*4.8. Summary*

Table 2 repeats the requirements from Table 1 and compares the solutions presented in previous sections against them. For clarity, shortened versions of the requirements are presented below; the full description is available in Table 1.

Symbols used in Table 2 have the following meanings:


For the TrustZone, in some cases, -\* is used. This means that the requirement is fulfilled on the condition that TrustZone is combined with CryptoCell. For NXP the evaluation is based on the use case scenario from the data sheet [63] coined "Plug and Trust"—the integration with a host processing unit.


**Table 2.** Comparison of the state-of-the-art against the synthesized requirements for secure IoT devices.


#### *Electronics* **2021**, *10*, 1814


