1. [1] P. Sparks: “The route to a trillion devices: the outlook for IoT investment to 2035” (2017) https://pages.arm.com/rs/312-SAX-488/images/Arm-The-route-to-trillion-devices_2018.pdf.
2. [2] V. Hassija, et al.: “A survey on IoT security: application areas, security threats, and solution architectures,” IEEE Access 7 (2019) 82721 (DOI: 10.1109/ACCESS.2019.2924045).
3. [3] B. Halak, et al.: “Overview of PUF-based hardware security solutions for the internet of things,” IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS) (2016) 1 (DOI: 10.1109/MWSCAS.2016.7870046).
4. [4] R. Maes: Physically Unclonable Functions: Constructions, Properties and Applications, (Springer, 2013) (DOI: 10.1007/978-3-642-41395-7_2).
5. [5] C. Herder, et al.: “Physical unclonable functions and applications: a tutorial,” Proc. IEEE 102 (2014) 1126 (DOI: 10.1109/JPROC.2014.2320516).