Wireless Communications and Mobile Computing / 2022 / Article / Tab 1 / Review Article
IoT Security Review: A Case Study of IIoT, IoV, and Smart Home Table 1 Distribution papers in the field of IIoT hardware security.
Author Title Contributions Lesjak et al. [20 ] Hardware-security technologies for industrial IoT: TrustZone and security controller Developed the TrustZone-based approach Huberman [21 ] Ensuring trust and security in the industrial IoT: the Internet of things (ubiquity symposium) Presented a zero knowledge protocol Basheer et al. [22 ] Industrial-IoT-hardware security-improvement using plan load optimization method in cloud Proposed the new system that is to deal with the manual arrival of more industrial defects Yu et al. [23 ] Toward data security in edge intelligent IIoT Explored four key challenges in data security of edge intelligent IIoT, i.e., convenient usage, reliable storage, efficient search, and secure deletion