ux and security for the iot

32
UX and Security for the IoT By Kevin Rohling

Upload: kevin-rohling

Post on 16-Jul-2015

219 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: UX and Security for the IoT

UX and Security for the IoT

By Kevin Rohling

Page 2: UX and Security for the IoT

Who is this guy?

Kevin Rohling

Co-Founder/VP of Product at Emberlight Advisor at Ship.io/Electric Cloud

@kevinrohling

Page 3: UX and Security for the IoT

I help make Emberlight.

Page 4: UX and Security for the IoT

What makes IoT Hard/Fun?

Connected devices are complicated. How do you keep the experience simple and secure for your users?

Page 5: UX and Security for the IoT

User Experience at Home

The bar is pretty high.

Page 6: UX and Security for the IoT

User Experience at Home

Keys -Portable -Durable -Cheap to replace -Never run out of batteries

Page 7: UX and Security for the IoT

User Experience at Home

Keys -Portable -Durable -Cheap to replace -Never run out of batteries

Page 8: UX and Security for the IoT

User Experience at Home

Keys -Portable -Durable -Cheap to replace -Never run out of batteries

Page 9: UX and Security for the IoT

User Experience at Home

Keys -Portable -Durable -Cheap to replace -Never run out of batteries

Page 10: UX and Security for the IoT

User Experience at Home

Keys -Portable -Durable -Cheap to replace -Never run out of batteries

Page 11: UX and Security for the IoT

User Experience at Home

The Light Switch -Easy to understand -Tactile feedback -Inexpensive -Conveniently located

Page 12: UX and Security for the IoT

User Experience at Home

The Light Switch -Easy to understand -Tactile feedback -Inexpensive -Conveniently located

Page 13: UX and Security for the IoT

User Experience at Home

The Light Switch -Easy to understand -Tactile feedback -Inexpensive -Conveniently located

Page 14: UX and Security for the IoT

User Experience at Home

The Light Switch -Easy to understand -Tactile feedback -Inexpensive -Conveniently located

Page 15: UX and Security for the IoT

User Experience at Home

The Light Switch -Easy to understand -Tactile feedback -Inexpensive -Conveniently located

Page 16: UX and Security for the IoT

User Experience in the Connected HomeSmart Phone vs Light Switch.

Page 17: UX and Security for the IoT

User Experience in the Connected HomeSmart Phone vs Light Switch.

1. Find your phone 2. Turn it on 3. Unlock it (passcode) 4. Locate the “lights” app 5. Turn light on 6. Put your phone away

1. Walk up to the light switch 2. Flip the switch 3. Go back to bed

Page 18: UX and Security for the IoT

User Experience in the Connected Home

1) The smartphone is not the right answer. 2) If it’s not broken, don’t fix it. 3) New interaction models are possible.

Page 19: UX and Security for the IoT

User Experience in the Connected Home

1) The smartphone is not the right answer. 2) If it’s not broken, don’t fix it. 3) New interaction models are possible.

Page 20: UX and Security for the IoT

User Experience in the Connected Home

1) The smartphone is not the right answer. 2) If it’s not broken, don’t fix it. 3) New interaction models must be very low friction.

Page 21: UX and Security for the IoT

New Connected Home User Experiences

Voice Control

Page 22: UX and Security for the IoT

New Connected Home User Experiences

Dashboards

Page 23: UX and Security for the IoT

New Connected Home User Experiences

Remote Control 2.0

SENIC

Page 24: UX and Security for the IoT

IoT and Security

IoT devices are harder to secure.

-Limited hardware resources -Intermittent or no cloud connectivity -3rd Party Platform Integrations -Potentially multiple RF access points (i.e. Wifi, BLE, Zigbee, etc.)

Page 25: UX and Security for the IoT

IoT and Security

IoT devices are harder to secure.

-Limited hardware resources -Intermittent or no cloud connectivity -3rd Party Platform Integrations -Potentially multiple RF access points (i.e. Wifi, BLE, Zigbee, etc.)

Page 26: UX and Security for the IoT

IoT and Security

IoT devices are harder to secure.

-Limited hardware resources -Intermittent or no cloud connectivity -3rd Party Platform Integrations -Potentially multiple RF access points (i.e. Wifi, BLE, Zigbee, etc.)

Page 27: UX and Security for the IoT

IoT and Security

IoT devices are harder to secure.

-Limited hardware resources -Intermittent or no cloud connectivity -3rd Party Platform Integrations -Potentially multiple RF access points (i.e. Wifi, BLE, Zigbee, etc.)

Page 28: UX and Security for the IoT

IoT and Security

IoT devices are harder to secure.

-Limited hardware resources -Intermittent or no cloud connectivity -3rd Party Platform Integrations -Potentially multiple RF access points (i.e. Wifi, BLE, Zigbee, etc.)

Page 29: UX and Security for the IoT

2 Common IoT Device Vulnerabilities

1. Open BLE/LAN APIsInteracting with a device over the LAN or BLE should require authentication. Many devices allow unrestricted access via the same WiFi network or over BLE.

All access points should be secured.

Page 30: UX and Security for the IoT

2 Common IoT Device Vulnerabilities

2. Unrestricted ‘Reset To Factory’

Devices should be protected against physical theft or access. Changes to the network connection or re-assignment to another user account should be restricted.

Page 31: UX and Security for the IoT

IoT in the Cloud

Users are very sensitive about what information you store about them.

This makes sense, you are in their home. Don’t be creepy.

Page 32: UX and Security for the IoT

Kevin Rohling@kevinrohling

[email protected] kevinrohling.com

UX and Security for the IoT