Reference : Security and Privacy in Resource-Constrained Devices
Scientific congresses, symposiums and conference proceedings : Paper published in a journal
Law, criminology & political science : Multidisciplinary, general & others
Law / European Law; Security, Reliability and Trust
http://hdl.handle.net/10993/43081
Security and Privacy in Resource-Constrained Devices
English
Chiara, Pier Giorgio mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
2020
CEUR Workshop Proceedings
RWTH Aachen University
2598
Seventh Doctoral Consortium of JURIX 2019
1-11
Yes
International
1613-0073
Aachen
Germany
32nd International Conference on Legal Knowledge and Information Systems (JURIX 2019)
11-12-2019
Madrid
Spain
[en] Privacy ; Security ; IoT
[en] Recent adversarial attacks have been shown IoT devices weaknesses due to their limited computing power. Given also their ubiquitous
presence, lower costs and limitations in keeping security measures up-todate, resource-constrained devices represent a growing risk for the security of IT infrastructure. The scope of the research is to investigate the
weaknesses of resource-constrained IoT devices. The methodology for the
investigation is the legal analysis of existing legal frameworks regulating
IoT cybersecurity and data security; afterwards it will be carried out a
critical evaluation of the existing best practices. This critical analysis
should face the twofold challenge of increasing transparency and trust in
resource-constrained systems. Users and companies are two faces of the
same coin: accountability of data collectors and user awareness are crucial in the security and data protection debate. Thus, a comprehensive
overview of the relevant legal frameworks and guidelines would increase
the understanding of risks of the users, whilst data controllers (especially
of small and medium enterprises) may have an instrument to implement
properly security measures.
Researchers ; Students
http://hdl.handle.net/10993/43081
http://ceur-ws.org/Vol-2598/paper-03.pdf
Copyright 2020 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0)
H2020 ; 814177 - LAST-JD-RIoE - Law, Science and Technology Joint Doctorate: Rights of the Internet of Everything

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Open access
Security and Privacy in Resource-Constrained Devices.pdfPublisher postprint311.26 kBView/Open

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.