The IoT environment has various things connected by the internet, enabling convenient user experience. Subsequently, businesses in various industries are utilizing interconnected devices to increase business efficiency. However, concerns of privacy violation such as information regarding user location and access records continue to rise, and incidents of IoT devices being abused are incrementally surfacing. In order to decrease such risk factors, IoT devices must be safely authenticated and managed, data inside devices and in transit be encrypted, and message integrity be guaranteed.