The Internet of Things (IoT) is a rapidly evolving technology that empowers billions of globally distributed physical things to be interconnected over the internet to capture, collect, exchange, and share a wide variety of vast amounts of data. These physical things incorporate all of the connectable devices ranging from conventional household devices to complex industrial devices [1]. The emergence of INDUSTRY 4.0 has revolutionized the industrial domain globally with a large and ever-increasing number of embedded devices, and computerized chips because of the expanding availability, affordability, microprocessors, sensors' capacity, and omnipresent communication technologies. Connecting such a very large number of heterogeneous objects and implanting sensors to them leads to some degree of digital intelligence at devices that, empowering them to communicate instantaneous data with no human intervention. The IoT empowering the infrastructure of the globe to be more intelligent and reactive, combining the physical and digital domains. Therefore, the IoT has been receiving great interest and wide adoption in almost all fields: education, manufacturing, healthcare, business, entertainment, energy distribution, domestic, smart-cities, transportations, tourism, and even research [2].Regrettably, industry, academia, and people are struggling to integrate the stream of rapid commercialization with rare consideration to the security and the privacy of IoT data and devices. For example, think about an IoT-enabled world that combines things like wearables, smartphones, smartwatches, smart TVs, smart refrigerators, smart vehicles, implantable health devices, industrial robotics systems, and simply everything capable to be connected over networks. Generally, most of these industries have never posed any interest in security, forensics, or privacy concerns over the last decades [3]. Given the intense competition to be more feasible along with profitable products and services, nonetheless, the current industries discover themselves in the critical phase as they do not realize the secure and privacy-preserving method Electronic Supplementary Material The online version of this chapter