The IoT points to an ever-increasing network containing the things which are not only conventional computers or mobile objects, but also the physical things similar to temperature sensors, wearable devices, watches, and other smart objects. Academics, industries, and governments are interested in studying how to connect all things in the world to the internet, called Internet of Things. Its applications contain large numbers of devices (perceptions), which are difficult to implement security methods such as encryption because of the restrictions on time, memory, processing, and energy constraints [1]. Recently, the smart devices have increased with the increased availability of distributed networks. From Figure 1. We should know that the number of devices connected to it is increasing through a positive relationship with the time. Also, the market of IoT is increasing with timeIoT is attracting for many organizations, one of them is Cisco internet business solutions group (IBSG), which reported that IoT is advantageous when the number of "objects/things" connected to the Internet is greater than the human"s connection [3]. IoT enables several applications and objects for connecting with each other through the internet to a certain scale, facilitating communication and access to information, including business as-well-as technologies related challenges to realize business benefits. These applications and objects impose a strict challenge to the security of the IoT environment and systems. For example, privacy, confidentiality, integrity, authentication, and authorization of IoT system. Moreover, the IoT environment should provide solutions for other challenges such as reliability, performance, availability, mobility, management, interoperability, scalability, and big data. IoT security is a major area of concern, it is the most impacted challenges for IoT [4].IoT architecture is divided into three layers: physical (aka perception/sensing) layer, network layer, and