Abstract

With the increase in the number of devices connected to the Internet, the need to maintain and harden information security in Internet systems has significantly increased. This has led to the development of hardware systems that implement security services. Therefore, from a taxonomy to sort and classify the key criteria to processor design, an overview and in-depth analysis of soft-processors that implement algorithms for Internet of Thing applications is presented highlighting their advantages and disadvantages to be used in larger systems. In order to perform a systematic review of the engineering literature related to the interest topic in this work, a bidirectional review methodology consisting of the following three phases has been proposed and applied: review planning, review conducting, and review reporting. Then, soft-processor architectures implementing security algorithms are compared considering computational cost, speed, bus size, number of pipeline stages, and performance. Finally, based on a feature analysis, the strengths and threats of soft-processors when implementing information security for Internet of Things applications are discussed, and the LORS design model is proposed to lead to recommendations for future designs.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.