A Survey on Hardware-based Security Mechanisms for Internet of Things.
Alireza ShamsoshoaraAshwija KorendaFatemeh AfghahSherali ZeadallyPublished in: CoRR (2019)
Keyphrases
- security mechanisms
- resource constrained
- security issues
- security systems
- access control
- smart card
- security requirements
- operating system
- low cost
- security problems
- computer systems
- real time
- embedded systems
- key technologies
- rfid tags
- digital signature
- mobile devices
- information security
- cloud computing
- security protocols
- security services
- cryptographic algorithms
- computing systems
- big data
- sensor networks
- security measures
- data sets