18/03/1 1 Usable Trust in the Internet of Things Project Reference: 258360 FP7-ICT (Area: ICT-2009-1.4 Trustworthy ICT) Project Duration: 1 Sep 2010 – 31 August 2013
Nov 15, 2014
18/03/11
Usable Trust in the Internet of ThingsProject Reference: 258360FP7-ICT (Area: ICT-2009-1.4 Trustworthy ICT)Project Duration: 1 Sep 2010 – 31 August 2013
22
The Elevator Pitch
The uTRUSTit project supports user trust perception related to the IoT by guaranteeing transparency of underlying security and reliability properties of the interconnected systems, thus enabling the user to make informed decisions on security and privacy.
33
What is the Internet of Things?
• The Internet of Things (IoT) connects a large number of communication and information systems to support and simplify everyday life by means of technology.
• Typical examples:➥IoT at home („smart home”)
➥IoT in the office („smart office”)
➥IoT in industrial environments
➥E-voting
44
What is the problem with security and trust?
• The information security properties of existing applications are often hidden and therefore difficult to understand for users.
• System developers provide solutions that are usually careless about user perceptions of security and trust.
• Lack of trust entails a decrease in acceptance towards the innovative IoT just hitting the market, leading to business loss and slower technical evolution.
55
What can uTRUSTit do about it?
• The uTRUSTit project focuses on relevant user perceptions and includes the user in the trust chain, enabling them to give informed security and privacy decisions
•With the continuous involvement of everyday users, the project builds a security/trust feedback application and gives definite guidelines to industrial developers of IoT technologies to ensure user trust and acceptance.
The uTRUSTitToolkit
77
User-centered design
•uTRUSTit points out: users should be able to make all necessary security and privacy decisions without any prior expert knowledge.
•uTRUSTit also focuses on accessibility➥Design and proposed guidelines consider users living with
disabilities (e.g. visual impairment or dementia)
88
• If security > trust we are building trust
• If trust > security we are ruining trust
Balancing security and trust
99
Examples for a possible user interface of the security/trust-feedback toolkit.
1010
Scenarios in scope
Smart office
Smart home
E-voting
1111
Technical approach• Research is undertaken to unveil factors affecting user trust
• A security framework supports description of use cases and trust-feedbacks given to the user
• The findings are tested iteratively both on real interconnected devices (e.g. via RFID, Bluetooth) and in Virtual Reality
• Controlling and feedback device can be a simple smartphone
• Visualization of security properties of “things” within the internet of things (IoT).
• Overview tool enabling the IoT-user to see all the “things” in his/her environment and to assess their level of security
1212
Project structure
Project facts
1414
The uTRUSTit Consortium
1515
Project factsProject duration: 3 years
Project funding: EU 7th Framework Programme ICT-2009.1.4
Project coordinator: CURE – Center for Usability Research & Engineering
Contact: http://[email protected]
1616