Review Article

IoT Security Review: A Case Study of IIoT, IoV, and Smart Home

Table 1

Distribution papers in the field of IIoT hardware security.

AuthorTitleContributions

Lesjak et al. [20]Hardware-security technologies for industrial IoT: TrustZone and security controllerDeveloped the TrustZone-based approach
Huberman [21]Ensuring trust and security in the industrial IoT: the Internet of things (ubiquity symposium)Presented a zero knowledge protocol
Basheer et al. [22]Industrial-IoT-hardware security-improvement using plan load optimization method in cloudProposed the new system that is to deal with the manual arrival of more industrial defects
Yu et al. [23]Toward data security in edge intelligent IIoTExplored four key challenges in data security of edge intelligent IIoT, i.e., convenient usage, reliable storage, efficient search, and secure deletion