Ali Shawket Thiab, Abdul Samad Bin Shibghatullah, Zeratul Izzah Mohd. Yusoh, The Role of Access Control and Device Authentication in the Internet of Things, Journal of Engineering and Applied Sciences, Volume 13,Issue 9, 2018, Pages 2680-2684, ISSN 1816-949x, jeasci.2018.2680.2684, (https://makhillpublications.co/view-article.php?doi=jeasci.2018.2680.2684) Abstract: The new generation of wireless sensor networks that is known as the internet of things enables the direct connection of physical objects to the internet using microcontrollers. In most cases, these microcontrollers have very limited computational resources. In this study, we investigate the access control solution for the IETF standard draft constrained application protocol using the datagram transport layer security protocol for transport security. We use the centralized approach to save access control information in the framework. Since, the public key cryptography operations might be computationally too expensive for constrained devices we build our solution based on symmetric cryptography. Keywords: Internet of things;internet protocol;wireless sensor networks;transmission control protocol;constrained;Malaysia