This document compares and discusses four Internet of Things (IoT) architectures - IoT-A, BeTaaS, OpenIoT, and IoT@Work - in terms of their approaches to security and privacy. It identifies common security requirements for IoT systems, including network security, identity management, privacy, trust, and resilience. It rates each architecture on how well it addresses these requirements. While each architecture focuses on a different domain, IoT-A and BeTaaS provide reference models that fulfill most of the security requirements. However, the document notes that privacy and trust are not fully addressed across architectures and that future work is needed on mechanisms like accountability and transitive trust to realize the full potential of an