O slideshow foi denunciado.
Utilizamos seu perfil e dados de atividades no LinkedIn para personalizar e exibir anúncios mais relevantes. Altere suas preferências de anúncios quando desejar.

uTRUSTit—Usable Trust in the Internet of Things

1.049 visualizações

Publicada em

This presentation introduces the uTRUSTit project.

uTRUSTit – Usable Trust in the Internet of Things – is an international collaboration between six organizations from six various countries aiming at integrating the user directly in the trust chain, guaranteeing transparency in the underlying security and reliablilty properties of the Internet of Things. The project is supported by the EU under Framework Programme 7.

The Internet of Things (IoT) will connect a large number of communication and information systems. These systems will be part of everyday life in the same way mobile phones have become part of our lives. The information security properties of the IoT are often difficult to understand for its users, because they are hidden in pervasive systems and small devices manufactured by a large number of vendors. Trustworthiness, security functions and privacy implications are vast, and must be assessable to users and consumers.

The results of uTRUSTit enable system manufacturers and system integrators to express the underlying security concepts to users in a comprehensible way, allowing them to make valid judgements on the trustworthiness of such systems. Further, uTRUSTit’s design guidelines on trust help the industry to implement the trust-feedback toolkit developed by uTRUSTit in a secure, usable and accessible way.

  • Seja o primeiro a comentar

uTRUSTit—Usable Trust in the Internet of Things

  1. 1.
  2. 2. The Elevator Pitch<br />The uTRUSTit project supports user trust perception related to the IoT by guaranteeing transparency of underlying security and reliability properties of the interconnected systems, thus enabling the user to make informed decisions on security and privacy.<br />
  3. 3. What is the Internet of Things?<br />The Internet of Things (IoT) connects a large number of communication and information systems to support and simplify everyday life by means of technology. <br />Typical examples:<br />IoT at home („smart home”)<br />IoT in the office („smart office”)<br />IoT in industrial environments<br />E-voting<br />
  4. 4. What is the problem with security and trust?<br />The information security properties of existing applications are often hidden and therefore difficult to understand for users.<br /><ul><li>System developers provide solutions that are usually careless about user perceptions of security and trust.
  5. 5. Lack of trust entails a decrease in acceptance towards the innovative IoT just hitting the market, leading to business loss and slower technical evolution.</li></li></ul><li>What can uTRUSTit do about it?<br />The uTRUSTit project focuses on relevant user perceptions and includes the user in the trust chain, enabling them to give informed security and privacy decisions<br />With the continuous involvement of everyday users, the project builds a security/trust feedback application and gives definite guidelines to industrial developers of IoT technologies to ensureuser trust and acceptance.<br />
  6. 6. The <br />uTRUSTit<br />Toolkit<br />
  7. 7. User-centered design<br />uTRUSTitpoints out:users should be able to make all necessary security and privacy decisions without any prior expert knowledge.<br />uTRUSTit also focuseson accessibility<br />Design and proposed guidelines consider users living with disabilities (e.g. visual impairment or dementia)<br />
  8. 8. Balancing security and trust<br />If security > trust  we are building trust<br />If trust > security  we are ruining trust<br />
  9. 9. Examples for a possible user interface of the security/trust-feedback toolkit.<br />
  10. 10. Scenarios in scope<br />Smart home<br />Smart office<br />E-voting<br />
  11. 11. Technical approach<br />Research is undertaken to unveil factors affecting user trust<br />A security framework supports description of use cases and trust-feedbacksgiven to the user<br />The findings are tested iteratively both on real interconnected devices (e.g. via RFID, Bluetooth) and in Virtual Reality<br />Controlling and feedback device can be a simple smartphone<br />Visualization of security properties of “things” within the internet of things (IoT).<br />Overview tool enabling the IoT-user to see all the “things” in his/her environment and to assess their level of security<br />
  12. 12. Project structure<br />
  13. 13. Project facts<br />
  14. 14. The uTRUSTit Consortium<br />