against security attacks. The table 1 below presents the functionality comparison for existing solutions between these two topic for the publications used as references for this state of art evaluation. Optimization parameters like energy, computational time, memory requirement, flexibility, cost, reliability, etc are concerns for IoT. For resource constraints systems energy, computational time, cost will be major parameters.