During last decade, Internet of Things has gained huge popularity and it is expected that Internet of Things will change our daily life through the billions of devices that have sensing or actuation capabilities, which are connected to each other via the Internet. IoT applications span from industrial automation to home area networks and personal area networks. If we consider above related applications, then Security of Internet of things’ devices is the very important consideration as very important data can be compromised if IoT network is hacked and there are many examples of IoT network hack. In October 2016, thousands of security cameras were hacked to create the largest-ever Distributed Denial of Service (DDoS) attack against Dyn, a provider of critical Domain Name System (DNS) services to companies like Twitter, Netflix, and CNN.1 Therefore, an end-to-end security solution is needed to provide enough security for the IoT thereby protecting the data once it is in the network.If security is provided in Network layer then it is important that devices must support the security mechanism. If security is implemented using a protocol like TLS, DTLS then there is no need of infrastructure to support security mechanism, as these protocols are placed in between transport and application protocol and security is completely in hands of two communicating applications. As IoT devices are Low Energy consumption and Low Battery powered, Reliable Transport Protocol such as TCP cannot be used as this will add overhead which is costly to these simpler devices. Also, TCP has shown poor performance over low bandwidth applications. Therefore, connectionless UDP is mostly preferred in IoT applications.2 DTLS is a most suited protocol for providing authentication, key exchange, and protecting application data. Using DTLS as the sole security suite for IoT, the following security protection can be achieved3;Network Access DTLS is used to authenticate new devices joining the network either using the PSK mode, raw public key, or public key certificate. Therefore when the DTLS Handshake Process is completed, a secure channel is established between devices, authorizing their identity. Secure Communication channel Once the secure connection is established between two devices and authorizing them, DTLS also implies encryption and compression capabilities for application data. Key Management As DTLS has the capability of renewing session keys, this mechanism can be utilized to support key management in the network.