Part of An Exhaustive Examination of Architectural Methods for Hardware Security Mechanisms in IoT Devices