Transcript
Page 1: uTRUSTit—Usable Trust in the Internet of Things

18/03/11

Usable Trust in the Internet of ThingsProject Reference: 258360FP7-ICT (Area: ICT-2009-1.4 Trustworthy ICT)Project Duration: 1 Sep 2010 – 31 August 2013

Page 2: uTRUSTit—Usable Trust in the Internet of Things

22

The Elevator Pitch

The uTRUSTit project supports user trust perception related to the IoT by guaranteeing transparency of underlying security and reliability properties of the interconnected systems, thus enabling the user to make informed decisions on security and privacy.

Page 3: uTRUSTit—Usable Trust in the Internet of Things

33

What is the Internet of Things?

• The Internet of Things (IoT) connects a large number of communication and information systems to support and simplify everyday life by means of technology.

• Typical examples:➥IoT at home („smart home”)

➥IoT in the office („smart office”)

➥IoT in industrial environments

➥E-voting

Page 4: uTRUSTit—Usable Trust in the Internet of Things

44

What is the problem with security and trust?

• The information security properties of existing applications are often hidden and therefore difficult to understand for users.

• System developers provide solutions that are usually careless about user perceptions of security and trust.

• Lack of trust entails a decrease in acceptance towards the innovative IoT just hitting the market, leading to business loss and slower technical evolution.

Page 5: uTRUSTit—Usable Trust in the Internet of Things

55

What can uTRUSTit do about it?

• The uTRUSTit project focuses on relevant user perceptions and includes the user in the trust chain, enabling them to give informed security and privacy decisions

•With the continuous involvement of everyday users, the project builds a security/trust feedback application and gives definite guidelines to industrial developers of IoT technologies to ensure user trust and acceptance.

Page 6: uTRUSTit—Usable Trust in the Internet of Things

The uTRUSTitToolkit

Page 7: uTRUSTit—Usable Trust in the Internet of Things

77

User-centered design

•uTRUSTit points out: users should be able to make all necessary security and privacy decisions without any prior expert knowledge.

•uTRUSTit also focuses on accessibility➥Design and proposed guidelines consider users living with

disabilities (e.g. visual impairment or dementia)

Page 8: uTRUSTit—Usable Trust in the Internet of Things

88

• If security > trust we are building trust

• If trust > security we are ruining trust

Balancing security and trust

Page 9: uTRUSTit—Usable Trust in the Internet of Things

99

Examples for a possible user interface of the security/trust-feedback toolkit.

Page 10: uTRUSTit—Usable Trust in the Internet of Things

1010

Scenarios in scope

Smart office

Smart home

E-voting

Page 11: uTRUSTit—Usable Trust in the Internet of Things

1111

Technical approach• Research is undertaken to unveil factors affecting user trust

• A security framework supports description of use cases and trust-feedbacks given to the user

• The findings are tested iteratively both on real interconnected devices (e.g. via RFID, Bluetooth) and in Virtual Reality

• Controlling and feedback device can be a simple smartphone

• Visualization of security properties of “things” within the internet of things (IoT).

• Overview tool enabling the IoT-user to see all the “things” in his/her environment and to assess their level of security

Page 12: uTRUSTit—Usable Trust in the Internet of Things

1212

Project structure

Page 13: uTRUSTit—Usable Trust in the Internet of Things

Project facts

Page 14: uTRUSTit—Usable Trust in the Internet of Things

1414

The uTRUSTit Consortium

Page 15: uTRUSTit—Usable Trust in the Internet of Things

1515

Project factsProject duration: 3 years

Project funding: EU 7th Framework Programme ICT-2009.1.4

Project coordinator: CURE – Center for Usability Research & Engineering

Contact: http://[email protected]

Page 16: uTRUSTit—Usable Trust in the Internet of Things

1616