[en] Recent adversarial attacks have been shown IoT devices weaknesses due to their limited computing power. Given also their ubiquitous
presence, lower costs and limitations in keeping security measures up-todate, resource-constrained devices represent a growing risk for the security of IT infrastructure. The scope of the research is to investigate the
weaknesses of resource-constrained IoT devices. The methodology for the
investigation is the legal analysis of existing legal frameworks regulating
IoT cybersecurity and data security; afterwards it will be carried out a
critical evaluation of the existing best practices. This critical analysis
should face the twofold challenge of increasing transparency and trust in
resource-constrained systems. Users and companies are two faces of the
same coin: accountability of data collectors and user awareness are crucial in the security and data protection debate. Thus, a comprehensive
overview of the relevant legal frameworks and guidelines would increase
the understanding of risks of the users, whilst data controllers (especially
of small and medium enterprises) may have an instrument to implement
properly security measures.
Disciplines :
Law, criminology & political science: Multidisciplinary, general & others
Author, co-author :
Chiara, Pier Giorgio ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
External co-authors :
no
Language :
English
Title :
Security and Privacy in Resource-Constrained Devices
Publication date :
2020
Event name :
32nd International Conference on Legal Knowledge and Information Systems (JURIX 2019)
Event place :
Madrid, Spain
Event date :
11-12-2019
Audience :
International
Journal title :
CEUR Workshop Proceedings
ISSN :
1613-0073
Publisher :
RWTH Aachen University, Aachen, Germany
Special issue title :
Seventh Doctoral Consortium of JURIX 2019
Volume :
2598
Pages :
1-11
Peer reviewed :
Peer reviewed
Focus Area :
Law / European Law Security, Reliability and Trust