uTRUSTit—Usable Trust in the Internet of Things

  • 642 views
Uploaded on

This presentation introduces the uTRUSTit project. …

This presentation introduces the uTRUSTit project.

uTRUSTit – Usable Trust in the Internet of Things – is an international collaboration between six organizations from six various countries aiming at integrating the user directly in the trust chain, guaranteeing transparency in the underlying security and reliablilty properties of the Internet of Things. The project is supported by the EU under Framework Programme 7.

The Internet of Things (IoT) will connect a large number of communication and information systems. These systems will be part of everyday life in the same way mobile phones have become part of our lives. The information security properties of the IoT are often difficult to understand for its users, because they are hidden in pervasive systems and small devices manufactured by a large number of vendors. Trustworthiness, security functions and privacy implications are vast, and must be assessable to users and consumers.

The results of uTRUSTit enable system manufacturers and system integrators to express the underlying security concepts to users in a comprehensible way, allowing them to make valid judgements on the trustworthiness of such systems. Further, uTRUSTit’s design guidelines on trust help the industry to implement the trust-feedback toolkit developed by uTRUSTit in a secure, usable and accessible way.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
642
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
11
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1.
  • 2. The Elevator Pitch
    The uTRUSTit project supports user trust perception related to the IoT by guaranteeing transparency of underlying security and reliability properties of the interconnected systems, thus enabling the user to make informed decisions on security and privacy.
  • 3. What is the Internet of Things?
    The Internet of Things (IoT) connects a large number of communication and information systems to support and simplify everyday life by means of technology.
    Typical examples:
    IoT at home („smart home”)
    IoT in the office („smart office”)
    IoT in industrial environments
    E-voting
  • 4. What is the problem with security and trust?
    The information security properties of existing applications are often hidden and therefore difficult to understand for users.
    • System developers provide solutions that are usually careless about user perceptions of security and trust.
    • 5. Lack of trust entails a decrease in acceptance towards the innovative IoT just hitting the market, leading to business loss and slower technical evolution.
  • What can uTRUSTit do about it?
    The uTRUSTit project focuses on relevant user perceptions and includes the user in the trust chain, enabling them to give informed security and privacy decisions
    With the continuous involvement of everyday users, the project builds a security/trust feedback application and gives definite guidelines to industrial developers of IoT technologies to ensureuser trust and acceptance.
  • 6. The
    uTRUSTit
    Toolkit
  • 7. User-centered design
    uTRUSTitpoints out:users should be able to make all necessary security and privacy decisions without any prior expert knowledge.
    uTRUSTit also focuseson accessibility
    Design and proposed guidelines consider users living with disabilities (e.g. visual impairment or dementia)
  • 8. Balancing security and trust
    If security > trust  we are building trust
    If trust > security  we are ruining trust
  • 9. Examples for a possible user interface of the security/trust-feedback toolkit.
  • 10. Scenarios in scope
    Smart home
    Smart office
    E-voting
  • 11. Technical approach
    Research is undertaken to unveil factors affecting user trust
    A security framework supports description of use cases and trust-feedbacksgiven to the user
    The findings are tested iteratively both on real interconnected devices (e.g. via RFID, Bluetooth) and in Virtual Reality
    Controlling and feedback device can be a simple smartphone
    Visualization of security properties of “things” within the internet of things (IoT).
    Overview tool enabling the IoT-user to see all the “things” in his/her environment and to assess their level of security
  • 12. Project structure
  • 13. Project facts
  • 14. The uTRUSTit Consortium