Hardware Security at the Edge: A Discussion of Hardware Security Challenges and Tradeoffs Under Resource Constraints with Selected Example Primitives